`
`
`
`
`:
`
`g
`
`Case 6:11—cv-00018—LED Document 307
`
`Fiied 08101112 Page 1 of 13 PagelD #: 9038
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`TYLER DIVISION
`
`VIRNETX INC.,
`Plaintiff,
`
`vs.
`MITEL NETWORKS CORR, et al.,
`Defendants.
`
`g
`E
`g
`2
`g
`
`CASE NO. 6:11-CV—18
`
`MEMORANDUM OPINION AND ORDER
`This Memorandum Opinion construes the disputed claim terms in U.S. Patent Nos.
`
`6,502,135 (“the ‘ 135 Patent”), 7,418,504 (“the ‘504 13atent”), and 7,921,211 (“the ‘21 1 Patent").
`
`BACKGROUND
`
`VirnetX Inc.
`
`(“VirnetX”) aeserts the three patents-in-suit against Mite} Networks
`
`Corporation; Mitel Networks, Inc. (collectively “Mitci”); Siemens Enterprise Communications
`
`GmBH & Co, KG; Siemens Enterprise Communications, Inc. (collectively f‘Siemcns”); and
`
`Avaya Inc. (“Avaya”) (collectively “Dci’cndants”). The ‘135 Patent discloses a method of
`
`transparently creating a virtual private network (“VPN”) between a client computer and a target
`
`computer. The ‘504 and ‘211 9atents disclose a secure domain name service.
`
`The patents-imsuit are all related; Application No. 09/504,783 (“the ‘783 Application”) is
`
`an ancestor application for every patent-in-suit. The ‘135 Patent issued on December 31, 2002,
`
`from the ‘783 Application. The ‘504 Patent issued from a continuation of a continuation—impart
`
`of the ‘733 Application. Finally, the ‘211 Patent is a continuation of the application that resulted
`
`in the ‘504 patent.
`
`Page 1 0f13
`
`VIRNETX EXHIBIT 2005
`
`Apple V. VimctX
`
`Trial IPR2015-00811
`
`‘
`
`Page 1 of 13
`
`VIRNETX EXHIBIT 2005
`Apple v. VirnetX
`Trial IPR2015-00811
`
`
`
`
`
`
`
`Case 6:11—CV—00018-LED Document 307
`
`Filed 08/01/12 Page 2 0113 PageiD #: 9039
`
`This Court has recently construed all but one of the terms at issue. See VirnetX, Inc. v.
`
`Cisco Systems, Inc, No. 6:10-cv-417 (E.D. Tex. Apr. 25, 2012) (“Cisco”). Further, many of
`
`those terms were construed by this Court in a previous case that involved the ‘135 Patent. See
`
`VirneiX, Inc. v. Microsoft Corp, 2009 US. Dist. LEXIS 65667, No. 6:07cv80 (ED. Tex. July
`
`30, 2009) (“Microsofi”). Thus, this is the third time this Court has considered many of the terms
`
`at issue. Given the recent opinion construing most of these terms, the Court hereby incorporates
`
`the entirety of the reasoning therein. See Cisco, No. 6:10-ov—417 (ED. Tex. Apr. 25, 2012). The
`
`opinion below addresses new‘arguments and new terms presented by the parties.
`
`APPLICABLE LAW
`
`“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention
`
`to which the patentee is entitled the right to exclude.” Phillips v. AWH Corp, 415 F.3d 1303,
`
`1312 (Fed. Cir. 2005) (en banc) (quoting Innova/Pure Water Inc. v. Safari Water Filtration Sys,
`
`Inc, 381 F.3d 1111, 1115 (Fed. Cir. 2004)). in claim construction, courts examine the patent’s
`
`intrinsic evidence to define the patented invention’s scope. See id; CR. Bard, Inc. v. US.
`
`Surgical Corp, 388 F.3d 858, 861 (Fed. Cir. 2004); Bell All. Network Saws, Inc. v. Covad
`
`Commc 'nS Group. Inc, 262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes
`
`the claims themselves, the specification, and the prosecution history. See Phillips, 415 F.3d at
`
`1314; CR. Bard, Inc, 388 F.3d at 861. Courts give claim terms their ordinary and accustomed
`
`meaning as understood by one of ordinary skill in the art at the time of the invention in the
`
`context of the entire patent. Phillips, 415 F.3d at 1312—13;All0c, Inc. v. In! ’1 Trade Comm'n,
`
`342 F.3d 1361, 1368 (Fed. Cir. 2003).
`
`The claims themselves provide substantial guidance in determining the meaning of
`
`particular claim terms. Phillips, 415 F.3d at 1314. First, a term’s context in the asserted claim
`
`can be very instructive. Id. Other asserted or unasserted claims can also aid in determining the
`
`Page 2 of 13
`
`\
`
`Page 2 of 13
`
`
`
`
`
`
`
`
`
`
`
`Case 6:11—CV-00018—LED Document 807
`
`Filed 08701712 Page 3 of ’13 PagelD #: 9040
`
`claim’s meaning because claim terms are typically used consistently throughout the patent. Id.
`
`Differences among the claim terms can also assist in understanding a term’s meaning. Id. For
`
`example, when a dependent claim adds a limitation to an independent claim, it is presumed that
`
`the independent claim does not include the limitation. Id. at 1314—15.
`
`“[C]1aims ‘must be read in view of the specification, of which they are a part?” Id.
`
`(quoting Marlanan v. Westvtew Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc)).
`
`“[T]he specification ‘is always highly relevant to the claim construction analysis. Usually, it is
`
`dispositive; it is the single best guide to the meaning of a disputed term.” Id. (quoting Vitronz'cs
`
`Corp. v. Conceptronic, Inc, 90 F.3d 1576, 1582 (Fed. Cir. 1996)); see also Teleflex, Inc. v.
`
`Ficosa N. Am. Corp, 299 F.3d 1313, 1325 (Fed. Cir. 2002). This is true because a patentee may
`
`define his own terms, give a claim term a different meaning than the term would otherwise
`
`possess, or disclaim or disavow the claim scope. Phillips, 415 F.3d at 1316. In these situations,
`
`the inventor’s lexicography governs. Ia'. Also, the specification may resolve ambiguous claim
`
`terms “where the ordinary and accustomed meaning of the words used in the claims lack
`
`sufficient clarity to permit the scope of the claim to be ascertained from the words alone.”
`
`Teleflex,
`
`Inc., 299 F.3d at 1325. But, “‘[a}lthough the specification may aid the court
`
`in
`
`interpreting the meaning of dESputed claim language, particular embodiments and examples
`7”
`appearing in the specification will not generally be read into the claims. Comark Comma ’ns,
`
`Inc. v. Harris Corp, 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting Constant v. Advanced
`
`Micro-Devices, Inc, 848 F.2d 1560, 1571 (Fed. Cir. 1988)); see also Phillips, 415 F.3d at 1323.
`
`The prosecution history is another tool to supply the proper context for claim construction
`
`because a patent applicant may also define a term in prosecuting the patent. Home Diagnostics,
`
`Page 3 of 13
`
`Page 3 of 13
`
`
`
`
`
`
`
`
`
`1
`
`R
`
`Case 6:11-cv-00018-LED Document 307
`
`Fiied 08/01/12 Page 4 of 13 PagelD #: 9041
`
`Inc, v. Li'fescan, Inc, 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the specification,
`
`a patent applicant may define a term in prosecuting a patent”).
`
`Although extrinsic evidence can be useful, it is “‘less significant than the intrinsic record
`
`in determining the legally operative meaning of claim language.” Phillips, 415 F.3d at 1317
`
`(quoting CR. Bard, Inc, 388 F.3d at 862). Technical dictionaries and treatises may help a court
`
`understand the underlying technology and the manner in which one skilled in the art might use
`
`claimterms, buttechnical dictionaries and treatises may provide definitions that are too broad or
`
`may not be indicative of how the term is used in the patent. Id. at 1318. Similarly, expert
`
`testimony may aid a court in understanding the underlying technology and determining the
`
`particular meaning of a term in the pertinent field, but an expert’s conclusory, unsupported
`
`assertions as to a term’s definition is entirely unhelpful to a court. Id. Generally, extrinsic
`
`evidence is “less reliable than the patent and its prosecution history in determining how to read
`
`ciaim terms.” Id.
`
`LEVEL OF ORDINARY SKILL IN THE ART
`
`The parties agree that a person of ordinary skill in the art would have a master’s degree in
`
`computer science or computer engineering and approximately two years of experience in
`
`computer networking and computer network security.
`
`CLAIM TERMS
`
`virtual private network
`
`VimetX proposes “a network of computers which privately and directly communicate
`
`with each other by encrypting traffic on insecure communication paths between the computers.”
`
`Defendants propose “a network of computers which privately and directly communicate with
`
`each other by encrypting traffic on insecure communication paths between the computers to
`
`accomplish both data security and anonymity, and in which a computer is able to address
`
`Page 4 of 13
`
`Page 4 of 13
`
`
`
`
`
`i
`
`Case lel-cv—00018—LED Document 307
`
`Fited 08/01/12 Page 5 of 13 PagelD #: 9042
`
`additional computers over the network without additional setup.” In Cisco, the Court construed
`
`this term as “a network of computers which privately and directly communicate with each other
`
`by encrypting traffic on insecure communication paths between the computers where the
`
`communication is both secure and anonymous.”
`
`The Court’s Cisco analysis has already addressed the parties” arguments relating to the
`
`“secure and anonymous.” limitation. See Cisco, slip op. at 5. Here, Defendants seek the additional
`
`limitation “and in which additional computers can be addressed over the network without
`
`additional setup.” During reexamination of the ‘135 Patent, VirnetX argued that the Aventail
`
`reference did not disclose a VPN for three reasons. See Docket No. 165 attach. 5, at 5—6. The
`
`first of these arguments was that “Aventail has not been shown to demonstrate that computers
`
`connected via the Aventail system are able to communicate with each other as though they were
`
`on the same network.” 10?. at 5. Thereafter, VirnetX provides an example of a situation permitted
`
`by a VPN but not by Aventail. In the example, VirnetX explained that two computers (A and B)
`
`on a public network that each established independent VPN connections to a private network
`
`(containing computers X and Y) would have the ability to communicate with each other over the
`
`VPN. However, the same public computers employing the Aventail system would be unable to
`
`communicate with each other over the established Aventail (SOCKS) connections.
`
`Defendants seek to impose the “without additional setup” limitation based on the
`
`following statement lifted from VirnetX’s two paragraph example: “then A would nevertheless
`
`be able to address data to B, X, and Y without additionat setup.” Id. at 6. However, the example
`
`was provided to illustrate how multiple computers connected via Aventail were not able to
`
`“communicate with each other as though they were on the same network.” Id. at 5. This feature
`
`of the VPN is captured with the “directly” limitation discussed in both Cisco and Microsofl.
`
`Page 5 of 13
`
`Page 5 of 13
`
`
`
`Case 6:11-cv-00018-LED Document 307
`
`Filed 08/01/12 Page 6 of 13 PageiD #: 9043
`
`Further,
`
`it
`
`is unclear what “without additional setup” means. Accordingly,
`
`the “without
`
`additional setup” limitation should not be included in the construction for “virtual private
`
`network” because it is already captured in the “directly” limitation.
`
`The Court construes “virtual private network” as “a network of computers which
`
`privately and directly communicate with each other by encrypting traffic on insecure paths
`
`between the computers where the communication is both secure and anonymous.”
`
`virtual private link
`
`VirnetX proposes “a communication link that permits computers to privately and directly
`
`communicate with each other by encrypting traffic on insecure communication paths between the
`
`computers.” Defendants propose “a network of computers which privately and directly
`
`
`
`
`
`
`
`t
`
`communicate with each other by encrypting traffic on insecure communication paths between the
`
`!
`
`computers to accomplish both data security and anonymity, and in which each computer is able
`
`to address additional computers without additional setup.” In Cisco, the Court construed this
`
`term as “a virtual private network as previously defined.”
`
`Defendants” proposal tracks their proposal for “virtual private network,” which has been
`
`addressed. For the same reasons stated in Circa, the Court construes “virtual private link” as “a
`
`virtual private network as previously defined.”
`
`secure communication link
`
`VirnetX proposes “a direct communication link that provides data security.” Mite] and
`
`Siemens propose “a direct communication link that provides data security by encrypting data on
`
`insecure communications paths, and in which a computer is able to address additional computers
`
`over the communication link without additional setup.” Avaya proposes that the term be
`
`construed the same as “virtual private network.” In Cisco, the Court initially construed the term
`
`as “a direct communication link that provides data security”; however, the Ci'sco parties later
`
`Page 6 of 13
`
`Page 6 of 13
`
`
`
`i
`
`i
`
`
`
`
`
`Case 6:11—cv—OOO18—LED Document 307
`
`Filed 08/01112 Page 7 of 13 PagelD #: 9044
`
`agreed to the following construction: “a direct communication link that provides data security
`
`through encryption.”
`
`Avaya advances essentially the same arguments addressed in Cisco where the defendants
`
`proposed a construction of “virtual private network communication link.” Mitel and Siemens
`
`agree that data security is provided through encryption. In Cisco, VirnetX ultimately agreed that
`
`data security is provided through encryption. Thus,
`
`the “through encryption” limitation is
`
`applicable in the instant case.
`
`For
`
`these reasons
`
`and those discussed in Cisco,
`
`the Court construes “secure
`
`communication link” as “a direct communication link that provides data security through
`
`encryption.”
`
`domain name service
`
`VirnetX proposes “a lockup service that returns an IP address for a requested domain
`
`name,” adopting the Court’s previous construction of this term in Microsofl'. Defendants propose
`
`to append “to the requester” to VirnetX’s proposed construction, which the Court did in C'isco.
`
`For the same reasons discussed in Cisco, the Court construes “domain name service” as
`
`“a lookup service that returns an IP address for-a requested domain name to the requester.”
`
`domain name
`
`VirnetX proposes the same construction adopted by the Court in Microsofl‘ and Cisco: “a
`
`name corresponding to an IP address.” Mitel and Siemens propose “a hierarchical sequence of
`
`character segments separated by periods.” Avaya proposes “a hierarchical sequence of character
`
`segments, separated by periods and arranged in decreasing order of specificity, that resolves to
`
`an LP address.”
`
`For the same reasons stated in Microsofi and Cisco, the Court construes “domain name”
`
`as “a name corresponding to an IP address.”
`
`Page 7 of 13
`
`Page 7 of 13
`
`
`
`
`
`
`
`
`
`
`a
`
`Case 6:11—cv-00018nLED Document 307
`
`Filed 08/01i12 Page 8 of 13 PageID #: 9045
`
`DNS proxy server
`
`VirnetX proposes “a computer or program that responds to a domain name inquiry in
`
`place of a DNS.” Defendants propose “a computer or program that responds to a DNS request in
`
`place of a DNS, and prevents destination servers from determining the identity of the entity
`
`sending the DNS request.” VirnetX’s proposal and the first portion of Defendants” proposal
`
`reflect the construction adopted by this Court in Microsofi. Here, as in Cisco, the dispute is
`
`whether a DNS proxy sewer “prevents destination servers from determining the identity of the
`
`entity sending the domain name inquiry.” In Circa, the Court construed the term as “a computer
`
`or program that responds to a domain name inquiry in place of a DNS.”
`
`For the reasons stated in Microsoft and Cisco, the Court construes “DNS proxy server” as
`
`“a computer or program that responds to a domain name inquiry in place of a DNS.”
`
`domain name service system
`
`VirnetX proposes that no construction is necessary, but alternatively proposes “a
`
`computer system that includes a domain name service (DNS).” Defendants propose “a DNS that
`
`is capable of differentiating between, and responding to, both standard and secure top-level
`
`domain names.” in Cisco, this Court determined that no construction was necessary.
`
`For the same reasons stated in Ciscc, the Court finds that “domain name service system”
`
`does not require construction.
`
`Web site
`
`VirnetX proposes “a computer associated with a domain name and that can communicate
`
`in a network.” Defendants propose “one or more related web pages at a location on the World
`
`Wide Web.” These two proposals mirror the proposals made in M'cmsofi and Cisco. In both
`
`cases, the Court adopted Defendants’ proposal.
`
`Page 8 of 13
`
`Page 8 of 13
`
`
`
`
`
`
`
`i
`
`Case 6:11-cv-00018-LED Document 307
`
`Filed 08/01/12 Page 9 of 13 PagelD #: 9046
`
`For the same reasons stated in Microsofl and Crisco, the Court construes “web site” as
`
`“one or more related web pages at a location on the World Wide Web.”
`
`secure web site
`
`VirnetX proposes “a computer (target computer) associated with a domain name and that
`
`can communicate in a virtuai private network.” Defendants propose “a web site that requires
`
`authorization for access and that can communicate in a VPN.” In Cisco, the Court construed this
`
`term as “a web site that requires authorization for access and that can communicate in a VPN.”
`
`For the same reasons stated in Cz'sco, the Court construes “secure web site” as “a web site
`
`that requires authorization for access and that can communicate in a VP .”
`
`secure target web site
`
`VirnetX proposes “a computer (target computer) associated with a domain name and that
`
`can communicate in a virtual private network.” Defendants propose “the secure web site on the
`
`target computer.” In Cisco,
`
`the Court construed this term as “a web site that requires
`
`authorization for access and that can communicate in a VPN.”
`
`For the same reasons stated in Cisco, the Court construes “secure target web site” as “a
`
`secure web site on the target computer.”
`
`target computer
`
`VirnetX argues that no construction is necessary, but alternatively proposes “a computer
`
`with which the client computer seeks to communicate.” Defendants propose “the ultimate
`
`destination computer with which the client computer seeks to communicate.” In Cisco, the Court
`
`determined that no construction was necessary.
`
`For the same reasons stated in Ctsco, the Court finds that “target computer” does not
`
`require construction.
`
`Page 9 of 13
`
`Page 9 of 13
`
`
`
`
`
`
`
`
`
`Case 6:11-cv-00018—LED Document 307
`
`Filed 08/01/12 Page 10 of 13 PagelD #: 9047
`
`between [A] and [B]
`
`VirnetX argues that no construction is necessary, and Defendants propose “extending
`
`from [A] to [B].”] In Crisco, the Court construed this term as “extending from [A] to [13].” For the
`
`same reasons stated in Cisco, the Court construes “between [A] and [B]” as “extending from [A]
`
`to [13].”
`
`an indication that
`communication link
`
`the domain name service system supports establishing a secure
`
`VimetX argues that this term does not require construction. Defendants propose “a
`
`message or signal
`
`that
`
`informs the user that
`
`the domain name service system supports
`
`establishing a secure communication link.” in Cisco, the Court determined that no construction
`
`was necessary.
`
`The Cisco defendants argued that the indication must be visual to the user. The Court
`
`rejected that argument, explaining that it was an attempt to import a limitation from a preferred
`
`embodiment. See Cisco, slip op. at 27—28. The Defendants here argue that the indication must be
`
`to the user. Defendants again rely on the “one—click” systems discussed in the ‘504 Patent and
`
`Figures 33 and 34. See ‘504 Patent col. 49:6—12. However, the specification reveals a system
`
`where “the secure link is automatically established as a default setting at boot-up of the computer
`
`(i.e., no click)?” Id. co]. 49:10—12. Thus, the indication may be provided to the computer directly
`
`(e.g., via configuration files) as opposed to the user. The claims themselves do not limit whether
`
`the indication is made to the user or the user’s computer. Defendants’ proposed construction
`
`improperly limits the claims to a preferred embodiment.
`
`This term is readily understandable and does not require construction.
`
`' The parties present the terms as: (1) “between [althc] first location and [a/the] second location”; and (2) “between a
`client computer and target computer.” However= the terms may be collapsed to “between [A] and [13]” without
`affecting Defendants’ proposed constructions.
`
`10
`
`Page 10 of 13
`
`Page 10 of 13
`
`
`
`
`
`
`
`1
`l
`‘
`
`Case 6:11-cV-00018-LED Document 307
`
`Filed 08/01/12 Page 11 of 13 PagelD #: 9048
`
`indicate/indicating in response to the query whether the domain name service system
`supports establishing a secure communication link
`
`VirnetX argues that
`
`this term does not
`
`require construction. Defendants propose
`
`“inform/informing the user in response to the query whether the domain name service system
`
`supports establishing a secure communication link.” The issue and arguments regarding this term
`
`are identical to those raised for the previous term. For the same reasons stated regarding the
`
`previous term, this term does not require construction.
`query
`
`VirnetX proposes that this term does not require construction. Defendants propose “a
`
`request for information from a database.” Defendants argue that query must be construed
`
`because it has both a lay and technical meaning. Defendants’ proposed construction adopts the
`
`technical meaning and seeks to iimit queries to database queries. VirnetX argues that this
`
`limitation is not supported by the specification or ciaims. VirnetX further argues that
`
`the
`
`meaning of query is clear from the context of its use in the claims.
`
`Claim 1 of the ‘504 Patent claims a “domain name service system configured .
`
`. .to
`
`receive a query for a network address .
`
`.
`
`. .” ‘504 Patent col. 55:51—54. Further, claim 1 makes no
`
`mention of a database. However, other claims in the ‘504 Patent do specifically reference
`
`databases. See, e.g., ‘504 Patent Claims 20 & 21. Thus, there is no indication that the query of
`
`claim I should be limited to a database query as requested by Defendants. Query, as used in the
`
`claims of the patents-in-suit, is readily understood and is not limited to the technical meaning
`
`employed in the database context. Defendants’ attempt to limit the queries to database queries is
`
`not supported by the claims.
`
`Accordingly, this term does not require construction.
`
`11
`
`Page 11 0f13
`
`Page 11 of 13
`
`
`
`
`
`
`
`
`
`i
`
`
`
`:
`
`Case 6:11—ov~00018~LED Document 307
`
`Filed 08l01l12 Page 12 of 13 PageED #: 9049
`
`CONCLUSION
`
`For the foregoing reasons, the Court interprets the claim language in this case in the
`
`manner set forth above. For ease of reference, the Court’s claim interpretations are set forth in a
`
`table in Appendix A.
`
`So ORDERED and SIGNED this lst day of August, 2012.
`
`LEONARD DAVIS
`UNITED STATES DISTRICT JUDGE
`
`12
`
`Page 12 of13
`
`Page 12 of 13
`
`
`
`
`
`
`
`
`_
`
`:;
`
`
`
`1
`E
`
`Case 6:11-cv-00018-LED Document 307
`
`Filed 08/01112 Page 13 of 13 PagelD #: 9050
`
`APPENDIX A
`
`virtual private network
`
`
`
`virtual_rivatelink.
`
`domain name service
`
`domain name
`DNS proxy server
`
`domain name service system
`
`secure web site
`
`Court’s Construction
`
`a network of computers which privately and directly
`communicate with each other by encrypting traffic on
`insecure paths between the computers where the
`communication is both secure and anonymous
`a virtual private network as previously defined
`
`security through encr tion
`a lookup service that returns an IP address for a
`requested domain name to the re- uester
`a name corresponding to an IF address
`a computer or program that responds to a domain
`name inn ui
`in place of a DNS
`No construction necessar
`
`World Wide Web
`
`a web site that requires authorization for access and
`that can communicate in a VPN
`
`a secure web site on the target corn uuter
`
`secure tar_et web site
`target computer
`extending from [A] to [B]
`between [A] and [B]
`the domain name No construction necessary
`an indication that
`service system supports establishing a
`secure communication link
`
`
`
`indicate/indicating in response to the
`query whether the domain name service
`system supports establishing a secure
`
`communication link
`query
`
`No construction necessary
`
`No construction necessary
`
`13
`
`Page 13 of13
`
`
`
`Page 13 of 13
`
`