throbber

`
`
`
`
`
`
`
`
`Paper No.
`Filed: December 20, 2019
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD. and APPLE INC.,
`Petitioner
`v.
`VIRNETX INC.,
`Patent Owner
`
`
`
`Case IPR2015-010461
`Patent 6,502,135
`
`
`
`
`
`Patent Owner’s Opposition Brief
`
`
`
`
`
`
`1 Apple Inc., who filed a petition in IPR2016-00062, has been joined as a Petitioner
`in the instant proceeding.
`
`

`

`
`
`Case No. IPR2015-01046
`
`C.
`
`TABLE OF CONTENTS
`Introduction ...................................................................................................... 1
`The Federal Circuit’s Decision ........................................................................ 1
` Claim Construction .......................................................................................... 2
`A.
`The Phillips Claim Construction Standard Applies on Remand .......... 2
`B.
`“Client Computer” ................................................................................. 3
`C.
`“Virtual Private Network (VPN)” .......................................................12
` Kiuchi Does Not Anticipate Claims 1, 3, 4, 7, 8, 10, and 12 ........................13
`A. Kiuchi Discloses Relay-Based Communications ................................14
`B.
`Petitioners’ “User Agent to Origin Server” Mapping Is
`Deficient ..............................................................................................15
`Petitioners’ “Client-Side Proxy to Server-Side Proxy” Mapping
`Is Deficient ..........................................................................................21
`1.
`Petitioners’ “Client-Side Proxy to Server-Side Proxy”
`Mapping Fails Under VirnetX’s Construction for “Client
`Computer” .................................................................................22
`Petitioners’ “Client-Side Proxy to Server-Side Proxy”
`Mapping Fails Under Petitioners’ Construction for
`“Client Computer” ....................................................................25
`The Board Should Not Rely on Dr. Guerin’s Testimony ..............................28
` The Board Should Draw an Adverse Inference Regarding the RPI or
`Privity Relationship Between Mangrove and RPX, and Terminate the
`Proceeding .....................................................................................................29
` A New Panel Should Consider this Remand Proceeding To Avoid
`Constitutional Concerns ................................................................................31
` The Proceedings Should Be Terminated in View of 35 U.S.C.
`§ 315(b) ..........................................................................................................32
`
`2.
`
`i
`
`
`
`
`
`
`
`
`
`
`
`

`

` Conclusion .....................................................................................................33
`
`Case No. IPR2015-01046
`
`ii
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`Case No. IPR2015-01046
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Alexander v. FBI,
`186 F.R.D. 113 (D.D.C. 1998) ........................................................................... 29
`Applications in Internet Time, LLC v. RPX Corp.,
`897 F.3d 1336 (Fed. Cir. 2018) .......................................................................... 31
`Arthrex, Inc. v. Smith & Nephew, Inc.,
`941 F.3d 1320 (Fed. Cir. 2019) .................................................................... 31, 32
`In re CSB-Sys. Int’l, Inc.,
`832 F.3d 1335 (Fed. Cir. 2016) ............................................................................ 3
`Google Inc. v. Intellectual Ventures II LLC,
`IPR2014-00787, Paper 68 (P.T.A.B. Oct. 18, 2018) ............................................ 3
`Nat. Alternatives Int’l, Inc. v. Iancu,
`904 F.3d 1375 (Fed. Cir. 2018) ............................................................................ 2
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ........................................................ 3, 4
`Sipnet EU S.R.O. v. Straight Path IP Grp., Inc.,
`IPR2013-00246, Paper 73 (P.T.A.B. May 23, 2016) ........................................... 3
`U.S. v. $671,160.00 in U.S. Currency,
`730 F.3d 1051 (9th Cir. 2013) ............................................................................ 30
`VirnetX Inc. v. Cisco Systems Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) ...................................................................passim
`VirnetX Inc. v. Mangrove Partners Master Fund, Ltd.,
`778 F. App’x 897 (Fed. Cir. 2019) ..............................................................passim
`Statutes
`35 U.S.C. § 315(b) ......................................................................................... 2, 31, 32
`35 U.S.C. § 315(c) ..................................................................................................... 2
`iii
`
`
`
`

`

`
`
`
`
`
`
`Case No. IPR2015-01046
`
`Introduction
`Patent Owner VirnetX Inc. (“VirnetX”) respectfully submits that Petitioners
`
`have failed to meet their burden to show that the challenged claims of U.S. Patent
`
`No. 6,502,135 (“the ’135 patent”) are unpatentable. Petitioners’ arguments are
`
`foreclosed by the Federal Circuit’s decision in VirnetX Inc. v. Mangrove Partners
`
`Master Fund, Ltd., 778 F. App’x 897 (Fed. Cir. 2019), and the record evidence in
`
`this proceeding. In fact, the Federal Circuit rejected identical arguments—
`
`addressing the same patent and prior art—in VirnetX Inc. v. Cisco Systems Inc., 767
`
`F.3d 1308, 1323-24 (Fed. Cir. 2014).
`
` The Federal Circuit’s Decision
`The Federal Circuit vacated the Board’s claim constructions, imposed its own
`
`construction of the term “VPN,” and directed the Board to construe the term “client
`
`computer.” VirnetX, 778 F. App’x at 991. Invoking VirnetX’s disclaimer, it held
`
`that the phrase “‘VPN between the client computer and the target computer’ requires
`
`direct communication between the client and target computers.” Id. at 909-10
`
`(emphasis added). The Federal Circuit also “agree[d] with VirnetX that the Board
`
`. .. fail[ed] to resolve the claim construction dispute as to the meaning of ‘client
`
`[computer].’” The Board had “latch[ed] onto . . . out-of-context language” in finding
`
`that Kiuchi’s client-side proxy could be the claimed “client computer,” just because
`
`it was “associated with a user, however indirectly.” Id. at 908, 909.
`
` 1
`
`
`
`
`
`

`

`
`
`Case No. IPR2015-01046
`
`Because those errors were dispositive of the Board’s anticipation and
`
`obviousness findings, the Federal Circuit vacated those findings and remanded to
`
`the Board. Id. at 910-11.
`
`VirnetX also argued that Apple Inc.’s (“Apple’s”) joinder to these
`
`proceedings violates 35 U.S.C. § 315(b)-(c). The Court declined to address that
`
`argument, finding VirnetX had not shown prejudice from Apple’s joinder, but “le[ft]
`
`open the question of whether prejudice could arise” on remand. VirnetX, 778 F.
`
`App’x at 901-02. The Federal Circuit also held that the Board erred in denying
`
`VirnetX leave to file a motion seeking additional discovery into the relationship
`
`between Mangrove Partners Master Fund, Ltd. (“Mangrove”) and RPX Corporation
`
`(“RPX”). Id. at 904.
`
` Claim Construction
`A. The Phillips Claim Construction Standard Applies on Remand
`Because the ’135 patent expired on October 29, 2019,2 the Board should apply
`
`
`2 Petitioners incorrectly state that the ’135 patent expires in February 2020. See
`
`Petitioners’ Remand Brief, Paper 95 (“PRB”) at 8 n.5. The correct expiration date
`
`is October 29, 2019 because the ’135 patent is a continuation-in-part of an
`
`application filed on October 29, 1999 and has no patent term adjustment. See Nat.
`
`Alternatives Int’l, Inc. v. Iancu, 904 F.3d 1375, 1383 (Fed. Cir. 2018); see also
`
`
`
`
`2
`
`

`

`
`the standard set forth in Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en
`
`Case No. IPR2015-01046
`
`banc), when construing the patent claims at issue on remand. See, e.g., In re CSB-
`
`Sys. Int’l, Inc., 832 F.3d 1335, 1342 (Fed. Cir. 2016) (“once a patent expires, the
`
`PTO should apply the Phillips standard for claim construction”); Sipnet EU S.R.O.
`
`v. Straight Path IP Grp., Inc., IPR2013-00246, Paper 73 at 5 (P.T.A.B. May 23,
`
`2016) (construing, on remand, “expired patent claims according to the standard
`
`applied by the district courts,” and “apply[ing] the principles set forth in Phillips”)
`
`(citing In re Rambus, 694 F.3d 42, 46 (Fed. Cir. 2012)); Google Inc. v. Intellectual
`
`Ventures II LLC, IPR2014-00787, Paper 68 at 3 (P.T.A.B. Oct. 18, 2018) (same).
`
`“Client Computer”
`B.
`Under either Phillips or BRI, the correct construction of “client computer” is
`
`a “user’s computer.” (PO Response at 15-17.) The claims recite “initiating the VPN
`
`between the client computer and the target computer.” (See, e.g., Ex. 1001 at claim
`
`1.) One of ordinary skill in the art would read “client computer” in the claims in
`
`view of the specification—the “single best guide to the meaning of a disputed term,”
`
`
`MPEP § 2701 (“A patent granted on a continuation, divisional, or continuation-in-
`
`part application that was filed on or after June 8, 1995, will have a term which ends
`
`twenty years from the filing date of earliest application for which a benefit is claimed
`
`… .”) (emphasis added).
`
`
`
`
`3
`
`

`

`
`Phillips, 415 F.3d at 1315. (Ex. 2043 at ¶ 28.) The specification explains that the
`
`Case No. IPR2015-01046
`
`claimed inventions allow for secure communications between a user’s computer and
`
`a target computer. (See, e.g., Ex. 2043 at ¶ 29.) Thus, the “Background of the
`
`Invention” describes the importance of securing communications between an
`
`originating terminal 100 where a user is located and a destination terminal 110 that
`
`hosts a web site. (Ex. 1001 at 1:15-31.) The “Summary of the Invention” offers an
`
`example where the originating terminal is a laptop computer used by an executive
`
`and that a destination terminal is a server. (See id. at 4:59-5:12.) The “Detailed
`
`Description of the Invention” explains that a VPN is created between a user’s
`
`computer running a web browser and a secure target site. (See id. at 38:13-33.)
`
`The embodiments consistently show that a VPN is established “between [a]
`
`user computer” and a “secure target site.” (See, e.g., Ex. 1001 at 38:30-33; Ex. 1001
`
`at 39:23-25 (“secure VPN is established between the user’s computer and the secure
`
`target”); Ex. 2043 at ¶¶ 27-28.) In these embodiments, the “user computer,” which
`
`communicates via VPN with the “target computer,” is the claimed “client
`
`computer.” The specification also explains that it is the “user’s computer” that
`
`performs “client” functions. It explains that the “user’s computer 2501 includes a
`
`client application.” (Ex. 1001 at 37:30-32; see also id. at 38:15-16 (“[a] user’s
`
`computer 2601 includes a conventional client (e.g., a web browser)”).) It discloses
`
`an embodiment that checks whether “client 3103 is a validly registered user” (id. at
`
`
`
`
`4
`
`

`

`
`45:8-9), and another where “client computer 801” is shown as a user’s computer,
`
`Case No. IPR2015-01046
`
`namely a laptop device (id. at 16:16-17; Fig. 8). In every example, the computer at
`
`the other end of the VPN link from the “target”—the claimed “client computer”—is
`
`the computer being operated by the user.
`
`The specification also expressly distinguishes the “client computer” from
`
`proxies like Kiuchi’s client-side proxy. It explains that a “proxy” is something that
`
`is “interposed between client and destination.” (Ex. 1001 at 1:49-53 (emphasis
`
`added); see id. at 1:54-55 (distinguishing “proxy” from “originating client”).)
`
`As VirnetX’s expert observed, dictionary definitions confirm that the ordinary
`
`meaning of “client computer” is consistent with the ’135 patent’s description of the
`
`same as a “user’s computer.” (Ex. 2043 at ¶¶ 30-31.) The dictionary defines “client
`
`machine” as “[a] user’s workstation that is attached to a network.” (Ex. 2028 at 3.)
`
`The definitions for the other client-related terms also unanimously require a user, by
`
`identifying a “client” as a “workstation,” “personal computer,” “user’s machine,” or
`
`“user’s PC”:
`
`Term
`
`Client
`
`Dictionary
`
`A workstation or personal computer in a client/server
`
`environment
`
`Client application
`
`An application running in a workstation or personal
`
`computer on a network
`
`5
`
`
`
`
`

`

`
`
`Case No. IPR2015-01046
`
`Client based
`
`Refers to hardware or software that runs in the user’s
`
`machine (client)
`
`Client program
`
`Software that runs in the user’s PC or workstation
`
`Client/server
`
`An architecture in which the user’s PC (the client) is the
`
`requesting machine and the server is the supplying
`
`machine[.]
`
`(Id.; see also PO Response at 17.) Each of those definitions demonstrates that the
`
`“client computer,” as used in the ’135 patent, is a “user’s computer.”3
`
`By contrast, Petitioners’ proposed definition of “client computer” as a
`
`“computer from which a data request to a server is generated,” Pet. at 16; PRB at 6,
`
`
`3 Petitioners’ assertion that “[n]umerous dictionaries … including ones cited by
`
`VirnetX” confirm its position is simply not correct. (PRB at 7 n.4 (citing Exs. 2028,
`
`1014, 1037, 1043).) Exhibit 2028 is discussed above and repeatedly equates a client
`
`computer with a user’s computer. Exhibit 1014 is an RFC, not a dictionary. In any
`
`event, while Exhibit 1014 defines “client” as “[a]n application program that
`
`establishes connections for the purpose of sending requests,” it also defines a “user
`
`agent” as “[t]he client which initiates a request,” Ex. 1014 at 5 (emphasis added)—
`
`a definition that supports VirnetX’s construction. Exhibits 1037 and 1043 discuss
`
`“client” in a similar manner.
`
`
`
`
`6
`
`

`

`
`finds no support in the text of the claims or the specification. Petitioners incorrectly
`
`Case No. IPR2015-01046
`
`characterize expert testimony when they contend that their expert testified that a
`
`skilled artisan “would have understood a ‘client computer’ to refer to the
`
`conventional client component of a client/server architecture,” and that “[b]oth
`
`experts agreed that a skilled person would have understood a conventional ‘client’
`
`to be any application that generates a request for data from a server.” (PRB at 7
`
`(citing Ex. 1003 ¶ 19; Ex. 1036 at 97:8-15, 101:1-10).) Neither expert said anything
`
`of the kind. In the passage Petitioners invoke, their expert, Dr. Guerin, only
`
`described the process by which Kiuchi’s “client-side proxy establishes a closed
`
`virtual network over the Internet with a server-side proxy, through which a user
`
`agent associated with the client-side proxy may request information stored on an
`
`origin server associated with the server-side proxy.” (Ex. 1003 ¶ 19.) Dr. Guerin
`
`said nothing about how a skilled artisan would have understood the term “client
`
`computer”; if anything, his reference to “a user agent” being the one to “request
`
`information stored on an origin server,” id., supports VirnetX’s proposed
`
`understanding of a “user computer” being the claimed “client computer.”
`
`Nor did VirnetX’s expert, Dr. Monrose, “agree[]” that a “client” would denote
`
`“any application that generates a request for data from a server.” (PRB at 7.) Dr.
`
`Monrose mentioned that the term “client computer” should be viewed “in the context
`
`of a client/server relationship” (Ex. 1036 at 97:8-15), but emphasized that, in light
`
`
`
`
`7
`
`

`

`
`of the ’135 patent and the specification’s “repeated references and connections
`
`Case No. IPR2015-01046
`
`between the user’s computer and the client computer,” a skilled artisan would
`
`“view[] the client computer as the user’s computer” (Ex. 1036 at 97:1-6). And Dr.
`
`Monrose explained that he provided no opinion on Petitioners’ proposed
`
`construction (Ex. 1036 at 101:1-10), although he observed that it does not reflect the
`
`specification’s “repeated references and connections between the user’s computer
`
`and the client computer” (Ex. 1036 at 97:1-7).
`
`More importantly, Petitioners’ proposed construction would effectively mean
`
`that any device that sends a data request to a server is a “client computer.”
`
`Paradoxically, that could even include the server itself, which can generally request
`
`data from another server. Such an illogical construction—one that does violence to
`
`the claim language and the specification—cannot be correct.
`
`Petitioners attempt to anchor their proposed construction in the specification,
`
`PRB at 8-9, but profoundly misread it. They invoke the statement that “[a] user’s
`
`computer 2601 includes a conventional client (e.g., a web browser) 2605.” (Ex.
`
`1001 at 38:14-15, quoted in PRB at 8.) That example, however, shows that the
`
`“client computer” is a “user’s computer,” running applications like web browsers
`
`that would run on a computer being operated by a user, and not on a proxy. It thus
`
`
`
`
`8
`
`

`

`
`supports VirnetX’s construction, not Petitioners’.4
`
`Case No. IPR2015-01046
`
`Petitioners also rely on the specification’s statement that “[t]he user’s security
`
`level can also be determined by transmitting a request message back to the user’s
`
`computer.” (Ex. 1001 at 39:17-20, quoted in PRB at 8.) Again, this reference
`
`reinforces VirnetX’s proposed construction. The security level sent back to the
`
`“user’s computer” is for a user, and the computer that receives that message is the
`
`computer employed by the user to request information from the secure target site
`
`(e.g., item 2601 depicted in Figure 26). These features are entirely consistent with
`
`those relating to the claimed “client computer” (defined as a “user’s computer”) in
`
`the context of the claims.
`
`Similarly, the specification’s reference to “a secure VPN [that] is established
`
`between the user’s computer and the secure target site … by allocating a hopping
`
`regime that will be carried out between the user’s computer and the secure target
`
`site,” Ex. 1001 at 39:22-29, quoted in PRB at 8-9, is entirely consistent with the
`
`features relating to the claimed “client computer” in the context of the claims. Here,
`
`
`4 As explained below, infra at Section IV.C, this construction is irreconcilable with
`
`Petitioners’ argument that Kiuchi’s client-side proxy is the claimed “client
`
`computer.” It is undisputed that Kiuchi’s client-side proxy does not contain any such
`
`user-facing software, such as a browser.
`
`
`
`
`9
`
`

`

`
`the specification describes establishment of a VPN between the user’s computer and
`
`Case No. IPR2015-01046
`
`the secure target site, but does not distinguish a “client computer” from a “user’s
`
`computer.” On the contrary, they are described synonymously.
`
`Another portion of the specification Petitioners invoke (Ex. 1001 at 44:40-45,
`
`cited in PRB at 9) describes a “Signaling Synchronizer” embodiment where a large
`
`number of users communicate with a central node. The description of a user’s
`
`computer in that portion is again consistent with that of a “client computer” as a
`
`computer used by a user to access a web site. (See Ex. 1001 at 44:15-30.) Nothing
`
`in this portion of the specification draws a distinction between a user’s computer and
`
`a client computer; instead, the two terms are entirely consistent with each other.
`
`Petitioners also argue that their construction is supported by embodiments
`
`“where a VPN is initiated by a ‘client’ that is not running on a computer portrayed
`
`as being operated by a user.” (PRB at 9.) None of the embodiments Petitioners
`
`invoke support their proposed construction. As already explained, the first portion
`
`of the specification Petitioners cite (Ex. 1001 at 38:14-15) simply explains that the
`
`“conventional client” can include software, such as a web browser. The second
`
`portion (Ex. 1001 at 38:38-44) is entirely inapposite; it refers to a secure
`
`administrative VPN between the DNS proxy 2610 and the user computer 2601 of
`
`the resolved address. But this is not the VPN recited in the claims, which is
`
`established between the client computer and the target computer. Moreover,
`
`
`
`
`10
`
`

`

`
`Petitioners’ argument ignores the Federal Circuit’s construction of the claimed VPN
`
`Case No. IPR2015-01046
`
`as requiring direct communications between the client and the target computers. See
`
`VirnetX, 778 F. App’x at 909-10.
`
`The remaining portions of the specification cited by Petitioners (see PRB at 9)
`
`are equally inapposite. The first portion (Ex. 1001 at 31:57-64) simply describes
`
`Figure 20; it lends no support to Petitioners’ claim that “a VPN is established
`
`between two computers described simply as a ‘first and second computer’ and not
`
`showing any user involvement” (PRB at 9). This portion of the specification
`
`describes routers and an ISP, and does not speak to the establishment of a VPN as
`
`recited in the claims (and as construed by the Federal Circuit). Petitioners’ reference
`
`to the next portion of the specification (Ex. 1001 at 36:26-28) is equally unavailing.
`
`This portion refers to Figure 24, and describes use of routers to assist in
`
`communications between computers 2401 and 2402. Nothing in this disclosure
`
`describes the claimed VPN.
`
`VirnetX’s proposed construction is further reinforced by relevant extrinsic
`
`evidence from the proceedings in the parallel district-court litigation. There,
`
`Petitioner Apple’s own expert acknowledged that Kiuchi’s user agent—i.e., the web
`
`browser operated by the user, not the client-side proxy—“would be read naturally as
`
`a client computer.” Ex. 2048 at 50:7-24; VirnetX, 767 F.3d at 1324.
`
`For these reasons, whether under Phillips or BRI, the claimed term “client
`
`
`
`
`11
`
`

`

`
`computer” is a “user’s computer.
`
`Case No. IPR2015-01046
`
`“Virtual Private Network (VPN)”
`C.
`The Federal Circuit gave effect to VirnetX’s disclaimer, which in its view
`
`“clearly and unmistakably state[d] that a ‘VPN between the client computer and the
`
`target computer’ requires direct communication between the client and target
`
`computers.” VirnetX, 778 F. App’x at 910. The Federal Circuit thus instructed the
`
`Board to assess whether Kiuchi discloses direct communications. Id.
`
`Petitioners argue that the Federal Circuit “did not define” “‘direct’
`
`communication,” and offer—for the first time—a construction of that term. (PRB
`
`at 9-10.) But even if that belated attempt were proper, Petitioners cannot prevail
`
`under any construction permissible in light of the Federal Circuit’s mandate. While
`
`the Court did not precisely define “direct communications,” it explained what is
`
`excluded from “direct communications.” It explained that VirnetX disclaimed a
`
`“system in which a client computer communicates with an intermediate server via a
`
`singular, point-to-point connection,” wherein “[t]hat intermediate server then relays
`
`the data to a target computer on the same private network on which the server
`
`resides.” VirnetX, 778 F. App’x at 910. The mandate rule precludes the Board from
`
`adopting a claim construction that would cover that ceded claim scope. And because
`
`Kiuchi describes exactly the sort of relay-based communications excluded from the
`
`claims, it cannot anticipate. Infra at Section IV.
`
`
`
`
`12
`
`

`

`
`
`Case No. IPR2015-01046
`
` Kiuchi Does Not Anticipate Claims 1, 3, 4, 7, 8, 10, and 125
`“Anticipation requires that ‘every element and limitation of the claimed
`
`invention must be found in a single prior art reference, arranged as in the claim.’”
`
`VirnetX, 778 F. App’x at 907 (quoting Brown v. 3M, 265 F.3d 1349, 1351 (Fed. Cir.
`
`2001)). The claims require establishing “direct communications” between a “client
`
`computer” and a “target.” Kiuchi does not disclose direct communications; its client
`
`computer and target server communicate through “proxies”—exactly the kind of
`
`“relay”-based communications the Federal Circuit found excluded from the claim
`
`scope. In Kiuchi, only the client- and server-side proxies communicate directly, but
`
`those cannot be the claimed “client computer” and “target.”
`
`
`5 Petitioners appear to have abandoned their argument that dependent claim 8 is
`
`separately rendered obvious. That argument fails in any event. Claim 8 depends
`
`from, and includes all the features of, independent claim 1. Petitioners relied on
`
`RFC 1034 in an effort to make up for certain deficiencies of Kiuchi with respect to
`
`claim 8’s additional limitations, but never argued that RFC 1034 makes up for any
`
`of Kiuchi’s deficiencies with respect to the limitations recited in claim 1. (Pet. at
`
`35-37.)
`
`
`
`
`13
`
`

`

`
`
`Case No. IPR2015-01046
`
`A. Kiuchi Discloses Relay-Based Communications
`The Federal Circuit’s mandate makes this an a fortiori case. The Federal
`
`Circuit found that VirnetX’s disclaimer excludes any system where the client
`
`computer communications with an “intermediate server” that “then relays the data”
`
`to the target computer. 778 F. App’x at 910. It also provided a detailed description
`
`of Kiuchi that shows it discloses precisely such “relay”-based communications. The
`
`Court explained that Kiuchi’s “system consists of five relevant elements: a user
`
`agent (also referred to as a client), a client-side proxy, a C-HTTP name server, a
`
`server-side proxy, and an origin server.” Id. at 905. “The user agent and client-side
`
`proxy communicate behind one firewall, and the origin server and server-side proxy
`
`communicate behind another.” Id. “When the user agent requests access to a host,
`
`the client-side proxy asks the C-HTTP name server whether it can communicate with
`
`that host,” which causes “[t]he C-HTTP name server to check[] whether the server-
`
`side proxy associated with that host is registered on the network and is permitted to
`
`accept the connection from the client-side proxy.” Id. “If [the C-HTTP name server]
`
`determines the communication is not permitted, it returns an error code to the client-
`
`side proxy, which then acts as a typical DNS.” Id. On the other hand, “[i]f the
`
`communication is permitted, the C-HTTP name server sends the server-side proxy’s
`
`information to the client-side proxy, which then sends a connection request to the
`
`server-side proxy.” Id. “The server-side proxy similarly communicates with the C-
`
`
`
`
`14
`
`

`

`
`HTTP server to verify the request,” and then, “[o]nce verified, a connection between
`
`Case No. IPR2015-01046
`
`the client-side and server-side proxies is established, and communication occurs
`
`over a secure, encrypted protocol.” Id. “All encryption and decryption occur at the
`
`proxies, and the user agent and origin server receive the relevant decrypted
`
`information from their respective proxies.” Id.
`
`As the Federal Circuit explained, Kiuchi discloses three separate links: the
`
`“user agent and client-side proxy communicate” via one link, and “the origin server
`
`and server-side proxy communicate” via another. 778 F. App’x at 905. Then, there
`
`is a third “secure, encrypted” “connection between the client-side and server-side
`
`proxies.” Id.; see id. (user agent and origin server “receive . . . information” not from
`
`each other, but “from their respective proxies”); see also VirnetX, 767 F.3d at 1325
`
`(“Kiuchi’s client-side and server-side proxies terminate the connection, process
`
`information, and create a new connection”).
`
`Petitioners’ “User Agent to Origin Server” Mapping Is Deficient
`B.
`Petitioners’ first mapping of claim 1—where Kiuchi’s user agent is mapped
`
`to the claimed “client computer” and its origin server is mapped to the claimed
`
`“target computer,” (PRB at 13)—is nothing more than a thinly veiled attempt to
`
`relitigate arguments they already lost at the Federal Circuit. Kiuchi does not disclose
`
`any direct connection between the user agent and origin server, and therefore this
`
`mapping cannot disclose a “VPN between the client computer and the target
`
`
`
`
`15
`
`

`

`
`computer,” as claimed.
`
`Case No. IPR2015-01046
`
`As VirnetX previously demonstrated (PO Response at 31-32), and as the
`
`Federal Circuit explained, see supra at Section IV.A, the proxy servers in Kiuchi
`
`terminate communications and thus preclude the user agent and origin server from
`
`directly communicating with one another. The proxy servers wrap/unwrap
`
`messages, encrypt/decrypt their contents, re-format, and ultimately re-send
`
`messages. (See, e.g., Ex. 1002 at 8 (“[i]n the client-side proxy, the HTML document
`
`is rewritten”), 9 (client-side proxy encrypts and re-formats HTTP/1.0 requests to C-
`
`HTTP format and that the client-side proxy decrypts and re-formats C-HTTP
`
`responses to HTTP/1.0 format); see also id. at 11 (“C-HTTP-based communication
`
`is performed only between two types of C-HTTP proxies and between a C-HTTP
`
`proxy and C-HTTP name server,” whereby these intermediary components “do not
`
`communicate directly with various types of user agents and servers using C-
`
`HTTP.”); Ex. 2043 at ¶ 58.)
`
`Petitioners’ contrary arguments (PRB at 18-24) lack merit. Petitioners fail to
`
`address the Federal Circuit’s understanding of Kiuchi, which shows that it discloses
`
`the non-direct system VirnetX disclaimed. The Federal Circuit explained that
`
`VirnetX’s disclaimer “described a system in which a client computer communicates
`
`with an intermediate server via a singular, point-to-point connection,” whereby
`
`“[t]hat intermediate server then relays the data to a target computer on the same
`
`
`
`
`16
`
`

`

`
`private network on which the server resides.” VirnetX, 778 F. App’x at 910. This
`
`Case No. IPR2015-01046
`
`is precisely the sort of system that Kiuchi describes. The user agent communicates
`
`with the intermediate server-side proxy—indeed, “[f]rom the view of the user agent
`
`… all resources appear to be located in [the] server-side proxy” (Ex. 1002 at 9)—
`
`and the “server-side proxy forwards requests to the origin server,” which is in the
`
`same network as the server-side proxy (id.); see also VirnetX, 767 F.3d at 1325
`
`(“Kiuchi’s client-side and server-side proxies terminate the connection, process
`
`information, and create a new connection—actions that are not ‘direct’ within the
`
`meaning of the asserted claims.”).
`
`Petitioners contend Kiuchi discloses an “encrypted C-HTTP connection …
`
`between the user agent … and the origin server.” (PRB at 16-17.) To the contrary,
`
`the C-HTTP link exists only between the proxies, which “terminate the connection”
`
`and “create a new connection.” 767 F.3d at 1324. Petitioners’ own expert admitted
`
`that “the client-side proxy and the server-side proxy are communicating using C-
`
`HTTP, and you have user agent and origin servers that are only running HTTP/1.0”
`
`(Ex. 2047 at 19:7-18) and that “encrypted communications in the C-HTTP
`
`connection between the proxies . . . doesn’t extend past [the] proxies to the origin
`
`server or the user agent” (id. at 21:3-7).
`
`The Federal Circuit rejected the same argument based on Kiuchi in a prior
`
`case involving Petitioner Apple. VirnetX, 767 F.3d at 1324. There, the Court
`
`
`
`
`17
`
`

`

`
`rejected Apple’s argument that Kiuchi anticipated claim 1 of the ’135 patent, finding
`
`Case No. IPR2015-01046
`
`substantial evidence to support the view that Kiuchi “do[es] not teach ‘direct
`
`communications’” because “Kiuchi’s client-side and server-side proxies terminate
`
`the connection, process information, and create a new connection.” VirnetX, 767
`
`F.3d at 1324.
`
`Petitioners steamroll over the Federal Circuit’s repeated pronouncements on
`
`the meaning of “direct” and what Kiuchi discloses, by arguing that “the user agent
`
`[in Kiuchi] can communicate with the origin server by directly addressing the origin
`
`server.” (PRB at 18.) This is not accurate. While the URL that may be selected in
`
`Kiuchi corresponds to the resource on the origin server, Kiuchi’s C-HTTP name
`
`server does not return the IP address of the URL in the request. Rather, as
`
`Petitioners’ expert admitted, it returns a server-side proxy’s IP address. (See Ex.
`
`2047 at 25:5-13 (explaining that the C-HTTP name server returns the IP address of
`
`the server-side proxy), 93:20-94:10 (same); 95:9-14 (explaining that the URL in the
`
`request in Kiuchi identifies a resource stored at the origin server), 99:21-100:11
`
`(same).) Indeed, in a finding Petitioners did

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket