throbber
Trials@uspto.gov
`571.272.7822
`
`
`
`
`Paper 9
`Entered: October 15, 2014
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_____________
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`MICROSOFT CORPORATION,
`Petitioner,
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`____________
`
`Case IPR2014-00610
`Patent 7,490,151 B2
`____________
`
`Before MICHAEL P. TIERNEY, KARL D. EASTHOM, and STEPHEN C.
`SIU, Administrative Patent Judges.
`
`SIU, Administrative Patent Judge.
`
`
`DECISION
`Institution of Inter Partes Review
`37 C.F.R. § 42.108
`
`
`
`I.
`
`INTRODUCTION
`
`A.
`
`Background
`
`Microsoft Corporation (“Petitioner”) filed a Petition (“Pet.”) on April
`
`10, 2014 (Paper 1) requesting inter partes review of claims 1, 2, 6–8, and
`
`12–14 of U.S. Patent No. 7,490,151 B2 (iss. Feb. 10, 2009) (“the ’151
`
`Patent,” Ex. 1001) pursuant to 35 U.S.C. §§ 311–319. VirnetX Inc. (“Patent
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`Owner”) filed a Preliminary Response (“Prelim. Resp.”) on July 17, 2014.
`
`
`
`Paper 7.
`
`We have jurisdiction under 35 U.S.C. § 314, which provides that an
`
`inter partes review may not be instituted “unless . . . there is a reasonable
`
`likelihood that the petitioner would prevail with respect to at least 1 of the
`
`claims challenged in the petition.”
`
`We determine based on the record that Petitioner has demonstrated,
`
`under 35 U.S.C. § 314(a), that there is a reasonable likelihood of
`
`unpatentability with respect to all of the challenged claims, claims 1, 2, 6–8,
`
`and 12–14.
`
`Petitioner relies on the following prior art:
`
`
`Takahiro Kiuchi & Shigekoto Kaihara, C-HTTP -- The Development
`of a Secure, Closed HTTP-based Network on the Internet,
`PROCEEDINGS OF THE SYMPOSIUM ON NETWORK AND DISTRIBUTED
`SYSTEM SECURITY, IEEE 64–75 (1996) (Ex. 1018, “Kiuchi”).
`
`Aventail Corp., Aventail Connect v3.01/v2.51 Administrator’s Guide
`1–194 (1999) (Ex. 1007, “Aventail”).
`
`P. Mockapetris, Domain Names — Concepts and Facilities,
`NETWORK WORKING GROUP, REQUEST FOR COMMENTS: 1034 1–55
`(1987) (Ex. 1008, “RFC 1034”).
`
`E. Rescorla and A. Schiffman, The Secure HyperText Transfer
`Protocol, Enterprise Integration Technologies 1–99 (1996) (Ex. 1010,
`“RFC 2660”).
`
`
`Petitioner contends that the challenged claims are unpatentable under
`
`35 U.S.C. § 102 and/or § 103 based on the following specific grounds (Pet.
`
`3–4, 15–60):
`
`2
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`Reference(s)
`
`Kiuchi
`Kiuchi and any one of RFC
`2660 or RFC 1034
`Kiuchi, RFC 1034, and
`RFC 2660
`Aventail
`Aventail and RFC 2660
`
`
`
`
`Basis
`
`§ 102
`§ 103
`
`§ 103
`
`
`
`Claims challenged
`
`1, 2, 6–8, and 12–14
`1, 2, 6–8, and 12–14
`
`1, 2, 6–8, and 12–14
`
`§ 102 or § 103
`§ 103
`
`1, 2, 6–8, and 12–14
`1, 2, 6–8, and 12–14
`
`B.
`
`The Invention
`
`The ’151 Patent describes a system and method for securely
`
`communicating over the internet. Ex. 1001, 3:8. A Domain Name Server
`
`(“DNS”) provides a look-up function that returns the IP address of a
`
`requested computer or host. Id. at 36:61–63. A user sends a request to the
`
`DNS to look up the IP address associated with a name of a destination host.
`
`Id. at 37:4–7. The DNS returns the IP address to the client, which is then
`
`able to use the IP address to communicate with the host. Id. at 37:6–9.
`
`
`
`Claim 1 of the ’151 Patent is reproduced below:
`
`
`
`1. A data processing device, comprising memory
`storing a domain name server (DNS) proxy module that
`intercepts DNS requests sent by a client and, for each
`intercepted DNS request, performs the steps of:
`(i) determining whether the intercepted DNS request
`corresponds to a secure server;
`(ii) when
`the
`intercepted DNS request does not
`correspond to a secure server, forwarding the DNS request to a
`DNS function that returns an IP address of a nonsecure
`computer, and
`(ii) when the intercepted DNS request corresponds to a
`secure server, automatically initiating an encrypted channel
`between the client and the secure server.
`
`3
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`
`
`
`
`
`
`We note that the ’151 Patent is presently the subject of co-pending
`
`lawsuits, as follows:
`
`1) Civil Action No. 6:13-cv-00211-LED (E.D. Tex.), filed February
`
`26, 2013;
`
`2) Civil Action No. 6:12-cv-00855-LED (E.D. Tex.), filed November
`
`6, 2012;
`
`3) Civil Action No. 6:10-cv-00417-LED (E.D. Tex.), filed August 11,
`
`2010;
`
`4) Civil Action No. 6:11-cv-00018-LED (E.D. Tex), filed April 27,
`
`2012;
`
`5) Civil Action No. 6:13-cv-00351-LED (E.D. Tex), filed April 22,
`
`2013 (“the 2013 litigation”);
`
`6) Civil Action No. 6:10-cv-00094 (E.D. Tex), filed March 17, 2010;
`
`and Civil Action No. 6:07-cv-00080 (E.D. Tex), filed February 15,
`
`2007.
`
`See Pet. 1.
`
`The United States Court of Appeals for the Federal Circuit recently
`
`affirmed a jury’s finding that none of claims 1 and 13 of the ’151 Patent are
`
`invalid in an appeal of a judgment in a district court case. See VirnetX, Inc.
`
`v. Cisco Systems, Inc., No. 2013-1489, 2014 WL 4548722 (Fed. Cir. Sept.
`
`16, 2014).
`
`
`
`
`
`4
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`
`Claim Construction
`
`C.
`
`
`
`Consistent with the statute and the legislative history of the Leahy-
`
`Smith America Invents Act, Pub. L. 112-29, 125 Stat. 284, 329 (Sept. 16,
`
`2011) (“AIA”), the Board interprets claim terms by applying the broadest
`
`reasonable construction in the context of the specification in which the
`
`claims reside. 37 C.F.R. § 42.100(b); see Office Patent Trial Practice
`
`Guide, 77 Fed. Reg. 48,756, 48,766 (Aug. 14, 2012).
`
`Under the broadest reasonable standard, claim terms are given their
`
`ordinary and customary meaning as would be understood by one of ordinary
`
`skill in the art in the context of the entire disclosure. In re Translogic Tech.,
`
`Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). Any special definition for a
`
`claim term must be set forth in the specification with reasonable clarity,
`
`deliberateness, and precision. In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir.
`
`1994). In this regard, however, we are careful not to read a particular
`
`embodiment appearing in the written description into the claim if the claim
`
`language is broader than the embodiment. In re Van Geuns, 988 F.2d 1181,
`
`1184 (Fed. Cir. 1993).
`
`In contrast to the broadest reasonable interpretation standard
`
`employed by the Board for an unexpired patent, the Federal Circuit employs
`
`a narrower claim construction standard when reviewing the construction of a
`
`claim applied by the district court. See 37 C.F.R. § 42.100 (b) (“A claim in
`
`an unexpired patent shall be given its broadest reasonable construction in
`
`light of the specification in which it appears.”); cf. In re Rambus, Inc., 694
`
`F.3d 42, 46 (Fed. Cir. 2012) (Contrasting the Board’s review of expired
`
`patents, which is “similar to that of a district court review,” with the Board’s
`
`5
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`review of unexpired patents, which involves the broadest reasonable
`
`
`
`interpretation standard).
`
`
`
`
`
`1) DNS Request
`Claim 1 recites a DNS request. Petitioner contends that a “DNS
`
`request” is “a request for a resource corresponding to a domain name.” Pet.
`
`6. Patent Owner agrees with this construction. Prelim. Resp. 22. At this
`
`preliminary stage of the proceedings, we adopt, as the broadest reasonable
`
`construction, the parties’ construction of the term “DNS Request” to mean
`
`“a request for a resource corresponding to a domain name.”
`
`
`
`2) Automatically initiating/creating
`
`Petitioner contends that “automatically initiating” means initiating
`
`“without involvement of a user.” Pet. 7. Patent Owner agrees with
`
`Petitioner’s construction. Prelim. Resp. 24–25. Patent Owner states that the
`
`’151 Patent specification discloses embodiments in which a user “makes the
`
`initial DNS request” but “is not involved in initiating/creating the VPN . . .
`
`channel.” Id. at 24. Patent Owner, however, does not explain sufficiently
`
`how the user is “not involved” in initiating a channel if the channel is
`
`initiated in response to a user’s “DNS request.” For example, Patent Owner
`
`does not contend that the ’151 Patent specification discloses that a channel is
`
`initiated “automatically” without a “DNS request” from a user. Therefore,
`
`the ’151 Patent specification appears to disclose at least one embodiment of
`
`“automatically” initiating a channel in which a user is “involved.”
`
`6
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`
`We note that the term “automatic” has a plain and ordinary meaning
`
`
`
`of “marked by action that . . . arises as a really or apparently necessary
`
`reaction to or consequence of a given set of circumstances” or “having a
`
`self-acting or self-regulating mechanism.” WEBSTER’S THIRD NEW
`
`INTERNATIONAL DICTIONARY 148 (1971) (Ex. 3001). For the purposes of
`
`this proceeding, we construe the term “automatically” to mean “marked by
`
`action that . . . arises as a really or apparently necessary reaction to or
`
`consequence of a given set of circumstances” or “having a self-acting or
`
`self-regulating mechanism,” in accordance with the dictionary definition.
`
`
`
`3) Secure Server
`
`Claim 1 recites a DNS request that may correspond to a secure server.
`
`Petitioner contends that a “secure server” is “a server that requires
`
`authorization for access and that can communicate in an encrypted channel.”
`
`Pet. 7. Patent Owner agrees with Petitioner’s construction of this term.
`
`Prelim. Resp. 23. Neither Petitioner nor Patent Owner shows sufficiently
`
`that a “secure server” must communicate in an “encrypted channel,” as
`
`opposed to any channel that is secure by means other than encryption.
`
`Therefore, for the purposes of this proceeding, we construe the term “secure
`
`server” to mean “a server that communicates over a transmission path that
`
`restricts access to data or other information on the path.”
`
`
`
`4) Client
`
`Petitioner contends that a “client” is “a computer or program from
`
`which a data request to a server is generated.” Pet. 7. Patent Owner
`
`contends that a “client” is a “user’s computer.” Prelim. Resp. 25–28. Both
`
`7
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`constructions have merit for reasons provided by each party. At this
`
`
`
`preliminary stage, we are persuaded that the broadest reasonable
`
`interpretation of “client” encompasses a device, computer, system, or
`
`program from which a data request to a server is generated.
`
`
`
`5)
`
`Between
`
`Petitioner argues that the term “between” in the context of a channel
`
`“between” the client and the secure server, as recited in claim 1, should be
`
`construed to mean a channel that is “between the client and the secure
`
`server, regardless of whether that channel fully extends from the client to the
`
`secure server.” Pet. 8. Patent Owner argues that “[n]o construction [of the
`
`term “between” is] necessary.” Prelim. Resp. 29.
`
`Neither Petitioner nor Patent Owner indicates an explicit, specialized
`
`definition of the term “between” in the ’151 Patent specification. Given the
`
`absence of such a definition, a plain and customary meaning of the term
`
`“between” would have been understood by one of ordinary skill in the art to
`
`be “in the space that separates.”1
`
`
`
`7) Other claim terms
`
`The parties do not disagree materially about other claim terms
`
`involved in this proceeding. It is not necessary to define expressly other
`
`claim terms at this juncture of the proceeding.
`
`
`
`II. ANALYSIS
`
`
`1 See WEBSTER’S THIRD NEW INTERNATIONAL DICTIONARY 209 (1971) (Ex.
`3001).
`
`8
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`A.
`
`Cited References
`
`
`
`1) Overview of Kiuchi
`
`
`
`
`
`Kiuchi discloses a closed HTTP-based network (“C-HTTP”) for a
`
`closed group of institutions, in which each member is protected by its own
`
`firewall. Ex. 1018, 64, cols. 1–2. Communication is made possible with a
`
`client-side proxy (for one institution), a server-side proxy (for another
`
`institution), and a C-HTTP name server that provides both client-side and
`
`server-side proxies with each peer’s public key and Nonce values for both
`
`request and response. Id. at 64–65.
`
`The client-side proxy asks the C-HTTP name server whether it can
`
`communicate with the host specified in a given URL. If the connection is
`
`permitted, the C-HTTP name server sends the IP address and public key of
`
`the server-side proxy and both request and response Nonce values, which are
`
`encrypted and certified using asymmetric key encryption and digital
`
`signature technology. Id. at 65, col. 2.
`
`The client-side proxy then sends an encrypted request (including the
`
`client-side proxy’s IP address, hostname, request Nonce value, and
`
`symmetric data exchange key for request encryption) to the server-side
`
`proxy, which then asks the C-HTTP name server if the query from the
`
`client-side proxy is legitimate. Id. at 65, col. 2. If the request is confirmed
`
`to be legitimate and access is permitted, the C-HTTP name server sends the
`
`IP address and public key of the client-side proxy and both request and
`
`response Nonce values to the server-side proxy. After receiving the client-
`
`side proxy’s IP address, hostname and public key, the server-side proxy
`
`generates and sends a connection ID to the client-side proxy. After the
`
`9
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`client-side proxy accepts the connection ID from the server-side proxy, the
`
`
`
`connection is established. Id. at 66, col. 2.
`
`
`
`2) Overview of RFC 2660
`
`RFC 2660 discloses a client and server authenticating each other and
`
`exchanging sensitive information confidentially using secure communication
`
`mechanisms between an HTTP client-server pair. Ex. 1010, 5:8–10, 13–14.
`
`
`
`3) Overview of RFC 1034
`
`RFC 1034 discloses a name server that answers standard queries in
`
`recursive mode or non-recursive mode. Ex. 1008, 21. In non-recursive
`
`mode, the server is unable to provide an answer to the request and refers to
`
`“some other server ‘closer’ to the answer.” Id. In recursive mode, the server
`
`“returns either an error or the answer, but never referrals.” Id.
`
`
`
`B.
`
`Preliminary Arguments
`
`Patent Owner asserts that the Petition is defective. See Prelim. Resp.
`
`2, 7, 11. Notwithstanding Patent Owner’s assertions, we determine, based
`
`on the record, that Petitioner establishes “sufficient grounds” within the
`
`prescribed page limits.
`
`
`
`C.
`
`Anticipation by Kiuchi
`
`Petitioner asserts that claims 1, 2, 6–8, and 12–14 are anticipated
`
`under 35 U.S.C. § 102 by Kiuchi. Pet. 18–27. In support of these asserted
`
`ground of unpatentability, Petitioner provides explanations as to how each
`
`claim limitation recited in claims 1, 2, 6–8, and 12–14 is disclosed by
`
`10
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`Kiuchi. Upon consideration of Petitioner’s analysis and supporting
`
`
`
`evidence, and taking into account Patent Owner’s Preliminary Response, we
`
`are persuaded on this record that Petitioner has demonstrated there is a
`
`reasonable likelihood that it would prevail with respect to anticipation of
`
`claims 1, 2, 6–8, and 12–14 over Kiuchi.
`
`Claim 1 recites a data processing device “storing a domain name
`
`server (DNS) proxy module that intercepts DNS requests sent by a client.”
`
`Claims 7 and 13 recite a similar feature. Petitioner explains that Kiuchi
`
`discloses a “client-side proxy” that receives a request from a user. Pet. 18–
`
`19.
`
`Claim 1 recites “determining whether the intercepted DNS request
`
`corresponds to a secure server.” Petitioner explains that Kiuchi discloses
`
`“the client-side proxy determines whether the request from the user agent
`
`corresponds to a secure server” by “asking ‘the C-HTTP name server
`
`whether it can communicate with the host specified in a given URL.’” Pet.
`
`20–21 (citing Ex. 1018, 65, § 2.3).
`
`Patent Owner argues that Kiuchi discloses that “[t]he C-HTTP name
`
`server, not the client-side proxy, . . . determines whether the hostname
`
`corresponds to an origin server behind the server-side proxy.” Prelim. Resp.
`
`5. In other words, Patent Owner argues that Kiuchi fails to disclose that the
`
`“client-side proxy” performs the step of “determining whether the
`
`intercepted DNS request corresponds to a secure server,” as recited in claim
`
`1. Petitioner and Patent Owner do not indicate an explicit definition of the
`
`term “determining” in the ’151 Patent specification. In the absence of such a
`
`definition, we adopt a plain and customary meaning of the term to mean “to
`
`come to a decision concerning as the result of investigation or reasoning” or
`
`11
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`“to cause or elicit determination of.” WEBSTER’S THIRD NEW
`
`
`
`INTERNATIONAL DICTIONARY 616 (1971) (Ex. 3001). Kiuchi discloses that
`
`the client-side proxy “asks the C-HTTP name server whether it can
`
`communicate with the host specified in a given URL.” Ex. 1018, 65. Based
`
`on the record presented, Patent Owner does not point out sufficient
`
`differences between the client-side proxy of Kiuchi “ask[ing] . . . whether it
`
`can communicate with the host” (and subsequently receiving the answer to
`
`the inquiry from the C-HTTP name server) and the client-side proxy of
`
`Kiuchi “find[ing] out” or “com[ing] to a decision about by investigation,
`
`reasoning, or calculation” or “bring[ing] about the determination of”
`
`whether it can communicate with the host (i.e., “determining” whether it can
`
`communicate with the host). In light of the record currently before us,
`
`Petitioner has persuaded us that Kiuchi discloses this limitation.
`
`Claim 1 recites “when the intercepted DNS request does not
`
`correspond to a secure server, forwarding the DNS request to a DNS
`
`function that returns an IP address of a nonsecure computer.” Claims 7 and
`
`13 recite a similar feature. Petitioner argues that Kiuchi discloses that the
`
`client-side proxy receives a “status code” that indicates “an error” when the
`
`DNS request does not correspond to a secure server and, responsive to the
`
`“status code,” “performs DNS lookup, behaving like an ordinary HTTP/1.0
`
`proxy.” Pet. 21; Ex. 1018, 65.
`
`Claim 1 recites “when the intercepted DNS request corresponds to a
`
`secure server, automatically initiating an encrypted channel between the
`
`client and the secure server.” Claims 7 and 13 recite a similar feature.
`
`Petitioner argues that Kiuchi discloses that the “client-side proxy asks the C-
`
`HTTP name server whether it can communicate with the host,” “[i]f the
`
`12
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`connection is permitted, the C-HTTP name server sends the IP address and
`
`
`
`public key of the server-side proxy,” and that “the client-side proxy uses this
`
`information to initiate a sequence of steps for a secure C-HTTP session.”
`
`Pet. 22, 25, 26; Ex. 1018, 65. As Petitioner explains, Kiuchi discloses that
`
`the “sequence of steps” for creating the channel2 is initiated automatically
`
`(i.e., “marked by action that . . . arises as a really or apparently necessary
`
`reaction to or consequence of a given set of circumstances” or “having a
`
`self-acting or self-regulating mechanism”) after determining that “the
`
`connection is permitted.” Ex. 1018, 65.
`
`Petitioner argues that Kiuchi discloses each recited limitation of
`
`claims 2, 6, 8, 12, and 14. Pet. 26–27. On the record currently before us, we
`
`are persuaded that Petitioner has shown a reasonable likelihood that claims
`
`1, 2, 6–8, and 12–14 are anticipated by Kiuchi. See Pet. 18–27.
`
`
`
`D. Obviousness over Kiuchi and RFC 2660
`
`Petitioner asserts that claims 1, 2, 6–8, and 12–14 are obvious under
`
`35 U.S.C. § 103(a) by Kiuchi and RFC 2660. Pet. 27–31. In support of this
`
`asserted ground of unpatentability, Petitioner provides explanations as to
`
`how each claim limitation recited in claims 1, 2, 6–8, and 12–14 is disclosed
`
`or suggested by Kiuchi and RFC 2660 and, based on the current record,
`
`articulates sufficient reasoning with a rational underpinning to justify
`
`support for the conclusion of obviousness. Id. Upon consideration of
`
`Petitioner’s analysis and supporting evidence, and taking into account Patent
`
`Owner’s Preliminary Response, we are persuaded on this record that
`
`
`2 E.g., “Request for connection to the server-side proxy,” “Lookup of client-
`side proxy information,” “Connection establishment.” Ex. 1018, 65–66.
`
`13
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`Petitioner has demonstrated there is a reasonable likelihood that it would
`
`
`
`prevail with respect to obviousness of claims 1, 2, 6–8, and 12–14 over
`
`Kiuchi and RFC 2660.
`
`Claim 1 recites an encrypted channel between the client and the
`
`secure server. Claims 7 and 13 recite a similar feature. Kiuchi discloses
`
`“[c]onnection establishment” in which a “[server-side] proxy obtains the
`
`client-side proxy’s IP address . . . [and] authenticates the client-side proxy”
`
`and that “[w]hen the client-side proxy accepts and checks them, the
`
`connection is established.” Ex. 1018, 66. Based on the record, Kiuchi
`
`appears to disclose a connection that is “between” (i.e., “in the space, that
`
`separates”) the client and the secure server, as recited in claim 1.
`
`As Petitioner points out, RFC 2660, like Kiuchi, also discloses a
`
`connection (i.e., “S-HTTP”) that “provides secure communication
`
`mechanisms between an HTTP client-server pair.” Pet. 29 (citing Ex. 1010,
`
`§ 1). Hence, RFC 2660 further demonstrates that it would have been
`
`obvious to one of ordinary skill in the art to have created a secure connection
`
`for a client and server in which the secure connection is “between” (e.g., in
`
`the space that separates) the client and server, as both Kiuchi and RFC 2660
`
`disclose or suggest. Id.
`
`Thus, based on the record before us, Petitioner has demonstrated a
`
`reasonable likelihood of obviousness of claims 1, 2, 6–8, and 12–14 over the
`
`combination of Kiuchi and RFC 2660.
`
`
`
`
`
`E. Obviousness over Kiuchi and RFC 1034 (and RFC 2660)
`
`14
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`
`Petitioner contends that “New Bay Capital asserted that a DNS
`
`
`
`request is a ‘communication that contains a domain name and requests an IP
`
`address for the domain name’” and that “if the Board were to adopt such a
`
`construction, a person of ordinary skill in the art . . . would have considered
`
`these claims obvious based on [Kiuchi] in view of . . . RFC 1034.” Pet. 31.
`
`In this proceeding, Petitioner and Patent Owner agree that the term
`
`“DNS request” should be construed to mean “a request for a resource
`
`corresponding to a domain name.” Pet. 6, Prelim. Resp. 22. As previously
`
`discussed, we have adopted this construction of the term “DNS request.”
`
`Petitioner appears to assert this ground of unpatentability of the claims over
`
`Kiuchi in combination with RFC 1034 only if the construction of the term
`
`“DNS request” as proposed by New Bay Capital is adopted. Id. at 31. We
`
`note that neither Petitioner nor Patent Owner indicate that New Bay Capital
`
`is a party in this proceeding or that the term “DNS request” should be
`
`construed as previously proposed by New Bay Capital. Nor have we
`
`adopted the construction of the term “DNS request” that Petitioner asserts
`
`was proposed by New Bay Capital.
`
`Thus, Petitioner does not explain sufficiently why this ground is not
`
`redundant to the ground on which we have instituted trial above. We do not
`
`authorize inter partes review on the proposed grounds of unpatentability
`
`based combinations of references that include RFC 1034.
`
`
`
`F.
`
`Aventail
`
`Petitioner alleges additional grounds of unpatentability of claims 1, 2,
`
`6–8, and 12–14 based on Aventail (alone or in combination with other
`
`references). The Board’s rules for AIA post-grant proceedings, including
`
`15
`
`
`

`

`IPR2014-00610
`Patent 7,490,151 B2
`
`
`those pertaining to institution, are “construed to secure the just, speedy, and
`
`
`
`inexpensive resolution of every proceeding.” 37 C.F.R.
`
`§ 42.1(b). Therefore, in order to secure just, speedy, and inexpensive
`
`resolution of the proceeding, we exercise our discretion and do not institute a
`
`review based on the asserted grounds of unpatentability based, at least in
`
`part, on Aventail. See 37 C.F.R. § 42.108(a) (“[T]he Board may authorize
`
`the review to proceed . . . on all or some of the grounds of unpatentability
`
`asserted for each claim.”).
`
`
`
`III. CONCLUSION
`
`We institute an inter partes review of claims 1, 2, 6–8, and 12–14
`
`under 35 U.S.C. § 102 as anticipated by Kiuchi and under 35 U.S.C. § 103
`
`as obvious over Kiuchi and RFC 2660.
`
`
`
`IV. ORDER
`
`For the reasons given, it is
`
`
`
`ORDERED that pursuant to 35 U.S.C. § 314(a), inter partes review of
`
`the ’151 Patent is hereby instituted commencing on the entry date of this
`
`Order, and pursuant to 35 U.S.C. § 314(c) and 37 C.F.R.
`
`§ 42.4, notice is hereby given of the institution of a trial.
`
`
`
`FURTHER ORDERED that the trial is limited to the following
`
`grounds: claims 1, 2, 6–8, and 12–14 under 35 U.S.C. § 102 as anticipated
`
`by Kiuchi and under 35 U.S.C. § 103 as obvious over Kiuchi and RFC 2660.
`
`No other grounds are authorized.
`
`
`
`
`
`
`
`16
`
`
`

`

`
`
`
`
`IPR2014-00610
`Patent 7,490,151 B2
`
`For PETITIONER:
`
`W. Karl Renner
`Kevin E. Greene
`FISH & RICHARDSON P.C.
`3200 RBC Plaza
`60 South Sixth Street
`Minneapolis, MN 55402
`axf@fr.com
`IPR38868-0006IP1@fr.com
`
`For PATENT OWNER:
`
`Joseph E. Palys
`Naveen Modi
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`josephpalys@paulhastings.com
`naveenmodi@paulhastings.com
`
`
`
`17
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket