`
`
`
`Paper No. 24
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________________
`
`
`APPLE INC.,
`Petitioner
`
`
`v.
`
`VIRNETX, INC.,
`Patent Owner
`___________________
`
`Case IPR2014-00481
`Patent 7,188,180
`____________________
`
`Before MICHAEL P. TIERNEY, KARL D. EASTHOM, and STEPHEN C. SIU,
`Administrative Patent Judges.
`
`__________________________________________________________________
`
`Petitioner’s Reply
`
`
`
`
`
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Table of Contents
`
`I.
`
`Claim Construction ....................................................................................... 1
`
`A.
`
`B.
`
`The Broadest Reasonable Interpretation Applies ............................ 1
`
`The Reexamination Prosecution Histories and Specification Do
`Not Contain the Alleged Disclaimers of Claim Scope ...................... 1
`
`C.
`
`The Board Should Maintain Its Claim Constructions ..................... 3
`
`1. VPN Communication Link………………………………….....3
`
`2. Secure Computer Network Address…………………………..5
`
`3. Client Computer………………………………………………..5
`
`II. Ground 1: Provino Anticipates Claims 1, 10, 12-15, 17, 26, 28-31, and 33
` ......................................................................................................................... 6
`
`A.
`
`B.
`
`C.
`
`D.
`
`Provino Discloses “Receiving a Secure Domain Name” .................. 6
`
`Nameserver 32 is a “Secure Domain Name Service” ....................... 7
`
`Provino’s Message Packets Seek Information From Server 31(s) 12
`
`Provino’s VPN Includes The Internet ............................................. 13
`
`III. Ground 2: Provino In View of Guillen Renders Obvious Claims 4, 6, 20,
`22, 35, and 37 ................................................................................................ 14
`
`IV. Conclusion .................................................................................................... 15
`
`
`
`
`
`
`
`
`
`
`i
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`
`CASES
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`Adams Respiratory Therapeutics, Inc. v. Perrigo Co.,
`616 F.3d 1283 (Fed. Cir. 2010) .........................................................................................4
`
`Apple Inc. v. SightSound Techs., L.L.C., CBM2013-00023 ...........................................11
`
`Denso Corp. & Clarion Co. v. Beacon Navigation, IPR2013-00026 ..........................13
`
`Grober v. Mako Prods., Inc.,
`686 F.3d 1335 (Fed. Cir. 2012) ...................................................................................4
`
`In re Abbott Diabetes Care Inc.,
`696 F.3d 1142 (Fed. Cir. 2004) .................................................................................10, 11
`
`In re Cuozzo Speed Techs., LLC,
`2015 WL 44866 (Fed. Cir. Feb. 4, 2015) ........................................................................1
`
`In re Paulson,
`30 F.3d 1475 (Fed. Cir. 1994) .......................................................................................5, 6
`
`In re Swanson,
`540 F.3d 1368 (Fed. Cir. 2008) .........................................................................................1
`
`Marine Polymer Techs., Inc. v. Hemcon, Inc.,
`672 F.3d 1350 (Fed. Cir. 2012) (en banc) ......................................................................2
`
`Standard Havens Products, Inc. v. Gencor Indus., Inc.,
`953 F.2d 1360 (Fed. Cir. 1991) .......................................................................................12
`
`Tempo Lighting Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ...........................................................................................2
`
`Thorner v. Sony Computer Entm’t Am. LLC,
`669 F.3d 1362 (Fed. Cir. 2012) .........................................................................................8
`
`SAP Am., Inc. v. Versata Dev. Group, Inc., CBM2012-0001 ........................................11
`
`Smith & Nephew v. Convatec Tech., IPR2013-00102 .....................................................13
`
`
`
`ii
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`The Board correctly found Provino to anticipate claims 1, 10, 12-15, 17, 26,
`
`28-31 and 33. Paper No. 11 (“Dec.”) at 11-19. It also correctly found Provino in
`
`view of Guillen to render claims 4, 6, 20, 22, 35, and 37 obvious. Id. at 19-21.
`
`These findings are supported by more than substantial evidence.
`
`I.
`
`Claim Construction
`
`A. The Broadest Reasonable Interpretation Applies
`
`Patent Owner challenges the Board’s determinations as being based on an
`
`improper use of the broadest reasonable interpretation standard (BRI), because its
`
`ability to amend the claims was “severely restricted.” Patent Owner Response,
`
`Paper No. 20 (“Resp.”) at 2. But Patent Owner never sought to amend its claims,
`
`and the Federal Circuit has recently rejected that precise theory as a reason for the
`
`Board to not employ BRI in IPR proceedings. In re Cuozzo Speed Techs., LLC,
`
`2015 WL 44866, *7 (Fed. Cir. Feb. 4, 2015). Patent Owner also contends (Resp. at
`
`7-8, 10-11, 15) the Board erred by not employing constructions adopted by a
`
`district court in related litigation, but those constructions rest on a different claim
`
`construction standard and are not binding on nor are entitled to deference by the
`
`Board. See In re Swanson, 540 F.3d 1368, 1377-78 (Fed. Cir. 2008). Patent
`
`Owner’s challenge to the Board’s use of the BRI standard is a transparent attempt
`
`to import unclaimed limitations into its claims, and must be rejected.
`
`B.
`
`The Reexamination Prosecution Histories and Specification Do
`Not Contain the Alleged Disclaimers of Claim Scope
`
`
`
`1
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Patent Owner contends it made “disparagements” and prosecution
`
`disclaimers that limit the scope of its claims. Resp. at 9, 16-18, 27-30, 33-34.
`
`What these arguments reveal is that the claims, based on their actual language,
`
`squarely encompass what is disclosed in or rendered obvious by the prior art.
`
`Moreover, even if they were relevant under the BRI (which they are not), Patent
`
`Owner’s actions plainly do not satisfy the requirements for an effective disclaimer.
`
`First, the putative disclaimers are all based on statements made during
`
`reexamination proceedings—some of which are still pending—and none was
`
`accompanied by a claim amendment. Under Tempo Lighting Inc. v. Tivoli, LLC,
`
`742 F.3d 973 (Fed. Cir. 2014), which Patent Owner cites, this means these putative
`
`prosecution disclaimers have no legal effect. In Tempo, the Federal Circuit
`
`confirmed “the PTO is under no obligation to accept a claim construction
`
`proffered as a prosecution history disclaimer.” Id. at 978. It then affirmed the
`
`Board’s finding of a disclaimer, but only because it was based on statements made
`
`at the examiner’s request and in conjunction with claim amendments during the
`
`original examination of the patent. Id. at 977. Tempo thus confirms the Board is
`
`not obliged to give effect to a putative prosecution disclaimer, and that statements
`
`made during reexamination are not equivalent to those made during original
`
`examination, especially when unaccompanied by a claim amendment. Id.; see
`
`Marine Polymer Techs., Inc. v. Hemcon, Inc., 672 F.3d 1350, 1364 (Fed. Cir.
`
`
`
`2
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`2012) (en banc) (“if, in reexamination, an examiner determines that particular
`
`claims are invalid and need amendment to be allowable, one would expect an
`
`examiner to require amendment rather than accept argument alone”).
`
`C. The Board Should Maintain Its Claim Constructions
`
`Patent Owner’s challenges to specific claim constructions are unwarranted,
`
`and Board should maintain the constructions it adopted in its institution decision.
`
`1.
`
`VPN Communication Link
`
`Patent Owner argues a “VPN communication link” must: (i) be “in a VPN,”
`
`(ii) involve a “network” of computers, and (iii) allow two computers to have
`
`“direct communication.” Resp. at 3-13. These limitations have no basis in the
`
`claim language and are inconsistent with the specification. E.g., Ex. 1001 at 6:63-
`
`65, 55:9-11. Moreover, adding the first two limitations to the meaning of the term
`
`“VPN communication link” would improperly exclude a preferred embodiment of
`
`the patent disclosure from the claim scope. Specifically, Figure 33 depicts as a
`
`“VPN communication link” a point-to-point connection that “traverses the
`
`unsecure public network, Internet 3302 to connect computer 3301 with secure
`
`server 3320.” See Resp. at 6 (“VPN communication link 3321”). This point-to-
`
`point connection can be a “VPN communication link” according to Patent Owner
`
`and its expert. Id.; Ex. 2024 ¶¶ 16-17; Ex. 1088 at 11:7-12:1 (in proceeding
`
`involving a grandchild of the ’180 patent, agreeing the depicted link originates at
`
`
`
`3
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Computer 3301 and ends at Server 3320). Yet, reading in Patent Owner’s
`
`proposed requirements for communications with additional unspecified computers
`
`on a network and limiting point-to-point connections to those within a VPN would
`
`exclude this embodiment. This is plainly improper. See Adams Respiratory
`
`Therapeutics, Inc. v. Perrigo Co., 616 F.3d 1283, 1290 (Fed. Cir. 2010) (“A claim
`
`construction that excludes the preferred embodiment ‘is rarely, if ever, correct’”).
`
`Patent Owner next asserts that prosecution history statements require the
`
`construction to be limited to “direct” communications. Resp. at 9. But the
`
`statements Patent Owner identifies were not accompanied by a claim amendment.
`
`Moreover, there is no clear explanation in the prosecution history or the
`
`specification of what “direct” means. For example, the ’180 specification
`
`describes VPN communication links that traverse firewalls, edge routers, and
`
`proxies between the end devices in a connection. Ex. 1001 at 34:17-49, 50:4-6,
`
`54:11-52, 56:29-31. The specification and prosecution history do not indicate
`
`which, if any, of these configurations would render communications “indirect”
`
`rather than “direct.” See Ex. 1088 at 12:8-13:19; Ex. 1089 at 31:9-33:21. Without
`
`a clear explanation of what does or does not constitute a “direct” communication,
`
`there can be no clear and unequivocal disavowal of “indirect” communications.
`
`Grober v. Mako Prods., Inc., 686 F.3d 1335, 1343 (Fed. Cir. 2012) (“prosecution
`
`history limits claim meaning when an applicant ‘clearly and unmistakably’
`
`
`
`4
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`disclaims scope or meaning”). The Board should not read a nebulous “direct”
`
`limitation into the claims in these proceedings based on the BRI standard.
`
`2.
`
`Secure Computer Network Address
`
`The Board construed “secure computer network address” under the BRI as
`
`“an address that requires authorization for access.” Dec. at 7. Patent Owner argues
`
`this was improper as it fails to expressly define a relationship between the
`
`associated computer and the VPN. Resp. at 14-15. But Patent Owner fails to
`
`identify any portion of the ’180 specification that redefines a “secure computer
`
`network address” to be limited to one associated with a computer and VPN. See
`
`Ex. 1011 ¶ 22; In re Paulson, 30 F.3d 1475, 1480 (Fed. Cir. 1994) (redefinitions
`
`must be with “reasonable clarity, deliberateness, and precision”).
`
`3.
`
`Client Computer
`
`Patent Owner attempts to narrow the meaning of the term “client computer”
`
`to a “user’s computer” because “[o]ne of the primary art references asserted against
`
`the ’180 patent in another petition . . . does not disclose a user’s computer that
`
`performs the claimed features.” Resp. at 20. The Board, in an appeal from a
`
`reexamination of the ’180 patent, has already rejected this transparent attempt to
`
`avoid invalidating prior art. See Reexam. No. 95/001,792, Appeal 2014-000591.
`
`Despite this, Patent Owner continues to assert the ’180 specification “repeatedly
`
`and consistently” “equates the user’s computer 2601 with the ‘client computer’ in
`
`
`
`5
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`the claims.” Resp. at 20-22, n.3. The ’180 patent disclosure does no such thing –
`
`the specification uses the term “user’s computer” only four times, including once
`
`to describe prior art systems and otherwise in the context of certain preferred
`
`embodiments. Ex. 1001 at 39:53-62, 40:36-45, 41:40-43, 47:4-8. By contrast,
`
`“client computer” is used 35 times in the disclosure and often in describing “the
`
`present invention.” This is not a repeated and consistent use of a term that operates
`
`to redefine “client computer” as “user’s computer” with “reasonable clarity,
`
`deliberateness, and precision.” See In re Paulsen, 30 F.3d at 1480. Patent
`
`Owner’s attempt to redefine “client computer” must be rejected.
`
`II. Ground 1: Provino Anticipates Claims 1, 10, 12-15, 17, 26, 28-31, and 33
`
`The Board correctly found Provino to anticipate claims 1, 10, 12-15, 17, 26,
`
`28-31, and 33. Dec. at 14-19. The record fully supports the Board’s determination.
`
`A.
`
`Provino Discloses “Receiving a Secure Domain Name”
`
`Patent Owner, in arguing Provino does not disclose “receiving a secure
`
`domain name,” ignores the Board’s construction and takes its decision out of
`
`context. Resp. at 26-27. The Board construed a “secure domain name,” as “a name
`
`that corresponds to a secure computer network address.” Dec. at 8. Patent Owner
`
`does not dispute that a human-readable internet address is a domain name or that in
`
`Provino, a client device 12(m) can receive a human-readable Internet address
`
`corresponding to server 31(s)—a secure computer with a corresponding secure
`
`
`
`6
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`network address—from a user seeking to communicate with server 31(s). Ex.
`
`1003 at 13:31-40, 10:45-67; Resp. at 26; Ex. 2024 ¶ 28; Ex. 1011 ¶¶ 29-33. Patent
`
`Owner thus concedes Provino discloses this limitation under the Board’s
`
`construction. Patent Owner’s sole challenge is a sideshow derived the Board’s use
`
`of the term “verify” in its description of how nameserver 32 performs actions that
`
`meet the requirements of the claim language. Resp. at 26-27. This sideshow can be
`
`safely ignored – the ‘180 patent does not disclose performing any special process
`
`to “verify” a received domain name, and the claims require no such process.
`
`Patent Owner next asserts a “secure domain name” must be non-
`
`conventional. Again, the Board has already considered and rejected this argument.
`
`Dec. at 8; Resp. at 15-17, 27-29. Moreover, a person of ordinary skill would
`
`understand Provino as satisfying even Patent Owner’s construction, as it can
`
`accommodate non-conventional domain names. Indeed, as Provino explains, its
`
`“invention can be used in connection with any network which provides for any
`
`form of a secondary or informal network address arrangement.” Ex. 1003 at
`
`16:12-17 (emphasis added); Ex. 1011 ¶¶ 34-35.
`
`B. Nameserver 32 is a “Secure Domain Name Service”
`
`Patent Owner argues that because it disparaged and disavowed use of
`
`conventional domain name services, its claims should now be read as excluding
`
`any systems or processes that include or make use of such name services. Resp. at
`
`
`
`7
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`30-36. The basis of this supposed disclaimer is illusory—the ’180 patent itself
`
`shows systems that use standard domain name services as part of the purported
`
`invention and Patent Owner’s expert admits as much. See Ex. 1001 at Fig. 26,
`
`40:46-41:8, 46:52-58; Ex. 1089 at 15:22-16:12 (“The modified DNS server 2602
`
`includes a conventional DNS server function 2609 . . .”), 18:19-19:1 (“…Elements
`
`2602 . . . [are] part of the capability that’s provided by a secure domain name
`
`service”). Unsurprisingly, the descriptions in the ‘180 patent of “conventional”
`
`domain name service functions—as “provid[ing] a look-up function that returns
`
`the IP address of a requested computer or host” or “allow[ing] hosts to retrieve
`
`automatically the public keys of a host that the host is to communicate with” (Ex.
`
`1001 at 39:45-40:12)—plainly do not (and cannot) amount to a disavowal of a
`
`specific feature of the claimed systems and methods. Resp. at 30-33; see Thorner
`
`v. Sony Computer Entm’t Am. LLC, 669 F.3d 1362, 1366 (Fed. Cir. 2012) (“Mere
`
`criticism of a particular embodiment encompassed in the plain meaning of a claim
`
`term is not sufficient to rise to the level of clear disavowal.”).
`
`More directly, the Provino systems are not “conventional” domain services,
`
`but, like the SDNS described in the ’180 patent, are systems with “unconventional”
`
`domain name functionality. Ex. 1011 ¶¶ 34-35. In fact, the ’180 patent explains,
`
`precisely as Provino describes its nameserver 32, that “SDNS 3313 contains a
`
`cross-reference database of secure domain names and corresponding secure
`
`
`
`8
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`network addresses. That is, for each secure domain name, SDNS 3313 stores a
`
`computer network address corresponding to the secure domain name.” Ex. 1001 at
`
`52:4-8. Moreover, as Patent Owner’s expert admits, this is the key difference
`
`between a “conventional” domain service and a SDNS – only the latter receives “a
`
`query message [] requesting a secure computer address and returns a secure
`
`computer address for the requested secure domain name,” using a cross-reference
`
`database of secure domain names. Ex. 1089 at 16:21-17:18, 19:19-21; Ex. 1088 at
`
`21:14-22:1, 23:16-26:15, 16:9-17:17; Ex. 1011 ¶ 15.
`
`The key defining feature that the ’180 patent consistently uses to define the
`
`SDNS—its ability to query a database containing secure network addresses based
`
`on secure domain names—also describes Provino’s nameserver 32. Ex. 1011
`
`¶¶ 33-35; Ex. 1003 at 8:67-9:5. Patent Owner’s expert admitted as much when
`
`explaining that one of the functions of Provino’s nameserver 32 is “to try to
`
`resolve addresses within [VPN] 15,” including for server 31(s), which may be a
`
`secure computer with a secure network address. Ex. 1088 at 38:22-40:18; Ex.
`
`1089 at 49:9-50:12. Dr. Monrose also agreed that, once authorized by firewall 30,
`
`device 12(m) connects through firewall 30 to request and receive the secure
`
`network address of server 31(s) from nameserver 32 by providing the
`
`corresponding human readable internet address of server 31(s). Ex. 1089 at 49:2-
`
`50:12, Ex. 1090 at 38:5-21; see Ex. 1003 at 9:56-60, 13:63-14:24. Thus, Provino’s
`
`
`
`9
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`nameserver 32 receives queries for secure devices and returns secure network
`
`address—just like the SDNS described in the ’180 patent. Ex. 1001 at 51:32-35,
`
`52:4-8; Ex. 1089 at 16:21-17:18, 19:19-21.
`
`Patent Owner nonetheless asserts that nameserver 32 behaves like Provino’s
`
`nameserver 17, which it alleges is “conventional.” Resp. at 34. Patent Owner
`
`ignores that Provino itself distinguishes nameserver 32 from public nameserver 17,
`
`and Patent Owner’s expert agrees that nameserver 17 cannot resolve queries for
`
`secure network addresses because it does not have network addresses for secure
`
`devices behind firewall 30 of VPN 15 (as nameserver 32 does). Ex. 1089 at 48:3-
`
`50:12; Ex. 1003 at 10:45-55, 11:11-14; Ex. 1011 ¶¶ 30, 34; Ex. 2019 at 61:18-
`
`63:2; compare with Ex. 1001 at 51:29-35; Ex. 1011 ¶ 14.
`
`Patent Owner cites In re Abbott Diabetes Care Inc., 696 F.3d 1142, 1149-50
`
`(Fed. Cir. 2004), to support its theory that the Board should import a special (albeit
`
`vague) meaning into its claims to exclude Provino’s nameserver 32. Resp. at 31-
`
`35; see Ex. 2024 ¶¶ 34-38. But, Abbott bears no resemblance to this case. In
`
`Abbott, every embodiment disclosed in the specification “repeatedly, consistently,
`
`and exclusively” showed the same feature, which led the court to equate the
`
`meaning of the claim term with that single feature. See Abbott, 696 F.3d at 1149-50
`
`(explaining it was “not an instance where the specification would necessarily have
`
`to disavow an embodiment that would otherwise be covered by the plain language
`
`
`
`10
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`of the claims—rather claim terms [in Abbott were] entirely consistent with and
`
`even support[ed] the specification’s exclusive depiction.”). Here, by contrast,
`
`Patent Owner and its expert rely on different, alternative embodiments, rather than
`
`“repeatedly consistently, and exclusively” describing the same technique or
`
`feature. Resp. at 33-35; Ex. 2024 ¶¶ 36-38; see SAP Am., Inc. v. Versata Dev.
`
`Group, Inc., CBM2012-0001, Paper 36 (Jan. 9, 2013) at 16. Also, here, the claims
`
`do not use a term which the specification expressly defines, but instead uses
`
`language that plainly encompasses what it seeks to exclude. See Apple Inc. v.
`
`SightSound Techs., L.L.C., CBM2013-00023, Paper 101 (Oct. 7, 2014) at 13-14.
`
`As explained in § I.B, Patent Owner’s reliance on its own statements during
`
`reexaminations of related patents is equally unavailing. Resp. at 35-37. Self-
`
`serving statements regarding Provino in pending reexamination proceedings made
`
`without accompanying claim amendments are not legally effective disclaimers.
`
`Nor is there any precedent for Patent Owner’s position that it can somehow
`
`disclaim prior art encompassed by its claims by “disparaging” that prior art. And,
`
`even if these prosecution histories were legally relevant, what they show actually
`
`supports the Board’s and Petitioner’s mapping of Provino’s nameserver 32 to the
`
`claims. For example, during reexamination of the ’180 patent, Patent Owner
`
`argued to the PTO that its disclosure “explicitly states that a [SDNS] can resolve
`
`addresses for a secure domain name; whereas, a conventional domain name
`
`
`
`11
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`service cannot resolve addresses for a secure domain name.” Ex. 1023 at 804.
`
`That describes precisely the secure nameserver 32 depicted in Provino.
`
`C.
`
`Provino’s Message Packets Seek Information From Server 31(s)
`
`Patent Owner asserts that message packets sent to server 31(s) in Provino
`
`cannot be “access request messages” because Provino does not describe what the
`
`message packets contain, and thus they cannot possibly seek information stored on
`
`server 31(s), as required by claims 12 and 28. Resp. at 39-40, 44-46. But when its
`
`expert was questioned about this feature of Provino, he agreed that device 12(M)
`
`could be requesting services and information stored on server 31(s). Ex. 1089 at
`
`41:12-42:31 (discussing Ex. 1003 at 6:19-28, 6:64-7:7), 44:14-16, 44:21-45:1,
`
`45:11-46:7; Ex. 1088 at 42:12-43:10 (“request[ing] access to whatever
`
`information is stored on server 31S . . . could be one reason to connect to 31S”).
`
`Likewise, Petitioner’s expert similarly understood that “requests sent to server
`
`31(s) by device 12(m) may be requests for information stored at the server 31(s).”
`
`Ex. 1011 ¶ 39.
`
`Patent Owner also fails to appreciate that an anticipatory reference need not
`
`duplicate word-for-word what is in the claims. Anticipation may be found “when a
`
`claimed limitation is . . . implicit in the relevant reference.” Standard Havens
`
`Products, Inc. v. Gencor Indus., Inc., 953 F.2d 1360, 1369 (Fed. Cir. 1991). What
`
`an anticipatory reference teaches must be analyzed from the perspective of a
`
`
`
`12
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`person of ordinary skill: “[t]here must be no difference between the claimed
`
`invention and the reference disclosure, as viewed by a person of ordinary skill in
`
`the field of the invention.” Smith & Nephew v. Convatec Tech., IPR2013-00102,
`
`Paper 87 at 14-15 (May 19, 2014). Also, when considering what a reference
`
`discloses, “it is proper to take into account not only specific teachings of the
`
`reference but also the inferences which one skilled in the art would reasonably be
`
`expected to draw therefrom.” Denso Corp. & Clarion Co. v. Beacon Navigation,
`
`IPR2013-00026, Paper 34 at 19-20 (Mar. 14, 2014). Contrary to Patent Owner’s
`
`assertions, a person of ordinary skill would understand that message packets sent in
`
`the Provino scheme seek information from server 31(s), and thus constitute “access
`
`request messages.” Ex. 1011 ¶ 39; Ex. 1003 at 6:19-63.
`
`D.
`
`Provino’s VPN Includes The Internet
`
`Patent Owner contends the Board and Petitioner advance conflicting
`
`interpretation of Provino to contend its scheme describes VPNs that encompass the
`
`Internet. Specifically, Patent Owner contends while the Board and Petitioner relied
`
`on Provino’s Figure 1 as disclosing “the internet” limitation of claims 10 and 26,
`
`Petitioner also relied on a different passage of Provino to illustrate a “non-Internet”
`
`embodiment. Resp. 43-44. Patent Owner’s arguments conflate and confuse two
`
`separate passages in Provino. More directly, Provino clearly teaches that its
`
`scheme is both preferably deployed over the Internet, but also can be deployed in a
`
`
`
`13
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`manner not limited to the Internet or to using human-readable addresses. Ex. 1003
`
`at 16:12-17; Pet. at 19; Ex. 1011 ¶ 34.
`
`III. Ground 2: Provino In View of Guillen Renders Obvious Claims 4, 6, 20,
`22, 35, and 37
`
`Patent Owner’s two challenges to Ground 2 are unsupported by the record.
`
`First, Patent Owner argues a person of skill would never apply the teachings of
`
`Guillen to Provino’s VPN system without Kosiur. Resp. at 47-48. But, Kosiur
`
`merely exemplifies that, before 2000, “the benefits of QoS described in the context
`
`of ATM communications were known by those of ordinary skill in the art to be
`
`equally applicable to VPNs,” Ex. 1011 ¶ 42, and that one of skill would combine
`
`Guillen and Provino based on the parallel uses of DNS servers, id. Patent Owner’s
`
`expert does not address this issue or otherwise dispute this fact. See Ex. 2024; Ex.
`
`1089 at 35:18-38:13, 83:9-87:3.
`
`Second, Patent Owner asserts that Guillen is incompatible with the Provino
`
`system because Guillen discloses providing QoS information “before establishing
`
`the Virtual Circuit,” while modified nameserver 32 would only provide QoS
`
`parameters after a tunnel was established between device 12(m) and firewall 30.
`
`Resp. at 49-51; Ex. 2024 ¶¶ 52-55. Patent Owner simply misinterprets “Virtual
`
`Circuit,” which Guillen defines as “a communication path between two ES [End
`
`Systems] consisting of a set of Switching nodes and links.” Ex. 1005 § 2.1, p. 81;
`
`see also Ex. 1089 at 55:12-15. As Patent Owner’s expert admits, the path between
`
`
`
`14
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`device 12(M) and server 31(s) could constitute a path between two end systems,
`
`exactly analogous to the Virtual Circuit in Guillen. Ex. 1089 at 60:18-61:13, 54:11-
`
`18. Moreover, in Provino, before this path between device 12(M) and server 31(s)
`
`can exist, nameserver 32 must provide server 31(s)’s secure address. Id. at 58:17-
`
`59:16; Ex. 1011 ¶ 39; Ex. 1003 10:56-11:45; Ex. 2019 at 51:21-55:6. If, in the
`
`same response message, a modified nameserver 32 provides QoS parameters, that
`
`would necessarily be before the relevant path is established, contrary to Patent
`
`Owner’s assertions. Patent Owner’s expert, during his deposition, retreated from
`
`statements in his declaration that support Patent Owner’s position and refused to
`
`opine on whether firewall 30 was a “switching node,” similar to a router, or an
`
`“end system” capable of being part of a Guillen virtual circuit. Compare Ex. 1089
`
`at 59:22-60:2, with Ex. 2024 ¶¶ 52-53; see Ex. 1005 at § 2.1, p. 80-81. The
`
`evidence thus supports the Board’s determination that a person of ordinary skill
`
`would combine Provino and Guillen, which would render obvious claims 4, 6, 20,
`
`22, 27, and 35.
`
`IV. Conclusion
`
`Petitioner respectfully requests the Board maintain its constructions and find
`
`that Provino anticipates, or, in combination with Guillen, renders obvious the
`
`challenged claims.
`
`
`
`
`
`15
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Dated: March 19, 2015
`
`
`
`
`
`
`
`Respectfully Submitted,
`
`/ Jeffrey P. Kushan /
`Jeffrey P. Kushan
`Registration No. 43,401
`Sidley Austin LLP
`1501 K Street NW
`Washington, DC 20005
`jkushan@sidley.com
`(202) 736-8914
`Attorney for Petitioner Apple
`
`
`
`
`
`16
`
`
`
`IPR2014-00481
`
`Petitioner’s Reply (Paper 24)
`
`Certificate of Service
`
`I hereby certify that on this 19th of March, 2015, a copy of this Petitioner’s
`
`Reply has been served in its entirety by email on the following counsel of record
`
`for Patent Owner:
`
`Joseph E. Palys
`E-mail: josephpalys@paulhastings.com
`
`Naveen Modi
`E-mail: naveenmodi@paulhastings.com
`
`Jason E. Stach
`E-mail: Jason.stach@finnegan.com
`
`
`
`Dated:
`
`March 19, 2015
`
`
`
`Respectfully submitted,
`
`/Jeffrey P. Kushan/
`Jeffrey P. Kushan
`Attorney for Petitioner Apple
`
`
`
`
`
`