throbber

`
`Paper No. 1
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`APPLE INC.
`Petitioner,
`
`v.
`
`VIRNETX, INC. AND SCIENCE APPLICATION INTERNATIONAL
`CORPORATION,
`Patent Owner
`
`Patent No. 8,051,181
`Issued: November 1, 2011
`Filed: February 27, 2007
`Inventors: Victor Larson, et al.
`Title: METHOD FOR ESTABLISHING SECURE COMMUNICATION LINK
`BETWEEN COMPUTERS OF VIRTUAL PRIVATE NETWORK
`____________________
`
`Inter Partes Review No. IPR2014-00486
`__________________________________________________________________
`
`PETITION FOR INTER PARTES REVIEW
`
`
`
`
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION FOR
`INTER PARTES REVIEW ............................................................................ 1
`A.
`Certification the ’181 Patent May Be Contested by Petitioner ............ 1
`B.
`Fee for Inter Partes Review (§ 42.15(a)) .............................................. 1
`C. Mandatory Notices (37 CFR § 42.8(b)) ............................................... 1
`1.
`Real Party in Interest (§ 42.8(b)(1)) ........................................... 1
`2.
`Other Proceedings (§ 42.8(b)(2)) ............................................... 2
`3.
`Designation of Lead and Backup Counsel ................................. 2
`4.
`Service Information (§ 42.8(b)(4)) ............................................ 2
`Proof of Service (§§ 42.6(e) and 42.105(a)) ........................................ 3
`D.
`IDENTIFICATION OF CLAIMS BEING CHALLENGED
`(§ 42.104(B)) .................................................................................................. 3
`III. RELEVANT INFORMATION CONCERNING THE CONTESTED
`PATENT ......................................................................................................... 3
`A.
`Effective Filing Date and Prosecution History of the ’181 patent ....... 3
`B.
`Relationship to U.S. Patent Nos. 7,987,274 and 7,188,180 ................. 5
`C.
`Person of Ordinary Skill in the Art ...................................................... 6
`D.
`Construction of Terms Used in the Claims .......................................... 7
`1.
`Secure Name .............................................................................. 7
`2.
`Secure Domain Name ................................................................ 9
`3.
`Unsecured Name ...................................................................... 10
`4.
`Secure Name Service ............................................................... 11
`5.
`Secure Communication Link ................................................... 12
`IV. PRECISE REASONS FOR RELIEF REQUESTED ................................... 13
`A.
`Claims 1-29 Are Anticipated by Beser .............................................. 13
`1.
`Beser Anticipates Claims 1 and 29 .......................................... 14
`2.
`Beser Anticipates Claims 2 and 28 .......................................... 18
`3.
`Beser Anticipates Claims 24 and 26 ........................................ 22
`4.
`Beser Anticipates Claim 3 ....................................................... 26
`
`i
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`5.
`Beser Anticipates Claim 4 ....................................................... 27
`Beser Anticipates Claims 5-6 ................................................... 27
`6.
`Beser Anticipates Claim 7 ....................................................... 28
`7.
`Beser Anticipates Claim 8 ....................................................... 28
`8.
`Beser Anticipates Claim 9 ....................................................... 29
`9.
`10. Beser Anticipates Claims 10-11............................................... 29
`11. Beser Anticipates Claim 12 ..................................................... 30
`12. Beser Anticipates Claim 13 ..................................................... 31
`13. Beser Anticipates Claims 14-17............................................... 31
`14. Beser Anticipates Claim 18 ..................................................... 33
`15. Beser Anticipates Claims 19-20............................................... 33
`16. Beser Anticipates Claim 21 ..................................................... 33
`17. Beser Anticipates Claim 22 ..................................................... 34
`18. Beser Anticipates Claim 23 ..................................................... 35
`19. Beser Anticipates Claim 25 ..................................................... 35
`20. Beser Anticipates Claim 27 ..................................................... 36
`Beser In View of RFC 2401 Renders Obvious Claims 1-29 ............. 36
`1.
`Claims 1, 2, 24, 26, 28, and 29 Would Have Been
`Obvious .................................................................................... 37
`Claims 3-23, 25, and 27 Would Have Been Obvious .............. 41
`2.
`Beser In View of Kiuchi Renders Obvious Claims 3-4 and 23 ......... 41
`Beser In View of RFC 2543 Renders Obvious Claims 22, 24-27 ..... 42
`Claims 1-6, 8-9, 13-19, and 21-29 Are Anticipated by Kiuchi .......... 43
`1.
`Claims 1 and 29........................................................................ 44
`2.
`Claims 2 and 28........................................................................ 48
`3.
`Claims 24 and 26...................................................................... 51
`4.
`Claims 3-4 and 23 .................................................................... 54
`5.
`Claims 5 and 6 .......................................................................... 54
`6.
`Claim 8 ..................................................................................... 55
`
`B.
`
`C.
`D.
`E.
`
`ii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`7.
`Claim 9 ..................................................................................... 55
`Claim 13 ................................................................................... 55
`8.
`Claims 14-17 ............................................................................ 56
`9.
`10. Claim 18 ................................................................................... 57
`11. Claim 19 ................................................................................... 57
`12. Claim 21 ................................................................................... 57
`13. Claim 22 ................................................................................... 58
`14. Claim 25 ................................................................................... 58
`15. Claim 27 ................................................................................... 59
`CONCLUSION ............................................................................................. 59
`
`V.
`
`Attachment A. Proof of Service of the Petition
`Attachment B. List of Evidence and Exhibits Relied Upon in Petition
`
`
`
`
`iii
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`I.
`
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION FOR
`INTER PARTES REVIEW
`A. Certification the ’181 Patent May Be Contested by Petitioner
`Petitioner certifies that U.S. Patent No. 8,051,181 (the ’181 patent) (Ex.
`
`1025) is available for inter partes review. Neither Petitioner, nor any party in
`
`privity with Petitioner, has filed a civil action challenging the validity of any claim
`
`of the ’181 patent. The ’181 patent also has not been the subject of a prior inter
`
`partes review by Petitioner or a privy of Petitioner.
`
`The ’181 patent was asserted against Petitioner in proceedings alleging
`
`infringement as explained in § C.2, below. This petition is nonetheless proper as it
`
`is accompanied by a motion for joinder to (i) IPR2014-00483 and -00484 filed by
`
`Apple, and (ii) IPR2014-00403 and -00404 filed by Microsoft. The one-year
`
`period specified in § 315(b) does not apply to a petition that is accompanied by a
`
`request for joinder under 35 U.S.C. § 315(c). For the reasons in § III.B below and
`
`in the accompanying motion for joinder, proceedings based on the petitions should
`
`be joined to enable review of these admittedly patentably indistinct patent claims.
`
`Fee for Inter Partes Review (§ 42.15(a))
`
`B.
`The Director is authorized to charge the fee specified by 37 CFR § 42.15(a)
`
`to Deposit Account No. 50-1597.
`
`C. Mandatory Notices (37 CFR § 42.8(b))
`Real Party in Interest (§ 42.8(b)(1))
`1.
`
`1
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`The real party of interest of this petition pursuant to § 42.8(b)(1) is Apple
`
`Inc. (“Apple”) located at One Infinite Loop, Cupertino, CA 95014.
`
`2. Other Proceedings (§ 42.8(b)(2))
`On November 1, 2011, Petitioner was served with a complaint for
`
`infringement of the ’181 patent, which resulted in civil action no. 11-cv-00563-
`
`LED (E.D. TX). This action was stayed after Patent Owner, on November 4, 2011,
`
`filed a complaint in the International Trade Commission, which resulted in
`
`investigation no. 0337-TA-818. That investigation was withdrawn on July 20,
`
`2012. On September 28, 2012, Patent Owner filed another complaint in the ITC,
`
`resulting in investigation no. 337-TA-858, which also was withdrawn (on May 15,
`
`2013). In June 2013, the stay in the Texas litigation was lifted and the action
`
`consolidated with civil action no. 6:12-cv-00855-LED. Patent Owner did allege
`
`infringement of the ’181 patent in the latter action.
`
`The ’181 patent also is the subject of inter partes reexamination Control No.
`
`95/001,949 where all claims stand finally rejected. The Office issued a Right of
`
`Appeal Notice in the ’949 proceeding on August 16, 2013.
`
`Designation of Lead and Backup Counsel
`
`3.
`Lead Counsel
`Jeffrey P. Kushan (Reg. No. 43,401)
`jkushan@sidley.com
`(202) 736-8914
`4.
`
`Backup Lead Counsel
`Joseph A. Micallef (Reg. No. 39,772)
`jmicallef@sidley.com
`(202) 736-8492
`Service Information (§ 42.8(b)(4))
`
`2
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`Service on Petitioner may be made by e-mail, or by mail or hand delivery to:
`
`Sidley Austin LLP, 1501 K Street, N.W., Washington, D.C. 20005. The fax
`
`number for lead and backup counsel is (202) 736-8711.
`
`Proof of Service (§§ 42.6(e) and 42.105(a))
`D.
`Proof of service of this petition is provided in Attachment A.
`
`II.
`
`Identification of Claims Being Challenged (§ 42.104(b))
`
`Claims 1-29 of the ’181 patent are unpatentable as being anticipated under
`
`35 U.S.C. § 102(a), (b) & (e), and/or for being obvious over the prior art under 35
`
`U.S.C. § 103. Specifically:
`
`(i)
`
`Claims 1-29 are anticipated under § 102(e) by U.S. Patent No.
`6,496,867 to Beser (“Beser”) (Ex. 1031);
`
`(ii) Claims 1-29 are obvious under § 103 based on Beser (Ex. 1031) in
`view of RFC 2401 (Ex. 1032);
`
`(iii) Claims 3-4 and 23 are obvious under § 103 based on Beser (Ex. 1031)
`in view of Kiuchi (Ex. 1004);
`
`(iv) Claims 22 and 24-27 are obvious under § 103 based on Beser (Ex.
`1031) in view of RFC 2543 (Ex. 1032);
`
`(v) Claims 1-6, 8-9, 13-19 and 21-29 are anticipated under § 102(b) by
`Kiuchi (Ex. 1004).
`
`Petitioner’s proposed construction of the claims, the evidence relied upon, and the
`
`precise reasons why the claims are unpatentable are provided in § IV, below. The
`
`evidence relied upon in support of this petition is listed in Attachment B.
`
`III. Relevant Information Concerning the Contested Patent
`A. Effective Filing Date and Prosecution History of the ’181 patent
`
`3
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`The ’181 patent issued from U.S. Application No. 11/679,416, filed
`
`February 27, 2007, which is a continuation of U.S. Application No. 10/702,486
`
`(issued as U.S. Patent No. 7,188,180) (the ’180 patent). Ex. 1025 at 81. The ’486
`
`application is a division of U.S. Application No. 09/558,209, filed April 26, 2000,
`
`which is a continuation-in-part of U.S. Application No. 09/504,783, filed on
`
`February 15, 2000 (issued as U.S. Patent No. 6,502,135) (the ’135 patent). The
`
`’783 application is a continuation-in-part of U.S. Application No. 09/429,643, filed
`
`on October 29, 1999, and claims priority to Provisional Application Nos.
`
`60/106,261, filed October 30, 1998 and 60/137,704, filed June 7, 1998.
`
`Claims 1, 2, 24, 26, 28, and 29 are independent claims. Each of these claims
`
`relies on information found only in the disclosures of applications filed on or after
`
`April 26, 2000, the date the ’209 application was filed. For example, each
`
`independent claim recites a “secure name” or a “secure name service.” There is
`
`no mention of the terms “secure name” and “secure name service” in any
`
`application filed prior to the ’209 application, much less a sufficient written
`
`description of these terms as they are used in the claims of the ’181 patent. In fact,
`
`even the ’209 and subsequently filed applications themselves provide no written
`
`description support for these claim elements and concepts. Instead, they describe a
`
`4
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`“secure domain name service.”0F1 Accordingly, the effective filing date for
`
`claims 1-29 of the ’181 patent cannot be earlier than the filing date of the’209
`
`application, April 26, 2000. This also is consistent with Patent Owner’s position
`
`during the inter partes reexamination of the ’180 patent, where it acknowledged
`
`the priority date of the ’180 patent was not earlier than April 26, 2000. Ex. 1023 at
`
`232.
`
`B. Relationship to U.S. Patent Nos. 7,987,274 and 7,188,180
`Patent Owner has admitted the claims of the ’181 patent are not patentably
`
`distinct from claims in the ’180 patent (parent of the ’181 patent) and U.S. Patent
`
`No. 7,987,274 (the ’274 patent) (child of the ’181 patent). During prosecution of
`
`the ’181 patent, the Office imposed obviousness-type double patenting rejections
`
`of the pending claims over (i) claim 1 of co-pending application 11/839,987, which
`
`issued as the ’274 patent, and (ii) claim 1 of the ’180 patent. Ex. 1026 at 815.
`
`Patent Owner did not dispute these findings, but instead filed terminal disclaimers
`
`to obviate the rejections. Ex. 1026 at 795-797, 815, 1045 (10/8 & 11/4/2010).
`
`Similarly, the Office rejected claims that issued in the ’274 patent for obviousness-
`
`
`1
`During prosecution of the ’181 patent, Patent Owners contended a “secure
`
`name” and “Secure name service” was a subset of a “secure name service.” Ex.
`
`1029 at ¶¶ 224-226; see Ex. 1026 at 813 (Remarks Oct. 8, 2010).
`
`5
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`type double patenting over claims in each of the ’180 and ’181 patents. Ex. 1028
`
`at 183-186, 250, 380-381. Again, Patent Owner did not dispute these findings, but
`
`instead filed terminal disclaimers over the ’180 and ’181 patents to obviate the
`
`double patenting rejections. See Ex. 1028 at 2741 and 296; see id. at 632 and 282.
`
`By acquiescing to, rather than contesting, the findings of obviousness-type double
`
`patenting, Patent Owner has conceded the ’180, ’181 and ’274 claims are not
`
`patentably distinct. A final written decision finding the subject matter of claims in
`
`either of the ’274 or the ’180 patents unpatentable would estop Patent Owner from
`
`contending the claims in the ’181 are patentable. See 37 C.F.R. 42.73(d)(3).
`
`Among other things, such a finding would preclude Patent Owner from asserting
`
`the ’181 patent claims are patentable in the currently pending inter partes
`
`reexamination proceeding (i.e., Reexamination Control No. 95/001,949).
`
`Person of Ordinary Skill in the Art
`
`C.
`A person of ordinary skill in the art in the field of the ’181 patent would
`
`have been someone with a good working knowledge of networking protocols,
`
`including those employing security techniques, as well as computer systems that
`
`support these protocols and techniques. The person also would be very familiar
`
`with Internet standards related to communications and security, and with a variety
`
`of client-server systems and technologies. The person would have gained this
`
`6
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`knowledge either through education and training, several years of practical
`
`working experience, or through a combination of these. Ex. 1029 ¶ 59.
`
`D. Construction of Terms Used in the Claims
`In this proceeding, claims must be given their broadest reasonable
`
`interpretation in light of the specification. 37 CFR § 42.100(b). In reaching its
`
`conclusions about the meaning of the claims, the Board should consider Patent
`
`Owner’s contentions in concurrent litigation involving the ’181 and closely related
`
`patents including the ’697, ’135, ’151, ’504 and ’211 patents. Also, if Patent
`
`Owner contends terms in the claims have a special meaning, those contentions
`
`should be disregarded unless Patent Owner also amends the claims compliant with
`
`35 U.S.C. § 112 to make them expressly correspond to those contentions. See 77
`
`Fed. Reg. 48764 at II.B.6 (August 14, 2012); cf. In re Youman, 679 F.3d 1335,
`
`1343 (Fed. Cir. 2012). In the constructions below, Petitioner identifies
`
`representative subject matter within the scope of the claims read with their
`
`broadest reasonable interpretation. Petitioner expressly reserves its right to
`
`advance different constructions in district court litigation, which employs a
`
`different claim construction standard.
`
`Secure Name
`1.
`The ’181 patent disclosure does not use, much less define, the term “secure
`
`name.” In the claims, a “secure name” is said to be associated with a network
`
`7
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`address of a first or second device. See, e.g., claim 2 (“…the message requesting a
`
`network address associated with the secure name of the second device”). The
`
`claims also differentiate a “secure name” from an “unsecured name.” See, e.g.,
`
`claims 21, 26. The portrayal of a “secure name” in this manner is consistent with
`
`arguments Patent Owner made during prosecution. See, e.g., Ex. 1026 (’181 FH)
`
`at 813 (“… Applicant submits that a “secure name” is a name associated with a
`
`network address associated of a first device. The name can be registered such that
`
`a second device can obtain the network address associated with the first device
`
`from a secure name registry and send a message to the first device. The first
`
`device can then send a secure message to the second device.”).
`
`Patent Owner also contended during prosecution that a “secure name” is
`
`broader in its meaning than a “secure domain name.” As it stated:
`
`The claimed “secure name” includes, but is not limited to, a secure
`domain name. For example, a “secure name” can be a secure non-
`standard domain name, such as a secure non-standard top-level
`domain name (e.g., .scom) or a telephone number.
`
`Ex. 1026 (181 FH) at 813; Ex. 1029 at ¶¶ 212-214.
`
`Patent Owner discussed the meaning of the term “secure domain name” in
`
`two reexaminations of the ’180 patent. In Control No. 95/001,270, Patent Owner
`
`argued that the claim terms “secure domain name” and “secure domain name
`
`service” had meanings different than the conventional meaning of the terms
`
`8
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`“domain name” and “domain name service.” Specifically, Patent Owner
`
`contended “a secure domain name is a [sic] ‘a non-standard domain name.’” Ex.
`
`1023 at 229-31. Patent Owner also explained that a “secure domain name” was
`
`different from a standard domain name because a secure domain name cannot be
`
`resolved using a conventional domain name server. See Ex. 1029 at ¶¶ 210-235.
`
`The Office adopted Patent Owner’s contentions in the ACP, stating:
`
`The ’180 patent distinguishes the claimed secure domain names and
`secure domain name service from a conventional domain name
`service by explaining that a secure domain name is a non-standard
`domain name and that querying a convention[al] domain name server
`using a secure domain name will result in a return message indicating
`that the URL is unknown (’180 patent at 51:25-35) and that a secure
`domain name service can resolve addresses for a secure domain name
`whereas a conventional domain name service cannot resolve addresses
`for a secure domain name (’180 patent at 51:25-35). (emphasis added)
`
`Ex. 1023 (95/001,270 FH) at 129-130 (ACP (Jun. 16, 2010)).
`
`In view of these considerations, the broadest reasonable interpretation of the
`
`term “secure name” would encompass a “non-standard domain name that cannot
`
`be resolved by a conventional domain name server.” Ex. 1029 at ¶¶ 209-215.
`
`Included within this definition would be non-standard domain names such as
`
`telephone numbers or non-standard top-level domains.
`
`2.
`
`Secure Domain Name
`
`9
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`The ’181 patent does not define the term “secure domain name.” As
`
`explained in § 1 above, Patent Owner represented during prosecution of the ‘181
`
`patent that a “secure name” is not a conventional domain name and cannot be
`
`resolved using a conventional domain name server. The term “secure domain
`
`name,” because it uses an additional term, is arguably narrower than a “secure
`
`name” by the use of a “domain name” rather than simply a “name.” A “domain
`
`name” would be understood by a person of ordinary skill to be a hierarchical
`
`sequence of words in decreasing order of specificity that corresponds to a
`
`numerical IP address. Ex. 1029 at ¶¶ 85-87; see generally ¶¶ 82-90. Patent Owner
`
`has contended, however, the term “domain name” is simply “a name corresponding
`
`to an IP address” (see, e.g., Ex. 1066 at 14-15). Considering these points, the term
`
`“secure domain name” in its broadest reasonable interpretation would encompass
`
`a “non-standard domain name that corresponds to a network address and cannot
`
`be resolved by a conventional domain name server.” See Ex. 1029 at ¶¶ 209-242.
`
`Unsecured Name
`3.
`The ’181 patent does not expressly define the term “unsecured name.” In
`
`contrast to a “secure name”, a person of ordinary skill would understand that an
`
`“unsecured name” would include a conventional domain name that can be resolved
`
`by a conventional domain name server. The use of “name” rather than “domain
`
`name,” however, indicates the term in its broadest reasonable interpretation is
`
`10
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`broader than simply a “domain name,” and would include any name that identifies
`
`a computer. Ex. 1029 at ¶¶ 247-250. This interpretation is consistent with Patent
`
`Owner’s contentions in litigation, where it asserted an “unsecured name” is “a
`
`name that can be resolved by a conventional name service.” Ex. 1071 at 2. Thus,
`
`the term “unsecured name” in its broadest reasonable interpretation at least
`
`encompasses “a name that can be resolved by a conventional name service.”
`
`Secure Name Service
`4.
`There is no mention of the term “secure name service” in the ’181 patent
`
`disclosure. Instead, this phrase appears only in the claims, and was first added by
`
`an amendment to the claims during examination. Ex. 1026 at 806 (Claims Oct. 8,
`
`2010). In connection with that amendment, Patent Owner argued a “secure name
`
`service is a service for resolving secure names into network addresses.” Ex. 1026
`
`at 812 (Remarks Oct. 8, 2010) (emphasis in original). Based on Patent Owner’s
`
`contentions, a “secure name service” in its broadest reasonable interpretation
`
`would include any type of name service that can act on secure names (e.g., by
`
`providing the network address corresponding to the secure name), including a
`
`“secure domain name service” specified in the ’180 patent claims. Ex. 1029 at
`
`¶¶ 224-226, 233-234. The broadest reasonable interpretation of a “secure name
`
`service” thus would include “a service that can resolve network addresses for a
`
`11
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`secure name for which a conventional name service cannot resolve addresses.”
`
`Ex. 1029 at ¶ 235; see id. at ¶¶ 216-234.
`
`Secure Communication Link
`
`5.
`The ’181 patent explains a “secure communication link” is “a virtual private
`
`communication link over the computer network.” Ex. 1025 at 6:57-59. A “secure
`
`communication link” therefore encompasses a VPN. Ex. 1029 at ¶¶ 252-256. In
`
`its broadest reasonable interpretation, a “secure communication link” (like a VPN)
`
`enables computers to privately and directly communicate with each other over a
`
`public network. See, e.g., Ex. 1025 at 39:4-13. A person of ordinary skill would
`
`have understood in April of 2000 that any technique that protects the anonymity of
`
`the computers involved in the communications could be used to establish a VPN.
`
`Such a person would have understood that a VPN could be established without
`
`encrypting the network traffic (e.g., by using “obfuscation” techniques to ensure
`
`the security and anonymity of the network traffic over a public network). See Ex.
`
`1029 ¶¶ 258-260; id. at ¶¶ 124-126, 137-140; Ex. 1043 at 2; Ex. 1044 at 2-4. This
`
`is consistent with ’181 patent disclosure. See, e.g., Ex. 1025 at 1:50-51 (“Data
`
`security is usually tackled using some form of data encryption”); 2:37-47 (referring
`
`to technique that does not use encryption to protect the anonymity of the VPN); see
`
`also Ex. 1029 ¶¶ 258-260. The ’181 patent also shows use of TARP routers that
`
`do encrypt all network traffic (Ex. 1025 at 3:6-3:36), but does not state that TARP
`
`12
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`routers are required for the disclosed DNS-based VPN scheme. See, e.g., Ex. 1025
`
`at 39:32-36 (“The VPN is preferably implemented using the IP address “hopping”
`
`features of the basic invention described above…” (emphasis added)). The ’181
`
`patent also does not show any encryption steps in the DNS-related VPN schemes it
`
`describes. See Ex. 1025 at 38:51-41:40.
`
`Patent Owner also has contended in other proceedings involving related
`
`patents that a “secure communication link” (e.g., a VPN) encompasses direct
`
`communications between computers transmitted via intermediary computers and
`
`devices. One district court has found, for example, that the common disclosure in
`
`the ’181 and ’135 patents suggests that the “…routers, firewalls, and similar
`
`servers that participate in typical network communication do not impede ‘direct’
`
`communication between a client and target computer.” Ex. 1018 at 8 (FN2).
`
`In view of these considerations, the broadest reasonable interpretation of
`
`“secure communication link” would encompass “a communication link in which
`
`computers privately and directly communicate with each other on insecure paths
`
`between the computers where the communication is both secure and anonymous,
`
`and where the data transferred may or may not be encrypted.” See Ex. 1029 at
`
`¶¶ 251-260.
`
`IV. Precise Reasons for Relief Requested
`A. Claims 1-29 Are Anticipated by Beser
`
`13
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`Beser has an effective filing date of August 27, 1999, and is prior art under
`
`at least under §102(e). Ex. 1031 at 1. Petitioner submits that claims 1-29 of the
`
`’181 patent are unpatentable in view of Ex. 1031 (Beser), considered alone or in
`
`conjunction Ex. 1032 (RFC 2401) and knowledge in the field of the ’181 patent,
`
`for the reasons set forth below, as supported by ¶¶ 277-371 of Ex. 1029.
`
`Beser Anticipates Claims 1 and 29
`
`1.
`Beser (Ex. 1031) describes systems that establish an IP tunneling association
`
`between two end devices with the aid of a first and second network device and a
`
`trusted-third-party network device on a public network. Ex. 1029 at ¶¶ 277-286.
`
`Beser shows that the originating end device is associated with the first network
`
`device and the terminating end device is associated with the second network
`
`device. Ex. 1029 at ¶¶ 282-283, 285, 302-305; see id. at ¶¶ 329-339. Beser
`
`explains that the first and second network devices may be edge routers, “gateway”
`
`computers, or other network devices. Ex. 1029 at ¶¶ 282-283, 286, 302-305, 316-
`
`317, 337-339. Beser explains the trusted-third-party network device can be a
`
`domain name server, and it also can include a subscriber phone number directory
`
`service. Ex. 1029 at ¶¶ 284-287, 305-309; see id. at ¶¶ 282, 324-331.
`
`Beser explains the originating and terminating devices can be VOIP devices
`
`such as phones or personal computers. Ex. 1029 at ¶¶ 279, 282-283, 294-299; see
`
`id. at ¶¶ 286-287. Beser shows each end device is associated with multiple
`
`14
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`identifiers, including a unique identifier that is registered with the trusted-third-
`
`party network device and is used to initiate secure IP tunnels. Ex. 1029 at ¶¶ 318-
`
`323. Beser describes a configuration where each end device is associated with a
`
`phone number, a domain name, and a public IP address. Ex. 1029 at ¶¶ 290-291,
`
`322-323; see id. at ¶¶ 306, 336, 339. Beser shows that, in that configuration, the
`
`phone number can be the unique identifier registered with the trusted-third-party
`
`network device, (Ex. 1029 at ¶¶ 306-309, 319-323), while the domain name is a
`
`standard domain name registered with a standard name server. Ex. 1029 at ¶¶ 322-
`
`323, 379-380, 551. Therefore the terminating end device has a secure name (e.g.,
`
`the phone number that is registered with the trusted-third-party network device)
`
`and an unsecured name (e.g., its domain name). See §§ III.D.1-III.D.3.
`
`The Beser systems are implemented using programmed computers and other
`
`programmable devices that have storage media containing code that configures
`
`how those devices function. Ex. 1029 at ¶ 382. Beser thus shows “A non-
`
`transitory machine-readable medium comprising instructions for a method of
`
`communicating with a first device associated with a secure name and an unsecured
`
`name” as specified in claim 1. Ex. 1029 at ¶¶ 372-383. Beser also shows “A non-
`
`transitory machine-readable medium comprising instructions for a method of
`
`communicating with a device having a secure name,” as specified in claim 29. Ex.
`
`1029 at ¶¶ 615-623.
`
`15
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`To establish an IP tunnel, the originating end device sends a request
`
`containing a unique identifier (e.g., a phone number) specifying a destination (i.e.,
`
`a terminating end device). Ex. 1029 at ¶¶ 285, 314-324. The first network device
`
`receives the request, evaluates it, and then sends it to the trusted-third-party
`
`network device, if appropriate. Ex. 1029 at ¶¶ 316-317; see id. at ¶¶ 302-305.
`
`Beser explains that after the trusted-third-party network device receives the
`
`request, it evaluates the request to determine whether it contains a unique identifier
`
`that is associated with a secure terminating device. Ex. 1029 at ¶¶ 324-331. For
`
`example, if the identifier (e.g., a phone number) is listed in the trusted-third-party
`
`network device’s directory of subscribers, the identifier corresponds to a secure
`
`destination. Ex. 1029 at ¶¶ 284-286, 305-309, 324-331. The trusted-third-party
`
`network device’s directory of subscribers associates each subscriber’s phone
`
`number to the IP addresses of that subscriber’s end device and second network
`
`device. Ex. 1029 at ¶¶ 284-287, 324-329. Thus, the IP address of the second
`
`network device is associated with the terminating end device. Ex. 1029 at ¶ 388.
`
`If the unique identifier corresponds to a secure destination, the trusted-third-
`
`party network device will automatically initiate an IP tunnel between the end
`
`devices by negotiating private IP addresses that will be used to transmit data
`
`between these end devices across a public network. Ex. 1029 at ¶¶ 278-281, 326-
`
`338. First, the trusted-third-party network device will send a message to the
`
`16
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 8,051,181
`
`second network device requesting to negotiate private IP addresses. Ex. 1029 at
`
`¶¶ 329-331. Then, the private IP address for the originating device will be
`
`transmitted from the first network devi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket