throbber
Filed on behalf of: VirnetX Inc.
`By:
`
`Joseph E. Palys
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1996
`Facsimile: (202) 551-0496
`E-mail: josephpalys@paulhastings.com
`
`
`
`Naveen Modi
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1990
`Facsimile: (202) 551-0490
`E-mail: naveenmodi@paulhastings.com
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., and
`BLACK SWAMP IP, LLC,
`Petitioner
`
`v.
`
`VIRNETX INC.
`Patent Owner
`
`
`
`
`
`
`
`
`Case IPR2015-010471
`Patent 7,490,151
`
`
`
`
`
`
`
`
`Declaration of Fabian Monrose, Ph.D.
`
`
`
`
`1 Apple Inc. and Black Swamp IP, LLC, who filed petitions in IPR2016-00063 and
`IPR2016-00167, respectively, have been joined as a Petitioner in the instant
`proceeding.
`
`
`
`1
`
`VIRNETX EXHIBIT 2038
`Mangrove v. VirnetX
`Trial IPR2015-01047
`
`Page 1 of 51
`
`

`
`Case No. IPR2015-01047
`
`Table of Contents
`
`I.
`
`II.
`
`Introduction ...................................................................................................... 4
`
`Resources Consulted ........................................................................................ 4
`
`III. Background and Qualifications ....................................................................... 5
`
`IV. Level of Ordinary Skill ..................................................................................10
`
`V.
`
`Claim Terms ..................................................................................................11
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`“DNS Request” (Claims 1, 7, and 13) .................................................11
`
`“Determining” (Claims 1, 7, 13) .........................................................12
`
`“Secure Server” (Claims 1, 2, 6-8, 12-14) ..........................................13
`
`“Client” (Claims 1, 2, 6-8, 12-14) .......................................................14
`
`“Between [A] and [B]” (Claims 1, 2, 6-8, 12-14) ...............................17
`
`Domain Name ......................................................................................17
`
`“Automatically Initiating/Creating an Encrypted/Secure
`Channel” (Claims 1, 6, 7, 12, 13) ........................................................18
`
`VI. Kiuchi.............................................................................................................18
`
`A. Kiuchi’s Disclosure .............................................................................18
`
`B.
`
`Claim 1 ................................................................................................21
`
`1.
`
`2.
`
`3.
`
`Kiuchi Does Not Disclose the Recited DNS Features ..............21
`
`Kiuchi Does Not Disclose “Determining Whether the
`Intercepted DNS Request Corresponds to a Secure
`Server”.......................................................................................23
`
`Kiuchi Does Not Disclose “Automatically Initiating an
`Encrypted Channel Between the Client and the Secure
`Server”.......................................................................................24
`
`2
`
`Page 2 of 51
`
`

`
`Case No. IPR2015-01047
`
`4.
`
`Kiuchi Does Not Disclose a “Domain Name Server
`(DNS) Proxy Module” that Performs the Recited Claim
`Steps “for Each Intercepted DNS Request” ..............................28
`
`C.
`
`Claims 7 and 13 ...................................................................................29
`
`D. Dependent Claims 2, 6, 8, 12, and 14 .................................................30
`
`VII. Kiuchi and RFC 1034 and/or Rescorla ..........................................................32
`
`VIII. Conclusion .....................................................................................................33
`
`
`
`
`
`3
`
`Page 3 of 51
`
`

`
`Case No. IPR2015-01047
`
`I, FABIAN MONROSE, declare as follows:
`
`I.
`
`Introduction
`I have been retained by VirnetX Inc. (“VirnetX”) for this inter partes
`
`1.
`
`review proceeding. I understand that this proceeding involves U.S. Patent No.
`
`7,490,151 (“the ’151 patent”). I understand the ’151 patent is assigned to VirnetX
`
`and that it is part of a family of patents that stems from U.S. provisional
`
`application nos. 60/106,261 (“the ’261 application”), filed on October 30, 1998,
`
`and 60/137,704 (“the ’704 application”), filed on June 7, 1999. I understand that
`
`the ’151 patent is a division of U.S. application no. 09/504,783, filed February 15,
`
`2000 (now U.S. Patent No. 6,502,135), which is a continuation-in-part of U.S.
`
`application no. 09/429,643 filed October 29, 1999 (now U.S. Patent No.
`
`7,010,604), which claims priority to the ’261 and ’704 applications.
`
`II. Resources Consulted
`I have reviewed the ’151 patent, including claims 1-16. I have also
`2.
`
`reviewed the decisions to institute inter partes review (“IPR”) in IPR2015-01047
`
`(Paper No. 11, the “Decision”), in IPR2016-00063 (Paper No. 29, the “00063
`
`Decision”), and in IPR2016-00167 (Paper No. 12 in IPR2016-00167, the “00167
`
`Decision”); and the petitions for IPR filed by The Mangrove Partners Master Fund,
`
`Ltd. in IPR2015-01047 (the “Petition”), by Apple Inc. in IPR2016-00063 (the
`
`4
`
`Page 4 of 51
`
`

`
`Case No. IPR2015-01047
`
`“Apple Petition”), and by Black Swamp IP, LLC in IPR2016-00167 (the “Black
`
`Swamp Petition”).
`
`3.
`
`I understand that in this proceeding the Board instituted review of the
`
`’151 patent on four grounds: (1) anticipation of claims 1, 2, 6-8, and 12-14 over
`
`Kiuchi; (2) obviousness of claims 1, 2, 6-8, and 12-14 over Kiuchi and RFC 1034;
`
`(3) obviousness of claims 1, 2, 6-8, and 12-14 over Kiuchi and Rescorla; and (4)
`
`obviousness of claims 1, 2, 6-8, and 12-14 over Kiuchi, RFC 1034, and Rescorla. I
`
`have reviewed the exhibits and other documentation supporting the Petition that
`
`are relevant to the Decision and the instituted grounds, and any other material that I
`
`reference in this declaration.
`
`III. Background and Qualifications
`I have a great deal of experience and familiarity with computer and
`4.
`
`network security, and have been working in this field since 1993 when I entered
`
`the Ph.D. program at New York University.
`
`5.
`
`I am currently a Professor of Computer Science at the University of
`
`North Carolina at Chapel Hill. I also hold an appointment as the Director of
`
`Computer and Information Security at the Renaissance Computing Institute
`
`(RENCI). RENCI develops and deploys advanced technologies to facilitate
`
`research discoveries and practical innovations. To that end, RENCI partners with
`
`researchers, policy makers, and technology leaders to solve the challenging
`
`5
`
`Page 5 of 51
`
`

`
`Case No. IPR2015-01047
`
`problems that affect North Carolina and our nation as a whole. In my capacity as
`
`Director of Computer and Information Security, I
`
`lead
`
`the design and
`
`implementation of new platforms for enabling access to, and analysis of, large and
`
`sensitive biomedical data sets while ensuring security, privacy, and compliance
`
`with regulatory requirements. At RENCI, we are designing new architectures for
`
`securing access to data (e.g., using virtual private networks and data leakage
`
`prevention technologies) hosted among many different institutions. Additionally, I
`
`serve on RENCI’s Security, Privacy, Ethics, and Regulatory Oversight Committee
`
`(SPOC), which oversees the security and regulatory compliance of technologies,
`
`designed under the newly-formed Data Science Research Program and the Secure
`
`Medical Research Workspace.
`
`6.
`
`I received my B.Sc. in Computer Science from Barry University in
`
`May 1993. I received my MSc. and Ph.D. in Computer Science from the Courant
`
`Institute of Mathematical Sciences at New York University in 1996 and 1999,
`
`respectively. Upon graduating from the Ph.D. program, I joined the Systems
`
`Security Group at Bell Labs, Lucent Technologies. There, my work focused on the
`
`analysis of
`
`Internet Security
`
`technologies
`
`(e.g.,
`
`IPsec and client-side
`
`authentication) and applying
`
`these
`
`technologies
`
`to Lucent’s portfolio of
`
`commercial products. In 2002, I joined the Johns Hopkins University as Assistant
`
`Professor in the Computer Science department. I also served as a founding
`
`6
`
`Page 6 of 51
`
`

`
`Case No. IPR2015-01047
`
`member of the Johns Hopkins University Information Security Institute (JHUISI).
`
`At JHUISI, I served a key role in building a center of excellence in Cyber Security,
`
`leading efforts in research, education, and outreach.
`
`7.
`
`In July of 2008, I joined the Computer Science department at the
`
`University of North Carolina (UNC) Chapel Hill as Associate Professor, and was
`
`promoted to Full Professor four years later. In my current position at UNC Chapel
`
`Hill, I work with a large group of students and research scientists on topics related
`
`to cyber security. My former students now work as engineers at several large
`
`companies, as researchers in labs, or as university professors themselves. Today,
`
`my research focuses on applied areas of computer and communications security,
`
`with a focus on traffic analysis of encrypted communications (e.g., Voice over IP);
`
`Domain Name System (DNS) monitoring for performance and network abuse;
`
`network security architectures for traffic engineering; biometrics and client-to-
`
`client authentication techniques; computer forensics and data provenance; runtime
`
`attacks and defenses for hardening operating system security; and large-scale
`
`empirical analyses of computer security incidents. I also regularly teach courses in
`
`computer and information security.
`
`8.
`
`I have published over 80 papers in prominent computer and
`
`communications security publications. My research has received numerous
`
`awards, including the Best Student Paper Award (IEEE Symposium on Security &
`
`7
`
`Page 7 of 51
`
`

`
`Case No. IPR2015-01047
`
`Privacy, July, 2013), the Outstanding Research in Privacy Enhancing Technologies
`
`Award (July, 2012), the AT&T Best Applied Security Paper Award (NYU-Poly
`
`CSAW, Nov., 2011), and the Best Paper Award (IEEE Symposium on Security &
`
`Privacy, May, 2011), among others. My research has also received corporate
`
`sponsorship, including two Google Faculty Research Awards (2009, 2011) for my
`
`work on network security and computer forensics, as well as an award from
`
`Verisign Inc. (2012) for my work on DNS.
`
`9.
`
`I am the sole inventor or a co-inventor on three issued US patents and
`
`four pending patent applications, nearly all of which relate to network and systems
`
`security. Over the past 12 years, I have been the lead investigator or a
`
`co-investigator on grants totaling nearly nine million US dollars from the National
`
`Science Foundation (NSF), the Department of Homeland Security (DHS), the
`
`Department of Defense (DoD), and industry. In 2014, I was invited to serve on the
`
`Information Science and Technology (ISAT) study group for the Defense
`
`Advanced Research Projects Agency (DARPA). During my
`
`three year
`
`appointment, I will assist DARPA by providing continuing and independent
`
`assessment of the state of advanced information science and technology as it
`
`relates to the U.S. Department of Defense.
`
`10.
`
`I have chaired several international conferences and workshops,
`
`including for example, the USENIX Security Symposium, which is the premier
`
`8
`
`Page 8 of 51
`
`

`
`Case No. IPR2015-01047
`
`systems-security conference for academics and practitioners alike. Additionally, I
`
`have also served as Program Chair for the USENIX Workshop on Hot Topics in
`
`Security, the Program Chair for the USENIX Workshop on Large-scale Exploits &
`
`Emergent Threats, the local arrangements Chair for the Financial Cryptography
`
`and Data Security Conference, the General Chair of the Symposium on Research in
`
`Attacks and Defenses, and the Co-Chair and Chair for the Symposium on Research
`
`in Attacks and Defenses in 2015 and 2016, respectively. As a leader in the field, I
`
`have also served on numerous technical program committees including the
`
`Symposium on Electronic Crime Research (2016), Research in Attacks, Intrusions,
`
`and Defenses Symposium (2012, 2013), USENIX Security Symposium (2013,
`
`2005-2009), Financial Cryptography and Data Security (2011, 2012), Digital
`
`Forensics Research Conference (2011, 2012), ACM Conference on Computer and
`
`Communications Security (2009-2011, 2013), IEEE Symposium on Security and
`
`Privacy (2007, 2008), ISOC Network & Distributed System Security (2006—
`
`2009), International Conference on Distributed Computing Systems (2005, 2009,
`
`2010), and USENIX Workshop on Large-scale Exploits and Emergent Threats
`
`(2010-2012).
`
`11. From 2006 to 2009, I served as an Associate Editor for IEEE
`
`Transactions on Information and Systems Security (the leading technical journal
`
`9
`
`Page 9 of 51
`
`

`
`Case No. IPR2015-01047
`
`on cyber security), and currently serve on the Steering Committee for the USENIX
`
`Security Symposium.
`
`12. My curriculum vitae, which is appended, details my background and
`
`technical qualifications. Although I am being compensated at my standard rate of
`
`$450/hour for my work in this matter, the compensation in no way affects the
`
`statements in this declaration.
`
`IV. Level of Ordinary Skill
`I am familiar with the level of ordinary skill in the art with respect to
`13.
`
`the inventions of the ’151 patent as of what I understand is the patent’s early-2000
`
`priority date. Specifically, based on my review of the technology, the educational
`
`level of active workers in the field, and drawing on my own experience, I
`
`believe a person of ordinary skill in art at that time would have had a master’s
`
`degree in computer science or computer engineering, as well as two years of
`
`experience in computer networking with some accompanying exposure to network
`
`security. My view is consistent with VirnetX’s view that a person of ordinary skill
`
`in the art requires a master’s degree in computer science or computer engineering
`
`and approximately two years of experience in computer networking and computer
`
`security. I have been asked to respond to certain opinions offered by Dr. Roch
`
`Guerin, consider how one of ordinary skill would have understood certain claim
`
`terms, and consider how one of ordinary skill in the art would have understood the
`
`10
`
`Page 10 of 51
`
`

`
`Case No. IPR2015-01047
`
`references mentioned above in relation to the claims of the ’151 patent. My
`
`findings are set forth below.
`
`V. Claim Terms
`I understand that in an inter partes review proceeding, the claims of a
`14.
`
`patent are construed under the broadest reasonable interpretation in light of the
`
`specification. I also understand that the parties have proposed constructions for
`
`certain terms of the ’151 patent. Unless otherwise noted, I have used Patent
`
`Owner’s proposed constructions in my analysis. In my opinion, Patent Owner’s
`
`proposed constructions are consistent with the specification.
`
`A.
`15.
`
`“DNS Request” (Claims 1, 7, and 13)
`
`I understand that the parties and the Board have put forth the following
`
`constructions for purposes of this proceeding:
`
`VirnetX’s and Black
`Swamp’s Proposed
`Construction
`A request for a resource
`corresponding to a
`domain name
`
`
`Mangrove’s and Apple’s
`Proposed Construction
`
`A request for a resource
`corresponding to a
`network address
`
`Decision’s Construction
`
`No construction proposed
`
`16. One of ordinary skill in the art would have understood that a “DNS
`
`request,” in view of the specification, is “a request for a resource corresponding to
`
`a domain name.”
`
`17. The patent specification discloses that a “DNS request” may request an
`
`IP address or other non-IP address resources, such as public keys for encryption.
`
`11
`
`Page 11 of 51
`
`

`
`Case No. IPR2015-01047
`
`(See Ex. 1001 37:21-32, citing Ex. 2027, RFC 2535, D. Eastlake, “Domain Name
`
`System Security Extensions.”) In particular, the RFC cited by the specification
`
`explains that a computer or resolver may make “[a]n explicit request for KEY
`
`RR’s [public key resource records] . . . .” (Ex. 2027 at 17.) The ’151 patent
`
`specification further explains that a DNS request involves the sending of a domain
`
`name. (See Ex. 1001 at 37:33-38, 37:43-47, 37:60-64; see also id. at 37:4-6,
`
`37:14-19.)
`
`B.
`18.
`
`“Determining” (Claims 1, 7, 13)
`
`I understand that the parties and the Board have put forth the following
`
`constructions for purposes of this proceeding:
`
`VirnetX and Black
`Swamp’s Proposed
`Construction
`Plain and ordinary
`meaning
`
`
`
`Decision’s Construction
`
`No construction proposed
`
`Mangrove’s and Apple’s
`Proposed Construction
`
`To come to a decision
`concerning as the result
`of investigation or
`reasoning, or to cause or
`elicit a determination of
`
`19. One of ordinary skill in the art would have understood that
`
`“determining,” in view of the specification, should be given its plain and ordinary
`
`meaning. I understand that Petitioners Mangrove and Apple cite to definition 1.c
`
`(“to come to a decision concerning as the result of investigation or reasoning”) and
`
`definition 6 (“to cause or elicit determination of’”) in Webster’s Third New
`
`International Dictionary (Pet. at 10, 12, 13), but the dictionary itself states that
`
`12
`
`Page 12 of 51
`
`

`
`Case No. IPR2015-01047
`
`definition 6 relates to embryology. (Ex. 1008 at 5 (“6 embryol: to cause or elicit
`
`determination of”).) A dictionary definition relating to embryology is irrelevant to
`
`the ’151 patent.
`
`C.
`20.
`
`“Secure Server” (Claims 1, 2, 6-8, 12-14)
`
`I understand that the parties and the Board have put forth the following
`
`constructions for purposes of this proceeding:
`
`Patent Owner’s Proposed
`Construction
`A server that requires
`authorization for access
`and that can
`communicate in an
`encrypted channel
`
`Decision’s Construction
`
`No construction proposed
`
`Petitioners’ Proposed
`Construction
`A server that
`communicates over a
`transmission path that
`restricts access to data or
`other information on the
`path
`
`
`
`21. One of ordinary skill in the art would have understood that a “secure
`
`server,” in view of the specification, is “a server that requires authorization for
`
`access and that can communicate in an encrypted channel.”
`
`22. The ’151 patent claims and specification support this construction. For
`
`example, claim 1 recites “automatically initiating an encrypted channel between
`
`the client and the secure server.” Since the encrypted channel extends to the secure
`
`server, the secure server can communicate in the encrypted channel. Moreover, the
`
`secure server is described in the “Scenario #1” and “Scenario #2” embodiments in
`
`the specification (and is referred to there as a “target computer”). (Ex. 1001 at
`
`39:10-27.) In these embodiments, a client computer requests access to the secure
`
`13
`
`Page 13 of 51
`
`

`
`Case No. IPR2015-01047
`
`server and, if the client has authorization to access the secure server, a gatekeeper
`
`computer establishes a VPN between the client computer and the secure server.
`
`(Id. at 39:10-19.) But if the client computer does not have authorization to access
`
`the target computer, the DNS proxy returns a “host unknown” message instead.
`
`(Id. at 39:20-27.) Thus, the specification also supports that the claimed “secure
`
`server” is a server that requires authorization for access and that can communicate
`
`in an encrypted channel.
`
`D.
`23.
`
`“Client” (Claims 1, 2, 6-8, 12-14)
`
`I understand that the parties and the Board have put forth the following
`
`constructions for purposes of this proceeding:
`
`Patent Owner’s Proposed
`Construction
`User’s computer
`
`Petitioners’ Proposed
`Construction
`A device, computer,
`system, or program from
`which a data request to a
`server is generated
`
`Decision’s Construction
`
`No construction proposed
`
`
`
`24. One of ordinary skill in the art would have understood that a “client,”
`
`in view of the specification, is a “user’s computer.”
`
`25. The claims of the ’151 patent support this understanding. For
`
`example, independent claims 1 and 13 of the ’151 patent are directed to methods
`
`and systems for “automatically” initiating/creating an encrypted/secure channel
`
`between the client and the secure server. Because the channel initiation/creation is
`
`14
`
`Page 14 of 51
`
`

`
`Case No. IPR2015-01047
`
`between the “client” and the secure server, and is “automatic,” the “client” must be
`
`a “user’s computer.”
`
`26.
`
`In addition, the specification of the ’151 patent explains that a VPN is
`
`initiated between the user’s computer 2601 and the target: “If [the DNS request
`
`from the user’s computer 2601 is requesting access to a secure site and the user is
`
`authorized], DNS proxy 2610 transmits a message to gatekeeper 2603 requesting
`
`that a virtual private network be created between user computer 2601 and secure
`
`target site 2604.” (See, e.g., Ex. 1001 at 37:66-38:2, emphasis added.) This
`
`parallels the claim language, which recites initiating/creating the encrypted/secure
`
`channel between a client and a secure server. The ’151 patent also explains that
`
`“[a] user’s computer 2501 includes a client application.” (See id. at 37:1-3; see
`
`also id. at 37:51-52 (“A user’s computer 2601 includes a conventional client (e.g.,
`
`a web browser) . . . .”).) Thus, the ’151 patent equates the user’s computer 2601
`
`with the “client” in the claims. Similarly, in other embodiments, the ’151 patent
`
`discloses that a determination is made as to whether “client 3103 is a validly
`
`registered user” (id. at 44:43-44), and “client computer 801” is depicted as a user’s
`
`computer, namely a laptop device (id. at 15:61-62; Fig. 8).
`
`27. The ordinary meaning is further confirmed by a dictionary, which
`
`defines “client machine” as “[a] user’s workstation that is attached to a network.”
`
`(Ex. 2028 at 3.) The relevant definitions for the other client-related terms also
`
`15
`
`Page 15 of 51
`
`

`
`unanimously require a user, either expressly or implicitly, by identifying a “client”
`
`as a “workstation,” “personal computer,” “user’s machine,” or “user’s PC” in those
`
`Case No. IPR2015-01047
`
`definitions:
`
`Term
`
`Client
`
`Dictionary
`
`A workstation or personal computer in a
`
`client/server environment
`
`Client application
`
`An application running in a workstation
`
`or personal computer on a network
`
`Client based
`
`Refers to hardware or software that runs
`
`in the user’s machine (client)
`
`Client program
`
`Software that runs in the user’s PC or
`
`workstation
`
`Client/server
`
`An architecture in which the user’s PC
`
`(the client) is the requesting machine
`
`and
`
`the
`
`server
`
`is
`
`the
`
`supplying
`
`machine[.]
`
`
`
`28. According to the same dictionary, “workstation” “is just a generic term
`
`for a user’s computer.” (Id. at 9.) Likewise, “personal computer” or “PC” is “a
`
`computer that serves one user in the office or home.” (Id. at 5.) Accordingly, each
`
`16
`
`Page 16 of 51
`
`

`
`Case No. IPR2015-01047
`
`of the client-related definitions incorporates the view that a client is a user’s
`
`computer.
`
`E.
`29.
`
`“Between [A] and [B]” (Claims 1, 2, 6-8, 12-14)
`
`I understand that the parties and the Board have put forth the following
`
`constructions for purposes of this proceeding:
`
`Patent Owner’s Proposed
`Construction
`Extending from [A] to
`[B]
`
`
`Petitioners’ Proposed
`Construction
`In the space that separates No construction proposed
`
`Decision’s Construction
`
`30. One of ordinary skill in the art would have understood that “between
`
`[A] and [B],” in view of the specification, means “extending from [A] to [B].” For
`
`example, claim 1 recites “automatically initiating an encrypted channel between
`
`the client and the secure server.” (Ex. 1001 at 46:66-67 (emphasis added).) The
`
`specification explains that the claimed data security extends from an originating
`
`terminal to a destination terminal. (See, e.g., id. at 1:30-46.)
`
`F. Domain Name
`31. To the extent “domain name” is a separate claim term, one of ordinary
`
`skill in the art would have understood that a “domain name,” in view of the
`
`specification, to be “a name corresponding to a network address.” This
`
`understanding is consistent with the specification, which explains that Internet
`
`Protocol or “IP” is but one type of network. (See, e.g., Ex. 1001 at 4:11, 5:5-6,
`
`9:13-14, 14:23-29, 19:20-22; see also id. at 14:27-31, 19:20-22.)
`
`17
`
`Page 17 of 51
`
`

`
`Case No. IPR2015-01047
`
`G.
`
`“Automatically Initiating/Creating an Encrypted/Secure
`Channel” (Claims 1, 6, 7, 12, 13)
`
`32. One of ordinary skill in the art would have understood that
`
`“automatically initiating/creating an encrypted/secure channel,” in view of the
`
`specification,
`
`is “initiating/creating
`
`the encrypted/secure channel without
`
`involvement of a user.” This understanding is supported by the ’151 patent
`
`specification, which describes various embodiments for “automatically set[ting]
`
`up” a virtual private network between the target node and the user. (See, e.g. Ex.
`
`1001 at 37:33-39:46; see also id. at 37:60-38:2, 38:59-66.)
`
`VI. Kiuchi
`A. Kiuchi’s Disclosure
`33. Kiuchi explains that “[i]n the medical community, there is a strong
`
`need for closed networks among hospitals and related institutions . . . .” (Ex. 1002
`
`at 7, § 1.) When an end user at a client in one hospital requests patient information
`
`located at an origin server of another hospital, “[s]ecure transfer . . . is obviously
`
`essential.” (Id. at 7, § 1.) Kiuchi discloses a closed HTTP-based network (C-
`
`HTTP) “to assure institutional level security.” (Id. at 7, Abstract.)
`
`34. C-HTTP communication is a multi-step process and requires three
`
`components between the client, also referred to as a user agent, and the origin
`
`server where the patient information resides: (1) a client-side proxy, (2) a server-
`
`side proxy, and (3) a C-HTTP name server. (Id. at 7-9.) “C-HTTP-based
`
`18
`
`Page 18 of 51
`
`

`
`Case No. IPR2015-01047
`
`communication is performed only between two types of C-HTTP proxies and
`
`between a C-HTTP proxy and C-HTTP name server.” (Id. at 11, § 4.2(2).) Unlike
`
`other protocols that “assure ‘end-to-end’ security protection” in which security
`
`protection is dependent on the end user, C-HTTP communication involves “proxy-
`
`proxy security” and there is no direct communication between user agents and
`
`origin servers. (Id. at 10-11.)
`
`35. As disclosed in Kiuchi, an end user at a user agent may select or
`
`request
`
`a
`
`“resource name[] with
`
`a
`
`connection
`
`ID,
`
`for
`
`example,
`
`‘http://server.in.current.connection/sample.html=@=6zdDfldfcZLj8V!i’”
`
`that
`
`identifies resources at an origin server. (Id. at 8, § 2.3(1).) The “resource name” in
`
`Kiuchi corresponds
`
`to “http://server.in.current.connection/sample.html” and
`
`identifies both the origin server at which the requested resources are located, also
`
`referred to as the “host” in Kiuchi, and the resources requested. (Id. at 8, § 2.3(1).)
`
`The connection ID corresponds to “6zdDfldfcZLj8V!i.” (Id. at 8, § 2.3(1).)
`
`36. Kiuchi summarizes C-HTTP-based communications in nine steps.
`
`(See Ex. 1002 at 8-10.) In step (1), the client-side proxy receives the resource
`
`name and connection ID from the client. (Id. at 8, § 2.3(1).) If “the connection ID
`
`is not found in the current connection table in the client-side proxy, the current
`
`connection is disconnected.” (Id. at 8, § 2.3(1).) “[A] new connection is
`
`established if the host is in the closed network.” (Id. at 8, § 2.3(1).)
`
`19
`
`Page 19 of 51
`
`

`
`Case No. IPR2015-01047
`
`37. To establish a new connection, in step (2) the “client-side proxy asks
`
`the C-HTTP name server whether it can communicate with the host specified in a
`
`given URL.” (Id. at 8, § 2.3(2).) The host server, as specified in the URL, is the
`
`origin server. (Id. at 8, § 2.3(1)-(2).) If the C-HTTP name server confirms that the
`
`query is legitimate and that a server-side proxy is permitted to accept the
`
`connection from the client-side proxy, the C-HTTP name server returns the IP
`
`address of the server-side proxy. (Id. at 8, § 2.3(2).)
`
`38.
`
`In step (3), the “client-side proxy sends a request for connection to the
`
`server-side proxy.” (Id. at 8, § 2.3(3).) “When a server-side proxy accepts a
`
`request for connection from a client-side proxy, it asks the C-HTTP name server
`
`whether the client-side proxy is an appropriate member of the closed network.”
`
`(Id. at 8-9, § 2.3(4).) If it is, in step (4), the name server returns the IP address of
`
`the client-side proxy. (Id. at 9, § 2.3(4).)
`
`39. Once the server-side proxy obtains the client-side proxy’s IP address, it
`
`generates a connection ID and sends it with other information to the client-side
`
`proxy. (Id. at 9, § 2.3(5).) “When the client-side proxy accepts and checks [the
`
`information from the server-side proxy], the connection is established” in step (5).
`
`(Id. at 9, § 2.3(5).)
`
`40. After the C-HTTP connection is established, the “client-side proxy
`
`forwards HTTP/1.0 requests from the user agent in encrypted form using C-HTTP
`
`20
`
`Page 20 of 51
`
`

`
`Case No. IPR2015-01047
`
`format,” in step (6). (Id. at 9, § 2.3(6).) These HTTP/1.0 requests identify
`
`resources at the origin server. (Id. at 8-9, § 2.3(1), Fig. (c).) Accordingly, in step
`
`(7), the server-side proxy forwards the requests to the origin server after converting
`
`them to HTTP/1.0 requests. (Id. at 9, § 2.3(7).) In step (8), the origin server sends
`
`an HTTP/1.0 response, which “is encrypted in C-HTTP format by the server-side
`
`proxy, and is forwarded to the client-side proxy. Then, in the client-side proxy, the
`
`C-HTTP response is decrypted and the HTTP/1.0 response extracted” and sent to
`
`the client. (Id. at 9, § 2.3(8).) In step (9), “[a] client-side proxy can send a request
`
`for closing the connection.” (Id. at 10, § 2.3(9).)
`
`B. Claim 1
`1. Kiuchi Does Not Disclose the Recited DNS Features
`I understand claim 1 recites a “domain name server (DNS) proxy
`
`41.
`
`module” and “DNS requests sent by a client.” (Ex. 1001 at claim 1.) I understand
`
`that Petitioners appear to advance two alternative theories, pointing to: (1) a
`
`request sent by the user agent to the client-side proxy, and (2) a C-HTTP request to
`
`be sent by the client-side proxy to the C-HTTP name server. (Pet. at 27.) In my
`
`opinion, neither request discloses the claimed DNS features.
`
`42.
`
`In my opinion, Kiuchi repeatedly differentiates its C-HTTP features
`
`from DNS. For example, Kiuchi explains that the C-HTTP name service is used
`
`“instead of DNS,” the “DNS name service is not used for hostname resolution,”
`
`21
`
`Page 21 of 51
`
`

`
`Case No. IPR2015-01047
`
`and a “DNS lookup” is only performed after a permission request to the C-HTTP
`
`name server fails. (Ex. 1002 at 7; see also id. at 11 (explaining that a different
`
`naming scheme is used in a C-HTTP based system and that the system only
`
`functions with C-HTTP proxies and name servers).) In other words, Kiuchi makes
`
`clear that the disclosed DNS lookup is generated only if an error condition occurs
`
`in which C-HTTP connectivity fails. (Id. at 8 (“If [a C-HTTP connection] is not
`
`permitted, [the C-HTTP name server] sends a status code which indicates an error.
`
`If a client-side proxy receives an error status, then it performs DNS lookup,
`
`behaving like an ordinary HTTP/1.0 proxy.”).) Kiuchi does not disclose that the
`
`request sent by the user agent to the client-side proxy, nor the request sent by the
`
`client-side proxy to the C-HTTP name server, is a DNS request.
`
`43. Moreover, Kiuchi does not disclose the same functionality as
`
`conventional DNS. For example, as discussed below, unlike conventional DNSs,
`
`which “provide a look-up function that returns the IP address of a requested
`
`computer or host” (Ex. 1001 at 36:61-63), Kiuchi’s C-HTTP name server does not
`
`return the IP address of the URL in the request, which identifies Kiuchi’s origin
`
`server, but instead returns a server-side proxy’s IP address. For example, in
`
`Kiuchi,
`
`the
`
`URL,
`
`e.g.,
`
`“http://server.in.current.connection!sample.html=@=6zdDfldfcZLj8V!i,”
`
`represents a “resource name,” and when the URL is clicked, “the client-side proxy
`
`22
`
`Page 22 of 51
`
`

`
`Case No. IPR2015-01047
`
`takes off the connection ID (i.e., “6zdDfldfcZLj8V”) and forwards, the stripped,
`
`original resource name to the server . . . .” (Ex. 1002 at 8-9.) The C-HTTP name
`
`server returns the IP address of the server-side

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket