throbber

`
`
`
`
`
`
`
`
`Paper No.
`Filed: January 17, 2020
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD. and APPLE INC.,
`Petitioner
`v.
`VIRNETX INC.,
`Patent Owner
`
`
`
`Case IPR2015-010461
`Patent 6,502,135
`
`
`
`
`
`Patent Owner’s Sur-Reply Brief
`
`
`
`
`
`
`1 Apple Inc., who filed a petition in IPR2016-00062, has been joined as a Petitioner
`in the instant proceeding.
`
`

`

`
`
`Case No. IPR2015-01046
`
`
`
`
`
`
`
`2.
`
`3.
`
`TABLE OF CONTENTS
`Introduction ...................................................................................................... 1
`Claim Construction .......................................................................................... 1
`A.
`“Client Computer” ................................................................................. 1
`1.
`Petitioners’ Proposed Construction Finds No Support in
`the Claim Language .................................................................... 1
`The Specification Does Not Supports Petitioners’
`Construction ................................................................................ 5
`The Extrinsic Evidence Does Not Support Petitioners’
`Construction ................................................................................ 8
`“Virtual Private Network (VPN)” ......................................................... 9
`B.
` Kiuchi Does Not Anticipate Claims 1, 3, 4, 7, 8, 10, and 12 ........................12
`A.
`Petitioners’ “User Agent to Origin Server” Mapping Is
`Deficient ..............................................................................................12
`1.
`Kiuchi Does Not Disclose a Single HTTP Connection
`Between the User Agent and Origin Server..............................13
`Kiuchi’s User Agent Does Not Directly Address the
`Origin Server .............................................................................17
`Petitioners’ “Client-Side Proxy to Server-Side Proxy” Mapping
`Is Deficient ..........................................................................................20
`1.
`Petitioners’ “Client-Side Proxy to Server-Side Proxy”
`Mapping Fails Under VirnetX’s Construction for “Client
`Computer” .................................................................................21
`Petitioners’ “Client-Side Proxy to Server-Side Proxy”
`Mapping Fails Under Petitioners’ Construction for
`“Client Computer” ....................................................................25
` The Board Should Not Rely on Dr. Guerin’s Testimony ..............................30
`
`B.
`
`2.
`
`2.
`
`
`
`i
`
`

`

`Case No. IPR2015-01046
`
`The Board Should Draw an Adverse Inference Regarding the RPI or
`Privity Relationship Between Mangrove and RPX, and Terminate the
`Proceeding .....................................................................................................30
` A New Panel Should Consider this Remand Proceeding To Avoid
`Constitutional Concerns ................................................................................32
` The Proceedings Should Be Terminated in View of 35 U.S.C.
`§ 315(b) ..........................................................................................................32
` Conclusion .....................................................................................................33
`
`ii
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`Case No. IPR2015-01046
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Arctic Cat Inc. v. Polaris Indus., Inc.,
`No. 19-1440, 2019 WL 7050133 (Fed. Cir. Dec. 23, 2019) .............................. 31
`Arthrex, Inc. v. Smith & Nephew, Inc.,
`941 F.3d 1320 (Fed. Cir. 2019) .......................................................................... 32
`Founding Church of Scientology of Washington, D.C. v. Webster,
`802 F.2d 1448 (D.C. Cir. 1986) .......................................................................... 31
`Motorola, Inc. v. Interdigital Tech. Corp.,
`121 F.3d 1461 (Fed. Cir. 1997) .......................................................................... 29
`Omega Eng’g, Inc. v. Raytek Corp.,
`334 F.3d 1314 (Fed. Cir. 2003) ............................................................................ 4
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2015) (en banc) ...................................................... 5, 29
`Therasense, Inc. v. Becton, Dickinson & Co.,
`593 F.3d 1325 (Fed. Cir. 2010) .......................................................................... 30
`VirnetX Inc. v. Cisco Sys. Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) ........................................................ 11, 14, 20, 29
`VirnetX Inc. v. Mangrove Partners Master Fund, Ltd.,
`778 F. App’x 897 (Fed. Cir. 2019) ..............................................................passim
`Statutes
`35 U.S.C. § 315(b) ................................................................................................... 32
`
`
`
`iii
`
`

