throbber
Paper No.
`Filed: January 25, 2016
`
`Naveen Modi
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1990
`Facsimile: (202) 551-0490
`E-mail: naveenmodi@paulhastings.com
`
`
`Filed on behalf of: VirnetX Inc.
`By:
`
`Joseph E. Palys
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1996
`Facsimile: (202) 551-0496
`E-mail: josephpalys@paulhastings.com
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.
`Petitioner
`
`v.
`
`VIRNETX INC.
`Patent Owner
`
`
`
`
`
`
`
`Case IPR2015-00870
`Patent 8,560,705
`
`
`
`
`
`
`
`
`
`
`Patent Owner’s Response
`
`
`
`
`
`
`
`

`
`
`
`I.
`
`II.
`
`
`
`Case No. IPR2015-00870
`
`Table of Contents
`
`Introduction ...................................................................................................... 1
`
`Claim Construction .......................................................................................... 1
`
`A.
`
`B.
`
`“Interception of a Request . . . to Look up an Internet Protocol
`(IP) address” (Claims 1, 5, 9, 16, 19, and 23) ....................................... 4
`
`Secure Communication Link (Claims 1, 4, 6, 8, 10-12, 16, 20,
`21, 24-27) .............................................................................................. 5
`
`1.
`
`2.
`
`3.
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Secure Communication Link”................................. 6
`
`A “Secure Communication Link” Must Be Direct ..................... 8
`
`A “Secure Communication Link” Requires Encryption ........... 13
`
`C. Virtual Private Network Link” (Claims 6 and 21) .............................. 15
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`A “Virtual Private Network Link” Requires a Virtual
`Private Network ........................................................................ 16
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Virtual Private Network Link”.............................. 17
`
`A “Virtual Private Network Link” Must Be Direct .................. 18
`
`A “Virtual Private Network Link” Requires a Network ........... 19
`
`A “Virtual Private Network Link” Requires Encryption .......... 21
`
`D.
`
`E.
`
`“Secure Domain Name” (Claims 7 and 22) ........................................ 22
`
`Other Terms ......................................................................................... 25
`
`III. The Cited References Do Not Render Claims 1-30 Unpatentable ................ 27
`
`A.
`
`Beser and RFC 2401 Do Not Render Claims 1-23 and 25-30
`Unpatentable ........................................................................................ 27
`
`1.
`
`Beser’s Disclosure..................................................................... 27
`
`i
`
`

`
`
`
`Case No. IPR2015-00870
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`Beser and RFC 2401 Do Not Disclose “Interception of a
`Request, Generated By the Client Device, to Look Up an
`Internet Protocol (IP) Address of the Target Device
`Based on a Domain Name Associated With the Target
`Device” ...................................................................................... 30
`
`a)
`
`b)
`
`The Alleged Request in Beser Is Not a “Request . .
`. to Look Up an Internet Protocol (IP) Address” ............ 31
`
`The Alleged Request in Beser Is Not
`“Intercept[ed]” ................................................................ 33
`
`Beser and RFC 2401 Would Not Have Been Combined
`as the Petition Suggests ............................................................. 36
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 6 and 21 ......................................................................... 42
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 7 and 22 ......................................................................... 43
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 13 and 28....................................................................... 44
`
`Dependent Claims 2-5, 8-12, 14, 15, 17-20, 23, 25-27,
`29, and 30 .................................................................................. 47
`
`B.
`
`Beser, RFC 2401, and Brand Do Not Render Obvious Claim 24 ...... 47
`
`IV. Petitioner’s Expert Testimony Should be Accorded Little, If Any
`Weight ............................................................................................................ 47
`
`V.
`
`Each of the Instituted Grounds Is Based on At Least One Reference
`That Does Not Qualify As Prior Art .............................................................. 51
`
`A.
`
`Petitioner Has Not Established that RFC 2401 Is a Prior Art
`Printed Publication .............................................................................. 52
`
`1.
`
`The Evidence Presented with the Petition Cannot
`Establish by a Preponderance of the Evidence that RFC
`2401 Was Publicly Accessible .................................................. 52
`
`ii
`
`

`
`
`
`Case No. IPR2015-00870
`
`2.
`
`3.
`
`The Board’s Findings Are Insufficient to Establish by a
`Preponderance of the Evidence that RFC 2401 Was
`Publicly Accessible ................................................................... 54
`
`The Supplemental Information Is Also Insufficient to
`Establish by a Preponderance of the Evidence that RFC
`2401 Was Publicly Accessible .................................................. 57
`
`VI. Conclusion ..................................................................................................... 60
`
`
`
`iii
`
`

`
`
`
`
`
`Case No. IPR2015-00870
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Alexsam, Inc. v. IDT Corp.,
`715 F.3d 1336 (Fed. Cir. 2013) .......................................................................... 50
`
`Apple Inc. v. DSS Technology Management, Inc.,
`IPR2015-00369, Paper No. 9 (June 25, 2015) .................................................... 53
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00237, Paper No. 15 (May 14, 2014) .............................................. 4, 34
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00481, Paper No. 11 (September 3, 2014) ......................................... 22
`
`Apple Inc. v. VirnetX Inc.,
`IPR2015-00871, Paper No. 8 (Oct. 1, 2015) ............................................... 10, 11
`
`Apple Inc. v. VirnetX Inc.
`IPR2015-01009, Paper No. 1 (Apr. 28, 2015) ................................................... 25
`
`Aspex Eyewear, Inc. v. Concepts In Optics, Inc.,
`111 F. App’x 582 (Fed. Cir. 2004) ............................................................... 48, 50
`
`Biogen Idec, Inc. v. GlaxoSmithKline LLC,
`713 F.3d 1090 (Fed. Cir. 2013) ........................................................ 10, 15, 19, 24
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) ............................................................................ 48
`
`Bruckelmyer v. Ground Heaters, Inc.,
`445 F.3d 1374 (Fed. Cir. 2006) .......................................................................... 51
`
`Centricut, LLC v. Esab Group, Inc.,
`390 F.3d 1361 (Fed. Cir. 2004) .......................................................................... 48
`
`In re Cuozzo,
`793 F.3d 1297 (Fed. Cir. 2015) ............................................................................ 3
`
`Cuozzo Speed Techs., LLC v. Lee,
`No. 15-446, 2016 WL 205946 (U.S. Jan. 15, 2016) ............................................ 3
`
`iv
`
`

`
`
`Cyber Corp. v. FAS Techs., Inc.,
`138 F.3d 1448 (Fed. Cir. 1998) .................................................................... 19, 24
`
`Case No. IPR2015-00870
`
`Dish Network L.L.C. v. Dragon Intellectual Property, LLC,
`IPR2015-00499, Paper No. 7 (July 17, 2015) .................................................... 54
`
`Elec. Frontier Found. v. Pers. Audio, LLC,
`IPR2014-00070, Paper No. 21 (Apr. 18, 2014) .................................................. 57
`
`Eon–Net LP v. Flagstar Bancorp.,
`653 F.3d 1314 (Fed. Cir. 2011) ......................................................................... 13
`
`Finnigan Corp. v. ITC,
`180 F.3d 1354 (Fed. Cir. 1999) .......................................................................... 59
`
`In re Fulton,
`391 F.3d 1195 (Fed. Cir. 2004) ......................................................................... 41
`
`Garmin Int’l inc. v. Cuozzo Speed Tech, LLC,
`IPR2012-00001, Paper No. 15 (Jan. 9, 2013) ................................................... 12
`
`Google Inc. v. Art+Com Innovationpool GMBH,
`IPR2015-00788, Paper No. 7 (September 2, 2015) ...................................... 53, 56
`
`In re Gurley,
`27 F.3d 551 (Fed. Cir. 1994) ............................................................................. 41
`
`Idle Free Sys., Inc. v. Bergstrom, Inc.,
`IPR2012-00027, Paper No. 26 (June 11, 2013) .................................................... 3
`
`Kinetic Technologies, Inc. v. Skyworks Solutions, Inc.,
`IPR2014-00690, Paper No. 43 (October 19, 2015) ...................................... 51, 59
`
`In re Klopfenstein,
`380 F.3d 1345 (Fed. Cir. 2004) .......................................................................... 51
`
`Koito Mfg. Co. v. Turn-Key-Tech LLC,
`381 F.3d 1142 (Fed. Cir. 2004) .......................................................................... 49
`
`In re Lister,
`583 F.3d 1307 (Fed. Cir. 2009) .......................................................................... 56
`
`v
`
`

`
`
`Medichem, SA v. Rolabo, SL,
`437 F.3d 1157 (Fed. Cir. 2006) ......................................................................... 41
`
`Case No. IPR2015-00870
`
`Microsoft Corp. v. Proxyconn, Inc.,
`789 F.3d 1292 (Fed. Cir. 2015) .................................................................... 11, 15
`
`Motorola Solutions, Inc. v. Mobile Scanning Techs., LLC,
`IPR2013-00093, Paper No. 28 (Apr. 29, 2013) ................................................. 12
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ........................................................... 2
`
`Proveris Scientific Corp. v. Innovasystems, Inc.,
`536 F.3d 1256 (Fed. Cir. 2008) .................................................................... 48, 50
`
`Samsung Elecs. Co. v. Rembrandt Wireless Techs., LP,
`IPR2014-00514, Paper No. 18 (Sep. 9, 2014) .................................................... 57
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir. 2002) .................................................................... 48, 49
`
`In re Skvorecz,
`580 F.3d 1262 (Fed. Cir. 2009) ............................................................................ 2
`
`Square Inc. v. Unwired Planet, LLC,
`CBM2014-00156, Paper No. 22 (Feb. 26, 2015) ............................................... 53
`
`Straight Path IP Grp., Inc. v. Sipnet EU S.R.O.,
`No. 2015-1212, 2015 WL 7567492 (Fed. Cir. Nov. 25, 2015) .......................... 11
`
`Symantec Corp. v. Trustees of Columbia Univ. in the City of N.Y.,
`IPR2015-00371, Paper No. 13 (July 17, 2015) ................................ 53, 55, 56, 57
`
`Tempo Lighting, Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ...................................................................... 11, 12
`
`In re Translogic Tech., Inc.,
`504 F.3d 1249 (Fed. Cir. 2007) ............................................................................ 2
`
`Typeright Keyboard Corp. v. Microsoft Corp.,
`374 F.3d 1151 (Fed. Cir. 2004) .......................................................................... 59
`
`vi
`
`

`
`
`VirnetX Inc. v. Cisco Sys. Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) .......................................................................... 10
`
`Case No. IPR2015-00870
`
`Xilinx, Inc. v. Intellectual Ventures I LLC,
`IPR2013-00112, Paper No. 14 (June 27, 2013) ................................................. 12
`
`In re Yamamoto,
`740 F.2d 1569 (Fed. Cir. 1984) ............................................................................ 2
`
`In re Young,
`927 F.2d 588 (Fed. Cir. 1991) ........................................................................... 41
`
`ZTE Corp. & ZTE (USA) Inc. v. ContentGuard Holdings Inc.,
`IPR2013-00134, Paper No. 12 (June 19, 2013) ................................................. 12
`
`Federal Statutes
`
`35 U.S.C. § 311(b) ................................................................................................... 51
`
`35 U.S.C. § 316(e) ..................................................................................................... 1
`
`Federal Rules
`
`37 C.F.R. § 42.65(a) ............................................................................................ 46,59
`
`37 C.F.R. § 42.100(b) ................................................................................................ 2
`
`37 C.F.R. § 42.104(b)(5) .......................................................................................... 53
`
`
`
`vii
`
`

`
`
`
`I.
`
`Introduction
`
`
`
`Case No. IPR2015-00870
`
`Patent Owner VirnetX Inc. respectfully submits this Response to the Board’s
`
`decision to institute inter partes review (Paper No. 8, the “Decision”) and to the
`
`petition for inter partes review (the “Petition” or “Pet.”) filed by Apple Inc. The
`
`Board instituted review of U.S. Patent No. 8,560,705 (“the ’0705 patent”) on the
`
`following grounds: (1) obviousness of claims 1-23 and 25-30 over Beser and RFC
`
`2401; and (2) obviousness of claim 24 over Beser, RFC 2401, and Brand.
`
`Petitioner has not carried its “burden of proving . . . unpatentability by a
`
`preponderance of the evidence” (35 U.S.C. § 316(e)) because the asserted
`
`references fail to disclose each of the claimed features. In addition, Petitioner has
`
`failed to show that RFC 2401 is a prior art printed publication and Petitioner’s
`
`submitted expert testimony should also be given little to no weight because it fails
`
`to describe how any of the claim features are taught or suggested in the asserted
`
`references. Accordingly, the Board should enter judgment against Petitioner and
`
`terminate this proceeding.
`
`II. Claim Construction
`The Petition identified eight terms for construction. In its Preliminary
`
`Response, Patent Owner addressed Petitioner’s constructions. The Decision
`
`declined to provide constructions for any terms finding that “neither party has
`
`identified a dispositive term for construction” and determining that “no claim term
`
` 1
`
`
`
`

`
`
`needs express construction.” (Decision at 6.)
`
`Case No. IPR2015-00870
`
`In inter partes review, claims are to be given their “broadest reasonable
`
`construction in light of the specification.” 37 C.F.R. § 42.100(b). Under this
`
`standard, terms are “generally given their ordinary and customary meaning,” which
`
`is the meaning that the term would have to a person of ordinary skill1 at the time of
`
`the invention. See In re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir.
`
`2007) (quoting Phillips v. AWH Corp., 415 F.3d 1303, 1312, 1313 (Fed. Cir. 2005)
`
`(en banc)). Although VirnetX’s constructions represent the broadest reasonable
`
`interpretation (BRI) of the claims in light of the specification and prosecution
`
`history, the Board should apply the claim construction standard applied by the
`
`courts, especially given the litigations and prosecution histories of the patents in
`
`the same family as the ’0705 patent. The BRI standard “is solely an examination
`
`expedient, not a rule of claim construction.” In re Skvorecz, 580 F.3d 1262, 1267-
`
`68 (Fed. Cir. 2009). It is certainly justified during the examination process
`
`because applicant has the opportunity to amend the claims during prosecution. In
`
`re Yamamoto, 740 F.2d 1569, 1571 (Fed. Cir. 1984). But, as the Board has noted,
`
`1 A person of ordinary skill in the art at the relevant time would have had a
`
`master’s degree in computer science or computer engineering and approximately
`
`two years of experience in computer networking and computer security. (Ex. 2018
`
`at ¶¶ 13-14.)
`
`2
`
`

`
`
`inter partes review is not an examination and is “more adjudicatory than
`
`Case No. IPR2015-00870
`
`examinational, in nature.” Idle Free Sys., Inc. v. Bergstrom, Inc., IPR2012-00027,
`
`Paper No. 26 at 6 (June 11, 2013).
`
`The ability to amend claims during inter partes review is so severely
`
`restricted that the rationale underpinning the BRI—the ability to freely amend
`
`claims—does not apply especially given the litigations and prosecution histories of
`
`patents in the same family as the ’0705 patent. As a result, to the extent the Board
`
`would have adopted a narrower construction under the courts’ claim construction
`
`standard than it has adopted here, it should adopt the narrower construction
`
`because the BRI standard should not apply to this proceeding.
`
`The Court of Appeals for the Federal Circuit refused to reconsider en banc
`
`the application of the BRI standard in Board proceedings, but the Supreme Court
`
`recently granted certiorari. In re Cuozzo, 793 F.3d 1297 (Fed. Cir. 2015); Cuozzo
`
`Speed Techs., LLC v. Lee, No. 15-446, 2016 WL 205946, at *1 (U.S. Jan. 15,
`
`2016). VirnetX respectfully submits that, given “the adjudicative nature and the
`
`limited amendment process of IPRs,” claims in IPR proceedings should be given
`
`their “actual meaning.” In re Cuozzo, 793 F.3d at 1299, 1301-02 (Prost, C.J.,
`
`dissenting from denial of en banc rehearing). VirnetX preserves this argument in
`
`the event the Supreme Court reverses the Federal Circuit’s decision in Cuozzo and
`
`instructs that a different standard should be applied.
`
`3
`
`

`
`
`
`A.
`
`“Interception of a Request . . . to Look up an Internet Protocol
`(IP) address” (Claims 1, 5, 9, 16, 19, and 23)2
`
`Case No. IPR2015-00870
`
`Apple’s Proposed
`Construction
`Receiving a request
`pertaining to a first entity
`at another entity
`
`Decision’s Construction
`
`No construction proposed
`
`Patent Owner’s Proposed
`Construction
`No construction
`necessary; alternatively,
`receiving a request to
`look up an internet
`protocol address and,
`apart from resolving it
`into an address,
`performing an evaluation
`on it related to
`establishing a secure
`communication link
`
`
`Petitioner proposes that “interception of the request” be construed similarly
`
`to an interpretation that the Board adopted in a related proceeding. (Pet. at 9-10,
`
`citing Apple Inc. v. VirnetX Inc., IPR2014-00237, Paper No. 15 at 12-13.) Though
`
`the Board declined to preliminarily construe this term in this proceeding, if the
`
`Board later deems construction necessary, it should construe the term in its entirety
`
`as proposed by Patent Owner’s alternative construction. As explained in Patent
`
`Owner’s Preliminary Response, in contrast to Petitioner’s proposal, Patent
`
`Owner’s alternative construction appropriately captures the notion of performing
`
`
`2 Patent Owner identifies only the challenged claims that expressly recite the terms
`
`at issue. Claims that depend from the identified claims may also implicitly contain
`
`the terms.
`
`4
`
`

`
`
`an additional evaluation on a request to look up an IP address related to
`
`Case No. IPR2015-00870
`
`establishing an encrypted communications channel, beyond conventionally
`
`resolving it and returning the address. (Prelim. Resp. at 30-33.) The independent
`
`claims support this construction, for example, by reciting that a determination is
`
`made as a result of the request [to look up an IP address] that the second network
`
`device is a device that is available for the secure communication service. (Ex.
`
`1050, claims 1 and 16.) Additionally, dependent claims 5 and 19 expressly specify
`
`the evaluation, reciting that the “interception” involves “receiving the request to
`
`determine
`
`that
`
`the second network device
`
`is available for
`
`the secure
`
`communications service.” (Ex. 1050, claims 5 and 19.)
`
`B.
`
`Secure Communication Link (Claims 1, 4, 6, 8, 10-12, 16, 20, 21,
`24-27)
`
`Patent Owner’s Proposed
`Construction
`A direct communication link
`that provides data security
`through encryption
`
`Decision’s
`Construction
`No construction
`proposed
`
`Petitioner’s Proposed
`Construction
`A transmission path that
`restricts access to data,
`addresses, or other
`information on the path,
`generally using obfuscation
`methods to hide information
`on the path, including, but
`not limited to, one or more
`of authentication,
`encryption, or address
`hopping
`
`
`As discussed in the preliminary response, a “secure communication link” in
`
`view of the specification is “a direct communication link that provides data
`
`5
`
`

`
`
`security through encryption.” (Prelim. Resp. at 46-51; see also Ex. 2018 at ¶¶ 15-
`
`Case No. IPR2015-00870
`
`26.) Petitioner’s proposed construction contradicts the plain language of the
`
`claims, is internally inconsistent, is inconsistent with the ’0705 patent specification
`
`and prosecution history, and is inconsistent with its own prior statements.
`
`1.
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Secure Communication Link”
`
`Petitioner’s proposed construction (Pet. at 11-12) is internally inconsistent
`
`and
`
`technically flawed.
`
` Of
`
`the obfuscation methods
`
`in
`
`the proposed
`
`construction—authentication, encryption, and address hopping—only encryption
`
`restricts access to “data, addresses, or other information on the path,” as required
`
`by the first portion of the construction. (Ex. 2018 at ¶ 17.) The other techniques
`
`alone do not “hide information on the path,” as Petitioner’s construction requires.
`
`(Id.)
`
`Authentication merely “[e]nsur[es] that a message originated from the
`
`expected sender and has not been altered on route.” (Ex. 2008 at 3, Glossary for
`
`the Linux FreeS/WAN Project.) It does not prevent an eavesdropper from
`
`accessing data transmitted over an unsecure communication link. (Ex. 2018 at ¶
`
`18.) The specification supports this fact by describing at least one scenario where
`
`an authenticated transmission occurs “in the clear”—i.e., over an unsecured
`
`communication link:
`
`SDNS [secure domain name service] 3313 can be accessed
`
`6
`
`

`
`
`
`Case No. IPR2015-00870
`
`through secure portal 3310 “in the clear”, that is, without using
`an administrative VPN communication link. In this situation,
`secure portal 3310 preferably authenticates the query using any
`well-known technique, such as a cryptographic technique,
`before allowing the query to proceed to SDNS [3313].
`
`(Ex. 1050 at 51:52-57.)
`
`Address hopping alone also does not provide the claimed security, as there is
`
`nothing inherent in moving from address to address that hides information on the
`
`path or precludes an eavesdropper from reading the details of a communication.
`
`(Ex. 2018 at ¶ 19.) This is why the ’0705 patent discloses embodiments that use
`
`encryption in conjunction with address hopping to protect, for example, the next
`
`address in a routing scheme from being viewed by eavesdroppers. (See, e.g., Ex.
`
`1050 at 3:36-50, stating in part that “[e]ach TARP packet’s true destination is
`
`concealed behind a layer of encryption generated using a link key.”) It is the
`
`encryption that hides information on the path while moving from address to
`
`address. (See, e.g., Ex. 1050 at 3:16-4:40; Ex. 2018 at ¶ 19.)
`
`While authentication and address hopping may be used in conjunction with
`
`encryption as an “obfuscation method,” this fact does not make them sufficient by
`
`themselves to “hide information on the path,” as Petitioner’s construction requires.
`
`(Ex. 2018 at ¶¶ 19-20.) Because Petitioner’s construction presents them as
`
`alternatives, allowing each to be sufficient, Petitioner’s construction must be
`
`7
`
`

`
`
`rejected.
`
`Case No. IPR2015-00870
`
`Petitioner asserts, however, that Patent Owner’s expert agrees that address
`
`hopping hides information on the path. (Pet. at 11, citing Ex. 1055 at 113:16-
`
`114:12.) But, as Patent Owner’s expert explained, address hopping simply makes
`
`it such that “[y]ou may not be able to determine in isolation who is speaking to
`
`whom.” (Ex. 1055 at 114:1-6.) In other words, address hopping may make it more
`
`difficult to determine the originating and terminating devices, but it alone does not
`
`“hide” the addresses. (Ex. 2018 at ¶ 20.) Thus, Petitioner’s proposed construction
`
`of “secure communication link” should be rejected.
`
`A “Secure Communication Link” Must Be Direct
`
`2.
`Petitioner’s construction incorrectly encompasses links that are not direct.
`
`The ’0705 patent specification describes a secure communication link as “direct”
`
`between a client and target device and the prosecution history of related VirnetX
`
`patents supports this understanding.
`
`For instance, in one embodiment, the ’0705 patent describes the link
`
`between an originating TARP terminal and a destination TARP terminal as direct.
`
`(See, e.g., Ex. 1050, 9:41-50, Fig. 2; see also id. at 33:51-57 (describing a variation
`
`of the TARP embodiments as including a direct communication link); 38:11-14
`
`(describing the embodiment of Figure 24 in which a first computer and second
`
`computer are connected directly).) The ’0705 patent similarly describes direct
`
`8
`
`

`
`
`communications in later embodiments as well. (See, e.g., id. at 40:13-16, 41:5-8
`
`Case No. IPR2015-00870
`
`(describing a virtual private network as being direct between a user’s computer and
`
`target), 42:12-16, 43:5-9 (describing a load balancing example in which a virtual
`
`private network is direct between a first host and a second host), 49:8-10, 49:16-31
`
`(describing a secure communication link that is direct between a first computer and
`
`a second computer), Figs. 24, 26, 28, 29, 33; Ex. 2018 at ¶¶ 21-24.) In each of
`
`these embodiments, the ’0705 patent specification discloses that the link traverses
`
`a network (or networks) through which it is simply passed or routed via various
`
`network devices such as Internet Service Providers, firewalls, and routers. (See,
`
`e.g., Ex. 1050 at Figs. 2, 24, 28, 29, 33; Ex. 2018 at ¶¶ 21-24.)
`
`Moreover, Patent Owner also clearly and unambiguously disclaimed a
`
`secure communication link that is not direct in connection with the prosecution of a
`
`related VirnetX patent. (Ex. 2012 at 8.) In particular, Patent Owner explained that
`
`“Aventail has not been shown to disclose a secure communication link because
`
`computers connected according to Aventail do not communicate directly with each
`
`other.” (Id.)
`
`Given the specification’s disclosure and the prosecution history, during
`
`litigation Petitioner contended that a “secure communication link” requires direct
`
`communication. (Ex. 2002 at 5-7, 10 (contending that a “secure communication
`
`link” should be construed consistently with a “virtual private network
`
`9
`
`

`
`
`communication link”, which requires direct communication).)
`
`Case No. IPR2015-00870
`
`Indeed, both a district court and the Federal Circuit agreed with Petitioner
`
`and concluded that a secure communication link requires “direct communication.”
`
`The Federal Circuit stated that the district court’s construction of VPN is “a
`
`network of computers which privately and directly communicate with each other
`
`by encrypting traffic on insecure paths between the computers where the
`
`communication is both secure and anonymous.” VirnetX Inc. v. Cisco Systems,
`
`Inc., 767 F.3d 1308, 1317 n.1 (Fed. Cir. 2014). Based on that construction, the
`
`Federal Circuit held that a secure communication link similarly requires “a direct
`
`communication link . . . .” Id. at 1319.
`
`When a patentee has “unequivocally and unambigously disavow[ed] a
`
`certain meaning,” as the Patent Owner did here, the doctrine of prosecution history
`
`disclaimer overcomes any ordinary meaning of the term and the term must be
`
`construed “consistent with the scope of the claim being surrendered.” Biogen Idec,
`
`Inc. v. GlaxoSmithKline, 713 F.3d 1090, 1095 (Fed. Cir. 2013.) The district court
`
`recognized this to be the case, construing a “secure communication link” as “a
`
`direct communication link . . . .” (Ex. 2004 at 10-13.) The Federal Circuit
`
`likewise affirmed that a “secure communication link” is “a direct communication
`
`link . . . .” VirnetX, Inc., 767 F.3d at 1319.
`
`In the institution decision in co-pending IPR2015-00871, the Board relies on
`
`10
`
`

`
`
`Tempo Lighting, Inc. v. Tivoli, LLC, 742 F.3d 973 (Fed. Cir. 2014), to dismiss
`
`Case No. IPR2015-00870
`
`Patent Owner’s prosecution history arguments. Apple Inc. v. VirnetX Inc.,
`
`IPR2015-00871, Paper No. 8 at 19, n. 6 (Oct. 1, 2015) Specifically, the Board has
`
`highlighted the Federal Circuit’s dicta in Tempo Lighting that the PTO is not
`
`automatically required “to accept a claim construction proffered as a prosecution
`
`history disclaimer,” since the disclaimer “generally only binds the patent owner.”
`
`742 F.3d at 978. But while a patent examiner is not bound by a patent owner’s
`
`disclaimer when construing claim
`
`terms, an unambiguous disclaimer
`
`is
`
`nevertheless informative with respect to the patent’s scope and should be given
`
`effect in subsequent IPR proceedings. Where a “patent has been brought back to
`
`the agency for a second review,” the Board should consult the patent’s prosecution
`
`history. Microsoft Corp. v. Proxyconn, Inc., 789 F.3d 1292, 1298 (Fed. Cir. 2015);
`
`Straight Path IP Grp., Inc. v. Sipnet EU S.R.O., No. 2015-1212, 2015 WL
`
`7567492, at *6 (Fed. Cir. Nov. 25, 2015) (prosecution history “is to be consulted
`
`even in determining a claim’s broadest reasonable interpretation”).
`
`Despite its statement in Tempo Lighting, the Federal Circuit there applied
`
`prosecution history disclaimer where an examiner requested the patent applicant to
`
`rewrite its claims to clarify a specific claim term, resulting in an applicant’s
`
`disclaiming remarks. 742 F.3d at 977-78. Here too, in the related reexamination
`
`proceeding, the examiner construed “virtual private network communication link”
`
`11
`
`

`
`
`more broadly than the specification, and VirnetX disclaimed embodiments that did
`
`Case No. IPR2015-00870
`
`not involve direct communication in response to the examiner’s broadening of the
`
`claim. (Ex. 2006 at 8; Ex. 2011 at 7.) Just as in Tempo Lighting, this disclaimer
`
`was a “clarification” of the meaning of the term “virtual private network
`
`communication link.” 742 F.3d at 978. The Board should consider and apply
`
`Patent Owner’s prosecution history disclaimer here.
`
`There is no reason the Board should find any differently here. Indeed, the
`
`Board has relied on prosecution history statements in construing claims in
`
`numerous other inter partes reviews. See, e.g., Garmin Int’l inc. v. Cuozzo Speed
`
`Tech, LLC, IPR2012-00001, Paper No. 15 at 8 (Jan. 9, 2013); Motorola Solutions,
`
`Inc. v. Mobile Scanning Techs., LLC, IPR2013-00093, Paper No. 28 at 10 (Apr. 29,
`
`2013); ZTE Corp. & ZTE (USA) Inc. v. ContentGuard Holdings Inc., IPR2013-
`
`00134, Paper No. 12 at 16 (June 19, 2013); Xilinx, Inc. v. Intellectual Ventures I
`
`LLC, IPR2013-00112, Paper No. 14 at 6 (June 27, 2013).
`
`Here, the language of the claims further compels a construction that includes
`
`direct communication. Specifically, both claims 1 and 16 recite in some variation
`
`“a connection of the client device with a target device over a secure
`
`communication link,” indicating that the secure communication link is direct. (Ex.
`
`1050, claims 1 and 16.) Thus, like the district court and the Federal Circuit, the
`
`Board should find
`
`that a secure communication
`
`link requires “direct”
`
`12
`
`

`
`
`communication. Petitioner’s construction of “secure communication link,” which
`
`Case No. IPR2015-00870
`
`does not require direct communication, should be rejected.
`
`A “Secure Communication Link” Requires Encryption
`
`3.
`While the Petitioner notes that the Federal Circuit appears to agree that a
`
`“secure communication link” requires encryption (Pet. at 26-27), its construction
`
`fails to require encryption. Petitioner’s proposed construction is contrary to the
`
`specification, which “repeatedly and consistently” explains
`
`that a secure
`
`communication link requires encryption. See Eon–Net LP v. Flagstar Bancorp.,
`
`653 F.3d 1314, 1321–23 (Fed. Cir. 2011). For instance, the ’0705 patent
`
`specification teaches that “data security is usually tackled using some form of data
`
`encryption,” and it repeatedly discusses using encryption. (Ex. 1050 at 1:57-58;
`
`see also id. at 3:17-19 (“TARP” embodiments described as using a “unique two-
`
`layer encryption format”), 3:36-37 (“[e]ach TARP packet’s true destination
`
`address is concealed behind a layer of encrypti

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket