throbber
Case E520”/~cv—£)0080—LED Document 246
`
`Filed 07/30/09 Page 1 of35
`
`IN TIIF. UNITIED S'I‘A'I‘ES DISTRICT C()UI{'I‘
`FOR THE EASTERN DISTRICT 0]’ 'l‘E.XAS
`TYLER DIVISION
`
`VIR,N,E'l'X. INC.
`
`Ptnintifl‘
`
`vs.
`
`MICROSOF!‘ C()RI‘ORATI()N
`
`Den-n(laul'
`
`=05W°f03fl5»C73~503f03'fl’.flV.fi
`
`CASE NO. 6:07 CV 80
`PATENT CASE
`
`MEMORANDUM OPINION
`
`This claim constrtzciionopinion interprets the disputed terms in US. Patent Nos. 6.501Z,l35
`
`(“tho ‘I35 pzitc-n1"); 6,839,759 (“thtz “I59 paucn1“);:tm:l 7,138,180 (“the ' I80 pa£ent"), Appendix A
`
`contains the mlsputtxl terms. as tlicy appcar in the asserted claims of’ these patcnls. Appendix B
`
`ucmtains :1 c:IIe1z'(. sumimtriz:'ng the C‘oufi‘s constructions.
`
`IBACKGROUNI)
`
`PlnintEt‘t‘VirnetX, Inc. (“\’irna:tX“}4ccusv:s Ivlicrosuft Cu:'pur'.i1im1 (“Microsoft”) oi'i:1t‘ringiI2g
`
`claims ofthc ‘I35, ‘759, and ‘I80 patents. The ‘I35 patem discloses a mctlmd of trzmsparentiy
`
`crcatisag a virtual p1'ivatc11r:.l\v0:‘k between E1 client computer and :1 tizrget computer. ’l'he ‘759 patent
`
`clixuloscs a. method I'0l’CS1:IbIISI1.IlIg a VPN without :1 user entering user iticntificatinn infbmmticre.
`
`The ‘759 pattnlt is related to the ‘I35 patent tltrough other ccmtinuation-in-part appi icatiunsl3)ntents.
`
`The ‘I80 patent (IISCIOSCS :3 method for cstabiisliing a \/PM using it sucurc domain heimc. service‘ The
`
`‘I80 patent
`
`is
`
`related to the ‘I35 patent as
`
`u LIIVISIGIIZI patent of cuntiuuntimi-in-part
`
`applicantiosisiputnxits uftlie ‘I35 patent. The ‘759 and ‘ISO patents SIIIIYC the sauna s'pccitic:1tirm.
`
`10f35
`
`
`
`VIRNETX EXHIBIT 2001
`
`Apple v. VirnetX
`Trial |PR2015-00869
`
`VIRNETX EXHIBIT 2001
`Apple v. VirnetX
`Trial IPR2015-00869
`
`

`
`Case 6:O7«cv-0O{)80—LED Document 246
`
`Filed 07l30f09 Page 2 of 35
`
`<
`
`9-
`
`APPLICABLE LAW
`
`“it is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to
`
`which the patentee is entitled the right to exclude.” Ph.it'izp.s v. A WH Corp, 415 F.3d 1303, 1312
`
`(Fed. Cir. 2005) (en banc) (quotitig-Irinova/Pure Waterlac. 12. Safari Water Filtration S;v.s*.. Inc, 381
`
`F.3d 1111, 1115 (Fed. Cir. 2004)).
`
`In claim construction, courts examine the patent’s intrinsic
`
`evidence to define the patented invention’s scope. See z'd.; CR. Bard, Inc. v. US. Surgical C-‘orp,
`
`388 F.3d 858, 861 (Fed. Cir. 2004); Belbifl. Nenvoric Servs, Inc. v. Coma’ Comma ’r.-s Group. Inc,
`
`262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes the claims t11e1nselvcs,the
`
`specification, and the prosecution history. $96 Phillips, 415 F.3d at 1314; CR. Bard, 11150., 388 F.3d
`
`at 861. Courts give claim tenns their ordinary and accustomed meaning as understood by one of
`
`ordinary skill in the art at the time of the invention in the context of the entire patent. P!1iih'p.v, 415
`
`F.3d at 1312-13; Alice, Inc. v. frat’?-Trade Comm '11, 342 F.3d 1361, 1368 (Fed. Cir. 2003).
`
`The claims themselves provide substantial guidance in determining the meaning ofparticular
`
`claim terms. Pfzitlips, 415 F.3d at 1314. First, a te1‘m’s context in the asserted claim can be very
`
`instructive. 14. Other asserted or unasserted claims can also aid in deterinining the cl aim’s meaning
`
`because claim terms are typically used. consistentiy throughout the patent. Id. Differences among
`
`the Claim terms can also assist in understanding a term’s meaning.
`
`Id. For example, when a
`
`dependent claim adds a limitation to an independent claim, it is presumed that the independent claim
`
`does not include the limitation. Id. at 131445.
`
`“[C]laims ‘must be read in View of the specification, of which they are a part. ”’ Id’. (quoting
`
`M611"/flttafl. v. Westview Instrt¢ment.s', Inc, 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc)). “[T]he
`
`specification ‘is always highly relevant to the claim construction analysis. U sually, it is dispositive;
`
`2of35
`
`

`
`Case 6:07-cv~00080-LED Document 246
`
`Filed 07/30/09 Page 3 of 35
`
`it is the single best guide to the meaning of a disputed term.” Id. (qtioting Vitronz'c.s' Corp. v.
`
`ConceptJ'0m‘c, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teieflex, Inc. v. F.tcosaN. Am. C‘orp., 2.99
`
`F.3d 1313, 1325 (Fed. Cir. 2002). This is true because a patentee may define his own tenns, give
`
`a claim term a different meaning than the term would otherwise possess, or disclaim or disavow the
`
`claim scope. Philtips, 415 F.3d at 1316.
`
`in these situations, the inventor’s lexicography governs.
`
`Id. ‘Also, the specification may resolve ambiguous claim terms “where the ordinary and accustomed
`
`meaning of the Words used in the claims lack sufficient clarity to permit the scope of the claim to be
`
`ascertained frorn the words alone." Teleflex, Inc., 299 F.3d at 1325. But, ‘“[a]1though the
`
`specification may aid the court in interpreting the meaning of disputed claim language, particular
`
`embodiments and examples a_ppearing in the specification will not generally be read into the
`
`claims.” Comaric Comment, Inc. 12. Harris Corp, 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting
`
`Constant '12. Advcmced.Micm~Device.r, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 51988)); see also Pfzi!!ip.9,
`
`#15 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim
`
`construction because a patent applicant may also define a term in prosecuting the patent. Home
`
`Diagnosn'c.9_, Inc, v. Lzfias'c'cn. Inc, 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
`
`specification, a patent applicant may define a term in prosecuting a patent”).
`
`Although extrinsic evidence can be useful, it is “‘less significant than the intrinsic record in
`
`determining the legally operative meaning of claim langu.age,’” Phz'Ilz'ps, 415 F .3d. at 1317 (quoting
`
`CR. .Bctrd, [;'TC., 3 88 F.3d at 862). Technical dictionaries and treatises may help a court understarid
`
`the underlying technology and the manne1' in which one skilled in the art might use claim terms, but
`
`technical dictionaries and treatises may provide definitions that are too broad or may not be
`
`indicative of how the term is used in the patent. Id. at 1318. Similarly, expert testimony may aid
`
`3of35
`
`
`
`
`'2
`
`1
`
`

`
`
`
`Case 6:07'—cv-00080-LED Document 246
`
`Filed 07/30/09 Page 4 of 35
`
`a court in understanding the underlying technology and determining the particular meaning ofa term
`
`in the pertinent field, but an expeifs conclusory, unsupported assertions as to aterm’s definition is
`
`entirely unhelpful to a court. Id. Generaliy, extrinsic evidence is “less reliable than the patent and
`
`l
`
`its prosecution history in deterrnining how to read claim terms." Id.
`
`CONSTRUCTION OF DISPUTED TERMS IN THE ‘135 PATENT“
`
`“virtual private network”
`
`The ‘I35 patent, claims 1 and 10; the ‘759 patent, claims 1 and 16; and the ‘180 patent,
`
`ciaims l, 17, and 33 contain the term “virtual private network“ (“VPN”). VirnetX contends that
`
`“virtuai private network" means “a network of computers capable ofprivately communicating with
`
`each other by encrypting traffic on insecure communication paths between the computers, and which
`
`is capable of expanding to include additional computers and communication paths." Microsoft
`
`contends that “virtual private network’ means “a network iropiemented by encapsulating an
`
`encrypted 1? packet within another TP packet (that
`
`is,
`
`tunneling) over a shared networking
`
`infrastructure.“ The parties dispute whether the “FreeSfWAN” dictionary may be used to construe
`
`“virtual private network,” whether VirnetX’s proposed construction is overly broad, whether “virtual
`
`private network” requires anonymity, and Whether IP tunneling is a limitation on “virtual private
`
`network." In light of intrinsic and extrinsic evidence, the Court construes “virtual private network"
`
`as “a network of computers which privately connnunicate with each other by encrypting traffic on
`
`i
`
`insecure communication paths between the computers.”
`
`‘While this heading states “Construction ofDisputcd Terms in fire ‘J35 !’a..fem," the claim terms addressed
`under this heading may also be i‘."o‘L:nci in the other asserted patents. This also applies to subsequent headings.
`
`zcitai-ions to the patents will not include the U.S. patent numbers to maintain brevity. Unless otherwise
`stated, these citations are of the U.S. potent numbers indicated in the heading that the citation falls under.
`
`4
`
`40f35
`
`

`
`
`
`
`
`Case 6:0?-cv—OOO80-LED Document 246
`
`Filed 07/30/09 Page 5 of 35
`
`The ‘I35 patent does not provide an explicit definition for “viituai private networ .”
`
`However, the ‘135 patent uses “virtual private network” in ways that are consistent with a “virtual
`
`private network” being “a network of computers which privately communicate with each other by
`
`encrypting t1‘afi'ic on insecure cornniunication paths between the computers." The specification
`
`discusses a VPN in the context of connecting and communicating between nodes. For instance, the
`
`specification states, “In a second mode referred to as ‘promiscuous per VPN’ mode, a small set of
`
`fixed hardware addresses are used, with a ‘fixed source/destination hardware address used for all
`
`nodes comrnunicating over a virtual private network.” Coi. 23:11-14. This excerpt shows that the
`
`‘ 13 5 invention includes nodes (computers) connniiiiicating over a virtual private network.
`
`Furthermore,
`
`the ciairns and specification discuss a VPN in the context of private
`
`comrriunication on insecure communication paths. Claim 1 states “A method of transparently
`
`creating a virtual private network (VPN) between a client computer and a target computer" and then
`
`states the steps of accompiishing this method including “requesting access to a secure web site.”
`
`Col. 4"/:2D~22, 30—3l. Thus, claim 1 associates a “virtual private network” with “security.” Also,
`
`the specification states, “If the user is not authorized to access the secure site, then a ‘host unknown’
`
`message is returned (step 2705).
`
`if the user has sufficient security privileges, then in step 2706 a
`
`secure VPN is established between the user’s computer and the secure target site.” Col. 39:21:25.
`
`This excerpt shows how a “virtual private network” establishes a secure connection between nodes
`
`where security may not otherwise exist. Thus,
`
`the claim language and the specification are
`
`consistent with construing a “virtual private network” as “a network of computers which privately
`
`comrnuriicate with each other by encrypting tra‘Ffic on insecure communication paths between the
`
`computers."
`
`5of35
`
`

`
`Case 8‘.U7-CV—0O080—LED Document 246
`
`Filed 07/'30a’U9 Page 6 of 35
`
`
`
`Extrinsic evidence also supports this construction. The Wiley Electrical and Electronics
`
`Engineering Dictionary defines a “virtual private network” as
`
`A network which has the appearance, f1111{3i.‘lOl1alllZy_, and security ofa private network,
`but which is configured within a public network, such as the Internet. The use of a
`public infrastructure while ensuring privacy using measures such as encryption and
`tunneling protocols, helps provide the security of a private network at a cost similar
`to that of a public network.
`
`Wiriatv ELECTRICAL AND ELECTRONICS ENGINEERING DICTEONARY 842 (2004) {published by the
`
`IEEE Press). This dictionary definition describes a network that has attributes of a private network
`
`but runs on a public network. The dictionary definition further states that encryption may be used
`
`to achieve privacy. The C curt’s construction is in line with this definition. All pertinent aspects of
`
`the Court’s construction are explicitly found i.n the dictionaty definition except for “insecure
`
`communication paths,” which simply corresponds to the dictionary definition’s reference to “a public
`
`network.” Thus, the Court‘s construction is in accord with the dictionary definition.
`
`Also,
`
`the ‘I35 patent refers to the ‘°FreeSfWAN” project in the specification. The
`
`specification explains that the “FreeSfWAN” project is developing a conventional scheme that
`
`provides secure virtual private networks over the Internet. Col. 37:50~58. The “Frees/WAN”
`
`project defines “virtual private network" as “a network which can safely be used as ifit were private,
`
`even though some of-its communication uses insecure connections. All traffic on those connections
`
`is encrypted."
`
`“FreeS/WAN" Glossary 24—25, Pl. Br. (Docket No. 194) Ex. 6. The Court's
`
`construction is consistent with this definitiorix‘
`
`
`3The Court"s consti'uct.ion largely adopts VirnetX’s proposal. However, this construction excludes
`Virno.tX‘s proposed language regarding the ability of a virtual private network to expand. Vi1'netX proposes this
`language to account for the possibility of including additional computers and. communication paths in a virtual
`private network, Pl.‘s Br. 6. The Court's construction does not limit a “virtual private network” to any particular
`number of‘ computers or communication paths. Thus, VirnctX’s proposed langitttgc is superfluous. Accordingly, the
`Court’s construction accounts for the possibility of additional computers or cornniunication paths.
`
`6
`
`6of35
`
`

`
`
`
`i
`
` ii2 i
`
`Case 6:O7~cv—O0080—LED Document 246
`
`Filed OTISOIOQ Page 7' of 35
`
`Microsoft contends that the “FreeS/'WAN” glossary is not an explicit definition o:["“virtua.i
`
`private network” and thus is zootpersuasive. Microsoft argues that the ‘ 135 patent’s reference to the
`
`“FreeS/WAN” project is made only to describe the prior art and not to define “virtual private
`
`networlt.” However, the specification explains that the “Frees/WAN" project has been developing
`
`an implementation of one conventional scheme that provides secure virtual private networks over
`
`the Internet. Col. 37:50-58. Also, the applicant disclosed the “FreeSfWAN” project as prior art.
`
`See Def.’s Br. (DocketNo, 201) Exs. M—O. While these references to the “FreeS/WAN” project do
`
`not explicitly define “virtual private network,” they at least point to extrinsic evidence that can be
`
`considered in construing “virtual private network.” Thus, the Court may consider the “FreeS/WAN”
`
`project/glossary as extrinsic evidence for construing “virtual private network.”
`
`Microsoft also contends that even if the “FreeS/WAN” glossary offers an acceptable
`
`definition for “virtual private 11etwo1‘1<,” portions ofthe “FreeS/WAN” glossary definition show that
`
`Virne-tX’s proposed construction is overly broad. Microsoft cites the portion of the “FreeS/WAN”
`
`glossary definition for “virtual private networks" that states “IPSEC {Internet Protocol Security] is
`
`not the only technique available for building VPNS, but it is the only method defined by RFCs
`
`[Request for Comments, internet docu1nents~uso1nc of which are informative while others are
`
`standards] and supported by many vendors. VPNS [virtual private networks] are by no means the
`
`only thing you can do with lPSEC, but they may be the most important application for many users."
`Defi’s Br. (Docket No. 201) at 10; “FreeS/WAN” Glossary 25, Pl. Br. (Docket No. 194) Ex. 6.
`
`I
`
`Microsoft points out that IPSEC is the only method defined by RFCs and supported. by many
`
`vendors. Microsoft argues that this narrow language shows that the “FreeS/WAN” glossary does not
`
`identify Secure Sockets Layer (“SSL”) or 'I‘rans_po1t Layer Security (“"118”) as methods for building
`
`7of35
`
`

`
`
`
`
`
`Case 6:O7—cv»00O80—i.ED Document 246
`
`Filed 07/30/09 Page 8 of 35
`
`“virtual private networl<s." Microsoft then argues that VirnetX’s proposed construction is overly
`
`broad because it allows for a networl< using SSL and TLS. "However, Microsoft’s cited excerpt is
`
`an ancillary portion of the “virtual private network“ definition and is set apart in a different
`
`paragraph from the primary portion of the definition. See “FreeS/WAN” Glossary 24-25, Pl. Br.
`
`(Docket No. 194) Ex. 6. Also, Microsoft selectively asserts that IPSEC is the only method defined
`
`by RFCs and supported by many vendors and ignores that its cited excerpt states that “IPSEC is not
`
`the only technique available for building VPNS." Thus, Microsoffls cited excerpt does not support
`
`that the “F1'eeS/WAN" glossary restricts “virtual private network” to IPSEC.
`
`Microsoft also contends that VirnetX’s proposed construction suggests that the “virtual
`
`private network” achieves only data security when it should include both data security and
`
`anonymity. Microsoft is correct that “private” in “virtual private networks” in cans both data security
`
`and anonymity. The specification supports this interpretation. The Background of the invention
`
`section states “[21] trernendous variety of methods have been proposed and irnpiernented to provide
`
`security and anonyrnity for communications over the Internet.” Col. 1: 15-17. This section further
`
`describes data security as being “irnmunc to eavesdropping” and states “[d]ata security is usually
`
`tackled using some form of data encryption” and anonymity as “preventing[ing] an eavesdroppcr
`
`from discovering that terminal 100 is in communication with terminal llO.” Col. 1:23-25, 38-39,
`
`27-28. This language suggests that the claimed invention will achieve both data security and
`
`anonymity because it prefaces the Detailed Description of the Invention section, which describes a
`
`method of creating a virtual private network.
`
`l_‘[1Ci(‘2€d_,
`
`the descriptions of the invention later indicate that “private” in “virtual private
`
`network” means data security and anonyinity. The Detailed Description of the invention, Further
`
`8of35
`
`

`
`Case 6:0’/—cv—OOO80—LED Document 246
`
`Filed 07/30/09 Page 9 of 35
`
`Extensions section describes a mode of the invention as being able to “reduce the amount of
`
`overhead involved in checking for valid frames” While allowing “H3 addresses .
`
`.
`
`. [to] still be hopped
`
`as before for secure communication within the VPN.“ Col. 23:20-25 (emphasis added). The
`
`“anonymity” feature of a VPN can be handled. by the Tunneled Agile Routing Protocoi (“TARP”),
`
`which executes “address hopping.” See Col. 2:66-3:17; see Col. 5:49-64. Thus, the language “still
`
`be liopped.” indicates that the modifications of the. invention retain the anonymity feature of the
`
`“virtual private r1etworl<.”" Accordingly, the Court construes “virtual private network” as requiring
`
`both data security and anonymity.
`
`Finally, Microsoft contends that “virtual private network” requires 1? tunneling. Microsoft
`
`argues that the intrinsic evidence shows that TARP and IPSEC are two ways of obtaining anonymity
`
`in a virtual private network. Microsoft then argues that tunneling is required to achieve anonymity
`
`when TARP, IPSEC, or any other means is employed to achieve anonymity. The Court first and
`
`foremost considers the intrinsic evidence. The claims do not assert “tunneling” as a limitation nor
`
`has Microsoft pointed to any type of limitation in the specification. Microsoft's citations to the
`
`Bacl<gro'und of the lnvention section only state explanations ofhow TARP works and does not use
`
`any limiting language. See Col. 3:5~l8,
`
`l9—20, 58-60. Furthermore, Microsoffs citation to the
`
`Detailed Description. of the Invention, Further Extensions section only refers to a preferred
`
`implementation of the virtual private network, stating “The VPN is preferably irnplernented using
`
`. coniproiniscs the anonymity
`.
`4Whi.lc the specification states that this mode ofthe invention "[o]l‘course .
`ofthe \Fi7’Ns," this only means that those outside the VPN can discover the VPN and does not mean that the
`anonymity ofthe users within the VPN is compromised. This is clear from the example that follows the
`“compromising anonymity of the VPN" statement: “[i.e., an outsider can easily tell what traffic belongs in which
`VPN, though he cannot C():"i’t’:il(If£! it to :7 .s'per.'.{/To nlacfriire/per.tr)ri)." Col. 23 :25-28 (emphasis added). Thus, the
`specification is consistent with construing 21. “virtual private network” as acliie-ving both data security and anonymity.
`
`9of35
`
`
`
`

`
`
`
`
`
`Case 6:O7—cv~OOO80—LED Document 246
`
`Filed 07/30/09 Page 10 of 35
`
`the ZIP address ‘hopping’ features of the basic invention described above, such that the true identity
`
`of the two nodes cannot be determined even if packets during the communication are intercepted."
`
`Col. 38‘.2~6. Again, this excerpt does not include any limiting language and in fact expressly uses
`
`the non—li1niting language “preferably.” Accordingly, “virtual private network” is not limited to IP
`
`tunneling, and the Court construes “virtual private network” as “a network of computers which
`
`privately communicate with each other by encrypting traffic on insecure communication paths
`
`between the computers.”
`
`“transparently creating [creates] a virtual private network”
`
`’ The ‘135 patent, claims 1 and i0 containthe phrase“transparently creating [creates] a virtual
`
`private networi<.” The parties dispute whether “transparently creating a virtual private network” in
`
`the preamble is limiting and whether “transparently" refers to not involving a user or not involving
`
`the client and target computers in creating a virtual private network. Vi1netX contends that this
`
`phrase means “a user need not be involved in creating a virtual private network.” Microsoft
`
`contends that the phrase does not require construction a11d alteinativeiy that the phrase means
`
`“creating a virtual private network (VPN) without the client or target computer involved in
`
`requesting such creation”
`
`“Transparently creating a. virtuai private network” in the preamble is not a limitation because
`
`“transparently” does not add meaning to claims '1 and 10. “A preamble limits the invention if it
`
`recites essential structure or steps, or if it is ‘necessary to give life, meaning, and vitality’ to the
`
`claim. Conversely, a preamble is not limiting ‘where a patentee defines a structurally complete
`
`invention in the claim body and uses the preamble only to state a purpose or intended use for the
`
`invention.” Ccztalirtct Mi’ctg. In.t’l, Inc. v, Co0lsc1vings.com. 1:16., 289 F.3d 801, 808 (Fed. Cir. 2002)
`
`10
`
`10 of35
`
`

`
`
`
`Case 6:07-cv-{JU080~LED Document 246
`
`Filed 07/3009 Page 11 of 35
`
`(citations omitted).
`
`If a preamble “is reasonably susceptible to being construed to be merely
`
`daplicative of the limitations in the body of the claim (and was not cleariy added to overcome a
`
`-rejection), we do not construe it to be a separate iimitation.” Symcmzec Corp. v. Computer A.ssocs.
`
`Imf 7, Inc, 522 F.3d 1279, 1288-89 (Fed. Cir. 2008). “Transparently“ is merely descriptive ofwhat
`is found in steps (2) and (3).of claim 1. As discussed below. those steps require that a user is not
`
`involved in creating a VPN. This requirement corresponds to the meaning of “transparently” as
`
`described in the specification, which states that creating a VPN “is preferably performed
`
`transparently to the user (i.e. , the user need not be involved in creating the secure linl<)." Col. 39:28—
`
`29. Thus, “transparently” is merely duplicative ofwhat is found in the body of claim 1. As a result,
`
`the preamble is not a limitation. Accordingly, “transparently” does not require construction.
`
`“Domain Name Service”
`
`The ‘I35 patent, claims 1 and 10 and the ‘E80 patent, claims 1, 17, and 33 contain the term
`
`“Domain Name Service” (“DNS”). VirnetX contends that “Domain Name Service” means “a
`
`service that receives requests for computer network addresses corresponding to domain names, and
`
`which provides responses.” Microsoft contends that “Domain Name Service” means “the
`
`conventional lockup service defined by the Internet Engineering Task Force (“TETF”) that returns
`
`the IP address of a requested computer or host.” The parties dispute whether “Domain Name
`
`Service" is limited by the definition given in the IETF that defines Domain Name Service as the
`
`conventional scheme or if it more broadly includes both conventional and modified Domain Name
`
`Service that is described in the specification.
`
`The specifications description of DNS is consistent with construing DNS as “a lookup
`
`"service that returns an IP address for a requested domain name.” The specification states
`
`ll
`
`1lof35
`
`

`
`
`
`Case 6:07—cv—0OO80—LED Document 246
`
`Filed 07/30/09 Page 12 of 35
`
`Conventional Domain Name Servers (DNSs) provide a looloup function that returns
`the IP address of arequested computer or host. For example, when a computer user
`types in the web name “Yahoo.com," the user’s web browser transrnits a request to
`a DNS, which converts the name into a four—part IP address that is returned to the
`user’s browser and then used by the browser to contact the destination web site.
`
`Col. 37:22-29. According to this excerpt, a DNS “provides a look—up i’unction” and “returns the IP
`
`address of a requested computer or host.” A “computer or host” includes domain names as
`
`exemplified by the specification’s reference to “Yahoo.con1” and “destination web site” as “a
`
`requested computer or host.” Accordingiy, the Court constiues “DNS” as “a lookup service that
`
`returns an IP address for a requested domain name.’’5
`
`“dorriairi n ame”
`
`The ‘l35 patent, claims l and 10 and the ‘ISO patent, ctaims l, i7, and 33 contain the term
`
`“domain name." VirnetX contends that “domain name” means “a series of characters that
`
`corresponds to an address of a computer or group of computers that is to be sent to a domain name
`
`service (DNS). ” Microsoftcontends that “domain name” means “a hierarchical name for a computer
`
`(such as www.utexas.edu) that the Domain Name Service converts into an IP address.” The parties
`
`dispute whether “domain name” can correspond to a group of computers or only a single computer,
`
`Whetlier “domain name" is a hierarchical name for a computer, whether “domain name” is limited
`
`to web site names, and whether “domain name” is limited to a computer name being converted into
`
`an [F address.
`
`The claims themselves describe “domain name.” Claim 1 states “a Domain Name Service
`
`(DNS) request that requests an EP address corresponding to a domain name associated with the target
`
`computer.” Col. 47:23-26. Also, claim 10 states “a DNS proxy server that receives a request from
`
`
`°Sce below for the Court’s construction of“dcmain name.“
`
`12
`
`12 of35
`
`

`
`Case 6:07-cv-00080-LED Document 246
`
`Filed 01730/O9 Page 13 of 35
`
`the client computer to look up an 1? address for a domain name.” Coi. 48:6—7. In both claim 1 and
`
`ciairn it} an IP address corresponds to a domain name. Thus, the domain name corresponds to an
`
`IP address. Accordingly, the Court construes “domain name” as “a name corresponding to an IP
`
`address.”
`
`Vi'rnetX proposes that “domain name” corresponds to a group of computers (IP addresses)
`
`or a singie computer because claims '1 and 10 of the ‘T135 patent refer to IP address using the
`
`iridefinite article “an." The Federal Circuit has stated,
`
`An indefinite article ‘a’ or ‘an’ in patent parlance carries the meaning of ‘one or
`more’ in open—ended claims containing the transitional phrase ‘comprising.”’ That
`“a” or “an” can mean “one or more” is best described as a rule, rather than merely as
`apresumption or even a convention. The exceptions to [the “indefinite article”] rule
`are extremely iimited: a patentee must “evince [ ] a clear inten "’ to limit “a” or “an”
`to “one.” The subsequent use of definite articles “the" or “said” in a claim to sefer
`back to the same claim term does not change the general pluraé rule, but simply
`reinvoites that notwsingular meaning, An exception to the general rule that “a” or
`“an" means more than one only arises where the language ofthe claims themselves,
`the specitication, or the prosecution history necessitate a departure from the rule.
`
`Baldwin Gm]2!'rr'c Sysz, Inc. v. Sieberr. Inc, 512 F.3d 1338, 1342-43 {Fed Cir. 2008) (citations
`
`omitted). Ciaims i and i0 of the ‘135 patent are open—ended constiuction claims using the word
`
`“comprising” and use the indetinite article “an” to refer to “IP address.” See Col. 47:20-26; see Col.
`
`48:3-7. By the “one or more” rule, these claims allow for one or more LE’ addresses. Any subsequent
`
`use of the definite article “the” to refer to “IP address” simply refers back to the previously used “IP
`
`address” and thus reinvokes the non-singular meaning. See Col. 47:39-40; see Col. 48:8. Microsoft
`
`does not assert any evidence to show that an exception to the “one or more” rule exists. Thus, there
`
`may be more than one IP address, and thus more than one computer, that corresponds with the
`
`domain name. This would allow for a situation where the IP address that corresponds to the domain
`
`13
`
`13 of35
`
`
`
`
`
`i
`
`

`
`Case 6:O7'—cv~00O8D—i_ED Document 246
`
`Filed 07!30/O9 Page "14 of 35
`
`name is not the ll’ address of the target computer. See Col. 38:23-42. Accordingly, “domain name”
`
`can correspond to more than one computer.
`
`Microsoft contends that the patents limit “domain name” to a hierarchical name for a
`
`computer under traditional hierarclncal DNS form at. However, Microsoft relies largely on extrinsic
`
`evidence—»including expert testimony and Microsoft’s own technology luto1ial—to support its
`
`contentions, which does not carry great weight in light of the fact that claim language provides
`
`guidance on the meaning of “domain name.” Also, where Microsoft uses intrinsic evidence for
`
`
`
`support, Microsoft oniy refers to non-limiting language from the specification. For instance,
`Microsoft suggests that the examples used in the specification for domain names, which include
`
`“Yal1oo.com” and “Targetcom,” show that the patents use “domain name” in its traditional
`
`hierarchical DNS fonnat. Mic1'osoft further suggests that “domain name” is limited to a traditional
`
`hierarchical name because the patents do not provide a single example of “domain name” that is not
`
`written in traditional hierarchical DNS fonnat. However, Microsoft argues only the presence and
`
`absence of examples rather than any enforceable language of limitation, The speciflcation‘s
`
`discicsure or omission of examples does not create limitations on claims. Accordingly, Microsoft
`
`does not offer snffi cient support for limiting “domain name” to a hierarchical name for a computer.
`
`Microsoft also contends that the patents limit “domain name" to web site names. However,
`
`no such liinitation is Found in the claims, and Microsoft merely references its arguments on
`
`construing “web site” without showing how “domain name” is necessarily linked to web site names.
`
`Accordingly, “domain name” is not limited to web site names.
`
`Finally, Microsoft contends that “domain name” is limited to a computer name being
`
`converted into an {F address. Microsoft supports this proposed limitation by arguing that a “domain
`
`14
`
`14 of35
`
`

`
`Case 6:07-'cv—00O80-LED Document 246
`
`Fiied 07/30/09 Page 15 of 35
`
`name“ has the capacity to be converted by DNS into an IP address and that the specification
`
`emphasizes this point by describing that identical DNS requests may result in conventional domain
`
`name resoiution, “host unknown” error messages, or VPN initiation, depending not on whether
`
`something is a “domain name" but on what type of Web site was requested. However, Microsoft
`
`incorrectly argues that a “capacity” to be converted by DNS into an IP address demonstrates a
`
`required. iimitation. A mere capacity to perform an act does not make that act necessary. Thus,
`
`Microsoft has not sutfficiently supported limiting “domain name” to a computer name being
`
`converted into an IP address. Accordingly, the Court constnies “doznain name” as “a name
`
`corresponding to an IP address.”
`
`“web site”
`
`The ‘BS patent, claims 1 and 10 contain the term “web site.” Vi:metX contends that
`
`construing “secure web site” as addressed below sttfficieiitly addresses the meaning of “web site”
`
`and that “web site" does not require further construction. Alternativeiy, VirnetX contends that “web
`
`site” means “a computer associated with a doinain name and that can communicate in a network.”
`
`Microsoft contends that “Web site” 1neans“one or more related web pages at a location on the World
`
`Wide Web.” The parties dispute whether “web site” should be given a construction separate from
`
`“secure web site” and whether “web site” is limited to web pages on the Worid Wide Web.
`
`Virnetx argues that “web site” should not be construed separately from “secure web site”
`
`because the ‘I35 patent claims‘ never state “web site” without the preceding word “secure."
`
`However, “secure" is separable from “Web site” as a modifier of “web site.” The claims show that
`
`“secure” can be replaced by other modifiers to “web site.” Claims 1 and 10 ofthe ‘135 patent refer
`
`to “web site” preceded by“non-secure” and “secure target.” Col. 47:28, 30; C01. 48:10, 14. This
`
`15
`
`15 of35
`
`
`
`

`
`Case 6:O7~cv~GOG80-LED Document 246
`
`Filed O7/30f09 Page 16 of 35
`
`de1no11strates that “web site” can be separated from its modifier and thus is its own term separate
`
`from “secure.” Thus, “web s

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket