throbber

`
`Paper No.
`Filed: May 19, 2014
`
`
`Filed on behalf of: VirnetX Inc.
`By:
`Joseph E. Palys
`
`Naveen Modi
`Finnegan, Henderson, Farabow,
` Garrett & Dunner, L.L.P.
`11955 Freedom Drive
`Reston, VA 20190-5675
`Telephone: 571-203-2700
`Facsimile: 202-408-4400
`E-mail: joseph.palys@finnegan.com
`
` naveen.modi@finnegan.com
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`MICROSOFT CORPORATION
`Petitioner
`
`v.
`
`VIRNETX INC.
`Patent Owner
`
`
`
`
`
`
`
`Case IPR2014-00404
`Patent 7,987,274
`
`
`
`
`
`
`
`
`
`
`
`
`Patent Owner’s Preliminary Response
`to Petition for Inter Partes Review
`of U.S. Patent No. 7,987,274
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1026, Cover
`
`

`

`
`
`
`I.
`
`II.
`
`
`
`Case No. IPR2014-00404
`
`Table of Contents
`
`Introduction ...................................................................................................... 1
`
`The Petition Fails to Meet the Requirements for Instituting an
`Inter Partes Review ......................................................................................... 1
`
`A.
`
`B.
`
`The Petition Fails to Comply with 35 U.S.C. § 312(a)(3) and
`37 C.F.R. § 42.104(b) ............................................................................ 1
`
`The Board Should Not Institute Based on the Petition’s
`Redundant Grounds ............................................................................... 6
`
`C. Microsoft’s Arguments About the Priority Date of Claim 18
`Are Incorrect and Moot ......................................................................... 9
`
`III. The Petition’s Claim Constructions Are Flawed and Should Be
`Rejected .........................................................................................................10
`
`A. Overview of the ’274 Patent ................................................................10
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`J.
`
`Level of Ordinary Skill in the Art .......................................................11
`
`“Virtual Private Network” (Construe as Part of “Virtual Private
`Network Communication Link”) ........................................................13
`
`“Virtual Private Network Communication Link” (Claims 1, 2,
`and 11-13) ............................................................................................17
`
`“Secure Network Address” (Claims 1, 6-8, 10, and 17) .....................19
`
`“Secure Domain Name” (Construe as Part of “Secure Domain
`(Name) Service”) .................................................................................23
`
`“Secure Domain (Name) Service” (Claim 1) ......................................25
`
`“[X], [Y], [Z], or Any Combination Thereof” (Claims 3-5) ...............27
`
`“Tunneling” (Claim 12) ......................................................................28
`
`“Tunnel Packeting” (Claim 13) ...........................................................30
`
`K.
`
`“Client Computer” (Claim 15) ............................................................31
`
`i
`
`Petitioner Apple Inc. - Ex. 1026, p. i
`
`

`

`
`
`IV.
`
`V.
`
`
`
`Case No. IPR2014-00404
`
`If Trial Is Instituted, VirnetX Requests an 18-Month Schedule ...................33
`
`Conclusion .....................................................................................................34
`
`
`
`
`
`ii
`
`Petitioner Apple Inc. - Ex. 1026, p. ii
`
`

`

`
`
`
`
`
`Case No. IPR2014-00404
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Federal Cases
`Apple Inc. v. Evolutionary Intelligence, LLC,
`IPR2014-00079, Paper No. 8 (Apr. 25, 2014) .................................................. 2, 5
`
`Atrium Med. Corp. v. Davol Inc.,
`IPR2013-00186, Paper No. 34 (Oct. 23, 2013) .................................................... 2
`
`CaptionCall, LLC v. Ultratec, Inc.,
`IPR2013-00549, Paper No. 20 (Apr. 28, 2014) .................................................... 3
`
`EMC Corp. v. Personal Web Techs., LLC,
`IPR2013-00087, Paper No. 25 (June 5, 2013) .................................................. 7, 9
`
`Idle Free Sys., Inc. v. Bergstrom, Inc.,
`IPR2012-00027, Paper No. 26 (June 11, 2013) .................................................... 7
`
`Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co.,
`CBM2012-00003, Paper No. 7 (Oct. 25, 2012) .................................................... 7
`
`ScentAir Techs., Inc. v. Prolitec, Inc.,
`IPR2013-00180, Paper No. 18 (Aug. 26, 2013) ............................................... 7, 9
`
`Synopsys, Inc. v. Mentor Graphics Corp.,
`IPR2012-00041, Paper No. 16 (Feb. 22, 2013) .................................................... 2
`
`Tasco, Inc. v. Pagnani,
`IPR2013-00103, Paper No. 6 (May 23, 2013) ...................................................... 2
`
`Wowza Media Sys., LLC et al. v. Adobe Sys., Inc.,
`IPR2013-00054, Paper No. 16 (July 13, 2013) .................................................... 2
`
`Federal Statutes
`
`35 U.S.C. § 112 ........................................................................................................ 30
`
`35 U.S.C. § 312(a)(3) ......................................................................................... 1, 2, 5
`
`35 U.S.C. § 313 .......................................................................................................... 1
`
`iii
`
`Petitioner Apple Inc. - Ex. 1026, p. iii
`
`

`

`
`
`35 U.S.C. § 316(a)(1) ............................................................................................... 34
`35 U.S.C. § 316(a)(1) ............................................................................................... 34
`
`
`
`Case No. IPR2014-00404
`
`Case No. IPR2014—00404
`
`Regulations
`Regulations
`
`37 C.F.R. § 42.8 ....................................................................................................... 34
`37 CPR. § 42.8 ....................................................................................................... 34
`
`37 C.F.R. § 42.100(c) ............................................................................................... 34
`37 CPR. § 42.100(c) ............................................................................................... 34
`
`37 C.F.R. § 42.104(b) ................................................................................................ 1
`37 CPR. § 42.104(b) ................................................................................................ 1
`
`37 C.F.R. § 42.104(b)(4) ........................................................................................ 2, 5
`37 CPR. § 42.104(b)(4) ........................................................................................ 2, 5
`
`37 C.F.R. § 42.104(b)(5) ........................................................................................ 2, 5
`37 CPR. § 42.104(b)(5) ........................................................................................ 2, 5
`
`37 C.F.R. § 42.107 ..................................................................................................... 1
`37 CPR. § 42.107 ..................................................................................................... 1
`
`
`
`
`
`
`iv
`
`iV
`
`Petitioner Apple Inc. - EX. 1026, p. iV
`
`Petitioner Apple Inc. - Ex. 1026, p. iv
`
`

`

`
`
`I.
`
`Introduction
`
`
`
`Case No. IPR2014-00404
`
`Patent Owner VirnetX Inc. respectfully submits this Preliminary Response
`
`in accordance with 35 U.S.C. § 313 and 37 C.F.R. § 42.107, responding to the
`
`Revised Petition for Inter Partes Review (the “Petition”) filed by Microsoft
`
`Corporation against VirnetX’s U.S. Patent No. 7,987,274 (“the ’274 patent).
`
`VirnetX requests that the Board not institute inter partes review for several
`
`reasons.
`
`First, the Petition fails to identify where the prior art discloses each claimed
`
`feature, violating the particularity requirements of 35 U.S.C. § 312(a)(3) and 37
`
`C.F.R. § 42.104(b). Next, the Petition proposes redundant grounds without
`
`identifying how any one ground improves on any other, violating Board precedent
`
`requiring petitioners to identify differences in the proposed rejections. Finally,
`
`Microsoft proposes a series of incorrect claim constructions. Because its
`
`unpatentability challenges are premised on incorrect claim constructions, Microsoft
`
`has not met its burden of demonstrating a reasonable likelihood of prevailing in
`
`proving unpatentability of any ’274 patent claim.
`
`II. The Petition Fails to Meet the Requirements for Instituting an
`Inter Partes Review
`A. The Petition Fails to Comply with 35 U.S.C. § 312(a)(3) and
`37 C.F.R. § 42.104(b)
`
`Independent claim 1 recites, among other things, “sending an access request
`
`message to the secure computer network address using a virtual private network
`
`
`
`
`Petitioner Apple Inc. - Ex. 1026, p. 1
`
`

`

`
`
`communication link.” Nowhere does the Petition explain where a purported
`
`Case No. IPR2014-00404
`
`
`
`“access request message” is disclosed in Kiuchi. Nor does the accompanying
`
`declaration provide the missing explanation. Consequently, the Petition fails to
`
`satisfy the substantive requirements for institution set forth in 35 U.S.C.
`
`§ 312(a)(3) and 37 C.F.R. §§ 42.104(b)(4), 42.104(b)(5), and should be denied.
`
`Petitions must identify “in writing and with particularity, each claim
`
`challenged, the grounds on which the challenge to each claim is based, and the
`
`evidence that supports the grounds for the challenge to each claim[.]” 35 U.S.C.
`
`§ 312(a)(3). They must also “specify where each element of the claim is found in
`
`the prior art patents or printed publications relied upon” (37 C.F.R. § 42.104(b)(4))
`
`and identify “specific portions of the evidence that support the challenge” (37
`
`C.F.R. § 42.104(b)(5)). Failure to comply with these substantive requirements for
`
`petitions warrants denial of a petition. Apple Inc. v. Evolutionary Intelligence,
`
`LLC, IPR2014-00079, Paper No. 8 at 17-19 (Apr. 25, 2014); Wowza Media Sys.,
`
`LLC et al. v. Adobe Sys., Inc., IPR2013-00054, Paper No. 16 at 3, 6 (July 13,
`
`2013); Tasco, Inc. v. Pagnani, IPR2013-00103, Paper No. 6 at 18-22 (May 23,
`
`2013); Atrium Med. Corp. v. Davol Inc., IPR2013-00186, Paper No. 34 at 3 (Oct.
`
`23, 2013); Synopsys, Inc. v. Mentor Graphics Corp., IPR2012-00041, Paper No. 16
`
`at 14-15 (Feb. 22, 2013). As the Board has explained, it will not “search the record
`
`and piece together any evidence or arguments that may support Petitioner’s
`
`2
`
`Petitioner Apple Inc. - Ex. 1026, p. 2
`
`

`

`
`
`ultimate conclusion.” CaptionCall, LLC v. Ultratec, Inc., IPR2013-00549, Paper
`
`Case No. IPR2014-00404
`
`
`
`No. 20 at 5 (Apr. 28, 2014).
`
`The Petition contends that a “REQUEST” message mentioned in Kiuchi
`
`corresponds to “sending an access request message to the secure computer network
`
`address using a virtual private network communication link,” as recited in
`
`independent claim 1.1 Specifically, the Petition cites “step 6” of section 2.3 of
`
`Kiuchi. (Pet. at 30 (citing Ex. 1004, p. 66, § 2.3, step 6).) This portion of Kiuchi
`
`simply states:
`
`6) Sending C-HTTP requests to the server-side proxy (Fig. 2g)
`Once the connection is established, a client-side proxy forwards
`HTTP/1.0 requests from the user agent in encrypted form using C-
`HTTP format.
`
`According to the Petition, the example Kiuchi provides with reference to Figs. (a),
`
`(b), and (c) involves the end-user’s request for “the resource ‘sample.html’ from
`
`the
`
`server-side
`
`proxy
`
`corresponding
`
`to
`
`the
`
`hostname
`
`‘server.in.current.connection,’” which the “client-side proxy will forward” using
`
`the C-HTTP connection. (Id. at 31.)
`
`
`1 The Board recently entered a new ground of rejection in pending
`
`reexamination control no. 95/001,792 of the ’180 patent, which relies in part on
`
`mapping Kiuchi’s request in “step (6)” to the recited “access request message.”
`
`3
`
`Petitioner Apple Inc. - Ex. 1026, p. 3
`
`

`

`
`
`
`
`
`Case No. IPR2014-00404
`
`Next, the Petition contends that each “REQUEST” message “include[s] the
`
`IP address of the server-side proxy, which the client-side proxy received from the
`
`C-HTTP name server.” (Id. at 30 (citing Ex. 1004, p. 70-71, Appendix 1, § 1; Ex.
`
`1011 ¶ 40).) The Petition further cites Appendix 3 of Kiuchi, which the Petition
`
`contends illustrates an “example of the structure of these REQUEST messages.”
`
`(Id. at 32-33 (citing Ex. 1011 ¶ 41).) In addition, the Petition generally cites the
`
`Abstract of Kiuchi for the general proposition that “Kiuchi further describes that
`
`the client-side proxy and server-side proxy exchange encrypted requests and
`
`responses via the Internet.” (Id. at 32 (citing Ex. 1004, p. 64, abstract).)
`
`Despite its general citation to a “REQUEST” message and an exchange of
`
`requests, the Petition fails to explain why these messages constitute an “access
`
`request message” as recited in the challenged claims. The Petition offers no
`
`construction for “sending an access request message,” and it is unclear from the
`
`Petition why Microsoft believes that Kiuchi’s “REQUEST” satisfies the claim
`
`language. The cited portions of the accompanying declaration also fail to provide
`
`the missing explanation. (See Ex. 1011 ¶ 40 (also referring to the “example of a
`
`request for the resource ‘sample.html’ using an existing C-HTTP connection”); id.
`
`at ¶ 43 (stating that “the access request sent using the C-HTTP connection” is
`
`shown in red in an annotated figure of Kiuchi).)
`
`4
`
`Petitioner Apple Inc. - Ex. 1026, p. 4
`
`

`

`
`
`
`
`
`Case No. IPR2014-00404
`
`The Petition’s claim chart contains the same defects. The claim chart cites
`
`portions of Kiuchi discussing “a client-side proxy forward[ing] HTTP/1.0 requests
`
`from the user agent in encrypted form using C-HTTP format.” (Id. at 36 (citing
`
`Ex. 1004, p. 66, § 6).) The claim chart also refers to the structure of a C-HTTP
`
`request as including the IP address of the server-side proxy. (Id. at 36 (citing Ex.
`
`1004, p. 71, Appendix 1, § 1).) But beyond indicating that a request message is
`
`sent from the client-side proxy to the server-side proxy, the Petition fails to explain
`
`why the request message is an “access request message,” as recited in independent
`
`claim 1.
`
`Because the Petition fails to explain how Kiuchi discloses “sending an
`
`access request message to the secure computer network address using a virtual
`
`private network communication link,” as recited in independent claim 1, the
`
`Petition does not demonstrate how Kiuchi anticipates each and every limitation of
`
`the challenged claims. The Petition lacks the “particularity” required by 35 U.S.C.
`
`§ 312(a)(3), and fails to “specify where each element of the claim is found in the
`
`prior art patents or printed publications relied upon” and identify “specific portions
`
`of the evidence that support the challenge,” as required by 37 C.F.R.
`
`§§ 42.104(b)(4) and 42.104(b)(5)). See Apple Inc. v. Evolutionary Intelligence,
`
`LLC, IPR2014-00079, Paper No. 8 at 17-19 (Apr. 25, 2014) (relying on 37 C.F.R.
`
`§§ 42.104(b)(4), (b)(5) and rejecting a petition because its discussion of the prior
`
`5
`
`Petitioner Apple Inc. - Ex. 1026, p. 5
`
`

`

`
`
`art “refers generally” to features of the prior art and is “vague” for certain
`
`Case No. IPR2014-00404
`
`
`
`limitations). The Petition should be denied based on these substantive defects.
`
`B.
`
`The Board Should Not Institute Based on the Petition’s
`Redundant Grounds
`
`The Petition includes a section titled “Redundancy,” which does not assert
`
`or explain why the proposed grounds of rejection in the Petition are not redundant
`
`in view of those in the Microsoft’s Petition for Inter Partes Review in IPR2014-
`
`00403 (“the’403 Petition”). Instead, the Petition alleges that Microsoft’s two
`
`petitions against the ’274 patent present a “limited number” of grounds and then
`
`alleges some teachings of the primary references. (Pet. at 50.) Giving no
`
`justification based on the Board’s jurisprudence regarding redundancy, Microsoft’s
`
`redundant grounds should be rejected.
`
`The Board does not consider redundant grounds of rejection because it must
`
`issue a final written decision within one year of institution (or 18 months for good
`
`cause). Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co., CBM2012-00003,
`
`Paper No. 7 (Oct. 25, 2012). Redundant grounds place a significant burden on the
`
`Board and the patent owner, and cause unnecessary delay that jeopardizes meeting
`
`the statutory deadline for final written decisions. Id.
`
`Because “[t]he Board seeks to streamline and converge issues at all phases
`
`of the proceeding . . . at [the] time of institution the Board analyzes the petition on
`
`a claim-by-claim, ground-by-ground basis, to eliminate redundant grounds.” Idle
`
`6
`
`Petitioner Apple Inc. - Ex. 1026, p. 6
`
`

`

`
`
`Free Sys., Inc. v. Bergstrom, Inc., IPR2012-00027, Paper No. 26 at 3 (June 11,
`
`Case No. IPR2014-00404
`
`
`
`2013). The redundancy inquiry does not focus on “whether the applied prior art
`
`disclosures have differences, for it is rarely the case that the disclosures of different
`
`prior art references, will be literally identical.” EMC Corp. v. Personal Web
`
`Techs., LLC, IPR2013-00087, Paper No. 25 at 3 (June 5, 2013). Instead, the Board
`
`considers “whether the petitioner articulated a meaningful distinction in terms of
`
`relative strengths and weaknesses with respect to application of the prior art
`
`disclosures to one or more claim limitations.” Id. at 3-4. The petitioner carries the
`
`burden of articulating that “meaningful distinction.” ScentAir Techs., Inc. v.
`
`Prolitec, Inc., IPR2013-00180, Paper No. 18 at 3 (Aug. 26, 2013).
`
`In Liberty Mutual, the Board identified two types of redundant rejections:
`
`(1) “horizontally” redundant rejections and (2) “vertically” redundant rejections.
`
`Liberty Mutual, CBM2012-00003, Paper No. 7 at 3. The Board explained that
`
`horizontally redundant rejections apply “a plurality of prior art references . . . not
`
`in combination to complement each other but as distinct and separate alternatives.”
`
`Id. Vertical redundancy “exists when there is assertion of an additional prior art
`
`reference to support another ground of unpatentability when a base ground already
`
`has been asserted against the same claim without the additional reference and the
`
`Petitioner has not explained what are the relative strength and weakness of each
`
`ground.” Id. at 12.
`
`7
`
`Petitioner Apple Inc. - Ex. 1026, p. 7
`
`

`

`
`
`
`
`
`Case No. IPR2014-00404
`
`Here, Microsoft’s Petition is horizontally redundant in view of the ’403
`
`Petition. In this Petition, Microsoft alleges that Kiuchi anticipates claims 1-4, 7, 8,
`
`10, 12, 15, and 17. Yet in the ’403 Petition, Microsoft alleges that Provino
`
`anticipates an overlapping group of claims, namely claims 1, 7, 8, 10, 12, 13, 15,
`
`and 17. Further, the present Petition contends that Kiuchi in view of two other
`
`references renders obvious claims 1-5, 7, 8, 10, 12, 15, and 17. And in the ’403
`
`Petition, Microsoft contends that Provino in view of two other references renders
`
`obvious claims 2-5 and 18. Microsoft’s Kiuchi-based grounds of rejection are
`
`horizontally redundant in view of its Provino-based grounds of rejection.
`
`Furthermore, the present Petition’s anticipation ground for claims 1, 4, 10, 12-15,
`
`17, 20, 26, 28-31, 33, and 35 based on Kiuchi is vertically redundant in view of its
`
`proposed obviousness ground for the same claims with Kiuchi asserted as the lead
`
`reference. In addition, Microsoft’s Petition is horizontally redundant in view of
`
`Apple’s two petitions challenging common claims of the ’274 patentIPR2014-
`
`00483 and IPR2014-00484.
`
`Microsoft does not explain why its two petitions’ respective grounds of
`
`rejection are not redundant. Microsoft expresses its belief that Provino discloses a
`
`“virtual private network” and “communication link,” and that Kiuchi discloses a
`
`“C-HTTP name server send[ing] the IP address and public key of the server-side
`
`proxy and both request and response Nonce values used in communication.” (Pet.
`
`8
`
`Petitioner Apple Inc. - Ex. 1026, p. 8
`
`

`

`
`
`at 50 (emphasis in original).) But Microsoft does not attempt to “articulate[] a
`
`Case No. IPR2014-00404
`
`
`
`meaningful distinction in terms of relative strengths and weaknesses with respect
`
`to application of the prior art disclosures to one or more claim limitations.” EMC
`
`Corp. v. Personal Web Techs., LLC, IPR2013-00087, Paper No. 25 at 3-4 (June 5,
`
`2013) (emphases added). Microsoft has essentially admitted that it proposes
`
`redundant grounds but has not explained why any of its grounds are not redundant.
`
`Consequently, the Board should deny Microsoft’s redundant grounds. ScentAir
`
`Techs., Inc. v. Prolitec, Inc., IPR2013-00180, Paper No. 18 at 3 (Aug. 26, 2013).
`
`C. Microsoft’s Arguments About the Priority Date of Claim 18 Are
`Incorrect and Moot
`
`Microsoft contends that claim 18 of the ’274 patent should “be accorded a
`
`priority date no earlier than the date on which the ’274 patent was filed: August 16,
`
`2007.” (Pet. at 21.) Microsoft is incorrect. When claim 18 was added during
`
`prosecution of the ’274 patent application, the Examiner did not find any problems
`
`regarding written description support. Instead, the Examiner noted that “claims 2-
`
`18 [were] newly added for examination,” and proceeded to reject the claims on
`
`other grounds. (Ex. 1002 at 296.) The Examiner was correct in not finding a lack
`
`of written description support. The ’274 patent specification provides adequate
`
`written description support for claim 18. (See, e.g., Ex. 1001 at 21:20-22, 34:36-
`
`42, 45:8-49:13, 52:15-18; Figs. 12A, 33, 34, 35.)
`
`9
`
`Petitioner Apple Inc. - Ex. 1026, p. 9
`
`

`

`
`
`
`
`
`Case No. IPR2014-00404
`
`In any event, Microsoft’s argument about priority dates is entirely academic.
`
`The Petition does not challenge claim 18 at all, so Microsoft’s arguments regarding
`
`the priority date of claim 18 have no bearing on the Petition and should be
`
`disregarded.
`
`III. The Petition’s Claim Constructions Are Flawed and Should Be Rejected
`Microsoft proposes several defective claim constructions that do not
`
`represent the broadest reasonable interpretation (“BRI”) of the claims. Because it
`
`is based on incorrect claim constructions, the Petition cannot demonstrate a
`
`reasonable likelihood of prevailing for any claim of the ’274 patent.
`
`A. Overview of the ’274 Patent
`The ’274 patent discloses several embodiments relating to accessing secure
`
`network addresses using virtual private network communication links. In one
`
`embodiment, as shown in FIG. 33 reproduced below, a client computer 3301 may
`
`send a query message to a specialized, secure DNS server 3313 requesting a secure
`
`network address for a second network device. (Ex. 1001 at 46:44-47, 60-62.) The
`
`client computer 3301 may receive a response message from the secure DNS server
`
`3313 containing the secure network address, and then send an access request
`
`message to the secure computer network address. (Id. at 47:15-37.) The access
`
`request message is sent over a virtual private network communication link, i.e., a
`
`communication link over a virtual private network. (Id. at 47:37-51.)
`
`10
`
`Petitioner Apple Inc. - Ex. 1026, p. 10
`
`

`

`
`
`
`
`
`Case No. IPR2014-00404
`
`
`
`(Ex. 1001, FIG. 33.)
`
`The claims of the ’274 patent are directed to some of these embodiments.
`
`Claim 1 is the only independent claim, and claims 2-18 depend directly or
`
`indirectly from claim 1.
`
`Level of Ordinary Skill in the Art
`
`B.
`A person of ordinary skill in the art at the relevant time would have had a
`
`master’s degree in computer science or computer engineering and approximately
`
`two years of experience in computer networking and computer security. In
`
`litigation related to VirnetX’s patents, this level of skill was adopted by a host of
`
`companies, including Apple, Inc.; Cisco Systems, Inc.; NEC Corporation; NEC
`
`Corporation of America; Aastra USA, Inc.; Aastra Technologies Ltd.; Mitel
`
`11
`
`Petitioner Apple Inc. - Ex. 1026, p. 11
`
`

`

`
`
`Networks Corp.; Mitel Networks, Inc.; Siemens Enterprise Communications
`
`Case No. IPR2014-00404
`
`
`
`GmbH & Co. KG; Siemens Enterprise Communications, Inc.; and Avaya Inc. (Ex.
`
`2023 at 4, Memorandum Opinion and Order in VirnetX Inc. v. Mitel Networks
`
`Corp. et al., Case No. 6:11-CV-18 (E.D. Tex. Aug. 1, 2012); Ex. 1018 at 5,
`
`Memorandum Opinion and Order in VirnetX Inc. v. Cisco Systems, Inc. et al., Case
`
`No. 6:10-CV-417 (E.D. Tex. April 25, 2012).)
`
`Microsoft largely agrees with VirnetX’s proposed level of skill, contending
`
`through its expert that “one of ordinary skill . . . would have a Master’s degree in
`
`computer science or computer engineering, or in a related field such as electrical
`
`engineering, as well as about two years of experience in computer networking and
`
`in some aspect of security with respect to computer networks.” (Ex. 1011 at 3,
`
`¶ 7.) Because so many companies have agreed that VirnetX’s proposed level of
`
`skill is correct and because Microsoft’s proposed level of skill is similar in most
`
`respects, the Board should adopt VirnetX’s proposed level of skill.
`
`12
`
`Petitioner Apple Inc. - Ex. 1026, p. 12
`
`

`

`C.
`
`“Virtual Private Network” (Construe as Part of “Virtual Private
`Network Communication Link”)
`
`Case No. IPR20 14-00404
`
`VirnetX’s Pro . osed Construction
`
`Microsoft’s Pro 0 c sed Construction
`
`Not a separate claim term, construe as
`part of “virtual private network
`communication link”; alternatively, a
`network of computers which privately
`and directly communicate with each
`other by encrypting traffic over insecure
`communication paths between the
`
`A network of computers that privately
`communicate with each other by
`encrypting traffic on insecure
`communication paths between the
`computers
`
`computers
`
`The term “Virtual private network” does not require construction here
`
`because the term is not separately recited in the ’274 patent claims.
`
`(See Ex. 1001
`
`at 51:53-52:57.)
`
`Instead, it forms part of “virtual private network communication
`
`link,” which is construed separately elsewhere. (See infra Section III.D.)
`
`Should the Board deem construction necessary, VirnetX and Microsoft
`
`largely agree on the construction of “virtual private network” (or “VPN”). The
`
`main point of dispute is whether the computers in the network must be able to
`
`directly communicate. Microsoft relies on a district court’s interpretation of the
`
`term in the 2007 Microsoft Litigation (Pet. at 8-9), but it does not mention that the
`
`district court
`
`later revised its construction to require the ability to directly
`
`communicate.
`
`(Ex. 1018 at 6-8.) The district court reviewed the reexamination
`
`record of related US. Patent No. 6,502,135 (“the ’135 patent”), where VirnetX
`
`distinguished a reference referred to as Aventail on the ground that it did not
`
`disclose a VPN because, among other things, “computers connected according to
`
`13
`
`Petitioner Apple Inc. - EX. 1026, p. 13
`
`Petitioner Apple Inc. - Ex. 1026, p. 13
`
`

`

`
`
`Aventail do not communicate directly with each other.” (See Ex. 2024 at 7, Office
`
`Case No. IPR2014-00404
`
`
`
`Action Response filed April 15, 2010, in control no. 95/001,269.) The district
`
`court relied on this statement to construe “virtual private network” to require the
`
`ability to directly communicate.2 (See Ex. 1018 at 6-8.)
`
`VirnetX also made a virtually identical statement during reexamination of
`
`parent U.S. Patent 7,188,180 (“the ’180 patent), which recites a “virtual private
`
`network” in its claims. VirnetX said that “Aventail has not been shown to disclose
`
`a VPN, as recited in claim 1, 17, and 33, because computers connected according
`
`to Aventail do not communicate directly with each other.” (Ex. 1023 at 166.)
`
`Given the identical term for construction and nearly verbatim reexamination
`
`statements regarding the ’135 and ’180 patents, the district court’s reasoning
`
`should apply with equal force here. The ability to directly communicate should be
`
`part of the construction.
`
`The portions of the construction on which VirnetX and Microsoft agree are
`
`supported by the patent specification. For example, the specification discloses
`
`2 VirnetX did not disclaim claim scope regarding “virtual private network”
`
`in the sense that only certain types of VPNs fall within the scope of the claims.
`
`VirnetX merely explained that Aventail did not create a VPN in the ordinary sense
`
`of the term. The court treated VirnetX’s explanation of an ordinary VPN as a
`
`disclaimer by adopting it as part of its claim construction.
`
`14
`
`Petitioner Apple Inc. - Ex. 1026, p. 14
`
`

`

`
`
`techniques for implementing a VPN using encryption. (See, e.g., Ex. 1001 at 3:13-
`
`Case No. IPR2014-00404
`
`
`
`4:13 (describing “the Tunneled Agile Routing Protocol (TARP) [that] uses a
`
`unique two-layer encryption format”).) The specification also discloses that its
`
`later-discussed embodiments can use the earlier-discussed principles of encryption,
`
`identifying “different embodiments or modes that can be employed using the
`
`aforementioned principles.” (Id. at 24:34-35; see also id. at 33:65-66 (“The
`
`following describes various improvements and features that can be applied to the
`
`embodiments described above.”).)
`
`The specification also refers to the “FreeS/WAN” project as a conventional
`
`scheme of creating a “VPN.” (Ex. 1001 at 39:14-22.) The FreeS/WAN glossary
`
`of terms in the ’274 patent’s prosecution history explains that a VPN is “a network
`
`which can safely be used as if it were private, even though some of its
`
`communication uses insecure connections. All traffic on those connections is
`
`encrypted.” (Ex. 2025 at 24, Glossary for the Linux FreeS/WAN Project.) A
`
`contemporaneous dictionary similarly explains that “VPNs enjoy the security of a
`
`private network via access control and encryption . . . .” (Ex. 2026 at 8, McGraw-
`
`Hill Computer Desktop Encyclopedia (9th ed. 2001) (emphasis added).) Thus,
`
`both intrinsic and extrinsic evidence demonstrate that VPNs require encryption.
`
`VirnetX’s construction is also consistent with the constructions presented
`
`and adopted in three district court litigations involving patents in the same family
`
`15
`
`Petitioner Apple Inc. - Ex. 1026, p. 15
`
`

`

`
`
`as the ’274 patent that similarly recited a “virtual private network” in their claims.
`
`Case No. IPR2014-00404
`
`
`
`In those cases, VirnetX and the defendants proposed several different claim
`
`constructions, all of which included encryption. (See, e.g., Ex. 2027 at 9-14,
`
`Microsoft’s Responsive Claim Construction Brief in VirnetX, Inc. v. Microsoft
`
`Corp., Case No. 6:07-CV-80 (E.D. Tex. Jan. 20, 2009); Ex. 2028 at 2-3,
`
`Defendants’ Responsive Claim Construction Brief in VirnetX Inc. v. Cisco
`
`Systems, Inc. et al., Case No. 6:10-CV-417 (E.D. Tex. Dec. 7, 2011); Ex. 2029 at
`
`8, Defendants’ Responsive Claim Construction Brief in VirnetX Inc. v. Mitel
`
`Networks Corp. et al., Case No. 6:11-CV-18; Ex. 2030 at 9-13, VirnetX’s Opening
`
`Claim Construction Brief in VirnetX Inc. v. Microsoft Corp., Case No. 6:07-cv-
`
`00080.) In all three instances, the court construed “VPN” to require encryption.
`
`(See Ex. 1016 at 4-10; Ex. 2023 at 4-6; Ex. 1018 at 5-8.) While the Office
`
`construes the claims under a different standard than the district court, this
`
`consistent understanding by all parties and the district court is additional evidence
`
`that the BRI of VPN requires encryption.
`
`VirnetX’s construction is supported by intrinsic and extrinsic evidence, so
`
`“virtual private network” should be construed to mean “a network of computers
`
`16
`
`Petitioner Apple Inc. - Ex. 1026, p. 16
`
`

`

`Case No. IPR20 14-00404
`
`which privately and directly communicate with each other by encrypting traffic
`
`over insecure communication paths between the computers.”3
`
`D.
`
`“Virtual Private Network Communication Link” (Claims 1, 2,
`and 11—13)4
`
`VirnetX’s Pro . osed Construction
`
`Microsoft’s Pro . used Construction A communication path between
`
`comnuters in a virtual .rivate network
`
`Any communication link between two
`end oints in a Virtual rivate network
`
`A “virtual private network communication link” (or “VPN communication
`
`link”) is “a communication path between computers in a virtual private network.”
`
`The plain meaning of the claim language and the patent specification support this
`
`construction. (See, e.g., BX. 100] at 47:66—4826.)
`
`3 In IPR2014-00237 and -00238, the Board preliminarily construed “virtual
`
`private

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket