throbber
Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`Paper No. _______
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`
`
`
`Apple Inc.
`Petitioner,
`
`v.
`
`VirnetX, Inc. and Science Application International Corporation,
`Patent Owner
`
`Patent No. 6,502,135
`Issued: Dec. 31, 2002
`Filed: Feb. 15, 2000
`Inventors: Edmund C. Munger, et al
`Title: Agile Network Protocol For Secure Communications With Assured System
`Availability
`____________________
`
`Inter Partes Review No. IPR2013-00349
`__________________________________________________________________
`
`PETITION FOR INTER PARTES REVIEW
`
`
`
`
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`TABLE OF CONTENTS
`
`I.
`
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION
`
`FOR INTER PARTES REVIEW ................................................................. 1
`A.
`Certification the '135 Patent May Be Contested by Petitioner ............. 1
`B.
`Fee for Inter Partes Review (§ 42.15(a)) ............................................... 3
`C. Mandatory Notices (37 CFR § 42.8(b)) ................................................ 3
`1. Real Party in Interest (§ 42.8(b)(1)) ................................................ 3
`2. Other Proceedings (§ 42.8(b)(2)) .................................................... 3
`3. Designation of Lead and Backup Counsel ...................................... 4
`4. Service Information (§42.8(b)(4)) ................................................... 4
`D.
`Proof of Service (§§ 42.6(e) and 42.105(a)) ......................................... 5
`II.
`Identification of Claims Being Challenged (§ 42.104(b)) ........................... 5
`III. Relevant Information Concerning the Contested Patent .......................... 6
`A.
`Effective Filing Date and Prosecution History of the ’135 patent ........ 6
`B.
`Person of Ordinary Skill in the Art ....................................................... 7
`C.
`Construction of Terms Used in the Claims ........................................... 7
`1. Virtual Private Network (VPN) (Claims 1, 10, 13, 18) .................. 8
`2. Virtual Private Link (Claim 13) .................................................... 11
`3. Domain Name (Claims 1, 10, 13, 18) ........................................... 11
`4. Domain Name Service (Claims 1, 10, 13, 18) .............................. 12
`5. DNS Server (Claims 18, 2 and 8) ................................................. 12
`6. DNS Proxy Server (Claims 10, 8) ................................................. 12
`7. Web Site (Claims 1, 10, 18) .......................................................... 13
`8. Secure Web Site/Target Web Site (Claims 1, 8, 10, 18) .............. 13
`9. Secure Web Computer (Claim 10) ................................................ 14
`10. Target Computer (Claims 1, 10, 18) ............................................. 14
`11. IP Address Hopping Scheme (Claim 6) ........................................ 14
`
`i
`
`
`MANGROVE 1020
`
`

`
`Claims 1-10, 12-15 and 18 Are Anticipated By Aventail (Ex.
`
`Aventail In View of RFC 1035 Renders Claims 4, 5, and 18
`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`IV. Precise Reasons for Relief Requested ........................................................ 15
`A.
`1007) .................................................................................................... 15
`1. Aventail Anticipates Claim 1 ........................................................ 15
`2. Aventail Anticipates Claim 10 ...................................................... 17
`3. Aventail Anticipates Claim 13 ...................................................... 21
`4. Aventail Anticipates Claim 18 ...................................................... 24
`5. Aventail Anticipates Claim 2 ........................................................ 28
`6. Aventail Anticipates Claim 3 ........................................................ 29
`7. Aventail Anticipates Claim 4 and 12 ............................................ 29
`8. Aventail Anticipates Claim 5 ........................................................ 31
`9. Aventail Anticipates Claim 6 ........................................................ 32
`10. Aventail Anticipates Claim 7 ........................................................ 33
`11. Aventail Anticipates Claim 8 ........................................................ 33
`12. Aventail Anticipates Claim 9 ........................................................ 34
`13. Aventail Anticipates Claim 14 and 15 .......................................... 34
`Obvious ............................................................................................... 35
`Obvious ............................................................................................... 37
`1008). ................................................................................................... 40
`1. BinGO Anticipates Claim 1 .......................................................... 40
`2. BinGO Anticipates Claim 10 ........................................................ 43
`3. BinGO Anticipates Claim 13 ........................................................ 45
`4. BinGO Anticipates Claim 18 ........................................................ 48
`5. BinGO Anticipates Claim 2 .......................................................... 51
`6. BinGO Anticipates Claim 3 .......................................................... 52
`7. BinGO Anticipates Claim 4 .......................................................... 52
`8. BinGO Anticipates Claim 5 .......................................................... 53
`
`B.
`C.
`D.
`
`Aventail In View of Reed I Renders Claims 6, 14 and 15
`
`Claims 1-10, 12-15 and 18 Are Anticipated by BinGO (Ex.
`
`ii
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`9. BinGO Anticipates Claim 6 .......................................................... 54
`10. BinGO Anticipates Claim 7 .......................................................... 54
`11. BinGO Anticipates Claim 8 .......................................................... 55
`12. BinGO Anticipates Claim 9 .......................................................... 55
`13. BinGO Anticipates Claim 12 ........................................................ 56
`14. BinGO Anticipates Claim 14 and 15 ............................................ 56
`E.
`BinGO In View of Reed Renders Claims 6, 14 and 15 Obvious ........ 57
`V. CONCLUSION ............................................................................................ 60
`
`
`
`Attachment A. Proof of Service of the Petition
`
`Attachment B. List of Evidence and Exhibits Relied Upon in Petition
`
`
`
`iii
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`I.
`
`COMPLIANCE WITH REQUIREMENTS FOR A PETITION FOR
`INTER PARTES REVIEW
`A. Certification the ‘135 Patent May Be Contested by Petitioner
`Petitioner certifies it is not barred or estopped from requesting inter partes
`
`review of U.S. Patent No. 6,502,135 (the ’135 patent) (Ex. 1001). Neither
`
`Petitioner, nor any party in privity with Petitioner, has filed a civil action
`
`challenging the validity of any claim of the ’135 patent. The ’135 patent has not
`
`been the subject of a prior inter partes review by Petitioner or a privy of Petitioner.
`
`Petitioner also certifies this petition for inter partes review is filed within
`
`one year of the date of service of a complaint alleging infringement of a patent.
`
`Petitioner was served with a complaint alleging infringement of the ’135 patent on
`
`December 31, 2012, which led to Civil Action No. 6:12-cv-00855-LED in the
`
`Eastern District of Texas. Ex. 1050. Because the date of this petition is less than
`
`one year from December 31, 2012, this petition complies with 35 U.S.C. § 315(b).
`
`Petitioner notes it was previously served with a complaint asserting
`
`infringement of the ’135 patent in August of 2010, which led to Civil Action No:
`
`6:10-cv-417. During that action, the District Court established an additional civil
`
`action, Civil Action No. 6:13-cv-00211-LED, on February 26, 2013 (also pending
`
`in the Eastern District of Texas). The August 2010 complaint does not foreclose
`
`the present petition, as Patent Owner served a new complaint on Petitioner
`
`asserting infringement of the ’135 patent in December of 2012.
`
`
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`Petitioner submits this conclusion is compelled by the plain language of
`
`§ 315(b). Notably, § 315(b) does not specify a one-year deadline that runs from
`
`the date of the first complaint served on a petitioner. Rather, it states “[a]n inter
`
`partes review may not be instituted if the petition requesting the proceeding is filed
`
`more than 1 year after the date on which the petitioner, real party in interest, or
`
`privy of the petitioner is served with a complaint alleging infringement of the
`
`patent.” Thus, a petition filed within 1 year of the date any complaint alleging
`
`infringement of the patent is served on a petitioner is timely under the plain
`
`statutory language of § 315(b). This is also the only reading of § 315(b) consistent
`
`with the statutory design. Congress designed the IPR authority to be option to
`
`contest validity of a patent concurrently with district court proceedings involving
`
`the same patent. A timely filed IPR proceeding in any action a patent owner elects
`
`to commence is perfectly consistent with this statutory design.
`
`Reading § 315(b) in this manner also is the only way to effectively foreclose
`
`gaming of the system by a Patent Owner. Indeed, if § 315(b) were read to
`
`foreclose IPR proceedings in a second, independent action for infringement a
`
`patent owner elected to commence, it would unfairly foreclose use of the IPR
`
`system. For example, a patent owner could assert irrelevant claims in a first action,
`
`wait a year, and then assert different claims in a new action that do present risks to
`
`a third party. In this scenario, the patent owner would foreclose legitimate use of
`
`2
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`an IPR to contest validity of the patent claims asserted in the second action based
`
`on the third party’s reasonable business decision to not dispute validity of
`
`irrelevant claims in the first action. Rather than attempting to decipher which
`
`scenarios would be improper, the Board should follow the plain meaning of
`
`§ 315(b), and find a petition timely if it is filed within 1 year of the date any
`
`complaint alleging infringement of the patent is served on a Petitioner.
`
`Finally, reading §315(b) to foreclose this petition based on the August 2010
`
`complaint would be particularly unjust in this case. The 1-year period following
`
`service of the August 2010 complaint expired before it was possible to submit an
`
`IPR petition – petitions could only be filed on or after September 16, 2012.
`
`Fee for Inter Partes Review (§ 42.15(a))
`
`B.
`The Director is authorized to charge the fee specified by 37 CFR § 42.15(a)
`
`to Deposit Account No. 18-1260.
`
`C. Mandatory Notices (37 CFR § 42.8(b))
`1.
`Real Party in Interest (§ 42.8(b)(1))
`The real party of interest of this petition pursuant to § 42.8(b)(1) is Apple
`
`Inc. (“Apple”) located at One Infinite Loop, Cupertino, CA 95014.
`
`2. Other Proceedings (§ 42.8(b)(2))
`The ’135 patent is the subject of a number of civil actions including: (i) Civ.
`
`Act. No. 6:13-cv-00211-LED (E.D. Tex.), filed February 26, 2013; (ii) Civ. Act.
`
`No. 6:12-cv-00855-LED (E.D. Tex.), filed November 6, 2012; (iii) Civ. Act. No.
`
`3
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`6:10-cv-00417-LED (E.D. Tex.), filed August 11, 2010 (the “2010 litigation”); (iv)
`
`Civ. Act. No. 6:11-cv-00018-LED (E.D. Tex), (iv) Civ. Act. No. 6:13-cv-00351-
`
`LED (E.D. Tex), filed April 22, 2013; (v) Civ. Act. No. 6:10-cv-00094 (E.D. Tex);
`
`and (vi) Civ. Act. No. 6:07-cv-00080 (E.D. Tex) (items (i) to (iii) name Petitioner).
`
`The ’135 patent is also the subject of merged inter partes reexamination nos.
`
`95/001,679 and 95/001,682. Petitioner is the real party of interest in the ’682
`
`proceeding. In the merged proceedings, the Office recently issued a Non-Final
`
`Action rejecting all 18 claims of the ‘135 patent, including rejections based on Ex.
`
`1007 (Aventail), Ex. 1008 (BinGO), and Ex. 1009 (Beser), as well as on other prior
`
`art references. Petitioner recognizes it may be appropriate for the Panel to merge,
`
`join or take other steps to manage these concurrent proceedings. The ‘135 patent
`
`also was the subject of reexamination no. 95/001,269, which is concluded.
`
`Finally, the ’135 patent is the subject of IPR petition No. IPR2013-00348,
`
`being filed concurrently with the present Petition.
`
`3.
`
`Designation of Lead and Backup Counsel
`
`Lead Counsel
`Jeffrey P. Kushan
`Reg. No. 43,401
`jkushan@sidley.com
`(202) 736-8914
`4.
`
`Service Information (§42.8(b)(4))
`
`Backup Lead Counsel
`Joseph A. Micallef
`Reg. No. 39,772
`jmicallef@sidley.com
`(202) 736-8492
`
`4
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`Service on Petitioner may be made by mail or hand delivery to: Sidley
`
`Austin LLP, 1501 K Street, N.W., Washington, D.C. 20005. The fax number for
`
`lead and backup counsel is (202) 736-8711.
`
`D.
`Proof of Service (§§ 42.6(e) and 42.105(a))
`Proof of service of this petition is provided in Attachment A.
`
`II.
`
`Identification of Claims Being Challenged (§ 42.104(b))
`Claims 1-10, 12-15, and 18 of the ’135 patent are unpatentable as being
`
`anticipated under 35 U.S.C. § 102(a) & (e), and/or for being obvious over the prior
`
`art under 35 U.S.C. § 103. Specifically:
`
`(i)
`
`Claims 1-10, 12-15, and 18 are anticipated under § 102(b) by Aventail
`Connect v 3.01/2.5 Administrator’s Guide (“Aventail”) (Ex. 1007);
`
`(ii) Claims 4, 5 and 18 are obvious under § 103 based on Aventail (Ex.
`1007) in view of RFC 1035 (Ex. 1017);
`
`(iii) Claims 6, 14 and 15 are obvious under § 103 based on Aventail (Ex.
`1007) in view of Reed (Ex. 1014);
`
`(iv) Claims 1-10, 12-15, and 18 are anticipated under § 102(a) by BinGO!
`User’s Guide, incorporating by reference BinGO! Extended Feature
`Reference (collectively, “BinGO”) (Ex. 1008); and
`
`(v) Claims 6, 14 and 15 are obvious under § 103 based on BinGO! in
`view of Reed (Ex. 1014).
`
`Petitioner’s proposed construction of the contested claims, the evidence relied
`
`upon, and the precise reasons why the claims are unpatentable are provided in
`
`§ IV, below. The evidence relied upon in this petition is listed in Attachment B.
`
`5
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`III. Relevant Information Concerning the Contested Patent
`A. Effective Filing Date and Prosecution History of the ’135 patent
`The ’135 patent issued from U.S. Application No. 09/504,783, filed
`
`February 15, 2000. The ’783 application is a continuation-in-part of U.S.
`
`Application No. 09/429,653, filed on October 29, 1999. The ’783 and ’653
`
`applications each claim priority to Provisional Application Nos. 60/106,261, filed
`
`October 30, 1998 and 60/137,704, filed June 7, 1998.
`
`Claims 1, 10, 13 and 18 are the independent claims. Claims 1, 10 and 18
`
`rely on information first presented in the ’783 CIP application. For example, claim
`
`1 specifies “generating from the client computer a Domain Name Service (DNS)
`
`request …” and subsequent steps involving that DNS request, while claim 10
`
`specifies “[a] system … comprising … a DNS proxy server…” Applications filed
`
`prior to the ’783 application do not contain the term “domain name service” much
`
`less describe systems using DNS requests or DNS proxy servers to establish VPNs.
`
`Ex. 1003 at ¶¶ 54-61. Claim 13 likewise relies on information first presented in the
`
`’783 application. For example, it specifies “…receiving from one of the plurality
`
`of client computers a request to establish a connection…” and “…authenticating,
`
`with reference to one of the plurality of authentication tables, that the request
`
`received in step (1) is from an authorized client.” Neither step is described in any
`
`application filed before the ’783 application. Ex. 1003 at ¶¶ 54-61. Accordingly,
`
`6
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`the effective filing date of claims 1-10, 12-15 and 18 is no earlier than February
`
`15, 2000. Ex. 1003 at ¶ 61.
`
`Person of Ordinary Skill in the Art
`
`B.
`A person of ordinary skill in the art in the field of the ’135 patent would
`
`have been someone with a good working knowledge of networking protocols,
`
`including those employing security techniques, as well as computer systems that
`
`support these protocols and techniques. The person also would be very familiar
`
`with Internet standards related to communications and security, and with a variety
`
`of client-server systems and technologies. The person would have gained this
`
`knowledge either through education and training, several years of practical
`
`working experience, or through a combination of these. Ex. 1003 at ¶ 68.
`
`C. Construction of Terms Used in the Claims
`In this proceeding, claims must be given their broadest reasonable
`
`construction in light of the specification. 37 CFR 42.100(b). The broadest
`
`reasonable construction should encompass subject matter Patent Owner contends
`
`infringes the claims, and constructions Patent Owner has advanced in litigation.
`
`Also, if Patent Owner contends terms in the claims should be read to have a special
`
`meaning in this proceeding, those contentions should be disregarded unless Patent
`
`Owner presents amendments to the claims compliant with 35 U.S.C. § 112 that
`
`conform the claim language to such contentions. See 77 Fed .Reg. 48764 at II.B.6
`
`7
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`(August 14, 2012). Cf., In re Youman, 679 F.3d 1335, 1343 (Fed. Cir. 2012).
`
`Petitioner consequently has identified subject matter that falls within the scope of
`
`the claims read in their broadest reasonable construction, which Petitioner submits
`
`is sufficient for the purposes of this proceeding.
`
`Virtual Private Network (VPN) (Claims 1, 10, 13, 18)
`
`1.
`The ’135 patent does not define the term “virtual private network” or
`
`“VPN.” Ex. 1003 at ¶ 194. Two issues are raised by Patent Owner’s contentions
`
`in litigation involving the ’135 patent regarding this term.
`
`First, Patent Owner has contended a VPN requires the network traffic sent
`
`over the VPN to be encrypted. See Ex. 1046 at 3-8 (a VPN is “a network of
`
`computers which privately communicate with each other by encrypting traffic on
`
`insecure communication paths between the computers.”); Ex. 1003 at ¶ 195. The
`
`District Court in the 2010 litigation held a VPN is “a network of computers which
`
`privately and directly communicate with each other by encrypting traffic on
`
`insecure paths between the computers where the communication is both secure
`
`and anonymous.” Ex. 1043 at 8. The broadest reasonable construction of VPN,
`
`however, would not require the network traffic to be encrypted. For example, the
`
`’135 patent states “Data security is usually tackled using some form of data
`
`encryption” (Ex. 1001 at 1:38-39) and refers to a technique that does not use
`
`encryption to protect the anonymity of the VPN. Ex. 1001 at 2:25-36; see also Ex.
`
`8
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`1003 at ¶¶ 193-198. The ’135 patent also shows a particular type of VPN – one
`
`using “TARP” routers – that does use encryption (Ex. 1001 at 2:66-3:29) but
`
`indicates this scheme is not mandatory in the DNS-based VPN schemes it claims.
`
`See, e.g., Ex. 1001 at 38:2-5 (“The VPN is preferably implemented using the IP
`
`address “hopping” features of the basic invention described above…”). The ’135
`
`disclosure also does not show any explicit encryption steps for DNS-related VPN
`
`schemes. See Ex. 1001 at 37:17-40:13. In February of 2000, it was understood a
`
`VPN could be established without encryption; namely, by using “obfuscation” or
`
`hiding techniques to ensure the security and anonymity of the network traffic over
`
`the public network. See Ex. 1003 at ¶¶ 193-198.
`
`Second, Patent Owner disputed in concurrent litigation that the claims
`
`require computers in a VPN to “directly communicate with each other.” See, e.g.,
`
`Ex. 1046 at 1-3. In the August 2010 litigation, the Court found that Patent Owner
`
`had disclaimed from the literal scope of the ’135 claims VPNs that do not involve
`
`“direct communications” between the involved computers. Ex. 1043 at 6; see also
`
`Ex. 1046 at 6-9; Ex. 1048 at 5-7. The Court specifically relied on Patent Owner’s
`
`representations to the Office during the ‘269 reexamination proceeding involving
`
`the ‘135 patent to make this determination – it found that Patent Owner had
`
`asserted the ’135 claims were not anticipated by the Aventail systems because
`
`“computers connected according to Aventail do not communicate directly with
`
`9
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`each other.” The Court also observed that “…routers, firewalls, and similar
`
`servers that participate in typical network communication do not impede ‘direct’
`
`communication between a client and target computer.” Ex. 1043 at 8 (FN2).
`
`The Court thus determined that a portion of the literal scope of the ’135
`
`patent claims has been disclaimed (i.e., that portion covering VPNs in which
`
`computers do not “directly” communicate). The logical consequence of that
`
`determination is that the claims in their broadest reasonable construction still
`
`encompass this disclaimed subject matter. Patent Owner’s prosecution disclaimer
`
`– which is plainly effective in a district court proceeding to limit the claims
`
`because the claims cannot be amended in that proceeding – should not be given
`
`weight in this proceeding under the broadest reasonable construction standard.
`
`See, e.g., M.P.E.P. § 2111; id. at § 2111.01(I)(“Although claims of issued patents
`
`are interpreted in light of the specification, prosecution history, prior art and other
`
`claims, this is not the mode of claim interpretation to be applied during
`
`examination. During examination, the claims must be interpreted as broadly as
`
`their terms reasonably allow”). Instead, in this proceeding, Patent Owner must
`
`amend the claims to exclude subject matter it has disclaimed. The broadest
`
`reasonable construction of “VPN” thus encompasses “a network of computers
`
`which privately communicate – directly or otherwise – with each other on insecure
`
`10
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`paths between the computers where the communication is both secure and
`
`anonymous, where the data transferred may or may not be encrypted.”
`
`This also demonstrates that the literal scope of the claims (disregarding
`
`Patent Owner’s disclaimer) encompass what the Office found to be described in
`
`Aventail (Ex. 1007). Aventail also describes VPNs in which computers
`
`communicate “directly” pursuant to the Court’s construction. See § IV.A.1, below.
`
`2.
`Virtual Private Link (Claim 13)
`The ’135 patent does not define the term “virtual private link.” Patent
`
`Owner has asserted a “virtual private link” is “a communication link that permits
`
`computers to privately communicate with each other by encrypting traffic on
`
`insecure communication paths between the computers.” Ex. 1043 at 8. The Court,
`
`however, found this term means the same thing as a VPN. Ex. 1043 at 8-9 (“the
`
`Court construes ‘virtual private link’ as ‘a virtual private network as previously
`
`defined.’”). Consequently, Petitioner submits the same construction should be
`
`used for “virtual private link” as is used for “virtual private network.”
`
`3.
`Domain Name (Claims 1, 10, 13, 18)
`The ’135 patent does not define the term “domain name.” Patent Owner
`
`has asserted a “domain name” means “a name corresponding to an IP address.”
`
`Ex. 1046 at 14-15. The broadest reasonable construction of this “domain name”
`
`should include Patent Owner’s proposed definition.
`
`11
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`4.
`Domain Name Service (Claims 1, 10, 13, 18)
`The ’135 patent does not define the term “domain name service.” Patent
`
`Owner has asserted a “domain name service” is “a lookup service that returns an IP
`
`address for a requested domain name.” Ex. 1046 at 13-14. A domain name
`
`service performs domain name resolution according to Internet standards, namely,
`
`RFC 1034 (Ex. 1016) and RFC 1035 (Ex. 1017). Ex. 1003 at ¶¶ 116-117. Under
`
`these standards, an IP address will not always be returned – an error also may be
`
`returned. Ex. 1003 at ¶¶ 116-125. The broadest reasonable construction of
`
`“domain name service” thus includes “a lookup service that will return an IP
`
`address or an error code in response to a domain name resolution request.”
`
`5.
`DNS Server (Claims 18, 2 and 8)
`The ‘135 patent does not define the term “DNS Server.” The ’135 patent
`
`indicates that when this term is used, it is being used generally as a “server” that
`
`returns an IP address in response to a request containing a domain name. See Ex.
`
`1003 at ¶210-216. As noted in § 4, a domain name service also may return an
`
`error. The broadest reasonable construction of “DNS server” thus includes “a
`
`computer or computer-based process that will return an IP address or an error code
`
`in response to a domain name resolution request.”
`
`6.
`DNS Proxy Server (Claims 10, 8)
`The ’135 patent does not define the term “DNS proxy server.” It does
`
`discuss features of a “DNS Proxy Server.” For example, it explains a DNS proxy
`
`12
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`server may distribute its functions across multiple computers and processes. See
`
`Ex. 1003 at ¶ 219 (citing to Ex. 1001 at 38:23-53). Patent Owner also has asserted
`
`a “DNS proxy server” is “a computer or program that responds to a domain name
`
`inquiry in place of a DNS.” Ex. 1046 at 16-17. The broadest reasonable
`
`construction of a “DNS Proxy Server” thus includes “one or more computers or
`
`processes that individually or collectively respond to a domain name inquiry in
`
`place of a DNS server.”
`
`7. Web Site (Claims 1, 10, 18)
`The ’135 patent does not define the term “web site.” Patent Owner asserted
`
`a “web site” means “a computer associated with a domain name and that can
`
`communicate in a network.” Ex. 1046 at 21-22. The broadest reasonable
`
`construction of “web site” should include Patent Owner’s construction.
`
`8.
`Secure Web Site/Target Web Site (Claims 1, 8, 10, 18)
`The ’135 patent does not define the terms “secure web site” or “secure
`
`target web site.” Patent Owner has asserted a “secure web site” means “a
`
`computer associated with a domain name and that can communicate in a virtual
`
`private network.” Ex. 1046 at 21-22. Patent Owner proposed a similar definition
`
`for a “secure target web site”; namely, “a target computer associated with a domain
`
`name and that can communicate in a virtual private network.” Ex. 1046 at 21-22.
`
`13
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`The broadest reasonable construction of these terms should include Patent Owner’s
`
`proposed constructions for each term.
`
`Secure Web Computer (Claim 10)
`
`9.
`The ’135 patent does not define the term “secure web computer.” Patent
`
`Owner has asserted that a “secure web computer” means “a computer that requires
`
`authorization for access and that can communicate in a virtual private network.”
`
`Ex. 1046 at 22-24. The broadest reasonable construction of “secure web
`
`computer” should include the Patent Owner’s proposed construction.
`
`10. Target Computer (Claims 1, 10, 18)
`The ’135 patent does not define the term “target computer.” Patent Owner
`
`has asserted this term can mean “a computer with which the client computer seeks
`
`to communicate.” Ex. 1046 at 24-25. The broadest reasonable construction of this
`
`term should include Patent Owner’s proposed construction.
`
`IP Address Hopping Scheme (Claim 6)
`
`11.
`The ’135 patent does not define the term “IP address hopping scheme.” It
`
`does refer to a variety of schemes that route traffic through intermediary network
`
`devices according to a pre-defined scheme as “IP hopping schemes.” See, e.g., Ex.
`
`1001 at 5:30-64, 14:59-16:15. These schemes use a wide variety of routing
`
`concepts and strategies. The broadest reasonable construction of “IP address
`
`hopping scheme” thus encompasses any type of scheme that routes IP traffic from
`
`a client to the destination through intermediary devices.
`
`14
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`IV. Precise Reasons for Relief Requested
`A. Claims 1-10, 12-15 and 18 Are Anticipated By Aventail (Ex. 1007)
`Aventail (Ex. 1007) is a printed publication that was publicly distributed no
`
`later than January 31, 1999. Ex. 1003 at ¶¶ 253-260; Ex. 1005 at ¶¶ 11-36; Ex.
`
`1006 at ¶¶ 11-24. Aventail is prior art to the ’135 patent at least under 35 U.S.C.
`
`§§ 102(a) and (b). A concise summary of the systems and processes described in
`
`Aventail is provided at ¶¶ 300 to 393 of Ex. 1003 and at ¶¶ 37 to 81 of Ex. 1005.
`
`Aventail Anticipates Claim 1
`
`1.
`Aventail describes processes that automatically and transparently establish a
`
`VPN between a client computer and a remote private network in response to a user
`
`specifying a secure destination in a connection request. Ex. 1003 at ¶¶ 302-320.
`
`Aventail therefore shows “[a] method for transparently creating a virtual private
`
`network (VPN) between a client computer and a target computer.” Ex. 1003 at ¶¶
`
`394-396; see generally Ex. 1003 at ¶¶ 170-185.
`
`Aventail explains that the Aventail Connect running on a client computer
`
`will intercept all connection requests – whether they contain a domain name or an
`
`IP address – and evaluate those requests. Ex. 1003 at ¶¶ 307, 313-324, 348-352. If
`
`the request contains a domain name that matched a domain name in a redirection
`
`rule, that would trigger a sequence of steps that would establish a VPN between the
`
`client computer and the secure destination. Ex. 1003 at ¶¶ 302-320, 324, 329-357.
`
`Aventail thus discloses the step of “generating from the client computer a Domain
`
`15
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`Name Service (DNS) request that requests an IP address corresponding to a
`
`domain name associated with the target computer.”
`
`Aventail explains redirection rules are used to identify connection requests
`
`made on a client computer containing a domain name or IP address requiring
`
`secure communications. Ex. 1003 at ¶¶ 306-307, 324-326, 335-352. Redirection
`
`rules contain domain names or IP addresses associated with destinations requiring
`
`secure communications. Ex. 1003 at ¶¶ 324-326, 344-352. A client computer
`
`running Aventail Connect could either evaluate connection requests locally, or
`
`could proxy all connection requests to a proxy server (the Aventail Extranet Server
`
`or “AES”) for handling. Ex. 1003 at ¶¶ 305-307, 317-326, 344-352. Aventail thus
`
`describes a process including a step of “of “determining whether the DNS request
`
`transmitted in step (1) is requesting access to a secure web site.” See generally Ex.
`
`1003 at ¶¶ 102-115.
`
`Aventail shows that if a domain name or IP address in a DNS request
`
`matched a redirection rule, the request would flagged for special handling by by
`
`the Aventail Connect client by inserting a false entry (“HOSTENT”) in the
`
`request.. Ex. 1003 at ¶¶ 317-318, 342, 350-352. Then, after the name resolution
`
`step, the request would be evaluated – if it contained the false entry or an IP
`
`address matching a redirection rule, the client would know the request would have
`
`to be sent (“proxied”) to the proxy server (AES) specified in the redirection rule
`
`16
`
`MANGROVE 1020
`
`

`
`Petition for Inter Partes Review of U.S. Patent No. 6,502,135
`
`for that domain name or IP address. Ex. 1003 at ¶¶ 352

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket