`Filed: January 25, 2016
`
`Naveen Modi
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1990
`Facsimile: (202) 551-0490
`E-mail: naveenmodi@paulhastings.com
`
`
`Filed on behalf of: VirnetX Inc.
`By:
`
`Joseph E. Palys
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1996
`Facsimile: (202) 551-0496
`E-mail: josephpalys@paulhastings.com
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.
`Petitioner
`
`v.
`
`VIRNETX INC.
`Patent Owner
`
`
`
`
`
`
`
`Case IPR2015-00870
`Patent 8,560,705
`
`
`
`
`
`
`
`
`
`
`Patent Owner’s Response
`
`
`
`
`
`
`
`
`
`
`
`I.
`
`II.
`
`
`
`Case No. IPR2015-00870
`
`Table of Contents
`
`Introduction ...................................................................................................... 1
`
`Claim Construction .......................................................................................... 1
`
`A.
`
`B.
`
`“Interception of a Request . . . to Look up an Internet Protocol
`(IP) address” (Claims 1, 5, 9, 16, 19, and 23) ....................................... 4
`
`Secure Communication Link (Claims 1, 4, 6, 8, 10-12, 16, 20,
`21, 24-27) .............................................................................................. 5
`
`1.
`
`2.
`
`3.
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Secure Communication Link”................................. 6
`
`A “Secure Communication Link” Must Be Direct ..................... 8
`
`A “Secure Communication Link” Requires Encryption ........... 13
`
`C. Virtual Private Network Link” (Claims 6 and 21) .............................. 15
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`A “Virtual Private Network Link” Requires a Virtual
`Private Network ........................................................................ 16
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Virtual Private Network Link”.............................. 17
`
`A “Virtual Private Network Link” Must Be Direct .................. 18
`
`A “Virtual Private Network Link” Requires a Network ........... 19
`
`A “Virtual Private Network Link” Requires Encryption .......... 21
`
`D.
`
`E.
`
`“Secure Domain Name” (Claims 7 and 22) ........................................ 22
`
`Other Terms ......................................................................................... 25
`
`III. The Cited References Do Not Render Claims 1-30 Unpatentable ................ 27
`
`A.
`
`Beser and RFC 2401 Do Not Render Claims 1-23 and 25-30
`Unpatentable ........................................................................................ 27
`
`1.
`
`Beser’s Disclosure..................................................................... 27
`
`i
`
`
`
`
`
`Case No. IPR2015-00870
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`Beser and RFC 2401 Do Not Disclose “Interception of a
`Request, Generated By the Client Device, to Look Up an
`Internet Protocol (IP) Address of the Target Device
`Based on a Domain Name Associated With the Target
`Device” ...................................................................................... 30
`
`a)
`
`b)
`
`The Alleged Request in Beser Is Not a “Request . .
`. to Look Up an Internet Protocol (IP) Address” ............ 31
`
`The Alleged Request in Beser Is Not
`“Intercept[ed]” ................................................................ 33
`
`Beser and RFC 2401 Would Not Have Been Combined
`as the Petition Suggests ............................................................. 36
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 6 and 21 ......................................................................... 42
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 7 and 22 ......................................................................... 43
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 13 and 28....................................................................... 44
`
`Dependent Claims 2-5, 8-12, 14, 15, 17-20, 23, 25-27,
`29, and 30 .................................................................................. 47
`
`B.
`
`Beser, RFC 2401, and Brand Do Not Render Obvious Claim 24 ...... 47
`
`IV. Petitioner’s Expert Testimony Should be Accorded Little, If Any
`Weight ............................................................................................................ 47
`
`V.
`
`Each of the Instituted Grounds Is Based on At Least One Reference
`That Does Not Qualify As Prior Art .............................................................. 51
`
`A.
`
`Petitioner Has Not Established that RFC 2401 Is a Prior Art
`Printed Publication .............................................................................. 52
`
`1.
`
`The Evidence Presented with the Petition Cannot
`Establish by a Preponderance of the Evidence that RFC
`2401 Was Publicly Accessible .................................................. 52
`
`ii
`
`
`
`
`
`Case No. IPR2015-00870
`
`2.
`
`3.
`
`The Board’s Findings Are Insufficient to Establish by a
`Preponderance of the Evidence that RFC 2401 Was
`Publicly Accessible ................................................................... 54
`
`The Supplemental Information Is Also Insufficient to
`Establish by a Preponderance of the Evidence that RFC
`2401 Was Publicly Accessible .................................................. 57
`
`VI. Conclusion ..................................................................................................... 60
`
`
`
`iii
`
`
`
`
`
`
`
`Case No. IPR2015-00870
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Alexsam, Inc. v. IDT Corp.,
`715 F.3d 1336 (Fed. Cir. 2013) .......................................................................... 50
`
`Apple Inc. v. DSS Technology Management, Inc.,
`IPR2015-00369, Paper No. 9 (June 25, 2015) .................................................... 53
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00237, Paper No. 15 (May 14, 2014) .............................................. 4, 34
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00481, Paper No. 11 (September 3, 2014) ......................................... 22
`
`Apple Inc. v. VirnetX Inc.,
`IPR2015-00871, Paper No. 8 (Oct. 1, 2015) ............................................... 10, 11
`
`Apple Inc. v. VirnetX Inc.
`IPR2015-01009, Paper No. 1 (Apr. 28, 2015) ................................................... 25
`
`Aspex Eyewear, Inc. v. Concepts In Optics, Inc.,
`111 F. App’x 582 (Fed. Cir. 2004) ............................................................... 48, 50
`
`Biogen Idec, Inc. v. GlaxoSmithKline LLC,
`713 F.3d 1090 (Fed. Cir. 2013) ........................................................ 10, 15, 19, 24
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) ............................................................................ 48
`
`Bruckelmyer v. Ground Heaters, Inc.,
`445 F.3d 1374 (Fed. Cir. 2006) .......................................................................... 51
`
`Centricut, LLC v. Esab Group, Inc.,
`390 F.3d 1361 (Fed. Cir. 2004) .......................................................................... 48
`
`In re Cuozzo,
`793 F.3d 1297 (Fed. Cir. 2015) ............................................................................ 3
`
`Cuozzo Speed Techs., LLC v. Lee,
`No. 15-446, 2016 WL 205946 (U.S. Jan. 15, 2016) ............................................ 3
`
`iv
`
`
`
`
`Cyber Corp. v. FAS Techs., Inc.,
`138 F.3d 1448 (Fed. Cir. 1998) .................................................................... 19, 24
`
`Case No. IPR2015-00870
`
`Dish Network L.L.C. v. Dragon Intellectual Property, LLC,
`IPR2015-00499, Paper No. 7 (July 17, 2015) .................................................... 54
`
`Elec. Frontier Found. v. Pers. Audio, LLC,
`IPR2014-00070, Paper No. 21 (Apr. 18, 2014) .................................................. 57
`
`Eon–Net LP v. Flagstar Bancorp.,
`653 F.3d 1314 (Fed. Cir. 2011) ......................................................................... 13
`
`Finnigan Corp. v. ITC,
`180 F.3d 1354 (Fed. Cir. 1999) .......................................................................... 59
`
`In re Fulton,
`391 F.3d 1195 (Fed. Cir. 2004) ......................................................................... 41
`
`Garmin Int’l inc. v. Cuozzo Speed Tech, LLC,
`IPR2012-00001, Paper No. 15 (Jan. 9, 2013) ................................................... 12
`
`Google Inc. v. Art+Com Innovationpool GMBH,
`IPR2015-00788, Paper No. 7 (September 2, 2015) ...................................... 53, 56
`
`In re Gurley,
`27 F.3d 551 (Fed. Cir. 1994) ............................................................................. 41
`
`Idle Free Sys., Inc. v. Bergstrom, Inc.,
`IPR2012-00027, Paper No. 26 (June 11, 2013) .................................................... 3
`
`Kinetic Technologies, Inc. v. Skyworks Solutions, Inc.,
`IPR2014-00690, Paper No. 43 (October 19, 2015) ...................................... 51, 59
`
`In re Klopfenstein,
`380 F.3d 1345 (Fed. Cir. 2004) .......................................................................... 51
`
`Koito Mfg. Co. v. Turn-Key-Tech LLC,
`381 F.3d 1142 (Fed. Cir. 2004) .......................................................................... 49
`
`In re Lister,
`583 F.3d 1307 (Fed. Cir. 2009) .......................................................................... 56
`
`v
`
`
`
`
`Medichem, SA v. Rolabo, SL,
`437 F.3d 1157 (Fed. Cir. 2006) ......................................................................... 41
`
`Case No. IPR2015-00870
`
`Microsoft Corp. v. Proxyconn, Inc.,
`789 F.3d 1292 (Fed. Cir. 2015) .................................................................... 11, 15
`
`Motorola Solutions, Inc. v. Mobile Scanning Techs., LLC,
`IPR2013-00093, Paper No. 28 (Apr. 29, 2013) ................................................. 12
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ........................................................... 2
`
`Proveris Scientific Corp. v. Innovasystems, Inc.,
`536 F.3d 1256 (Fed. Cir. 2008) .................................................................... 48, 50
`
`Samsung Elecs. Co. v. Rembrandt Wireless Techs., LP,
`IPR2014-00514, Paper No. 18 (Sep. 9, 2014) .................................................... 57
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir. 2002) .................................................................... 48, 49
`
`In re Skvorecz,
`580 F.3d 1262 (Fed. Cir. 2009) ............................................................................ 2
`
`Square Inc. v. Unwired Planet, LLC,
`CBM2014-00156, Paper No. 22 (Feb. 26, 2015) ............................................... 53
`
`Straight Path IP Grp., Inc. v. Sipnet EU S.R.O.,
`No. 2015-1212, 2015 WL 7567492 (Fed. Cir. Nov. 25, 2015) .......................... 11
`
`Symantec Corp. v. Trustees of Columbia Univ. in the City of N.Y.,
`IPR2015-00371, Paper No. 13 (July 17, 2015) ................................ 53, 55, 56, 57
`
`Tempo Lighting, Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ...................................................................... 11, 12
`
`In re Translogic Tech., Inc.,
`504 F.3d 1249 (Fed. Cir. 2007) ............................................................................ 2
`
`Typeright Keyboard Corp. v. Microsoft Corp.,
`374 F.3d 1151 (Fed. Cir. 2004) .......................................................................... 59
`
`vi
`
`
`
`
`VirnetX Inc. v. Cisco Sys. Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) .......................................................................... 10
`
`Case No. IPR2015-00870
`
`Xilinx, Inc. v. Intellectual Ventures I LLC,
`IPR2013-00112, Paper No. 14 (June 27, 2013) ................................................. 12
`
`In re Yamamoto,
`740 F.2d 1569 (Fed. Cir. 1984) ............................................................................ 2
`
`In re Young,
`927 F.2d 588 (Fed. Cir. 1991) ........................................................................... 41
`
`ZTE Corp. & ZTE (USA) Inc. v. ContentGuard Holdings Inc.,
`IPR2013-00134, Paper No. 12 (June 19, 2013) ................................................. 12
`
`Federal Statutes
`
`35 U.S.C. § 311(b) ................................................................................................... 51
`
`35 U.S.C. § 316(e) ..................................................................................................... 1
`
`Federal Rules
`
`37 C.F.R. § 42.65(a) ............................................................................................ 46,59
`
`37 C.F.R. § 42.100(b) ................................................................................................ 2
`
`37 C.F.R. § 42.104(b)(5) .......................................................................................... 53
`
`
`
`vii
`
`
`
`
`
`I.
`
`Introduction
`
`
`
`Case No. IPR2015-00870
`
`Patent Owner VirnetX Inc. respectfully submits this Response to the Board’s
`
`decision to institute inter partes review (Paper No. 8, the “Decision”) and to the
`
`petition for inter partes review (the “Petition” or “Pet.”) filed by Apple Inc. The
`
`Board instituted review of U.S. Patent No. 8,560,705 (“the ’0705 patent”) on the
`
`following grounds: (1) obviousness of claims 1-23 and 25-30 over Beser and RFC
`
`2401; and (2) obviousness of claim 24 over Beser, RFC 2401, and Brand.
`
`Petitioner has not carried its “burden of proving . . . unpatentability by a
`
`preponderance of the evidence” (35 U.S.C. § 316(e)) because the asserted
`
`references fail to disclose each of the claimed features. In addition, Petitioner has
`
`failed to show that RFC 2401 is a prior art printed publication and Petitioner’s
`
`submitted expert testimony should also be given little to no weight because it fails
`
`to describe how any of the claim features are taught or suggested in the asserted
`
`references. Accordingly, the Board should enter judgment against Petitioner and
`
`terminate this proceeding.
`
`II. Claim Construction
`The Petition identified eight terms for construction. In its Preliminary
`
`Response, Patent Owner addressed Petitioner’s constructions. The Decision
`
`declined to provide constructions for any terms finding that “neither party has
`
`identified a dispositive term for construction” and determining that “no claim term
`
` 1
`
`
`
`
`
`
`needs express construction.” (Decision at 6.)
`
`Case No. IPR2015-00870
`
`In inter partes review, claims are to be given their “broadest reasonable
`
`construction in light of the specification.” 37 C.F.R. § 42.100(b). Under this
`
`standard, terms are “generally given their ordinary and customary meaning,” which
`
`is the meaning that the term would have to a person of ordinary skill1 at the time of
`
`the invention. See In re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir.
`
`2007) (quoting Phillips v. AWH Corp., 415 F.3d 1303, 1312, 1313 (Fed. Cir. 2005)
`
`(en banc)). Although VirnetX’s constructions represent the broadest reasonable
`
`interpretation (BRI) of the claims in light of the specification and prosecution
`
`history, the Board should apply the claim construction standard applied by the
`
`courts, especially given the litigations and prosecution histories of the patents in
`
`the same family as the ’0705 patent. The BRI standard “is solely an examination
`
`expedient, not a rule of claim construction.” In re Skvorecz, 580 F.3d 1262, 1267-
`
`68 (Fed. Cir. 2009). It is certainly justified during the examination process
`
`because applicant has the opportunity to amend the claims during prosecution. In
`
`re Yamamoto, 740 F.2d 1569, 1571 (Fed. Cir. 1984). But, as the Board has noted,
`
`1 A person of ordinary skill in the art at the relevant time would have had a
`
`master’s degree in computer science or computer engineering and approximately
`
`two years of experience in computer networking and computer security. (Ex. 2018
`
`at ¶¶ 13-14.)
`
`2
`
`
`
`
`inter partes review is not an examination and is “more adjudicatory than
`
`Case No. IPR2015-00870
`
`examinational, in nature.” Idle Free Sys., Inc. v. Bergstrom, Inc., IPR2012-00027,
`
`Paper No. 26 at 6 (June 11, 2013).
`
`The ability to amend claims during inter partes review is so severely
`
`restricted that the rationale underpinning the BRI—the ability to freely amend
`
`claims—does not apply especially given the litigations and prosecution histories of
`
`patents in the same family as the ’0705 patent. As a result, to the extent the Board
`
`would have adopted a narrower construction under the courts’ claim construction
`
`standard than it has adopted here, it should adopt the narrower construction
`
`because the BRI standard should not apply to this proceeding.
`
`The Court of Appeals for the Federal Circuit refused to reconsider en banc
`
`the application of the BRI standard in Board proceedings, but the Supreme Court
`
`recently granted certiorari. In re Cuozzo, 793 F.3d 1297 (Fed. Cir. 2015); Cuozzo
`
`Speed Techs., LLC v. Lee, No. 15-446, 2016 WL 205946, at *1 (U.S. Jan. 15,
`
`2016). VirnetX respectfully submits that, given “the adjudicative nature and the
`
`limited amendment process of IPRs,” claims in IPR proceedings should be given
`
`their “actual meaning.” In re Cuozzo, 793 F.3d at 1299, 1301-02 (Prost, C.J.,
`
`dissenting from denial of en banc rehearing). VirnetX preserves this argument in
`
`the event the Supreme Court reverses the Federal Circuit’s decision in Cuozzo and
`
`instructs that a different standard should be applied.
`
`3
`
`
`
`
`
`A.
`
`“Interception of a Request . . . to Look up an Internet Protocol
`(IP) address” (Claims 1, 5, 9, 16, 19, and 23)2
`
`Case No. IPR2015-00870
`
`Apple’s Proposed
`Construction
`Receiving a request
`pertaining to a first entity
`at another entity
`
`Decision’s Construction
`
`No construction proposed
`
`Patent Owner’s Proposed
`Construction
`No construction
`necessary; alternatively,
`receiving a request to
`look up an internet
`protocol address and,
`apart from resolving it
`into an address,
`performing an evaluation
`on it related to
`establishing a secure
`communication link
`
`
`Petitioner proposes that “interception of the request” be construed similarly
`
`to an interpretation that the Board adopted in a related proceeding. (Pet. at 9-10,
`
`citing Apple Inc. v. VirnetX Inc., IPR2014-00237, Paper No. 15 at 12-13.) Though
`
`the Board declined to preliminarily construe this term in this proceeding, if the
`
`Board later deems construction necessary, it should construe the term in its entirety
`
`as proposed by Patent Owner’s alternative construction. As explained in Patent
`
`Owner’s Preliminary Response, in contrast to Petitioner’s proposal, Patent
`
`Owner’s alternative construction appropriately captures the notion of performing
`
`
`2 Patent Owner identifies only the challenged claims that expressly recite the terms
`
`at issue. Claims that depend from the identified claims may also implicitly contain
`
`the terms.
`
`4
`
`
`
`
`an additional evaluation on a request to look up an IP address related to
`
`Case No. IPR2015-00870
`
`establishing an encrypted communications channel, beyond conventionally
`
`resolving it and returning the address. (Prelim. Resp. at 30-33.) The independent
`
`claims support this construction, for example, by reciting that a determination is
`
`made as a result of the request [to look up an IP address] that the second network
`
`device is a device that is available for the secure communication service. (Ex.
`
`1050, claims 1 and 16.) Additionally, dependent claims 5 and 19 expressly specify
`
`the evaluation, reciting that the “interception” involves “receiving the request to
`
`determine
`
`that
`
`the second network device
`
`is available for
`
`the secure
`
`communications service.” (Ex. 1050, claims 5 and 19.)
`
`B.
`
`Secure Communication Link (Claims 1, 4, 6, 8, 10-12, 16, 20, 21,
`24-27)
`
`Patent Owner’s Proposed
`Construction
`A direct communication link
`that provides data security
`through encryption
`
`Decision’s
`Construction
`No construction
`proposed
`
`Petitioner’s Proposed
`Construction
`A transmission path that
`restricts access to data,
`addresses, or other
`information on the path,
`generally using obfuscation
`methods to hide information
`on the path, including, but
`not limited to, one or more
`of authentication,
`encryption, or address
`hopping
`
`
`As discussed in the preliminary response, a “secure communication link” in
`
`view of the specification is “a direct communication link that provides data
`
`5
`
`
`
`
`security through encryption.” (Prelim. Resp. at 46-51; see also Ex. 2018 at ¶¶ 15-
`
`Case No. IPR2015-00870
`
`26.) Petitioner’s proposed construction contradicts the plain language of the
`
`claims, is internally inconsistent, is inconsistent with the ’0705 patent specification
`
`and prosecution history, and is inconsistent with its own prior statements.
`
`1.
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Secure Communication Link”
`
`Petitioner’s proposed construction (Pet. at 11-12) is internally inconsistent
`
`and
`
`technically flawed.
`
` Of
`
`the obfuscation methods
`
`in
`
`the proposed
`
`construction—authentication, encryption, and address hopping—only encryption
`
`restricts access to “data, addresses, or other information on the path,” as required
`
`by the first portion of the construction. (Ex. 2018 at ¶ 17.) The other techniques
`
`alone do not “hide information on the path,” as Petitioner’s construction requires.
`
`(Id.)
`
`Authentication merely “[e]nsur[es] that a message originated from the
`
`expected sender and has not been altered on route.” (Ex. 2008 at 3, Glossary for
`
`the Linux FreeS/WAN Project.) It does not prevent an eavesdropper from
`
`accessing data transmitted over an unsecure communication link. (Ex. 2018 at ¶
`
`18.) The specification supports this fact by describing at least one scenario where
`
`an authenticated transmission occurs “in the clear”—i.e., over an unsecured
`
`communication link:
`
`SDNS [secure domain name service] 3313 can be accessed
`
`6
`
`
`
`
`
`Case No. IPR2015-00870
`
`through secure portal 3310 “in the clear”, that is, without using
`an administrative VPN communication link. In this situation,
`secure portal 3310 preferably authenticates the query using any
`well-known technique, such as a cryptographic technique,
`before allowing the query to proceed to SDNS [3313].
`
`(Ex. 1050 at 51:52-57.)
`
`Address hopping alone also does not provide the claimed security, as there is
`
`nothing inherent in moving from address to address that hides information on the
`
`path or precludes an eavesdropper from reading the details of a communication.
`
`(Ex. 2018 at ¶ 19.) This is why the ’0705 patent discloses embodiments that use
`
`encryption in conjunction with address hopping to protect, for example, the next
`
`address in a routing scheme from being viewed by eavesdroppers. (See, e.g., Ex.
`
`1050 at 3:36-50, stating in part that “[e]ach TARP packet’s true destination is
`
`concealed behind a layer of encryption generated using a link key.”) It is the
`
`encryption that hides information on the path while moving from address to
`
`address. (See, e.g., Ex. 1050 at 3:16-4:40; Ex. 2018 at ¶ 19.)
`
`While authentication and address hopping may be used in conjunction with
`
`encryption as an “obfuscation method,” this fact does not make them sufficient by
`
`themselves to “hide information on the path,” as Petitioner’s construction requires.
`
`(Ex. 2018 at ¶¶ 19-20.) Because Petitioner’s construction presents them as
`
`alternatives, allowing each to be sufficient, Petitioner’s construction must be
`
`7
`
`
`
`
`rejected.
`
`Case No. IPR2015-00870
`
`Petitioner asserts, however, that Patent Owner’s expert agrees that address
`
`hopping hides information on the path. (Pet. at 11, citing Ex. 1055 at 113:16-
`
`114:12.) But, as Patent Owner’s expert explained, address hopping simply makes
`
`it such that “[y]ou may not be able to determine in isolation who is speaking to
`
`whom.” (Ex. 1055 at 114:1-6.) In other words, address hopping may make it more
`
`difficult to determine the originating and terminating devices, but it alone does not
`
`“hide” the addresses. (Ex. 2018 at ¶ 20.) Thus, Petitioner’s proposed construction
`
`of “secure communication link” should be rejected.
`
`A “Secure Communication Link” Must Be Direct
`
`2.
`Petitioner’s construction incorrectly encompasses links that are not direct.
`
`The ’0705 patent specification describes a secure communication link as “direct”
`
`between a client and target device and the prosecution history of related VirnetX
`
`patents supports this understanding.
`
`For instance, in one embodiment, the ’0705 patent describes the link
`
`between an originating TARP terminal and a destination TARP terminal as direct.
`
`(See, e.g., Ex. 1050, 9:41-50, Fig. 2; see also id. at 33:51-57 (describing a variation
`
`of the TARP embodiments as including a direct communication link); 38:11-14
`
`(describing the embodiment of Figure 24 in which a first computer and second
`
`computer are connected directly).) The ’0705 patent similarly describes direct
`
`8
`
`
`
`
`communications in later embodiments as well. (See, e.g., id. at 40:13-16, 41:5-8
`
`Case No. IPR2015-00870
`
`(describing a virtual private network as being direct between a user’s computer and
`
`target), 42:12-16, 43:5-9 (describing a load balancing example in which a virtual
`
`private network is direct between a first host and a second host), 49:8-10, 49:16-31
`
`(describing a secure communication link that is direct between a first computer and
`
`a second computer), Figs. 24, 26, 28, 29, 33; Ex. 2018 at ¶¶ 21-24.) In each of
`
`these embodiments, the ’0705 patent specification discloses that the link traverses
`
`a network (or networks) through which it is simply passed or routed via various
`
`network devices such as Internet Service Providers, firewalls, and routers. (See,
`
`e.g., Ex. 1050 at Figs. 2, 24, 28, 29, 33; Ex. 2018 at ¶¶ 21-24.)
`
`Moreover, Patent Owner also clearly and unambiguously disclaimed a
`
`secure communication link that is not direct in connection with the prosecution of a
`
`related VirnetX patent. (Ex. 2012 at 8.) In particular, Patent Owner explained that
`
`“Aventail has not been shown to disclose a secure communication link because
`
`computers connected according to Aventail do not communicate directly with each
`
`other.” (Id.)
`
`Given the specification’s disclosure and the prosecution history, during
`
`litigation Petitioner contended that a “secure communication link” requires direct
`
`communication. (Ex. 2002 at 5-7, 10 (contending that a “secure communication
`
`link” should be construed consistently with a “virtual private network
`
`9
`
`
`
`
`communication link”, which requires direct communication).)
`
`Case No. IPR2015-00870
`
`Indeed, both a district court and the Federal Circuit agreed with Petitioner
`
`and concluded that a secure communication link requires “direct communication.”
`
`The Federal Circuit stated that the district court’s construction of VPN is “a
`
`network of computers which privately and directly communicate with each other
`
`by encrypting traffic on insecure paths between the computers where the
`
`communication is both secure and anonymous.” VirnetX Inc. v. Cisco Systems,
`
`Inc., 767 F.3d 1308, 1317 n.1 (Fed. Cir. 2014). Based on that construction, the
`
`Federal Circuit held that a secure communication link similarly requires “a direct
`
`communication link . . . .” Id. at 1319.
`
`When a patentee has “unequivocally and unambigously disavow[ed] a
`
`certain meaning,” as the Patent Owner did here, the doctrine of prosecution history
`
`disclaimer overcomes any ordinary meaning of the term and the term must be
`
`construed “consistent with the scope of the claim being surrendered.” Biogen Idec,
`
`Inc. v. GlaxoSmithKline, 713 F.3d 1090, 1095 (Fed. Cir. 2013.) The district court
`
`recognized this to be the case, construing a “secure communication link” as “a
`
`direct communication link . . . .” (Ex. 2004 at 10-13.) The Federal Circuit
`
`likewise affirmed that a “secure communication link” is “a direct communication
`
`link . . . .” VirnetX, Inc., 767 F.3d at 1319.
`
`In the institution decision in co-pending IPR2015-00871, the Board relies on
`
`10
`
`
`
`
`Tempo Lighting, Inc. v. Tivoli, LLC, 742 F.3d 973 (Fed. Cir. 2014), to dismiss
`
`Case No. IPR2015-00870
`
`Patent Owner’s prosecution history arguments. Apple Inc. v. VirnetX Inc.,
`
`IPR2015-00871, Paper No. 8 at 19, n. 6 (Oct. 1, 2015) Specifically, the Board has
`
`highlighted the Federal Circuit’s dicta in Tempo Lighting that the PTO is not
`
`automatically required “to accept a claim construction proffered as a prosecution
`
`history disclaimer,” since the disclaimer “generally only binds the patent owner.”
`
`742 F.3d at 978. But while a patent examiner is not bound by a patent owner’s
`
`disclaimer when construing claim
`
`terms, an unambiguous disclaimer
`
`is
`
`nevertheless informative with respect to the patent’s scope and should be given
`
`effect in subsequent IPR proceedings. Where a “patent has been brought back to
`
`the agency for a second review,” the Board should consult the patent’s prosecution
`
`history. Microsoft Corp. v. Proxyconn, Inc., 789 F.3d 1292, 1298 (Fed. Cir. 2015);
`
`Straight Path IP Grp., Inc. v. Sipnet EU S.R.O., No. 2015-1212, 2015 WL
`
`7567492, at *6 (Fed. Cir. Nov. 25, 2015) (prosecution history “is to be consulted
`
`even in determining a claim’s broadest reasonable interpretation”).
`
`Despite its statement in Tempo Lighting, the Federal Circuit there applied
`
`prosecution history disclaimer where an examiner requested the patent applicant to
`
`rewrite its claims to clarify a specific claim term, resulting in an applicant’s
`
`disclaiming remarks. 742 F.3d at 977-78. Here too, in the related reexamination
`
`proceeding, the examiner construed “virtual private network communication link”
`
`11
`
`
`
`
`more broadly than the specification, and VirnetX disclaimed embodiments that did
`
`Case No. IPR2015-00870
`
`not involve direct communication in response to the examiner’s broadening of the
`
`claim. (Ex. 2006 at 8; Ex. 2011 at 7.) Just as in Tempo Lighting, this disclaimer
`
`was a “clarification” of the meaning of the term “virtual private network
`
`communication link.” 742 F.3d at 978. The Board should consider and apply
`
`Patent Owner’s prosecution history disclaimer here.
`
`There is no reason the Board should find any differently here. Indeed, the
`
`Board has relied on prosecution history statements in construing claims in
`
`numerous other inter partes reviews. See, e.g., Garmin Int’l inc. v. Cuozzo Speed
`
`Tech, LLC, IPR2012-00001, Paper No. 15 at 8 (Jan. 9, 2013); Motorola Solutions,
`
`Inc. v. Mobile Scanning Techs., LLC, IPR2013-00093, Paper No. 28 at 10 (Apr. 29,
`
`2013); ZTE Corp. & ZTE (USA) Inc. v. ContentGuard Holdings Inc., IPR2013-
`
`00134, Paper No. 12 at 16 (June 19, 2013); Xilinx, Inc. v. Intellectual Ventures I
`
`LLC, IPR2013-00112, Paper No. 14 at 6 (June 27, 2013).
`
`Here, the language of the claims further compels a construction that includes
`
`direct communication. Specifically, both claims 1 and 16 recite in some variation
`
`“a connection of the client device with a target device over a secure
`
`communication link,” indicating that the secure communication link is direct. (Ex.
`
`1050, claims 1 and 16.) Thus, like the district court and the Federal Circuit, the
`
`Board should find
`
`that a secure communication
`
`link requires “direct”
`
`12
`
`
`
`
`communication. Petitioner’s construction of “secure communication link,” which
`
`Case No. IPR2015-00870
`
`does not require direct communication, should be rejected.
`
`A “Secure Communication Link” Requires Encryption
`
`3.
`While the Petitioner notes that the Federal Circuit appears to agree that a
`
`“secure communication link” requires encryption (Pet. at 26-27), its construction
`
`fails to require encryption. Petitioner’s proposed construction is contrary to the
`
`specification, which “repeatedly and consistently” explains
`
`that a secure
`
`communication link requires encryption. See Eon–Net LP v. Flagstar Bancorp.,
`
`653 F.3d 1314, 1321–23 (Fed. Cir. 2011). For instance, the ’0705 patent
`
`specification teaches that “data security is usually tackled using some form of data
`
`encryption,” and it repeatedly discusses using encryption. (Ex. 1050 at 1:57-58;
`
`see also id. at 3:17-19 (“TARP” embodiments described as using a “unique two-
`
`layer encryption format”), 3:36-37 (“[e]ach TARP packet’s true destination
`
`address is concealed behind a layer of encrypti