`Apple v. VirnetX
`Trial IPR2015-00813
`
`
`
`Case B:07—cv—0OO80—LED Document 246
`
`Filed 07/30/09 Page 2 of 35
`
`APPLICABLE LAVV
`
`“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to
`
`which the patentee is entitled the right to exclude.” Phillips ‘.2. A WH Corp., 415 F.3d 1303, 1312
`
`(Fed. Cir. 2005) (en bane) (quoting Ixmova/Pure Water Inc. v. Safari I/Vzzrer Fi..’rraz‘r'cn .S3.=,r., Inc. , 3 81
`
`F.3d 1111, 1115 (Fed. Cir. 2004)).
`
`In claim construction, courts examine the patent’s inttinsic
`
`evidence to define the patented invention’s scope. Sec ial; CR. Bard, Inc. V. US. Surgical Corp,
`
`388 F.3d 85 8, 861 (Fed. Cir. 2004); Bei’lAtI. Ne1‘w0i'kServS., Inc. v. Covczd Commc ’ns Group, Inc,
`
`262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes the claims themselves, the
`
`specification, and the prosecution history. See Phillips, 415 F.3d at 1314; CR. Bard, Inc, 388 F.3d
`
`at 861. Courts give claim terms their ordinary and accustomed meaning as understood by one of
`
`ordinary skill in the art at the time of the invention in the context of the entire patent. Pltillips, 415
`
`F.3d at 131243; Ailoc, Inc. v. Int '1 Trade Comm '11, 342 F.3d 1361, 1368 (Fed. Cir. 2003).
`
`The claims themselves provide substantial guidance in determining the meaning ofparticular
`
`claim terms. Phillips, 415 F.3d at 1314. First, a term’s context in the asserted claim can be very
`
`instructive. Id. Other asserted or unasserted claims can also aid in deteimining the claim’s meaning
`
`because claim terms are typically used consistently throughout the patent. Id. Differences among
`
`the claim terms can also assist in understanding a tem1‘s meaning.
`
`Id. For example, when a
`
`dependent claim adds a limitation to an independent claim, it is presumed that the independent claim
`
`does not include the limitation. Id. at 1314-15.
`
`“[C]la§ms ‘must be read in View of the specification, cfwhich they are a part,’” Id. (quoting
`
`Markman. 12, Westview Instruments, Inc, 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc)). “[T]he
`
`specification ‘is always highly relevant to the claim construction analysis. Usually, it is dispositive;
`
`2of35
`
`
`
`
`
`
`
`
`
`Case 6:07-cv—OO080—LED Document 246
`
`Filed 07/30/09 Page 3 of 35
`
`it is the single best guide to the meaning of a disputed tenn.” Id. (quoting Virronics Corp. v.
`
`Conceptrorzic, Inc, 90 F.3d 15 76, 1582 (Fed. Cir. 1996)); Teleflex, Inc. v. Fic:0saN. Am. Com, 299
`
`F.3d 1313, 1325 (Fed. Cir. 2002). This is true because a patentee may define his own terms, give
`
`a claim term a different meaning than t.he term would otherwise possess, or disclaim or disavow the
`
`claim scope. Phillips, 415 F.3d at 1316.
`
`In these situations, tl1einventor’s lexicography governs.
`
`Iof. Also, the specification may resolve ambiguous claim terms “where the ordinary and accustomed.
`
`meaning ofthe Words used in the claims lack sufficient clarity to permit the scope ofthe claim to be
`
`ascertained from the words alone.” Teleflex, 1110., 299 F3 01. at 1325. But, “‘ [a]1thongh the
`
`specification may aid the court in interpreting the meaning of disputed claim language, particular
`
`embodiments and examples appearing in the specification will not generally be read into the
`
`claims.” Comarfc Comma ’ns, Inc. 12. Harris Corp, 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting
`
`Constant 12. AdvancedMicro~Devica9, Inc, 848 F.2d 1560, 1571 (Fed. Cir. 198 8)); See also Philfips,
`
`415 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim
`
`construction because a patent applicant may also define a term in prosecuting the patent. Home
`
`Diagnostics, Inc., v. Ltfescen, Inc, 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
`
`specification, a patent applicant may define a term in prosecuting a patent”).
`
`Although extrinsic evidence can be useful, it is “less significant than the intrinsic record in
`
`determining the legally operative meaning of claim language.” Phillips, 415 F .3d. at 1317 (quoting
`
`CR. Bard. Inc, 388 F.3d at 862). Technical dictionaries and treatises may help a court understand
`
`the underlying technology and the manner in which one skilled in the art might use claim terms, but
`
`technical dictionaries and treatises may provide definitions that are too broad or may not be
`
`indicative of how the term is used in the patent. Id. at 1318. Similarly, expert testimony may aid
`
`3of35
`
`
`
`Case B:0T—cv—O0080-LED Document 246
`
`Filed 07/30/09 Page 4 of 35
`
`a court in understanding the underlying technology and determining the particular meaning of a term .
`
`in the pertinent field, but an expe1t’s conclusory, unsupported assertions as to a term’ s definition is
`
`entirely unhelpful to a cotnt. Id. Generally, extrinsic evidence is “less reliable than the patent and
`
`its prosecution history in detennining how to read. claim terms.” Id.
`
`CONSTRUCTION OF DISPUTED TERMS IN THE ‘135 PATENT”
`
`“virtual private network”
`
`The ‘l35 patent, claims 1 and 10; the ‘759 patent, claims 1 and 16; and the ‘LS0 patent,
`
`claims 1, 17, and 33 contain the term “virtual private network" (“VPN”). VirnetX contends that
`
`“virtual private network" means “a network of compu ters capable ofpriv ately communicating with
`
`each other by encrypting traffic on insecure corninuznication paths between the computers, and which
`
`is capable of expanding to include additional computers and communication paths." Microsoft
`
`contends that “virtual private network” means “a network implemented by encapsulating an
`
`encrypted [P packet within another IP packet (that is, tunneling) over a shared networking
`
`infrastructure."° The parties dispute whether the “FreeS/WAN" dictionary may be used to construe
`
`“virtual private network,” whether VirnetX’s proposed construction is overly broad, Whether “virtual
`
`private network” requires anonymity, and Whether IP tunneling is a limitation on “virtuai private
`
`network.” In light of intrinsic and extrinsic evidence, the Court construes “virtual private network”
`
`as “a network of computers which privately communicate with each other by encrypting traffic on
`
`insecure cornniunication paths between the computers.”
`
`‘While this heading states “Construction of Disputed Terms in the ‘.735 Pa.ten.r,” the ctairn terms addressed
`under this heading may also be found in the other asserted patents. This also applies to subsequent headings.
`
`2Citarions to the patents will not include the U.S. patent numbers to maintain brevity. Unless otherwise
`stated, these citations are of the 13.5. patent numbers indicated in the heading that the citation falls under.
`
`4
`
`4of35
`
`
`
`Case 6:07—cV—OOO80—LED Document 246
`
`Fiied O7/3DfU9 Page 5 of 35
`
`The ‘135 patent does not provide an explicit definition for “virtual private network.”
`
`However, the ‘l35 patent uses “virtual private networ ” in ways that are consistent with a “virtual
`
`private network” being “a network of computers which privately communicate with each other by
`
`encrypting traffic on insecure communication paths between the computers.” The specification
`
`discusses a VPN in the context of connectin g and corninunicating between nodes. For instance, the
`
`specification states, “In. a second mode referred to as ‘promiscuous per VPN‘ mode, a small set of
`
`fixed hardware addresses are used, with a fixed source/destinatiori hardware address used for all
`
`nod.es cornrnunicating over a virtual private network." Col. 23:11-14. This excerpt shows that the
`
`‘ 135 invention includes nodes (computers) communicating over a virtual private network.
`
`Furthermore,
`
`the claims and M specification discuss a VPN in the context of private
`
`communication on insecure coirnnunication paths. Claim 1 states “A method of transparently
`
`creating a virtuai private network (VPN) between a ciient computer and a target computer” and then
`
`states the steps of accomplishing this method including “requesting access to a secure web site.”
`
`Col. 47:20-22, 3031. Thus, claim 1 associates a “virtual private network" with “security.” Also,
`
`the specification states, “If the user is not authorized to access the secure site, then a ‘host unknown’
`
`message is returned (step 2705). If the user has sufficient security privileges, then in step 2706 a
`
`secure VPN is established between the user’s computer and the secure target site.” Col. 39:21:25.
`
`This excerpt shows how a “virtual private network” establishes a secure connection between nodes
`
`where security may not otherwise exist. Thus, the claim language and the specification are
`
`consistent with construing a “virtual private network” as “a network of computers which privately
`
`communicate with each other by encrypting traffic on insecure communication paths between the
`
`computers.”
`
`50f35
`
`
`
`Case 6:0T—cv—OOO80—LED Document 245
`
`Fiied O?/30f09 Page 6 of35
`
`Extrinsic evidence also supports this construction. The Wiley Electrical and Electronics
`
`Engineering Dictionary defines a “virtual private network” as
`
`A netvvorlc which has the app earance, functionaiity, and s ecurity o fa private network,
`but which is configured. within a public network, such as the Internet. The use of a
`public infrastructure while ensuring privacy using measures such as encryption and
`tunneiing protocols, helps provide the security of a private network at a cost similar
`to that of a public network.
`
`WILEY ELECTRICAL AND ELECTRONTCS ENGINEERING DICTIONARY 842 (2004) (pubtislied by the
`
`TEEE Press). This dictionary definition describes a network that has attributes of a private network
`
`but runs on a public network. The dictionary definition further states that encryption may be used
`
`to achieve privacy. The Court’s construction is in line with this definition. All pertinent aspects of
`
`the Court‘s construction are explicitly found in the dictionary definition except for “insecure
`
`corninunication paths," which simply corresponds to the dictionary detinitioifs reference to “a public
`
`network.” Thus, the Court’s Construction is in accord with the dictionary definition.
`
`Also,
`
`the ‘ 135 patent refers to the “FreeSfWAN" project in the specification. The
`
`specification explains that the “FreeS/WAN” project is developing a conventional scheme that
`
`provides secure virtual private networks over the Luternet. Col. 37:50-58. The “FreeSfWAN”
`
`project defines “virtual private network” as “a network which can safelybe used as ifit were private,
`
`even though some ofits connnunication uses insecure connections. All traffic on those connections
`
`is encrypted.” “FreeS/WAN” Glossary 24-25, Pl. Br. (Docket No. 194) EX. 6. The Court’s
`
`Construction is consistent with this definitio:1.3
`
`3The Court‘s construction largely adopts VimetX’s proposal. However, this construction excludes
`V'i.metX‘s proposed language regarding the ability of a virtual private network t.o expand. Virnetx proposes this
`language to account for the possibiiity of including additional computers and communication paths in a virtual
`private network. Plfs Br. 6. The Court’s construction does not limit a “virtual private networl-L" to any particular
`number of computers or communication paths. Thus, VirnetX“s proposed language is superfluous. Accordingly, the
`Court’s construction accounts for the possibility of additional computers or communication paths.
`
`6
`
`6of35
`
`
`
`Case 6:07~cv~O008{)~LED Document 246
`
`Filed OTIBOIOQ Page 7’ of 35
`
`Microsoft contends that the “EreeSfWAN” glossary is not an explicit definition of “virtual
`
`private networlt” and thus is not persuasive. Microsoft argues that the ‘B5 patent’s reference to the
`
`“PreeS /WAN” project is made only to describe the prior art and not to define “virtual private
`
`network.” However, the specification explains that the “FreeS/WAN" project has been developing
`
`an implementation of one conventional scheme that provides secure virtual private networks over
`
`the Internet. Col. 37:50-58. Also, the applicant disclosed the “FreeS/WAN” project as prior art.
`
`See Deffs Br. (Docl(etNo. 201} Exs. M—0. While these references to the “FreeS/WAN” pro} ect do
`
`not explicitly define “virtual private network," they at least point to extrinsic evidence that can be
`
`considered in construing “virtual privatenetwork.” Thus, the Court may considerthe “Free 8/WAN”
`
`project/glossary as extrinsic evidence for constiuing “virtual private network.”
`
`Microsoft aiso contends that even if the “FreeS/WAN” glossary offers an acceptable
`
`definition for “virtual private network,” portions of the “FreeS/WAN" glossary definition show that
`
`VirnetX’s proposed construction is overly broad. Microsoft cites the portion of the °‘FreeS/WAN”
`
`glossary definition for “virtuai private networks” that states “ESEC [Internet Protocot Security] is
`
`not the only technique available for building VPNS, but it is the only method defined by RFCs
`
`[Request for Comments, Internet documentswsome of which are informative while others are
`
`standards] and supported by many vendors. VPNs [virtual private networks] are by no means the
`
`only thing you can do with IPSEC, but they may be the most important appiication for many users.”
`
`Def.°s Br. (Docket No. 201) at 10; “FreeS/WAN” Glossary 25, Pl. Br. (Docket No. 194) EX. 6.
`
`Microsoft points out that IPSEC is the only method defined by RFCs and supported by many
`
`vendors. Microsoft argues that this narrow language shows thatthe “FreeS/WAN” glossary does not
`
`identity Secure Sockets Layer (“SSL") or Transport Layer Security (“TLS") as methods for building
`
`7of35
`
`
`
`
`
`Case 6‘.07—CV—OO080—LED Document 246
`
`Filed 07/30/09 Page 8 of 35
`
`“virtual private networks.” Microsoft then argues that VirnetX’s proposed construction is overly
`
`broad because it allows for a network using SSL and TLS. However, Microsoft’s cited excerpt is
`
`an ancillary portion of the “virtual private network" definition and is set apart in a different
`
`paragraph from the primary portion of the definition. See ‘”FreeS/WAN" Glossary 24-25, Pi. Br.
`
`(Docket No. 194} Ex. 6. Also, Microsoft selectively asserts that IPSEC is the only method defined
`by RFCs and supported by many vendors and ignores that its cited excerpt states that “IPSECT is not
`
`the only technique available for building VPNS.” Thus, Microsoffis cited excerpt does not support
`
`that t11e “Frees!WAN” glossary restricts “virtual private network” to IPSEC.
`
`Microsoft also contends that Vii-netX’s proposed construction suggests that the “virtual
`11
`
`private networ
`
`achieves oniy data security when it should include both data security and
`
`anonymity. Microsoft is correct that “private" in “virtual private networks" means both data security
`
`and anonymity. The specification supports this interpretation. The Background of the Invention
`
`section states “[a] tremendous variety of methods have been proposed and iinpleniented to provide
`
`security and anonyinity for cornmunications over the Internet.” Col. 1:15»1 7. This section further
`
`describes data security as being “irninune to eavesdropping” and states “[d]ata security is usually
`
`tackled using some form of data encryption” and anonyinity as “preventing[ing] an eavesdropper
`
`from discovering that terminal 100 is in conzununicatioii with terminal 110.” Coi. 1:23-25, 38-39,
`
`27-28. This ianguage suggests that the claimed invention will achieve both data security and
`
`anonymity because it prefaces the Detailed Description of the Invention section, which describes a
`
`method of creating a virtual private network.
`
`Indeed, the descriptions of the invention later indicate that “private” in “virtual private
`
`networ ” rneans data security and anonymity. The Detaiied Description of the Invention, Further
`
`8of35
`
`
`
`
`
`
`
`Case 8:07—ev—O008D—LED Document 246
`
`Filed 07/30/09 Page 9 of 35
`
`Extensions section describes a mode of the invention as being able to “reduce the amount of
`
`overhead involved in checking for vaiid frames” while allowing “ll” addresses .
`
`.
`
`. [to] still be hopped
`
`as before for secure cornrnunication within the VPN.” Col. 23:20—25 {emphasis added). The
`
`“anonyniity” feature of a VPN can be handled by the Tnnneled Agile Routing Protocol (“TARP”),
`
`which executes “address hopping.” See Col. 2: 66-3: 17; see Col. 5:49-64. Thus, the language “still
`
`be hopped.” indicates that the modifications of the invention retain the anonymity feature of the
`
`“virtual private network.”4 Accordingly, the Court co nstrues “virtual private networic” as requiring
`
`both data security and anonymity.
`
`Finally, Microsoft contends that “virtual private network“ requires ll’ tunneling. Microsoft
`
`argues that the intrinsic evidence shows that TARP and IPSEC are two ways ofobtaj ning anonymity
`
`in a virtual private network. Microsoft then argues that tunneling is required to achieve anonymity
`
`when TARP, IPSEC, or any other means is employed to achieve anonyrnity. The Court first and
`
`foremost considers the intrinsic evidence. The claims do not assert “tunneling” as a limitation nor
`
`has Microsoft pointed to any type of lirnitation in the specification. Microsoft’s citations to the
`
`Background of the Invention section only state explanations ofhow TARP works and does not use
`
`any limiting language. See Col. 315-18, l9~20, 5860. Furthermore, Microsoft’s citation to the
`
`Detaiied Description of the Invention, Further Extensions section only refers to a preferred
`
`implementation of the virtual private network, stating “The VPN is preferably implemented using
`
`. compromises the anonymity
`.
`4WhiJe the specification states that this mode of the invention “[o}f course .
`of the VPNs," this only means that those outside the VPN can discover the VPN and does not mean that the
`anonymity ofthe users within the VPN is compromised. This is clear from the example that follows the
`“compromising anonymity of the VPN" statement: “{i.e., an outsider can easily tell What traffic belongs in which
`VPN, though he cannot r.-orre:’are it to a specific niacliiire/pers0r1).” Col. 23:25-2.8 (emphasis added). Thus, the
`specification is consistent with construing a "virtual private network" as achieving both data security and anonymity.
`
`9of35
`
`
`
`
`
`
`
`Case 6:D7—cv-0OO8U—LED Document 246
`
`Filed 0780/09 Page 10 of 35
`
`the IP address ‘hopping’ features of the basic invention described above, such that the true identity
`
`of the two nodes cannot be determined even if packets during the connnunication are intercepted."
`
`Col. 38 :2—6. Again, this excerpt does not include any iitniting language and in fact expressly uses
`
`the non—lirniting language “preferably.” Accordingly, “virtual private network” is not limited to IP
`
`tunneling, and the Court construes “virtual private network" as “a network of computers which
`
`privately communicate with each other by encrypting traffic on insecure communication paths
`
`between the computers.”
`
`“transparently creating [creates] a virtual private network”
`
`The ‘135 patent, claims 1 and 10 containthe phrase “transparently creating [creates] avirtuai
`
`private network." The parties dispute whether “transparently creating a virtual private network” in
`
`the preamble is limiting and whether “transparently” refers to not involving a user or not involving
`
`the client and target computers in creating a virtual private network. VirnetX contends that this
`
`phrase means “a user need not be involved in creating a virtual private network.” Microsoft
`
`contends that the phrase does not require construction and altematively that the phrase means
`
`“creating a vi_rtual private network (VPN) Without the client or target coinputer involved in
`
`requesting such creation."
`
`“Transpare11tiy creating a virtual private network” in the preamble is not a limitation because
`
`‘_‘transparently" does not aid meaning to claims 1 and 10. “A preamble limits the invention if it
`
`recites essential structure or steps, or if it is ‘necessary to give life, meaning, and vitality‘ to the
`
`claim. Conversely, a prearnbie is not limiting ‘where a patentee defines a structurally complete
`
`invention in the claim body and uses the preamble only to state a purpose or intended use for the
`
`invention?” Catalina Mlctg. Int'l, Inc. v. Coolsavingscom, Inc, 289 F.3d 801, 808 (Fed. Cir. 2002)
`
`10
`
`10 0f35
`
`
`
`Case 6:OT~cv—OUU80—LED Document 246
`
`Filed OTIBO/09 Page 11 of 35
`
`(citations omitted}.
`
`If a prearnble “is reasonably susceptible to being construed to be niereiy
`
`duplicative of tlie limitations in the body of the claim {and was not clearly added to overcome a
`
`rejection), we do not construe it to be a separate limitation.” Symanzec Corp‘ v. Computer Assocs.
`
`Int‘l, Inc, 522 F.3d 1279, l288v89 (Fed. Cir. 2008). “Transparent.ly” is merely descriptive of what
`
`is found in steps (2) and (3) of claim 1. As discussed below, those steps require that a user is not
`
`involved in creating a VPN. This requirement corresponds to the meaning of “transparently” as
`
`described in the specification, which states that creating a VPN “is preferably performed
`
`transparently to the user (i.e., the user need not be involved in creating the secure linl<).” Col. 39:28-
`
`29. Thus, “transparently” is merely duplicative ofwhat is found in the body of claim 1. As a result,
`
`the preamble is not a limitation. Accordingly, “trauspare11t1y" does not require construction.
`
`“Domain Name Service”
`
`The ‘ 135 patent, clairusil and 10 and the ‘180 patent, claims 1, 17‘, and 33 contain the term
`
`“Domain Name Service” (“DNS”). VirnetX contends that “Domain Name Service” means “a
`
`service that receives requests for computer network addresses corresponding to domain names, and
`
`which provides responses.” Microsoft contends that “Domain Name Service” means “the
`
`conventional Eookup service defined by the Internet Engineering Task Force (“lIETF"’) that returns
`
`the LP address of a requested computer or host.” The parties dispute whether “Dornain Name
`
`Service” is limited by the definition given in the lETF that defines Domain Name Service as the
`
`conventional scheme or if it more broadly includes both conventional and modified Domain Name
`
`Service that is described in the specification.
`
`The specificatioifs description of DNS is consistent with construing DNS as “a lookup
`
`service that returns an IP address for a requested domain name." The specification states
`
`11
`
`ll of35
`
`
`
`
`
`
`
`Case 6:0?—cV—DOO80-LED Document 246
`
`Filed 07/30/09 Page 12 of 35
`
`Conventional Domain Name Servers (fDNSs) provide a look-up function that returns
`the IE’ address of arequested computer or host. For example, when a computer user
`types in the web name “Yahoo.com,” the user’s web browser transmits a request to
`a DNS, which converts the name into a fourvpart IP address that is returned to the
`user‘s browser and then used by the browser to contact the destination web site.
`
`Col. 37:22—29. According to this excerpt, a DNS “provides a lookwup function” and “returns the H’
`
`address of a requested computer or host.” A “computer or host” includes domain names as
`
`exemplified by the specification’s reference to “Yalioocom” and “destination web site” as “a
`
`requested computer or host.” Accordingly, the Court constzues “DNS” as “a lookup service that
`
`returns an IP address for a requested domain r1arr1e.”5
`
`“domain name.”
`
`The ‘BS patent, claims 1 and 10 and the ‘l80 patent, claims 1, 17, and 33 contain the term
`
`“dornain name.” VirnetX contends that “domain name” means “a series of characters that
`
`corresponds to an address of a computer or group of computers that is to be sent to a domain name
`
`service (DNS).” Microsoft contends that “domainnanie” means “a hierarchical name for a computer
`
`(such as WWW.utexas.edu) that the Domain Name Service converts into an IP address." The parties
`
`dispute whether “domain name” can correspond to a group of computers or only a single computer,
`
`whether “domain name” is a hierarchical name for a computer, whether “domain name” is limited
`
`to web site names, and Whether “domain name" is limited to a computer name being converted into
`
`an IP address.
`
`The claims themselves describe “domain name.” Claim 1 states “a Domain Name Service
`
`(DNS) request that requests an IP address corresponding to a domain name associatedwith the target
`
`computer.” Col. 47:23-26. Also, claim 10 states “a DNS proxy server that receives a request from
`
`5See below for the Court’s construction of‘”dcrnair1 name.”
`
`12
`
`12 of35
`
`
`
`Case 6:O7—cv-0OO80—E_ED Document 246
`
`Filed 0780/09 Page 13 of 35
`
`the client computer to look up an IP address for a domain name.” Col. 4826-7. In both claim l and
`
`claim ‘:0 an IP address corresponds to a domain name. Thus, the domain name corresponds to an
`
`IP address. Accordingly, the Court construes “domain name” as “a name corresponding to an IP
`
`address."
`
`VimetX proposes that “domain name” corresponds to a group of computers (IP addresses)
`
`or a single computer because ciaims 1 and 10 of the ‘l35 patent refer to IP address using the
`
`indefinite article “an.” The Federal Circuit has stated,
`
`An indefinite article ‘a’ or ‘an’ in patent parlance carries the meaning of ‘one or
`more’ in open ended claims containing the transitionai phrase ‘cornpn'sing.”’ That
`“a” or “an” can mean “one or more" is best described as a rule, rather than merely as
`a presumption or even a convention. The exceptions to [the “indefinite article”] rule
`are extremely limited: at patentee must “evince { ] a clear intent” to limit “a” or “an”
`to “one." The subsequent use of definite articles “the” or “said” in a ciaiin to refer
`back to the same claim term does not change the general plural rule, but simply
`reinvokes that non—singular meaning. An exception to the general rule that “a” or
`“an" means more than one only arises where the language of the claims themselves,
`the specification, or the prosecution history necessitate a departure from the rule.
`
`Baldwin Graphic Sysz, Inc, v. Siebert, Inc, 512 F.3d i338, 1342413 (Fed. Cir. 2008) {citations
`
`omitted). Claims 1 and 10 of the ‘135 patent are open—ended construction claims using the word
`“cornprising” and use the indefinite a1ticie“an” to refer to “IP address." See Col. 47:20-26; see Col.
`
`48 23-7. By the “one or more” rule, these claims aiiow for one or more IP addresses. Any subsequent
`
`use of the definite article “the” to refer to “IP address" simply refers back to the previously used “IP
`
`address” and thus reinvokes the non—singular meaning. See Col. 47:39-40; see Co}. 48:8. Microsoft
`
`does not assert any evidence to show that an exception to the “one or more” rule exists. Thus, there
`
`may be more than one IP address, and thus more than one computer, that corresponds with the
`
`domain name. This would allow for a situation Where the IP address that corresponds to the domain
`
`
`
`13
`
`13 of35
`
`
`
`Case 6:07—cv—00O80—LED Document 246
`
`Filed 07f30l09 Page 14 of 35
`
`name is not the [P address of the target computer. See Col. 38:23 -42. Accordingly, “domain name”
`
`can correspond to more than one computer.
`
`Microsoft contends that the patents limit “domain name” to a hierarchical name for a
`
`computer under traditional hierarchical DNS format. However, Microsoft relies largely on extrinsic
`
`evidence—including expert testimony and Microsoft’s own technology tutorial——to support its
`
`contentions, which does not carry great weight in light of the fact that claim language provides
`
`guidance on the meaning of “domain name.” Also, where Microsoft uses intrinsic evidence for
`
`support, Microsoft only refers to non—lirniting language from the specification. For instance,
`
`Microsoft suggests that the examples used in the specification for domain names, which include
`
`“Yai1oo.com" and “Target.co1n,” show that the patents use “domain naine” in its traditional
`
`hierarchical DNS fonnat. Microsoft further suggests that “domain name” is limited to a traditional
`
`hierarchical name because the patents do not provide a single example of “domain name” that is not
`
`written in traditional hierarchical DNS fonnat. However, Microsoft argues only the presence and
`
`absence of examples rather than any enforceable language of limitation. The specification’s
`
`disclosure or omission of examples does not create limitations on claims. Accordingly, Microsoft
`
`does not offer sufficient support for limiting “domain name” to a hierarchical name for a computer.
`
`Microsoft also contends that the patents limit “domain name” to web site names. However,
`
`no such limitation is found in the claims, and Microsoft merely references its arguments on
`
`construing “web site” without showing how “domain name” is necessarily linked to web sitenames.
`
`Accordingly, “domain name” is not limited to web site names.
`
`Finally, Microsoft contends that “domain name” is limited to a computer name being
`
`converted into an IP address. Microsoft supports this propo sed limitation by arguing that a “dotnairi
`
`14
`
`14 0f35
`
`
`
`Case 6107-0‘./—OOO80—LED Document 246
`
`Fiied 07/30/09 Page 15 of 35
`
`name" has the capacity to be converted by BN8 into an IP address and that the specification
`
`emphasizes this point by describing that identical DNS requests may result in conventional domain
`
`name resolution, “host unknown” error messages, or VPN initiation, depending not on Whether
`
`something is a “domain name” but on what type of web Site was requested. However, Microsoft
`
`incorrectly argues that a “capacity” to be converted by DNS into an IP address demonstrates a
`
`required limitation. A mere capacity to perform an act does not make that act necessary. Thus,
`
`Microsoft has not sufficiently supported limiting “domain name” to a computer name being
`
`converted into an IP address. Accordingly, the Court construes “domain name” as “a name
`
`corresponding to an 1? address.”
`
`“web site”
`
`The ‘I35 -patent, claims 1 and 10 contain the term “web site.” VirnetX contends that
`
`construing “secure web site” as addressed below sufficiently addresses the meaning of “web site”
`
`and that “Web site” does not require further construction. Alternatively, VirnetX contends that “web
`
`site" means “a computer associated with a domain name and that can communicate in a network.”
`
`Microsoft contends that “web site” means “one or more related web pages at a location on the World
`
`Wide Web.” The parties dispute whether “web site” should be given a construction separate from
`
`“secure web site” and whether “web site” is limited to web pages on the World Wide Web. T
`
`VirnetX argues that “web site” should not be construed separately from “secure web site”
`
`because the ‘ 135 patent claims never state “Web site” Without the preceding Word “secure.”
`
`However, “secure" is separable from “web site” as a modifier of “web site.” The claims Show that
`
`“secure” can be replaced by other modifiers to “web site.” Claims I and 10 of the ‘135 patent refer
`
`to “web site” preceded by “non-secure” and “secure target.” Co}. 47:28, 30; C01. 48:10, 14. This
`
`15
`
`15 of35
`
`
`
`
`
`
`
`
`
`Case 6:O7—cV—CrG080—LED Document 246
`
`Filed 07/30/09 Page 16 of 35
`
`demonstrates that “web site” can be separated horn its modifier and thus is its own term separate
`
`from “secure,” Thus, “web site" may be construed as its own claim term.
`
`The Court adopts Microsoft’s construction and construes “web site” as “one or more related
`
`web pages at a location on the World Wide Web.” The patent does not state a definition for “web
`
`site.” However, the term itself is instructive. “Web site” on its face refers to a “web” Internet
`
`resource, which is a Web page on the World Wide Web. The specification is consistent with
`
`construing “web site” as a Web page on the World Wide Web. Examples of web sites in the
`
`specification are “Yahoo.co1n" and “Target.corn.” Col. 3725,45. “Yahoo.corn" and “Target.com”
`
`are wellvlcnowri web pages on the World Wide Web. See Yahoo! Home Page, www.Yahoo.corr1;
`
`see Target Home Page, www. 'Earget.co1n. Also, the specification states that a “web browser” can
`
`be used to access a “web site." Col. 39:48, 50-51, 55; C01. 40:1, 38.
`
`It is well—known that a “web
`
`browser” is used to navigate “Web pages” on the World Wide Web. Thus, the intrinsic evidence
`
`supports Microsoft’s proposed construction.
`
`Furthermore, extrinsic evidence supports Microsoft‘s construction. The World Wide Web
`
`Consortium, an industry sta.nclards—serti11g organization for the World Wide Web, defined web site
`
`as “[21] collection of interiinked Web pages, including a host page, residing at the same network
`
`location.” Brian Lavoie 85 Henrik Frystyk Nielsen, Web Characterization Teminologji
`
`<53:
`
`Definitiozas Sheer, W3 C Working Draft {May 24, 1999) at 9, Deffs Resp. (Docket No. 201), Ex. X
`
`{emphasis removed). This definition is consistent with industry dictionaries, which define a web site
`
`as “A collection of logically connected Web pages managed as a single entity” and “A group of
`
`HTML doc-umeiits and associated scripts supported by a Web server o