`Filed: May 19, 2014
`
`
`Filed on behalf of: VirnetX Inc.
`By:
`Joseph E. Palys
`
`Naveen Modi
`Finnegan, Henderson, Farabow,
` Garrett & Dunner, L.L.P.
`11955 Freedom Drive
`Reston, VA 20190-5675
`Telephone: 571-203-2700
`Facsimile: 202-408-4400
`E-mail: joseph.palys@finnegan.com
`
` naveen.modi@finnegan.com
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`MICROSOFT CORPORATION
`Petitioner
`
`v.
`
`VIRNETX INC.
`Patent Owner
`
`
`
`
`
`
`
`Case IPR2014-00404
`Patent 7,987,274
`
`
`
`
`
`
`
`
`
`
`
`
`Patent Owner’s Preliminary Response
`to Petition for Inter Partes Review
`of U.S. Patent No. 7,987,274
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1026, Cover
`
`
`
`
`
`
`I.
`
`II.
`
`
`
`Case No. IPR2014-00404
`
`Table of Contents
`
`Introduction ...................................................................................................... 1
`
`The Petition Fails to Meet the Requirements for Instituting an
`Inter Partes Review ......................................................................................... 1
`
`A.
`
`B.
`
`The Petition Fails to Comply with 35 U.S.C. § 312(a)(3) and
`37 C.F.R. § 42.104(b) ............................................................................ 1
`
`The Board Should Not Institute Based on the Petition’s
`Redundant Grounds ............................................................................... 6
`
`C. Microsoft’s Arguments About the Priority Date of Claim 18
`Are Incorrect and Moot ......................................................................... 9
`
`III. The Petition’s Claim Constructions Are Flawed and Should Be
`Rejected .........................................................................................................10
`
`A. Overview of the ’274 Patent ................................................................10
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`J.
`
`Level of Ordinary Skill in the Art .......................................................11
`
`“Virtual Private Network” (Construe as Part of “Virtual Private
`Network Communication Link”) ........................................................13
`
`“Virtual Private Network Communication Link” (Claims 1, 2,
`and 11-13) ............................................................................................17
`
`“Secure Network Address” (Claims 1, 6-8, 10, and 17) .....................19
`
`“Secure Domain Name” (Construe as Part of “Secure Domain
`(Name) Service”) .................................................................................23
`
`“Secure Domain (Name) Service” (Claim 1) ......................................25
`
`“[X], [Y], [Z], or Any Combination Thereof” (Claims 3-5) ...............27
`
`“Tunneling” (Claim 12) ......................................................................28
`
`“Tunnel Packeting” (Claim 13) ...........................................................30
`
`K.
`
`“Client Computer” (Claim 15) ............................................................31
`
`i
`
`Petitioner Apple Inc. - Ex. 1026, p. i
`
`
`
`
`
`IV.
`
`V.
`
`
`
`Case No. IPR2014-00404
`
`If Trial Is Instituted, VirnetX Requests an 18-Month Schedule ...................33
`
`Conclusion .....................................................................................................34
`
`
`
`
`
`ii
`
`Petitioner Apple Inc. - Ex. 1026, p. ii
`
`
`
`
`
`
`
`
`Case No. IPR2014-00404
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Federal Cases
`Apple Inc. v. Evolutionary Intelligence, LLC,
`IPR2014-00079, Paper No. 8 (Apr. 25, 2014) .................................................. 2, 5
`
`Atrium Med. Corp. v. Davol Inc.,
`IPR2013-00186, Paper No. 34 (Oct. 23, 2013) .................................................... 2
`
`CaptionCall, LLC v. Ultratec, Inc.,
`IPR2013-00549, Paper No. 20 (Apr. 28, 2014) .................................................... 3
`
`EMC Corp. v. Personal Web Techs., LLC,
`IPR2013-00087, Paper No. 25 (June 5, 2013) .................................................. 7, 9
`
`Idle Free Sys., Inc. v. Bergstrom, Inc.,
`IPR2012-00027, Paper No. 26 (June 11, 2013) .................................................... 7
`
`Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co.,
`CBM2012-00003, Paper No. 7 (Oct. 25, 2012) .................................................... 7
`
`ScentAir Techs., Inc. v. Prolitec, Inc.,
`IPR2013-00180, Paper No. 18 (Aug. 26, 2013) ............................................... 7, 9
`
`Synopsys, Inc. v. Mentor Graphics Corp.,
`IPR2012-00041, Paper No. 16 (Feb. 22, 2013) .................................................... 2
`
`Tasco, Inc. v. Pagnani,
`IPR2013-00103, Paper No. 6 (May 23, 2013) ...................................................... 2
`
`Wowza Media Sys., LLC et al. v. Adobe Sys., Inc.,
`IPR2013-00054, Paper No. 16 (July 13, 2013) .................................................... 2
`
`Federal Statutes
`
`35 U.S.C. § 112 ........................................................................................................ 30
`
`35 U.S.C. § 312(a)(3) ......................................................................................... 1, 2, 5
`
`35 U.S.C. § 313 .......................................................................................................... 1
`
`iii
`
`Petitioner Apple Inc. - Ex. 1026, p. iii
`
`
`
`
`
`35 U.S.C. § 316(a)(1) ............................................................................................... 34
`
`Case No. IPR2014-00404
`
`
`
`Regulations
`
`37 C.F.R. § 42.8 ....................................................................................................... 34
`
`37 C.F.R. § 42.100(c) ............................................................................................... 34
`
`37 C.F.R. § 42.104(b) ................................................................................................ 1
`
`37 C.F.R. § 42.104(b)(4) ........................................................................................ 2, 5
`
`37 C.F.R. § 42.104(b)(5) ........................................................................................ 2, 5
`
`37 C.F.R. § 42.107 ..................................................................................................... 1
`
`
`
`
`
`iv
`
`Petitioner Apple Inc. - Ex. 1026, p. iv
`
`
`
`
`
`I.
`
`Introduction
`
`
`
`Case No. IPR2014-00404
`
`Patent Owner VirnetX Inc. respectfully submits this Preliminary Response
`
`in accordance with 35 U.S.C. § 313 and 37 C.F.R. § 42.107, responding to the
`
`Revised Petition for Inter Partes Review (the “Petition”) filed by Microsoft
`
`Corporation against VirnetX’s U.S. Patent No. 7,987,274 (“the ’274 patent).
`
`VirnetX requests that the Board not institute inter partes review for several
`
`reasons.
`
`First, the Petition fails to identify where the prior art discloses each claimed
`
`feature, violating the particularity requirements of 35 U.S.C. § 312(a)(3) and 37
`
`C.F.R. § 42.104(b). Next, the Petition proposes redundant grounds without
`
`identifying how any one ground improves on any other, violating Board precedent
`
`requiring petitioners to identify differences in the proposed rejections. Finally,
`
`Microsoft proposes a series of incorrect claim constructions. Because its
`
`unpatentability challenges are premised on incorrect claim constructions, Microsoft
`
`has not met its burden of demonstrating a reasonable likelihood of prevailing in
`
`proving unpatentability of any ’274 patent claim.
`
`II. The Petition Fails to Meet the Requirements for Instituting an
`Inter Partes Review
`A. The Petition Fails to Comply with 35 U.S.C. § 312(a)(3) and
`37 C.F.R. § 42.104(b)
`
`Independent claim 1 recites, among other things, “sending an access request
`
`message to the secure computer network address using a virtual private network
`
`
`
`
`Petitioner Apple Inc. - Ex. 1026, p. 1
`
`
`
`
`
`communication link.” Nowhere does the Petition explain where a purported
`
`Case No. IPR2014-00404
`
`
`
`“access request message” is disclosed in Kiuchi. Nor does the accompanying
`
`declaration provide the missing explanation. Consequently, the Petition fails to
`
`satisfy the substantive requirements for institution set forth in 35 U.S.C.
`
`§ 312(a)(3) and 37 C.F.R. §§ 42.104(b)(4), 42.104(b)(5), and should be denied.
`
`Petitions must identify “in writing and with particularity, each claim
`
`challenged, the grounds on which the challenge to each claim is based, and the
`
`evidence that supports the grounds for the challenge to each claim[.]” 35 U.S.C.
`
`§ 312(a)(3). They must also “specify where each element of the claim is found in
`
`the prior art patents or printed publications relied upon” (37 C.F.R. § 42.104(b)(4))
`
`and identify “specific portions of the evidence that support the challenge” (37
`
`C.F.R. § 42.104(b)(5)). Failure to comply with these substantive requirements for
`
`petitions warrants denial of a petition. Apple Inc. v. Evolutionary Intelligence,
`
`LLC, IPR2014-00079, Paper No. 8 at 17-19 (Apr. 25, 2014); Wowza Media Sys.,
`
`LLC et al. v. Adobe Sys., Inc., IPR2013-00054, Paper No. 16 at 3, 6 (July 13,
`
`2013); Tasco, Inc. v. Pagnani, IPR2013-00103, Paper No. 6 at 18-22 (May 23,
`
`2013); Atrium Med. Corp. v. Davol Inc., IPR2013-00186, Paper No. 34 at 3 (Oct.
`
`23, 2013); Synopsys, Inc. v. Mentor Graphics Corp., IPR2012-00041, Paper No. 16
`
`at 14-15 (Feb. 22, 2013). As the Board has explained, it will not “search the record
`
`and piece together any evidence or arguments that may support Petitioner’s
`
`2
`
`Petitioner Apple Inc. - Ex. 1026, p. 2
`
`
`
`
`
`ultimate conclusion.” CaptionCall, LLC v. Ultratec, Inc., IPR2013-00549, Paper
`
`Case No. IPR2014-00404
`
`
`
`No. 20 at 5 (Apr. 28, 2014).
`
`The Petition contends that a “REQUEST” message mentioned in Kiuchi
`
`corresponds to “sending an access request message to the secure computer network
`
`address using a virtual private network communication link,” as recited in
`
`independent claim 1.1 Specifically, the Petition cites “step 6” of section 2.3 of
`
`Kiuchi. (Pet. at 30 (citing Ex. 1004, p. 66, § 2.3, step 6).) This portion of Kiuchi
`
`simply states:
`
`6) Sending C-HTTP requests to the server-side proxy (Fig. 2g)
`Once the connection is established, a client-side proxy forwards
`HTTP/1.0 requests from the user agent in encrypted form using C-
`HTTP format.
`
`According to the Petition, the example Kiuchi provides with reference to Figs. (a),
`
`(b), and (c) involves the end-user’s request for “the resource ‘sample.html’ from
`
`the
`
`server-side
`
`proxy
`
`corresponding
`
`to
`
`the
`
`hostname
`
`‘server.in.current.connection,’” which the “client-side proxy will forward” using
`
`the C-HTTP connection. (Id. at 31.)
`
`
`1 The Board recently entered a new ground of rejection in pending
`
`reexamination control no. 95/001,792 of the ’180 patent, which relies in part on
`
`mapping Kiuchi’s request in “step (6)” to the recited “access request message.”
`
`3
`
`Petitioner Apple Inc. - Ex. 1026, p. 3
`
`
`
`
`
`
`
`
`Case No. IPR2014-00404
`
`Next, the Petition contends that each “REQUEST” message “include[s] the
`
`IP address of the server-side proxy, which the client-side proxy received from the
`
`C-HTTP name server.” (Id. at 30 (citing Ex. 1004, p. 70-71, Appendix 1, § 1; Ex.
`
`1011 ¶ 40).) The Petition further cites Appendix 3 of Kiuchi, which the Petition
`
`contends illustrates an “example of the structure of these REQUEST messages.”
`
`(Id. at 32-33 (citing Ex. 1011 ¶ 41).) In addition, the Petition generally cites the
`
`Abstract of Kiuchi for the general proposition that “Kiuchi further describes that
`
`the client-side proxy and server-side proxy exchange encrypted requests and
`
`responses via the Internet.” (Id. at 32 (citing Ex. 1004, p. 64, abstract).)
`
`Despite its general citation to a “REQUEST” message and an exchange of
`
`requests, the Petition fails to explain why these messages constitute an “access
`
`request message” as recited in the challenged claims. The Petition offers no
`
`construction for “sending an access request message,” and it is unclear from the
`
`Petition why Microsoft believes that Kiuchi’s “REQUEST” satisfies the claim
`
`language. The cited portions of the accompanying declaration also fail to provide
`
`the missing explanation. (See Ex. 1011 ¶ 40 (also referring to the “example of a
`
`request for the resource ‘sample.html’ using an existing C-HTTP connection”); id.
`
`at ¶ 43 (stating that “the access request sent using the C-HTTP connection” is
`
`shown in red in an annotated figure of Kiuchi).)
`
`4
`
`Petitioner Apple Inc. - Ex. 1026, p. 4
`
`
`
`
`
`
`
`
`Case No. IPR2014-00404
`
`The Petition’s claim chart contains the same defects. The claim chart cites
`
`portions of Kiuchi discussing “a client-side proxy forward[ing] HTTP/1.0 requests
`
`from the user agent in encrypted form using C-HTTP format.” (Id. at 36 (citing
`
`Ex. 1004, p. 66, § 6).) The claim chart also refers to the structure of a C-HTTP
`
`request as including the IP address of the server-side proxy. (Id. at 36 (citing Ex.
`
`1004, p. 71, Appendix 1, § 1).) But beyond indicating that a request message is
`
`sent from the client-side proxy to the server-side proxy, the Petition fails to explain
`
`why the request message is an “access request message,” as recited in independent
`
`claim 1.
`
`Because the Petition fails to explain how Kiuchi discloses “sending an
`
`access request message to the secure computer network address using a virtual
`
`private network communication link,” as recited in independent claim 1, the
`
`Petition does not demonstrate how Kiuchi anticipates each and every limitation of
`
`the challenged claims. The Petition lacks the “particularity” required by 35 U.S.C.
`
`§ 312(a)(3), and fails to “specify where each element of the claim is found in the
`
`prior art patents or printed publications relied upon” and identify “specific portions
`
`of the evidence that support the challenge,” as required by 37 C.F.R.
`
`§§ 42.104(b)(4) and 42.104(b)(5)). See Apple Inc. v. Evolutionary Intelligence,
`
`LLC, IPR2014-00079, Paper No. 8 at 17-19 (Apr. 25, 2014) (relying on 37 C.F.R.
`
`§§ 42.104(b)(4), (b)(5) and rejecting a petition because its discussion of the prior
`
`5
`
`Petitioner Apple Inc. - Ex. 1026, p. 5
`
`
`
`
`
`art “refers generally” to features of the prior art and is “vague” for certain
`
`Case No. IPR2014-00404
`
`
`
`limitations). The Petition should be denied based on these substantive defects.
`
`B.
`
`The Board Should Not Institute Based on the Petition’s
`Redundant Grounds
`
`The Petition includes a section titled “Redundancy,” which does not assert
`
`or explain why the proposed grounds of rejection in the Petition are not redundant
`
`in view of those in the Microsoft’s Petition for Inter Partes Review in IPR2014-
`
`00403 (“the’403 Petition”). Instead, the Petition alleges that Microsoft’s two
`
`petitions against the ’274 patent present a “limited number” of grounds and then
`
`alleges some teachings of the primary references. (Pet. at 50.) Giving no
`
`justification based on the Board’s jurisprudence regarding redundancy, Microsoft’s
`
`redundant grounds should be rejected.
`
`The Board does not consider redundant grounds of rejection because it must
`
`issue a final written decision within one year of institution (or 18 months for good
`
`cause). Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co., CBM2012-00003,
`
`Paper No. 7 (Oct. 25, 2012). Redundant grounds place a significant burden on the
`
`Board and the patent owner, and cause unnecessary delay that jeopardizes meeting
`
`the statutory deadline for final written decisions. Id.
`
`Because “[t]he Board seeks to streamline and converge issues at all phases
`
`of the proceeding . . . at [the] time of institution the Board analyzes the petition on
`
`a claim-by-claim, ground-by-ground basis, to eliminate redundant grounds.” Idle
`
`6
`
`Petitioner Apple Inc. - Ex. 1026, p. 6
`
`
`
`
`
`Free Sys., Inc. v. Bergstrom, Inc., IPR2012-00027, Paper No. 26 at 3 (June 11,
`
`Case No. IPR2014-00404
`
`
`
`2013). The redundancy inquiry does not focus on “whether the applied prior art
`
`disclosures have differences, for it is rarely the case that the disclosures of different
`
`prior art references, will be literally identical.” EMC Corp. v. Personal Web
`
`Techs., LLC, IPR2013-00087, Paper No. 25 at 3 (June 5, 2013). Instead, the Board
`
`considers “whether the petitioner articulated a meaningful distinction in terms of
`
`relative strengths and weaknesses with respect to application of the prior art
`
`disclosures to one or more claim limitations.” Id. at 3-4. The petitioner carries the
`
`burden of articulating that “meaningful distinction.” ScentAir Techs., Inc. v.
`
`Prolitec, Inc., IPR2013-00180, Paper No. 18 at 3 (Aug. 26, 2013).
`
`In Liberty Mutual, the Board identified two types of redundant rejections:
`
`(1) “horizontally” redundant rejections and (2) “vertically” redundant rejections.
`
`Liberty Mutual, CBM2012-00003, Paper No. 7 at 3. The Board explained that
`
`horizontally redundant rejections apply “a plurality of prior art references . . . not
`
`in combination to complement each other but as distinct and separate alternatives.”
`
`Id. Vertical redundancy “exists when there is assertion of an additional prior art
`
`reference to support another ground of unpatentability when a base ground already
`
`has been asserted against the same claim without the additional reference and the
`
`Petitioner has not explained what are the relative strength and weakness of each
`
`ground.” Id. at 12.
`
`7
`
`Petitioner Apple Inc. - Ex. 1026, p. 7
`
`
`
`
`
`
`
`
`Case No. IPR2014-00404
`
`Here, Microsoft’s Petition is horizontally redundant in view of the ’403
`
`Petition. In this Petition, Microsoft alleges that Kiuchi anticipates claims 1-4, 7, 8,
`
`10, 12, 15, and 17. Yet in the ’403 Petition, Microsoft alleges that Provino
`
`anticipates an overlapping group of claims, namely claims 1, 7, 8, 10, 12, 13, 15,
`
`and 17. Further, the present Petition contends that Kiuchi in view of two other
`
`references renders obvious claims 1-5, 7, 8, 10, 12, 15, and 17. And in the ’403
`
`Petition, Microsoft contends that Provino in view of two other references renders
`
`obvious claims 2-5 and 18. Microsoft’s Kiuchi-based grounds of rejection are
`
`horizontally redundant in view of its Provino-based grounds of rejection.
`
`Furthermore, the present Petition’s anticipation ground for claims 1, 4, 10, 12-15,
`
`17, 20, 26, 28-31, 33, and 35 based on Kiuchi is vertically redundant in view of its
`
`proposed obviousness ground for the same claims with Kiuchi asserted as the lead
`
`reference. In addition, Microsoft’s Petition is horizontally redundant in view of
`
`Apple’s two petitions challenging common claims of the ’274 patentIPR2014-
`
`00483 and IPR2014-00484.
`
`Microsoft does not explain why its two petitions’ respective grounds of
`
`rejection are not redundant. Microsoft expresses its belief that Provino discloses a
`
`“virtual private network” and “communication link,” and that Kiuchi discloses a
`
`“C-HTTP name server send[ing] the IP address and public key of the server-side
`
`proxy and both request and response Nonce values used in communication.” (Pet.
`
`8
`
`Petitioner Apple Inc. - Ex. 1026, p. 8
`
`
`
`
`
`at 50 (emphasis in original).) But Microsoft does not attempt to “articulate[] a
`
`Case No. IPR2014-00404
`
`
`
`meaningful distinction in terms of relative strengths and weaknesses with respect
`
`to application of the prior art disclosures to one or more claim limitations.” EMC
`
`Corp. v. Personal Web Techs., LLC, IPR2013-00087, Paper No. 25 at 3-4 (June 5,
`
`2013) (emphases added). Microsoft has essentially admitted that it proposes
`
`redundant grounds but has not explained why any of its grounds are not redundant.
`
`Consequently, the Board should deny Microsoft’s redundant grounds. ScentAir
`
`Techs., Inc. v. Prolitec, Inc., IPR2013-00180, Paper No. 18 at 3 (Aug. 26, 2013).
`
`C. Microsoft’s Arguments About the Priority Date of Claim 18 Are
`Incorrect and Moot
`
`Microsoft contends that claim 18 of the ’274 patent should “be accorded a
`
`priority date no earlier than the date on which the ’274 patent was filed: August 16,
`
`2007.” (Pet. at 21.) Microsoft is incorrect. When claim 18 was added during
`
`prosecution of the ’274 patent application, the Examiner did not find any problems
`
`regarding written description support. Instead, the Examiner noted that “claims 2-
`
`18 [were] newly added for examination,” and proceeded to reject the claims on
`
`other grounds. (Ex. 1002 at 296.) The Examiner was correct in not finding a lack
`
`of written description support. The ’274 patent specification provides adequate
`
`written description support for claim 18. (See, e.g., Ex. 1001 at 21:20-22, 34:36-
`
`42, 45:8-49:13, 52:15-18; Figs. 12A, 33, 34, 35.)
`
`9
`
`Petitioner Apple Inc. - Ex. 1026, p. 9
`
`
`
`
`
`
`
`
`Case No. IPR2014-00404
`
`In any event, Microsoft’s argument about priority dates is entirely academic.
`
`The Petition does not challenge claim 18 at all, so Microsoft’s arguments regarding
`
`the priority date of claim 18 have no bearing on the Petition and should be
`
`disregarded.
`
`III. The Petition’s Claim Constructions Are Flawed and Should Be Rejected
`Microsoft proposes several defective claim constructions that do not
`
`represent the broadest reasonable interpretation (“BRI”) of the claims. Because it
`
`is based on incorrect claim constructions, the Petition cannot demonstrate a
`
`reasonable likelihood of prevailing for any claim of the ’274 patent.
`
`A. Overview of the ’274 Patent
`The ’274 patent discloses several embodiments relating to accessing secure
`
`network addresses using virtual private network communication links. In one
`
`embodiment, as shown in FIG. 33 reproduced below, a client computer 3301 may
`
`send a query message to a specialized, secure DNS server 3313 requesting a secure
`
`network address for a second network device. (Ex. 1001 at 46:44-47, 60-62.) The
`
`client computer 3301 may receive a response message from the secure DNS server
`
`3313 containing the secure network address, and then send an access request
`
`message to the secure computer network address. (Id. at 47:15-37.) The access
`
`request message is sent over a virtual private network communication link, i.e., a
`
`communication link over a virtual private network. (Id. at 47:37-51.)
`
`10
`
`Petitioner Apple Inc. - Ex. 1026, p. 10
`
`
`
`
`
`
`
`
`Case No. IPR2014-00404
`
`
`
`(Ex. 1001, FIG. 33.)
`
`The claims of the ’274 patent are directed to some of these embodiments.
`
`Claim 1 is the only independent claim, and claims 2-18 depend directly or
`
`indirectly from claim 1.
`
`Level of Ordinary Skill in the Art
`
`B.
`A person of ordinary skill in the art at the relevant time would have had a
`
`master’s degree in computer science or computer engineering and approximately
`
`two years of experience in computer networking and computer security. In
`
`litigation related to VirnetX’s patents, this level of skill was adopted by a host of
`
`companies, including Apple, Inc.; Cisco Systems, Inc.; NEC Corporation; NEC
`
`Corporation of America; Aastra USA, Inc.; Aastra Technologies Ltd.; Mitel
`
`11
`
`Petitioner Apple Inc. - Ex. 1026, p. 11
`
`
`
`
`
`Networks Corp.; Mitel Networks, Inc.; Siemens Enterprise Communications
`
`Case No. IPR2014-00404
`
`
`
`GmbH & Co. KG; Siemens Enterprise Communications, Inc.; and Avaya Inc. (Ex.
`
`2023 at 4, Memorandum Opinion and Order in VirnetX Inc. v. Mitel Networks
`
`Corp. et al., Case No. 6:11-CV-18 (E.D. Tex. Aug. 1, 2012); Ex. 1018 at 5,
`
`Memorandum Opinion and Order in VirnetX Inc. v. Cisco Systems, Inc. et al., Case
`
`No. 6:10-CV-417 (E.D. Tex. April 25, 2012).)
`
`Microsoft largely agrees with VirnetX’s proposed level of skill, contending
`
`through its expert that “one of ordinary skill . . . would have a Master’s degree in
`
`computer science or computer engineering, or in a related field such as electrical
`
`engineering, as well as about two years of experience in computer networking and
`
`in some aspect of security with respect to computer networks.” (Ex. 1011 at 3,
`
`¶ 7.) Because so many companies have agreed that VirnetX’s proposed level of
`
`skill is correct and because Microsoft’s proposed level of skill is similar in most
`
`respects, the Board should adopt VirnetX’s proposed level of skill.
`
`12
`
`Petitioner Apple Inc. - Ex. 1026, p. 12
`
`
`
`C.
`
`“Virtual Private Network” (Construe as Part of “Virtual Private
`Network Communication Link”)
`
`Case No. IPR20 14-00404
`
`VirnetX’s Pro n osed Construction
`
`Microsoft’s Pro . o sed Construction
`
`Not a separate claim term, construe as
`part of “virtual private network
`communication link”; alternatively, a
`network of computers which privately
`and directly communicate with each
`other by encrypting traffic over insecure
`communication paths between the
`
`A network of computers that privately
`communicate with each other by
`encrypting traffic on insecure
`communication paths between the
`computers
`
`computers
`
`The term “virtual private network” does not require construction here
`
`because the term is not separately recited in the ’274 patent claims.
`
`(See Ex. 1001
`
`at 51:53-52:57.)
`
`Instead, it forms part of “virtual private network communication
`
`link,” which is construed separately elsewhere. (See infra Section III.D.)
`
`Should the Board deem construction necessary, VimetX and Microsoft
`
`largely agree on the construction of “virtual private network” (or “VPN”). The
`
`main point of dispute is whether the computers in the network must be able to
`
`directly communicate. Microsoft relies on a district court’s interpretation of the
`
`tenn in the 2007 Microsoft Litigation (Pet. at 8-9), but it does not mention that the
`
`district court
`
`later revised its construction to require the ability to directly
`
`communicate.
`
`(Ex. 1018 at 6-8.) The district court reviewed the reexamination
`
`record of related U.S. Patent No. 6,502,135 (“the ’l35 patent”), where VirnetX
`
`distinguished a reference referred to as Aventail on the ground that it did not
`
`disclose a VPN because, among other things, “computers connected according to
`
`13
`
`Petitioner Apple Inc. - EX. 1026, p. 13
`
`Petitioner Apple Inc. - Ex. 1026, p. 13
`
`
`
`
`
`Aventail do not communicate directly with each other.” (See Ex. 2024 at 7, Office
`
`Case No. IPR2014-00404
`
`
`
`Action Response filed April 15, 2010, in control no. 95/001,269.) The district
`
`court relied on this statement to construe “virtual private network” to require the
`
`ability to directly communicate.2 (See Ex. 1018 at 6-8.)
`
`VirnetX also made a virtually identical statement during reexamination of
`
`parent U.S. Patent 7,188,180 (“the ’180 patent), which recites a “virtual private
`
`network” in its claims. VirnetX said that “Aventail has not been shown to disclose
`
`a VPN, as recited in claim 1, 17, and 33, because computers connected according
`
`to Aventail do not communicate directly with each other.” (Ex. 1023 at 166.)
`
`Given the identical term for construction and nearly verbatim reexamination
`
`statements regarding the ’135 and ’180 patents, the district court’s reasoning
`
`should apply with equal force here. The ability to directly communicate should be
`
`part of the construction.
`
`The portions of the construction on which VirnetX and Microsoft agree are
`
`supported by the patent specification. For example, the specification discloses
`
`2 VirnetX did not disclaim claim scope regarding “virtual private network”
`
`in the sense that only certain types of VPNs fall within the scope of the claims.
`
`VirnetX merely explained that Aventail did not create a VPN in the ordinary sense
`
`of the term. The court treated VirnetX’s explanation of an ordinary VPN as a
`
`disclaimer by adopting it as part of its claim construction.
`
`14
`
`Petitioner Apple Inc. - Ex. 1026, p. 14
`
`
`
`
`
`techniques for implementing a VPN using encryption. (See, e.g., Ex. 1001 at 3:13-
`
`Case No. IPR2014-00404
`
`
`
`4:13 (describing “the Tunneled Agile Routing Protocol (TARP) [that] uses a
`
`unique two-layer encryption format”).) The specification also discloses that its
`
`later-discussed embodiments can use the earlier-discussed principles of encryption,
`
`identifying “different embodiments or modes that can be employed using the
`
`aforementioned principles.” (Id. at 24:34-35; see also id. at 33:65-66 (“The
`
`following describes various improvements and features that can be applied to the
`
`embodiments described above.”).)
`
`The specification also refers to the “FreeS/WAN” project as a conventional
`
`scheme of creating a “VPN.” (Ex. 1001 at 39:14-22.) The FreeS/WAN glossary
`
`of terms in the ’274 patent’s prosecution history explains that a VPN is “a network
`
`which can safely be used as if it were private, even though some of its
`
`communication uses insecure connections. All traffic on those connections is
`
`encrypted.” (Ex. 2025 at 24, Glossary for the Linux FreeS/WAN Project.) A
`
`contemporaneous dictionary similarly explains that “VPNs enjoy the security of a
`
`private network via access control and encryption . . . .” (Ex. 2026 at 8, McGraw-
`
`Hill Computer Desktop Encyclopedia (9th ed. 2001) (emphasis added).) Thus,
`
`both intrinsic and extrinsic evidence demonstrate that VPNs require encryption.
`
`VirnetX’s construction is also consistent with the constructions presented
`
`and adopted in three district court litigations involving patents in the same family
`
`15
`
`Petitioner Apple Inc. - Ex. 1026, p. 15
`
`
`
`
`
`as the ’274 patent that similarly recited a “virtual private network” in their claims.
`
`Case No. IPR2014-00404
`
`
`
`In those cases, VirnetX and the defendants proposed several different claim
`
`constructions, all of which included encryption. (See, e.g., Ex. 2027 at 9-14,
`
`Microsoft’s Responsive Claim Construction Brief in VirnetX, Inc. v. Microsoft
`
`Corp., Case No. 6:07-CV-80 (E.D. Tex. Jan. 20, 2009); Ex. 2028 at 2-3,
`
`Defendants’ Responsive Claim Construction Brief in VirnetX Inc. v. Cisco
`
`Systems, Inc. et al., Case No. 6:10-CV-417 (E.D. Tex. Dec. 7, 2011); Ex. 2029 at
`
`8, Defendants’ Responsive Claim Construction Brief in VirnetX Inc. v. Mitel
`
`Networks Corp. et al., Case No. 6:11-CV-18; Ex. 2030 at 9-13, VirnetX’s Opening
`
`Claim Construction Brief in VirnetX Inc. v. Microsoft Corp., Case No. 6:07-cv-
`
`00080.) In all three instances, the court construed “VPN” to require encryption.
`
`(See Ex. 1016 at 4-10; Ex. 2023 at 4-6; Ex. 1018 at 5-8.) While the Office
`
`construes the claims under a different standard than the district court, this
`
`consistent understanding by all parties and the district court is additional evidence
`
`that the BRI of VPN requires encryption.
`
`VirnetX’s construction is supported by intrinsic and extrinsic evidence, so
`
`“virtual private network” should be construed to mean “a network of computers
`
`16
`
`Petitioner Apple Inc. - Ex. 1026, p. 16
`
`
`
`Case No. IPR20 14-00404
`
`which privately and directly communicate with each other by encrypting traffic
`
`over insecure communication paths between the computers.”3
`
`D.
`
`“Virtual Private Network Communication Link” (Claims 1, 2,
`and 11-13)‘
`
`VirnetX’s Pro n osed Construction
`
`Microsofi’s Pro 0 used Construction A communication path between
`
`comuters in a virtual rivate network
`
`Any communication link between two
`end oints in a Virtual rivate network
`
`A “virtual private network communication link” (or “VPN communication
`
`link”) is “a communication path between computers in a virtual private network.”
`
`The plain meaning of the claim language and the patent specification support this
`
`construction. (See, e.g., BX. 100] at 47:66-48:6.)
`
`3 In IPR20l4—00237 and —00238, the Board preliminarily construed “virtual
`
`private network” in the context of related U.S. Patent No. 8,504,697 to mean “a
`
`‘secure communication link’ with the additional requirement that the link includes
`
`a portion of a public network.” (See, e.g., IPR20l4—00237, Paper No. 15 at 12
`
`(May 14, 2014).) VimetX respectfully disagrees with the Board’s construction and
`
`will present additional evidence and argument supporting its construction in those
`
`proceedings.
`
`4 VimetX identifies only the challenged claims that expressly recite the
`
`terms at issue. Claims that depend from the identified claims may also implicitly
`
`contain the terms.
`
`17
`
`Petitioner Apple Inc. - EX. 1026, p. 17
`
`Petitioner Apple Inc. - Ex. 1026, p. 17
`
`
`
`
`
`
`
`
`Case No. IPR2014-00404
`
`VirnetX’s proposed construction is similar to Microsoft’s and Apple’s,
`
`which are identical. (Compare Pet. at 6-9 with Ex. 2031 at 6, Pet. in IPR2014-
`
`00481.) A primary difference between the parties’ constructions is the use