throbber

`
`Paper No. 1
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`APPLE INC.
`Petitioner,
`
`v.
`
`VIRNETX, INC. AND SCIENCE APPLICATION INTERNATIONAL
`CORPORATION,
`Patent Owner
`
`Patent No. 8,504,697
`Issued: August 6, 2013
`Filed: December 28, 2011
`Inventors: Victor Larson, et al.
`Title: SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK
`PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN
`NAMES
`____________________
`
`Inter Partes Review No. IPR2014-00237
`__________________________________________________________________
`
`PETITION FOR INTER PARTES REVIEW
`
`
`
`
`
`
`VIRNETX EXHIBIT 2019
`Apple v. VirnetX
`Trial IPR2014-00485
`
`Page 1 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION FOR
`INTER PARTES REVIEW ............................................................................ 1
`A.
`Certification the ’697 Patent May Be Contested by Petitioner ............ 1
`B.
`Fee for Inter Partes Review (§ 42.15(a)) .............................................. 2
`C. Mandatory Notices (37 CFR § 42.8(b)) ............................................... 2
`1.
`Real Party in Interest (§ 42.8(b)(1)) ........................................... 2
`2.
`Other Proceedings (§ 42.8(b)(2)) ............................................... 2
`3.
`Designation of Lead and Backup Counsel ................................. 2
`4.
`Service Information (§ 42.8(b)(4)) ............................................ 2
`Proof of Service (§§ 42.6(e) and 42.105(a)) ........................................ 2
`D.
`IDENTIFICATION OF CLAIMS BEING CHALLENGED
`(§ 42.104(B)) .................................................................................................. 2
`III. RELEVANT INFORMATION CONCERNING THE CONTESTED
`PATENT ......................................................................................................... 3
`A.
`Effective Filing Date and Prosecution History of the ’697 patent ....... 3
`B.
`Person of Ordinary Skill in the Art ...................................................... 5
`C.
`Construction of Terms Used in the Claims .......................................... 6
`1.
`Domain Name (Claims 1-11, 14-25, and 28-30) ....................... 6
`2.
`Secure Communication Link (Claims 1-11, 14-25, and
`28-30) ......................................................................................... 7
`Secure Communications Service (Claims 1-11, 14-25,
`28-30) ....................................................................................... 10
`Intercepting . . . a request (Claims 1-11, 14-25, and 28-
`30) ............................................................................................ 12
`5. Modulation (Claims 6-7 and 20-21) ........................................ 15
`IV. PRECISE REASONS FOR RELIEF REQUESTED ................................... 16
`A.
`Claims 1-11, 14-25, and 28-30 Are Anticipated by Beser ................. 16
`1.
`Beser Anticipates Claims 1 and 16 .......................................... 16
`2.
`Beser Anticipates Claim 2 and 24 ............................................ 23
`3.
`Beser Anticipates Claim 3 and 17 ............................................ 24
`
`3.
`
`4.
`
`i
`
`Page 2 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Beser Anticipates Claim 4 and 18 ............................................ 25
`4.
`Beser Anticipates Claims 5, 6, 7, 19, 20, and 21 ..................... 26
`5.
`Beser Anticipates Claim 8, 9, 22 and 23 .................................. 27
`6.
`Beser Anticipates Claim 10 and 29 .......................................... 28
`7.
`Beser Anticipates Claim 11 and 25 .......................................... 30
`8.
`Beser Anticipates Claim 14 and 28 .......................................... 30
`9.
`10. Beser Anticipates Claim 15 and 30 .......................................... 32
`Beser In View of RFC 2401 Renders Obvious Claims 1-11, 14-
`25, and 28-30 ...................................................................................... 33
`1.
`Claims 2 and 24 Would Have Been Obvious .......................... 33
`2.
`Dependent Claims 3 and 17 Would Have Been Obvious ........ 37
`3.
`Claims 1, 16, 4-11, 16, 18-23, 25, and 28-30 Would Have
`Been Obvious ........................................................................... 38
`Claims 1-11, 14-25, and 28-30 Are Anticipated by RFC 2543 ......... 39
`1.
`RFC 2543 Anticipates Claims 1 and 16 ................................... 39
`2.
`RFC 2543 Anticipates Claim 2 and 24 .................................... 48
`3.
`RFC 2543 Anticipates Claim 3 and 17 .................................... 49
`4.
`RFC 2543 Anticipates Claim 4 and 18 .................................... 50
`5.
`RFC 2543 Anticipates Claim 5, 6, 7, 19, 20, and 21 ............... 50
`6.
`RFC 2543 Anticipates Claim 8, 9, 22, and 23 ......................... 52
`7.
`RFC 2543 Anticipates Claim 10 and 29 .................................. 53
`8.
`RFC 2543 Anticipates Claim 11 and 25 .................................. 54
`9.
`RFC 2543 Anticipates Claim 14 and 28 .................................. 54
`10. RFC 2543 Anticipates Claim 15 and 30 .................................. 56
`RFC 2543 In View of RFC 1889, RFC 2327 Renders Obvious
`Claims 1-11, 14-25, and 28-30 ........................................................... 56
`1.
`Independent Claims 1 and 16 Would Have Been Obvious ..... 56
`2.
`Dependent Claims 2-11, 14-15, 17-25, and 28-30 Would
`Have Been Obvious ................................................................. 57
`
`B.
`
`C.
`
`D.
`
`ii
`
`Page 3 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`E.
`
`RFC 2543 In View of Mobility Support Using SIP Renders
`Obvious Claims 8-9 and 22-23........................................................... 58
`CONCLUSION ............................................................................................. 60
`
`V.
`
`Attachment A. Proof of Service of the Petition
`Attachment B. List of Evidence and Exhibits Relied Upon in Petition
`
`
`
`
`iii
`
`Page 4 of 72
`
`

`

`I.
`
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION FOR
`INTER PARTES REVIEW
`A. Certification the ’697 Patent May Be Contested by Petitioner
`Petitioner certifies that U.S. Patent No. 8,504,697 (the ’697 patent) (Ex.
`
`1001) is available for inter partes review. Petitioner certifies that it is not barred or
`
`estopped from requesting inter partes review of the claims of the ’697 patent on
`
`the grounds identified in this Petition. Neither Petitioner, nor any party in privity
`
`with Petitioner, has filed a civil action challenging the validity of any claim of the
`
`’697 patent. The ’697 patent has not been the subject of a prior inter partes review
`
`by Petitioner or a privy of Petitioner.
`
`Petitioner also certifies this petition for inter partes review is filed within
`
`one year of the date of service of a complaint alleging infringement of a patent. On
`
`August 5, 2013, VirnetX filed a complaint in the Eastern District of Texas
`
`asserting the ’697 patent in case No. 6:13-cv-00581. The case was dismissed
`
`without prejudice. On August 27, 2013, VirnetX amended its complaint in the
`
`6:12:cv-00855 proceeding to add the ’697 patent. Because the date of this petition
`
`is less than one year from August 27, 2013, this petition complies with 35 U.S.C.
`
`§ 315(b). Petitioner also notes that the timing provisions of 35 U.S.C. § 311(c) and
`
`37 C.F.R. § 42.102(a) do not apply to the ’697 patent, as it pre-dates the first-to-
`
`file system. See Pub. L. 112-274 § 1(n), 126 Stat. 2456 (Jan. 14, 2013).
`
`
`
`Page 5 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Fee for Inter Partes Review (§ 42.15(a))
`
`B.
`The Director is authorized to charge the fee specified by 37 CFR § 42.15(a)
`
`to Deposit Account No. 50-1597.
`
`C. Mandatory Notices (37 CFR § 42.8(b))
`Real Party in Interest (§ 42.8(b)(1))
`1.
`The real party of interest of this petition pursuant to § 42.8(b)(1) is Apple
`
`Inc. (“Apple”) located at One Infinite Loop, Cupertino, CA 95014.
`
`Other Proceedings (§ 42.8(b)(2))
`
`2.
`The ’697 patent is not subject to any other proceedings. The ’697 patent is
`
`also the subject of IPR2014-00238 being filed concurrently by Petitioner.
`
`Designation of Lead and Backup Counsel
`
`3.
`Lead Counsel
`Jeffrey P. Kushan
`Reg. No. 43,401
`jkushan@sidley.com
`(202) 736-8914
`
`Backup Lead Counsel
`Joseph A. Micallef
`Reg. No. 39,772
`jmicallef@sidley.com
`(202) 736-8492
`
`Service Information (§ 42.8(b)(4))
`
`4.
`Service on Petitioner may be made by mail or hand delivery to: Sidley
`
`Austin LLP, 1501 K Street, N.W., Washington, D.C. 20005. The fax number for
`
`lead and backup counsel is (202) 736-8711.
`
`Proof of Service (§§ 42.6(e) and 42.105(a))
`D.
`Proof of service of this petition is provided in Attachment A.
`
`II.
`
`Identification of Claims Being Challenged (§ 42.104(b))
`
`2
`
`Page 6 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Claims 1-11, 14-25, and 28-30 of the ’697 patent are unpatentable as being
`
`anticipated under 35 U.S.C. § 102(a) & (e), and/or for being obvious over the prior
`
`art under 35 U.S.C. § 103. Specifically:
`
`(i)
`
`Claims 1-11, 14-25, and 28-30 are anticipated under § 102(e) by U.S.
`Patent No. 6,496,867 to Beser (“Beser”) (Ex. 1009);
`
`(ii) Claims 1-11, 14-25, and 28-30 are obvious under § 103 based on
`Beser (Ex. 1009) in view of RFC 2401 (Ex. 1010);
`
`(iii) Claims 1-11, 14-25, and 28-30 are obvious under § 103 based on
`Beser (Ex. 1009) in view of RFC 2401 (Ex. 1010) and the knowledge
`of a person of ordinary skill in the art;
`
`(iv) Claims 1-11, 14-25, and 28-30 are anticipated under § 102(a) by RFC
`2453 (Ex. 1012);
`
`(v) Claims 1-11, 14-25, and 28-30 are obvious under § 103 based on RFC
`2453 (Ex. 1012) in view of RFC 1889 (Ex. 1013) and RFC 2327 (Ex.
`1014).
`
`(vi) Claims 8-9 and 22-23 are obvious under § 103 based on RFC 2453
`(Ex. 1012) in view of Mobility Support Using SIP (Ex. 1015).
`
`Petitioner’s proposed construction of the contested claims, the evidence relied
`
`upon, and the precise reasons why the claims are unpatentable are provided in
`
`§ IV, below. The evidence relied upon in support of this petition is listed in
`
`Attachment B.
`
`III. Relevant Information Concerning the Contested Patent
`A. Effective Filing Date and Prosecution History of the ’697 patent
`The ’697 patent issued from U.S. Ser. No. 13/339,257. The ’257 application
`
`claims the benefit as a continuation of the following applications: (i) 13/049,552
`
`3
`
`Page 7 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`(issued as U.S. Patent No. 8,572,247); 11/840,560 (issued as U.S. Patent No.
`
`7,921,211); 10/714,849 (issued as U.S. Patent No. 7,418,504); and 09/558,210. It
`
`also is designated a continuation-in-part of 09/504,783, filed on February 15,
`
`2000, which is a continuation-in-part of 09/429,643, filed on October 29, 1999.
`
`The ’210, ’783 and ’643 applications also claim priority to 60/106,261, filed
`
`October 30, 1998 and 60/137,704, filed June 7, 1998.
`
`Claims 1 and 16 of the ’697 patent are independent claims. Claims 2-11 and
`
`14-15 depend directly or indirectly from claim 1, and claims 17-25 and 28-30
`
`depend directly or indirectly from claim 16. Claims 2-11, 14-15, 17-25, and 28-30
`
`cannot enjoy an effective filing date earlier than that of claims 1 and 16,
`
`respectively, from which they depend (i.e., no earlier than February of 2000).
`
`Claims 1 and 16 of the ’697 patent rely on information found only in the
`
`’783 application. For example, claim 1 of the ’697 patent specifies “intercepting . .
`
`. a request to look up an internet protocol (IP) address . . . based on a domain
`
`name . . . .” Claim 16 specifies “[a] system . . . including one or more servers
`
`configured to intercept . . . a request to look up an internet protocol (IP) address . . .
`
`based on a domain name . . . .” No application filed prior to the ’783 application
`
`even mentions the term “domain name,” much less provides a written description
`
`of systems or processes corresponding to the ’697 patent claims. In proceedings
`
`involving the related ’135, ’151, ’211 and ’504 patents, Patent Owner has not
`
`4
`
`Page 8 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`disputed that claims reciting a “domain name” are not entitled to an effective filing
`
`date prior to February 15, 2000. See, e.g., Patent Owner Preliminary Oppositions
`
`in IPR2013-00348, -00349, -00354, -00375, -00376, -00377, -00378, -00393, -
`
`00394, -00397, and -00398. See also inter partes reexamination nos. 95/001,682,
`
`95/001,679, 95/001,697, 95/001,714, 95/001,788, and 95/001,789. Also, while
`
`claims 1 and 16 recite a “secure communications service,” there is no mention,
`
`whether explicit or implicit, of this term anywhere in the disclosure of the ’697
`
`patent, nor in any application filed prior to the ’783 application. Thus, the effective
`
`filing date of claims 1-11, 14-25, and 28-30 of the ’697 patent is not earlier than
`
`February 15, 2000.
`
`Person of Ordinary Skill in the Art
`
`B.
`A person of ordinary skill in the art in the field of the ’697 patent would
`
`have been someone with a good working knowledge of networking protocols,
`
`including those employing security techniques, as well as computer systems that
`
`support these protocols and techniques. The person also would be very familiar
`
`with Internet standards related to communications and security, and with a variety
`
`of client-server systems and technologies. The person would have gained this
`
`knowledge either through education and training, several years of practical
`
`working experience, or through a combination of these. Ex. 1003 ¶ 63.
`
`5
`
`Page 9 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`C. Construction of Terms Used in the Claims
`In this proceeding, claims must be given their broadest reasonable
`
`construction in light of the specification. 37 CFR § 42.100(b). The broadest
`
`reasonable construction should take account of Patent Owner’s contentions as to
`
`what the claims literally encompass and constructions Patent Owner has advanced
`
`in litigation. The ’697 patent shares a common disclosure and uses several of the
`
`same terms as the ’135, ’151, ’504 and ’211 patents, in respect of which Patent
`
`Owner has advanced constructions. Also, if Patent Owner contends terms in the
`
`claims should be read as having a special meaning, those contentions should be
`
`disregarded unless Patent Owner also amends the claims compliant with 35 U.S.C.
`
`§ 112 to make them expressly correspond to those contentions. See 77 Fed. Reg.
`
`48764 at II.B.6 (August 14, 2012); cf. In re Youman, 679 F.3d 1335, 1343 (Fed.
`
`Cir. 2012). In the constructions below, Petitioner identifies representative subject
`
`matter within the scope of the claims, read with their broadest reasonable
`
`interpretation. Petitioner expressly reserves its right to advance different
`
`constructions in district court litigation, which employs a different claim
`
`construction standard.
`
`Domain Name (Claims 1-11, 14-25, and 28-30)
`1.
`The ’697 patent does not define the term “domain name.” A person of
`
`ordinary skill would understand that the ordinary meaning of a “domain name” is a
`
`6
`
`Page 10 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`hierarchical sequence of words in decreasing order of specificity that corresponds
`
`to a numerical IP address. Ex. 1003 at ¶¶ 89-91; see generally ¶¶ 86-94. Patent
`
`Owner, however, has asserted a “domain name” is simply “a name corresponding
`
`to an IP address.” Ex. 1046 at 14-15. The broadest reasonable construction of
`
`“domain name” should encompass Patent Owner’s contention that it can be “a
`
`name corresponding to an IP address.” See Ex. 1003 at ¶¶ 199-201.
`
`2.
`
`Secure Communication Link (Claims 1-11, 14-25, and 28-
`30)
`
`The broadest reasonable construction of the phrase “secure communication
`
`link” can include communications over a virtual private network (VPN), would
`
`encompass communications that are encrypted or not encrypted, and would
`
`encompass direct communications between computers involved in the secure
`
`communications link that are transported via intermediary computers or devices.
`
`First, the ’697 patent explains a “secure communication link” is “a virtual
`
`private communication link over the computer network.” Ex. 1001 at 6:63-65. A
`
`“secure communication link” therefore must encompass virtual private networks.
`
`Ex. 1003 at ¶¶ 202-210; see Ex. 1001 at claims 3 and 17. It also suggests that a
`
`“secure communication link” is one that permits computers to privately
`
`communicate with each other over a public network – a communication link would
`
`be “secure” if it protects the anonymity of the computers involved in the
`
`communications. See, e.g., Ex. 1001 at 39:49-58.
`
`7
`
`Page 11 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Second, dependent claims 2 and 24 of the ’697 patent specify that data being
`
`sent over a “secure communication link” must be encrypted. See, e.g., Ex. 1001 at
`
`claim 2 (“…wherein at least one of the video data and the audio data is encrypted
`
`over the secure communication link.”). By contrast, claims 1 and 16 specify only
`
`that the “secure communication link [be used] to communicate at least one of video
`
`data and audio data” between the two network devices. Under the doctrine of
`
`claim differentiation, the broadest reasonable construction of a “secure
`
`communication link” means that data being sent over the secure communication
`
`link may or may not be encrypted.1
`
`
`1
`In proceedings involving the ’135,’504, and ’211 patents, Patent Owner has
`
`contended a VPN requires network traffic to be encrypted, a contention that is
`
`inconsistent with the common disclosure of the ’135, ’504, ’211, and ’697 patents.
`
`See, e.g., Ex. 1001 at 1:57-59 (“Data security is usually tackled using some form of
`
`data encryption”); 2:44-54 (referring to technique that does not use encryption to
`
`protect the anonymity of the VPN); see also Ex. 1003 ¶¶ 200-208. In addition,
`
`while the ’697 patent shows use of TARP routers that do encrypt all network
`
`traffic (Ex. 1001 at 3:16-3:46), it does not state that TARP routers are required for
`
`the disclosed DNS-based VPN scheme. See, e.g., Ex. 1001 at 40:10-14 (“The VPN
`
`is preferably implemented using the IP address “hopping” features of the basic
`(Footnote continued)
`
`8
`
`Page 12 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Third, based on Patent Owner’s representations in other proceedings
`
`involving related patents, the broadest reasonable construction of a “secure
`
`communication link” would encompass direct communications between computers
`
`that are transmitted via intermediary computers and devices. For example, one
`
`district court has found, based on the disclosure of the common disclosure of the
`
`’697 and ’135 patents, that the “…routers, firewalls, and similar servers that
`
`participate in typical network communication do not impede ‘direct’
`
`communication between a client and target computer.” Ex. 1049 at 8 (FN2).
`
`The broadest reasonable construction of “secure communication link” thus
`
`encompasses “a communication link in which computers privately and directly
`
`communicate with each other on insecure paths between the computers where the
`
`
`invention described above…” (emphasis added)). The ’697 patent also does not
`
`show any encryption steps in the DNS-related VPN scheme it describes. See Ex.
`
`1001 at 39:28-42:16. Also, in February of 2000, it was understood that a VPN
`
`could be established without encryption (e.g., by using “obfuscation” techniques to
`
`ensure the security and anonymity of the network traffic over a public network).
`
`See Ex. 1003 ¶ 208; Ex. 1073 at 2.
`
`9
`
`Page 13 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`communication is both secure and anonymous, and where the data transferred may
`
`or may not be encrypted.” 2 See Ex. 1003 at ¶¶ 202-210.
`
`Secure Communications Service (Claims 1-11, 14-25, 28-30)
`3.
`The ’697 patent does not expressly define the term “secure
`
`communications service.” Instead, its manner of use of this phrase in the two
`
`places in the disclosure where it appears (excluding the abstract) indicates that a
`
`“secure communications service” is simply referring to the capacity of two
`
`computers to participate in secure communications link. For example, the ’697
`
`patent states:
`
`The method comprises: receiving, from the first network device, a
`request to look up a network address of the second network device
`based on an identifier associated with the second network device;
`determining, in response to the request, whether the second network
`device is available for a secure communications service; and
`initiating a secure communication link between the first network
`device and the second network device based on a determination that
`
`
`2
`In the grandparent of the present patent (i.e., the ’504 patent), Patent Owner
`
`unequivocally disclaimed secure communication links that did not employ
`
`encryption. See Ex. 1056 at 25. This disclaimer limits the scope of the claims,
`
`including the ’697 claims, that use this term in district court proceedings, which do
`
`not employ the broadest reasonable construction used in these proceedings.
`
`10
`
`Page 14 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`the second network device is available for the secure
`communications service; wherein the secure communications
`service uses the secure communication link to communicate at
`least one of video data and audio data between the first network
`device and the second network device.
`
`Ex. 1001 at 8:9-24; see also id. at 40:4-9 (“a specialized DNS server traps DNS
`
`requests and, if the request is from a special type of user (e.g., one for which
`
`secure communication services are defined), the server . . . automatically sets up
`
`a virtual private network between the target node and the user”).
`
`The capacity of two computers to participate in a secure communications
`
`link means that the computers must be configured to enable them to handle the
`
`communications that are required for that secure communications link. The term
`
`“service” is often used by persons of ordinary skill in the art to refer to the
`
`configuration of a computer that provides the computer with some functional
`
`capability. Ex. 1003 at ¶ 214. The ’697 patent, however, provides no description
`
`of any software or logic that confers on computers the ability to participate in a
`
`secure communications link.
`
`The broadest reasonable construction of the term “secure communications
`
`service” thus refers to the functional configuration of a computer that enables it to
`
`participate in a secure communications link with another computer.
`
`11
`
`Page 15 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`Intercepting . . . a request (Claims 1-11, 14-25, and 28-30)
`4.
`The broadest reasonable construction of “intercepting … a request” would
`
`include a proxy computer or device receiving and acting on a request sent by a first
`
`computer that was intended for another computer.3 This interpretation is consistent
`
`with the use of the term “intercepting” in the independent and dependent claims, in
`
`the specification, and in its conventional meaning.
`
`The ’697 patent does not expressly define the phrase “intercepting ... a
`
`request.” Also, as used in the claims, the term “intercepting” refers to a single
`
`event – receiving a particular type of request (i.e., a request to look up an IP
`
`address of a second network device based on a domain name of that device).
`
`Dependent claims 10 and 29 also specify that “intercepting” must necessarily
`
`encompass “receiving” a request. For example, claim 10 specifies the step of
`
`“intercepting … the request” in claim 1 consists of “receiving the request to
`
`determine whether the second network device is available for the secure
`
`communications service.” Similarly, claim 29 provides that the servers of claim 16
`
`are configured to “intercept the request by receiving the request to determine
`
`
`3 Claim 1 uses the phrase “intercepting … a request” while claim 16 uses the term
`
`“intercept … a request.” There is no substantive distinction apparent from the
`
`tense of the word “intercept.” See Ex. 1003 at ¶ 218.
`
`12
`
`Page 16 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`whether the second network device is available for the secure communications
`
`service.”
`
`The specification uses the term “intercepting” in a consistent manner. For
`
`example, the specification describes a process where a proxy server will
`
`“intercept” a request instead of a DNS server, and then act on the request. See,
`
`e.g., Ex. 1001 at 40:31-33 (“According to one embodiment, DNS proxy 2610
`
`intercepts all DNS lookup functions from client 2605 and determines whether
`
`access to a secure site has been requested.” (emphasis added)). The specification
`
`also shows the network configuration will send all DNS requests to the DNS proxy
`
`server – it is pre-configured to route the traffic to a known destination (i.e., the
`
`DNS proxy server) instead of a DNS server, which ordinarily would receive and
`
`resolve the domain name in the request. Id. This use of “intercept” in the
`
`specification as meaning receipt of a message by a proxy server instead of the
`
`intended destination is consistent with the ordinary meaning of the term “intercept”
`
`– which is to receive a message intended for another. See Ex. 1079 at 3 (“…to
`
`obtain covertly (a message, etc. intended for another)…”)
`
`The prosecution history of the ’697 patent is relevant to what the claims in
`
`their broadest reasonable interpretation encompass. Claims 1 and 16 originally
`
`recited “receiving … a request to look up a network address.” These claims were
`
`rejected as being obvious over Wesinger (Ex. 1008). Rather than arguing the
`
`13
`
`Page 17 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`claims were not obvious, Patent Owner amended claims 1 and 16 to: (i) recite
`
`“intercepting … a request” instead of “receiving … a request”; and (ii) changing
`
`“network address” to “Internet Protocol (IP) address.” Patent Owner also added
`
`new claims 10 and 29, which depend from claims 1 and 16, respectively.
`
`Following the amendments, the Examiner found the claims allowable, explaining
`
`in the Notice of Allowance that the prior art “may not clearly disclose the feature
`
`of ‘intercepting a request to look up an IP address based on a domain name of a
`
`secure web site (i.e., the second network device) and determining whether or not to
`
`establish a secure connection.’” Ex. 1002 (FH) at 1034 (emphasis in original).
`
`The file history demonstrates that the Examiner failed to appreciate the
`
`impact of Patent Owner’s newly added dependent claims 10 and 29; namely, that
`
`they caused the broadest reasonable interpretation of independent claims 1 and 16
`
`to necessarily encompass “receiving” a request. 4 This is notable because the
`
`claims employing the “receiving … the request” language had previously been
`
`found unpatentable over Wesinger by the Examiner, and that the Patent Owner
`
`
`4
`The Examiner also appears to have used the incorrect legal standard (i.e.,
`
`anticipation) to assess obviousness when he found the claims patentable (i.e.,
`
`because the prior art “may not clearly disclose the feature of ‘intercepting a request
`
`…’”). Ex. 1002 (FH) at 1034.
`
`14
`
`Page 18 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`acquiesced to that finding by amending the claims, rather than arguing that the
`
`“receiving” claims were not obvious. Given that the claims in their broadest
`
`reasonable construction must necessarily encompass “receiving … a request”
`
`pursuant to claims 10 and 29, they are clearly unpatentable over Wesinger, and
`
`Patent Owner cannot now dispute otherwise, given its acquiescence to this finding
`
`of unpatentability by the Examiner.5
`
`5. Modulation (Claims 6-7 and 20-21)
`The ’697 patent does not define the term “modulation.” A person of
`
`ordinary skill would understand that the term “modulation” refers to the process of
`
`encoding data for transmission over a physical medium by varying or
`
`“modulating” a carrier signal. Ex. 1003 at ¶¶ 235-239. Any data transmitted via a
`
`
`5
`See, e.g., Sciele Pharma Inc. v. Lupin Ltd., 684 F.3d 1253, 1261 (Fed. Cir.
`
`2012) (Federal Circuit vacated grant of a preliminary injunction, finding a
`
`“substantial question of invalidity” was raised in part by the Examiner’s overt error
`
`in the prosecution history, and that “[o]ther than recognizing that the prosecution
`
`history was ‘puzzling,’ the district court did not discuss the prosecution history,
`
`which demonstrates that the examiner concluded that the claims with an upper
`
`Tmax limit of 7.5 were not patentable in view of Cheng and that the applicant
`
`acquiesced in that conclusion and cancelled those claims.”).
`
`15
`
`Page 19 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`modem (i.e., a “modulator-demodulator” device) would be transmitted using
`
`modulation. Ex. 1003 at ¶¶ 235-239. Similarly, any data transmitted via a cellular
`
`network would be transmitted using modulation. Ex. 1003 at ¶¶ 235-239. The
`
`broadest reasonable interpretation of “modulation” thus would encompass the
`
`process of encoding data for transmission over a physical or electromagnetic
`
`medium by varying a carrier signal.
`
`IV. Precise Reasons for Relief Requested
`A. Claims 1-11, 14-25, and 28-30 Are Anticipated by Beser
`Beser has an effective filing date of August 27, 1999, and is prior art under
`
`at least under §102(e). Ex. 1009 at 1. Petitioner submits that claims 1-4, 8-11, 14-
`
`16, 21-25, and 28-30 of the ’697 patent are unpatentable in view of Ex. 1009
`
`(Beser), considered alone or in conjunction Ex. 1010 (RFC 2401) and knowledge
`
`in the field of the ’697 patent, for the reasons set forth below, as supported by
`
`¶¶ 255-454 of Ex. 1003.
`
`Beser Anticipates Claims 1 and 16
`
`1.
`Claims 1 and 16 are defined using the same operative limitations. Claim 1 is
`
`cast in the form of a method of connecting devices, while claim 16 is cast in the
`
`form of a server system configured to execute the steps of the method defined in
`
`claim 1. In this analysis, the steps of the method of claim 1 are first addressed, and
`
`then the corresponding system elements of claim 16 are addressed.
`
`Beser (Ex. 1009) describes systems that establish an IP tunneling association
`
`16
`
`Page 20 of 72
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,504,697
`
`between two end devices with the aid of a first and second network device and a
`
`trusted-third-party network device on a public network. Ex. 1003 at ¶¶ 255-264,
`
`265-269, 292-293. Beser explains the trusted-third-party network device can be a
`
`domain name server. Ex. 1003 at ¶¶ 262-264, 287-291, 306. Beser explains that
`
`the first and second network devices may be edge routers, “gateway” computers,
`
`cable modems, or other network devices. Ex. 1003 at ¶¶ 261, 280-286. Beser
`
`shows the trusted-third-party network device can be a domain name server, and can
`
`be one device or a distributed server system. Ex. 1003 at ¶ 290.
`
`To establish an IP tunnel, the originating end device sends a request
`
`containing a unique identifier specifying a destination (i.e., a terminating end
`
`device). Ex. 1003 at ¶¶ 295-300. The unique identifier can be a domain name.
`
`Ex. 1003 at ¶¶ 263, 300, 301. The first network device receives the request,
`
`evaluates it, and then sends it to the trusted-third-party network device, if
`
`appropriate. Ex. 1003 at ¶¶ 295-296, 309-313. The trusted-third-party network
`
`device evaluates the request, and if it corresponds to a terminating device,
`
`facilitates a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket