throbber
Paper No. 104
`Filed: December 6, 2019
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––––––
`
`THE MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., and
`BLACK SWAMP IP, LLC,
`Petitioners,
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`
`––––––––––––––––––
`
`Case No. IPR2015-010471
`U.S. Patent No. 7,490,151
`
`––––––––––––––––––
`
`PETITIONERS’ REMAND BRIEF
`
`
`
`
`
`1 Apple Inc. and Black Swamp IP, LLC, which filed petitions in IPR2016-00063
`and IPR2016-00167, respectively, have been joined as Petitioners in the instant
`proceeding.
`
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`TABLE OF CONTENTS
`
`I.
`II.
`
`V.
`
`Introduction ................................................................................................ 1
`The Federal Circuit’s Decision ................................................................... 3
`A. VirnetX’s Patentability Arguments for the ’151 Patent ....................... 3
`B.
`VirnetX’s Procedural Arguments ........................................................ 5
`III. Claim Construction of “Client” ................................................................. 6
`IV. The Challenged Claims Are Unpatentable ................................................ 9
`A. Kiuchi Anticipates the Challenged Claims ........................................ 10
`1.
`Overview of Petitioners’ Anticipation Mapping ...................... 10
`2.
`VirnetX’s Assertions that Kiuchi Does Not Disclose a “DNS
`Proxy Module” Are Incorrect .................................................. 13
`The Challenged Claims Are Obvious over Kiuchi in view of RFC
`1034, With or Without Rescorla........................................................ 15
`1.
`The Modified Kiuchi System Suggested by RFC 1034 ........... 16
`2.
`VirnetX’s Nonobviousness Arguments Are Meritless ............. 21
`3.
`Kiuchi’s Client-Side Proxy Satisfies the “Client” Limitation for
`Purposes of the Obviousness Mapping .................................... 24
`Petitioner Mangrove Was Not Time-Barred Under Section 315(b) ....... 27
`A.
`There Was No Conspiracy Between Mangrove and RPX or Apple ... 28
`B. Mangrove’s Purchases of RPX Stock Do Not Implicate § 315(B)..... 31
`1. Mangrove’s Stock Purchases Do Not Make RPX or Apple
`RPIs ........................................................................................ 31
`2. Mangrove’s Stock Purchases Do Not Make RPX or Apple
`Privies ..................................................................................... 33
`VI. Conclusion ................................................................................................. 35
`Exhibit List .......................................................................................................... 36
`Certificate of Compliance ................................................................................... 40
`Certificate of Service........................................................................................... 41
`
`
`
`B.
`
`i
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Applications in Internet Time, LLC v. RPX Corp.,
`897 F.3d 1336 (Fed. Cir. 2018) .................................................................. 31, 32
`Cisco Sys., Inc. v. VirnetX, Inc.,
`Appeal No. 2014-000591 (PTAB Apr. 1, 2014) ............................................... 24
`
`Cisco Sys., Inc. v. VirnetX, Inc.,
`Appeal No. 2015-007843 (PTAB Feb. 1, 2016) ............................................... 24
`Dr. Reddy’s Labs. v. Indivior UK Ltd.,
`IPR2019-00329, Paper 21 (PTAB June 3, 2019) ........................................ 32, 33
`Gillig v. Nike, Inc.,
`602 F.3d 1354 (Fed. Cir. 2010) ........................................................................ 34
`In re Gleave,
`560 F.3d 1331 (Fed. Cir. 2009) ........................................................................ 25
`KSR Int’l Co. v. Teleflex Inc.,
`550 U.S. 398 (2007) ......................................................................................... 19
`National Ass’n of Home Builders v. Defenders of Wildlife,
`551 U.S. 644 (2007) ........................................................................................... 6
`Ormco Corp. v. Align Tech., Inc.,
`463 F.3d 1299 (Fed. Cir. 2006) ........................................................................ 24
`Power Integrations, Inc. v. Semiconductor Components Indus., LLC,
`926 F.3d 1306 (Fed. Cir. 2019) ........................................................................ 28
`Praxair Distribution, Inc. v. Ino Therapeutics LLC,
`IPR2015-00529, Paper 33 (PTAB Dec. 22, 2015) ............................................ 23
`RPX Corp. v. Publishing Techs., LLC,
`IPR2018-01131, Paper 10 (PTAB Dec. 3, 2018) .............................................. 35
`Taylor v. Sturgell,
`553 U.S. 880 (2008) ................................................................................... 33, 34
`ii
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`TRW Automotive US LLC v. Magna Elecs. Inc.,
`Case IPR2014-01499, Paper 7 (PTAB Mar. 19, 2015) ..................................... 34
`Unified Patents, Inc. v. Carucel, L.P.,
`IPR2019-01079, Paper 9 (PTAB Nov. 12, 2019) ............................................. 32
`Unified Patents, Inc. v. Realtime Adaptive Streaming, LLC,
`IPR2018-00883, Paper 36 (PTAB Oct. 11, 2018) ............................................ 33
`Ventex Co. v. Columbia Sportswear N. Am., Inc.,
`IPR2017-00651, Paper 148 (PTAB Jan. 24, 2019) ............................... 31, 32, 33
`VirnetX Inc. v. Mangrove Partners Master Fund, Ltd.,
`778 F. App’x 897 (Fed. Cir. 2019) ..................................................................... 1
`VirnetX, Inc. v. Cisco Sys., Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) ........................................................................ 26
`WesternGeco LLC v. ION Geophysical Corp.,
`889 F.3d 1308 (Fed. Cir. 2018) .................................................................. 33, 34
`Wi-Fi One, LLC v. Broadcom Corp.,
`878 F.3d 1364 (Fed. Cir. 2018) (en banc) ........................................................ 28
`Statutes
`35 U.S.C. § 315(b) ......................................................................................... passim
`
`iii
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`I.
`
`Introduction
`
`U.S. Patent No. 7,490,151
`
`In its Final Written Decision (Paper 80, “Final Decision”), the Board
`
`correctly concluded that claims 1, 2, 6-8, and 12-14 of the ’151 patent (“challenged
`
`claims”) are unpatentable. Patent Owner VirnetX Inc. (“VirnetX”) appealed, and
`
`on July 8, 2019, the U.S. Court of Appeals for the Federal Circuit vacated the Final
`
`Decision and remanded for further consideration of certain issues. VirnetX Inc. v.
`
`Mangrove Partners Master Fund, Ltd., 778 F. App’x 897 (Fed. Cir. 2019) (“CAFC
`
`Dec.”). None of those remanded issues warrants the Board reaching a different
`
`determination.
`
`First, Kiuchi anticipates the challenged claims because Kiuchi’s client-side
`
`proxy, acting in concert with the C-HTTP name server, is a “DNS proxy module”
`
`that “determin[es] whether the intercepted DNS request corresponds to a secure
`
`server.” VirnetX no longer disputes that the client-side proxy performs the other
`
`claimed actions. It also is undisputed that the client-side proxy takes different
`
`actions in response to different messages it receives from the C-HTTP name server
`
`based on “whether the intercepted DNS request corresponds to a secure server.”
`
`Thus, to conclude that Kiuchi anticipates the challenged claims, the Board need
`
`only find that the client-side proxy, by requesting, receiving, and evaluating
`
`messages from the C-HTTP name server and then acting accordingly, performs the
`
`claimed “determining” step.
`
`1
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`Second, Kiuchi renders the challenged claims obvious in view of RFC 1034.
`
`Here, the Petition demonstrated that it would have been obvious to modify
`
`Kiuchi’s C-HTTP name server (the “DNS proxy module” in this ground) to
`
`perform standard DNS lookups for non-secure domain requests instead of Kiuchi’s
`
`client-side proxy, which was the only distinction VirnetX or the Federal Circuit
`
`identified between the C-HTTP name server and the claimed “DNS proxy module.”
`
`The record also refutes VirnetX’s waived-on-appeal assertions of secondary indicia
`
`of non-obviousness; it shows not only that this supposed evidence is entitled to no
`
`probative weight, but also that VirnetX showed no nexus to the challenged claims.
`
`And VirnetX’s only other patentability argument relevant to this ground—that the
`
`“client” is supposedly limited to a “user’s computer”—is contrary to the ordinary
`
`meaning of this term and the intrinsic evidence.
`
`Finally, nothing supports VirnetX’s challenge to Mangrove’s compliance
`
`with § 315(b). VirnetX’s latest theory appears to be that third-party RPX
`
`Corporation (“RPX”) and/or Petitioner Apple are co-conspirators who directed
`
`Mangrove to file this IPR at their behest. The additional discovery granted of
`
`Mangrove conclusively disproves this theory: RPX had absolutely no involvement
`
`in Mangrove’s filings and Mangrove’s separate RPX stock purchases were
`
`unrelated to this proceeding. There is simply no RPI or privy relationship between
`
`2
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`Mangrove and RPX or Apple that could implicate § 315(b). Thus, the Board
`
`should again find the challenged claims unpatentable.
`
`II. The Federal Circuit’s Decision
`
`The Board’s Final Decision found every challenged claim in the ’135 patent
`
`unpatentable. VirnetX appealed to the Federal Circuit, and advanced both
`
`procedural and patentability arguments. See Br. for Appellant VirnetX Inc., No.
`
`2017-1368, Dkt. No. 45 (Fed. Cir. Apr. 2, 2018) (“PO CAFC Br.”); Reply Br. for
`
`Appellant VirnetX Inc., No. 2017-1368, Dkt. No. 70 (Fed. Cir. June 19, 2018)
`
`(“PO CAFC Reply Br.”). The Federal Circuit’s decision dismissed many of these
`
`arguments, but vacated the Board’s final decision and remanded for the Board to
`
`address a limited number of issues.
`
`A. VirnetX’s Patentability Arguments for the ’151 Patent
`
`VirnetX advanced numerous arguments why it believed Kiuchi did not
`
`anticipate the challenged claims. See Paper 54 (“Resp.”), 12-27; Paper 76 (“Sur-
`
`Reply”), 2-10. On appeal, however, VirnetX advanced only three.
`
`First, VirnetX contended that the Board erred by finding Kiuchi’s C-HTTP
`
`name server alone met the “DNS proxy module” requirement. See PO CAFC Br.
`
`31-37. The Court addressed this contention, concluding that “the Board relied on
`
`only the C-HTTP name server to perform the functions of the DNS proxy module,”
`
`and then found it “does not forward a DNS request to a DNS function” as claimed.
`
`3
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`CAFC Dec. 906. The Court concluded that “[t]he Board could not have found that
`
`the client-side proxy corresponds to the claimed ‘client’ and is also part of the
`
`DNS proxy module, as the claim makes clear that these are separate components.”
`
`Id. The Court confirmed, however, that Petitioners had alternatively relied on
`
`Kiuchi’s client-side proxy working in concert with the C-HTTP name server, and
`
`that VirnetX had adequate notice and opportunity to respond to that mapping of the
`
`prior art to the claims. Id., 905-06.
`
`Second, the Court found the Board’s final decision unclear as to Kiuchi’s
`
`mapping to the “client” and “secure server” claim elements. Id., 906-08. Although
`
`Petitioners argued the Board made alternative findings—the “client” was either the
`
`user agent or client-side proxy and the “secure server” was either the server-side
`
`proxy or origin server—the Court found “no clear indication that [the Board’s
`
`decision] meant to [make] alternative findings.” Id., 907. Instead, the Court found
`
`that the Board’s decision was not supported by substantial evidence because the
`
`Board did not clearly identify which components in Kiuchi met the “client” or
`
`“secure server” limitations. Id., 907-08. Notably, the Court did not determine
`
`whether any individual component in Kiuchi satisfied the claimed “client” or
`
`“secure server.” See id., 906-08.
`
`
`
`
`
`4
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`Third, the Court found that, “[t]o the extent the Board intended to rely
`
`exclusively on Kiuchi’s client-side proxy for the claimed ‘client,’ … the Board
`
`erred in failing to resolve the claim construction dispute as to the meaning of
`
`‘client.’” Id., 908. The Court specifically referenced VirnetX’s proposed
`
`construction of “client” as being “a user’s computer, not any device that is
`
`associated with a user, however indirectly,” and directed the Board on remand to
`
`“analyz[e] the language of [VirnetX’s] proposed construction ….” Id.
`
`Finally, VirnetX argued the Board’s obviousness findings were deficient and
`
`only relevant to claim limitations not at issue in the appeal. PO CAFC Br. 43-44.
`
`The Court found instead that the Board had not sufficiently analyzed Petitioners’
`
`obviousness grounds, and that, “[o]n remand, the Board should consider
`
`Petitioners’ obviousness challenges in light of this opinion.” CAFC Dec. 908.
`
`B. VirnetX’s Procedural Arguments
`
`The Federal Circuit also addressed VirnetX’s procedural objections. First, it
`
`rejected VirnetX’s assertion that Petitioner Apple’s joinder to these proceedings
`
`violates 35 U.S.C. § 315(b). CAFC Dec. 901-03. The Court found the issue raised
`
`by VirnetX to be, at most, harmless error, and “decline[d] to decide whether
`
`Apple’s joinder was permitted under § 315(b)-(c) because VirnetX has not
`
`demonstrated that it was prejudiced by Apple’s involvement.” Id., 901; see, e.g.,
`
`5
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`National Ass’n of Home Builders v. Defenders of Wildlife, 551 U.S. 644, 659-660
`
`(2007).
`
`The Court also found that substantial evidence supported the Board’s
`
`conclusion that Mangrove Partners Hedge Fund was not an RPI. Id., 902-03. The
`
`Court noted that even if the hedge fund was an RPI, nothing prevented Petitioner
`
`Mangrove from curing noncompliance with § 312(a)(2) given that the hedge fund
`
`is not time-barred under § 315(b). Id., 903.
`
`Finally, the Court found that “the Board abused its discretion by refusing to
`
`allow VirnetX to … file a motion for additional discovery into the connection
`
`between Mangrove and RPX.” Id., 904; see PO CAFC Br. 64. The Court did not,
`
`however, “express a view on the merits of such a motion should VirnetX file one
`
`on remand.” CAFC Dec. 904.
`
`III. Claim Construction of “Client”
`
`As the Federal Circuit observed, the Board should “resolve the claim
`
`construction dispute as to the meaning of ‘client’” as it pertains to Petitioners’
`
`obviousness ground (i.e., where Kiuchi’s client-side proxy is the “client”). See
`
`CAFC Dec. 908. Petitioners’ anticipation argument does not implicate this issue—
`
`there, the user agent is the “client.”
`
`Based on its ordinary meaning and use throughout the ’151 patent, a “client”
`
`is “a device, computer, system, or program from which a data request to a server is
`
`6
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`generated.” Paper 5 (“Pet.”) at 15.2 As Dr. Guerin explained, a skilled person
`
`would have understood a “client” to refer to the conventional client component of a
`
`client/server architecture.3 Ex. 1003, ¶16; Ex. 1014, 5. Both experts agreed that a
`
`skilled person would have understood a conventional “client” to be any application
`
`that generates a request for data from a server. Ex. 1003, ¶16; Ex. 1036, 97:8-15,
`
`101:1-10. And that is precisely how the ’151 patent uses the term—it repeatedly
`
`uses “client” to mean any “client application” (including a “web browser”) that
`
`makes requests for information from a server. Ex. 1001, 37:6-10, 37:51-54.
`
`VirnetX nonetheless contended that the ’151 patent equates a “client” with a
`
`“user’s computer.” Resp. 8-10. That is incorrect for several reasons.
`
`First, as Dr. Monrose testified, the ’151 patent did not expressly redefine the
`
`term “client” to have a meaning different from its plain and ordinary meaning. See
`
`
`
`2 The Petition in the proceeding involving the related ’135 patent proposed that a
`
`“client computer” be construed as a “computer from which a data request to a
`
`server is generated.” IPR2015-01046, Paper 5 at 16. Here, the claims do not
`
`require that the “client” be a computer.
`
`3 Numerous dictionaries confirm Dr. Guerin’s opinion, including ones cited by
`
`VirnetX. Ex. 2028, 3; Ex. 1014, 5; Ex. 1037, 11; Ex. 1043, 88; accord IPR2014-
`
`00404, Paper 42, 8-9.
`
`7
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`Ex. 1036, 74:15-75:16, 95:1-6. VirnetX also has not contended that any
`
`prosecution history caused this term to have a special meaning. See Resp. 8-10. It
`
`would thus be legal error to interpret “client” differently from what both experts
`
`testified was its plain and ordinary meaning. Ex. 1003, ¶16; Ex. 1036, 97:8-15,
`
`101:1-10.
`
`Second, VirnetX’s assertion that “client” means only a “user’s computer” is
`
`contrary to the intrinsic record. When the ’151 patent refers to a user or a user’s
`
`computer, it uses those terms explicitly, expressly distinguishing the “user’s
`
`computer” from a “conventional client,” noting that the latter can be included in
`
`the former. Ex. 1001, Fig. 26 (item 2601), 37:51-52 (“A user’s computer 2601
`
`includes a 15 conventional client (e.g., a web browser) 2605 …”); 37:1-2; 38:54-
`
`57 (“The user's security level can also be determined by transmitting a request
`
`message back to the user’s computer …”); 38:59-66 (“…in step 2706 a secure
`
`VPN is established between the user’s computer and the secure target site… by
`
`allocating a hopping regime that will be carried out between the user’s computer
`
`and the secure target site…”); 44:8-11.4 Thus, the ’151 patent does not use “client”
`
`synonymously with “user’s computer”—when it refers to the “user’s computer” it
`
`
`
`4 All emphasis added unless otherwise noted.
`
`8
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`does so explicitly, and when it refers to “client” or “client computer,” it uses those
`
`terms with their ordinary meaning. Id., Fig. 26.
`
`Finally, the ’151 patent describes several embodiments where a VPN is
`
`initiated by a “client” that is not running on a computer portrayed as being
`
`operated by a user. For example, the ’151 patent discloses embodiments where a
`
`VPN is established between two computers described simply as a first and second
`
`computer and not showing any user involvement, (id., 31:26-33, 35:65-67, Figs.
`
`20, 24), as well as examples that refer only to two “host computer[s]” (id., 39:63-
`
`66, Figs. 28, 29). Those examples reinforce that a “client” can be, consistent with
`
`its ordinary meaning, simply the application on a computer that generates a request
`
`for data from a server, and does not have to be a “user’s” computer or a computer
`
`being operated by a user. See IPR2014-00404, Paper 42, 15-16.
`
`IV. The Challenged Claims Are Unpatentable
`
`The Petition demonstrated that Kiuchi anticipates and, alternatively in view
`
`of at least RFC 1034, renders obvious each of the challenged claims of the ’151
`
`patent. Pet. 16-58.5 The complete record fully supports those grounds and shows
`
`that VirnetX’s arguments to the contrary are meritless. And any such arguments
`
`
`
`5 On appeal, VirnetX addressed claim 1 and did not advance separate arguments
`
`for the other challenged claims. Thus, Petitioners’ analysis focuses on claim 1.
`
`9
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`must be limited to those VirnetX raised in its Patent Owner Response (Paper 48),
`
`Sur-Reply (Paper 76), or CAFC Appeal Brief. See Paper 12, 3.
`
`A. Kiuchi Anticipates the Challenged Claims
`
`VirnetX has contended that Kiuchi cannot anticipate because it does not
`
`disclose a “DNS proxy module” that performs the three actions recited in claim 1.
`
`That contention cannot be reconciled with Kiuchi’s actual disclosure, and rests on
`
`mischaracterizations of Kiuchi as well as Petitioners’ arguments.
`
`1.
`
`Overview of Petitioners’ Anticipation Mapping
`
`Petitioners’ anticipation challenge is explained in the Petition and Reply and
`
`supported by testimony from Dr. Guerin. See Pet. 25-37; Ex. 1003, ¶¶17-31; Reply
`
`3-16. As the Petition explains, Kiuchi’s user agent (the “client”) generates a
`
`request (a “DNS request”) that includes a URL that contains, inter alia, a
`
`hostname. Ex. 1002, 65 (§2.3); Pet. 25-28. Kiuchi’s client-side proxy (the “DNS
`
`proxy module”) receives the request, and, working in concert with the C-HTTP
`
`name server, determines whether the request corresponds to a server-side proxy
`
`and its origin server (each alternatively a “secure server”). Pet. 28-29. If it does, a
`
`C-HTTP connection is established; otherwise, the client-side proxy forwards the
`
`request to a conventional domain name service for resolution. Pet. 29-32. This
`
`process and mapping is illustrated below:
`
`10
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`
`
`See Ex. 1003, ¶24 (annotated); Pet. 25-37.
`
`More specifically, Kiuchi’s client-side proxy is a program installed on a
`
`firewall (“[a] data processing device, comprising memory storing a domain name
`
`server (DNS) proxy module”) that intercepts requests for resources sent from a user
`
`agent (“client”). Ex. 1002, 65 (§2.2); Pet. 25-26. These requests are “DNS
`
`Requests” because they request a resource corresponding to a hostname. Pet. 26;
`
`Ex. 1003, ¶¶21-22.
`
`The client-side proxy will then, in concert with the C-HTTP name server,
`
`determine if the request corresponds to a secure server (i.e., the server-side proxy
`
`and its associated origin server). Pet. 27-28. It does this by asking the C-HTTP
`11
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`name server if “the requested server-side proxy [associated with the hostname] is
`
`registered in the closed network.” Ex. 1002, 65 (§2.3); Ex. 1003, ¶¶22-26. If it is,
`
`then the client-side proxy receives, from the C-HTTP name server, “the IP address
`
`and public key of the server-side proxy and both request and response Nonce
`
`values.” Ex. 1002, 65 (§2.3); Pet. 29. Alternatively, if the C-HTTP name server
`
`determines that the server-side proxy associated with the origin server is not
`
`registered in the closed network, then the client-side proxy receives a “status code
`
`which indicates an error.” Ex. 1002, 65 (§2.3); Pet. 29-30. Depending on which of
`
`these responses it has received from the C-HTTP name server, the client-side
`
`proxy will “determin[e]” whether to forward the request to a conventional DNS or
`
`whether to initiate a secure C-HTTP connection. Ex. 1002, 65 (§2.3); Pet. 29-30.
`
`By requesting the C-HTTP name server to evaluate whether the hostname in
`
`the request is registered in the closed network and then taking action based on the
`
`response it receives, the client-side proxy “determines” whether the DNS request
`
`“corresponds to a secure server.” If the client-side proxy receives “the IP address
`
`and public key of the server-side proxy and both request and response Nonce
`
`values” (“(iii) when the intercepted DNS request corresponds to a secure server”),
`
`it establishes an encrypted C-HTTP connection which allows the user agent and
`
`origin server to securely communicate (“automatically initiating an encrypted
`
`channel between the client and the secure server”). Ex. 1002, 65 (§§2.2-2.3); Pet.
`
`12
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`29-31; Ex. 1003, ¶¶23-31. Alternatively, if the client-side proxy receives a “status
`
`code which indicates an error” (“(ii) when the intercepted DNS request does not
`
`correspond to a secure server”), then it will then behave like an ordinary HTTP
`
`proxy by “perform[ing] DNS lookup” via standard DNS functionality (“forwarding
`
`the DNS request to a DNS function that returns an IP address of a nonsecure
`
`computer”). Ex. 1002, 65 (§2.3); Pet. 29-30; Ex. 1003, ¶23.
`
`2.
`
`VirnetX’s Assertions that Kiuchi Does Not Disclose a “DNS
`Proxy Module” Are Incorrect
`
`In its appeal, VirnetX contended that the Board erred by finding Kiuchi’s C-
`
`HTTP name server by itself met the “DNS proxy module” element of the claims.
`
`PO CAFC Br. 31-37. The Federal Circuit agreed, but noted that Petitioners had
`
`contended that Kiuchi’s client-side proxy working in conjunction with the C-HTTP
`
`name server met this “DNS proxy module” claim element. CAFC Dec. 905-06.
`
`VirnetX has advanced several contentions why this latter mapping does not
`
`disclose the claimed “DNS proxy module.” See Resp. 17; Sur-Reply 8-10. None
`
`has merit.
`
`VirnetX first contended that “it is the C-HTTP name server, not the client-
`
`side proxy, that examines whether the server-side proxy is registered in the closed
`
`network.” Resp. 17. But it is Kiuchi’s client-side proxy that asks the C-HTTP
`
`name server if “the requested server-side proxy [associated with the hostname] is
`
`registered in the closed network” and then, based on the response it receives, will
`13
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`or will not establish a secure connection. Ex. 1002, 65 (§2.3); Pet. 28-29; Ex. 1003,
`
`¶¶23-24. Thus, if the client-side proxy receives, from the C-HTTP name server,
`
`“the IP address and public key of the server-side proxy and both request and
`
`response Nonce values,” then it will establish a secure connection to the server-
`
`side proxy; if it receives a “status code which indicates an error,” then it will not.
`
`Ex. 1002, 65 (§2.3); Pet. 29. Kiuchi’s client-side proxy (acting in concert with the
`
`C-HTTP name server) thus “determin[es] whether the intercepted DNS request
`
`corresponds to a secure server” based on the response it receives from the C-
`
`HTTP name server and takes actions based on that determination. Ex. 1002, 65
`
`(§2.3); Pet. 26-30. And nothing in the claims precludes Kiuchi’s client-side proxy
`
`from working with another component of Kiuchi’s system—the C-HTTP name
`
`server—to perform this determination.6
`
`VirnetX next argued that the “client-side proxy and C-HTTP name server
`
`play distinct roles in Kiuchi’s system,” and that Petitioners’ mapping “distort[s] the
`
`functionality of Kiuchi’s arrangement by merging the C-HTTP name server
`
`
`
`6 The ’151 patent expressly contemplates this type of distributed processing design
`
`to perform the functions of its system. E.g., Ex. 1001, 38:22-35 (indicating
`
`functions can be combined in one computer or distributed across multiple
`
`computers).
`
`14
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`functionalities with the client-side proxy’s functionalities.” Sur-Reply 9-10. There
`
`is no such “merging”—the Petition plainly relied on Kiuchi’s client-side proxy
`
`communicating with and relying on the responses from the C-HTTP name server
`
`to perform the “determining” step. Pet. 28-29. The C-HTTP name server’s purpose
`
`is to provide information to proxy devices that allows each proxy to determine if a
`
`secure connection should be established (i.e., because both the client and the server
`
`are within the same closed network that Kiuchi’s system is managing) or not (i.e.,
`
`because they are not). Ex. 1002, 64-65 (§2.2). The Petition explained that Kiuchi’s
`
`C-HTTP name server is integrally involved in a process that Kiuchi’s client-side
`
`proxy is performing.
`
`Finally, VirnetX argued, and the Federal Circuit agreed, that the client-side
`
`proxy cannot both be a “client” and also part of the “DNS proxy module.” PO
`
`CAFC Reply Br. 9; CAFC Dec. 906. That concern is not implicated by this
`
`anticipation mapping—Kiuchi’s user agent is the “client”; the client-side proxy is
`
`not.
`
`B.
`
`The Challenged Claims Are Obvious over Kiuchi in view of RFC
`1034, With or Without Rescorla
`
`The Petition also demonstrated that the challenged claims would have been
`
`obvious over Kiuchi in view of RFC 1034, with or without the further combination
`
`with Rescorla. Pet. 42-57. The Petition included this RFC 1034 ground to address
`
`potential criticisms VirnetX might levy against the Petition’s anticipation mapping
`15
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`(e.g., that Kiuchi supposedly does not anticipate “because the allegedly ‘wrong’
`
`network entity … has responsibility for a given task”). See Pet. 42. That, of course,
`
`is precisely what VirnetX argued. This ground obviates VirnetX’s criticisms of
`
`Petitioners’ anticipation ground and independently demonstrates that the
`
`challenged claims are unpatentable.
`
`1.
`
`The Modified Kiuchi System Suggested by RFC 1034
`
`The Petition’s RFC 1034 obviousness ground relies on Kiuchi’s client-side
`
`proxy as the “client” and a modified form of the C-HTTP name server as the “DNS
`
`proxy module.” The Petition demonstrated the obviousness of modifying “the
`
`standard/public DNS lookup step performed by the client-side proxy in response to
`
`receiving an error message from the C-HTTP name server” to “instead be
`
`performed by the C-HTTP name server” itself. Pet. 44. As so modified, the C-
`
`HTTP name server meets every requirement of the “DNS proxy module,” and
`
`resolves the only shortcoming identified by the Federal Circuit; namely, that “[t]he
`
`C-HTTP name server does not forward a DNS request to a DNS function, but
`
`rather sends an error message back to what the Board relied on as the claimed
`
`‘client.’” CAFC Dec. 906-07. This modified Kiuchi system, as suggested by RFC
`
`1034, is illustrated below:
`
`16
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`
`
`Ex. 1003, ¶24; Pet. 42-52.
`
`It was well known in the art by early 2000 that various functions of a
`
`computer system could be distributed in different ways among networked
`
`components. Ex. 1003, ¶¶37-43; Pet. 43-46. RFC 1034 shows one example, with
`
`two alternative approaches for name resolution:
`
`In any system that has a distributed database, a particular name server
`may be presented with a query that can only be answered by some
`other server. The two general approaches to dealing with this problem
`are “recursive”, in which the first server pursues the query for the
`client at another server, and “iterative”, in which the server refers the
`client to another server and lets the client pursue the query.
`
`Ex. 1005, 4; Pet. 44. In the “recursive” approach, a DNS server unable to answer a
`
`request will seek the answer from “some other server ‘closer’ to the answer” and
`
`17
`PETITIONERS’ REMAND BRIEF
`
`

`

`IPR2015-01047
`
`U.S. Patent No. 7,490,151
`
`return that answer to the requesting computer. Ex. 1005, 4, 22. In the “iterative”
`
`approach, the DNS “returns either an error or the answer” to the client making the
`
`request, with an error causing the client to send a request to another DNS. Id.; Ex.
`
`1003, ¶38; Pet. 42. One of ordinary skill would have recognized that Kiuchi’s
`
`client-side proxy (the “client”) uses the “iterative” mode. Pet. 43-44; Ex. 1003,
`
`¶¶23-24, 38. That is because, in response to a request, the C-HTTP name server
`
`responds with either the IP address associated with the server-side proxy or an
`
`error message; if the latter, the client-side proxy then queries a conventional DNS
`
`lookup to resolve the hostname. Ex. 1002, 65 (§2.3); Ex. 1003, ¶18.
`
`As explained by Dr. Guerin and the Petition, a skilled person would have
`
`found it obvious to replace Kiuchi’s “iterative” approach with RFC 1034’s
`
`“recursive” approach by configuring the C-HTTP name server to itself perform a
`
`DNS lookup if it determines that the hostname is not associated with a computer
`
`within the Kiuchi closed network. Pet. 43-44, 47; Ex. 1003, ¶¶38-40. As modified,
`
`the C-HTTP name server would determine whether a host name corresponds to a
`
`server-side proxy registered as part of the C-HTTP closed network. Pet. 44-45; Ex.
`
`1003, ¶40. I

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket