throbber
NO:
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`__________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`__________________
`
`THE MANGROVE PARTNERS MASTER FUND, LTD.
`Petitioner,
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`__________________
`
`Case IPR2015-_____
`Patent U.S. 7,490,151
`__________________
`
`PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO.
`7,490,151
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`US Patent and Trademark Office
`PO Box 1450
`Alexandria, Virginia 22313-1450
`
`

`
`TABLE OF CONTENTS
`I. MANDATORY NOTICES UNDER 37 C.F.R § 42.8(a)(1) .................... 1
`A. Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1) ........................... 1
`B. Related Matters Under 37 C.F.R. § 42.8(b)(2)..................................... 1
`C. Lead And Back-Up Counsel Under 37 C.F.R. § 42.8(b)(3) ................ 2
`D. Service Information .............................................................................. 3
`II. PAYMENT OF FEES – 37 C.F.R. § 42.103 ............................................ 3
`III.REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104 ..................... 3
`A. Grounds for Standing Under 37 C.F.R. § 42.104(a) ............................ 3
`B. Challenge Under 37 C.F.R. § 42.104(b) and Relief Requested ........... 3
`IV.SUMMARY OF THE ‘151 PATENT....................................................... 5
`A. Brief Description .................................................................................. 5
`B. Summary of the Prosecution History of the ‘151 Patent...................... 7
`C. Claim Construction under 37 C.F.R. §§ 42.104(b)(3) ......................... 8
`1.
`“Domain Name”................................................................................ 9
`2.
`“DNS Request” ................................................................................. 9
`3.
`“Determining”................................................................................. 10
`4.
`“Secure Server”............................................................................... 13
`5.
`“Automatically” .............................................................................. 14
`6.
`“Client” ........................................................................................... 15
`7.
`“Between [A] and [B]” ................................................................... 15
`V. MANNER OF APPLYING CITED PRIOR ART TO EVERY CLAIM
`FOR WHICH AN IPR IS REQUESTED, THUS ESTABLISHING A
`REASONABLE LIKELIHOOD THAT AT LEAST ONE CLAIM OF THE
`‘151 PATENT IS UNPATENTABLE ......................................................... 16
`A.
`[GROUND 1] – Kiuchi Anticipates Claims 1, 2, 6-8, and 12-14 ...... 16
`1. Kiuchi Anticipates Claim 1............................................................. 25
`2. Kiuchi Anticipates Claim 7............................................................. 32
`3. Kiuchi Anticipates Claim 13........................................................... 33
`4. Kiuchi Anticipates Claims 2, 8, and 14 .......................................... 35
`5. Kiuchi Anticipates Claims 6 and 12 ............................................... 36
`B.
`[GROUND 2] – Kiuchi In View of RESCORLA Renders Obvious
`Claims 1, 2, 6-8, and 12-14 ....................................................................... 37
`C.
`[GROUND 3] – Kiuchi In View of RFC 1034 Renders Obvious
`Claims 1, 2, 6-8, and 12-14 ....................................................................... 42
`1. Kiuchi In View of RFC 1034 Renders Obvious Claim 1 ............... 46
`2. Kiuchi In View of RFC 1034 Renders Obvious Claim 7 ............... 52
`3. Kiuchi In View of RFC 1034 Renders Obvious Claim 13 ............. 53
`
`i
`
`

`
`4. Kiuchi In View of RFC 1034 Renders Obvious Claims 2, 8, and 14
`56
`5. Kiuchi In View of RFC 1034 Renders Obvious Claims 6 and 12.. 56
`D.
`[GROUND 4] – Kiuchi In View of RFC 1034 and Further In View of
`Rescorla Renders Obvious Claims 1, 2, 6-8, and 12-14 ........................... 57
`VI.CONCLUSION ....................................................................................... 58
`
`ii
`
`

`
`Ex. 1001
`
`Ex. 1002
`
`Ex. 1003
`
`Ex. 1004
`
`Ex. 1005
`
`Ex. 1006
`
`Ex. 1007
`
`Ex. 1008
`
`Ex. 1009
`
`Ex. 1010
`
`Ex. 1011
`
`Ex. 1012
`
`Ex. 1013
`
`Ex. 1014
`
`Ex. 1015
`Ex. 1016
`Ex. 1017
`Ex. 1018
`Ex. 1019
`Ex. 1020
`Ex. 1021
`Ex. 1022
`
`EXHIBITS
`
`U.S. Patent No. 7,490,151 to Munger et al. (the "'151
`Patent")
`Takahiro Kiuchi and Shigekoto Kaihara, "C-HTTP - The
`Development of a Secure, Closed HTTP-based Network on
`the Internet," published by IEEE in the Proceedings of
`SNDSS 1996 ("Kiuchi")
`Declaration of Dr. Roch Guerin
`E. Rescorla and A. Schiffman, “The Secure Hypertext
`Transfer Protocol,” Internet Draft (Feb. 1996)
`Mockapetris, P., RFC 1034, "Domain Names–Concepts and
`Facilities," Nov. 1997
`Excerpts from the Prosecution History of the ‘151 Patent
`Patent Owner's Preliminary Response, Paper 7, in IPR2014-
`00610
`Excerpts from Webster’s Third New International Dictionary
`(1971)
`VirnetX's Reply Claim Construction Brief in VirnetX Inc. v.
`Cisco Systems, Inc. et al., 6:10-cv-417 (Dec. 19, 2011) (E.D.
`Tex.)
`Bradner, S., RFC 2026, “The Internet Standards Process –
`Revision 3,” Oct. 1996
`Decision to Institute Inter Partes Review, Paper 9, in
`IPR2014-00610 (Oct. 15, 2014)
`Chatel, M., RFC 1919, “Classical versus Transparent IP
`Proxies,” March 1996
`Fielding et al., RFC 2068, “Hypertext Transfer Protocol –
`HTTP/1.1,” Jan. 1997
`Berners-Lee et al., RFC 1945, "Hypertext Transfer Protocol -
`- HTTP/1.0," May 1996
`(Reserved)
`(Reserved)
`(Reserved)
`(Reserved)
`(Reserved)
`(Reserved)
`(Reserved)
`(Reserved)
`
`iii
`
`

`
`Ex. 1023
`
`Ex. 1024
`
`(Reserved)
`E. Rescorla and A. Schiffman, RFC 2660, “The Secure
`Hypertext Transfer Protocol,” Aug. 1999
`
`iv
`
`

`
`The Mangrove Partners Master Fund, Ltd. (“Petitioner” or
`
`“Mangrove”) petitions for Inter Partes Review (“IPR”) under 35 U.S.C. §§
`
`311–319 and 37 C.F.R. § 42 of claims 1, 2, 6-8, and 12-14 (“the Challenged
`
`Claims”) of U.S. Patent No. 7,490,151 (“the ‘151 patent”). As explained in
`
`this petition, there exists a reasonable likelihood that Mangrove will prevail
`
`with respect to at least one of the Challenged Claims.
`
`The Challenged Claims are unpatentable based on teachings set forth
`
`in at least the references presented in this petition. Mangrove respectfully
`
`submits that an IPR should be instituted, and that the Challenged Claims
`
`should be canceled as unpatentable.
`
`I. MANDATORY NOTICES UNDER 37 C.F.R § 42.8(A)(1)
`A. REAL PARTY-IN-INTEREST UNDER 37 C.F.R. § 42.8(B)(1)
`Petitioner, The Mangrove Partners Master Fund, Ltd., is the real party-in-
`
`interest.
`
`B. RELATED MATTERS UNDER 37 C.F.R. § 42.8(B)(2)
`The ‘151 patent is the subject of a number of civil actions including:
`
`(i) Civ. Act. No. 6:13-cv-00211-LED (E.D. Tex.), filed February 26, 2013;
`
`(ii) Civ. Act. No. 6:12-cv-00855- LED (E.D. Tex.), filed November 6, 2012;
`
`and (iii) Civ. Act. No. 6:10-cv-00417-LED (E.D. Tex.), filed August 11,
`
`2010.
`
`The ’151 patent is also the subject of inter partes reexamination nos.
`
`

`
`95/001,697 and 95/001,714. In the formerly merged proceedings, the Office
`
`issued a Non-Final Action on April 20, 2012 rejecting all 16 claims of the
`
`’151 patent. In particular, all claims of the ‘151 patent were rejected as
`
`either anticipated by Kiuchi (Ex. 1002) or obvious over Kiuchi in view of
`
`other references included in this petition. Those claims were also rejected on
`
`additional grounds as being anticipated or obvious based on a number of
`
`other prior art references.
`
`In addition, the ‘151 patent was the subject of a petition for inter
`
`partes review filed by Microsoft Corporation (IPR2014-00610), which was
`
`instituted based on many of the same grounds detailed below and
`
`subsequently terminated pursuant to a settlement agreement between the
`
`parties in that proceeding. The ‘151 patent was also the subject of petitions
`
`for inter partes review filed by New Bay Capital, LLC (IPR2013-00376),
`
`which was subsequently dismissed, and by Apple Inc. ( IPR2013-00354) and
`
`RPX Corporation (IPR2014-00173), both of which were not instituted due to
`
`their being time-barred.
`
`C. LEAD AND BACK-UP COUNSEL UNDER 37 C.F.R. §
`42.8(B)(3)
`Petitioner provides the following designation of counsel.
`
`LEAD COUNSEL
`
`BACKUP COUNSEL
`
`Abraham Kasdan, Reg. No. 32,997
`
`James T. Bailey, Reg. No. 44,518
`
`2
`
`

`
`Wiggin and Dana LLP
`450 Lexington Avenue
`New York, NY 10017
`T: 212-551-2841
`Email: akasdan@wiggin.com
`
`504 W. 136th St. #1B
`New York, NY 10031
`T: 917-626-1356
`Email: jtb@jtbaileylaw.com
`
`D. SERVICE INFORMATION
`Please address all correspondence and service to counsel at the
`
`address provided in Section I(C). Petitioner also consents to electronic
`
`service by email at IP@wiggin.com.
`
`II. PAYMENT OF FEES – 37 C.F.R. § 42.103
`Petitioner authorizes the Patent and Trademark Office to charge
`
`Deposit Account No. 23-1665 for the fee set in 37 C.F.R. § 42.15(a) for this
`
`Petition and further authorizes payment for any additional fees to be charged
`
`to this Deposit Account.
`
`III. REQUIREMENTS FOR IPR UNDER 37 C.F.R. § 42.104
`A. GROUNDS FOR STANDING UNDER 37 C.F.R. § 42.104(A)
`Mangrove certifies that the ‘151 Patent is eligible for IPR. Mangrove
`
`is not barred or estopped from requesting this review challenging the
`
`Challenged Claims on the below-identified grounds.
`
`B. CHALLENGE UNDER 37 C.F.R. § 42.104(B) AND RELIEF
`REQUESTED
`
`Petitioner requests an IPR of the Challenged Claims on the grounds
`
`set forth in the table shown below, and requests that each of the Challenged
`
`3
`
`

`
`Claims be found unpatentable. An explanation of how these claims are
`
`unpatentable under the statutory grounds identified below is provided in the
`
`form of a detailed description that indicates where each element can be
`
`found in the cited prior art, and the relevance of that prior art. Additional
`
`explanation and support for each ground of rejection is set forth in Exhibit -
`
`1003, the Declaration of Dr. Roch Guerin (“Guerin Declaration”),
`
`referenced throughout this Petition.
`
`Ground
`Ground 1
`
`Basis for Rejection
`‘151 Patent Claims
`1, 2, 6-8 and 12-14 Anticipated under § 102 by Kiuchi
`
`Ground 2
`
`Ground 3
`
`Ground 4
`
`1, 2, 6-8 and 12-14 Obvious under § 103 based on Kiuchi
`in view of Rescorla
`1, 2, 6-8 and 12-14 Obvious under § 103 based on Kiuchi
`in view of RFC 1034
`1, 2, 6-8 and 12-14 Obvious under § 103 based on Kiuchi
`in view of RFC 1034 and further in
`view of Rescorla
`
`Each of the prior art references relied upon herein qualifies as prior art
`
`to the ‘151 Patent under 35 U.S.C § 102(b).
`
`First, Kiuchi qualifies as prior art under 35 U.S.C § 102(b).
`
`Specifically, Kiuchi (Ex. 1002) is a printed publication that was presented at
`
`the 1996 Symposium on Network and Distributed Systems Security
`
`(SNDSS) on February 22 & 23, 1996, and published by IEEE in the
`
`Proceedings of SNDSS 1996. Ex. 1002.
`
`4
`
`

`
`Recorla also qualifies as prior art under 35 U.S.C § 102(b).
`
`Specifically, Rescorla (Ex. 1004) is an Internet-Draft that was published in
`
`February 1996 by the Internet Engineering Task Force (IETF) as part of the
`
`development of RFC 2660. That Internet-Draft was publically distributed no
`
`later than February 1996. Ex. 1004; see also Ex. 1003, ¶¶ 45-52.
`
`RFC 1034 likewise qualifies as prior art under 35 U.S.C § 102(b).
`
`Specifically, RFC 1034 (Ex. 1005) was published in November 1987 by the
`
`Internet Engineering Task Force (IETF). RFC 1034 was publically
`
`distributed no later than November 1987. Ex. 1005.
`
`IV. SUMMARY OF THE ‘151 PATENT
`
`A. BRIEF DESCRIPTION
`
`The ‘151 patent generally addresses secure communications over the
`
`Internet. As acknowledged in the ‘151 patent, “[a] tremendous variety of
`
`methods have been proposed and implemented to provide security and
`
`anonymity for communications over the Internet.” Ex. 1001 at 1:27-29. The
`
`majority of the ‘151 specification is dedicated to describing one particular
`
`way of providing secure and anonymous communications using an allegedly
`
`inventive protocol called the “Tunneled Agile Routing Protocol (TARP).”
`
`See, e.g., id. at 3:5-6:3. The challenged claims of the ‘151 patent, however,
`
`5
`
`

`
`are not limited to TARP and instead all address one of five alleged
`
`“improvements” added by CIP application serial number 09/504,783 filed on
`
`February 15, 2000. Id. at 6:4-16. The claims of the ‘151 Patent are directed
`
`to a system and method for securely communicating over the Internet. Ex.
`
`1001 at 3:8. More specifically, the claims all address “a DNS proxy server
`
`that transparently creates a virtual private network in response to a domain
`
`name inquiry.” Id. at 6:7-9.
`
`A Domain Name System (“DNS”) server provides a look-up function
`
`that returns the IP address of a requested computer or host. Id. at 36:61-63.
`
`A user sends a request to the DNS server to look up the IP address
`
`associated with the name of a destination host. Id. at 37:4-7. The DNS server
`
`returns the IP address to the client, which is then able to use the IP address to
`
`communicate with the host. Id. at 37:6-9.
`
`The ‘151 patent describes a domain name service system configured
`
`to perform the operations of: (1) intercepting a DNS request sent by a client;
`
`(2) determining whether the intercepted DNS request corresponds to a
`
`secure server, (3) when the intercepted DNS request does not correspond to
`
`a secure server, forwarding the DNS request to a DNS function that returns
`
`an IP address of a nonsecure computer, and (4) when the intercepted DNS
`
`request corresponds to a secure server, automatically initiating an encrypted
`
`6
`
`

`
`channel between the client and the secure server. Ex. 1001 at 37: 25-38.
`
`The ‘151 patent includes 16 claims, of which claims 1, 7 and 13 are
`
`independent.
`
`Claim 1 of the ‘151 Patent is reproduced below:
`
`A data processing device, comprising memory storing a
`1.
`domain name server (DNS) proxy module that intercepts DNS
`requests sent by a client and, for each intercepted DNS request,
`performs the steps of:
`
`determining whether the intercepted DNS request
`(i)
`corresponds to a secure server;
`
`(ii) when the intercepted DNS request does not
`correspond to a secure server, forwarding the DNS
`request to a DNS function that returns an IP address of a
`nonsecure computer, and
`
`(iii) when the intercepted DNS request corresponds to a
`secure server, automatically initiating an encrypted
`channel between the client and the secure server.
`
`B. SUMMARY OF THE PROSECUTION HISTORY OF THE
`‘151 PATENT
`
`U.S. Patent No. 7,490,151 issued on February 10, 2009 from U.S.
`
`Patent Application No. 10/259,494 (“the ‘494 application”), which was filed
`
`on September 30, 2002 with 20 claims as a division of U.S. Patent
`
`Application No. 09/504,783 (“the ’783 application”). See Ex. 1006, pp. 8,
`
`79-82. No reasons for allowance are expressly stated in the ‘151 patent file
`
`history. Moreover, the Patent Owner never explicitly distinguished the
`
`7
`
`

`
`ultimately allowed and issued claims from the cited prior art, instead
`
`focusing its responsive arguments on claims that were later cancelled. See,
`
`e.g., Ex. 1006, pp. 359-363, 385-388, 398-399, 559-561. Ultimately the
`
`patent issued on February 10, 2009, though it is not clear whether any
`
`particular feature led to the allowance.
`
`C. CLAIM CONSTRUCTION UNDER 37 C.F.R. §§ 42.104(B)(3)
`
`A claim subject to IPR is given its “broadest reasonable construction
`
`in light of the specification of the patent in which it appears.” 37 C.F.R. §
`
`42.100(b); see also Patent Trial Practice Guide, 77 Fed. Reg. 48,756,
`
`48,766 (Aug. 14, 2012). Under the broadest reasonable standard, claim terms
`
`are given their ordinary and customary meaning as would be understood by
`
`one of ordinary skill in the art in the context of the entire disclosure. In re
`
`Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). Any special
`
`definition for a claim term must be set forth in the specification with
`
`reasonable clarity, deliberateness, and precision. In re Paulsen, 30 F.3d
`
`1475, 1480 (Fed. Cir. 1994). In this regard, however, care must be taken not
`
`to read a particular embodiment appearing in the written description into the
`
`claim if the claim language is broader than the embodiment. In re Van
`
`Geuns, 988 F.2d 1181, 1184 (Fed. Cir. 1993).
`
`Petitioner submits constructions for the following terms. All
`
`8
`
`

`
`remaining terms should be given their plain meaning.
`
`1.
`
`“DOMAIN NAME”
`
`The Patent Owner has asserted to the PTAB that a “domain name”
`
`means “a name corresponding to a network address.” Nonetheless, Patent
`
`Owner has urged that no interpretation of this term is needed, because it
`
`does not appear alone in the claims, but rather only as part of a larger phrase.
`
`Ex. 1007, p. 21. However, the term is part of the interpretation of “DNS
`
`Request” that the Patent Owner supported and the PTAB adopted in prior
`
`IPR proceedings. Ex. 1011, p. 6 (IPR2014-00610 Paper 9, Decision to
`
`Institute). In view of the Patent Owner’s own assertions, it is reasonable, for
`
`purposes of this proceeding in which the broadest reasonable interpretation
`
`standard applies, to consider the term “domain name” as encompassing “a
`
`name corresponding to a network address.”
`
`2.
`
`“DNS REQUEST”
`
`The Patent Owner has asserted to the PTAB that that a “DNS request”
`
`means “a request for a resource corresponding to a domain name.” Ex. 1007,
`
`p. 22. In IPR2014-00610 the PTAB agreed with and adopted this
`
`interpretation. Petitioner agrees that the term “DNS request” should be
`
`interpreted to mean “a request for a resource corresponding to a domain
`
`name.”
`
`9
`
`

`
`Moreover, as explained immediately above, the parties agree that the
`
`term “domain name” means “a name corresponding to a network address.”
`
`To the extent the PTAB declines to provide an explicit interpretation of
`
`“domain name” as discussed immediately above, that agreed understanding
`
`should be incorporated into the interpretation of “DNS request,” which
`
`should then be interpreted to mean “a request for a resource corresponding
`
`to a network address.”
`
`3.
`
`“DETERMINING”
`
`Petitioner agrees with the PTAB that the word “determining” should
`
`be given its “plain and ordinary meaning” of “’to come to a decision
`
`concerning as the result of investigation or reasoning’ or ‘to cause or elicit a
`
`determination of.’” Ex. 1011, pp. 11-12 (quoting WEBSTER’S THIRD
`
`NEW INTERNATIONAL DICTIONARY 616 (1971)) (Ex. 1008)
`
`In IPR2014-00610, the Patent Owner argued that Kiuchi did not
`
`disclose the step of “determining whether the intercepted DNS request
`
`corresponds to a secure server” found in claim 1. In particular, Patent
`
`Owner argued that the “client side proxy” described in Kiuchi, which makes
`
`up a portion of the “domain name server (DNS) proxy module” of the
`
`preamble of claim 1, does not itself perform the determining step because it
`
`“asks” a different entity, the C-HTTP name server, for information used in
`
`10
`
`

`
`the determination. Patent Owner argued it was “[t]he C-HTTP name server,
`
`not the client-side proxy” that performed the determining step. Ex. 1007
`
`(Patent Owner’s Preliminary Response IPR2014-00610) p. 5 (emphasis in
`
`original)
`
`The PTAB correctly rejected this argument as inconsistent with the
`
`plain and ordinary meaning of “determining.” Ex. 1011, pp. 11-12. The
`
`PTAB’s reasoning is not only consistent with the plain meaning of
`
`determining, it is consistent with the specification of the ‘151 patent.
`
`For example, claims 2, 8 and 14 depend upon independent claim 1, 7
`
`and 13 respectively, share the same preambles, and each dependent claim
`
`includes the step of “determining whether the client is authorized to access
`
`the secure server.” Ex. 1001 47:1-4, 39-42, 48:30-33. As described in the
`
`specification, the “determining” step of claims 2, 8, and 14 may be made by
`
`the DNS proxy module by querying a separate entity (the gatekeeper):
`
`“FIG. 27 shows steps that can be executed by DNS proxy
`
`server 2610 to handle requests for DNS look-up for secure
`
`hosts. . . . In step 2702, if access to a secure host was
`
`requested, then in step 2704 a further check is made to
`
`determine whether the user is authorized to connect to the
`
`secure host. Such a check can be made with reference to an
`
`internally stored list of authorized IP addresses, or can be
`
`made by communicating with gatekeeper 2603 (e.g., over an
`
`11
`
`

`
`‘administrative’ VPN that is secure).” Ex. 1001 38:36-50
`
`(emphasis added); see also id. FIGS. 26-27.
`
`As shown in Figure 26, the “gatekeeper 2603” is a separate entity
`
`from the “DNS proxy server 2610.” Ex. 1001 FIG. 26; see also id. at 38:22-
`
`25 (“Gatekeeper 2603 can be implemented on a separate computer (as
`
`shown in FIG. 26) or as a function within modified DNS server 2602.”)
`
`Accordingly, as confirmed by the specification, the word “determining”
`
`should be given its plain and ordinary meaning of “to come to a decision
`
`concerning as the result of investigation or reasoning” or “to cause or elicit a
`
`12
`
`

`
`determination of.” WEBSTER’S THIRD NEW INTERNATIONAL
`
`DICTIONARY 616 (1971)) (Ex. 1008)
`
`4.
`
`“SECURE SERVER”
`
`The Patent Owner has asserted to the PTAB that a “secure server”
`
`means “a server that requires authorization for access and that can
`
`communicate in an encrypted channel.” Ex. 1007, pp. 23-24. However, as
`
`the PTAB pointed out, there is nothing in the plain meaning of “secure
`
`server” nor the specification of the ‘151 patent that requires that a “secure
`
`server” must communicate in an “encrypted channel,” as opposed to any
`
`13
`
`

`
`channel that is secure by means other than encryption. Ex. 1011, p. 7.
`
`Accordingly, as the PTAB previously found, the broadest reasonable
`
`interpretation of “secure server” should be interpreted to mean “ a server that
`
`communicates over a transmission path that restricts access to data or other
`
`information on the path.”
`
`5.
`
`“AUTOMATICALLY”
`
`The Patent Owner has asserted to the PTAB “automatically
`
`initiating/creating an encrypted/ secure channel” means “initiating/creating
`
`the encrypted/secure channel without involvement of a user.” Ex. 1007, pp.
`
`24-25. However, as the PTAB has previously pointed out, “the term
`
`‘automatic’ has a plain and ordinary meaning of ‘marked by action that . . .
`
`arises as a really or apparently necessary reaction to or consequence of a
`
`given set of circumstances’ or ‘having a self-acting or self-regulating
`
`mechanism.’” Ex. 1011, p. 7, quoting WEBSTER’S THIRD NEW
`
`INTERNATIONAL DICTIONARY 148 (1971) (Ex. 1008). As the PTAB
`
`previously found, neither the plain meaning of “automatically” nor the ‘151
`
`specification support the Patent Owner’s proposed added limitation that
`
`“automatically” means “without user involvement.” Ex. 1011, pp. 6-7.
`
`Accordingly, the word “automatically” should be interpreted under its
`
`ordinary meaning as “marked by action that arises as a really or apparently
`
`14
`
`

`
`necessary reaction to or consequence of a given set of circumstances” or
`
`“having a self-acting or self-regulating mechanism.”
`
`6.
`
`“CLIENT”
`
`Petitioner agrees with the PTAB that a “client,” under the broadest
`
`reasonable interpretation of that term, should be interpreted as “a device,
`
`computer, system, or program from which a data request to a server is
`
`generated.” Ex. 1011, pp. 7-8. This is consistent with the ‘151 patent’s
`
`specification and the understanding one of ordinary skill in the art would
`
`ascribe to this term when identifying the broadest reasonable interpretation.
`
`See Ex. 1003. ¶ 16.
`
`In particular, the ‘151 patent describes that “user's computer 2501
`
`includes a client application 2504 (for example, a web browser) and an IP
`
`protocol stack 2505.” Ex. 1001 at 37:1-3. Notably this sentence uses the
`
`term “client” with regard to an application, not the “user’s computer.” Thus,
`
`under this term’s broadest reasonable interpretation, the ‘151 patent supports
`
`that “client” may refer to an application, not just a physical machine.
`
`7.
`
`“BETWEEN [A] AND [B]”
`
`In prior litigation involving the ‘151 patent, the Patent Owner argued
`
`that “between” should mean “extend from one endpoint to the other,” and
`
`15
`
`

`
`instead stated that “between” should only apply to the “public
`
`communication paths.” Ex. 1009, p. 10. Under the Patent Owner’s
`
`contentions, an encrypted/secure channel is “between” a client and a secure
`
`server where the channel is on the public communication paths between the
`
`client and the secure server, regardless of whether the encrypted/secure
`
`channel extends completely from the client to the secure server.
`
`In a prior IPR proceeding, the Patent Owner contended that, despite
`
`its earlier contentions regarding the meaning of “between,” no construction
`
`was necessary. See, e.g., Ex. 1011, p. 8. However, the PTAB adopted a
`
`plain and customary meaning of “between” to mean “in the space that
`
`separates.” Id. quoting WEBSTER’S THIRD NEW INTERNATIONAL
`
`DICTIONARY 209 (1971)) (Ex. 1008). Petitioner agrees with the plain and
`
`customary meaning adopted by the PTAB, and notes that it is broad enough
`
`to encompass the Patent Owner’s prior litigation position.
`
`V. MANNER OF APPLYING CITED PRIOR ART TO EVERY
`CLAIM FOR WHICH AN IPR IS REQUESTED, THUS
`ESTABLISHING A REASONABLE LIKELIHOOD THAT AT
`LEAST ONE CLAIM OF THE ‘151 PATENT IS
`UNPATENTABLE
`
`A.
`
`[GROUND 1] – KIUCHI ANTICIPATES CLAIMS 1, 2, 6-8,
`AND 12-14
`
`Kiuchi is a printed publication that was presented at the 1996
`
`16
`
`

`
`Symposium on Network and Distributed Systems Security (SNDSS) on
`
`February 22 & 23, 1996, and published by IEEE in the Proceedings of
`
`SNDSS 1996. Kiuchi was distributed publicly without restriction no later
`
`than February 1996. See Ex. 1002. Ex. 1002. Kiuchi is therefore prior art to
`
`the ‘151 patent at least under § 102(b).
`
`Overview of Kiuchi
`
`Kiuchi describes a system and a protocol called “C-HTTP” that
`
`“provides secure HTTP communication mechanisms within a closed group
`
`of institutions on the Internet, where each member is protected by its own
`
`firewall.” Ex. 1002, p. 64, Abstract. Kiuchi describes that C-HTTP can be
`
`used to create “a closed HTTP-based virtual network . . . for closed groups;
`
`for example, the headquarters and branches of a given corporation.” Ex.
`
`1002, p. 69, § 5. The following Diagram 1 illustrates relevant parts within
`
`the C-HTTP system described by Kiuchi, and will be used to describe the C-
`
`HTTP system. See Ex. 1003, ¶ 17.
`
`17
`
`

`
`Leveraging these parts, Kiuchi describes a process by which a client-
`
`side proxy establishes a secure connection with a server-side proxy using the
`
`C-HTTP protocol over the Internet (i.e., a C-HTTP connection), thus
`
`establishing a closed virtual network including a user agent and an origin
`
`server. See Ex. 1002, p. 64, § 2.1; p. 69, § 5; see also Ex. 1003, ¶ 18.
`
`Through the C-HTTP connection, a user agent associated with the client-side
`
`proxy may request information stored on an origin server associated with the
`
`server-side proxy. See id. In order to establish a C-HTTP connection, Kiuchi
`
`teaches discrete steps that will be described using the following block
`
`diagram. See Ex. 1002, pp. 65-66, § 2.3; see also, Diagram 2, where each
`
`step is numbered to indicate a temporal sequence of the steps taught by
`
`18
`
`

`
`Kiuchi (Ex. 1003, ¶ 19).
`
`To enable initiation of this set of steps, the user agent displays HTML
`
`documents to an end-user. See Ex. 1002, p. 65, § 2.3. Through interaction
`
`with the user agent, the end user selects a hyperlink URL included within an
`
`HTML document. See id. Kiuchi provides an example of the selected URL:
`
`“http://server.in.current.connection/sample.html=@=6zdDfldfcZLj8V!i”,
`
`where “server. in.current.connection” is the hostname, “sample.html” is the
`
`name of the resource being requested, and “6zdDfldfcZLj8V!i” is a
`
`connection ID. See Ex. 1002, p. 65, § 2.3; see also Ex. 1003, ¶ 20.
`
`Thereafter, as illustrated by Diagram 3, initial steps are performed by
`
`Kiuchi’s system in response to user selection of the hyperlink. These steps
`
`include: (1) a request being sent from the user agent to the client-side proxy
`
`19
`
`

`
`for the selected URL; (2) a request being sent from the client-side proxy to
`
`the C-HTTP name server for an IP address corresponding to the hostname
`
`included in the selected URL; and (3) a response being returned from the C-
`
`HTTP name server that either includes the IP address associated with the
`
`server-side proxy or an error message. Ex. 1003, ¶ 24. If the C-HTTP name
`
`server returns an error message (i.e., if the hostname does not correspond to
`
`a secure server in the closed network, or the connection is not permitted),
`
`then the client-side proxy performs a DNS lookup using the standard/public
`
`DNS, as illustrated by the dashed line. See Ex. 1002, p. 65, § 2.3; see also
`
`Ex. 1003, ¶ 24.
`
`20
`
`

`
`Analyzing these steps in further detail, when the end user selects the
`
`hyperlink in the displayed HTML document, the user agent sends a request
`
`for the URL to the client-side proxy, as illustrated by (1) in Diagram 3. See
`
`Ex. 1002, p. 65, § 2.3. When the client-side proxy receives the URL
`
`(including the hostname) from the user agent, it determines whether the
`
`connection ID included in the URL matches the IDs of any current
`
`connections being maintained by the client-side proxy. See id. If the
`
`connection ID is not found in the current connection table in the client-side
`
`proxy, the client-side proxy attempts to establish a new connection with the
`
`host corresponding to the hostname included in the URL. See id.
`
`To establish a new connection with the corresponding host, as illustrated by
`
`(2) in Diagram 3, the client-side proxy sends a request to ask the C-HTTP
`
`name server whether the client-side proxy can communicate with the host
`
`associated with the hostname and, if so, to resolve the hostname included in
`
`the URL such that the corresponding IP address is returned by the C-HTTP
`
`name server to the client-side proxy. See Ex. 1002, p. 65, § 2.3(2). In some
`
`instances, the hostname corresponds to an origin server associated with a
`
`server-side proxy and is associated with an IP address for the server-side
`
`proxy. See Ex. 1002, p. 65, § 2.3; see also Ex. 1003, ¶¶ 20-22. In other
`
`instances, the hostname corresponds to a server on the Internet outside the
`
`21
`
`

`
`C-HTTP network. See Ex. 1002, p. 65, § 2.3; see also Ex. 1003, ¶ 22.
`
`Upon receipt of the request, the C-HTTP name server first
`
`authenticates the client-side proxy (and, by association, the user agent) to
`
`determine if the request is legitimate. See Ex. 1002, p. 65, § 2.3; see also Ex.
`
`1003, ¶ 23. When the request is legitimate, the C-HTTP name server
`
`determines whether a “server-side proxy [associated with the hostname] is
`
`registered in the closed network.” See id. As illustrated by (3) in Diagram 3,
`
`if connection is not permitted, then the C-HTTP name server returns an error
`
`message, in response to which the client-side proxy performs a look-up with
`
`a standard/public DNS server, behaving like an ordinary HTTP proxy. See
`
`id. The standard/public DNS server then returns an IP address of the host
`
`corresponding to the hostname, which the client-side proxy uses to connect
`
`to the host on behalf of the user agent. See id.
`
`On the other hand, if the server-side proxy is permitted to accept a
`
`connection from the client-side proxy, then the C-HTTP name server sends a
`
`response to the client-side proxy’s request that includes “the IP address and
`
`public key of the server-side proxy and both request and response Nonce
`
`values,” as illustrated by (3) in Diagram 3. See Ex. 1002, p. 65, § 2.3; Ex.
`
`1003, ¶¶ 23-24. Notably, the C-HTTP name server never provides the IP
`
`address of the origin server to the client-side proxy. Ex. 1002 p. 65, § 2.2;
`
`22
`
`

`
`Ex. 1003, ¶ 25. Rather, when the C-HTTP name server returns the IP
`
`address of the server-side proxy along with the server-side proxy’s public
`
`key and the Nonce values, the client-side proxy attempts to establish a C-
`
`HTTP connection with the server-side proxy using the IP address received
`
`from the C-HTTP name server. See Ex. 1002, p. 65, § 2.3; Ex. 1003, ¶ 25.
`
`The steps for doing so are illustrated in Diagram 4. See Ex. 1003, ¶ 25.
`
`In particular, Kiuchi describes that the client-side proxy, in response
`
`to receiving the IP address of the server-side proxy and other information
`
`from the C-HTTP name server, sends a “[r]equest for connection to the
`
`server-side proxy” (4), the server-side proxy performs a “[l]ookup of client-
`
`side proxy information”

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket