throbber
Paper No. 23
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––––––
`
`APPLE INC.,
`Petitioner,
`
`v.
`VIRNETX INC.,
`Patent Owner.
`
`––––––––––––––––––
`
`Case No. IPR2015-01009
`U.S. Patent No. 8,843,643
`
`––––––––––––––––––
`
`PETITIONER’S REPLY
`
`
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`Table of Contents
`
`I.
`
`II.
`
`Introduction ...................................................................................................... 1
`
`Claim Construction .......................................................................................... 1
`
`III. Windows Resource Kit Anticipates Claims 1-9, 12, 14, 17-24, 27, and 29 ... 1
`
`A.
`
`Independent Claims 1 and 17 ................................................................ 1
`
`1. Windows Resource Kit Discloses “Enabl[ing] … a Secure
`Communication Mode Without a User Entering Any
`Cryptographic Information” ........................................................ 1
`
`2. Windows Resource Kit Discloses “Establish[ing], Based on a
`Determination that the Secure Communication Mode has Been
`Enabled, The Encrypted Communication Link” ........................ 6
`
`3. Windows Resource Kit Discloses “Initiating Establishment of
`the Encrypted Communication Link … Using the… Network
`Address and Encrypted Communication Link Resources
`Received From a Server that is Separate From the First Device”8
`
`B.
`
`Dependent Claims ............................................................................... 11
`
`1.
`
`2.
`
`3.
`
`4.
`
`Claims 6 and 21 ......................................................................... 11
`
`Claims 7 and 22 ......................................................................... 12
`
`Claims 12 and 27....................................................................... 15
`
`Claims 2-5, 8, 9, 13, 18-20, 23, 24, and 29 ............................... 16
`
`C.
`
`The Petition’s Anticipation Grounds Are Proper ................................ 16
`
`IV. Windows Resource Kit, IE5 Resource Kit, and Elgamal Render Claims 1,
`13, 15-17, 28, and 30-32 Obvious ................................................................. 18
`
`A.
`
`Independent Claims 1 and 17 .............................................................. 18
`
`1.
`
`The References Render Obvious “Constructing a Domain Name
`Based on an Identifier Associated With the Second Device”... 18
`i
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`2.
`
`The References Render Obvious “Initiating Establishment of
`the Encrypted Communication Link Between the First Device
`and the Second Device… Using… Encrypted Communication
`Link Resources Received From a Server that is Separate From
`the First Device” ....................................................................... 20
`
`B.
`
`C.
`
`Dependent Claims 13 and 28 .............................................................. 21
`
`Dependent Claims 15-16 and 30-32 .................................................... 22
`
`V. Dr. Tamassia’s Testimony is Probative ......................................................... 22
`
`VI. Dr. Monrose’s Testimony Is Entitled to No Weight Because He Admitted
`He Has No Opinion About What the References Teach or What the
`Challenged Claims Cover .............................................................................. 23
`
`VII. Conclusion ..................................................................................................... 25
`
`
`
`
`
`
`
`ii
`
`

`
`IPR2015-01009
`
`Cases
`
`
`
`
`
`TABLE OF AUTHORITIES
`
`Petitioner’s Reply
`
` Page(s)
`
`Advanced Display Systems, Inc. v. Kent State University,
`212 F.3d 1272 (Fed. Cir. 2000) .......................................................................... 17
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00403, Paper 42 (July 29, 2015) ......................................................... 12
`
`Arthrocare Corp. v. Smith & Nephew, Inc.,
`406 F.3d 1365 (Fed. Cir. 2005) .......................................................................... 10
`
`Belden Inc. v. Berk-Tek LLC,
`805 F.3d 1064 (Fed. Cir. 2015) .......................................................................... 23
`
`Canon Inc. v. Intellectual Ventures I LLC,
`IPR2014-00757, Paper 8 (Nov. 21, 2014) ............................................................ 5
`
`Cisco Systems, Inc. v. VirnetX Inc.,
`Appeal 2015-007843 (Feb. 11, 2016) ............................................................... 5, 7
`
`Epos Technologies Ltd. v. Pegasus Technologies,
`766 F.3d 1338 (Fed. Cir. 2014) ............................................................................ 4
`
`Liberty Mutual Ins. Co. v. Progressive Casualty Ins. Co.,
`CBM2012-00002, Paper 66 (Jan. 23, 2014), aff'd, No. 2014-1466
`(Fed. Cir. 2014) ..................................................................................................... 9
`
`Liebel-Flarsheim Co. v. Medrad, Inc.,
`358 F.3d 898 (Fed. Cir. 2004) .............................................................................. 7
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir 2002) ........................................................................... 23
`
`Sundance, Inc. v. Demonte Fabricating Ltd,
`550 F.3d 1356 (Fed. Cir. 2008) .......................................................................... 22
`
`iii
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`Tempo Lighting Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ........................................................................ 5, 14
`
`Titanium Metals Corp. of America v. Banner,
`778 F.2d 775 (Fed. Cir. 1985) ............................................................................ 23
`
`Other Authorities
`
`37 C.F.R. §42.65(a) .................................................................................................. 17
`
`Fed. R. Evid. 702 ..................................................................................................... 22
`
`
`
`
`
`iv
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`Exhibit List
`
`1006
`1007
`1008
`1009
`
`1010
`
`1011
`
`Exhibit # Reference Name
`1001
`U.S. Patent 8,843,643
`1002
`U.S. Patent 8,843,643 File History
`1003
`Declaration of Roberto Tomassia
`1004
`Curriculum Vitae of Roberto Tomassia
`1005
`Microsoft Corp., Microsoft Windows 2000 Professional Resource Kit
`(2000)
`Microsoft Internet Explorer 5 Resource Kit
`U.S. Patent 5,657,390
`Publication - Web Server Technology; Yeager & McGrath (1998)
`Microsoft Windows 2000 Professional Resource Kit – Copyright
`Registration Request
`USPN 6,839,750 (Control No. 95/001747) Request for Inter Partes
`Reexamination
`USPN 6,839,759 (Control No. 95/001747) Patent Owner’s Response
`to 10/14/2011 Office Action
`VirnetX v Cisco - Opening Claim Construction Brief (TXED 6-10-cv-
`417; Dkt 173)
`VirnetX v Cisco - Claim Construction Order (TXED 6-10-cv-00417;
`Dkt 266)
`Microsoft Windows 2000 Professional Resource Kit – About page
`U.S. Patent No. 6,502,135
`U.S. Patent No. 6,839,759
`Amazon Reviews “Microsoft Windows 2000 Professional Resource
`Kit”
`Barnes and Noble Customer Reviews of “Microsoft Windows 2000
`Professional Resource Kit”
`Microsoft Press Announces Complete Line of Learning and Reference
`Solutions for Microsoft Windows 2000 (Feb. 17, 2000),
`http://news.microsoft.com/2000/02/17/microsoft-press-announces-
`v
`
`1012
`
`1013
`
`1014
`1015
`1016
`1017
`
`1018
`
`1019
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`1020
`1021
`1022
`1023
`1024
`1025
`1026
`1027
`
`1028
`1029
`1030
`1031
`
`1032
`
`Exhibit # Reference Name
`complete-line-of-learning-and-reference-solutions-for-microsoft-
`windows-2000/
`RFC 2026 – The Internet Standards Process – Revision 3
`U.S. Patent No. 5,991,810
`RFC 882 – Domain Names – Concepts and Facilities
`RFC 883 – Domain Names – Implementation and Specification
`RFC 1034 – Domain Names – Concepts and Facilities
`RFC 1035 – Domain Names – Implementation and Specification
`RFC 1912 – Common DNS Operational and Configuration Errors
`Linux Networking-HOWTO,
`http://www.tldp.org/HOWTO/html_single/NET3-4-HOWTO/ (Aug.
`1999)
`RFC 2219 – Use of DNS Aliases for Network Services
`RFC 2543 – SIP: Session Initiation Protocol
`U.S. Patent No. 6,061,738
`Ben Laurie & Peter Laurie, Apache: The Definitive Guide (2d ed.
`1999)
`Kerberos: An Authentication Service for Open Network Systems
`(Mar. 30, 1988)
`RFC 2409 – The Internet Key Exchange (IKE)
`RFC 2408 – Internet Security Association and Key Management
`Protocol (ISAKMP)
`RFC 2401 – Security Architecture for Internet Protocol
`U.S. Patent No. 5,960,204
`Original Specification, U.S. Utility Patent Application No. 09/558,210
`Microsoft Internet Explorer 5 Resource Kit - Copyright Registration
`Amazon reviews “Microsoft Windows 2000 Server Resource Kit”
`Secure Sockets Layer for SOCKS Version 5 (1997)
`Ari Luotonen & Tim Berners-Lee, CERN httpd Reference Manual
`
`1033
`1034
`
`1035
`1036
`1037
`1038
`1039
`1040
`1041
`
`vi
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`1042
`
`1043
`
`Exhibit # Reference Name
`(1994)
`Archive.org snapshot of Morgan Kaufmann Publishers website,
`www.mjp.com (April 29, 1997), https://web.archive.org/web/
`19970429195411/http://www.mkp.com/index.htm
`Search for “‘web server technology’ yeager”, Google Scholar,
`https://scholar.google.com/ (date limited: 1996-1999)
`U.S. Patent No. 6,012,126
`Declaration of Scott M. Border
`Deposition Transcript of Dr. Fabian Monrose (May 18, 2016)
`
`1044
`1045
`1046
`[NEW]
`1047
`
`[RESERVED]
`
`1048
`[NEW]
`1049
`[NEW]
`
`The Reality of Virtual Private Networks, InfoWorld, Aug. 16, 1999
`(Advertising Supplement)
`Gibbs, M., IP Security: Keeping Your Business Private, Network
`World (March 15, 1999)
`
`vii
`
`

`
`IPR2015-01009
`
`I.
`
`Introduction
`
`
`
`Petitioner’s Reply
`
`In its Institution Decision, the Board correctly found that Windows Resource
`
`Kit anticipates claims 1-9, 12, 14, 17-23, 27, and 29, and that Windows Resource
`
`Kit in view of IE5 Resource Kit and Elgamal renders obvious claims 1, 13, 15-17,
`
`28, and 30-32. Paper 9 (“Dec.”), 9. The Board’s initial determination is fully
`
`supported by more than substantial evidence, and the claims should be cancelled.
`
`II. Claim Construction
`
`The Board correctly found that no claims require construction. Dec., 4-5. In
`
`its response (Paper 15) (“Resp.”), Patent Owner proposes constructions for a
`
`number of terms, only a few of which are relevant to the parties’ dispute: “secure
`
`domain name” / “non-secure domain name” (Resp., 5-12), and “secure domain
`
`name server” (Resp., 13-20). For those terms, Patent Owner’s constructions are
`
`not supported by the specification and are simply an attempt to read features into
`
`the claims. As explained below, Patent Owner’s constructions must be rejected.
`
`III. Windows Resource Kit Anticipates Claims 1-9, 12, 14, 17-24, 27, and 29
`
`A.
`
`Independent Claims 1 and 17
`
`1. Windows Resource Kit Discloses “Enabl[ing] … a Secure
`Communication Mode Without a User Entering Any
`Cryptographic Information”
`
`The Board correctly found that Windows Resource Kit discloses the claimed
`
`“enabling” step. Dec., 5. Petitioner explained Windows Resource Kit discloses
`
`1
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`user-enabled encrypted communications through a configuration interface and
`
`selection of “Low,” “Moderate,” or “High” security policies from a dropdown
`
`menu. Pet., 20-22; Ex. 1005, 1024-27; Ex. 1003, ¶¶189-193. The latter two modes
`
`request or require encryption be used to protect communications, so are “secure
`
`communication mode[s].” Pet., 21; Ex. 1003, ¶¶189-190. A user does not enter
`
`any cryptographic information when selecting these modes, but simply chooses
`
`one and clicks the “OK” button. Pet., 21; Ex. 1005, 1024-25; Ex. 1003, ¶193.
`
`These policies control when encryption is required, but not how encryption is
`
`performed. Pet., 21; Ex. 1005, 1026-27; Ex. 1003, ¶¶191-193.
`
`Windows Resource Kit’s configuration menu is almost identical to the ’643
`
`patent’s preferred embodiment, which describes a user “clicking on a ‘go secure’
`
`hyperlink (an example of the claimed enabling the secure communication mode
`
`step).” Resp., 27; Ex. 1001, 50:9-19. Clicking this “go secure” hyperlink does not
`
`require the user “to enter any user identifying information, passwords or
`
`encryption keys for establishing a secure communication link.” Ex. 1001, 50:14-
`
`16. The user in Windows Resource Kit likewise clicks a button to enable a desired
`
`security policy without having to enter any additional information. Pet., 21; Ex.
`
`1005, 1024-25; Ex. 1003, ¶193; see Ex. 1046, 81:19-82:11 (Dr. Monrose
`
`agreeing). Windows Resource Kit’s description of selecting between requesting
`
`and requiring encryption (“Moderate” v. “High”) is also equivalent to the ’643
`
`2
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`patent’s disclosure of “a user [] optionally select[ing] parameters … such as
`
`enabling a secure communication link mode … for all communication links over
`
`computer network 3302.” Ex. 1001, 50:2-6 (emphasis added).
`
`Patent Owner and Dr. Monrose challenge Petitioner’s showing by arguing
`
`the mapping is inconsistent with “Dr. Tamassia’s understanding” of the “enabling”
`
`step. Resp., 22-24; Ex. 2015, ¶¶36-39 (Dr. Monrose repeating Patent Owner’s
`
`arguments verbatim). Patent Owner implies selecting a security policy constitutes
`
`providing “cryptographic information” under this “understanding” because Dr.
`
`Tamassia explained that the selection “has an impact on whether IPSec is
`
`subsequently established.” See Resp., 22-24; Ex. 2016, 66:21-67:6; see Ex. 1046,
`
`66:2-19. Patent Owner’s argument is wrong for four reasons.
`
`First, Patent Owner never addresses whether Windows Resource Kit
`
`actually discloses this element. Resp., 22-24. Instead, it merely asserts selecting a
`
`security policy is “inconsistent with Dr. Tamassia’s… interpretation,” (Resp., 24),
`
`which says nothing about whether it is inconsistent with the claimed “enabling”
`
`step interpreted in view of the ’643 patent’s specification.
`
`Second, Patent Owner mischaracterizes Dr. Tamassia’s opinion. He
`
`consistently explained that “cryptographic information” is information “used to
`
`encrypt, decrypt, or authenticate,” (Ex. 1003, ¶193), and selecting Windows
`
`Resource Kit’s security policies, in contrast, merely “control[s] the scenarios in
`
`3
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`which encryption would be required,” (id., ¶¶191, 193). See also Ex. 2016, 25:13-
`
`26:20 (explaining “cryptographic information [is] the specific cryptographic
`
`values that will be used in the secure communication such as cryptographic
`
`keys…, digital signatures…, hash values…, required… key lengths and specific
`
`encryption algorithms.” (emphasis added)). He explained that while selecting
`
`security policies “has an impact on” whether communications are secure, it is not
`
`related to the strength of the security because it merely selects “whether the client
`
`insists or not in having IP security.” Ex. 2016, 63:13-65:16. Thus, the selection of
`
`“Low,” “Moderate,” or “High” is not “cryptographic information.”
`
`Third, Patent Owner implies any information that “has an impact on”
`
`establishing the encrypted communication link is “cryptographic information,” but
`
`this reads the word “cryptographic” out of the claim. See Resp., 24; Ex. 1046,
`
`29:16-30:9 (Dr. Monrose agreeing “the mere fact of clicking on the ‘go secure’
`
`hyperlink does not provide any cryptographic information”). This reading would
`
`also exclude the ’643 patent’s preferred embodiment, which enables a secure
`
`communication mode by (1) clicking a “go secure” hyperlink and (2) “select[ing]
`
`parameters … such as enabling [the] mode … for all communication links.” Ex.
`
`1001, 49:41-53 (emphasis added). Both of these “impact” whether the encrypted
`
`communication link is established, but neither is “cryptographic.” See Epos
`
`Technologies Ltd. v. Pegasus Technologies, 766 F.3d 1338, 1347 (Fed. Cir. 2014)
`
`4
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`(constructions that excludes a preferred embodiment are rarely, if ever, correct).
`
`Moreover, when a “phrase appears in the claims as part of a negative limitation,” it
`
`must be interpreted to give “the broadest reasonable construction of the claims,”
`
`not the phrase. Canon Inc. v. Intellectual Ventures I LLC, IPR2014-00757, Paper
`
`8, 6 (Nov. 21, 2014); see also Microsoft Corp. v. IpLearn-Focus, LLC, IPR2015-
`
`00097, Paper 11, 10-11 (Mar. 26, 2015).
`
`Patent Owner’s implicit construction also conflicts with the ordinary
`
`understanding of the term, which is undisputed. Dr. Tamassia explained that
`
`“cryptographic information … [is] used to encrypt, decrypt, or authenticate
`
`information,” Ex. 1003, ¶193, and Dr. Monrose agreed that “cryptographic
`
`information is information that is used to encrypt or decrypt data,” Ex. 1046, 29:5-
`
`15. This understanding is consistent with the Board’s decision involving a related
`
`patent, where it construed “without a user entering any cryptographic information”
`
`to mean “without a user entering a code or a key to convert data so that only the
`
`specific recipients will be able to read the sent information.” Cisco Systems, Inc. v.
`
`VirnetX Inc., Appeal 2015-007843, 12 (Feb. 11, 2016).
`
`Lastly, Patent Owner’s position that Windows Resource Kit is deficient is
`
`fatally undercut by Dr. Monrose’s deposition testimony, who testified that
`
`selecting “different policies impact[s] the choice of cryptographic information that
`
`is used in the subsequent connection.” Ex. 1046, 73:6-74:12 (emphasis added).
`
`5
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`This is irrelevant to whether the mode is enabled without “entering” cryptographic
`
`information. He stated that “an indication of a specific encryption/decryption
`
`function” would constitute “cryptographic information,” but admitted that IPSec is
`
`only a “protocol suite,” “not an encryption or decryption function” itself, and that it
`
`merely supports “the negotiation of cryptographic techniques.” Id., 73:6-74:12,
`
`69:6-19 (emphasis added). He did not know which encryption functions were
`
`supported by IPSec and could not identify “any specific functions that map to any
`
`one of” the security policies. Ex. 1046, 78:6-81:2. In sum, Dr. Monrose could not
`
`point to any “cryptographic information” actually entered by a user during the
`
`selection of Windows Resource Kit’s security policies. Windows Resource Kit
`
`thus discloses the “enabling” step.
`
`2. Windows Resource Kit Discloses “Establish[ing], Based on a
`Determination that the Secure Communication Mode has Been
`Enabled, The Encrypted Communication Link”
`
`The Board correctly found that Windows Resource Kit discloses the claimed
`
`“establishing” step. Dec., 5-6. Windows Resource Kit discloses an example
`
`where Computer A creates packets to send to Computer B, and Computer A’s
`
`IPSec functionality checks the current security policy before the packets are sent.
`
`Pet., 22-23; Ex. 1005, 1021-27; Ex. 1003, ¶¶185-194. If the security policy
`
`indicates that outgoing connections require encryption, Computer A performs a
`
`series of security negotiations with Computer B so as to form an “encrypted
`
`6
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`communication link” between them, and then sends the packets over this “link.”
`
`Pet., 23; Ex. 1005, 1021-22; Ex. 1003, ¶¶195-203.
`
`Patent Owner argues Windows Resource Kit is deficient because “selecting
`
`a security policy … does not trigger establishment of a connection.” Resp., 25-28
`
`(emphasis added); Ex. 2015, ¶¶40-46 (Dr. Monrose repeating Patent Owner’s
`
`arguments verbatim); Ex. 1046, 94:13-95:1. Absent this “trigger” requirement,
`
`Patent Owner and Dr. Monrose do not contest that Windows Resource Kit
`
`discloses this limitation. See Resp., 25-28; Ex. 1046, 91:16-93:6.
`
`The plain language of claims 1 and 17, however, does not require the
`
`“enabling” step to “trigger” the “establishing” step. Claims 1 and 17 include
`
`separate “enabling” and “establishing” steps, and nothing requires that one
`
`“trigger” the other. Ex. 1001, 55:46-67, 57:12-37; see Cisco Systems, Appeal
`
`2015-007843, 12 (finding no “triggering” requirement in a claim containing similar
`
`language). This reading is confirmed by dependent claims 16 and 32, which recite
`
`the same requirement Patent Owner now reads into claims 1 and 17: “wherein the
`
`enablement of the secure communication mode triggers establishing of the
`
`encrypted communication link.” Ex. 1001, 57:9-11, 58:59-62 (emphasis added). It
`
`is well-settled that “the presence of a dependent claim that adds a particular
`
`limitation raises a presumption that the limitation in question is not found in the
`
`independent claim.” Liebel-Flarsheim Co. v. Medrad, Inc., 358 F.3d 898, 910
`
`7
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`(Fed. Cir. 2004). Patent Owner offers nothing to upset the strong presumption
`
`against reading any “triggering” requirement into claims 1 and 17.
`
`As Petitioner explained (Pet., 22-23; Ex. 1005, 1021-27; Ex. 1003, ¶¶185-
`
`203), the next outbound packets generated after a security policy is selected will
`
`apply the “very same security policy that was previously selected” (see Resp., 26).
`
`Windows Resource Kit thus discloses the “establishing” step.
`
`3. Windows Resource Kit Discloses “Initiating Establishment of
`the Encrypted Communication Link … Using the… Network
`Address and Encrypted Communication Link Resources
`Received From a Server that is Separate From the First Device”
`
`The Board correctly found Windows Resource Kit discloses the claimed
`
`“initiating” step. Dec., 5-6. Windows Resource Kit discloses that when a
`
`computer connects to a remote host using a domain name, a DNS resolver first
`
`queries one or more DNS servers. Pet., 27 Ex. 1005, 964, 967; Ex. 1003, ¶¶162-
`
`171. In response, the DNS resolver receives one or more IP addresses
`
`corresponding to the domain name. Pet., 28; Ex. 1005, 979-982, 986; Ex. 1003,
`
`¶¶172-175. These IP addresses are then used as destination addresses to generate
`
`packets to route to the remote host. Pet., 29; Ex. 1005, 1006, 1021; Ex. 1003,
`
`¶196. After these packets are generated but before they are sent, the computer
`
`determines whether secure communications are necessary by checking the
`
`computer’s active IP Security policy. Pet., 22-23; Ex. 1005, 1020-27; Ex. 1003,
`
`¶¶185-194. If secure communications are required, the computer and remote host
`8
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`begin security negotiations and establish an “encrypted communication link.” Pet.,
`
`29-30; Ex. 1005, 1021-22, 1025; Ex. 1003, ¶¶140-42, 198-202.
`
`Patent Owner makes two arguments against this mapping, neither of which
`
`has merit. See Resp., 29-32; Ex. 2015, ¶¶47-52 (Dr. Monrose repeating Patent
`
`Owner’s arguments verbatim). First, it asserts Windows Resource Kit does not
`
`disclose using “an IP address received from a DNS query when establishing a
`
`communication link.” Resp., 29-30. Patent Owner’s argument rests on its
`
`assertion that the passage describing Computer A and Computer B does not
`
`explicitly state that the outbound packet was generated after a DNS lookup. See
`
`Resp., 29-30; Ex. 1005, 21. The relevant question, however, is what a person of
`
`ordinary skill in the art would have understood from the document. See Liberty
`
`Mutual Ins. Co. v. Progressive Casualty Ins. Co., CBM2012-00002, Paper 66, 25
`
`(Jan. 23, 2014), aff’d, No. 2014-1466 (Fed. Cir. 2015) (“[N]arrowly focus[ing] on
`
`one sentence of [] disclosure … fails to consider” the prior art “from the
`
`perspective of one of ordinary in the art.”).
`
`Dr. Tamassia explained that “[t]he resolution process … [is] not mentioned
`
`in the specific example” because it is instead “described in the section about name
`
`resolution.” Ex. 2016, 74:10-24. He also explained that Windows Resource Kit
`
`shows checking the IP Security policy whenever an application “generates
`
`outbound packets,” such as those generated after requesting an IP address via a
`
`9
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`DNS query. Ex. 1005, 1021; Ex. 1003, ¶¶161, 185, 196; Pet., 22-30. Patent
`
`Owner’s argument that the IP address could come “pre-configured,” Resp., 30, is
`
`irrelevant because Windows Resource Kit’s discloses using DNS lookup as a
`
`source of IP addresses. Ex. 1005, 964. Petitioner need not show that every
`
`embodiment in the prior art anticipates. See Arthrocare Corp. v. Smith & Nephew,
`
`Inc., 406 F.3d 1365, 1372 (Fed. Cir. 2005) (error “to limit the disclosure of the
`
`prior art reference to a preferred embodiment”).
`
`Second, Patent Owner asserts the claimed “second device” and “server”
`
`must correspond to “different components,” while Petitioner has mapped
`
`Computer B to both components. Resp., 28-32. Patent Owner’s position is
`
`inconsistent with the claims, which provide that the server must only be “separate
`
`from the first device,” but do not require the server to be “separate from the second
`
`device.” If the claims implicitly required the “first device,” “second device,” and
`
`“server” to be located on distinct devices, there would be no need to explicitly
`
`require the server to be “separate from the first device.” Thus, the claim language
`
`contemplates that the “server” need not be separate from the “second device.”
`
`This reading of the claims is consistent with the ’643 specification, which
`
`shows that the various components of the system, including the gatekeeper
`
`computer alleged to correspond to the claimed “server,” can reside on separate
`
`devices or on the same device. Ex. 1001, 51:34-39, 40:30-42, 41:10-12; see Ex.
`
`10
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`1046, 43:2-21 (Dr. Monrose agreeing). Likewise, Patent Owner argued in a
`
`proceeding involving the related ’135 patent that a “server” can include “a
`
`computer or program that responds to a request.” IPR2014-00171, Paper 41, 44-
`
`45 (emphasis added). Patent Owner explained that “the common usage in the field
`
`[is] that a ‘server’ may comprise hardware and/or software elements.” Id. at 45.
`
`Thus, Windows Resource Kit discloses a “second device” that includes
`
`“server” functionality in the form of a server computer running server software,
`
`Ex. 1005, 1021, 1024-25, and therefore fulfills both the claimed “second device”
`
`and “server” elements. Pet., 29-30. Server software such as “Windows 2000
`
`Server” (“server”) is a separate software component from the underlying computer
`
`hardware (“second device”). See, e.g., Ex. 1005, 5 (“Windows 2000 Server-based
`
`computer”), 87 (“systems running Windows 2000 Server”), 171 (“the destination
`
`computer in which to install Windows 2000 Server”), 223 (“a computer running
`
`Windows 2000 Server”). Windows Resource Kit thus discloses the “initiating”
`
`step.
`
`B. Dependent Claims
`
`1.
`
`Claims 6 and 21
`
`The Board correctly found that Windows Resource Kit anticipates claims 6
`
`and 21. Dec., 9. Petitioner explained that the Windows 2000 operating system is a
`
`“user interface” with multiple “user interface elements,” one of which is the IPSec
`
`11
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`dialog window. Pet., 33, 35; Ex. 1005, 7, 353, 1025. Per claims 5, 6, 20, and 21,
`
`Windows 2000 comes with Internet Explorer 5, which is a “web browser” and
`
`“application” stored in the memory of the Windows 2000 computer (“first
`
`device”). Pet., 37; Ex. 1005, 11-12.
`
`In its Response, Patent Owner presents an argument premised on the Petition
`
`mapping Windows Resource Kit’s IPSec dialog window to the claimed “user
`
`interface.” Resp., 32-35; Ex. 2015, ¶¶53-58 (Dr. Monrose repeating Patent
`
`Owner’s arguments verbatim). Patent Owner is mistaken—Windows 2000 fulfills
`
`the claimed “user interface,” not the IPSec dialog window. Pet., 33, 37. Windows
`
`Resource Kit thus anticipates claims 6 and 21.
`
`2.
`
`Claims 7 and 22
`
`The Board correctly found that Windows Resource Kit anticipates claims 7
`
`and 22. Dec., 6-7. After the petition was filed, the Board construed an “SDNS” as
`
`“a service that can resolve secure computer network addresses for a secure domain
`
`name for which a conventional domain name service cannot resolve addresses.”
`
`Apple Inc. v. VirnetX Inc., IPR2014-00403, Paper 42, 8-20 (July 29, 2015).
`
`Windows Resource Kit explains that domain names can correspond to hosts
`
`that require encryption or authentication, and are thus secure computers with
`
`secure network addresses. Pet., 38; Ex. 1005, 1024, 1027; Ex. 1003, ¶¶67-39.
`
`Windows 2000 also supports using a private name server to resolve intranet names
`
`12
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`and a public name server to resolve Internet names. Pet., 38-39; Ex. 1005, 989-90.
`
`This allows a host to register “different domain names on each network,” with
`
`private domain names un-resolvable on the conventional public name server. Ex.
`
`1005, 989-90.
`
`In its Response, Patent Owner argues that Windows Resource Kit does not
`
`disclose an “SDNS” for reasons that largely rest on its overly narrow construction
`
`of the term (which incorporates its construction for “secure domain name”). Resp.,
`
`5-20, 36-38; Ex. 2015, ¶¶17-30, 59-65 (Dr. Monrose repeating Patent Owner’s
`
`arguments verbatim). Each of these arguments fails.
`
`First, Patent Owner argues Windows Resource Kit does not disclose
`
`providing a “secure computer network address” for a requested “secure domain
`
`name” because the hosts or addresses do not require “security” or “authentication
`
`for access.” Resp., 36-38. That is incorrect. Windows Resource Kit explains a
`
`connection’s “level of security … is based on the IP security policy of the sending
`
`or receiving computer,” and that when the “High” security policy is selected on the
`
`receiving computer “[a]ll unsecured incoming communications are rejected.” Ex.
`
`1005, 1021, 1025 (emphasis added). A remote host operating under this policy is
`
`secure, “authenticate[s] the session,” and “limit[s] access from unauthorized
`
`users.” Id., 1020-21. Likewise, an address returned by a private name server for
`
`such a host is one that requires authorization for access. Id. Moreover, any
`
`13
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`computer and address located on a private network is “secure” because it is located
`
`on “a secure computer network.” Pet., 11; Ex. 1003, ¶69. These aspects of Patent
`
`Owner’s proposed construction of “SDNS” are thus irrelevant.
`
`Second, Patent Owner argues Windows Resource Kit’s domain names are
`
`not “non-standard.” Resp., 37-38. But Patent Owner’s supposed disclaimers are
`
`not applicable to the Board here, Tempo Lighting Inc. v. Tivoli, LLC, 742 F.3d 973,
`
`978 (Fed. Cir. 2014), and are not supported by the ’643 specification, which does
`
`not require an “SDNS” resolve only “non-standard” domain names. The
`
`specification simply provides that an SDNS has a table that correlates secure
`
`domain names and secure network addresses. Ex. 1001, 51:6-10. Patent Owner
`
`offers no reason to depart from the Board’s prior rejection of this requirement in
`
`related proceedings. See IPR2014-00403, Paper 42, 8-20.
`
`Third, Patent Owner argues Windows Resource Kit’s private name server is
`
`“conventional,” but provides no justification other than that it cannot resolve “non-
`
`standard” domain names. Resp. 37-38. Windows Resource Kit discloses domain
`
`names corresponding to intranet destinations that can only be resolved by a private
`
`name server located on a private network, and cannot be resolved by conventional
`
`public name servers. Ex. 1005, 989-90. Patent Owner continues to offer no
`
`rebuttal to this mapping, despite the Board’s prompting. See Dec., 7.
`
`14
`
`

`
`IPR2015-01009
`
`
`
`Petitioner’s Reply
`
`Finally, Patent Owner argues Windows Resource Kit’s private name server
`
`is not an “SDNS” because it cannot “recognize[] that a query message is requesting
`
`a secure computer network address.” Resp., 38. But Windows Resource Kit’s
`
`name server “recognizes” a query is requesting a secure address in the manner
`
`disclosed in the ’643 patent: by checking an internal table that correlates secure
`
`names to secure addresses. Ex. 1001, 51:6-10. Neither the claims nor the
`
`specification require anything more.
`
`Windows Resource Kit thus anticipates claims 7 and 22.
`
`3.
`
`Claims 12 and 27
`
`The Board correctly found that Windows Resource Kit anticipates claims 12
`
`and 27. Dec., 7. Windows Resource Kit discloses a variety of domain name

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket