throbber
IPR2015-00811
`
`
`
`Paper No. 29
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`___________________
`
`Case IPR2015-00811
`Patent 8,868,705
`____________________
`
`
`Before KARL D. EASTHOM, JENNIFER S. BISK, and
`GREGG I. ANDERSON, Administrative Patent Judges.
`
`__________________________________________________________________
`
`
`
`PETITIONER’S REPLY
`
`
`
`
`
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`Table of Contents
`
`I.
`
`Introduction .................................................................................................... i
`
`II. Claim Construction ....................................................................................... 1
`
`A.
`
`The Reexamination Prosecution Histories and Specification Do
`Not Contain the Alleged Disclaimers of Claim Scope ...................... 1
`
`B.
`
`The Board Should Maintain Its Claim Constructions ..................... 2
`
`1.
`
`2.
`
`3.
`
`4.
`
`“Secure Domain Name” ................................................................ 2
`
`“Encrypted Communications Channel” ........................................ 3
`
`“Provisioning Information” .......................................................... 4
`
`“Intercepting” ................................................................................ 4
`
`III. Obviousness Over Aventail in view of RFC 2401 ....................................... 4
`
`A. Aventail and RFC 2401 Teach Claim 1 and 21’s “Determining
`Whether the Request to Look Up the IP Address [Intercepted] in
`Step (1) . . . Corresponds to a Device that Accepts an Encrypted
`Channel Connection” Step ................................................................. 4
`
`1. Patent Owner’s Analysis of the “Determining” Step Addresses
`the Wrong “Intercept[ions]” ................................................................. 5
`
`2. Patent Owner Ignores the Plain Language of the Claims, the
`Evidence, and the Combination with RFC 2401 .................................. 8
`
`3. Patent Owner’s Analysis Ignores the Aventail Configuration
`Described in the Petition ...................................................................... 9
`
`B.
`
`Aventail and RFC 2401 Teach Claim 1 and 21’s “Encrypted
`Communications Channel Between the Client Device and the
`Target Device” ................................................................................... 10
`
`C. Aventail and RFC 2401 Teach Claim 1 and 21’s “In Response to
`Determining . . . Providing Provisioning Information” ................. 12
`
`D. Aventail and RFC 2401 Renders Claims 2, 16, and 33 Obvious. .. 14
`
`ii
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`E.
`
`F.
`
`Aventail and RFC 2401 Renders Claims 3 and 25 Obvious. ......... 15
`
`Aventail in view of RFC 2401 Renders Claims 17 and 34 Obvious.
` ............................................................................................................. 16
`
`G. Not-Separately Argued Claims and Grounds ................................ 17
`
`IV. Dr. Tamassia’s Testimony Is Probative ..................................................... 18
`
`V. Aventail and the RFC References Are Conclusively Prior Art .............. 20
`
`VI. Conclusion .................................................................................................... 25
`
`
`
`iii
`
`
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`TABLE OF AUTHORITIES
`
`
`CASES
`Arthrocare Corp. v. Smith & Nephew, Inc.,
`406 F.3d 1365 (Fed. Cir. 2005) .................................................................... 10, 12
`
`Page(s)
`
`Belden Inc. v. Berk-Tek LLC,
`805 F.3d 1064 (Fed. Cir. 2015) .................................................................... 19, 20
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) .................................................................. 1, 17, 19
`
`Deere & Co. v. Bush Hog, LLC,
`703 F.3d 1349 (Fed. Cir. 2012) .......................................................................... 17
`
`Interactive Gift Express, Inc. v. Compuserve Inc.,
`256 F.3d 1323 (Fed. Cir. 2001) .......................................................................... 16
`
`Kyocera Wireless Corp. v. Int'l Trade Comm’n,
`545 F.3d 1340 (2008) .......................................................................................... 21
`
`Ohio Willow Wood Co. v. Alps S., LLC,
`735 F.3d 1333 (Fed. Cir. 2013) .......................................................................... 21
`
`Poole ex rel. Elliott v. Textron, Inc.,
`192 F.R.D. 494 (D. Md. 2000) ........................................................................... 25
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 134 (Fed. Cir 2002) ............................................................................. 18
`
`Sundance, Inc. v. Demonte Fabricating Ltd,
`550 F.3d 1356 (Fed. Cir. 2008) .......................................................................... 18
`
`Tempo Lighting Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) .......................................................................... 1, 2
`
`Titanium Metals Corp. of America v. Banner,
`778 F.2d 775 (Fed. Cir. 1985) ............................................................................ 20
`
`U.S. v. Taylor,
`166 F.R.D. 356 (M.D.N.C.) aff'd, 166 F.R.D. 367 (M.D.N.C. 1996) ................ 25
`
`iv
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`Ultratec, Inc. v. Sorenson Commc'ns, Inc.,
`No. 13-CV-346, 2014 WL 4829173 (W.D. Wis. Sept. 29, 2014) ...................... 25
`
`Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc.,
`200 F.3d 795 (Fed. Cir. 1999) .......................................................................... 3, 4
`
`Guangdong Xinbao Elec. Appliances Holdings v. Adrian Rivera,
`IPR2014-00042, Paper 50 at 22-23 (Feb. 6, 2015) ............................................ 24
`
`LG Display Co., Ltd, v. Innovative Display Techs. LLC, IPR2014-
`01362, Paper 32 at 15-16 (Feb. 8, 2016) ........................................................... 25
`
`
`
`STATUTES
`
`35 U.S.C. § 6 ............................................................................................................ 20
`
`35 U.S.C. § 102(a) ................................................................................................... 20
`
`OTHER AUTHORITIES
`
`37 C.F.R. § 42.65(a) ................................................................................................. 20
`
`Fed. R. Evid. 702 ..................................................................................................... 18
`
`
`
`
`
`v
`
`

`
`IPR2015-00811
`
`I.
`
`Introduction
`
`Petitioner’s Reply (Paper 29)
`
`The Board correctly found claims 1-3, 6, 14, 16-25, 28, 31, and 33-34 would
`
`have been obvious over Aventail and RFC 2401. Paper 8 (“Dec.”) at 12-21. It also
`
`correctly found Aventail, RFC 2401, and RFC 2543 to render claims 8-10, 12, 15,
`
`30, and 32 obvious, id. at 21-22, Aventail, RFC 2401, and Brand to render claims
`
`4, 5, 7, 26, 27, and 29 obvious, id. at 23, and Aventail, RFC 2401, RFC 2543 and
`
`Brand to render claims 11 and 13 obvious. These initial findings are supported by
`
`more than substantial evidence and should be maintained.
`
`II. Claim Construction
`
`Patent Owner initially challenges the Board’s use of the broadest reasonable
`
`interpretation standard (“BRI”) because its ability to amend the claims is “severely
`
`restricted,” Patent Owner Response, Paper 25 (“Resp.”) at 2, though it never
`
`sought to amend its claims. Patent Owner’s challenge to BRI is instead a
`
`transparent attempt to import unclaimed limitations into its claims.
`
`A. The Reexamination Prosecution Histories and Specification Do
`Not Contain the Alleged Disclaimers of Claim Scope
`
`For several claim terms, Patent Owner contends prosecution disclaimers
`
`limit those terms’ scope, Resp. at 5-7, but fails to establish the requirements for an
`
`effective disclaimer. The putative disclaimers are based on statements made during
`
`reexamination proceedings—some still pending—and none was accompanied by a
`
`claim amendment. Under Tempo Lighting Inc. v. Tivoli, LLC, 742 F.3d 973 (Fed.
`
`
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`Cir. 2014), this means these statements have no disclaiming effect before the PTO.
`
`Id. at 978 (“no obligation to accept a claim construction proffered as a prosecution
`
`history disclaimer.”). The Tempo Court affirmed the Board’s finding of a
`
`disclaimer, but only because it was in conjunction with claim amendments made
`
`during the original examination of the patent. Id. at 977. Tempo thus confirms the
`
`irrelevance of such statements, particularly one made during reexamination,
`
`without being accompanied by a claim amendment. Id. Relying on Tempo, the
`
`Board previously found (in a Final Written Decision) that Patent Owner did not
`
`disclaim claim scope. IPR2014-00481, Paper 35 at 10 (Aug. 24, 2015) (“Patent
`
`Owner cannot now rely on any alleged claim disavowals after it characterized them
`
`[in district court] as unclear.”).
`
`B.
`
`The Board Should Maintain Its Claim Constructions
`
`1.
`
`“Secure Domain Name”
`
`In a Final Written Decision involving a related patent, the Board construed
`
`“secure domain name” to mean “a name that corresponds to a secure computer
`
`network address.” IPR2015-00481, Paper 35 at 13-14 (Aug. 24, 2015). It rejected
`
`the same construction Patent Owner proposes here, explaining Patent Owner did
`
`not “demonstrate[] that the Specification requires a secure domain name to be
`
`‘non-standard’ and fails to explain what the term ‘non-standard’ means,” and noted
`
`that Patent Owner conceded in district court that “the ‘non-standard’ distinction ‘is
`
`2
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`not supported by the specification or the prosecution history.” Id. at 13. Patent
`
`Owner provides no basis for the Board to depart from its previous, correct finding.
`
`2.
`
`“Encrypted Communications Channel”
`
`Patent Owner asserts that an “encrypted communications channel” should
`
`be construed to mean “a direct communications channel that is encrypted.” Resp.
`
`at 8-10. The improper additional limitation Patent Owner seeks—that the
`
`encrypted communications channel be “direct”—has previously been rejected by
`
`the Board as unsupported by the prosecution history and Patent Owner’s own
`
`statements, see IPR2014-00481, Paper 35 at 10, or because it was not necessary to
`
`resolve the case, see IPR2014-00482, Paper 34 at 4.
`
`Nothing in the ’705 patent requires “direct” communication. Instead, the
`
`’705 specification describes secure communication links that traverse firewalls,
`
`edge routers, and proxies between end devices in a connection. Ex. 1001 at 33:42-
`
`35:6, 49:10-14, 53:9-50, 55:25-37. Nevertheless, as explained below, the Aventail
`
`reference itself describes its network connection as “direct.” Consistent with its
`
`previous finding, the Board should not read a nebulous “direct” limitation into the
`
`claims in these proceedings, so no further construction of “encrypted
`
`communications channel” is necessary. Vivid Techs., Inc. v. Am. Sci. & Eng’g,
`
`Inc., 200 F.3d 795, 803 (Fed. Cir. 1999) (claim terms need only be construed to the
`
`extent necessary to resolve the case).
`
`3
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`3.
`
`“Provisioning Information”
`
`The Board construed “provisioning information” to be “information that is
`
`provided to enable or aid in establishing a secure communications channel,”
`
`Dec. at 9, which essentially is identical to the construction it previously adopted in
`
`related IPR2014-00481, Paper 11 at 10-11. The Board’s construction is correct and
`
`Patent Owner offers no basis to depart from it aside from asserting it is
`
`“unreasonably broad,” Resp. at 11. But the Board need not address that assertion
`
`because, as explained below, Aventail and RFC 2401 still satisfy those
`
`constructions under any proposed interpretation.
`
`4.
`
`“Intercepting”
`
`In a Final Written Decision involving a related patent, the Board interpreted
`
`the phrase “intercepting” to mean “receiving a request pertaining to a first entity
`
`at another entity.” IPR2015-00237, Paper 41 at 10-12. Although Patent Owner
`
`challenges the Board’s construction, Resp. at 13-15, Patent Owner neither disputes
`
`that Aventail and RFC 2401 teach that term nor that Aventail and RFC 2401
`
`satisfy the claimed step that encompasses the term, so its construction is not
`
`relevant to this proceeding. Vivid Techs., Inc., 200 F.3d at 803.
`
`III. Obviousness Over Aventail in view of RFC 2401
`
`A.
`
`Aventail and RFC 2401 Teach Claim 1 and 21’s “Determining
`Whether the Request to Look Up the IP Address [Intercepted] in
`Step (1) . . . Corresponds to a Device that Accepts an Encrypted
`Channel Connection” Step
`
`4
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`The Board correctly determined that Aventail and RFC 2401 likely disclose
`
`“determining whether the request to look up the IP address [intercepted]1 in Step
`
`(1) . . . corresponds to a device that accepts an encrypted channel connection.”
`
`Dec. at 16-19, 21; see also Pet. at 33-34; Ex. 1005 at ¶ 237. In response, Patent
`
`Owner challenges that finding on three bases: (1) “a domain name is never
`
`specified in the connection request,” i.e., the “alleged ‘intercepted DNS
`
`request,’” Resp. at 17-20, (2) Aventail alone does not disclose a remote host that
`
`“accepts an encrypted connection,” id. at 20-21, and (3) determining whether a
`
`hostname “matches a redirection rule for a destination” is not the same as the
`
`claimed “determination,” id. at 21-23. Each argument lacks merit.
`
`1.
`
`Patent Owner’s Analysis of the “Determining” Step
`Addresses the Wrong “Intercept[ions]”
`
`Rather than address the Board’s initial findings, the Petition, or Dr.
`
`Tamassia’s Declaration, Patent Owner instead misconstrues two lines2 from Dr.
`
`
`1 Patent Owner asserts claims 1 and 21 of the ’705 patent incorrectly include the
`
`word “transmitted” instead of “intercepted,” Prelim. Resp. at 29, n.3; Order, Paper
`
`24 at 2-3. Patent Owner was authorized to request a certificate of correction after
`
`stipulating that the change was not of patentable significance. Id.
`
`2 Patent Owner appears to assert Petitioner and its expert changed their position
`
`based on the Dr. Tamassia’s statement that : “G is the beginning of step 2. Step 2
`
`5
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`Tamassia’s two-hundred and forty-nine page deposition and attacks an argument
`
`that no one has made. Resp. at 17-20. It seizes on Dr. Tamassia’s use of the phrase
`
`“connection request” —a term used in Aventail but not the ’705 claims—to
`
`suggest that he somehow altered what part of Aventail the Petition identifies as the
`
`claimed intercepted “request to look up an [] IP address.” Id.
`
`But Aventail uses the term “connection request” to refer to the broader
`
`process of requesting and establishing a connection that encompasses requests for a
`
`plurality of services (e.g., DNS queries, TCP/IP handshakes), and includes the
`
`initial request by the application on the client computer which occurs before
`
`checking redirection rules, Ex. 1009 at 10 (“When Aventail Connect LSP receives
`
`a connection request, it determines whether or not the connection request needs to
`
`be redirected . . . ). Patent Owner never contested that Aventail makes a
`
`“determination” on this “intercept[ed]” request. Instead, it only discusses the
`
`subsequent request by the application after checking redirection rules. Ex. 1009 at
`
`11 (step 2a); see also Ex. 2015 at 191:21-24 (Dr. Tamassia: “[S]tep 2 identifies a
`
`general connection request that encompasses a plurality of services, while a DNS
`
`request is a request for a unique specific service.”) (emphasis added).
`
`Patent Owner notes that the “determin[ation]” of Step 2 of claims 1 and 21 is
`
`consists of various actions.” Ex. 2015 at 234:8-9. Nothing in this statement
`
`suggests that Dr. Tamassia has modified his opinion. See Ex. 1005 at ¶¶ 219-220.
`
`6
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`based on the same “request to look up an []IP address” that is intercepted in Step
`
`(1). Resp. at 38. But it fails to address the two instances in Aventail where the
`
`determination is based on the intercepted “request[s] to look up an []IP address”
`
`that were identified by Petitioner and relied on by the Board. Thus, Patent Owner
`
`never disputes the Board’s findings on this claim element. Dec. at 15-16.
`
`The first “intercept[ion]” in Aventail follows an application’s initial request
`
`to connect to a remote host. Pet. at 31-32; Ex. 1009 at 9-11; Ex. 1005 at ¶¶ 209-20.
`
`Aventail explains the application on the client device executes “a DNS lookup to
`
`convert the hostname” in the request into “an IP address.” Id. This “domain name
`
`conversion request” is “intercepted” by the Aventail Connect software on the client
`
`device. Dec. at 15; Ex. 1005 at ¶¶ 219-220.
`
`Aventail also discloses a second “intercept[ion],” as the Board found,
`
`through the technique of proxying that same “request” to the Aventail Extranet
`
`Server, which receives the request and resolves the hostname into an IP address.
`
`Dec. at 32; Pet at. 32; Ex. 1009 at 12, 61. Patent Owner does not dispute either of
`
`these findings that Aventail discloses the claimed “intercepting.” Dec. at 15-16.
`
`Dr. Monrose, Patent Owner’s expert, never considered the Petition’s actual
`
`analysis, and explained that he had not “look[ed] at all the other claimed analysis”
`
`and “didn’t go through all the pages” of testimony to see if Dr. Tamassia or
`
`Petitioner had “pointed to something else as” fulfilling the claimed “request,”
`
`7
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`instead focusing exclusively on a presumed change in position discerned from only
`
`two lines in Dr. Tamassia’s deposition. Ex. 1066 at 14:5-8, 16:22-17:2, 20:14-21:7.
`
`Patent Owner’s failure to address the Petition’s mapping dooms its response.
`
`2.
`
`Patent Owner Ignores the Plain Language of the Claims,
`the Evidence, and the Combination with RFC 2401
`
`Patent Owner argues Aventail alone does not disclose a remote host that
`
`“accepts[] an encrypted connection,” Resp. at 20, but that argument may be
`
`disregarded for several reasons. Initially, nothing in the claim language restricts the
`
`“a device that accepts an encrypted channel connection” to the “target device”— it
`
`expressly need not be. Patent Owner agrees that Aventail’s “system [] determines
`
`whether to encrypt traffic to the SOCK server,” thus conceding Aventail shows
`
`determining whether “a device” accepts an encrypted connection. Resp. at 21.
`
`Patent Owner’s argument must also be disregarded as it is premised on an
`
`unclaimed requirement of end-to-end encryption. The Board correctly accepted the
`
`evidence advanced by Dr. Tamassia that “Aventail Connect will evaluate the
`
`redirection rule to determine if the target host is one for which proxy redirection
`
`(and an encrypted communication) through the Aventail Extranet Server is
`
`required.” Dec. at 19 (citing Ex. 1005 ¶ 237) (emphasis in original); see also Ex.
`
`1009 at 8-11. Thus, the evidence described in the Petition, Pet. at 33-35, and by Dr.
`
`Tamassia, Ex. 1005 ¶¶ 229-237, establishes that Aventail, even if considered alone,
`
`satisfies this step under the broadest reasonable interpretation.
`
`8
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`Finally, the Board instituted on obviousness grounds based on Aventail with
`
`RFC 2401, in which the Aventail system is modified to include “end-to-end
`
`encryption,” i.e., “data encrypted on the client remains encrypted as it passes
`
`through firewall or proxy computers until it arrives at the specified host
`
`computer.” Dec. at 17-21, Pet. at 27-28. A determination by the modified Aventail
`
`system that the domain name requires a proxied connection is a determination that
`
`the domain name corresponds to a device that accepts an encrypted channel
`
`connection, even under Patent Owner’s improperly narrow view of the claims.
`
`3.
`
`Patent Owner’s Analysis Ignores the Aventail
`Configuration Described in the Petition
`
`Patent Owner also asserts that “determining whether a domain name . . .
`
`matches a redirection rule for a destination is not the same as determining whether
`
`the remote host will accept an encrypted connection.” Resp. at 21. Patent Owner
`
`appears to rely on the capacity of the Aventail system to be configured to work
`
`differently than the challenged claims specify to incorrectly argue Aventail must
`
`only be configured in such a way. But Patent Owner ignores the configuration
`
`described in Aventail and relied on by Petitioner and the Board—a configuration
`
`where a match of a redirection rule necessarily results in an encrypted
`
`connection. See Dec. at 19, Pet. at 34-35. In that configuration, connections to
`
`internal private networks “require all users to use Aventail Connect to authenticate
`
`and encrypt their sessions before any connection to the internal private
`
`9
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`network(s). For this example, the Aventail ExtraNet Server encrypts all sessions
`
`with SSL.” Ex. 1009 at 73 (emphasis added); Ex. 1005 at ¶¶ 229-37. This
`
`“determin[ation]” in Aventail thus occurs in virtually the same way described in
`
`the ’705 patent. Pet. at 34 (citing Ex. 1001 at 40:1-7, 40:46:57). Patent Owner’s
`
`reliance on alternative ways to configure the Aventail system are irrelevant—
`
`obviousness does not require every embodiment of a prior art reference to satisfy
`
`the claims. See Arthrocare Corp. v. Smith & Nephew, Inc., 406 F.3d 1365, 1372
`
`(Fed. Cir. 2005) (error “to limit the disclosure of the prior art reference to a
`
`preferred embodiment”).
`
`B.
`
`Aventail and RFC 2401 Teach Claim 1 and 21’s “Encrypted
`Communications Channel Between the Client Device and the
`Target Device”
`
`The Board correctly determined that Aventail in view of RFC 2401 likely
`
`discloses an “encrypted communications channel between the client device and the
`
`target device.” Dec. at 17-21; see also Pet. at 35-38; Ex. 1005 at ¶¶ 381-382; Ex.
`
`2015 at 199:6-18. In response, Patent Owner asserts that the claimed “encrypted
`
`communications channel” requires a “direct communications channel,” which it
`
`contends Aventail does not show. Response at 23-24. Patent Owner is incorrect.
`
`First, as explained in § II.B.2, supra, the Board should not read a “direct”
`
`limitation into this claim term. If Patent Owner believed its claims should be
`
`limited to a particular type of encrypted communication channel, it should have
`
`10
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`presented a claim amendment. It did not, so its arguments can be disregarded.
`
`Second, neither Patent Owner nor its expert have attempted to explain what
`
`is required by “direct[ness].” Resp. at 8-10, 23-24. To the extent the term itself is
`
`informative, Aventail describes the “network connections” that are proxied
`
`between client computers and those on the private network as “direct network
`
`connections.” Ex. 1009 at 72 (“[N]o direct network connections between the
`
`public LAN and the private LAN can be created without being securely proxied
`
`through the Aventail ExtraNet Server.”)
`
`Patent Owner also ignores that Aventail discloses configurations in which
`
`client computers proxy their communications into a private network but
`
`communicate directly with target computers as though they were on the same
`
`private network. See Pet. at 23-24, 42-43; Ex. 1009 at 29, 60, 63 (figure), 90-101;
`
`Ex. 1005 ¶¶ 266-272, 382. For example, Aventail shows remote client computers
`
`accessing private network resources via the “Extranet Neighborhood” feature. Pet.
`
`at 23-24. Using that functionality, a user can browse individual hosts (computers)
`
`on a private network, access or modify files on those hosts, and have other forms
`
`of “direct communications” with those hosts. Ex. 1009 at 29. Patent Owner’s only
`
`response is to challenge the mechanics of the underlying encrypted connection,
`
`Resp. at 23-24, but those mechanics are not relevant to the actual claim language
`
`or Patent Owner’s additional requirement of “direct” communications.
`
`11
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`C.
`
`Aventail and RFC 2401 Teach Claim 1 and 21’s “In Response to
`Determining . . . Providing Provisioning Information”
`
`In its Preliminary Response, Patent Owner “concede[d] that Petitioner cites
`
`to instances where Aventail Connect disclosed what Patent Owner contends are
`
`‘provisioning information.’” Prelim. Resp. 20-21. In finding Aventail likely shows
`
`this claim element, the Board found Patent Owner’s concession persuasive. Now,
`
`Patent Owner challenges whether Aventail’s provisioning information is “required
`
`to create an encrypted connection” or whether it is “provided in response to the
`
`claimed ‘determination,’” as specified by the claims. Resp. at 25-26. Patent
`
`Owner’s assertions are without merit.
`
`HOSTENT: Patent Owner asserts that HOSTENT is not “required to
`
`initiate” an encrypted communications channel because it claims to have identified
`
`a configuration in Aventail in which “an encrypted connection” can be created
`
`without its use. Resp. at 27-29. Once again, Patent Owner’s reliance on an
`
`alternative configuration, instead of the configuration actually relied on in the
`
`Petition, is irrelevant. Pet. at 33-34; see Arthrocare, 406 F.3d at 1372. The petition
`
`described a configuration where all hostnames requiring redirection also require
`
`encryption of all communications, see Pet. at 34; Ex. 1009 at 73; Dec. at 16, so the
`
`HOSTENT returned by Aventail Connect is “required” to establish an encrypted
`
`communication. It thus “enable[s] or aid[s] in establishing a secure
`
`communications channel.” Dec. at 9.
`
`12
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`Patent Owner also asserts that the Petition fails to disclose a “relationship”
`
`between HOSTENT and the “encrypted connection.” Resp. at 29-30. This new
`
`requirement proposed by Patent Owner does not appear anywhere in its proposed
`
`construction, id. at 11-12, nor does it identify anything in the claims or
`
`specification for support for this undefined “relationship,” see id. at 29-30. Instead,
`
`it points only to its expert, id. (citing Ex. 2016 ¶ 47), who in turn cites to no
`
`support, see, e.g., Ex. 2016 ¶47. These assertions must therefore be rejected.
`
`TCP Sequence Numbers: With respect to the TCP sequence numbers,
`
`Patent Owner repeats the same lack of “relationship” arguments as it did above.
`
`Resp. at 30-31. For the same reasons above, Patent Owner’s assertions fail. Patent
`
`Owner’s other argument—that “no encrypted connection exists to the remote host
`
`in Aventail [] and hence, the TCP numbers cannot be required,” Resp. at 30-31—
`
`fails to consider Aventail as modified by RFC 2401, which indisputably shows an
`
`encrypted connection to the remote host.
`
`Selection of Encryption Method & Certificate Exchange: Patent Owner’s
`
`only challenge to the “selection of encryption method and certificate exchange” is
`
`that Aventail alone does not show the encryption of communications between the
`
`client device and the remote host. That assertion is irrelevant, as it fails to consider
`
`the actual grounds in this trial—the Aventail in view of RFC 2401.
`
`SOCKS Exchanges: Patent Owner asserts “SOCKS” negotiations cannot
`
`13
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`be the claimed “provisioning information” for two reasons, neither of which have
`
`merit. First, it argues the SOCKS negotiations “do not initiate the creation of the
`
`encrypted communications….,” but it fails to apply the proper claim language,
`
`which states “provisioning information required to initiate the creation….” Ex.
`
`1001 at 55:61-62. Put another way, and as the Board already determined, the
`
`provisioning information must only “enable or aid” in the creation, it need not
`
`actually create. See Dec. at 9.
`
`Patent Owner’s second argument—that Petitioner need to have identified a
`
`“particular message”—is inconsistent with the claim language, which simply
`
`requires “information.” Nevertheless, the Petition identified specific messages
`
`exchanged during the SOCKS negotiation, including “a ‘succeeded’ response to
`
`the client that provides the network address and network port of the server to
`
`which the client computer should send its encrypted communications.” Pet. at 37;
`
`Ex. 1009 at 12; Ex. 1018 at 5-6; Ex. 1005 ¶¶ 241-243.
`
`D. Aventail and RFC 2401 Renders Claims 2, 16, and 33 Obvious.
`
`Dependent claims 2, 16, and 33 recite determining that the target device
`
`“accepts an encrypted channel connection” or “is a device with which” such a
`
`channel “can be established.” Patent Owner presents the same arguments against
`
`these claims as it did against the “determining” step of claims 1 and 21. Resp. at
`
`34-35. As shown in the Petition and above (see § A.1), Aventail with RFC 2401
`
`14
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`renders the “determining” step obvious, see Pet. at 33-38, and renders claims 2, 16,
`
`and 33 obvious for the same reasons, see Pet. at 43-44, 48.
`
`E. Aventail and RFC 2401 Renders Claims 3 and 25 Obvious.
`
`Dependent claims 3 and 25 recite that “the domain name is a secure domain
`
`name.” Aventail in view of RFC 2401 renders this feature obvious for two
`
`reasons. First, Aventail relies on a private DNS server that would resolve domain
`
`names unable to be resolved by a public DNS. Pet. at 44-45; Ex. 1005 at ¶¶ 224,
`
`243. Patent Owner argues that Aventail does not disclose that the domain name
`
`submitted to the SOCKS server for resolution is resolved by the private DNS,
`
`Resp. at 36-37, but Aventail explains that when DNS requests are being proxied,
`
`“the SOCKS server performs the hostname resolution,” Ex. 1009 at 12, and shows
`
`a private DNS server to allow for hostname resolution on the private network, id.
`
`at 72. Dr. Tamassia testified that the domain names of servers on the private
`
`network would be resolved via the private DNS server, Ex. 1005 at ¶ 273, and Dr.
`
`Monrose and Patent Owner fail to point to any other resolution mechanism for how
`
`the SOCKS server “performs the hostname resolution,” see Ex. 2016 at ¶ 62.
`
`Second, Patent Owner’s other argument relates to its flawed construction of
`
`“secure domain name” that would require it to be “non-standard.” Resp. at 37. As
`
`explained above, see § II.B.1, Patent Owner’s construction was already rejected
`
`and has no basis in the specification or the understanding of one of ordinary skill.
`
`15
`
`

`
`IPR2015-00811
`
`Petitioner’s Reply (Paper 29)
`
`F. Aventail in view of RFC 2401 Renders Claims 17 and 34 Obvious.
`
`Dependent claims 17 and 34 recite that the “intercept[ion]”occurs on a
`
`device “separate from the client device.” Aventail “intercept[s]” the request to look
`
`up an IP address in two distinct ways: (1) on the client via Aventail Connect, and
`
`(2) on the Aventail Extranet Server. See § A.1, above; Pet. at 31-32; Ex. 1009 at
`
`11-12; Ex. 1005 at ¶¶ 209-256. In this second case, the “intercept[ion]” occurs
`
`within a device “separate from the client device.” Pet. at 48; Ex. 1009 at 72.
`
`Patent Owner argues that the “determining” step of claims 1 and 21 must
`
`necessarily occur after the “intercepting” step. See Resp. 39-40. There is no basis
`
`for this requirement in the plain language of the claim. “Unless the steps of a
`
`method [claim] actually recite an order, the steps are not ordinarily construed to
`
`require one.” Interactive Gift Express, Inc. v. Compuserve Inc., 256 F.3d 1323,
`
`1342 (Fed. Cir. 2001). The claimed “intercepting” (step 1) and “determining”
`
`(step 2) refer to the same transmitted “request,” but the claims make no order
`
`explicit, and Patent Owner cannot dispute that the “domain name” transmitted in
`
`the request before the “determinat[ion]” in Aventail is the same “domain name”
`
`received and resolved by the Aventail Extranet Server. Ex. 2015 at 193:18-22.
`
`Moreover, the reference to “the request to look up the IP address transmitted
`
`in step (1)” serves to indicate the antecedent basis for the request, not introduce
`
`some temporal relationship between the steps. And, the last st

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket