throbber
Case No. IPR2015-00810
`
`
`
`Paper No.
`Filed: December 11, 2015
`
`Naveen Modi
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1990
`Facsimile: (202) 551-0490
`E-mail: naveenmodi@paulhastings.com
`
`
`Filed on behalf of: VirnetX Inc.
`By:
`
`Joseph E. Palys
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1996
`Facsimile: (202) 551-0496
`E-mail: josephpalys@paulhastings.com
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.
`Petitioner
`
`v.
`
`VIRNETX INC.
`Patent Owner
`
`
`
`
`
`
`
`Case IPR2015-00810
`Patent 8,868,705
`
`
`
`
`
`
`
`
`
`
`Patent Owner’s Response
`
`
`
`
`
`
`
`

`
`
`
`I.
`
`
`II.
`
`
`
`
`Case No. IPR2015-00810
`
`TABLE OF CONTENTS
`
`Introduction ...................................................................................................... 1
`
`Claim Construction .......................................................................................... 1
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`“Secure Domain Name” (Claims 3, 10, and 25) ................................... 3
`
`“Encrypted Communications Channel” Phrases (Claims 1, 2, 4-
`7, 9, 11-13, 18, 21, 22, and 26-29) ........................................................ 8
`
`“Intercept[ing] . . . A Request to Look up an Internet Protocol
`(IP) address” (Claims 1 and 21) .......................................................... 11
`
`“Domain Name” (Claims 1, 3, 10, 21, and 25) ................................... 13
`
`“Provisioning Information” (Claims 1, 2, 9, and 21) .......................... 13
`
`“Modulated Transmission Link/Unmodulated Transmission
`Link” (Claims 5, 6, 11, 12, 27 and 28) ................................................ 16
`
`G.
`
`“Phone” (Claims 8, 15, 30, and 32) .................................................... 17
`
` Beser and RFC 2401 Do Not Render Obvious Claims 1-4, 6-10, 12-III.
`
`
`26, and 28-34 ................................................................................................. 17
`
`A.
`
`B.
`
`C.
`
`D.
`
`Beser’s Disclosure ............................................................................... 17
`
`Beser and RFC 2401 Do Not Disclose “Intercepting From the
`Client Device a Request to Look Up an Internet Protocol (IP)
`Address Corresponding to a Domain Name Associated With the
`Target Device” .................................................................................... 21
`
`1.
`
`2.
`
`The Alleged Request in Beser Is Not a “Request to Look
`Up an Internet Protocol (IP) Address” ...................................... 22
`
`The Alleged Request in Beser Is Not “Intercept[ed]” .............. 23
`
`Beser and RFC 2401 Would Not Have Been Combined as the
`Petition Suggests ................................................................................. 27
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 3, 10, and 25 ............................................................................ 33
`
`i
`
`

`
`
`
`Case No. IPR2015-00810
`
`E.
`
`F.
`
`G.
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 4 and 26 ................................................................................... 34
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 14 and 31 ................................................................................. 35
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 18-20 and 22-24 ...................................................................... 37
`
`H. Dependent Claims 2, 6-9, 12, 13, 15-17, 28-30, and 32-34 ................ 38
`
`IV.
`
` Beser, RFC 2401, and Brand Do Not Render Obvious 5, 11, and 27 ........... 38
`
`V.
`
`
`
`Petitioner Has Not Shown that RFC 2401 Is a Prior Art Printed
`Publication ..................................................................................................... 39
`
`A.
`
`B.
`
`C.
`
`The Evidence Presented with the Petition Cannot Establish by a
`Preponderance of the Evidence that RFC 2401 Was Publicly
`Accessible ............................................................................................ 39
`
`The Board’s Findings Are Insufficient to Establish by a
`Preponderance of the Evidence that RFC 2401 Was Publicly
`Accessible ............................................................................................ 41
`
`The Supplemental Information Is Also Insufficient to Establish
`by a Preponderance of the Evidence that RFC 2401 Was
`Publicly Accessible ............................................................................. 44
`
`VI.
`
` Petitioner’s Expert Testimony Should be Accorded Little, If Any
`Weight ............................................................................................................ 47
`
`
`
` Conclusion ..................................................................................................... 51 VII.
`
`
`
`ii
`
`

`
`
`
`
`
`Case No. IPR2015-00810
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Alexsam, Inc. v. IDT Corp.,
`715 F.3d 1336 (Fed. Cir. 2013) .......................................................................... 50
`
`Apple Inc. v. DSS Technology Management, Inc.,
`IPR2015-00369, Paper No. 9 (June 25, 2015) .............................................. 39, 40
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00237, Paper No. 15 (May 14, 2014) ........................................ 4, 12, 25
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00237, Paper No. 41 (May 11, 2015) .................................................. 14
`
`Apple Inc. v. VirnetX Inc.,
`IPR2015-00811, Paper No. 8 (Sept. 11, 2015) ....................................... 13, 14, 15
`
`Aspex Eyewear, Inc. v. Concepts In Optics, Inc.,
`111 F. App’x 582 (Fed. Cir. 2004) ............................................................... 47, 50
`
`Biogen Idec, Inc. v. GlaxoSmithKline LLC,
`713 F.3d 1090 (Fed. Cir. 2013) ............................................................................ 6
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) ............................................................................ 48
`
`Centricut, LLC v. Esab Group, Inc.,
`390 F.3d 1361 (Fed. Cir. 2004) .......................................................................... 47
`
`In re Cuozzo,
`793 F.3d 1297 (Fed. Cir. 2015) ............................................................................ 3
`
`Cuozzo Speed Techs., LLC v. Lee,
`No. 15-446, 2015 WL 5895939 (Oct. 6, 2015) .................................................... 3
`
`Cyber Corp. v. FAS Techs., Inc.,
`138 F.3d 1448 (Fed. Cir. 1998) ............................................................................ 6
`
`Dish Network L.L.C. v. Dragon Intellectual Property, LLC,
`IPR2015-00499, Paper No. 7 (July 17, 2015) .............................................. 41, 42
`
`iii
`
`

`
`
`Elec. Frontier Found. v. Pers. Audio, LLC,
`IPR2014-00070, Paper No. 21 (Apr. 18, 2014) .................................................. 44
`
`Case No. IPR2015-00810
`
`Finnigan Corp. v. ITC,
`180 F.3d 1354 (Fed. Cir. 1999) .......................................................................... 47
`
`In re Fulton,
`391 F.3d 1195 (Fed. Cir. 2004) .......................................................................... 32
`
`Google Inc. v. Art+Com Innovationpool GMBH,
`IPR2015-00788, Paper No. 7 (September 2, 2015) ...................................... 40, 41
`
`In re Gurley,
`27 F.3d 551 (Fed. Cir. 1994) .............................................................................. 32
`
`Idle Free Sys., Inc. v. Bergstrom, Inc.,
`IPR2012-00027, Paper No. 26 (June 11, 2013) .................................................... 2
`
`Kinetic Technologies, Inc. v. Skyworks Solutions, Inc.,
`IPR2014-00690, Paper No. 43 (Oct. 19, 2015) .................................................. 46
`
`Koito Mfg. Co. v. Turn-Key-Tech LLC,
`381 F.3d 1142 (Fed. Cir. 2004) .......................................................................... 48
`
`In re Lister,
`583 F.3d 1307 (Fed. Cir. 2009) .......................................................................... 43
`
`Medichem, SA v. Rolabo, SL,
`437 F.3d 1157 (Fed. Cir. 2006) .......................................................................... 32
`
`Microsoft Corp. v. Proxyconn, Inc.,
`789 F.3d 1292 (Fed. Cir. 2015) ...................................................................... 7, 15
`
`Proveris Scientific Corp. v. Innovasystems, Inc.,
`536 F.3d 1256 (Fed. Cir. 2008) .................................................................... 47, 50
`
`Samsung Elecs. Co. v. Rembrandt Wireless Techs., LP,
`IPR2014-00514, Paper No. 18 (Sep. 9, 2014) .................................................... 43
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir. 2002) .................................................................... 48, 49
`
`iv
`
`

`
`
`In re Skvorecz,
`580 F.3d 1262 (Fed. Cir. 2009) ............................................................................ 2
`
`Case No. IPR2015-00810
`
`Square Inc. v. Unwired Planet, LLC,
`CBM2014-00156, Paper No. 22 (Feb. 26, 2015) ............................................... 40
`
`Straight Path IP Grp., Inc. v. Sipnet EU S.R.O.,
`No. 2015-1212, 2015 WL 7567492 (Fed. Cir. Nov. 25, 2015) ............................ 7
`
`Symantec Corp. v. Trustees of Columbia Univ. in the City of N.Y.,
`IPR2015-00371, Paper No. 13 (July 17, 2015) .................................................. 40
`
`Tempo Lighting, Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ...................................................................... 6, 7, 8
`
`Typeright Keyboard Corp. v. Microsoft Corp.,
`374 F.3d 1151 (Fed. Cir. 2004) .......................................................................... 47
`
`VirnetX Inc. v. Cisco Sys. Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) .......................................................................... 10
`
`In re Yamamoto,
`740 F.2d 1569 (Fed. Cir. 1984) ............................................................................ 2
`
`Statutes
`
`35 U.S.C. § 316(e) ..................................................................................................... 1
`
`Other Authorities
`
`37 C.F.R.
`§ 41.65(a) ............................................................................................................ 35
`§ 42.65(a) ...................................................................................................... 36, 46
`§ 42.100(b) ............................................................................................................ 2
`§ 42.104(b)(5) ..................................................................................................... 41
`
`
`
`v
`
`

`
`
`
`
`I.
`
`Introduction
`
`
`
`Case No. IPR2015-00810
`
`Patent Owner VirnetX Inc. respectfully submits this Response to the Board’s
`
`decision to institute inter partes review (Paper No. 8, the “Decision”) and to the
`
`petition for inter partes review (the “Petition” or “Pet.”) filed by Petitioner Apple
`
`Inc. The Board instituted review of U.S. Patent No. 8,868,705 (“the ’705 patent”)
`
`on two grounds: (1) obviousness of claims 1-4, 6-10, 12-26, and 28-34 over Beser
`
`and RFC 2401; and (2) obviousness of claims 5, 11, and 27 over Beser, RFC 2401,
`
`and Brand. Apple has not carried its “burden of proving . . . unpatentability by a
`
`preponderance of the evidence” (35 U.S.C. § 316(e)) because the asserted
`
`references fail to disclose each of the claimed features. In addition, Apple has
`
`failed to show that RFC 2401 is a prior art printed publication. Apple’s submitted
`
`expert testimony should also be given little to no weight because it fails to describe
`
`how any of the claim features are taught or suggested in the asserted references.
`
`Accordingly, the Board should enter judgment against Apple and terminate this
`
`proceeding.
`
`II.
`
` Claim Construction
`The Petition identified six terms for construction. In its Preliminary
`
`Response, Patent Owner addressed Petitioner’s constructions and also addressed an
`
`additional term. The Decision did not provide a construction for any of the terms,
`
`finding that “neither party has identified a term for construction that is dispositive
`
` 1
`
`
`
`

`
`
`on any of the challenges.” (Decision at 8.) Patent Owner respectfully disagrees
`
`Case No. IPR2015-00810
`
`and addresses the terms below under the broadest reasonable interpretation (BRI)
`
`standard.
`
`In inter partes review, claims are to be given their “broadest reasonable
`
`construction in light of the specification.” 37 C.F.R. § 42.100(b). Although
`
`VirnetX’s constructions represent the BRI of the claims in light of the specification
`
`and prosecution history, the Board should apply the claim construction standard
`
`applied by the courts, especially given the litigations and prosecution histories of
`
`the patents in the same family as the ’705 patent. The BRI standard “is solely an
`
`examination expedient, not a rule of claim construction.” In re Skvorecz, 580 F.3d
`
`1262, 1267-68 (Fed. Cir. 2009). It is certainly justified during the examination
`
`process because applicant has the opportunity to amend the claims during
`
`prosecution. In re Yamamoto, 740 F.2d 1569, 1571 (Fed. Cir. 1984). But, as the
`
`Board has noted, inter partes review is not an examination and is “more
`
`adjudicatory than examinational, in nature.” Idle Free Sys., Inc. v. Bergstrom, Inc.,
`
`IPR2012-00027, Paper No. 26 at 6 (June 11, 2013).
`
`The ability to amend claims during inter partes review is so severely
`
`restricted that the rationale underpinning the BRI—the ability to freely amend
`
`claims—does not apply especially given the litigations and prosecution histories of
`
`patents in the same family as the ’705 patent. As a result, to the extent the Board
`
`2
`
`

`
`Case No. IPR2015-00810
`
`would have adopted a narrower construction under the courts’ claim construction
`
`standard than it has adopted here,
`
`it should adopt
`
`the narrower construction
`
`because the BRI standard should not apply to this proceeding.
`
`The Court of Appeals for the Federal Circuit refused to reconsider en banc
`
`the application of the BRI standard in Board proceedings. In re Cuozzo, 793 F.3d
`
`1297 (Fed. Cir. 2015). VimetX nevertheless respectfully submits that, given “the
`
`adjudicative nature and the limited amendment process of IPRS,” claims in [PR
`
`proceedings should be given their “actual meaning.” Id. at 1299, 1301-02 (Prost,
`
`C .J., dissenting from denial of en banc rehearing)- VirnetX preserves this
`
`argument in the event the Supreme Court grants review of the Federal Circuit’s
`
`decision in Cuozzo and instructs that a different standard should be applied. See
`
`Pet’n for a Writ of Certiorari, Cuozzo Speed Techs., LLC v. Lee, No- 15-446, 2015
`
`WL 5895939 (Oct. 6, 2015).
`
`A.
`
`“Secure Domain Name” (Claims 3, 10, and 25)‘
`
`
`
`Decision’s Construction
`
`No construction proposed
`
`Patent Owner’s Proposed Apple’s Proposed
`Construction
`Construction
`
`A non-standard domain
`name that corresponds to
`a secure comuter
`
`A name that corresponds
`to a secure computer
`network address
`
`1 Patent Owner identifies only the challenged claims that expressly recite the
`
`terms at issue. Claims that depend from the identified claims may also implicitly
`
`contain the terms.
`
`

`
`Case No. IPR2015-00810
`
`
`network address and
`cannot be resolved by a
`conventional domain
`name service (DNS)
`
`
`Petitioner construed the phrase to mean “a name that corresponds to a secure
`
`computer network address” (Pet. at 11-12), which is the same construction the
`
`Board adopted in a related proceeding. Apple Inc. v. VirnetX Inc., IPR2014-00237,
`
`Paper No. 15 at 12-13 (May 14, 2014). As detailed in Patent Owner’s Preliminary
`
`Response and below, Patent Owner respectfully disagrees with this construction.
`
`(Prelim. Resp. at 34-37.)
`
`Patent Owner’s construction was agreed to by the parties—including
`
`Petitioner—in the ’417 litigation. (Ex. 2002, Joint Claim Construction Chart
`
`Pursuant to P.R. 4-5(d) in the ’417 litigation (E.D. Tex. Dec. 21, 2011) at 19-20.)
`
`In addition to this confirmation from multiple parties that the proposed
`
`construction here is correct, the specification supports the construction.
`
`The specification teaches that a “secure domain name” is “a nonstandard
`
`domain name.” (Ex. 1001 at 7:29-31; 50:22-31.) Examples of “a nonstandard
`
`domain name” are provided in the specification: .scom, .snet, .sorg, .sedu, .smil,
`
`and .sgov. (Id. at 7:39-42.) The specification also explains that a “secure domain
`
`name” “corresponds to a secure computer network address,” stating that “SDNS
`
`3313 contains a cross-reference database of secure domain names and
`
`corresponding secure network addresses.” (Id. at 51:6-10; Ex. 2016 at ¶¶ 15-16.)
`
`4
`
`

`
`
`
`Case No. IPR2015-00810
`
`Because a “secure domain name” is “a non-standard domain name,” the
`
`specification explains that “a query to a standard domain name service (DNS) will
`
`return a message indicating that the universal resource locator (URL) is unknown.”
`
`(Ex. 1001 at 50:32-35; Figs. 33, 34.) To obtain the URL for a “secure domain
`
`name,” “a secure domain name service (SDNS)” must be queried. (Id. at 51:35-38;
`
`Figs. 33, 34; Ex. 2016 at ¶ 17.)
`
`Patent Owner also expressly disclaimed Petitioner’s proposed construction
`
`during a now-completed inter partes reexamination of a related patent. There,
`
`Patent Owner stated that the patent “takes pains to explain that a secure domain
`
`name is different from a domain name that just happens to be associated with a
`
`secure computer or just happens to be associated with an address requiring
`
`authorization.” (Ex. 2008 at 5, Response to Office Action in Control No.
`
`95/001,270 (Apr. 19, 2010).) Unlike a domain name that just happens to be
`
`associated with a secure computer or just happens to be associated with an address
`
`requiring authorization, Patent Owner explained that “a secure domain name
`
`cannot be resolved by a conventional domain name service.” (Id. at 6.) Explicitly
`
`relying on and agreeing with Patent Owner’s statements, the examiner allowed the
`
`claims of the patent:
`
`Patent Owner argues that the ’180 patent clearly
`distinguishes the claimed ‘secure domain name; from a
`domain name that happens to correspond to a secure
`
`5
`
`

`
`
`
`Case No. IPR2015-00810
`
`computer. Patent Owner’s argument is persuasive. The
`Examiner agrees that the ’180 patent distinguishes the
`claimed ‘secure domain name.’ For example, the ’180
`patent explains that a secure domain name is a non-
`standard domain name and that querying a convention[al]
`domain name server using a secure domain name will
`result in a return message indicating that the URL is
`
`unknown . . . .
`
`(Ex. 2006 at 4, Right of Appeal Notice in Control No. 95/001,270 (Dec. 3, 2010).)
`
`Given Patent Owner’s statements and the examiner’s reliance on them,
`
`Apple and its co-defendants explained in district court that the patent issued as a
`
`result of Patent Owner’s statements, thus disallowing Patent Owner from taking a
`
`different position with respect to those terms. (See Ex. 2003 at 8:13-10:2,
`
`Markman Hearing Tr. From ’417 Litigation (E.D. Tex. Jan. 5, 2012).) A
`
`disclaiming statement is unambiguous when “a competitor would reasonably
`
`believe that the applicant had surrendered the relevant subject matter.” Cyber
`
`Corp. v. FAS Techs., Inc., 138 F.3d 1448, 1457 (Fed. Cir. 1998). Here, VirnetX’s
`
`disclaimer “show[s] reasonable clarity and deliberateness.” Biogen Idec, Inc. v.
`
`GlaxoSmithKline LLC, 713 F.3d 1090, 1096 (Fed. Cir. 2013) (citation omitted).
`
`In related IPR proceedings, the Board has relied on Tempo Lighting, Inc. v.
`
`Tivoli, LLC, 742 F.3d 973 (Fed. Cir. 2014), to dismiss Patent Owner’s prosecution
`
`history arguments. Specifically, the Board has highlighted the Federal Circuit’s
`
`6
`
`

`
`
`dicta in Tempo Lighting that the Office is not automatically required “to accept a
`
`Case No. IPR2015-00810
`
`claim construction proffered as a prosecution history disclaimer,” since the
`
`disclaimer “generally only binds the patent owner.” 742 F.3d at 978. But while a
`
`patent examiner is not bound by a patent owner’s disclaimer when construing
`
`claim terms, an unambiguous disclaimer is nevertheless informative with respect to
`
`the patent’s scope and should be given effect in subsequent IPR proceedings.
`
`Where a “patent has been brought back to the agency for a second review,” the
`
`Board should consult the patent’s prosecution history. Microsoft Corp. v.
`
`Proxyconn, Inc., 789 F.3d 1292, 1298 (Fed. Cir. 2015); Straight Path IP Grp., Inc.
`
`v. Sipnet EU S.R.O., No. 2015-1212, 2015 WL 7567492, at *6 (Fed. Cir. Nov. 25,
`
`2015) (prosecution history “is to be consulted even in determining a claim’s
`
`broadest reasonable interpretation”).
`
`Despite its statement in Tempo Lighting, the Federal Circuit there applied
`
`prosecution history disclaimer where an examiner requested the patent applicant to
`
`rewrite its claims to clarify a specific claim term, resulting in an applicant’s
`
`disclaiming remarks. 742 F.3d at 977-78. Here too, in the related reexamination
`
`proceeding, the examiner construed “secure domain name” more broadly than the
`
`specification, and VirnetX disclaimed embodiments that included standard domain
`
`names in response to the examiner’s broadening of the claim. (Ex. 2008 at 5.) Just
`
`as in Tempo Lighting, this disclaimer was a “clarification” of the meaning of the
`
`7
`
`

`
`Case No. IPR2015-00810
`
`term “secure domain name.” 742 F.3d at 978. The Board should consider and
`
`apply Patent Owner’s prosecution history disclaimer here.
`
`Because each aspect of Patent Owner’s construction of “secure domain
`
`name” is supported by intrinsic and extrinsic evidence and because Patent Owner
`
`expressly disclaimed Petitioner’s proposed construction, precluding it from arguing
`
`for a broader construction, the Board should construe “secure domain name” to be
`
`“a non-standard domain name that corresponds to a secure computer network
`
`address and cannot be resolved by a conventional domain name service (DNS).”
`
`B.
`
`“Encrypted Communications Channel” Phrases (Claims 1, 2, 4-7,
`9, 11-13, 18, 21, 22, and 26-29)
`
`Patent Owner’s Proposed Apple’s Proposed
`Construction
`
`Decision’s Construction
`
`Construction A direct communications No construction proposed No construction proposed
`
`channel that is enc ‘O ted
`
`Independent claims 1 and 21 of the ’705 patent recite an “encrypted
`
`communications
`
`channel”
`
`and more
`
`specifically
`
`recite
`
`“an
`
`encrypted
`
`communications channel between a client device and a target device.” (Ex. 1001,
`
`claims 1 and 21.) Thus, in the context of the ’705 patent claims, the encrypted
`
`communications channel between a client device and a target device is a direct
`
`communications charmel that is encrypted.
`
`The ’705 patent describes encrypted communications that are direct between
`
`a client device and a target device. For instance, in one embodiment, the ’705
`
`

`
`
`patent describes the communication between an originating TARP terminal and a
`
`Case No. IPR2015-00810
`
`destination TARP terminal as direct. (See, e.g., Ex. 1001, 9:41-50, Fig. 2; see also
`
`id. at 33:43-51 (describing a variation of the TARP embodiments as including a
`
`direct communication link); 38:6-9 (describing the embodiment of Figure 24 in
`
`which a first computer and second computer are connected directly).) The ’705
`
`patent similarly describes direct encrypted communications in later embodiments
`
`as well. (See, e.g., id. at 40:7-10, 40:66-41:2 (describing a virtual private network
`
`as being direct between a user’s computer and target), 42:6-10, 42:66-43:3
`
`(describing a load balancing example in which a virtual private network is direct
`
`between a first host and a second host), 48:66-49:1, 49:10-22 (describing a secure
`
`communication link that is direct between a first computer and a second computer),
`
`Figs. 24, 26, 28, 29, 33; Ex. 2016 at ¶¶ 18-19.)
`
`In each of these embodiments, the ’705 patent specification discloses that
`
`the communication traverses a network (or networks) through which it is simply
`
`passed or routed via various network devices such as Internet Service Providers,
`
`firewalls, and routers. (See, e.g., Ex. 1001 at Figs. 2, 24, 28, 29, 33; Ex. 2016 at ¶
`
`20.) In litigation, Petitioner and its co-defendants recognized that this type of
`
`network traversal is a “direct” communication. (See Ex. 2003 at 2:16-21, 4:17-
`
`5:12, Markman Hearing Transcript in the ’417 litigation (E.D. Tex. Jan. 5, 2012);
`
`see also id. at 44:13-45:12 (Petitioner explaining that the claims should be limited
`
`9
`
`

`
`
`to “direct” communication because the specification teaches direct communication
`
`Case No. IPR2015-00810
`
`between the client and target).)
`
`
`
`In view of Petitioner’s arguments and the specification, both a district court,
`
`(Ex. 2004 at 8, 13, Memorandum Opinion and Order in the ’417 litigation), and the
`
`Federal Circuit construed the related terms “secure communication link” and
`
`“virtual private network” to include “direct” communication. VirnetX Inc. v. Cisco
`
`Sys. Inc., 767 F.3d 1308, 1317 n.1, 1319 (Fed. Cir. 2014). Accordingly, under the
`
`applicable BRI standard, and in light of the language of the ’705 patent claims,
`
`which recite “an encrypted communications channel between a client device and a
`
`target device,” the Board should construe “encrypted communications channel” as
`
`a “direct communications channel that is encrypted.”
`
`10
`
`

`
`C.
`
`“Intercept[ing] . . . A Request to Look up an Internet Protocol
`(IP) address” (Claims 1 and 21)2
`
`Case No. IPR2015-00810
`
`Patent Owner’s Proposed Apple’s Proposed
`Construction
`Construction
`
`Decision’s Construction
`
`No construction proposed
`
`
`
`Receiving a request
`pertaining to a first entity
`at another entity
`
`No construction
`necessary; alternatively,
`receiving a request to
`look up an intemet
`protocol address and,
`apart from resolving it
`into an address,
`performing an evaluation
`on it related to
`
`establishing an encrypted
`communications channel
`
`2 Step 2 of claims 1 and 21 recites “the request to look up the IP address
`
`transmitted in step (I)’’ instead of “intercepted in step (I)’’ due to a clerical error at
`
`the Office.
`
`(Ex. 1001 at 55:53-54, 57:1-2; see Ex. 1002 at 638, 639, 641, 655-56.)
`
`Per the Board’s Order dated December 9, 2015, Patent Owner filed a Request for a
`
`Certificate of Correction.
`
`(See Ex. 2017.) Patent Owner notes that this correction
`
`does not change the scope of the claims and is not of “patentable significance” as
`
`the file history made explicit
`
`that
`
`the proper understanding of “IP address
`
`transmitted in step (I)’’ could only be the “IP address intercepted in step (1)_” All
`
`of Patent Owner’s arguments
`
`in this Response are consistent with this
`
`understanding.
`
`ll
`
`

`
`
`
`Case No. IPR2015-00810
`
`Though the Board declined to preliminarily construe this term, if the Board
`
`later deems construction necessary, it should adopt Patent Owner’s construction
`
`because Petitioner’s proposed construction does not reflect the appropriate
`
`construction in view of the specification. Petitioner’s proposed construction for
`
`the “intercept[ing]” phrase (Pet. at 11) is similar to a construction that the Board
`
`adopted in a related proceeding. Apple Inc. v. VirnetX Inc., IPR2014-00237, Paper
`
`No. 15 at 12-13.
`
`As explained in Patent Owner’s Preliminary Response, Patent Owner’s
`
`alternative construction appropriately captures the notion of performing an
`
`additional evaluation on a request to look up an IP address related to establishing
`
`an encrypted communications channel, beyond conventionally resolving it and
`
`returning the address. (Prelim. Resp. at 29-32; see also Ex. 2016 ¶ 24.) The
`
`independent claims support this construction, for example, by reciting that a
`
`determination is made whether the request to look up the IP address corresponds to
`
`a device that accepts an encrypted channel connection with the client device, and
`
`that “in response to” this determination, provisioning information required to
`
`initiate the encrypted communications channel is provided. (Ex. 1001, claims 1
`
`and 21.) Additionally, dependent claims 16 and 33 expressly specify the
`
`evaluation, reciting that “intercepting” involves “receiving the request to determine
`
`12
`
`

`
`Case No. IPR2015-00810
`
`whether the target device accepts an encrypted channel connection with the client
`
`device.” (Ex. 1001, claims 16 and 33.)
`
`D.
`
`“Domain Name” (Claims 1, 3, 10, 21, and 25)
`
`Patent Owner’s Proposed Apple’s Proposed
`Construction
`
`a network address
`
`an IP address
`
`Construction A name corresponding to A name corresponding to
`
`Decision’s Construction
`
`No construction proposed
`
`The BRI of “domain name” is “a name corresponding to a network address.”
`
`Patent Owner’s proposed construction is consistent with Petitioner’s, but, as
`
`discussed in more detail in Patent Owner’s Preliminary Response, recognizes that a
`
`name may correspond to types of network addresses other than an “IP” address.
`
`(Pet. at 1 1; see Prelim. Resp. at 33-34; see also Ex. 2016 at 1] 24.)
`
`E.
`
`“Provisioning Information” (Claims 1, 2, 9, and 21)
`
`Patent Owner’s Proposed Apple’s Proposed
`Construction
`Construction
`
`Information that is used
`to establish an encrypted
`communications channel
`
`Information that enables
`communication in a
`virtual private network,
`where the virtual private
`
`network uses enc tion
`
`Decision’s Construction
`
`No construction proposed
`
`In a related proceeding involving the ’705 patent, IPR20l5—008l] (“the ’81l
`
`proceeding”), the Board preliminarily construed “provisioning information” to be
`
`“information that
`
`is provided to enable or aid in establishing a secure
`
`communications charmel.” Apple Inc. v. VirnetX Inc., IPR20l5—008l 1, Paper No.
`
`8 at 9 (Sept. 11, 2015). In doing so, it recognized that “[t]he claims do not recite or
`
`13
`
`

`
`
`implicate in any way explicitly a VPN,” contrary to Petitioner’s proposed
`
`Case No. IPR2015-00810
`
`construction. Id. However, the Board overlooked that the claims also do not recite
`
`a “secure communications channel,” as its construction states. Rather, the claims
`
`repeatedly refer to an “encrypted communications channel.”3 (Ex. 1001, claims 1
`
`and 21 (reciting that the provisioning information is “required to initiate the
`
`creation of the encrypted communications channel”).)
`
`The Board’s construction in the ’811 proceeding is also overly broad in that
`
`it encompasses any information that “enables or aid[s] in” communication using a
`
`secure communications channel, even if that information has nothing to do with
`
`provisioning.
`
` For example, it would encompass source and destination
`
`information for individual packets of data that are traveling over a pre-existing
`
`channel. While this type of information may “enable or aid in” communication
`
`using an encrypted communications channel, it has no relationship to the
`
`traditional notions as would be understood by one of ordinary skill in the art. (Ex.
`
`2016 at ¶¶ 21-22.)
`
`As discussed in the Preliminary Response, Patent Owner’s construction is
`
`more consistent with the general notion that provisioning refers to setting up or
`
`3 This is distinction is significant given the Board’s previous findings in related
`
`proceedings that security does not require encryption. See, e.g., Apple Inc. v.
`
`VirnetX Inc., IPR2014-00237, Paper No. 41 at 5-8 (May 11, 2015).
`
`14
`
`

`
`
`establishing a connection or service. As the Board noted, one dictionary explains
`
`Case No. IPR2015-00810
`
`that provisioning is “[s]etting up a telecommunications service for a particular
`
`customer,” and that “[c]ommon carriers provision circuits by programming their
`
`computers to switch customer lines into the appropriate networks.” Apple,
`
`IPR2015-00811, Paper No. 8 at 9 (citing Ex. 2007 at 6, McGraw-Hill Computer
`
`Desktop Encyclopedia (9th ed. 2001).). Applying these principles to provisioning
`
`in the context of the ’705 patent, encrypted communications channel provisioning
`
`refers to setting up or establishing an encrypted communication channel—not
`
`merely the sending of any and all information that may “enable or aid in”
`
`communication. Indeed, one of ordinary skill in the art4 would not have
`
`understood a channel to be provisioned every time a data packet is sent across it,
`
`but the Decision’s construction inaccurately encompasses this scenario. (Ex. 2016
`
`at ¶ 23); see Microsoft, 789 F.3d at 1298 (explaining that a construction is
`
`“unreasonably broad” where it is not “consistent with the one that those skilled in
`
`the art would reach”)

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket