throbber
Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`Paper No. 1
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`APPLE INC.
`Petitioner,
`
`v.
`
`VIRNETX, INC. AND SCIENCE APPLICATION INTERNATIONAL
`CORPORATION,
`Patent Owner
`
`Patent No. 7,490,151
`Issued: Feb. 10, 2009
`Filed: Sep. 30, 2002
`Inventor: Edmund C. Munger, et al.
`ESTABLISHMENT OF A SECURE COMMUNICATIONS LINK
`BASED DOMAIN NAME (DNS) REQUEST
`____________________
`Inter Partes Review No. IPR2015-00187
`
`
`
`
`
`
`
`Title:
`
`PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. 7,490,151
`UNDER 35 U.S.C. §§ 311-319 AND 37 C.F.R. § 42.1-.80 & 42.100-.123
`________________________
`
`
`
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`TABLE OF CONTENTS
`
`I. MANDATORY NOTICES UNDER 37 C.F.R § 42.8(a)(1) ....................... 1
`A.
`Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1) ............................ 1
`B.
`Related Matters Under 37 C.F.R. § 42.8(b)(2) ..................................... 1
`C.
`Lead And Back-Up Counsel Under 37 C.F.R. § 42.8(b)(3) ................. 2
`II.
`PAYMENT OF FEES – 37 C.F.R. § 42.103 ................................................ 2
`III. REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104 ....................... 2
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a) ............................. 2
`B.
`Challenge Under 37 C.F.R. § 42.104(b) and Relief Requested ............ 3
`C.
`Claim Construction under 37 C.F.R. §§ 42.104(b)(3) .......................... 5
`1. Domain Name ................................................................................. 5
`2. DNS Request ................................................................................... 6
`3. Secure Server .................................................................................. 6
`4. Automatically Initiating/Creating an Encrypted/Secure
`Channel............................................................................................ 6
`5. Client ............................................................................................... 7
`6. Between [A] and [B] ....................................................................... 7
`IV. SUMMARY OF THE ‘151 PATENT .......................................................... 8
`Summary of the Prosecution History of the ‘151 Patent ...................... 9
`B.
`The Effective Priority Date of the Claims of the ‘151 Patent ............... 9
`C.
`V. MANNER OF APPLYING CITED PRIOR ART TO EVERY
`UNPATENTABLE ...................................................................................... 11
`A.
`[GROUND 1] – Kiuchi Anticipates Claims 1, 2, 6-8, and 12-14 ....... 11
`1. Kiuchi Anticipates Claim 1 ........................................................... 18
`2. Kiuchi Anticipates Claim 7 ........................................................... 24
`
`CLAIM FOR WHICH AN IPR IS REQUESTED, THUS
`ESTABLISHING A REASONABLE LIKELIHOOD THAT AT
`LEAST ONE CLAIM OF THE ‘151 PATENT IS
`
`i
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`3. Kiuchi Anticipates Claim 13 ......................................................... 24
`4. Kiuchi Anticipates Claims 2, 8, and 14 ........................................ 26
`5. Kiuchi Anticipates Claims 6 and 12 ............................................. 27
`B.
`Claims 1, 2, 6-8, and 12-14 ................................................................. 28
`VI. CONCLUSION ............................................................................................ 32
`
`[GROUND 2] – Kiuchi In View of RFC 2660 Renders Obvious
`
`
`Attachment A. Proof of Service of the Petition
`
`Attachment B. List of Evidence and Exhibits Relied Upon in Petition
`
`
`
`- ii -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`Apple Inc. (“Petitioner” or “Apple”) petitions for Inter Partes Review
`
`(“IPR”) under 35 U.S.C. §§ 311–319 and 37 C.F.R. § 42 of claims 1, 2, 6-8, and
`
`12-14 (“the Challenged Claims”) of U.S. Patent No. 7,490,151(“the ‘151 patent”).
`
`By its accompanying Motion for Joinder, Petitioner seeks to join this petition to
`
`IPR2014-00610, a proceeding instituted on the same patent and the same prior art.
`
`The grounds identified in this petition are identical to the grounds in which the
`
`Board instituted trial on in IPR2014-00610.
`
`I. MANDATORY NOTICES UNDER 37 C.F.R § 42.8(a)(1)
`A. Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1)
`The real party of interest of this petition pursuant to § 42.8(b)(1) is Apple
`
`Inc. (“Apple”) located at One Infinite Loop, Cupertino, CA 95014.
`
`B. Related Matters Under 37 C.F.R. § 42.8(b)(2)
`The ‘151 patent is the subject of a number of civil actions including: (i) Civ.
`
`Act. No. 6:13-cv-00211-LED (E.D. Tex.), filed February 26, 2013; (ii) Civ. Act.
`
`No. 6:12-cv-00855-LED (E.D. Tex.), filed November 6, 2012; (iii) Civ. Act. No.
`
`6:10-cv-00417-LED (E.D. Tex.), filed August 11, 2010; (iv) Civ. Act. No. 6:11-cv-
`
`00018-LED (E.D. Tex), (v) Civ. Act. No. 6:13-cv-00351-LED (E.D. Tex), filed
`
`April 22, 2013 (“the 2013 VirnetX litigation”); (vi) Civ. Act. No. 6:10-cv-00094
`
`(E.D. Tex); and (vii) Civ. Act. No. 6:07-cv-00080 (E.D. Tex).
`
`The ’151 patent is also the subject of merged inter partes reexamination nos.
`
`95/001,697 and 95/001,714. In the merged proceedings, the Office issued a Non-
`
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`Final Action on April 20, 2012 rejecting all 16 claims of the ’151 patent, including
`
`rejections based on several prior art references relied upon in this Petition.
`
`The ’151 patent is the subject of an inter pates review filed by Microsoft
`
`Corporation (IPR2014-00610), instituted on October 15, 2014. The ’151 patent
`
`was also the subject of petitions for inter partes review filed by: New Bay Capital,
`
`LLC (IPR2013-00376, dismissed); Apple Inc. (IPR2013-00354, not instituted); and
`
`RPX Corporation (IPR2014-00173, not instituted).
`
`C. Lead And Back-Up Counsel Under 37 C.F.R. § 42.8(b)(3)
`
`Lead Counsel
`Jeffrey P. Kushan (Reg. No. 43,401)
`jkushan@sidley.com
`(202) 736-8914
`D.
`Service Information
`
`Backup Lead Counsel
`Joseph A. Micallef (Reg. No. 39,772)
`jmicallef@sidley.com
`(202) 736-8492
`
`Service on Petitioner may be made by e-mail, or by mail or hand delivery to:
`
`Sidley Austin LLP, 1501 K Street, N.W., Washington, D.C. 20005. The fax
`
`number for lead and backup counsel is (202) 736-8711.
`
`II.
`
`PAYMENT OF FEES – 37 C.F.R. § 42.103
`
`The Director is authorized to charge the fee specified by 37 CFR § 42.15(a)
`
`to Deposit Account No. 50-1597.
`
`III. REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a)
`Petitioner certifies that the ’151 patent is available for inter partes review by
`
`Petitioner. The Petitioner is not barred or estopped from requesting an inter
`
`- 2 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`partes review challenging the patent claims on the grounds identified in the
`
`petition. The ’151 patent was asserted against Petitioner in proceedings alleging
`
`infringement more than one year ago, but because this petition is accompanied by a
`
`motion for joinder to IPR2014-00610, the one-year period in 35 U.S.C. § 315(b)
`
`does not apply to this petition pursuant to 35 U.S.C. § 315(c). E.g., Dell Inc. v.
`
`Network-1 Security Solutions, Inc., IPR2013-00385, Paper 17 at 4-5; Microsoft
`
`Corp. v. Proxyconn, Inc., IPR2013-00109, Paper 15 at 4-5. Trial was instituted in
`
`IPR2014-00610 on October 15, 2014, less than one month prior to the filing of the
`
`present petition, as required by § 122(b). For the reasons detailed in the
`
`accompanying motion for joinder, this petition should be joined to the IPR2014-
`
`00610 proceeding.
`
`B. Challenge Under 37 C.F.R. § 42.104(b) and Relief Requested
`Petitioner requests an IPR of the Challenged Claims on the grounds set forth
`
`in the table shown below, and requests that each of the Challenged Claims be
`
`found unpatentable. An explanation of how these claims are unpatentable under the
`
`statutory grounds identified below is provided in the form of a detailed description
`
`that indicates where each element can be found in the cited prior art, and the
`
`relevance of that prior art. Additional explanation and support for each ground of
`
`rejection is set forth in Exhibit 1003, the Declaration of Dr. Roch Guerin (“Guerin
`
`Declaration”), referenced throughout this Petition.
`
`- 3 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`‘151 Patent Claims
`Ground
`Ground 1 1, 2, 6-8, and 12-14
`Ground 2 1, 2, 6-8, and 12-14
`
`Basis for Rejection
`Anticipated under § 102 by Kiuchi
`Obvious under § 103 based on Kiuchi in
`view of RFC 2660
`The ‘151 patent issued from a string of applications allegedly dating back to
`
`an original application filed on October 30, 1998. However, as outlined in Section
`
`IV(C), the effective filing date for the embodiments recited by claims 1, 2, 6-8, and
`
`12-14 of the ‘151 patent is no earlier than February 15, 2000.
`
`Kiuchi qualifies as prior art under 35 U.S.C. § 102(b). Specifically, Kiuchi
`
`(Ex. 1018) is a printed publication that was presented at the 1996 Symposium on
`
`Network and Distributed Systems Security (SNDSS) on February 22 & 23, 1996,
`
`and published by IEEE in the Proceedings of SNDSS 1996. Ex. 1018.
`
`Aventail qualifies as prior art under §§ 102(a) and (b). Specifically, Aventail
`
`(Ex. 1007) is a printed publication that was publicly distributed no later than
`
`January 31, 1999. Ex. 1005 at ¶¶ 11-36; Ex. 1006 at ¶¶ 11-24.
`
`RFC 1034 qualifies as prior art under 35 U.S.C. § 102(b). Specifically, RFC
`
`1034 (Ex. 1008) was published in November 1987 by the Internet Engineering
`
`Task Force (IETF). RFC 1034 was publically distributed no later than November
`
`1987. Ex. 1008.
`
`RFC 2660 qualifies as prior art under 35 U.S.C. § 102(b). Specifically, draft
`
`01 of RFC 2660 (Ex. 1010) was published in February 1996 by the Internet
`
`- 4 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`Engineering Task Force (IETF). RFC 2660 was publically distributed no later than
`
`February 1996. Ex. 1010.
`
`C. Claim Construction under 37 C.F.R. §§ 42.104(b)(3)
`A claim subject to IPR is given its “broadest reasonable construction in light
`
`of the specification of the patent in which it appears.”1 37 C.F.R. § 42.100(b). For
`
`purposes of this proceeding only, Petitioner submits constructions for the following
`
`terms. All remaining terms should be given their plain meaning.
`
`Domain Name
`
`1.
`The Patent Owner has asserted to the PTAB that that a “domain name”
`
`means “a name corresponding to network address.” Ex. 1019, p. 28. In view of the
`
`Patent Owner’s assertions, it is reasonable, for purposes of this proceeding in
`
`which the broadest reasonable construction standard applies, to consider the term
`
`“domain name” as encompassing “a name corresponding to a network address.”
`
`
`
`1 Because the standards of claim interpretation applied in litigation differ from
`
`PTO proceedings, any interpretation of claim terms in this IPR is not binding upon
`
`Petitioner in any litigation related to the subject patent. See In re Zletz, 13 USPQ2d
`
`1320, 1322 (Fed. Cir. 1989). Additionally, Petitioner does not acquiesce to Patent
`
`Owner’s or the district court’s (or anyone else’s) constructions, and otherwise
`
`reserves all of its rights to argue, contest, and/or appeal the constructions.
`
`
`
`- 5 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`DNS Request
`
`2.
`The Patent Owner has asserted to the PTAB that that a “DNS request”
`
`means “a request for a resource corresponding to a domain name.” Ex. 1019 at pp.
`
`28-29. In view of the Patent Owner’s assertions, it is reasonable, for purposes of
`
`this proceeding in which the broadest reasonable construction standard applies, to
`
`consider the term “DNS request” as encompassing “a request for a resource
`
`corresponding to a domain name.”
`
`Secure Server
`
`3.
`The Patent Owner has asserted to the PTAB that a “secure server” means “a
`
`server that requires authorization for access and that can communicate in an
`
`encrypted channel.” Ex. 1019 at 38-39. In view of the Patent Owner’s assertions, it
`
`is reasonable, for purposes of this proceeding in which the broadest reasonable
`
`construction standard applies, to consider the term “secure server” as
`
`encompassing “a server that requires authorization for access and that can
`
`communicate in an encrypted channel.”
`
`4.
`
`Automatically Initiating/Creating an Encrypted/Secure
`Channel
`
`The Patent Owner has asserted to the PTAB “automatically
`
`initiating/creating an encrypted/secure channel” means “initiating/creating the
`
`encrypted/secure channel without involvement of a user.” Ex. 1019 at 41-42. In
`
`view of the Patent Owner’s assertions, it is reasonable, for purposes of this
`
`- 6 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`proceeding in which the broadest reasonable construction standard applies, to
`
`consider “automatically initiating/creating an encrypted/secure channel” as
`
`encompassing “initiating/creating the encrypted/secure channel without
`
`involvement of a user.”
`
`Client
`
`5.
`Petitioner proposes that a “client,” under the broadest reasonable
`
`interpretation of that term, encompasses “a computer or program from which a data
`
`request to a server is generated.” This is not inconsistent with the ‘151 patent’s
`
`specification and the understanding one of ordinary skill in the art would ascribe to
`
`this term when identifying the broadest reasonable construction. See Ex. 1003 at ¶
`
`16.
`
`In particular, the ‘151 patent describes that “user's computer 2501 includes a
`
`client application 2504 (for example, a web browser) and an IP protocol stack
`
`2505.” Ex. 1001 at 37:1-3. Notably this sentence uses the term “client” with regard
`
`to an application, not the “user’s computer.” Thus, under this term’s broadest
`
`reasonable interpretation, the ‘151 patent supports that “client” may refer to an
`
`application, not just a physical machine.
`
`Between [A] and [B]
`
`6.
`In prior litigation involving the ‘151 patent, the Patent Owner argued against
`
`a defendant’s construction that “between” should mean “extend from one endpoint
`
`- 7 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`to the other,” and instead stated that “between” should only apply to the “public
`
`communication paths.” Ex. 1015, p. 10. Under the Patent Owner’s contentions, an
`
`encrypted/secure channel is “between” a client and a secure server where the
`
`channel is on the public communication paths between the client and the secure
`
`server, regardless of whether the encrypted/secure channel extends completely
`
`from the client to the secure server. In view of the Patent Owner’s assertions, it is
`
`reasonable, for purposes of this proceeding in which the broadest reasonable
`
`construction standard applies, to consider an encrypted/secure channel “between
`
`[A] and [B]” to encompass an encrypted/secure channel on the public
`
`communication paths between the client and the secure server, regardless of
`
`whether that channel fully extends from the client to the secure server.
`
`IV. SUMMARY OF THE ‘151 PATENT
`A. Brief Description
`Generally, the ‘151 patent purportedly provides a secure mechanism for
`
`communicating over the internet. Ex. 1001 at Col. 3, line 8. In particular, the ‘151
`
`patent purportedly describes a domain name service system configured to perform
`
`the operations of: (1) intercepting a DNS request sent by a client; (2) determining
`
`whether the intercepted DNS request corresponds to a secure server, (3) when the
`
`intercepted DNS request does not correspond to a secure server, forwarding the
`
`DNS request to a DNS function that returns an IP address of a nonsecure computer,
`
`- 8 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`and (4) when the intercepted DNS request corresponds to a secure server,
`
`automatically initiating an encrypted channel between the client and the secure
`
`server. Ex. 1001 at Col. 37, lines 25-38.
`
`The ‘151 patent includes 16 claims, of which claims 1, 7 and 13 are
`
`independent.
`
`Summary of the Prosecution History of the ‘151 Patent
`
`B.
`U.S. 7,490,151 issued on February 10, 2009 from U.S. Patent Application
`
`No. 10/259,494 (“the ‘494 application”), which was filed on September 30, 2002
`
`with 20 claims as a division of U.S. Patent Application No. 09/504,783 (“the ’783
`
`application”). See Ex. 1002, pp. 8, 79-82.
`
`No reasons for allowance are expressly stated in the ‘151 patent file history.
`
`Moreover, the Patent Owner never explicitly distinguished the ultimately allowed
`
`and issued claims from the cited prior art, instead focusing its responsive
`
`arguments on claims that were later cancelled. See, e.g., Ex. 1002, pp. 359-363,
`
`385-388, 398-399, 559-561. Ultimately the patent issued on February 10, 2009,
`
`though it is not clear whether a particular feature led to the allowance.
`
`C. The Effective Priority Date of the Claims of the ‘151 Patent
`The ’151 patent issued from U.S. Application No. 10/259,494, filed
`
`September 30, 2002. The ’494 application is a division of U.S. Application No.
`
`09/504,783, filed on February 15, 2000, now U.S. Patent No. 6,502,135, which is a
`
`- 9 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`continuation-in-part of U.S. Application No. 09/429,653, filed on October 29,
`
`1999, now U.S. Patent No. 7,010,604. The ’494, ’783 and ’653 applications each
`
`attempt to claim priority under 35 U.S.C. 119(e) to Provisional Application Nos.
`
`60/106,261, filed October 30, 1998 and 60/137,704, filed June 7, 1998.
`
`Claims 1, 7 and 13 of the ’151 patent are independent claims. Claims 2-6
`
`depend from claim 1, claims 8-12 depend from claim 7, and claims 14-16 depend
`
`from claim 13. Accordingly, claims 2-6, 8-12, and 14-16 cannot enjoy an effective
`
`filing date earlier than that of claims 1, 7 and 13, respectively, from which they
`
`depend.
`
`Claims 1, 7 and 13 of the ’151 patent rely on information first presented in
`
`the ’783 application. For example, claim 1 of the ’151 patent specifies
`
`“determining whether the intercepted DNS request corresponds to a secure server”
`
`and subsequent steps involving the DNS request. Similarly, claims 7 and 13
`
`include limitations involving DNS requests (e.g., “intercepting a DNS request
`
`sent by a client . . .” and “determining whether the intercepted DNS request
`
`corresponds to a secure server . . .”, respectively). The first application that recites
`
`the term “DNS” is the ’783 application. Because none of the ’653, ’261 or ’704
`
`applications disclose or even suggest use in any manner of DNS requests or proxy
`
`servers, these earlier filed applications do not describe or enable the subject matter
`
`- 10 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`defined by at least claims 1, 7 and 13 of the ’151 patent. Accordingly, the effective
`
`filing date of claims 1-16 of the ’151 patent is no earlier than February 15, 2000.
`
`V. MANNER OF APPLYING CITED PRIOR ART TO EVERY CLAIM
`FOR WHICH AN IPR IS REQUESTED, THUS ESTABLISHING A
`REASONABLE LIKELIHOOD THAT AT LEAST ONE CLAIM OF
`THE ‘151 PATENT IS UNPATENTABLE
`A.
`Kiuchi is a printed publication that was presented at the 1996 Symposium on
`
`[GROUND 1] – Kiuchi Anticipates Claims 1, 2, 6-8, and 12-14
`
`Network and Distributed Systems Security (SNDSS) on February 22 & 23, 1996,
`
`and published by IEEE in the Proceedings of SNDSS 1996. Ex. 1018. Kiuchi is
`
`therefore prior art to the ‘151 patent at least under § 102(b), regardless of which
`
`effective filing date in the priority chain is applied to the claims.
`
`Overview of Kiuchi
`
`Kiuchi describes a system and a protocol called “C-HTTP” that “provides
`
`secure HTTP communication mechanisms within a closed group of institutions on
`
`the Internet, where each member is protected by its own firewall.” Ex. 1018, p. 64,
`
`abstract. Kiuchi describes that C-HTTP can be used to create “a closed HTTP-
`
`based virtual network . . . for closed groups; for example, the headquarters and
`
`branches of a given corporation.” Ex. 1018, p. 69, § 5. The following Diagram 1
`
`illustrates relevant parts within the C-HTTP system described by Kiuchi, and will
`
`be used to describe the C-HTTP system. See Ex. 1003, ¶ 56.
`
`
`
`- 11 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(Diagram 1)
`
`Leveraging these parts, Kiuchi describes a process by which a client-side
`
`proxy establishes a secure connection with a server-side proxy using the C-HTTP
`
`protocol over the Internet (i.e., a C-HTTP connection), thus establishing a closed
`
`virtual network including a user agent and one or more origin servers. See Ex.
`
`1018, p. 64, § 2.1; p. 69, § 5; see also Ex. 1003, ¶ 57. Through the C-HTTP
`
`connection, a user agent associated with the client-side proxy may request
`
`information stored on one or more origin servers associated with the server-side
`
`proxy. See id. In order to establish a C-HTTP connection, Kiuchi teaches discrete
`
`steps that will be described using the following block diagram. See Ex. 1018, pp.
`
`65-66, § 2.3; see also, Diagram 2, where each step is numbered to indicate a
`
`temporal sequence of the steps taught by Kiuchi (Ex. 1003, ¶ 58).
`
`- 12 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(Diagram 2)
`
`To enable initiation of this set of steps, the user agent displays HTML
`
`documents to an end-user. See Ex. 1018, p. 65, § 2.3. Through interaction with the
`
`user agent, the end user selects a hyperlink URL included within an HTML
`
`document. See id. Kiuchi provides an example of the selected URL:
`
`“http://server.in.current.connection/sample.html=@=6zdDfldfcZLj8V!i”, where
`
`“server.in.current.connection” is the hostname, “sample.html” is the name of the
`
`resource being requested, and “6zdDfldfcZLj8V!i” is a connection ID. See Ex.
`
`1018, p. 65, § 2.3; Ex. 1003, ¶ 59.
`
`Thereafter, as illustrated by Diagram 3, initial steps are performed by
`
`Kiuchi’s system in response to user selection of the hyperlink. These steps include:
`
`(1) a request being sent from the user agent to the client-side proxy for the selected
`
`URL; (2) a request being sent from the client-side proxy to the C-HTTP name
`
`- 13 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`server for an IP address corresponding to the hostname included in the selected
`
`URL; and (3) a response being returned from the C-HTTP name server that either
`
`includes the IP address associated with the server-side proxy or an error message.
`
`Ex. 1003, ¶ 63. If the C-HTTP name server returns an error message (i.e., if the
`
`hostname does not correspond to a secure server in the closed network, or the
`
`connection is not permitted), then the client-side proxy performs a DNS lookup
`
`using the standard/public DNS, as illustrated by the dashed line. See Ex. 1018, p.
`
`65, § 2.3; see also Ex.
`
`1003, ¶ 63.
`
`(Diagram 3)
`
`
`
`Analyzing these steps in further detail, when the end user selects the
`
`hyperlink in the displayed HTML document, the user agent sends a request for the
`
`URL to the client-side proxy, as illustrated by (1) in Diagram 3. See Ex. 1018, p.
`
`65, § 2.3. When the client-side proxy receives the URL (including the hostname)
`
`- 14 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`from the user agent, it determines whether the connection ID included in the URL
`
`matches the IDs of any current connections being maintained by the client-side
`
`proxy. See id. If the connection ID is not found in the current connection table in
`
`the client-side proxy, the client-side proxy attempts to establish a new connection
`
`with the host corresponding to the hostname included in the URL. See id.
`
`To establish a new connection with the corresponding host, as illustrated by
`
`(2) in Diagram 3, the client-side proxy sends a request to ask the C-HTTP name
`
`server whether the client-side proxy can communicate with the host associated
`
`with the hostname and, if so, to resolve the hostname included in the URL such
`
`that the corresponding IP address is returned by the C-HTTP name server to the
`
`client-side proxy. See Ex. 1018, p. 65, § 2.3(2). In some instances, the hostname
`
`corresponds to an origin server behind a server-side proxy and is associated with
`
`an IP address for the server-side proxy. See Ex. 1018, p. 65, § 2.3; see also Ex.
`
`1003, ¶¶ 59-61. In other instances, the hostname corresponds to a server on the
`
`Internet outside the C-HTTP network. Ex. 1018, p. 65, § 2.3; Ex. 1003, ¶ 61.
`
`Upon receipt of the request, the C-HTTP name server first authenticates the
`
`client-side proxy (and, by association, the user agent) to determine if the request is
`
`legitimate. See Ex. 1018, p. 65, § 2.3; see also Ex. 1003, ¶ 62. When the request is
`
`legitimate, the C-HTTP name server determines whether a “server-side proxy
`
`[associated with the hostname] is registered in the closed network.” See id. As
`
`- 15 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`illustrated by (3) in Diagram 3, if a server-side proxy associated with the hostname
`
`is not registered in the closed network, or the connection is not permitted, then the
`
`C-HTTP name server returns an error message, in response to which the client-side
`
`proxy performs a look-up with a standard/public DNS server, behaving like an
`
`ordinary HTTP proxy. See id. The standard/public DNS server then returns an IP
`
`address of the host corresponding to the hostname, which the client-side proxy uses
`
`to connect to the host on behalf of the user agent. See id.
`
`On the other hand, if the server-side proxy is registered in the closed
`
`network and is permitted to accept a connection from the client-side proxy, then
`
`the C-HTTP name server sends a response to the client-side proxy’s request that
`
`includes “the IP address and public key of the server-side proxy and both request
`
`and response Nonce values,” as illustrated by (3) in Diagram 3. See Ex. 1018, p.
`
`65, § 2.3; Ex. 1003, ¶¶ 62-63. Notably, the C-HTTP name server never provides
`
`the IP address of the origin server to the client-side proxy. Ex. 1018 at 65, § 2.2;
`
`Ex. 1003, ¶ 64. Rather, when the C-HTTP name server returns the IP address of the
`
`server-side proxy along with the server-side proxy’s public key and the nonce
`
`values, the client-side proxy attempts to establish a C-HTTP connection with the
`
`server-side proxy using the IP address received from the C-HTTP name server. See
`
`Ex. 1018, p. 65, § 2.3; Ex. 1003, ¶ 64. The steps for doing so are illustrated in
`
`Diagram 4. See Ex. 1003, ¶ 64.
`
`- 16 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`In particular, Kiuchi describes that the client-side proxy, in response to
`
`receiving the IP address of the server-side proxy and other information from the C-
`
`HTTP name server, sends a “[r]equest for connection to the server-side proxy” (4),
`
`the server-side proxy performs a “[l]ookup of client-side proxy information” with
`
`the C-HTTP name server (5 and 6), and the server-side proxy sends confirmation
`
`of the connection to the client-side proxy (7), if the server-side proxy is able to
`
`properly authenticate the client-side proxy. See Ex. 1018, pp. 65-66, § 2.3, steps 3-
`
`5; Ex. 1003, ¶ 66.
`
`
`
`
`
`
`
`
`
`
`
`
`
`(Diagram 4)
`
`Considering these steps in further detail, the client-side proxy, in response to
`
`receiving the IP address and associated information from the C-HTTP server,
`
`sends a request for connection to the server-side proxy, as illustrated by (4) in
`
`Diagram 4. See Ex. 1018, p. 65, § 2.3; Ex. 1003, ¶ 67. The client-side proxy
`
`encrypts the request for connection using the server-side proxy’s public key and
`
`- 17 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`includes in the request “the client-side proxy's IP address, hostname, request Nonce
`
`value and symmetric data exchange key for request encryption.” See Ex. 1066, p.
`
`65, § 2.3; Ex. 1003, ¶ 67. After receiving the request, the server-side proxy “asks
`
`the C-HTTP name server whether the client-side proxy is an appropriate member
`
`of the closed network,” as illustrated by (5) in Diagram 4, and, in response, the C-
`
`HTTP name server “examines whether the client-side proxy is permitted to access
`
`the server-side proxy.” Ex. 1018, pp. 65-66, § 2.3; see Ex. 1003, ¶ 67. If the C-
`
`HTTP name server determines that “access is permitted, the C-HTTP name server
`
`sends [to the server-side proxy] the IP address and public key of the client-side
`
`proxy and both request and response Nonce values,” as illustrated by (6) in
`
`Diagram 4. Ex. 1018, p. 66, § 2.3; see Ex. 1003, ¶ 67.
`
`After “the C-HTTP name server provides both client-side and server-side
`
`proxies with each peer's public key,” the proxies establish a C-HTTP connection.
`
`Ex. 1018 p. 66, § 2.3; see Ex. 1003, ¶ 68. The C-HTTP connection “provides [a]
`
`secure HTTP communication mechanisms” in which communications over the C-
`
`HTTP connection are encrypted. Ex. 1018, p. 64-66, abstract; see Ex. 1003, ¶ 68.
`
`1. Kiuchi Anticipates Claim 1
`Kiuchi discloses “[a] data processing device, comprising memory storing a
`
`domain name server (DNS) proxy module that intercepts DNS requests sent by a
`
`client,” as recited in claim 1. See Ex. 1003 at ¶¶ 57, 59-60. For example, Kiuchi’s
`
`- 18 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`client-side proxy is a domain name server (DNS) proxy module that intercepts
`
`DNS requests sent by a user agent acting as a client. See id. Moreover, Kiuchi
`
`describes that the client-side proxy is a program installed on a firewall, so the
`
`client-side proxy is stored in the memory of a data processing device. See Ex. 1018
`
`at p. 65, § 2.2.
`
`In particular, as described above, Kiuchi’s client-side proxy receives a
`
`request from the user agent. See Ex. 1018 at p 65, § 2.3; see also Ex. 1003, ¶¶ 57,
`
`59-60. The user agent’s request is a request for content corresponding to a
`
`hostname in a URL (e.g., an HTML document). See id. The request from the
`
`client-side proxy therefore requests resources corresponding to the hostname.
`
`In this case, the hostname is a “domain name,” under that terms broadest
`
`reasonable construction, because the hostname corresponds to an IP address. The
`
`user agent is a “client,” under that term’s broadest reasonable construction, because
`
`the user agent is a computer or program from which a data request to a server is
`
`generated. The request from the user agent sent to the client-side proxy is a “DNS
`
`request,” under that term’s broadest reasonable construction, because the request is
`
`a request for a resource (e.g., an HTML document) corresponding to a domain
`
`name (the hostname).
`
`Kiuchi discloses the DNS proxy module performing the step of “determining
`
`whether the intercepted DNS request corresponds to a secure server,” under the
`
`- 19 -
`
`

`

`Petition for Inter Partes Review of U.S. Patent No. 7,490,151
`
`broadest reasonable construction, as recited in claim 1. For example, as described
`
`above, the client-side proxy receives a request from the user agent, and the request
`
`includes a hostname. Ex. 1018, p. 65, § 2.3. In some instances, the hostname
`
`corresponds to an origin server behind a server-side proxy and designates the
`
`server-side proxy. Ex. 1018, p. 65, § 2.3; Ex. 1003, ¶ 61.
`
`The origin server is a secure server, under the broadest reasonable
`
`construction of secure server, because authorization is needed to access the origin
`
`server and the origin server can communicate in an encrypted channel. In
`
`particular, as described above, before the server-side proxy will accept a client-side
`
`proxy’s request for connection, the server-side proxy “asks the C-HTTP name
`
`server whether the client-side proxy is an appropriate member of the closed
`
`network” and, in response, the C-HTTP name server “examines whether the client-
`
`side proxy is permitted to access to the server-side proxy” and therefore the origin
`
`server. Ex. 1018, pp. 65-66, § 2.3; see Ex. 1003, ¶¶ 66-67. If the C-HTTP server
`
`determines that “access is permitted, the C-HTTP name server sends the IP address
`
`and public key of the client-side proxy and both request and response Nonce
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket