`
`Filed 07/30/09 Page 1 of35
`
`IN TIIF. UNITIED S'I‘A'I‘ES DISTRICT C()UI{'I‘
`FOR THE EASTERN DISTRICT 0]’ 'l‘E.XAS
`TYLER DIVISION
`
`VIR,N,E'l'X. INC.
`
`Ptnintifl‘
`
`vs.
`
`MICROSOF!‘ C()RI‘ORATI()N
`
`Den-n(laul'
`
`=05W°f03fl5»C73~503f03'fl’.flV.fi
`
`CASE NO. 6:07 CV 80
`PATENT CASE
`
`MEMORANDUM OPINION
`
`This claim constrtzciionopinion interprets the disputed terms in US. Patent Nos. 6.501Z,l35
`
`(“tho ‘I35 pzitc-n1"); 6,839,759 (“thtz “I59 paucn1“);:tm:l 7,138,180 (“the ' I80 pa£ent"), Appendix A
`
`contains the mlsputtxl terms. as tlicy appcar in the asserted claims of’ these patcnls. Appendix B
`
`ucmtains :1 c:IIe1z'(. sumimtriz:'ng the C‘oufi‘s constructions.
`
`IBACKGROUNI)
`
`PlnintEt‘t‘VirnetX, Inc. (“\’irna:tX“}4ccusv:s Ivlicrosuft Cu:'pur'.i1im1 (“Microsoft”) oi'i:1t‘ringiI2g
`
`claims ofthc ‘I35, ‘759, and ‘I80 patents. The ‘I35 patem discloses a mctlmd of trzmsparentiy
`
`crcatisag a virtual p1'ivatc11r:.l\v0:‘k between E1 client computer and :1 tizrget computer. ’l'he ‘759 patent
`
`clixuloscs a. method I'0l’CS1:IbIISI1.IlIg a VPN without :1 user entering user iticntificatinn infbmmticre.
`
`The ‘759 pattnlt is related to the ‘I35 patent tltrough other ccmtinuation-in-part appi icatiunsl3)ntents.
`
`The ‘I80 patent (IISCIOSCS :3 method for cstabiisliing a \/PM using it sucurc domain heimc. service‘ The
`
`‘I80 patent
`
`is
`
`related to the ‘I35 patent as
`
`u LIIVISIGIIZI patent of cuntiuuntimi-in-part
`
`applicantiosisiputnxits uftlie ‘I35 patent. The ‘759 and ‘ISO patents SIIIIYC the sauna s'pccitic:1tirm.
`
`10f35
`
`
`
`VIRNETX EXHIBIT 2001
`
`Apple v. VirnetX
`Trial |PR2015-00869
`
`VIRNETX EXHIBIT 2001
`Apple v. VirnetX
`Trial IPR2015-00869
`
`
`
`Case 6:O7«cv-0O{)80—LED Document 246
`
`Filed 07l30f09 Page 2 of 35
`
`<
`
`9-
`
`APPLICABLE LAW
`
`“it is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to
`
`which the patentee is entitled the right to exclude.” Ph.it'izp.s v. A WH Corp, 415 F.3d 1303, 1312
`
`(Fed. Cir. 2005) (en banc) (quotitig-Irinova/Pure Waterlac. 12. Safari Water Filtration S;v.s*.. Inc, 381
`
`F.3d 1111, 1115 (Fed. Cir. 2004)).
`
`In claim construction, courts examine the patent’s intrinsic
`
`evidence to define the patented invention’s scope. See z'd.; CR. Bard, Inc. v. US. Surgical C-‘orp,
`
`388 F.3d 858, 861 (Fed. Cir. 2004); Belbifl. Nenvoric Servs, Inc. v. Coma’ Comma ’r.-s Group. Inc,
`
`262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes the claims t11e1nselvcs,the
`
`specification, and the prosecution history. $96 Phillips, 415 F.3d at 1314; CR. Bard, 11150., 388 F.3d
`
`at 861. Courts give claim tenns their ordinary and accustomed meaning as understood by one of
`
`ordinary skill in the art at the time of the invention in the context of the entire patent. P!1iih'p.v, 415
`
`F.3d at 1312-13; Alice, Inc. v. frat’?-Trade Comm '11, 342 F.3d 1361, 1368 (Fed. Cir. 2003).
`
`The claims themselves provide substantial guidance in determining the meaning ofparticular
`
`claim terms. Pfzitlips, 415 F.3d at 1314. First, a te1‘m’s context in the asserted claim can be very
`
`instructive. 14. Other asserted or unasserted claims can also aid in deterinining the cl aim’s meaning
`
`because claim terms are typically used. consistentiy throughout the patent. Id. Differences among
`
`the Claim terms can also assist in understanding a term’s meaning.
`
`Id. For example, when a
`
`dependent claim adds a limitation to an independent claim, it is presumed that the independent claim
`
`does not include the limitation. Id. at 131445.
`
`“[C]laims ‘must be read in View of the specification, of which they are a part. ”’ Id’. (quoting
`
`M611"/flttafl. v. Westview Instrt¢ment.s', Inc, 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc)). “[T]he
`
`specification ‘is always highly relevant to the claim construction analysis. U sually, it is dispositive;
`
`2of35
`
`
`
`Case 6:07-cv~00080-LED Document 246
`
`Filed 07/30/09 Page 3 of 35
`
`it is the single best guide to the meaning of a disputed term.” Id. (qtioting Vitronz'c.s' Corp. v.
`
`ConceptJ'0m‘c, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teieflex, Inc. v. F.tcosaN. Am. C‘orp., 2.99
`
`F.3d 1313, 1325 (Fed. Cir. 2002). This is true because a patentee may define his own tenns, give
`
`a claim term a different meaning than the term would otherwise possess, or disclaim or disavow the
`
`claim scope. Philtips, 415 F.3d at 1316.
`
`in these situations, the inventor’s lexicography governs.
`
`Id. ‘Also, the specification may resolve ambiguous claim terms “where the ordinary and accustomed
`
`meaning of the Words used in the claims lack sufficient clarity to permit the scope of the claim to be
`
`ascertained frorn the words alone." Teleflex, Inc., 299 F.3d at 1325. But, ‘“[a]1though the
`
`specification may aid the court in interpreting the meaning of disputed claim language, particular
`
`embodiments and examples a_ppearing in the specification will not generally be read into the
`
`claims.” Comaric Comment, Inc. 12. Harris Corp, 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting
`
`Constant '12. Advcmced.Micm~Device.r, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 51988)); see also Pfzi!!ip.9,
`
`#15 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim
`
`construction because a patent applicant may also define a term in prosecuting the patent. Home
`
`Diagnosn'c.9_, Inc, v. Lzfias'c'cn. Inc, 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
`
`specification, a patent applicant may define a term in prosecuting a patent”).
`
`Although extrinsic evidence can be useful, it is “‘less significant than the intrinsic record in
`
`determining the legally operative meaning of claim langu.age,’” Phz'Ilz'ps, 415 F .3d. at 1317 (quoting
`
`CR. .Bctrd, [;'TC., 3 88 F.3d at 862). Technical dictionaries and treatises may help a court understarid
`
`the underlying technology and the manne1' in which one skilled in the art might use claim terms, but
`
`technical dictionaries and treatises may provide definitions that are too broad or may not be
`
`indicative of how the term is used in the patent. Id. at 1318. Similarly, expert testimony may aid
`
`3of35
`
`
`
`
`'2
`
`1
`
`
`
`
`
`Case 6:07'—cv-00080-LED Document 246
`
`Filed 07/30/09 Page 4 of 35
`
`a court in understanding the underlying technology and determining the particular meaning ofa term
`
`in the pertinent field, but an expeifs conclusory, unsupported assertions as to aterm’s definition is
`
`entirely unhelpful to a court. Id. Generaliy, extrinsic evidence is “less reliable than the patent and
`
`l
`
`its prosecution history in deterrnining how to read claim terms." Id.
`
`CONSTRUCTION OF DISPUTED TERMS IN THE ‘135 PATENT“
`
`“virtual private network”
`
`The ‘I35 patent, claims 1 and 10; the ‘759 patent, claims 1 and 16; and the ‘180 patent,
`
`ciaims l, 17, and 33 contain the term “virtual private network“ (“VPN”). VirnetX contends that
`
`“virtuai private network" means “a network of computers capable ofprivately communicating with
`
`each other by encrypting traffic on insecure communication paths between the computers, and which
`
`is capable of expanding to include additional computers and communication paths." Microsoft
`
`contends that “virtual private network’ means “a network iropiemented by encapsulating an
`
`encrypted 1? packet within another TP packet (that
`
`is,
`
`tunneling) over a shared networking
`
`infrastructure.“ The parties dispute whether the “FreeSfWAN” dictionary may be used to construe
`
`“virtual private network,” whether VirnetX’s proposed construction is overly broad, whether “virtual
`
`private network” requires anonymity, and Whether IP tunneling is a limitation on “virtual private
`
`network." In light of intrinsic and extrinsic evidence, the Court construes “virtual private network"
`
`as “a network of computers which privately connnunicate with each other by encrypting traffic on
`
`i
`
`insecure communication paths between the computers.”
`
`‘While this heading states “Construction ofDisputcd Terms in fire ‘J35 !’a..fem," the claim terms addressed
`under this heading may also be i‘."o‘L:nci in the other asserted patents. This also applies to subsequent headings.
`
`zcitai-ions to the patents will not include the U.S. patent numbers to maintain brevity. Unless otherwise
`stated, these citations are of the U.S. potent numbers indicated in the heading that the citation falls under.
`
`4
`
`40f35
`
`
`
`
`
`
`
`Case 6:0?-cv—OOO80-LED Document 246
`
`Filed 07/30/09 Page 5 of 35
`
`The ‘I35 patent does not provide an explicit definition for “viituai private networ .”
`
`However, the ‘135 patent uses “virtual private network” in ways that are consistent with a “virtual
`
`private network” being “a network of computers which privately communicate with each other by
`
`encrypting t1‘afi'ic on insecure cornniunication paths between the computers." The specification
`
`discusses a VPN in the context of connecting and communicating between nodes. For instance, the
`
`specification states, “In a second mode referred to as ‘promiscuous per VPN’ mode, a small set of
`
`fixed hardware addresses are used, with a ‘fixed source/destination hardware address used for all
`
`nodes comrnunicating over a virtual private network.” Coi. 23:11-14. This excerpt shows that the
`
`‘ 13 5 invention includes nodes (computers) connniiiiicating over a virtual private network.
`
`Furthermore,
`
`the ciairns and specification discuss a VPN in the context of private
`
`comrriunication on insecure communication paths. Claim 1 states “A method of transparently
`
`creating a virtual private network (VPN) between a client computer and a target computer" and then
`
`states the steps of accompiishing this method including “requesting access to a secure web site.”
`
`Col. 4"/:2D~22, 30—3l. Thus, claim 1 associates a “virtual private network” with “security.” Also,
`
`the specification states, “If the user is not authorized to access the secure site, then a ‘host unknown’
`
`message is returned (step 2705).
`
`if the user has sufficient security privileges, then in step 2706 a
`
`secure VPN is established between the user’s computer and the secure target site.” Col. 39:21:25.
`
`This excerpt shows how a “virtual private network” establishes a secure connection between nodes
`
`where security may not otherwise exist. Thus,
`
`the claim language and the specification are
`
`consistent with construing a “virtual private network” as “a network of computers which privately
`
`comrnuriicate with each other by encrypting tra‘Ffic on insecure communication paths between the
`
`computers."
`
`5of35
`
`
`
`Case 8‘.U7-CV—0O080—LED Document 246
`
`Filed 07/'30a’U9 Page 6 of 35
`
`
`
`Extrinsic evidence also supports this construction. The Wiley Electrical and Electronics
`
`Engineering Dictionary defines a “virtual private network” as
`
`A network which has the appearance, f1111{3i.‘lOl1alllZy_, and security ofa private network,
`but which is configured within a public network, such as the Internet. The use of a
`public infrastructure while ensuring privacy using measures such as encryption and
`tunneling protocols, helps provide the security of a private network at a cost similar
`to that of a public network.
`
`Wiriatv ELECTRICAL AND ELECTRONICS ENGINEERING DICTEONARY 842 (2004) {published by the
`
`IEEE Press). This dictionary definition describes a network that has attributes of a private network
`
`but runs on a public network. The dictionary definition further states that encryption may be used
`
`to achieve privacy. The C curt’s construction is in line with this definition. All pertinent aspects of
`
`the Court’s construction are explicitly found i.n the dictionaty definition except for “insecure
`
`communication paths,” which simply corresponds to the dictionary definition’s reference to “a public
`
`network.” Thus, the Court‘s construction is in accord with the dictionary definition.
`
`Also,
`
`the ‘I35 patent refers to the ‘°FreeSfWAN” project in the specification. The
`
`specification explains that the “FreeSfWAN” project is developing a conventional scheme that
`
`provides secure virtual private networks over the Internet. Col. 37:50~58. The “Frees/WAN”
`
`project defines “virtual private network" as “a network which can safely be used as ifit were private,
`
`even though some of-its communication uses insecure connections. All traffic on those connections
`
`is encrypted."
`
`“FreeS/WAN" Glossary 24—25, Pl. Br. (Docket No. 194) Ex. 6. The Court's
`
`construction is consistent with this definitiorix‘
`
`
`3The Court"s consti'uct.ion largely adopts VirnetX’s proposal. However, this construction excludes
`Virno.tX‘s proposed language regarding the ability of a virtual private network to expand. Vi1'netX proposes this
`language to account for the possibility of including additional computers and. communication paths in a virtual
`private network, Pl.‘s Br. 6. The Court's construction does not limit a “virtual private network” to any particular
`number of‘ computers or communication paths. Thus, VirnctX’s proposed langitttgc is superfluous. Accordingly, the
`Court’s construction accounts for the possibility of additional computers or cornniunication paths.
`
`6
`
`6of35
`
`
`
`
`
`i
`
` ii2 i
`
`Case 6:O7~cv—O0080—LED Document 246
`
`Filed OTISOIOQ Page 7' of 35
`
`Microsoft contends that the “FreeS/'WAN” glossary is not an explicit definition o:["“virtua.i
`
`private network” and thus is zootpersuasive. Microsoft argues that the ‘ 135 patent’s reference to the
`
`“FreeS/WAN” project is made only to describe the prior art and not to define “virtual private
`
`networlt.” However, the specification explains that the “Frees/WAN" project has been developing
`
`an implementation of one conventional scheme that provides secure virtual private networks over
`
`the Internet. Col. 37:50-58. Also, the applicant disclosed the “FreeSfWAN” project as prior art.
`
`See Def.’s Br. (DocketNo, 201) Exs. M—O. While these references to the “FreeS/WAN” project do
`
`not explicitly define “virtual private network,” they at least point to extrinsic evidence that can be
`
`considered in construing “virtual private network.” Thus, the Court may consider the “FreeS/WAN”
`
`project/glossary as extrinsic evidence for construing “virtual private network.”
`
`Microsoft also contends that even if the “FreeS/WAN” glossary offers an acceptable
`
`definition for “virtual private 11etwo1‘1<,” portions ofthe “FreeS/WAN” glossary definition show that
`
`Virne-tX’s proposed construction is overly broad. Microsoft cites the portion of the “FreeS/WAN”
`
`glossary definition for “virtual private networks" that states “IPSEC {Internet Protocol Security] is
`
`not the only technique available for building VPNS, but it is the only method defined by RFCs
`
`[Request for Comments, internet docu1nents~uso1nc of which are informative while others are
`
`standards] and supported by many vendors. VPNS [virtual private networks] are by no means the
`
`only thing you can do with lPSEC, but they may be the most important application for many users."
`Defi’s Br. (Docket No. 201) at 10; “FreeS/WAN” Glossary 25, Pl. Br. (Docket No. 194) Ex. 6.
`
`I
`
`Microsoft points out that IPSEC is the only method defined by RFCs and supported. by many
`
`vendors. Microsoft argues that this narrow language shows that the “FreeS/WAN” glossary does not
`
`identify Secure Sockets Layer (“SSL”) or 'I‘rans_po1t Layer Security (“"118”) as methods for building
`
`7of35
`
`
`
`
`
`
`
`Case 6:O7—cv»00O80—i.ED Document 246
`
`Filed 07/30/09 Page 8 of 35
`
`“virtual private networl<s." Microsoft then argues that VirnetX’s proposed construction is overly
`
`broad because it allows for a networl< using SSL and TLS. "However, Microsoft’s cited excerpt is
`
`an ancillary portion of the “virtual private network“ definition and is set apart in a different
`
`paragraph from the primary portion of the definition. See “FreeS/WAN” Glossary 24-25, Pl. Br.
`
`(Docket No. 194) Ex. 6. Also, Microsoft selectively asserts that IPSEC is the only method defined
`
`by RFCs and supported by many vendors and ignores that its cited excerpt states that “IPSEC is not
`
`the only technique available for building VPNS." Thus, Microsoffls cited excerpt does not support
`
`that the “F1'eeS/WAN" glossary restricts “virtual private network” to IPSEC.
`
`Microsoft also contends that VirnetX’s proposed construction suggests that the “virtual
`
`private network” achieves only data security when it should include both data security and
`
`anonymity. Microsoft is correct that “private” in “virtual private networks” in cans both data security
`
`and anonymity. The specification supports this interpretation. The Background of the invention
`
`section states “[21] trernendous variety of methods have been proposed and irnpiernented to provide
`
`security and anonyrnity for communications over the Internet.” Col. 1: 15-17. This section further
`
`describes data security as being “irnmunc to eavesdropping” and states “[d]ata security is usually
`
`tackled using some form of data encryption” and anonymity as “preventing[ing] an eavesdroppcr
`
`from discovering that terminal 100 is in communication with terminal llO.” Col. 1:23-25, 38-39,
`
`27-28. This language suggests that the claimed invention will achieve both data security and
`
`anonymity because it prefaces the Detailed Description of the Invention section, which describes a
`
`method of creating a virtual private network.
`
`l_‘[1Ci(‘2€d_,
`
`the descriptions of the invention later indicate that “private” in “virtual private
`
`network” means data security and anonyinity. The Detailed Description of the invention, Further
`
`8of35
`
`
`
`Case 6:0’/—cv—OOO80—LED Document 246
`
`Filed 07/30/09 Page 9 of 35
`
`Extensions section describes a mode of the invention as being able to “reduce the amount of
`
`overhead involved in checking for valid frames” While allowing “H3 addresses .
`
`.
`
`. [to] still be hopped
`
`as before for secure communication within the VPN.“ Col. 23:20-25 (emphasis added). The
`
`“anonymity” feature of a VPN can be handled. by the Tunneled Agile Routing Protocoi (“TARP”),
`
`which executes “address hopping.” See Col. 2:66-3:17; see Col. 5:49-64. Thus, the language “still
`
`be liopped.” indicates that the modifications of the. invention retain the anonymity feature of the
`
`“virtual private r1etworl<.”" Accordingly, the Court construes “virtual private network” as requiring
`
`both data security and anonymity.
`
`Finally, Microsoft contends that “virtual private network” requires 1? tunneling. Microsoft
`
`argues that the intrinsic evidence shows that TARP and IPSEC are two ways of obtaining anonymity
`
`in a virtual private network. Microsoft then argues that tunneling is required to achieve anonymity
`
`when TARP, IPSEC, or any other means is employed to achieve anonymity. The Court first and
`
`foremost considers the intrinsic evidence. The claims do not assert “tunneling” as a limitation nor
`
`has Microsoft pointed to any type of limitation in the specification. Microsoft's citations to the
`
`Bacl<gro'und of the lnvention section only state explanations ofhow TARP works and does not use
`
`any limiting language. See Col. 3:5~l8,
`
`l9—20, 58-60. Furthermore, Microsoffs citation to the
`
`Detailed Description. of the Invention, Further Extensions section only refers to a preferred
`
`implementation of the virtual private network, stating “The VPN is preferably irnplernented using
`
`. coniproiniscs the anonymity
`.
`4Whi.lc the specification states that this mode ofthe invention "[o]l‘course .
`ofthe \Fi7’Ns," this only means that those outside the VPN can discover the VPN and does not mean that the
`anonymity ofthe users within the VPN is compromised. This is clear from the example that follows the
`“compromising anonymity of the VPN" statement: “[i.e., an outsider can easily tell what traffic belongs in which
`VPN, though he cannot C():"i’t’:il(If£! it to :7 .s'per.'.{/To nlacfriire/per.tr)ri)." Col. 23 :25-28 (emphasis added). Thus, the
`specification is consistent with construing 21. “virtual private network” as acliie-ving both data security and anonymity.
`
`9of35
`
`
`
`
`
`
`
`
`
`Case 6:O7—cv~OOO80—LED Document 246
`
`Filed 07/30/09 Page 10 of 35
`
`the ZIP address ‘hopping’ features of the basic invention described above, such that the true identity
`
`of the two nodes cannot be determined even if packets during the communication are intercepted."
`
`Col. 38‘.2~6. Again, this excerpt does not include any limiting language and in fact expressly uses
`
`the non—li1niting language “preferably.” Accordingly, “virtual private network” is not limited to IP
`
`tunneling, and the Court construes “virtual private network” as “a network of computers which
`
`privately communicate with each other by encrypting traffic on insecure communication paths
`
`between the computers.”
`
`“transparently creating [creates] a virtual private network”
`
`’ The ‘135 patent, claims 1 and i0 containthe phrase“transparently creating [creates] a virtual
`
`private networi<.” The parties dispute whether “transparently creating a virtual private network” in
`
`the preamble is limiting and whether “transparently" refers to not involving a user or not involving
`
`the client and target computers in creating a virtual private network. Vi1netX contends that this
`
`phrase means “a user need not be involved in creating a virtual private network.” Microsoft
`
`contends that the phrase does not require construction a11d alteinativeiy that the phrase means
`
`“creating a virtual private network (VPN) without the client or target computer involved in
`
`requesting such creation”
`
`“Transparently creating a. virtuai private network” in the preamble is not a limitation because
`
`“transparently” does not add meaning to claims '1 and 10. “A preamble limits the invention if it
`
`recites essential structure or steps, or if it is ‘necessary to give life, meaning, and vitality’ to the
`
`claim. Conversely, a preamble is not limiting ‘where a patentee defines a structurally complete
`
`invention in the claim body and uses the preamble only to state a purpose or intended use for the
`
`invention.” Ccztalirtct Mi’ctg. In.t’l, Inc. v, Co0lsc1vings.com. 1:16., 289 F.3d 801, 808 (Fed. Cir. 2002)
`
`10
`
`10 of35
`
`
`
`
`
`Case 6:07-cv-{JU080~LED Document 246
`
`Filed 07/3009 Page 11 of 35
`
`(citations omitted).
`
`If a preamble “is reasonably susceptible to being construed to be merely
`
`daplicative of the limitations in the body of the claim (and was not cleariy added to overcome a
`
`-rejection), we do not construe it to be a separate iimitation.” Symcmzec Corp. v. Computer A.ssocs.
`
`Imf 7, Inc, 522 F.3d 1279, 1288-89 (Fed. Cir. 2008). “Transparently“ is merely descriptive ofwhat
`is found in steps (2) and (3).of claim 1. As discussed below. those steps require that a user is not
`
`involved in creating a VPN. This requirement corresponds to the meaning of “transparently” as
`
`described in the specification, which states that creating a VPN “is preferably performed
`
`transparently to the user (i.e. , the user need not be involved in creating the secure linl<)." Col. 39:28—
`
`29. Thus, “transparently” is merely duplicative ofwhat is found in the body of claim 1. As a result,
`
`the preamble is not a limitation. Accordingly, “transparently” does not require construction.
`
`“Domain Name Service”
`
`The ‘I35 patent, claims 1 and 10 and the ‘E80 patent, claims 1, 17, and 33 contain the term
`
`“Domain Name Service” (“DNS”). VirnetX contends that “Domain Name Service” means “a
`
`service that receives requests for computer network addresses corresponding to domain names, and
`
`which provides responses.” Microsoft contends that “Domain Name Service” means “the
`
`conventional lockup service defined by the Internet Engineering Task Force (“TETF”) that returns
`
`the IP address of a requested computer or host.” The parties dispute whether “Domain Name
`
`Service" is limited by the definition given in the IETF that defines Domain Name Service as the
`
`conventional scheme or if it more broadly includes both conventional and modified Domain Name
`
`Service that is described in the specification.
`
`The specifications description of DNS is consistent with construing DNS as “a lookup
`
`"service that returns an IP address for a requested domain name.” The specification states
`
`ll
`
`1lof35
`
`
`
`
`
`Case 6:07—cv—0OO80—LED Document 246
`
`Filed 07/30/09 Page 12 of 35
`
`Conventional Domain Name Servers (DNSs) provide a looloup function that returns
`the IP address of arequested computer or host. For example, when a computer user
`types in the web name “Yahoo.com," the user’s web browser transrnits a request to
`a DNS, which converts the name into a four—part IP address that is returned to the
`user’s browser and then used by the browser to contact the destination web site.
`
`Col. 37:22-29. According to this excerpt, a DNS “provides a look—up i’unction” and “returns the IP
`
`address of a requested computer or host.” A “computer or host” includes domain names as
`
`exemplified by the specification’s reference to “Yahoo.con1” and “destination web site” as “a
`
`requested computer or host.” Accordingiy, the Court constiues “DNS” as “a lookup service that
`
`returns an IP address for a requested domain name.’’5
`
`“dorriairi n ame”
`
`The ‘l35 patent, claims l and 10 and the ‘ISO patent, ctaims l, i7, and 33 contain the term
`
`“domain name." VirnetX contends that “domain name” means “a series of characters that
`
`corresponds to an address of a computer or group of computers that is to be sent to a domain name
`
`service (DNS). ” Microsoftcontends that “domain name” means “a hierarchical name for a computer
`
`(such as www.utexas.edu) that the Domain Name Service converts into an IP address.” The parties
`
`dispute whether “domain name” can correspond to a group of computers or only a single computer,
`
`Whetlier “domain name" is a hierarchical name for a computer, whether “domain name” is limited
`
`to web site names, and whether “domain name” is limited to a computer name being converted into
`
`an [F address.
`
`The claims themselves describe “domain name.” Claim 1 states “a Domain Name Service
`
`(DNS) request that requests an EP address corresponding to a domain name associated with the target
`
`computer.” Col. 47:23-26. Also, claim 10 states “a DNS proxy server that receives a request from
`
`
`°Sce below for the Court’s construction of“dcmain name.“
`
`12
`
`12 of35
`
`
`
`Case 6:07-cv-00080-LED Document 246
`
`Filed 01730/O9 Page 13 of 35
`
`the client computer to look up an 1? address for a domain name.” Coi. 48:6—7. In both claim 1 and
`
`ciairn it} an IP address corresponds to a domain name. Thus, the domain name corresponds to an
`
`IP address. Accordingly, the Court construes “domain name” as “a name corresponding to an IP
`
`address.”
`
`Vi'rnetX proposes that “domain name” corresponds to a group of computers (IP addresses)
`
`or a singie computer because claims '1 and 10 of the ‘T135 patent refer to IP address using the
`
`iridefinite article “an." The Federal Circuit has stated,
`
`An indefinite article ‘a’ or ‘an’ in patent parlance carries the meaning of ‘one or
`more’ in open—ended claims containing the transitional phrase ‘comprising.”’ That
`“a” or “an” can mean “one or more” is best described as a rule, rather than merely as
`apresumption or even a convention. The exceptions to [the “indefinite article”] rule
`are extremely iimited: a patentee must “evince [ ] a clear inten "’ to limit “a” or “an”
`to “one.” The subsequent use of definite articles “the" or “said” in a claim to sefer
`back to the same claim term does not change the general pluraé rule, but simply
`reinvoites that notwsingular meaning, An exception to the general rule that “a” or
`“an" means more than one only arises where the language ofthe claims themselves,
`the specitication, or the prosecution history necessitate a departure from the rule.
`
`Baldwin Gm]2!'rr'c Sysz, Inc. v. Sieberr. Inc, 512 F.3d 1338, 1342-43 {Fed Cir. 2008) (citations
`
`omitted). Ciaims i and i0 of the ‘135 patent are open—ended constiuction claims using the word
`
`“comprising” and use the indetinite article “an” to refer to “IP address.” See Col. 47:20-26; see Col.
`
`48:3-7. By the “one or more” rule, these claims allow for one or more LE’ addresses. Any subsequent
`
`use of the definite article “the” to refer to “IP address” simply refers back to the previously used “IP
`
`address” and thus reinvokes the non-singular meaning. See Col. 47:39-40; see Col. 48:8. Microsoft
`
`does not assert any evidence to show that an exception to the “one or more” rule exists. Thus, there
`
`may be more than one IP address, and thus more than one computer, that corresponds with the
`
`domain name. This would allow for a situation where the IP address that corresponds to the domain
`
`13
`
`13 of35
`
`
`
`
`
`i
`
`
`
`Case 6:O7'—cv~00O8D—i_ED Document 246
`
`Filed 07!30/O9 Page "14 of 35
`
`name is not the ll’ address of the target computer. See Col. 38:23-42. Accordingly, “domain name”
`
`can correspond to more than one computer.
`
`Microsoft contends that the patents limit “domain name” to a hierarchical name for a
`
`computer under traditional hierarclncal DNS form at. However, Microsoft relies largely on extrinsic
`
`evidence—»including expert testimony and Microsoft’s own technology luto1ial—to support its
`
`contentions, which does not carry great weight in light of the fact that claim language provides
`
`guidance on the meaning of “domain name.” Also, where Microsoft uses intrinsic evidence for
`
`
`
`support, Microsoft oniy refers to non-limiting language from the specification. For instance,
`Microsoft suggests that the examples used in the specification for domain names, which include
`
`“Yal1oo.com” and “Targetcom,” show that the patents use “domain name” in its traditional
`
`hierarchical DNS fonnat. Mic1'osoft further suggests that “domain name” is limited to a traditional
`
`hierarchical name because the patents do not provide a single example of “domain name” that is not
`
`written in traditional hierarchical DNS fonnat. However, Microsoft argues only the presence and
`
`absence of examples rather than any enforceable language of limitation, The speciflcation‘s
`
`discicsure or omission of examples does not create limitations on claims. Accordingly, Microsoft
`
`does not offer snffi cient support for limiting “domain name” to a hierarchical name for a computer.
`
`Microsoft also contends that the patents limit “domain name" to web site names. However,
`
`no such liinitation is Found in the claims, and Microsoft merely references its arguments on
`
`construing “web site” without showing how “domain name” is necessarily linked to web site names.
`
`Accordingly, “domain name” is not limited to web site names.
`
`Finally, Microsoft contends that “domain name” is limited to a computer name being
`
`converted into an {F address. Microsoft supports this proposed limitation by arguing that a “domain
`
`14
`
`14 of35
`
`
`
`Case 6:07-'cv—00O80-LED Document 246
`
`Fiied 07/30/09 Page 15 of 35
`
`name“ has the capacity to be converted by DNS into an IP address and that the specification
`
`emphasizes this point by describing that identical DNS requests may result in conventional domain
`
`name resoiution, “host unknown” error messages, or VPN initiation, depending not on whether
`
`something is a “domain name" but on what type of Web site was requested. However, Microsoft
`
`incorrectly argues that a “capacity” to be converted by DNS into an IP address demonstrates a
`
`required. iimitation. A mere capacity to perform an act does not make that act necessary. Thus,
`
`Microsoft has not sutfficiently supported limiting “domain name” to a computer name being
`
`converted into an IP address. Accordingly, the Court constnies “doznain name” as “a name
`
`corresponding to an IP address.”
`
`“web site”
`
`The ‘BS patent, claims 1 and 10 contain the term “web site.” Vi:metX contends that
`
`construing “secure web site” as addressed below sttfficieiitly addresses the meaning of “web site”
`
`and that “web site" does not require further construction. Alternativeiy, VirnetX contends that “web
`
`site” means “a computer associated with a doinain name and that can communicate in a network.”
`
`Microsoft contends that “Web site” 1neans“one or more related web pages at a location on the World
`
`Wide Web.” The parties dispute whether “web site” should be given a construction separate from
`
`“secure web site” and whether “web site” is limited to web pages on the Worid Wide Web.
`
`Virnetx argues that “web site” should not be construed separately from “secure web site”
`
`because the ‘I35 patent claims‘ never state “web site” without the preceding word “secure."
`
`However, “secure" is separable from “Web site” as a modifier of “web site.” The claims show that
`
`“secure” can be replaced by other modifiers to “web site.” Claims 1 and 10 ofthe ‘135 patent refer
`
`to “web site” preceded by“non-secure” and “secure target.” Col. 47:28, 30; C01. 48:10, 14. This
`
`15
`
`15 of35
`
`
`
`
`
`Case 6:O7~cv~GOG80-LED Document 246
`
`Filed O7/30f09 Page 16 of 35
`
`de1no11strates that “web site” can be separated from its modifier and thus is its own term separate
`
`from “secure.” Thus, “web s