`

`
`
`
`
`
`
`Case No. IPR2015-01046
`
`Introduction
`As VirnetX previously demonstrated, Petitioners’ grounds of unpatentability
`
`are deficient in a number of ways. Petitioners’ reply brief tries to argue otherwise.
`
`As explained below, those arguments are without merit.
`
` Claim Construction
`“Client Computer”
`A.
`Petitioners’ Proposed Construction Finds No Support in the
`1.
`Claim Language
`Petitioners’ claim construction argument is based on a faulty premise—that
`
`the term “client computer,” in its “plain and ordinary meaning,” denotes “a
`
`‘computer from which a data request to a server is generated.’” (Petitioner’s Reply
`
`Remand Brief, Paper 97 (“Reply”) at 1.) That argument is unsound. Petitioners’
`
`original basis for their proposed construction—as reflected in their opening brief on
`
`remand—was the assertion that this is how a skilled artisan would have understood
`
`the term “client computer.” (Petitioners’ Remand Brief, Paper 95 (“PRB”) at 6-7.)
`
`In its opposition brief, VirnetX demonstrated that Petitioners’ support for that
`
`assertion—a claim that both their and VirnetX’s experts “agreed that a skilled person
`
`would have understood a conventional ‘client’ to be any application that generates a
`
`request for data from a server” (PRB at 7)—mischaracterized expert testimony.
`
`(Patent Owner’s Opposition Brief, Paper 96 (“Opp.”) at 7-8.) Neither expert
`
` 1
`
`
`
`
`
`
`
`
`
`

`

`
`provided an opinion that would support Petitioners’ argument as to how a skilled
`
`Case No. IPR2015-01046
`
`artisan would have understood the term “client computer.” And as VirnetX
`
`demonstrated, one of skill in the art, reading the claims in context of the
`
`specification—as required—would have understood “client computer” to mean a
`
`“user’s computer.” (See Opp. 3-6.)2
`
`Petitioners’ reply scarcely defends their arguments based on the purported
`
`understanding of a skilled artisan. Instead, Petitioners retreat to a different position,
`
`urging that a “client computer” is a “computer from which a data request to a server
`
`is generated” because claim 1 recites the “client computer” “generating a ... request”
`
`
`2 Petitioners are incorrect in claiming that VirnetX’s expert, Dr. Monrose, “admitted
`
`the ’135 patent did not give ‘client computer’ a special definition.” (Reply at 1.)
`
`The portions of Dr. Monrose’s deposition that Petitioners cite (Ex. 1036, 74:15-
`
`75:16, 95:1-5) contain no discussion of that issue, much less any “admission.”
`
`Regardless, VirnetX’s argument is not that the ’135 patent advanced any “special
`
`definition” for the term “client computer,” but that the language of the claims and
`
`the specification make clear that the term “client computer” means a “user’s
`
`computer.” (See Opp. 3-6.) Petitioners, moreover, do not even attempt to rebut
`
`VirnetX’s detailed explanation of how their brief mischaracterized the testimony of
`
`Dr. Guerin and Dr. Monrose. (See Reply at 9; Opp. 7-8.)
`
`
`
`
`2
`
`

`

`
`for an IP address. (Reply at 2.) That argument is nonsensical. A claim term is not
`
`Case No. IPR2015-01046
`
`defined by the description of one of the claimed steps it performs; that would deprive
`
`the term “client computer” of any independent meaning. If a claim recites “a wire
`
`to transmit current,” that does not mean a “wire” can be defined as anything that can
`
`transmit current (such as a human body).
`
`Along similar lines, Petitioners argue that the claims of the ’135 patent “do
`
`not require checking a user’s status or credentials,” but “instead specify actions
`
`based on attributes of the request or the computer making the request.” (Reply at 3.)
`
`That the client computer sends a request does not by itself define what the computer
`
`is in the context of the claims and specification of the ’135 patent. Claim 1 requires
`
`a VPN between the client computer and target computer; an arrangement that the
`
`specification repeatedly describes as involving a user’s computer. (See Ex. 1001 at
`
`38:30-33; see also Opp. 4-5.) Moreover, the clarification that the client computer is
`
`sending a “request” is contained within the language of claims 1, 10, and 13. This
`
`is not a situation where one claim recites the term “client computer,” and a different
`
`claim contains a clarification that could narrow the definition of “client computer.”
`
`Having failed to find adequate support for their preferred definition in the
`
`claim language of the ’135 patent, Petitioners resort to claim language of different
`
`patents, containing different terms. Thus, Petitioners quote—for the first time in this
`
`proceeding—U.S. Patent No. 9,386,000 (not at issue here), which recites the term
`
`
`
`
`3
`
`

`

`
`“client device,” and then “adds that ‘the client device is a user device.’” (Reply at 3
`
`Case No. IPR2015-01046
`
`(emphasis removed).) Petitioners claim this shows that a “client computer” cannot
`
`be a “user’s computer” because otherwise “the additional language in this claim [of
`
`the ’000 patent] would be superfluous.” (Id.) To the contrary, to the extent
`
`construction of “client device” in the ’000 patent is even relevant,3 that definition
`
`shows that the specification (which the ’135 patent shares with the ’000 patent) uses
`
`the term “client computer” to mean the “user’s computer.” (See Opp. 9-10.) If the
`
`“client device is a user device” (as stated in the ’000 patent), it follows that a “client
`
`computer” in the ’135 patent should be construed as “a user’s computer.”
`
`Finally, Petitioners contends that their construction “reflects the skilled
`
`artisan’s understanding that a device in a client-server system that acts as a server in
`
`one operation can act as a client in another.” (Reply at 2 (citing Ex. 1014 at 5-6).)
`
`As VirnetX already explained, Exhibit 1014 (RFC 1945) defines the user agent as
`
`the “client” that “initiates a request,” (Opp. 6 n.3, 27; Ex. 2047 at 73:14-19), and so
`
`
`3 Petitioners rely (Reply at 4) on the “presum[ption] … that the same claim term in
`
`the same patent or related patents carries the same construed meaning.” Omega
`
`Eng’g, Inc. v. Raytek Corp., 334 F.3d 1314, 1334 (Fed. Cir. 2003) (citation omitted).
`
`That doctrine does not apply, however, where the claim terms are different, as “client
`
`device” and “client computer” are.
`
`
`
`
`4
`
`

`

`
`supports VirnetX’s construction. Petitioners do not attempt to rebut this argument.
`
`Case No. IPR2015-01046
`
`Moreover, Petitioners apparently concede that their construction would result in a
`
`confusing ability of the claimed components to change whether they act as a “client
`
`computer” or a “target computer.” (See Reply at 2-3 (“nothing in the claims
`
`precludes a ‘target computer’ in a first transaction from being a ‘client computer’ in
`
`a second transaction involving a different ‘target computer’”) (emphasis in
`
`original).) As explained below, infra at Section III.B.2, Petitioners’ interpretation
`
`of Kiuchi fails in light of this argument.
`
`2.
`
`The Specification Does Not Supports Petitioners’
`Construction
`As VirnetX demonstrated, the specification—the “single best guide to the
`
`meaning of a disputed term,” Phillips v. AWH Corp., 415 F.3d 1303, 1315 (Fed. Cir.
`
`2015) (en banc)—indicates that the proper construction of “client computer” is a
`
`“user’s computer.” (Opp. 3-5, 8-11.) The specification uses the terms “client
`
`computer” and a “user’s computer” synonymously because the two terms are
`
`consistent with each other. (See, e.g., Opp. 9-10.)
`
`Petitioners contend that the specification “refutes” this construction, but their
`
`effort falls short. Petitioners first accuse VirnetX of “ignor[ing]” a passage in the
`
`specification that “uses ‘client computer’ without any statement or suggestion it
`
`must be a user’s device.’” (Reply at 4 (quoting Ex. 1001 at 16:16-19, Fig. 8)
`
`(emphasis in original).) As an initial matter, this is the first time Petitioners invoked
`5
`
`
`
`
`

`

`
`this portion of the specification—it was not cited or discussed in their opening
`
`Case No. IPR2015-01046
`
`remand brief—and so VirnetX could hardly be accused of “ignoring” something
`
`Petitioners did not argue until now. In any event, the fact that in some passages the
`
`specification uses the term “client computer” without any further elaboration is
`
`hardly evidence that the term does not mean a “user’s computer.” After all, the
`
`claims themselves use the term “client computer” without further elaboration;
`
`otherwise, there would be no need to define the term. The specification does not
`
`have to expressly define the term “client computer” every time it uses that term.
`
`There is no implication—contrary to Petitioners’ argument (see Reply at 6)—that
`
`the computer at the starting end of the VPN is not a “user’s computer.” This is not—
`
`as Petitioners attempt to portray it—a situation where a patent uses different terms,
`
`which “connotes different meanings,” nor is it an attempt to “import[] limitations
`
`from the specification into the claim,” (Reply at 5, 6 (internal quotation marks,
`
`emphasis, and citations omitted)).
`
`Similarly unavailing is Petitioners’ argument that “[o]ther passages use ‘client
`
`computer’ without any reference or context suggesting the necessity of a ‘user.’”
`
`(Reply at 7.) For starters, Petitioners’ argument is factually wrong. One of the
`
`figures to which they point—Figure 31, discussed at Ex. 1001 at 7:33-36—expressly
`
`refers to a “determin[ation] that client 3103 is a validly registered user.” (Ex. 1001
`
`at 45:8-9.) The other passages cited by Petitioners (Figures 8 and 9) are also not
`
`
`
`
`6
`
`

`

`
`inconsistent with VirnetX’s proposed definition. (See supra at 5-6 (discussing
`
`Case No. IPR2015-01046
`
`Figure 8).)
`
`Petitioners then try to counter VirnetX’s argument that the specification’s
`
`statement that “[a] user’s computer 2601 includes a convention client (e.g., a web
`
`browser) 2605” (Ex. 1001 at 38:14-15, quoted in Opp. 8) shows that the “client
`
`computer” is a “user’s computer,” since it is running applications like web browsers
`
`that would run on a computer being operated by a user, and not on a proxy. (Opp.
`
`8-9.) Petitioners contend the statement “expressly differentiates” between “user’s
`
`computer” and “client” because (they assert) “a web browser running on the user’s
`
`computer is identified as an example … of a client.” (Reply at 5 (emphasis
`
`removed).) At most, that argument can show that the term “client” (as used in the
`
`’135 patent) could mean “user’s application” (as opposed to only “user’s
`
`computer”); it does not show that the term “client” cannot mean “user.”
`
`As VirnetX pointed out, the specification consistently speaks about a VPN
`
`being established “between user computer … and secure target site.” (Ex. 1001 at
`
`38:30-33, quoted in Opp. 4; see also Ex. 1001 at 39:23-25.) Petitioners argue that
`
`those passages merely describe “a single embodiment of the invention” that
`
`“imposes no restrictions on how” to make “a determination that a user has sufficient
`
`security privileges,” and that a user’s security privileges “can be checked without a
`
`user’s credentials and can be delegated to devices other than the ‘user’s computer.’”
`
`
`
`
`7
`
`

`

`
`(Reply at 5 (quoting Ex. 1001 at 38:23-30, 39:6-13).) This argument misses the
`
`Case No. IPR2015-01046
`
`mark. VirnetX never argued that the user’s computer must make that security
`
`determination. Moreover, this example supports VirnetX’s construction, for one
`
`would not be checking whether the user has sufficient security privileges if there
`
`were no user.
`
`Critically, Petitioners offer no effective response to VirnetX’s point that the
`
`specification expressly distinguishes the “client computer” from proxies like
`
`Kiuchi’s client-side proxy. (See Opp. 5; see also Opp. 8-9.) Petitioners accuse
`
`VirnetX of “ignor[ing] that one computer can play multiple roles in a client-server
`
`system.” (Reply at 6.) That observation, however, is not responsive to VirnetX’
`
`point that, in the context of the ’135 patent, when the specification speaks of a “client
`
`computer” and a proxy, it is referring to two markedly distinct items.
`
`3.
`
`The Extrinsic Evidence Does Not Support Petitioners’
`Construction
`As VirnetX demonstrated, the extrinsic evidence, such as RFC 1945 and the
`
`dictionaries, support VirnetX’s proposed construction of “client computer,” and not
`
`that advanced by Petitioners. (See Opp. 5-6 & n.3.) Petitioners’ arguments to the
`
`contrary are unavailing. Singing a familiar tune, Petitioners accuse VirnetX of
`
`“ignor[ing] RFC 1945’s explanation that a proxy ‘acts as both a server and a client
`
`for the purpose of making requests on behalf of other clients.’” (Reply at 8 (quoting
`
`Ex. 1014 at 5-6) (emphasis in original).) But the fact that a proxy can “act[] as both
`8
`
`
`
`
`

`

`
`a server and a client” does not mean that the proxy is the server or the client. A
`
`Case No. IPR2015-01046
`
`proxy can perform the functions associated with a client, but that does not mean it is
`
`a client within the context of particular claim terms.
`
`Moreover, Petitioners themselves ignore RFC 1945’s definition of a “user
`
`agent” as “[t]he client which initiates a request.” (Ex. 1014 at 5 (emphasis added).)
`
`As VirnetX explained, that definition supports VirnetX’s—not Petitioners’—
`
`construction of “client computer.” And, as VirnetX also explained, Exhibits 1037
`
`and 1043 discuss “client” in a similar manner. (Opp. 6 n.3.) Petitioners
`
`characteristically offer not response to that argument.
`
`Finally, Petitioners offer no effective counter to VirnetX’s argument
`
`(Opp. 11) that its proposed construction is supported by the acknowledgement of
`
`Petitioner Apple’s own expert in parallel district-court litigation that Kiuchi’s user
`
`agent—i.e., the web browser operated by the user, not the client-side proxy—“would
`
`be read naturally as a client computer.” (Ex. 2048 at 50:7-24.) Petitioners’ attempts
`
`to side-step the admission of their own expert (see Reply at 27-28) is unavailing.
`
`See infra at Section III.B.1.
`
`“Virtual Private Network (VPN)”
`B.
`Petitioners concede, as they must, that the Federal Circuit gave effect to
`
`VirnetX’s disclaimer, which “clearly and unmistakably state[d] that a ‘VPN between
`
`the client computer and the target computer’ requires direct communication between
`
`
`
`
`9
`
`

`

`
`the client and target computers.” VirnetX Inc. v. Mangrove Partners Master Fund,
`
`Case No. IPR2015-01046
`
`Ltd., 778 F. App’x 897, 910 (Fed. Cir. 2019). Petitioners contend, however, that
`
`even in light of VirnetX’s disclaimer, “Kiuchi’s user agent communicates ‘directly’
`
`with the origin server” and “[t]he use of proxy servers (such as in Kiuchi’s system)
`
`… does not prevent a communication from being ‘direct’ in the meaning of the
`
`claims.” (Reply at 10, 15.)
`
`As an initial matter, Petitioners’ effort is foreclosed by the Federal Circuit’s
`
`decision. The Court explained that VirnetX disclaimed a “system in which a client
`
`computer communicates with an intermediate server via a singular, point-to-point
`
`connection,” wherein “[t]hat intermediate server then relays the data to a target
`
`computer on the same private network on which the server resides.” VirnetX, 778
`
`F. App’x at 910. The mandate rule precludes the Board from adopting a claim
`
`construction that would cover that ceded claim scope.
`
`Petitioners attempt to evade the Federal Circuit’s guidance by arguing that
`
`VirnetX did not disclaim a system that “uses intermediary network devices such a
`
`proxy servers or firewalls.” (Reply at 12.) That is misleading. VirnetX never argued
`
`that a VPN communication can be direct when it is routed through a proxy server.4
`
`
`4 VirnetX did acknowledge that a direct communication can pass through a firewall,
`
`but that is because a firewall—like a Network Address Translator (“NAT”) router—
`
`
`
`
`10
`
`

`

`
`In fact, as the Federal Circuit previously observed, VirnetX argued exactly the
`
`Case No. IPR2015-01046
`
`opposite. As the Court explained, in parallel district-court litigation, “the jury heard
`
`expert testimony that Kiuchi’s client-side and server-side proxies terminate the
`
`connection, process information, and create a new connection—actions that are not
`
`“direct” within the meaning of the asserted claims. … VirnetX distinguished such
`
`proxy activities from the operation of NAT routers which—unlike proxy servers in
`
`the prior art-do not terminate the connection.” VirnetX Inc. v. Cisco Sys. Inc., 767
`
`F.3d 1308, 1323-24 (Fed. Cir. 2014) (emphasis added).
`
`Petitioners are being similarly misleading when they claim that “VirnetX …
`
`explained that transporting network traffic across proxy servers … does not prevent
`
`direct communications.” (Reply at 12-13.) VirnetX never argued that the VPN in
`
`Apple’s infringing system goes through the proxy servers, but only that the system
`
`can include proxy servers. See Br. for VirnetX Inc., No. 2013-1489, Dkt. No. 54
`
`(Fed. Cir. Dec. 9, 2013) (hereinafter, “VirnetX Br., No. 2013-1489”) at 19; see also
`
`id. at 38-39.
`
`Similarly misleading is Petitioners’ assertion that VirnetX’s characterization
`
`of the “direct communication” requirement as one of “direct addressability” can
`
`
`does not stop or terminate that communication. See Br. for VirnetX Inc., No. 2013-
`
`1489, at 51; see also infra at Section III.A.
`
`
`
`
`11
`
`

`

`
`encompass relay-based systems, such as Kiuchi’s. (See Reply at 13-15.) VirnetX’s
`
`Case No. IPR2015-01046
`
`disclaimer specifically identified the relay-based system of Aventail as outside the
`
`claims. (See Ex. 2036, 7 (“The SOCKS server then relays that data to a target
`
`computer on a private network on which the SOCKS server also resides.”).) As
`
`VirnetX consistently argued, such relay-based systems “are indirect.” VirnetX Br.,
`
`No. 2013-1489, at 21. As VirnetX explained, a NAT router can “translate[] the
`
`transport address from the WAN, a public address space, to the LAN, a private
`
`address space.” (Id.) But, VirnetX further explained, “[u]nlike Kiuchi and Aventail
`
`proxy servers and FaceTime relay servers, NAT routers do not terminate the
`
`connection, and the communication remains direct between caller and recipient.”
`
`(Id. at 21-22 (emphasis added).)
`
` Kiuchi Does Not Anticipate Claims 1, 3, 4, 7, 8, 10, and 12
`Petitioners maintain that “Kiuchi anticipates the challenged claims in two
`
`independent ways.” (Reply at 15.) For the reasons discussed in VirnetX’s
`
`opposition brief and those below, both of Petitioners’ mappings cannot support
`
`unpatentability of the challenged claims.
`
`Petitioners’ “User Agent to Origin Server” Mapping Is Deficient
`A.
`The connection between Kiuchi’s user agent and origin server is not direct
`
`within the meaning of VirnetX’s disclaimer. (Opp. 15-21.) Petitioners respond with
`
`two points. First, Petitioners argue that “Kiuchi describes communications between
`
`
`
`
`12
`
`

`

`
`a user agent and origin server that use a single HTTP connection.” (Reply at 16-19.)
`
`Case No. IPR2015-01046
`
`Second, Petitioners argue that “Kiuchi’s user agent … directly addresses the origin
`
`server.” (Reply at 19-23.) Petitioners are wrong on both fronts.
`
`1. Kiuchi Does Not Disclose a Single HTTP Connection
`Between the User Agent and Origin Server
`Petitioners maintain that “Kiuchi describes communications between a user
`
`agent and origin server that use a single HTTP connection” because “Kiuchi’s user
`
`agent sends a HTTP Get Request, which is an application layer communication
`
`routed through the client-side and server-side proxies and delivered to the origin
`
`server.” (Reply at 16.) At the outset, this contradicts Petitioners’ prior assertion that
`
`Kiuchi discloses an “encrypted C-HTTP connection … between the user agent …
`
`and the origin server.” (PRB at 16-17.) Petitioners’ abandonment of that theory is
`
`not surprising since VirnetX demonstrated it was wrong. (Opp. 17-18.) Petitioners’
`
`new theory, however, is also wrong.
`
`First, Petitioners make no effort to explain how their characterization of
`
`Kiuchi as disclosing a “single HTTP connection” is relevant under the interpretation
`
`of VirnetX’s disclaimer held by the Federal Circuit. The Federal Circuit explained
`
`that VirnetX’s disclaimer “described a system in which a client computer
`
`communicates with an intermediate server via a singular, point-to-point connection,”
`
`whereby “[t]hat intermediate server then relays the data to a target computer on the
`
`same private network on which the server resides.” VirnetX, 778 F. App’x at 910.
`13
`
`
`
`
`

`

`
`Whatever descriptive label is given to Kiuchi’s process does not change the fact that
`
`Case No. IPR2015-01046
`
`the user agent communicates with the client-side proxy using HTTP/1.0, which in
`
`turn communicates separately with the server-side proxy using C-HTTP (Ex. 1002
`
`at 8-9), and that “[f]rom the view of the user agent … all resources appear to be
`
`located in [the] server-side proxy” (id. at 9)—and the “server-side proxy forwards
`
`requests to the origin server,” which is in the same network as the server-side proxy
`
`(id.). Kiuchi thus falls precisely in the scope of the disclaimer found by the Federal
`
`Circuit. See also VirnetX, 767 F.3d at 1324 (“Kiuchi’s client-side and server-side
`
`proxies terminate the connection, process information, and create a new
`
`connection—actions that are not ‘direct’ within the meaning of the asserted
`
`claims.”).
`
`In any event, nowhere does Kiuchi disclose that it makes use of a “single
`
`HTTP connection” between the user agent and origin server. As the Federal Circuit
`
`explained, Kiuchi discloses three separate links: the “user agent and client-side
`
`proxy communicate” via one link, and “the origin server and server-side proxy
`
`communicate” via another. VirnetX, 778 F. App’x at 905. Then, there is a third
`
`“secure, encrypted” “connection between the client-side and server-side proxies.”
`
`Id.; see also id. (user agent and origin server “receive . .. information” not from each
`
`other, but “from their respective proxies”); VirnetX, 767 F.3d at 1324 (“Kiuchi’s
`
`
`
`
`14
`
`

`

`
`client-side and server-side proxies terminate the connection, process information,
`
`Case No. IPR2015-01046
`
`and create a new connection”).
`
`Petitioners’ assert that the original “HTTP Get Request” in Kiuchi sent by the
`
`user agent is “routed to” the origin server. (Reply at 16.) This too is incorrect and
`
`unsupported by the evidence. As VirnetX previously explained, Kiuchi does not
`
`disclose what is passed to the origin server in the separate connection between the
`
`server-side proxy and the origin server, and only generically states that “the server-
`
`side proxy forwards requests to the origin server.” (Ex. 1002 at 9;5 see also Opp.
`
`18-19.) Kiuchi makes no reference to any “routing” or how such routing is
`
`performed.
`
`Petitioners assert that Kiuchi’s description is analogous to the description of
`
`TARP in Figure 2 of the ’135 patent. (Reply at 17-18.) VirnetX has already
`
`demonstrated this to be false. (Opp. 19.) Petitioners tellingly provide no substantive
`
`response to VirnetX’s showing.
`
`Apparently recognizing that Kiuchi cannot map to the claims under the
`
`
`5 Kiuchi also explains that it is possible to map any of the virtual directories on the
`
`server-side proxy to any of the directories in one or more origin servers inside the
`
`firewall. (Ex. 1002 at 9.) This example further clarifies that the server-side proxy
`
`has to determine where to find the origin server.
`
`
`
`
`15
`
`

`

`
`interpretation of the claims articulated by the Federal Circuit, Petitioners try to
`
`Case No. IPR2015-01046
`
`distract by comparing Kiuchi to another prior art reference, Aventail, that was at
`
`issue when VirnetX made its disclaimer. (Reply at 16-17.) In doing so, Petitioners
`
`concede that if a “client cannot open a … connection to the target device, but instead
`
`opens a … connection with [an intermediary] server, which in turn communicates
`
`with the target over a separate connection,” such a reference would fall within the
`
`scope of VirnetX’s disclaimer. (Reply at 17.) Petitioners are simply wrong that
`
`Kiuchi does not describe such a system, as VirnetX previously showed and the
`
`Federal Circuit recognized. (See Opp. 16-21.) Indeed, while Petitioners try to paint
`
`VirnetX’s disclaimer narrowly now, Apple had a far different understanding in
`
`district court, describing VirnetX’s disclaimer as “entirely consistent with what
`
`[VirnetX] show[s] in [its] patent” and describing the “difference” between Aventail
`
`and the ’135 patent’s direct communication requirement by arguing that, unlike in
`
`Aventail, “[t]here is not an intermediate server that the client has targeted.”
`
`(Ex. 2035 at 44:19-45:12.)
`
`Petitioners further contend that Kiuchi is like Apple’s infringing system
`
`because both encrypt and decrypt communications and make use of intermediary
`
`devices. (Reply at 18.) That is a strawman. VirnetX has never argued that mere
`
`encryption and decryption, or making use of intermediary devices, precludes direct
`
`communication. Indeed, this is an issue on which the Federal Circuit previously
`
`
`
`
`16
`
`

`

`
`weighed in. (Supra Section II.B.)6 And while Petitioners assert that VirnetX has
`
`Case No. IPR2015-01046
`
`argued that “network traffic in Apple’s system is transported across proxy servers”
`
`(Reply at 18), this is misleading. VirnetX never argued that the VPN in Apple’s
`
`infringing system goes through the proxy servers, but rather argued that the system
`
`includes proxy servers. VirnetX Br., No. 2013-1489, at 19.
`
`2. Kiuchi’s User Agent Does Not Directly Address the Origin
`Server
`Petitioners argue that “Kiuchi’s user agent … directly addresses the origin
`
`server.” (Reply at 19.) In making this argument, Petitioners grossly misconstrue
`
`Kiuchi. Kiuchi’s user agent does not directly address the origin server, and indeed
`
`“[f]rom the view of the user agent … all resources appear to be located in [the]
`
`server-side proxy[.]” (Ex. 1002 at 9; see also Opp. 18-19.) Kiuchi specifically
`
`rejects secure end-to-end communications between users and origin servers by
`
`relying on proxy-to-proxy communications. (Ex. 1002 at 7, 10.)
`
`Fundamental to Petitioners’ position is the belief that “Kiuchi’s user agent
`
`creates an HTTP Get Request that includes an address—the URL—of the origin
`
`server” whereby, according to Petitioners, this request is then “transmitted to a
`
`
`6 Petitioners also argue that Kiuchi does not sufficiently modify data, and does so in
`
`a manner analogous to Apple’s infringing products. (Reply at 18-19.) As VirnetX
`
`previously explained, Petitioners misunderstand VirnetX’s argument. (Opp. 20-21.)
`
`
`
`
`17
`
`

`

`
`client-side proxy that encrypts the message, wraps it in a C-HTTP header, and
`
`Case No. IPR2015-01046
`
`transmits it to a server-side proxy” that “decrypts the HTTP Get Request and, using
`
`the URL, forwards it to the origin server.” (Reply at 19-20.) This is not how Kiuchi
`
`works.
`
`Kiuchi does not disclose that the URL in the request is used to route a request
`
`to the origin server. Instead, the URL is used during the initial phases of Kiuchi’s
`
`process (i.e., the steps leading up to the connection betwe

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket