throbber
VIRNETX EXHIBIT 2001
`Apple v. VirnetX
`Trial IPR2015-00813
`
`

`
`Case B:07—cv—0OO80—LED Document 246
`
`Filed 07/30/09 Page 2 of 35
`
`APPLICABLE LAVV
`
`“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to
`
`which the patentee is entitled the right to exclude.” Phillips ‘.2. A WH Corp., 415 F.3d 1303, 1312
`
`(Fed. Cir. 2005) (en bane) (quoting Ixmova/Pure Water Inc. v. Safari I/Vzzrer Fi..’rraz‘r'cn .S3.=,r., Inc. , 3 81
`
`F.3d 1111, 1115 (Fed. Cir. 2004)).
`
`In claim construction, courts examine the patent’s inttinsic
`
`evidence to define the patented invention’s scope. Sec ial; CR. Bard, Inc. V. US. Surgical Corp,
`
`388 F.3d 85 8, 861 (Fed. Cir. 2004); Bei’lAtI. Ne1‘w0i'kServS., Inc. v. Covczd Commc ’ns Group, Inc,
`
`262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes the claims themselves, the
`
`specification, and the prosecution history. See Phillips, 415 F.3d at 1314; CR. Bard, Inc, 388 F.3d
`
`at 861. Courts give claim terms their ordinary and accustomed meaning as understood by one of
`
`ordinary skill in the art at the time of the invention in the context of the entire patent. Pltillips, 415
`
`F.3d at 131243; Ailoc, Inc. v. Int '1 Trade Comm '11, 342 F.3d 1361, 1368 (Fed. Cir. 2003).
`
`The claims themselves provide substantial guidance in determining the meaning ofparticular
`
`claim terms. Phillips, 415 F.3d at 1314. First, a term’s context in the asserted claim can be very
`
`instructive. Id. Other asserted or unasserted claims can also aid in deteimining the claim’s meaning
`
`because claim terms are typically used consistently throughout the patent. Id. Differences among
`
`the claim terms can also assist in understanding a tem1‘s meaning.
`
`Id. For example, when a
`
`dependent claim adds a limitation to an independent claim, it is presumed that the independent claim
`
`does not include the limitation. Id. at 1314-15.
`
`“[C]la§ms ‘must be read in View of the specification, cfwhich they are a part,’” Id. (quoting
`
`Markman. 12, Westview Instruments, Inc, 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc)). “[T]he
`
`specification ‘is always highly relevant to the claim construction analysis. Usually, it is dispositive;
`
`2of35
`
`
`
`
`
`
`
`

`
`Case 6:07-cv—OO080—LED Document 246
`
`Filed 07/30/09 Page 3 of 35
`
`it is the single best guide to the meaning of a disputed tenn.” Id. (quoting Virronics Corp. v.
`
`Conceptrorzic, Inc, 90 F.3d 15 76, 1582 (Fed. Cir. 1996)); Teleflex, Inc. v. Fic:0saN. Am. Com, 299
`
`F.3d 1313, 1325 (Fed. Cir. 2002). This is true because a patentee may define his own terms, give
`
`a claim term a different meaning than t.he term would otherwise possess, or disclaim or disavow the
`
`claim scope. Phillips, 415 F.3d at 1316.
`
`In these situations, tl1einventor’s lexicography governs.
`
`Iof. Also, the specification may resolve ambiguous claim terms “where the ordinary and accustomed.
`
`meaning ofthe Words used in the claims lack sufficient clarity to permit the scope ofthe claim to be
`
`ascertained from the words alone.” Teleflex, 1110., 299 F3 01. at 1325. But, “‘ [a]1thongh the
`
`specification may aid the court in interpreting the meaning of disputed claim language, particular
`
`embodiments and examples appearing in the specification will not generally be read into the
`
`claims.” Comarfc Comma ’ns, Inc. 12. Harris Corp, 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting
`
`Constant 12. AdvancedMicro~Devica9, Inc, 848 F.2d 1560, 1571 (Fed. Cir. 198 8)); See also Philfips,
`
`415 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim
`
`construction because a patent applicant may also define a term in prosecuting the patent. Home
`
`Diagnostics, Inc., v. Ltfescen, Inc, 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
`
`specification, a patent applicant may define a term in prosecuting a patent”).
`
`Although extrinsic evidence can be useful, it is “less significant than the intrinsic record in
`
`determining the legally operative meaning of claim language.” Phillips, 415 F .3d. at 1317 (quoting
`
`CR. Bard. Inc, 388 F.3d at 862). Technical dictionaries and treatises may help a court understand
`
`the underlying technology and the manner in which one skilled in the art might use claim terms, but
`
`technical dictionaries and treatises may provide definitions that are too broad or may not be
`
`indicative of how the term is used in the patent. Id. at 1318. Similarly, expert testimony may aid
`
`3of35
`
`

`
`Case B:0T—cv—O0080-LED Document 246
`
`Filed 07/30/09 Page 4 of 35
`
`a court in understanding the underlying technology and determining the particular meaning of a term .
`
`in the pertinent field, but an expe1t’s conclusory, unsupported assertions as to a term’ s definition is
`
`entirely unhelpful to a cotnt. Id. Generally, extrinsic evidence is “less reliable than the patent and
`
`its prosecution history in detennining how to read. claim terms.” Id.
`
`CONSTRUCTION OF DISPUTED TERMS IN THE ‘135 PATENT”
`
`“virtual private network”
`
`The ‘l35 patent, claims 1 and 10; the ‘759 patent, claims 1 and 16; and the ‘LS0 patent,
`
`claims 1, 17, and 33 contain the term “virtual private network" (“VPN”). VirnetX contends that
`
`“virtual private network" means “a network of compu ters capable ofpriv ately communicating with
`
`each other by encrypting traffic on insecure corninuznication paths between the computers, and which
`
`is capable of expanding to include additional computers and communication paths." Microsoft
`
`contends that “virtual private network” means “a network implemented by encapsulating an
`
`encrypted [P packet within another IP packet (that is, tunneling) over a shared networking
`
`infrastructure."° The parties dispute whether the “FreeS/WAN" dictionary may be used to construe
`
`“virtual private network,” whether VirnetX’s proposed construction is overly broad, Whether “virtual
`
`private network” requires anonymity, and Whether IP tunneling is a limitation on “virtuai private
`
`network.” In light of intrinsic and extrinsic evidence, the Court construes “virtual private network”
`
`as “a network of computers which privately communicate with each other by encrypting traffic on
`
`insecure cornniunication paths between the computers.”
`
`‘While this heading states “Construction of Disputed Terms in the ‘.735 Pa.ten.r,” the ctairn terms addressed
`under this heading may also be found in the other asserted patents. This also applies to subsequent headings.
`
`2Citarions to the patents will not include the U.S. patent numbers to maintain brevity. Unless otherwise
`stated, these citations are of the 13.5. patent numbers indicated in the heading that the citation falls under.
`
`4
`
`4of35
`
`

`
`Case 6:07—cV—OOO80—LED Document 246
`
`Fiied O7/3DfU9 Page 5 of 35
`
`The ‘135 patent does not provide an explicit definition for “virtual private network.”
`
`However, the ‘l35 patent uses “virtual private networ ” in ways that are consistent with a “virtual
`
`private network” being “a network of computers which privately communicate with each other by
`
`encrypting traffic on insecure communication paths between the computers.” The specification
`
`discusses a VPN in the context of connectin g and corninunicating between nodes. For instance, the
`
`specification states, “In. a second mode referred to as ‘promiscuous per VPN‘ mode, a small set of
`
`fixed hardware addresses are used, with a fixed source/destinatiori hardware address used for all
`
`nod.es cornrnunicating over a virtual private network." Col. 23:11-14. This excerpt shows that the
`
`‘ 135 invention includes nodes (computers) communicating over a virtual private network.
`
`Furthermore,
`
`the claims and M specification discuss a VPN in the context of private
`
`communication on insecure coirnnunication paths. Claim 1 states “A method of transparently
`
`creating a virtuai private network (VPN) between a ciient computer and a target computer” and then
`
`states the steps of accomplishing this method including “requesting access to a secure web site.”
`
`Col. 47:20-22, 3031. Thus, claim 1 associates a “virtual private network" with “security.” Also,
`
`the specification states, “If the user is not authorized to access the secure site, then a ‘host unknown’
`
`message is returned (step 2705). If the user has sufficient security privileges, then in step 2706 a
`
`secure VPN is established between the user’s computer and the secure target site.” Col. 39:21:25.
`
`This excerpt shows how a “virtual private network” establishes a secure connection between nodes
`
`where security may not otherwise exist. Thus, the claim language and the specification are
`
`consistent with construing a “virtual private network” as “a network of computers which privately
`
`communicate with each other by encrypting traffic on insecure communication paths between the
`
`computers.”
`
`50f35
`
`

`
`Case 6:0T—cv—OOO80—LED Document 245
`
`Fiied O?/30f09 Page 6 of35
`
`Extrinsic evidence also supports this construction. The Wiley Electrical and Electronics
`
`Engineering Dictionary defines a “virtual private network” as
`
`A netvvorlc which has the app earance, functionaiity, and s ecurity o fa private network,
`but which is configured. within a public network, such as the Internet. The use of a
`public infrastructure while ensuring privacy using measures such as encryption and
`tunneiing protocols, helps provide the security of a private network at a cost similar
`to that of a public network.
`
`WILEY ELECTRICAL AND ELECTRONTCS ENGINEERING DICTIONARY 842 (2004) (pubtislied by the
`
`TEEE Press). This dictionary definition describes a network that has attributes of a private network
`
`but runs on a public network. The dictionary definition further states that encryption may be used
`
`to achieve privacy. The Court’s construction is in line with this definition. All pertinent aspects of
`
`the Court‘s construction are explicitly found in the dictionary definition except for “insecure
`
`corninunication paths," which simply corresponds to the dictionary detinitioifs reference to “a public
`
`network.” Thus, the Court’s Construction is in accord with the dictionary definition.
`
`Also,
`
`the ‘ 135 patent refers to the “FreeSfWAN" project in the specification. The
`
`specification explains that the “FreeS/WAN” project is developing a conventional scheme that
`
`provides secure virtual private networks over the Luternet. Col. 37:50-58. The “FreeSfWAN”
`
`project defines “virtual private network” as “a network which can safelybe used as ifit were private,
`
`even though some ofits connnunication uses insecure connections. All traffic on those connections
`
`is encrypted.” “FreeS/WAN” Glossary 24-25, Pl. Br. (Docket No. 194) EX. 6. The Court’s
`
`Construction is consistent with this definitio:1.3
`
`3The Court‘s construction largely adopts VimetX’s proposal. However, this construction excludes
`V'i.metX‘s proposed language regarding the ability of a virtual private network t.o expand. Virnetx proposes this
`language to account for the possibiiity of including additional computers and communication paths in a virtual
`private network. Plfs Br. 6. The Court’s construction does not limit a “virtual private networl-L" to any particular
`number of computers or communication paths. Thus, VirnetX“s proposed language is superfluous. Accordingly, the
`Court’s construction accounts for the possibility of additional computers or communication paths.
`
`6
`
`6of35
`
`

`
`Case 6:07~cv~O008{)~LED Document 246
`
`Filed OTIBOIOQ Page 7’ of 35
`
`Microsoft contends that the “EreeSfWAN” glossary is not an explicit definition of “virtual
`
`private networlt” and thus is not persuasive. Microsoft argues that the ‘B5 patent’s reference to the
`
`“PreeS /WAN” project is made only to describe the prior art and not to define “virtual private
`
`network.” However, the specification explains that the “FreeS/WAN" project has been developing
`
`an implementation of one conventional scheme that provides secure virtual private networks over
`
`the Internet. Col. 37:50-58. Also, the applicant disclosed the “FreeS/WAN” project as prior art.
`
`See Deffs Br. (Docl(etNo. 201} Exs. M—0. While these references to the “FreeS/WAN” pro} ect do
`
`not explicitly define “virtual private network," they at least point to extrinsic evidence that can be
`
`considered in construing “virtual privatenetwork.” Thus, the Court may considerthe “Free 8/WAN”
`
`project/glossary as extrinsic evidence for constiuing “virtual private network.”
`
`Microsoft aiso contends that even if the “FreeS/WAN” glossary offers an acceptable
`
`definition for “virtual private network,” portions of the “FreeS/WAN" glossary definition show that
`
`VirnetX’s proposed construction is overly broad. Microsoft cites the portion of the °‘FreeS/WAN”
`
`glossary definition for “virtuai private networks” that states “ESEC [Internet Protocot Security] is
`
`not the only technique available for building VPNS, but it is the only method defined by RFCs
`
`[Request for Comments, Internet documentswsome of which are informative while others are
`
`standards] and supported by many vendors. VPNs [virtual private networks] are by no means the
`
`only thing you can do with IPSEC, but they may be the most important appiication for many users.”
`
`Def.°s Br. (Docket No. 201) at 10; “FreeS/WAN” Glossary 25, Pl. Br. (Docket No. 194) EX. 6.
`
`Microsoft points out that IPSEC is the only method defined by RFCs and supported by many
`
`vendors. Microsoft argues that this narrow language shows thatthe “FreeS/WAN” glossary does not
`
`identity Secure Sockets Layer (“SSL") or Transport Layer Security (“TLS") as methods for building
`
`7of35
`
`
`
`

`
`Case 6‘.07—CV—OO080—LED Document 246
`
`Filed 07/30/09 Page 8 of 35
`
`“virtual private networks.” Microsoft then argues that VirnetX’s proposed construction is overly
`
`broad because it allows for a network using SSL and TLS. However, Microsoft’s cited excerpt is
`
`an ancillary portion of the “virtual private network" definition and is set apart in a different
`
`paragraph from the primary portion of the definition. See ‘”FreeS/WAN" Glossary 24-25, Pi. Br.
`
`(Docket No. 194} Ex. 6. Also, Microsoft selectively asserts that IPSEC is the only method defined
`by RFCs and supported by many vendors and ignores that its cited excerpt states that “IPSECT is not
`
`the only technique available for building VPNS.” Thus, Microsoffis cited excerpt does not support
`
`that t11e “Frees!WAN” glossary restricts “virtual private network” to IPSEC.
`
`Microsoft also contends that Vii-netX’s proposed construction suggests that the “virtual
`11
`
`private networ
`
`achieves oniy data security when it should include both data security and
`
`anonymity. Microsoft is correct that “private" in “virtual private networks" means both data security
`
`and anonymity. The specification supports this interpretation. The Background of the Invention
`
`section states “[a] tremendous variety of methods have been proposed and iinpleniented to provide
`
`security and anonyinity for cornmunications over the Internet.” Col. 1:15»1 7. This section further
`
`describes data security as being “irninune to eavesdropping” and states “[d]ata security is usually
`
`tackled using some form of data encryption” and anonyinity as “preventing[ing] an eavesdropper
`
`from discovering that terminal 100 is in conzununicatioii with terminal 110.” Coi. 1:23-25, 38-39,
`
`27-28. This ianguage suggests that the claimed invention will achieve both data security and
`
`anonymity because it prefaces the Detailed Description of the Invention section, which describes a
`
`method of creating a virtual private network.
`
`Indeed, the descriptions of the invention later indicate that “private” in “virtual private
`
`networ ” rneans data security and anonymity. The Detaiied Description of the Invention, Further
`
`8of35
`
`
`
`
`
`

`
`Case 8:07—ev—O008D—LED Document 246
`
`Filed 07/30/09 Page 9 of 35
`
`Extensions section describes a mode of the invention as being able to “reduce the amount of
`
`overhead involved in checking for vaiid frames” while allowing “ll” addresses .
`
`.
`
`. [to] still be hopped
`
`as before for secure cornrnunication within the VPN.” Col. 23:20—25 {emphasis added). The
`
`“anonyniity” feature of a VPN can be handled by the Tnnneled Agile Routing Protocol (“TARP”),
`
`which executes “address hopping.” See Col. 2: 66-3: 17; see Col. 5:49-64. Thus, the language “still
`
`be hopped.” indicates that the modifications of the invention retain the anonymity feature of the
`
`“virtual private network.”4 Accordingly, the Court co nstrues “virtual private networic” as requiring
`
`both data security and anonymity.
`
`Finally, Microsoft contends that “virtual private network“ requires ll’ tunneling. Microsoft
`
`argues that the intrinsic evidence shows that TARP and IPSEC are two ways ofobtaj ning anonymity
`
`in a virtual private network. Microsoft then argues that tunneling is required to achieve anonymity
`
`when TARP, IPSEC, or any other means is employed to achieve anonyrnity. The Court first and
`
`foremost considers the intrinsic evidence. The claims do not assert “tunneling” as a limitation nor
`
`has Microsoft pointed to any type of lirnitation in the specification. Microsoft’s citations to the
`
`Background of the Invention section only state explanations ofhow TARP works and does not use
`
`any limiting language. See Col. 315-18, l9~20, 5860. Furthermore, Microsoft’s citation to the
`
`Detaiied Description of the Invention, Further Extensions section only refers to a preferred
`
`implementation of the virtual private network, stating “The VPN is preferably implemented using
`
`. compromises the anonymity
`.
`4WhiJe the specification states that this mode of the invention “[o}f course .
`of the VPNs," this only means that those outside the VPN can discover the VPN and does not mean that the
`anonymity ofthe users within the VPN is compromised. This is clear from the example that follows the
`“compromising anonymity of the VPN" statement: “{i.e., an outsider can easily tell What traffic belongs in which
`VPN, though he cannot r.-orre:’are it to a specific niacliiire/pers0r1).” Col. 23:25-2.8 (emphasis added). Thus, the
`specification is consistent with construing a "virtual private network" as achieving both data security and anonymity.
`
`9of35
`
`

`
`
`
`
`
`Case 6:D7—cv-0OO8U—LED Document 246
`
`Filed 0780/09 Page 10 of 35
`
`the IP address ‘hopping’ features of the basic invention described above, such that the true identity
`
`of the two nodes cannot be determined even if packets during the connnunication are intercepted."
`
`Col. 38 :2—6. Again, this excerpt does not include any iitniting language and in fact expressly uses
`
`the non—lirniting language “preferably.” Accordingly, “virtual private network” is not limited to IP
`
`tunneling, and the Court construes “virtual private network" as “a network of computers which
`
`privately communicate with each other by encrypting traffic on insecure communication paths
`
`between the computers.”
`
`“transparently creating [creates] a virtual private network”
`
`The ‘135 patent, claims 1 and 10 containthe phrase “transparently creating [creates] avirtuai
`
`private network." The parties dispute whether “transparently creating a virtual private network” in
`
`the preamble is limiting and whether “transparently” refers to not involving a user or not involving
`
`the client and target computers in creating a virtual private network. VirnetX contends that this
`
`phrase means “a user need not be involved in creating a virtual private network.” Microsoft
`
`contends that the phrase does not require construction and altematively that the phrase means
`
`“creating a vi_rtual private network (VPN) Without the client or target coinputer involved in
`
`requesting such creation."
`
`“Transpare11tiy creating a virtual private network” in the preamble is not a limitation because
`
`‘_‘transparently" does not aid meaning to claims 1 and 10. “A preamble limits the invention if it
`
`recites essential structure or steps, or if it is ‘necessary to give life, meaning, and vitality‘ to the
`
`claim. Conversely, a prearnbie is not limiting ‘where a patentee defines a structurally complete
`
`invention in the claim body and uses the preamble only to state a purpose or intended use for the
`
`invention?” Catalina Mlctg. Int'l, Inc. v. Coolsavingscom, Inc, 289 F.3d 801, 808 (Fed. Cir. 2002)
`
`10
`
`10 0f35
`
`

`
`Case 6:OT~cv—OUU80—LED Document 246
`
`Filed OTIBO/09 Page 11 of 35
`
`(citations omitted}.
`
`If a prearnble “is reasonably susceptible to being construed to be niereiy
`
`duplicative of tlie limitations in the body of the claim {and was not clearly added to overcome a
`
`rejection), we do not construe it to be a separate limitation.” Symanzec Corp‘ v. Computer Assocs.
`
`Int‘l, Inc, 522 F.3d 1279, l288v89 (Fed. Cir. 2008). “Transparent.ly” is merely descriptive of what
`
`is found in steps (2) and (3) of claim 1. As discussed below, those steps require that a user is not
`
`involved in creating a VPN. This requirement corresponds to the meaning of “transparently” as
`
`described in the specification, which states that creating a VPN “is preferably performed
`
`transparently to the user (i.e., the user need not be involved in creating the secure linl<).” Col. 39:28-
`
`29. Thus, “transparently” is merely duplicative ofwhat is found in the body of claim 1. As a result,
`
`the preamble is not a limitation. Accordingly, “trauspare11t1y" does not require construction.
`
`“Domain Name Service”
`
`The ‘ 135 patent, clairusil and 10 and the ‘180 patent, claims 1, 17‘, and 33 contain the term
`
`“Domain Name Service” (“DNS”). VirnetX contends that “Domain Name Service” means “a
`
`service that receives requests for computer network addresses corresponding to domain names, and
`
`which provides responses.” Microsoft contends that “Domain Name Service” means “the
`
`conventional Eookup service defined by the Internet Engineering Task Force (“lIETF"’) that returns
`
`the LP address of a requested computer or host.” The parties dispute whether “Dornain Name
`
`Service” is limited by the definition given in the lETF that defines Domain Name Service as the
`
`conventional scheme or if it more broadly includes both conventional and modified Domain Name
`
`Service that is described in the specification.
`
`The specificatioifs description of DNS is consistent with construing DNS as “a lookup
`
`service that returns an IP address for a requested domain name." The specification states
`
`11
`
`ll of35
`
`
`
`
`
`

`
`Case 6:0?—cV—DOO80-LED Document 246
`
`Filed 07/30/09 Page 12 of 35
`
`Conventional Domain Name Servers (fDNSs) provide a look-up function that returns
`the IE’ address of arequested computer or host. For example, when a computer user
`types in the web name “Yahoo.com,” the user’s web browser transmits a request to
`a DNS, which converts the name into a fourvpart IP address that is returned to the
`user‘s browser and then used by the browser to contact the destination web site.
`
`Col. 37:22—29. According to this excerpt, a DNS “provides a lookwup function” and “returns the H’
`
`address of a requested computer or host.” A “computer or host” includes domain names as
`
`exemplified by the specification’s reference to “Yalioocom” and “destination web site” as “a
`
`requested computer or host.” Accordingly, the Court constzues “DNS” as “a lookup service that
`
`returns an IP address for a requested domain r1arr1e.”5
`
`“domain name.”
`
`The ‘BS patent, claims 1 and 10 and the ‘l80 patent, claims 1, 17, and 33 contain the term
`
`“dornain name.” VirnetX contends that “domain name” means “a series of characters that
`
`corresponds to an address of a computer or group of computers that is to be sent to a domain name
`
`service (DNS).” Microsoft contends that “domainnanie” means “a hierarchical name for a computer
`
`(such as WWW.utexas.edu) that the Domain Name Service converts into an IP address." The parties
`
`dispute whether “domain name” can correspond to a group of computers or only a single computer,
`
`whether “domain name” is a hierarchical name for a computer, whether “domain name” is limited
`
`to web site names, and Whether “domain name" is limited to a computer name being converted into
`
`an IP address.
`
`The claims themselves describe “domain name.” Claim 1 states “a Domain Name Service
`
`(DNS) request that requests an IP address corresponding to a domain name associatedwith the target
`
`computer.” Col. 47:23-26. Also, claim 10 states “a DNS proxy server that receives a request from
`
`5See below for the Court’s construction of‘”dcrnair1 name.”
`
`12
`
`12 of35
`
`

`
`Case 6:O7—cv-0OO80—E_ED Document 246
`
`Filed 0780/09 Page 13 of 35
`
`the client computer to look up an IP address for a domain name.” Col. 4826-7. In both claim l and
`
`claim ‘:0 an IP address corresponds to a domain name. Thus, the domain name corresponds to an
`
`IP address. Accordingly, the Court construes “domain name” as “a name corresponding to an IP
`
`address."
`
`VimetX proposes that “domain name” corresponds to a group of computers (IP addresses)
`
`or a single computer because ciaims 1 and 10 of the ‘l35 patent refer to IP address using the
`
`indefinite article “an.” The Federal Circuit has stated,
`
`An indefinite article ‘a’ or ‘an’ in patent parlance carries the meaning of ‘one or
`more’ in open ended claims containing the transitionai phrase ‘cornpn'sing.”’ That
`“a” or “an” can mean “one or more" is best described as a rule, rather than merely as
`a presumption or even a convention. The exceptions to [the “indefinite article”] rule
`are extremely limited: at patentee must “evince { ] a clear intent” to limit “a” or “an”
`to “one." The subsequent use of definite articles “the” or “said” in a ciaiin to refer
`back to the same claim term does not change the general plural rule, but simply
`reinvokes that non—singular meaning. An exception to the general rule that “a” or
`“an" means more than one only arises where the language of the claims themselves,
`the specification, or the prosecution history necessitate a departure from the rule.
`
`Baldwin Graphic Sysz, Inc, v. Siebert, Inc, 512 F.3d i338, 1342413 (Fed. Cir. 2008) {citations
`
`omitted). Claims 1 and 10 of the ‘135 patent are open—ended construction claims using the word
`“cornprising” and use the indefinite a1ticie“an” to refer to “IP address." See Col. 47:20-26; see Col.
`
`48 23-7. By the “one or more” rule, these claims aiiow for one or more IP addresses. Any subsequent
`
`use of the definite article “the” to refer to “IP address" simply refers back to the previously used “IP
`
`address” and thus reinvokes the non—singular meaning. See Col. 47:39-40; see Co}. 48:8. Microsoft
`
`does not assert any evidence to show that an exception to the “one or more” rule exists. Thus, there
`
`may be more than one IP address, and thus more than one computer, that corresponds with the
`
`domain name. This would allow for a situation Where the IP address that corresponds to the domain
`
`
`
`13
`
`13 of35
`
`

`
`Case 6:07—cv—00O80—LED Document 246
`
`Filed 07f30l09 Page 14 of 35
`
`name is not the [P address of the target computer. See Col. 38:23 -42. Accordingly, “domain name”
`
`can correspond to more than one computer.
`
`Microsoft contends that the patents limit “domain name” to a hierarchical name for a
`
`computer under traditional hierarchical DNS format. However, Microsoft relies largely on extrinsic
`
`evidence—including expert testimony and Microsoft’s own technology tutorial——to support its
`
`contentions, which does not carry great weight in light of the fact that claim language provides
`
`guidance on the meaning of “domain name.” Also, where Microsoft uses intrinsic evidence for
`
`support, Microsoft only refers to non—lirniting language from the specification. For instance,
`
`Microsoft suggests that the examples used in the specification for domain names, which include
`
`“Yai1oo.com" and “Target.co1n,” show that the patents use “domain naine” in its traditional
`
`hierarchical DNS fonnat. Microsoft further suggests that “domain name” is limited to a traditional
`
`hierarchical name because the patents do not provide a single example of “domain name” that is not
`
`written in traditional hierarchical DNS fonnat. However, Microsoft argues only the presence and
`
`absence of examples rather than any enforceable language of limitation. The specification’s
`
`disclosure or omission of examples does not create limitations on claims. Accordingly, Microsoft
`
`does not offer sufficient support for limiting “domain name” to a hierarchical name for a computer.
`
`Microsoft also contends that the patents limit “domain name” to web site names. However,
`
`no such limitation is found in the claims, and Microsoft merely references its arguments on
`
`construing “web site” without showing how “domain name” is necessarily linked to web sitenames.
`
`Accordingly, “domain name” is not limited to web site names.
`
`Finally, Microsoft contends that “domain name” is limited to a computer name being
`
`converted into an IP address. Microsoft supports this propo sed limitation by arguing that a “dotnairi
`
`14
`
`14 0f35
`
`

`
`Case 6107-0‘./—OOO80—LED Document 246
`
`Fiied 07/30/09 Page 15 of 35
`
`name" has the capacity to be converted by BN8 into an IP address and that the specification
`
`emphasizes this point by describing that identical DNS requests may result in conventional domain
`
`name resolution, “host unknown” error messages, or VPN initiation, depending not on Whether
`
`something is a “domain name” but on what type of web Site was requested. However, Microsoft
`
`incorrectly argues that a “capacity” to be converted by DNS into an IP address demonstrates a
`
`required limitation. A mere capacity to perform an act does not make that act necessary. Thus,
`
`Microsoft has not sufficiently supported limiting “domain name” to a computer name being
`
`converted into an IP address. Accordingly, the Court construes “domain name” as “a name
`
`corresponding to an 1? address.”
`
`“web site”
`
`The ‘I35 -patent, claims 1 and 10 contain the term “web site.” VirnetX contends that
`
`construing “secure web site” as addressed below sufficiently addresses the meaning of “web site”
`
`and that “Web site” does not require further construction. Alternatively, VirnetX contends that “web
`
`site" means “a computer associated with a domain name and that can communicate in a network.”
`
`Microsoft contends that “web site” means “one or more related web pages at a location on the World
`
`Wide Web.” The parties dispute whether “web site” should be given a construction separate from
`
`“secure web site” and whether “web site” is limited to web pages on the World Wide Web. T
`
`VirnetX argues that “web site” should not be construed separately from “secure web site”
`
`because the ‘ 135 patent claims never state “Web site” Without the preceding Word “secure.”
`
`However, “secure" is separable from “web site” as a modifier of “web site.” The claims Show that
`
`“secure” can be replaced by other modifiers to “web site.” Claims I and 10 of the ‘135 patent refer
`
`to “web site” preceded by “non-secure” and “secure target.” Co}. 47:28, 30; C01. 48:10, 14. This
`
`15
`
`15 of35
`
`
`
`
`
`
`
`

`
`Case 6:O7—cV—CrG080—LED Document 246
`
`Filed 07/30/09 Page 16 of 35
`
`demonstrates that “web site” can be separated horn its modifier and thus is its own term separate
`
`from “secure,” Thus, “web site" may be construed as its own claim term.
`
`The Court adopts Microsoft’s construction and construes “web site” as “one or more related
`
`web pages at a location on the World Wide Web.” The patent does not state a definition for “web
`
`site.” However, the term itself is instructive. “Web site” on its face refers to a “web” Internet
`
`resource, which is a Web page on the World Wide Web. The specification is consistent with
`
`construing “web site” as a Web page on the World Wide Web. Examples of web sites in the
`
`specification are “Yahoo.co1n" and “Target.corn.” Col. 3725,45. “Yahoo.corn" and “Target.com”
`
`are wellvlcnowri web pages on the World Wide Web. See Yahoo! Home Page, www.Yahoo.corr1;
`
`see Target Home Page, www. 'Earget.co1n. Also, the specification states that a “web browser” can
`
`be used to access a “web site." Col. 39:48, 50-51, 55; C01. 40:1, 38.
`
`It is well—known that a “web
`
`browser” is used to navigate “Web pages” on the World Wide Web. Thus, the intrinsic evidence
`
`supports Microsoft’s proposed construction.
`
`Furthermore, extrinsic evidence supports Microsoft‘s construction. The World Wide Web
`
`Consortium, an industry sta.nclards—serti11g organization for the World Wide Web, defined web site
`
`as “[21] collection of interiinked Web pages, including a host page, residing at the same network
`
`location.” Brian Lavoie 85 Henrik Frystyk Nielsen, Web Characterization Teminologji
`
`<53:
`
`Definitiozas Sheer, W3 C Working Draft {May 24, 1999) at 9, Deffs Resp. (Docket No. 201), Ex. X
`
`{emphasis removed). This definition is consistent with industry dictionaries, which define a web site
`
`as “A collection of logically connected Web pages managed as a single entity” and “A group of
`
`HTML doc-umeiits and associated scripts supported by a Web server o

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket