throbber
APPLE INC.,
`Petitioner,
`
`v.
`
`VIRNETX INC,
`Patent Owner.
`___________________
`
`Case No. IPR2015-00810
`U.S. Patent No. 8,868,705
`____________________
`
`Before KARL D. EASTHOM, JENNIFER S. BISK, and
`GREGG I. ANDERSON, Administrative Patent Judges.
`
`__________________________________________________________________
`
`PETITIONER’S REPLY BRIEF
`
`
`
`
`
`
`
`
`
`Paper No. 29
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`Table of Contents
`
`I.
`
`II.
`
`Introduction ...................................................................................................... 1
`
`Claim Construction .......................................................................................... 1
`
`III. Beser and RFC 2401 Render Claims 1-4, 6-10, 12-26, and 28-34 Obvious ... 2
`
`A. A Person of Ordinary Skill Would Have Combined Beser and RFC
`2401 ....................................................................................................... 3
`
`B.
`
`Independent Claims 1 and 21 ................................................................ 7
`
`1.
`
`2.
`
`Beser Teaches a Request to Lookup an IP Address ................... 8
`
`Beser Teaches “Intercepting” a Request to Lookup an IP
`Address ...................................................................................... 12
`
`C.
`
`Dependent Claims ............................................................................... 15
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`Claims 3, 10, and 25 ................................................................. 15
`
`Claims 4 and 26 ......................................................................... 16
`
`Claims 14 and 31....................................................................... 17
`
`Claims 18-20 and 22-24 ............................................................ 18
`
`Claims 2, 6-9, 12, 13, 15-17, 28-30, and 32-34 ........................ 18
`
`IV. Beser, RFC 2401, and Brand Render Claims 5, 11, and 27 Obvious ........... 19
`
`V.
`
`RFC 2401 Is a Prior Art Printed Publication ................................................. 19
`
`A.
`
`B.
`
`The Evidence Shows RFC 2401 Is a Prior Art Printed Publication ... 19
`
`Patent Owner’s Arguments Lack Any Merit ...................................... 21
`
`VI. Dr. Tamassia’s Testimony Is Probative ......................................................... 23
`
`VII. Conclusion ..................................................................................................... 25
`
`
`
`
`
`i
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Arthrocare Corp. v. Smith & Nephew, Inc.,
`406 F.3d 1365 (Fed. Cir. 2005) .......................................................................... 11
`
`Belden Inc. v. Berk-Tek LLC,
`805 F.3d 1064 (Fed. Cir. 2015) .................................................................... 24, 25
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) .................................................................. 1, 19, 24
`
`Poole v. Textron, Inc.,
`192 F.R.D. 494 (D. Md. 2000) ........................................................................... 22
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir 2002) ........................................................................... 24
`
`Sundance, Inc. v. Demonte Fabricating Ltd,
`550 F.3d 1356 (Fed. Cir. 2008) .......................................................................... 23
`
`Tempo Lighting Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ...................................................................... 16, 25
`
`Titanium Metals Corp. of America v. Banner,
`778 F.2d 775 (Fed. Cir. 1985) ............................................................................ 25
`
`U.S. v. Taylor,
`166 F.R.D. 356 (M.D.N.C.) aff'd, 166 F.R.D. 367 (M.D.N.C. 1996) ................ 22
`
`Ultratec, Inc. v. Sorenson Commc'ns, Inc.,
`No. 13-CV-346, 2014 WL 4829173 (W.D. Wis. Sept. 29, 2014) ...................... 22
`
`Guangdong Xinbao Elec. Appliances Holdings v. Adrian Rivera,
`IPR2014-00042, Paper 50 at 22-23 (Feb. 6, 2015) ............................................ 24
`
`LG Display Co., Ltd, v. Innovative Display Techs. LLC, IPR2014-
`01362, Paper 32 at 15-16 (Feb. 8, 2016) ........................................................... 25
`
`
`
`ii
`
`

`
`IPR2015-00810
`
`Statutes
`
`
`
`Petitioner’s Reply (Paper 29)
`
`35 U.S.C. § 6 ............................................................................................................ 25
`
`Other Authorities
`
`37 CFR 42.65(a) ....................................................................................................... 25
`
`Fed. R. Evid. 702 ............................................................................................... 23, 24
`
`
`
`
`
`iii
`
`

`
`IPR2015-00810
`
`I.
`
`Introduction
`
`
`
`Petitioner’s Reply (Paper 29)
`
`In its Institution Decision, the Board correctly found that Beser and RFC
`
`2401 render claims 1-4, 6-10, 12-26, and 28-34 of the ’705 patent obvious and that
`
`Beser, RFC 2401, and Brand render claims 5, 11, and 27 obvious. Paper 8 (Dec.)
`
`at 13-23. In its Response (“Resp.”) (Paper 25), Patent Owner advances a number
`
`of irrelevant challenges or clarifications to the Board’s claim constructions, makes
`
`several narrow challenges to the substance of the Board’s findings about Beser and
`
`RFC 2401, challenges whether RFC 2401 is a printed publication, and then
`
`concludes by asserting that the Board lacks the ability to compare the prior art to
`
`the challenged claims on its own and instead must rely on expert testimony. Each
`
`of Patent Owner’s arguments lacks merit and should be rejected.
`
`The Board’s initial determination that the challenged claims are unpatentable
`
`is supported by more than substantial evidence and should be maintained.
`
`II. Claim Construction
`Petitioner believes that the constructions set forth in the petition represent
`
`the broadest reasonable constructions of the claims. However, in the Institution
`
`Decision, the Board correctly found that it need not adopt specific constructions
`
`here because under any reasonable construction, Beser and RFC 2401 (and Brand
`
`for certain claims) render the claims obvious.
`
`Many of the terms Patent Owner construes in its Response are irrelevant to
`
`
`
`1
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`this proceeding because it never challenges that Beser and RFC 2401 teach those
`
`terms. These include: “encrypted communication channel,” (Resp. at 8-10),
`
`“domain name,” (id. at 13), “provisioning information,” (id. at 13-15),
`
`“modulated/unmodulated,” (id. at 16-17), and “phone,” (id. at 17).
`
`The Board need not address the remaining two, i.e., “secure domain name”
`
`and “intercepting,” (id. at 3-8, 11-13), because as explained below, under any
`
`interpretation proposed by Petitioner or Patent Owner, or adopted by the Board,
`
`Beser and RFC 2401 discloses these limitations.
`
`III. Beser and RFC 2401 Render Claims 1-4, 6-10, 12-26, and 28-34 Obvious
`The Board correctly found that Beser and RFC 2401 render claims 1-4, 6-10,
`
`12-26, and 28-34 obvious. In its Response, Patent Owner raises three primary
`
`challenges to those findings: (i) a person of ordinary skill would not have
`
`combined Beser and RFC 2401, (ii) Beser does not disclose a “request to lookup an
`
`IP address,” and (iii) Beser does not disclose “intercepting” such a request.
`
`Initially, this panel should reject Patent Owner’s arguments because they
`
`were already considered by another panel in a proceeding involving a related
`
`patent and were rejected. In the Final Written Decision in IPR2014-00237, the
`
`Board found that Beser and RFC 2401 rendered claims containing elements similar
`
`to the ’705 patent invalid. Paper 41 at 37-41 (May 11, 2015). The Board rejected
`
`Patent Owner’s arguments that a person of ordinary skill would not have combined
`
`
`
`2
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`Beser and RFC 2401, (Paper 41 at 37-41), and that Beser does not disclose the step
`
`of “intercepting a request to lookup an IP address,” (id. at 22-28). In the current
`
`proceeding, Patent Owner simply rehashes those same rejected arguments. This
`
`panel should reject those arguments again. Even if Patent Owner’s arguments are
`
`reconsidered on the merits, they are wrong and must be rejected.
`
`A. A Person of Ordinary Skill Would Have Combined Beser and
`RFC 2401
`
`As explained in the petition and by Dr. Tamassia, a person of ordinary skill
`
`in the art would have found it obvious to combine Beser and RFC 2401 to provide
`
`end-to-end encryption in an IP tunnel between Beser’s originating and terminating
`
`end devices. Pet. at 26-30; Ex. 1005 at ¶¶383-403. The petition explained that the
`
`Beser IP tunnel would hide the true addresses of two communicating end devices
`
`providing user anonymity, and that a person of ordinary skill would have been
`
`motivated to follow Beser’s suggestion to use IPsec (RFC 2401) to hide the data
`
`transmitted between the end devices. Pet. at 28; Ex. 1005 at ¶¶398-99. In its
`
`Institution Decision, the Board agreed and preliminarily found a person of ordinary
`
`skill would have combined Beser and RFC 2401. Dec. at 11-13.
`
`In its Response, Patent Owner primarily repeats the arguments it raised in
`
`IPR2014-00237 and which were rejected by the Board. See Paper 41 at 37-41
`
`(May 11, 2015); Paper 30 at 56-58 (Aug. 29, 2014). It again argues that Beser’s
`
`statements recognizing that encryption can present practical challenges in some
`
`
`
`3
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`circumstances “teaches away” from the use of encryption. Resp. at 29, 31-33.
`
`Patent Owner’s argument still cannot be squared with Beser’s disclosure.
`
`Beser recognizes encryption ordinarily should be used when the contents of
`
`a communication need to be protected (Ex. 1007 at 1:54-56), and it discloses using
`
`encryption when user-identifiable data are sent over the network such as during
`
`establishment of the IP tunnel, (id. at 11:22-25); Pet. at 27. Beser also criticizes
`
`prior art IP tunneling methods that sometimes prevent use of encryption, (Ex. 1007
`
`at 2:1-8, 2:22-24), and states its tunneling method is intended to overcome such
`
`problems, (id. at 2:43-45). A person of ordinary skill reading Beser would have
`
`understood that encryption should ordinarily be used to protect the contents of
`
`communications in an IP tunnel. Ex. 1005 at ¶¶384-86, 389-90, 398-99.
`
`Neither Patent Owner nor Dr. Monrose have asserted Beser’s tunneling
`
`method is technically incompatible with encryption – they simply raise practical
`
`concerns that only affect some configurations of the system. At his deposition, Dr.
`
`Monrose admitted there was no inherent incompatibility with using IPsec to
`
`encrypt multimedia data, and that a person of ordinary skill would have had
`
`computational concerns only if IPsec was configured to use certain types of
`
`encryption. Ex. 1066 at 80:20-81:8, 82:7-17. He also admitted a person of
`
`ordinary skill in the art in February 2000 would have been able to adjust the
`
`configuration of a system to allow multimedia data to be encrypted. Id. at 79:3-11.
`
`
`
`4
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`Petitioner’s expert Dr. Tamassia similarly explained that a skilled person would be
`
`able to change a system’s configuration to accommodate use of encryption in
`
`Beser’s IP tunnel. Ex. 1005 at ¶¶389-90 (explaining adding more computing power
`
`or using lower resolution could solve any issues). Patent Owner criticizes the
`
`Board for finding that adding more computer power to a system would alleviate the
`
`potential concerns identified in Beser, arguing that approach is not always the
`
`solution to every problem. Resp. at 28. But adding more computing power is one
`
`of several ways to address the practical considerations mentioned in Beser, as Dr.
`
`Monrose has previously recognized. Ex. 1067 at 206:20-208:6 (in a related
`
`proceeding, admitting more powerful computers or lower recording fidelity would
`
`resolve Beser’s concerns), 211:16-212:2.
`
`Patent Owner also argues Beser teaches away from encryption because its
`
`tunneling method was designed to have a low computational burden on a system,
`
`and therefore, it was designed to replace computationally expensive security
`
`techniques such as encryption. Resp. at 29, 31. But Patent Owner mischaracterizes
`
`the purpose of Beser’s design. Beser was designed to provide a better method for
`
`ensuring user privacy by allowing communications over the Internet to be
`
`anonymous. See Ex. 1007 at 2:36-40, 3:4-9. Beser explains users increasingly had
`
`privacy concerns, (id. at 1:13-25), and that it was easy for computer hackers to
`
`determine the identity of two users communicating over the Internet because the
`
`
`
`5
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`source and destination addresses of IP packets were viewable, (id. at 1:26-53).
`
`Beser explains that while encrypting data could protect the contents of the
`
`communication, encryption did not provide privacy because it did not hide the
`
`identities of devices that are communicating. Id. at 2:1-5; id. at 1:56-58. Beser
`
`then discusses conventional IP tunneling techniques, which could provide privacy
`
`by hiding the true addresses of end devices, but notes those techniques sometimes
`
`were incompatible with encryption. Ex. 1007 at 2:22-24; see also id. at 1:54-2:35;
`
`see Pet. at 27-28. Beser also notes that both encryption and prior art IP tunnels
`
`were computationally expensive. Ex. 1007 at 1:60-63, 2:12-17, 2:33-35.
`
`Beser states that its IP tunneling technique was designed to overcome these
`
`problems with the prior art. Ex. 1007 at 2:43-45. Beser’s IP tunnel hides the
`
`identities of communicating devices, but in contrast to prior art IP tunnels which
`
`were computationally expensive, (id. at 2:33-35), Beser’s IP tunnel has a low
`
`“computational burden,” (id. at 3:4-9). Because of its low computational burden,
`
`Beser’s method is flexible and can be integrated into existing communications
`
`systems and combined with other security techniques. See Ex. 1005 at ¶¶388, 393;
`
`Ex. 1007 at 3:4-9, 4:55-5:2. Beser’s tunneling method also can be combined with
`
`encryption: Beser specifically notes the its IP tunnel can improve the security of
`
`encryption by helping to “prevent a hacker from intercepting all media flow
`
`between the ends,” (Ex. 1007 at 2:36-40), and from “accumulating . . . sufficient
`
`
`
`6
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`information to decrypt the message,” (id. at 1:56-58).
`
`Next, Patent Owner argues that using encryption in Beser’s system would be
`
`“redundant” because Beser teaches hiding the identities of the end devices instead
`
`of protecting the contents of a communication. Resp. at 31; see id. at 29 (arguing
`
`Beser is intended to replace encryption). But Beser never states its technique is
`
`intended to replace encryption. In fact, Beser distinguishes between using
`
`encryption to protect the data inside packets and using IP tunnels to hide the true
`
`addresses of the end devices, as Patent Owner recognizes. Resp. at 27. And Dr.
`
`Monrose agreed that a person of ordinary skill would have recognized that using a
`
`security technique to protect the identities of the parties communicating is not a
`
`substitute for using encryption to protect the contents of the communications sent
`
`between the parties. Ex. 1066 at 74:4-15; 74:25-75:3.
`
`Thus, the Board correctly found a person of ordinary skill would have
`
`combined the teachings of Beser and RFC 2401 and it should maintain its finding.
`
`Independent Claims 1 and 21
`
`B.
`The Board correctly found Beser likely discloses “intercepting” a “request to
`
`lookup an [] IP address.” Dec. at 13-14. As explained in the Petition, Beser shows
`
`an originating device 24 initiates an IP tunnel with terminating device 26 by
`
`sending out a tunneling request that contains device 26’s unique identifier. Pet. at
`
`32-34. This request is intercepted by each of first network device 14 and trusted-
`
`
`
`7
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`third-party network device 30. Id. In IPR2014-00237, the Board relied on this
`
`same request in finding that “Beser’s trusted-third-party device 30 is ‘informed of
`
`the request’ from device 14; thereby ‘receiving a request pertaining to a first entity
`
`[26] at another entity [14 or 30]’ and satisfying the ‘intercepting a request’ element
`
`of claim 1 (and a similar element in claim 16).” Paper 41 at 24.
`
`Patent Owner argues Beser’s tunneling request is not a “request to lookup an
`
`IP address” because no single device looks up the IP address of the terminating
`
`device. Resp. at 22-23. It also argues the tunneling request cannot be “intercepted”
`
`by first network device 14 or trusted-third-party network device 30 because in
`
`Beser’s system those devices are designed to always process the requests. Id. at
`
`25-26. Each of Patent Owner’s contentions reflects a misunderstanding of its own
`
`claims and a mischaracterization of what Beser actually discloses.
`
`1.
`
`Beser Teaches a Request to Lookup an IP Address
`
`The tunneling request sent by originating device 24 is a “request to lookup
`
`an IP address” because in response to receiving the request, the Beser trusted
`
`device 30 looks up two IP addresses. Pet. at 33-34. First, it consults an internal
`
`database of registered devices to look up the IP address of second network device
`
`16 that is associated with the unique identifier. Id. at 19-20, 34; Ex. 1007 at 11:45-
`
`58. Second, it looks up a private IP address for terminating device 26 by sending a
`
`message to network device 16 requesting the address. Pet. at 20-21, 34; Ex. 1007
`
`
`
`8
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`at 9:29-30, 12:16-19, 14:14-27, Figs. 6 & 9. As a result of this process, originating
`
`device 24 receives an IP address for terminating device 26. Pet. at 21; Ex. 1007 at
`
`21:48-52; see Ex. 1066 at 103:22-104:3 (Dr. Monrose admitting he does not
`
`dispute the originating device receives an IP address for the terminating device).
`
`Patent Owner argues the tunneling request cannot be a request to “lookup an
`
`IP address” because trusted device 30 does not “look up” any IP addresses in
`
`response to the request. Resp. at 22. But that is irrelevant to the claims, which
`
`specify intercepting “a request to lookup an [] IP address,” and under the broadest
`
`reasonable construction, do not require a lookup to be performed, let alone specify
`
`that a particular device perform the lookup. Thus, Patent Owner’s remaining
`
`arguments can be dismissed because the claims do not require a lookup.
`
`Based on its incorrect theory that a lookup is required, Patent Owner argues
`
`that neither of Beser’s lookups actually lookup an IP address. First, Patent Owner
`
`argues Beser does not disclose that trusted device 30 performs a “lookup” of
`
`network device 16’s public IP address in response to a tunneling request. Resp. at
`
`23. It admits that trusted device 30 contains a database or similar structure that
`
`correlates each unique identifier to the public IP addresses of a second network
`
`device 16 and terminating device 26, but asserts Beser “never suggests that this
`
`data structure is looked up when the tunnel request is received by device 30.”
`
`Resp. at 23. That position is contrary to Beser’s explicit disclosure.
`
`
`
`9
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`Beser describes the database as an example of how the trusted-third-party
`
`network device 30 performs Step 116 of Figure 5, “associat[ing] a public IP
`
`address for a second network device,” which it performs after receiving the
`
`tunneling request sent to it in Step 114. Ex. 1007 at Fig. 5, 11:26-58. Figure 5 has
`
`four steps, and Beser walks through each step sequentially on 9:64 to 12:19. See
`
`Ex. 1066 at 104:25-107:13. Beser discusses Step 116 in two sequential paragraphs
`
`that appear at 11:26-58, as Dr. Monrose agreed. Ex. 1066 at 107:15-108:8. The
`
`first paragraph explains trusted device 30 associates the public IP address for
`
`second network device 16 with the unique identifier in the request. Ex. 1007 at
`
`11:26-32. The second paragraph describes an example of how the association is
`
`performed, stating “[f]or example, the trusted-third-party network device 30
`
`may . . . retain[]a list of E.164 numbers of its subscribers [and] [a]ssociated with a
`
`E.164 number in the directory database is the IP 58 address of a particular second
`
`network device 16.” Id. at 11:45-50; see id. at 11:55-58 (noting other types of
`
`unique identifiers could be used). Thus, Beser teaches that in Step 116 of Figure 5,
`
`trusted device 30 receives the tunneling request, (id. at 11:9-20), and in response, it
`
`associates an IP address with the unique identifier by looking it up in its internal
`
`database, (id. at 11:26-58). See Ex. 1066 at 107:15-108:8.
`
`Patent Owner also suggests the Beser tunneling request cannot be one to
`
`“lookup an IP address” because trusted device 30 looks up the public IP address of
`
`
`
`10
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`second network device 16 instead of terminating device 26. Resp. at 23. But the
`
`claims only specify a request to lookup an “IP address corresponding to a domain
`
`name associated with the target device,” (Ex. 1001 at 55:50-52) (emphasis added),
`
`and the ’705 specification provides that the IP address looked up “need not be the
`
`actual address of the destination computer,” (id. at 40:18-19). Dr. Monrose agreed.
`
`Ex. 1066 at 63:25-64:24. In Beser’s system, the IP address of network device 16
`
`“corresponds” to the unique identifier (e.g., domain name) of terminating device
`
`26. Thus, the tunneling request meets the language of the claims.
`
`Second, Patent Owner challenges the “lookup” of the private IP address by
`
`arguing the first and second devices (14 & 16), and not trusted device 30, negotiate
`
`private IP addresses for end devices 24 & 26. Resp. at 22. That argument is
`
`premised on a single embodiment in Beser, and ignores that Beser discloses
`
`embodiments where trusted device 30 performs the negotiation with the first and
`
`second network devices (14 & 16). Ex. 1007 at 9:29-30, 12:16-19, 14:19-27, Figs.
`
`6 and 9; see Pet. at 20-21, 34. Petitioner established certain embodiments in Beser
`
`met the claim limitations, which is all that is required. Arthrocare Corp. v. Smith
`
`& Nephew, Inc., 406 F.3d 1365, 1372 (Fed. Cir. 2005) (no requirement that every
`
`possible embodiment of a prior art reference satisfy the claims).
`
`Patent Owner also asserts that no private IP addresses are “looked up”
`
`during the negotiation because second network device 16 “assigns” a private IP
`
`
`
`11
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`address to terminating device 26. Resp. at 22. That argument fails for at least two
`
`reasons. One, even if second network device 16 “assigns” the IP address to
`
`terminating device 24, the trusted device 30 “looks up” the IP address when it
`
`sends a message to network device 16 requesting a private IP address. Ex. 1007 at
`
`Fig. 9 (packets 164 & 166), 13:34-48, 13:66-14:18; Pet. at 20-21, 38. Two, second
`
`device 16 does not simply “assign” an IP address – it looks one up by selecting an
`
`unused address out of a pool of IP addresses. Ex. 1007 at 13:49-64; Pet. at 20.
`
`Thus, the Board should find Beser teaches a “request to lookup an IP address.”
`
`IPR2014-00237, Paper 41 at 22-23 (finding Beser discloses such a request).
`
`2.
`
`Beser Teaches “Intercepting” a Request to Lookup an IP
`Address
`
`Beser shows that each of the first network device 14 and the trusted-third-
`
`party network device 30 “intercept” the tunneling request sent by originating
`
`device 24. Pet. at 32-34. The tunneling request contains the unique identifier for
`
`terminating device 26, (Ex. 1007 at 8:1-3, 10:37-42), but it is received and
`
`processed by first network device 14, (id. at 8:21-22, 8:39-43, 10:22-23). Because
`
`the request pertains to terminating device 26 but is received by network device 14,
`
`it is intercepted by network device 14. Pet. at 33. If network device 14 determines
`
`the request needs special processing by detecting a unique sequence of bits in the
`
`packet, (Ex. 1007 at 8:34-43), network device 14 forwards the request, where it is
`
`received by trusted device 30, (id. at 8:3-7, 8:48-49). Pet. at 33; see also Ex. 1007
`
`
`
`12
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`at Figs. 4 & 6. The trusted device 30 device thus also “intercepts” the tunneling
`
`request. Pet. at 33-34; see also IPR2014-00237, Paper 41 at 23-24.
`
`Patent Owner contends that neither first network device 14 nor trusted-third-
`
`party network device 30 “intercept” the tunneling request because Beser’s system
`
`is designed such that tunneling requests are always “intended for” and received by
`
`those two devices. Resp. at 25-26. But Patent Owner’s arguments are irrelevant to
`
`what the claims require. The ’705 patent’s only disclosure of a DNS device that
`
`“intercepts” lookup requests is DNS proxy 2610, which “intercepts all DNS
`
`lookup functions from client 2605.” Ex. 1001 at 40:1-3 (emphasis added). The
`
`’705 patent thus provides that DNS proxy 2610 “intercepts” lookup functions, even
`
`though the DNS proxy receives every single lookup request sent by the client. Id.
`
`at Fig. 26, 40:1-3. Dr. Monrose agreed the DNS proxy receives every DNS request
`
`and that the system is designed, i.e., “pre-established” to intercept every DNS
`
`request. Ex. 1066 at 55:8-20. Thus, the Board should reject Patent Owner’s
`
`arguments that Beser cannot show “intercepting” because it is designed such that
`
`IP tunnel requests are received by network device 14 and trusted device 30.
`
`Moreover, Patent Owner mischaracterizes Beser. Even if “intercepting”
`
`were to include an “intent” element—a position that no party has taken in this
`
`proceeding—Beser discloses such as system. The originating device 24 never
`
`“intends for” its tunneling request to be received by the trusted device 30. As the
`
`
`
`13
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`petition explains, the originating device 24 sends tunneling requests to first
`
`network device 14. Pet. at 32-33. Dr. Monrose agreed that the tunneling request is
`
`addressed to the first network device and not the trusted-third-party network
`
`device. Ex. 1066 at 94:7-95:14. Network device 14 runs a tunneling application
`
`that monitors traffic for a distinctive sequence of bits, and if it detects a packet
`
`containing those bits, it forwards that packet to trusted device 30. Pet. at 32-33;
`
`Ex. 1007 at 8:39-43. In Beser’s system, it is first network device 14 that “intends”
`
`for trusted device 30 to receive the request. Ex. 1066 at 97:8-98:10, 101:9-14. The
`
`originating device 24 only “intends” for the tunneling request to go to network
`
`device 14. Thus, the tunnel request is received by trusted device 30, even though
`
`originating device 14 did not “intend” to send the tunnel request to that device, and
`
`thus trusted device 30 “intercepts” the request. See Pet. at 33-34.
`
`All of Patent Owner’s arguments about the “intercepting” step are anchored
`
`on it including an “intent” element, and not on any of the actual proposed
`
`constructions. Resp. at 23-27; see Ex. 1066 at 124:23-127:13, 132:8-13 (Dr.
`
`Monrose admitting he did not apply Petitioner’s, Patent Owner’s, or the Board’s
`
`constructions, and in face, had not opinion on what the term “intercepting”
`
`requires). The Board can reject those arguments because no one in this proceeding
`
`has advanced such a construction of “intercepting.” Patent Owner asserts Dr.
`
`Tamassia “clarified” his construction of “interception” to mean “receiving a
`
`
`
`14
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`request pertaining to intended for or ordinarily received by a first entity at another
`
`entity.” Resp. at 24; Ex. 1005 at ¶69. But it mischaracterizes Dr. Tamassia’s
`
`testimony, who was discussing the rationale underpinning his construction, and
`
`was neither proposing nor applying a different construction. Ex. 2015 at 79:9-
`
`80:13, 85:9-12; see Ex. 1005 at ¶68. Even if “intercepting” were to require
`
`receiving a request “intended for” another entity, that is disclosed by Beser, as
`
`explained above. Further, even if Patent Owner’s “alternative” construction
`
`specifying “performing an additional evaluation” on the request were adopted,
`
`(Resp. at 11-12), Beser discloses that as well: the trusted device 30 evaluates the
`
`request by checking an internal table of secure devices, (Ex. 1007 at 11:45-58),
`
`which is the same process shown in the ’705 patent, (Ex. 1001 at 40:3-7).
`
`C. Dependent Claims
`1.
`Claims 3, 10, and 25
`
`Petitioner explained that Beser discloses a “secure domain name” because if
`
`a unique identifier is listed in the trusted-third-party network device 30’s database
`
`of registered identifiers, it corresponds to a private IP address that can be used to
`
`access the device securely. Pet. at 43-44. This satisfies Petitioner’s construction
`
`of a “secure domain name”: “a name that corresponds to a secure computer
`
`network address.” Pet. at 12; Ex. 1005 at ¶73.
`
`Patent Owner does not contest that Beser discloses a “secure domain name”
`
`
`
`15
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`under Petitioner’s construction. See Resp. at 33-34. Instead, it argues Beser does
`
`not disclose a “secure domain name” based on its construction of that term: a “non-
`
`standard domain name that corresponds to a secure computer network address and
`
`cannot be resolved by a conventional domain name service (DNS).” Id. Its
`
`construction is based on a disclaimer argument which is not applicable to the
`
`Board here. Tempo Lighting Inc. v. Tivoli, LLC, 742 F.3d 973, 978 (Fed. Cir.
`
`2014). But even under Patent Owner’s construction, Beser discloses a secure
`
`domain name. During prosecution of a related patent, U.S. Patent No. 8,051,181,
`
`Patent Owner explained that the term “secure name” encompassed a “secure non-
`
`standard domain name” such as “a secure non-standard top-level domain name
`
`(e.g., .scom) or a telephone number.” Ex. 1069 (181 FH) at 9. Therefore, Patent
`
`Owner’s construction of “secure domain name” as being a “non-standard domain
`
`name” encompasses a telephone number. Beser discloses that the unique identifier
`
`can be a phone number, which satisfies Patent Owner’s construction. Pet. at 18, 43
`
`(citing Ex. 1007 at 10:38-41); see Ex. 1066 at 110:18-11:14 (testifying he never
`
`considered whether the phone number in Beser could be a secure domain name).
`
`Thus, the Board should find that claims 3, 10, and 25 are obvious.
`
`2.
`
`Claims 4 and 26
`
`Dependent claims 4 and 26 specify that the encrypted communications
`
`channel is a “broadband connection.” The ’705 patent describes a “broadband”
`
`
`
`16
`
`

`
`IPR2015-00810
`
`
`
`Petitioner’s Reply (Paper 29)
`
`connection as one that includes separate channels, such as a modulated medium.
`
`Ex. 1001 at 34:49-55. Dr. Tamassia explained modulated communications
`
`inherently allow “multiple communications over the communication link (i.e.,
`
`frequency division multiplexing).” Ex. 1005 at ¶80. Petitioner explained that Beser
`
`discloses transmitting data using a cable modem (i.e., modulator-demodulator), and
`
`that when a cable modem transmits data over a television network, it necessarily
`
`uses a broadband connection. Pet. at 44-45; Ex. 1005 at ¶80. Patent Owner argues
`
`Petitioner has not shown that “cable television communications” necessarily use a
`
`broadband connection. Resp. at 34-35. But Petitioner asserted that using a cable
`
`modem over to communicate over a cable television network necessarily used a
`
`broadband connection because the modem allows for multiple channels over the
`
`link. Pet. at 44; see id. at 14. Thus, the Board should find these claims are obvious.
`
`3.
`
`Claims 14 and 31
`
`Patent Owner argues Beser does not disclose that terminating device 26 can
`
`be “a server” as required by these claims. Resp. at 35-37. It notes Beser discloses
`
`an embodiment where originating device 24 is a Web-TV set or a computer
`
`running a multimedia application, (Ex. 1007

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket