throbber
IPR2014-00481
`
`
`
`Paper No. 24
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________________
`
`
`APPLE INC.,
`Petitioner
`
`
`v.
`
`VIRNETX, INC.,
`Patent Owner
`___________________
`
`Case IPR2014-00481
`Patent 7,188,180
`____________________
`
`Before MICHAEL P. TIERNEY, KARL D. EASTHOM, and STEPHEN C. SIU,
`Administrative Patent Judges.
`
`__________________________________________________________________
`
`Petitioner’s Reply
`
`
`
`
`
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Table of Contents
`
`I.
`
`Claim Construction ....................................................................................... 1
`
`A.
`
`B.
`
`The Broadest Reasonable Interpretation Applies ............................ 1
`
`The Reexamination Prosecution Histories and Specification Do
`Not Contain the Alleged Disclaimers of Claim Scope ...................... 1
`
`C.
`
`The Board Should Maintain Its Claim Constructions ..................... 3
`
`1. VPN Communication Link………………………………….....3
`
`2. Secure Computer Network Address…………………………..5
`
`3. Client Computer………………………………………………..5
`
`II. Ground 1: Provino Anticipates Claims 1, 10, 12-15, 17, 26, 28-31, and 33
` ......................................................................................................................... 6
`
`A.
`
`B.
`
`C.
`
`D.
`
`Provino Discloses “Receiving a Secure Domain Name” .................. 6
`
`Nameserver 32 is a “Secure Domain Name Service” ....................... 7
`
`Provino’s Message Packets Seek Information From Server 31(s) 12
`
`Provino’s VPN Includes The Internet ............................................. 13
`
`III. Ground 2: Provino In View of Guillen Renders Obvious Claims 4, 6, 20,
`22, 35, and 37 ................................................................................................ 14
`
`IV. Conclusion .................................................................................................... 15
`
`
`
`
`
`
`
`
`
`
`i
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`
`CASES
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`Adams Respiratory Therapeutics, Inc. v. Perrigo Co.,
`616 F.3d 1283 (Fed. Cir. 2010) .........................................................................................4
`
`Apple Inc. v. SightSound Techs., L.L.C., CBM2013-00023 ...........................................11
`
`Denso Corp. & Clarion Co. v. Beacon Navigation, IPR2013-00026 ..........................13
`
`Grober v. Mako Prods., Inc.,
`686 F.3d 1335 (Fed. Cir. 2012) ...................................................................................4
`
`In re Abbott Diabetes Care Inc.,
`696 F.3d 1142 (Fed. Cir. 2004) .................................................................................10, 11
`
`In re Cuozzo Speed Techs., LLC,
`2015 WL 44866 (Fed. Cir. Feb. 4, 2015) ........................................................................1
`
`In re Paulson,
`30 F.3d 1475 (Fed. Cir. 1994) .......................................................................................5, 6
`
`In re Swanson,
`540 F.3d 1368 (Fed. Cir. 2008) .........................................................................................1
`
`Marine Polymer Techs., Inc. v. Hemcon, Inc.,
`672 F.3d 1350 (Fed. Cir. 2012) (en banc) ......................................................................2
`
`Standard Havens Products, Inc. v. Gencor Indus., Inc.,
`953 F.2d 1360 (Fed. Cir. 1991) .......................................................................................12
`
`Tempo Lighting Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ...........................................................................................2
`
`Thorner v. Sony Computer Entm’t Am. LLC,
`669 F.3d 1362 (Fed. Cir. 2012) .........................................................................................8
`
`SAP Am., Inc. v. Versata Dev. Group, Inc., CBM2012-0001 ........................................11
`
`Smith & Nephew v. Convatec Tech., IPR2013-00102 .....................................................13
`
`
`
`ii
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`The Board correctly found Provino to anticipate claims 1, 10, 12-15, 17, 26,
`
`28-31 and 33. Paper No. 11 (“Dec.”) at 11-19. It also correctly found Provino in
`
`view of Guillen to render claims 4, 6, 20, 22, 35, and 37 obvious. Id. at 19-21.
`
`These findings are supported by more than substantial evidence.
`
`I.
`
`Claim Construction
`
`A. The Broadest Reasonable Interpretation Applies
`
`Patent Owner challenges the Board’s determinations as being based on an
`
`improper use of the broadest reasonable interpretation standard (BRI), because its
`
`ability to amend the claims was “severely restricted.” Patent Owner Response,
`
`Paper No. 20 (“Resp.”) at 2. But Patent Owner never sought to amend its claims,
`
`and the Federal Circuit has recently rejected that precise theory as a reason for the
`
`Board to not employ BRI in IPR proceedings. In re Cuozzo Speed Techs., LLC,
`
`2015 WL 44866, *7 (Fed. Cir. Feb. 4, 2015). Patent Owner also contends (Resp. at
`
`7-8, 10-11, 15) the Board erred by not employing constructions adopted by a
`
`district court in related litigation, but those constructions rest on a different claim
`
`construction standard and are not binding on nor are entitled to deference by the
`
`Board. See In re Swanson, 540 F.3d 1368, 1377-78 (Fed. Cir. 2008). Patent
`
`Owner’s challenge to the Board’s use of the BRI standard is a transparent attempt
`
`to import unclaimed limitations into its claims, and must be rejected.
`
`B.
`
`The Reexamination Prosecution Histories and Specification Do
`Not Contain the Alleged Disclaimers of Claim Scope
`
`
`
`1
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Patent Owner contends it made “disparagements” and prosecution
`
`disclaimers that limit the scope of its claims. Resp. at 9, 16-18, 27-30, 33-34.
`
`What these arguments reveal is that the claims, based on their actual language,
`
`squarely encompass what is disclosed in or rendered obvious by the prior art.
`
`Moreover, even if they were relevant under the BRI (which they are not), Patent
`
`Owner’s actions plainly do not satisfy the requirements for an effective disclaimer.
`
`First, the putative disclaimers are all based on statements made during
`
`reexamination proceedings—some of which are still pending—and none was
`
`accompanied by a claim amendment. Under Tempo Lighting Inc. v. Tivoli, LLC,
`
`742 F.3d 973 (Fed. Cir. 2014), which Patent Owner cites, this means these putative
`
`prosecution disclaimers have no legal effect. In Tempo, the Federal Circuit
`
`confirmed “the PTO is under no obligation to accept a claim construction
`
`proffered as a prosecution history disclaimer.” Id. at 978. It then affirmed the
`
`Board’s finding of a disclaimer, but only because it was based on statements made
`
`at the examiner’s request and in conjunction with claim amendments during the
`
`original examination of the patent. Id. at 977. Tempo thus confirms the Board is
`
`not obliged to give effect to a putative prosecution disclaimer, and that statements
`
`made during reexamination are not equivalent to those made during original
`
`examination, especially when unaccompanied by a claim amendment. Id.; see
`
`Marine Polymer Techs., Inc. v. Hemcon, Inc., 672 F.3d 1350, 1364 (Fed. Cir.
`
`
`
`2
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`2012) (en banc) (“if, in reexamination, an examiner determines that particular
`
`claims are invalid and need amendment to be allowable, one would expect an
`
`examiner to require amendment rather than accept argument alone”).
`
`C. The Board Should Maintain Its Claim Constructions
`
`Patent Owner’s challenges to specific claim constructions are unwarranted,
`
`and Board should maintain the constructions it adopted in its institution decision.
`
`1.
`
`VPN Communication Link
`
`Patent Owner argues a “VPN communication link” must: (i) be “in a VPN,”
`
`(ii) involve a “network” of computers, and (iii) allow two computers to have
`
`“direct communication.” Resp. at 3-13. These limitations have no basis in the
`
`claim language and are inconsistent with the specification. E.g., Ex. 1001 at 6:63-
`
`65, 55:9-11. Moreover, adding the first two limitations to the meaning of the term
`
`“VPN communication link” would improperly exclude a preferred embodiment of
`
`the patent disclosure from the claim scope. Specifically, Figure 33 depicts as a
`
`“VPN communication link” a point-to-point connection that “traverses the
`
`unsecure public network, Internet 3302 to connect computer 3301 with secure
`
`server 3320.” See Resp. at 6 (“VPN communication link 3321”). This point-to-
`
`point connection can be a “VPN communication link” according to Patent Owner
`
`and its expert. Id.; Ex. 2024 ¶¶ 16-17; Ex. 1088 at 11:7-12:1 (in proceeding
`
`involving a grandchild of the ’180 patent, agreeing the depicted link originates at
`
`
`
`3
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Computer 3301 and ends at Server 3320). Yet, reading in Patent Owner’s
`
`proposed requirements for communications with additional unspecified computers
`
`on a network and limiting point-to-point connections to those within a VPN would
`
`exclude this embodiment. This is plainly improper. See Adams Respiratory
`
`Therapeutics, Inc. v. Perrigo Co., 616 F.3d 1283, 1290 (Fed. Cir. 2010) (“A claim
`
`construction that excludes the preferred embodiment ‘is rarely, if ever, correct’”).
`
`Patent Owner next asserts that prosecution history statements require the
`
`construction to be limited to “direct” communications. Resp. at 9. But the
`
`statements Patent Owner identifies were not accompanied by a claim amendment.
`
`Moreover, there is no clear explanation in the prosecution history or the
`
`specification of what “direct” means. For example, the ’180 specification
`
`describes VPN communication links that traverse firewalls, edge routers, and
`
`proxies between the end devices in a connection. Ex. 1001 at 34:17-49, 50:4-6,
`
`54:11-52, 56:29-31. The specification and prosecution history do not indicate
`
`which, if any, of these configurations would render communications “indirect”
`
`rather than “direct.” See Ex. 1088 at 12:8-13:19; Ex. 1089 at 31:9-33:21. Without
`
`a clear explanation of what does or does not constitute a “direct” communication,
`
`there can be no clear and unequivocal disavowal of “indirect” communications.
`
`Grober v. Mako Prods., Inc., 686 F.3d 1335, 1343 (Fed. Cir. 2012) (“prosecution
`
`history limits claim meaning when an applicant ‘clearly and unmistakably’
`
`
`
`4
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`disclaims scope or meaning”). The Board should not read a nebulous “direct”
`
`limitation into the claims in these proceedings based on the BRI standard.
`
`2.
`
`Secure Computer Network Address
`
`The Board construed “secure computer network address” under the BRI as
`
`“an address that requires authorization for access.” Dec. at 7. Patent Owner argues
`
`this was improper as it fails to expressly define a relationship between the
`
`associated computer and the VPN. Resp. at 14-15. But Patent Owner fails to
`
`identify any portion of the ’180 specification that redefines a “secure computer
`
`network address” to be limited to one associated with a computer and VPN. See
`
`Ex. 1011 ¶ 22; In re Paulson, 30 F.3d 1475, 1480 (Fed. Cir. 1994) (redefinitions
`
`must be with “reasonable clarity, deliberateness, and precision”).
`
`3.
`
`Client Computer
`
`Patent Owner attempts to narrow the meaning of the term “client computer”
`
`to a “user’s computer” because “[o]ne of the primary art references asserted against
`
`the ’180 patent in another petition . . . does not disclose a user’s computer that
`
`performs the claimed features.” Resp. at 20. The Board, in an appeal from a
`
`reexamination of the ’180 patent, has already rejected this transparent attempt to
`
`avoid invalidating prior art. See Reexam. No. 95/001,792, Appeal 2014-000591.
`
`Despite this, Patent Owner continues to assert the ’180 specification “repeatedly
`
`and consistently” “equates the user’s computer 2601 with the ‘client computer’ in
`
`
`
`5
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`the claims.” Resp. at 20-22, n.3. The ’180 patent disclosure does no such thing –
`
`the specification uses the term “user’s computer” only four times, including once
`
`to describe prior art systems and otherwise in the context of certain preferred
`
`embodiments. Ex. 1001 at 39:53-62, 40:36-45, 41:40-43, 47:4-8. By contrast,
`
`“client computer” is used 35 times in the disclosure and often in describing “the
`
`present invention.” This is not a repeated and consistent use of a term that operates
`
`to redefine “client computer” as “user’s computer” with “reasonable clarity,
`
`deliberateness, and precision.” See In re Paulsen, 30 F.3d at 1480. Patent
`
`Owner’s attempt to redefine “client computer” must be rejected.
`
`II. Ground 1: Provino Anticipates Claims 1, 10, 12-15, 17, 26, 28-31, and 33
`
`The Board correctly found Provino to anticipate claims 1, 10, 12-15, 17, 26,
`
`28-31, and 33. Dec. at 14-19. The record fully supports the Board’s determination.
`
`A.
`
`Provino Discloses “Receiving a Secure Domain Name”
`
`Patent Owner, in arguing Provino does not disclose “receiving a secure
`
`domain name,” ignores the Board’s construction and takes its decision out of
`
`context. Resp. at 26-27. The Board construed a “secure domain name,” as “a name
`
`that corresponds to a secure computer network address.” Dec. at 8. Patent Owner
`
`does not dispute that a human-readable internet address is a domain name or that in
`
`Provino, a client device 12(m) can receive a human-readable Internet address
`
`corresponding to server 31(s)—a secure computer with a corresponding secure
`
`
`
`6
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`network address—from a user seeking to communicate with server 31(s). Ex.
`
`1003 at 13:31-40, 10:45-67; Resp. at 26; Ex. 2024 ¶ 28; Ex. 1011 ¶¶ 29-33. Patent
`
`Owner thus concedes Provino discloses this limitation under the Board’s
`
`construction. Patent Owner’s sole challenge is a sideshow derived the Board’s use
`
`of the term “verify” in its description of how nameserver 32 performs actions that
`
`meet the requirements of the claim language. Resp. at 26-27. This sideshow can be
`
`safely ignored – the ‘180 patent does not disclose performing any special process
`
`to “verify” a received domain name, and the claims require no such process.
`
`Patent Owner next asserts a “secure domain name” must be non-
`
`conventional. Again, the Board has already considered and rejected this argument.
`
`Dec. at 8; Resp. at 15-17, 27-29. Moreover, a person of ordinary skill would
`
`understand Provino as satisfying even Patent Owner’s construction, as it can
`
`accommodate non-conventional domain names. Indeed, as Provino explains, its
`
`“invention can be used in connection with any network which provides for any
`
`form of a secondary or informal network address arrangement.” Ex. 1003 at
`
`16:12-17 (emphasis added); Ex. 1011 ¶¶ 34-35.
`
`B. Nameserver 32 is a “Secure Domain Name Service”
`
`Patent Owner argues that because it disparaged and disavowed use of
`
`conventional domain name services, its claims should now be read as excluding
`
`any systems or processes that include or make use of such name services. Resp. at
`
`
`
`7
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`30-36. The basis of this supposed disclaimer is illusory—the ’180 patent itself
`
`shows systems that use standard domain name services as part of the purported
`
`invention and Patent Owner’s expert admits as much. See Ex. 1001 at Fig. 26,
`
`40:46-41:8, 46:52-58; Ex. 1089 at 15:22-16:12 (“The modified DNS server 2602
`
`includes a conventional DNS server function 2609 . . .”), 18:19-19:1 (“…Elements
`
`2602 . . . [are] part of the capability that’s provided by a secure domain name
`
`service”). Unsurprisingly, the descriptions in the ‘180 patent of “conventional”
`
`domain name service functions—as “provid[ing] a look-up function that returns
`
`the IP address of a requested computer or host” or “allow[ing] hosts to retrieve
`
`automatically the public keys of a host that the host is to communicate with” (Ex.
`
`1001 at 39:45-40:12)—plainly do not (and cannot) amount to a disavowal of a
`
`specific feature of the claimed systems and methods. Resp. at 30-33; see Thorner
`
`v. Sony Computer Entm’t Am. LLC, 669 F.3d 1362, 1366 (Fed. Cir. 2012) (“Mere
`
`criticism of a particular embodiment encompassed in the plain meaning of a claim
`
`term is not sufficient to rise to the level of clear disavowal.”).
`
`More directly, the Provino systems are not “conventional” domain services,
`
`but, like the SDNS described in the ’180 patent, are systems with “unconventional”
`
`domain name functionality. Ex. 1011 ¶¶ 34-35. In fact, the ’180 patent explains,
`
`precisely as Provino describes its nameserver 32, that “SDNS 3313 contains a
`
`cross-reference database of secure domain names and corresponding secure
`
`
`
`8
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`network addresses. That is, for each secure domain name, SDNS 3313 stores a
`
`computer network address corresponding to the secure domain name.” Ex. 1001 at
`
`52:4-8. Moreover, as Patent Owner’s expert admits, this is the key difference
`
`between a “conventional” domain service and a SDNS – only the latter receives “a
`
`query message [] requesting a secure computer address and returns a secure
`
`computer address for the requested secure domain name,” using a cross-reference
`
`database of secure domain names. Ex. 1089 at 16:21-17:18, 19:19-21; Ex. 1088 at
`
`21:14-22:1, 23:16-26:15, 16:9-17:17; Ex. 1011 ¶ 15.
`
`The key defining feature that the ’180 patent consistently uses to define the
`
`SDNS—its ability to query a database containing secure network addresses based
`
`on secure domain names—also describes Provino’s nameserver 32. Ex. 1011
`
`¶¶ 33-35; Ex. 1003 at 8:67-9:5. Patent Owner’s expert admitted as much when
`
`explaining that one of the functions of Provino’s nameserver 32 is “to try to
`
`resolve addresses within [VPN] 15,” including for server 31(s), which may be a
`
`secure computer with a secure network address. Ex. 1088 at 38:22-40:18; Ex.
`
`1089 at 49:9-50:12. Dr. Monrose also agreed that, once authorized by firewall 30,
`
`device 12(m) connects through firewall 30 to request and receive the secure
`
`network address of server 31(s) from nameserver 32 by providing the
`
`corresponding human readable internet address of server 31(s). Ex. 1089 at 49:2-
`
`50:12, Ex. 1090 at 38:5-21; see Ex. 1003 at 9:56-60, 13:63-14:24. Thus, Provino’s
`
`
`
`9
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`nameserver 32 receives queries for secure devices and returns secure network
`
`address—just like the SDNS described in the ’180 patent. Ex. 1001 at 51:32-35,
`
`52:4-8; Ex. 1089 at 16:21-17:18, 19:19-21.
`
`Patent Owner nonetheless asserts that nameserver 32 behaves like Provino’s
`
`nameserver 17, which it alleges is “conventional.” Resp. at 34. Patent Owner
`
`ignores that Provino itself distinguishes nameserver 32 from public nameserver 17,
`
`and Patent Owner’s expert agrees that nameserver 17 cannot resolve queries for
`
`secure network addresses because it does not have network addresses for secure
`
`devices behind firewall 30 of VPN 15 (as nameserver 32 does). Ex. 1089 at 48:3-
`
`50:12; Ex. 1003 at 10:45-55, 11:11-14; Ex. 1011 ¶¶ 30, 34; Ex. 2019 at 61:18-
`
`63:2; compare with Ex. 1001 at 51:29-35; Ex. 1011 ¶ 14.
`
`Patent Owner cites In re Abbott Diabetes Care Inc., 696 F.3d 1142, 1149-50
`
`(Fed. Cir. 2004), to support its theory that the Board should import a special (albeit
`
`vague) meaning into its claims to exclude Provino’s nameserver 32. Resp. at 31-
`
`35; see Ex. 2024 ¶¶ 34-38. But, Abbott bears no resemblance to this case. In
`
`Abbott, every embodiment disclosed in the specification “repeatedly, consistently,
`
`and exclusively” showed the same feature, which led the court to equate the
`
`meaning of the claim term with that single feature. See Abbott, 696 F.3d at 1149-50
`
`(explaining it was “not an instance where the specification would necessarily have
`
`to disavow an embodiment that would otherwise be covered by the plain language
`
`
`
`10
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`of the claims—rather claim terms [in Abbott were] entirely consistent with and
`
`even support[ed] the specification’s exclusive depiction.”). Here, by contrast,
`
`Patent Owner and its expert rely on different, alternative embodiments, rather than
`
`“repeatedly consistently, and exclusively” describing the same technique or
`
`feature. Resp. at 33-35; Ex. 2024 ¶¶ 36-38; see SAP Am., Inc. v. Versata Dev.
`
`Group, Inc., CBM2012-0001, Paper 36 (Jan. 9, 2013) at 16. Also, here, the claims
`
`do not use a term which the specification expressly defines, but instead uses
`
`language that plainly encompasses what it seeks to exclude. See Apple Inc. v.
`
`SightSound Techs., L.L.C., CBM2013-00023, Paper 101 (Oct. 7, 2014) at 13-14.
`
`As explained in § I.B, Patent Owner’s reliance on its own statements during
`
`reexaminations of related patents is equally unavailing. Resp. at 35-37. Self-
`
`serving statements regarding Provino in pending reexamination proceedings made
`
`without accompanying claim amendments are not legally effective disclaimers.
`
`Nor is there any precedent for Patent Owner’s position that it can somehow
`
`disclaim prior art encompassed by its claims by “disparaging” that prior art. And,
`
`even if these prosecution histories were legally relevant, what they show actually
`
`supports the Board’s and Petitioner’s mapping of Provino’s nameserver 32 to the
`
`claims. For example, during reexamination of the ’180 patent, Patent Owner
`
`argued to the PTO that its disclosure “explicitly states that a [SDNS] can resolve
`
`addresses for a secure domain name; whereas, a conventional domain name
`
`
`
`11
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`service cannot resolve addresses for a secure domain name.” Ex. 1023 at 804.
`
`That describes precisely the secure nameserver 32 depicted in Provino.
`
`C.
`
`Provino’s Message Packets Seek Information From Server 31(s)
`
`Patent Owner asserts that message packets sent to server 31(s) in Provino
`
`cannot be “access request messages” because Provino does not describe what the
`
`message packets contain, and thus they cannot possibly seek information stored on
`
`server 31(s), as required by claims 12 and 28. Resp. at 39-40, 44-46. But when its
`
`expert was questioned about this feature of Provino, he agreed that device 12(M)
`
`could be requesting services and information stored on server 31(s). Ex. 1089 at
`
`41:12-42:31 (discussing Ex. 1003 at 6:19-28, 6:64-7:7), 44:14-16, 44:21-45:1,
`
`45:11-46:7; Ex. 1088 at 42:12-43:10 (“request[ing] access to whatever
`
`information is stored on server 31S . . . could be one reason to connect to 31S”).
`
`Likewise, Petitioner’s expert similarly understood that “requests sent to server
`
`31(s) by device 12(m) may be requests for information stored at the server 31(s).”
`
`Ex. 1011 ¶ 39.
`
`Patent Owner also fails to appreciate that an anticipatory reference need not
`
`duplicate word-for-word what is in the claims. Anticipation may be found “when a
`
`claimed limitation is . . . implicit in the relevant reference.” Standard Havens
`
`Products, Inc. v. Gencor Indus., Inc., 953 F.2d 1360, 1369 (Fed. Cir. 1991). What
`
`an anticipatory reference teaches must be analyzed from the perspective of a
`
`
`
`12
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`person of ordinary skill: “[t]here must be no difference between the claimed
`
`invention and the reference disclosure, as viewed by a person of ordinary skill in
`
`the field of the invention.” Smith & Nephew v. Convatec Tech., IPR2013-00102,
`
`Paper 87 at 14-15 (May 19, 2014). Also, when considering what a reference
`
`discloses, “it is proper to take into account not only specific teachings of the
`
`reference but also the inferences which one skilled in the art would reasonably be
`
`expected to draw therefrom.” Denso Corp. & Clarion Co. v. Beacon Navigation,
`
`IPR2013-00026, Paper 34 at 19-20 (Mar. 14, 2014). Contrary to Patent Owner’s
`
`assertions, a person of ordinary skill would understand that message packets sent in
`
`the Provino scheme seek information from server 31(s), and thus constitute “access
`
`request messages.” Ex. 1011 ¶ 39; Ex. 1003 at 6:19-63.
`
`D.
`
`Provino’s VPN Includes The Internet
`
`Patent Owner contends the Board and Petitioner advance conflicting
`
`interpretation of Provino to contend its scheme describes VPNs that encompass the
`
`Internet. Specifically, Patent Owner contends while the Board and Petitioner relied
`
`on Provino’s Figure 1 as disclosing “the internet” limitation of claims 10 and 26,
`
`Petitioner also relied on a different passage of Provino to illustrate a “non-Internet”
`
`embodiment. Resp. 43-44. Patent Owner’s arguments conflate and confuse two
`
`separate passages in Provino. More directly, Provino clearly teaches that its
`
`scheme is both preferably deployed over the Internet, but also can be deployed in a
`
`
`
`13
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`manner not limited to the Internet or to using human-readable addresses. Ex. 1003
`
`at 16:12-17; Pet. at 19; Ex. 1011 ¶ 34.
`
`III. Ground 2: Provino In View of Guillen Renders Obvious Claims 4, 6, 20,
`22, 35, and 37
`
`Patent Owner’s two challenges to Ground 2 are unsupported by the record.
`
`First, Patent Owner argues a person of skill would never apply the teachings of
`
`Guillen to Provino’s VPN system without Kosiur. Resp. at 47-48. But, Kosiur
`
`merely exemplifies that, before 2000, “the benefits of QoS described in the context
`
`of ATM communications were known by those of ordinary skill in the art to be
`
`equally applicable to VPNs,” Ex. 1011 ¶ 42, and that one of skill would combine
`
`Guillen and Provino based on the parallel uses of DNS servers, id. Patent Owner’s
`
`expert does not address this issue or otherwise dispute this fact. See Ex. 2024; Ex.
`
`1089 at 35:18-38:13, 83:9-87:3.
`
`Second, Patent Owner asserts that Guillen is incompatible with the Provino
`
`system because Guillen discloses providing QoS information “before establishing
`
`the Virtual Circuit,” while modified nameserver 32 would only provide QoS
`
`parameters after a tunnel was established between device 12(m) and firewall 30.
`
`Resp. at 49-51; Ex. 2024 ¶¶ 52-55. Patent Owner simply misinterprets “Virtual
`
`Circuit,” which Guillen defines as “a communication path between two ES [End
`
`Systems] consisting of a set of Switching nodes and links.” Ex. 1005 § 2.1, p. 81;
`
`see also Ex. 1089 at 55:12-15. As Patent Owner’s expert admits, the path between
`
`
`
`14
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`device 12(M) and server 31(s) could constitute a path between two end systems,
`
`exactly analogous to the Virtual Circuit in Guillen. Ex. 1089 at 60:18-61:13, 54:11-
`
`18. Moreover, in Provino, before this path between device 12(M) and server 31(s)
`
`can exist, nameserver 32 must provide server 31(s)’s secure address. Id. at 58:17-
`
`59:16; Ex. 1011 ¶ 39; Ex. 1003 10:56-11:45; Ex. 2019 at 51:21-55:6. If, in the
`
`same response message, a modified nameserver 32 provides QoS parameters, that
`
`would necessarily be before the relevant path is established, contrary to Patent
`
`Owner’s assertions. Patent Owner’s expert, during his deposition, retreated from
`
`statements in his declaration that support Patent Owner’s position and refused to
`
`opine on whether firewall 30 was a “switching node,” similar to a router, or an
`
`“end system” capable of being part of a Guillen virtual circuit. Compare Ex. 1089
`
`at 59:22-60:2, with Ex. 2024 ¶¶ 52-53; see Ex. 1005 at § 2.1, p. 80-81. The
`
`evidence thus supports the Board’s determination that a person of ordinary skill
`
`would combine Provino and Guillen, which would render obvious claims 4, 6, 20,
`
`22, 27, and 35.
`
`IV. Conclusion
`
`Petitioner respectfully requests the Board maintain its constructions and find
`
`that Provino anticipates, or, in combination with Guillen, renders obvious the
`
`challenged claims.
`
`
`
`
`
`15
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Dated: March 19, 2015
`
`
`
`
`
`
`
`Respectfully Submitted,
`
`/ Jeffrey P. Kushan /
`Jeffrey P. Kushan
`Registration No. 43,401
`Sidley Austin LLP
`1501 K Street NW
`Washington, DC 20005
`jkushan@sidley.com
`(202) 736-8914
`Attorney for Petitioner Apple
`
`
`
`
`
`16
`
`

`

`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Certificate of Service
`
`I hereby certify that on this 19th of March, 2015, a copy of this Petitioner’s
`
`Reply has been served in its entirety by email on the following counsel of record
`
`for Patent Owner:
`
`Joseph E. Palys
`E-mail: josephpalys@paulhastings.com
`
`Naveen Modi
`E-mail: naveenmodi@paulhastings.com
`
`Jason E. Stach
`E-mail: Jason.stach@finnegan.com
`
`
`
`Dated:
`
`March 19, 2015
`
`
`
`Respectfully submitted,
`
`/Jeffrey P. Kushan/
`Jeffrey P. Kushan
`Attorney for Petitioner Apple
`
`
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket