`
`
`
`
`
`
`
`
`Paper No.
`Filed: December 20, 2019
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., and
`BLACK SWAMP IP, LLC,
`Petitioner
`v.
`VIRNETX INC.,
`Patent Owner
`
`
`
`Case IPR2015-010471
`Patent 7,490,151
`
`
`
`
`
`Patent Owner’s Opposition Brief
`
`
`
`
`
`
`1 Apple Inc. and Black Swamp IP, LLC, who filed petitions in IPR2016-00063 and
`IPR2016-00167, respectively, have been joined as a Petitioner in the instant
`proceeding.
`
`
`
`
`
`Case No. IPR2015-01047
`
`
`
`TABLE OF CONTENTS
`Introduction ...................................................................................................... 1
`The Federal Circuit’s Decision ........................................................................ 1
` Claim Construction .......................................................................................... 2
`A.
`“Client” .................................................................................................. 2
`B.
`“Between [A] and [B]” .......................................................................... 9
` Kiuchi Does Not Anticipate Claims 1, 2, 6-8, and 12-14 .............................10
`A. Kiuchi’s System ..................................................................................11
`B.
`Petitioners’ Mapping Fails to Demonstrate Anticipation ...................12
` Kiuchi Combined with RFC 1034, With or Without Rescorla, Does
`Not Render Obvious Claims 1, 2, 6-8, and 12-14 .........................................16
` The Board Should Not Rely on Dr. Guerin’s Testimony ..............................25
` The Board Should Draw an Adverse Inference Regarding the RPI or
`Privity Relationship Between Mangrove and RPX, and Terminate the
`Proceeding .....................................................................................................26
` A New Panel Should Consider this Remand Proceeding To Avoid
`Constitutional Concerns ................................................................................29
` The Proceedings Should Be Terminated in View of 35 U.S.C.
`§ 315(b) ..........................................................................................................29
`Conclusion .....................................................................................................30
`
`
`
`i
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No. IPR2015-01047
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Alexander v. FBI,
`186 F.R.D. 113 (D.D.C. 1998) ........................................................................... 27
`Applications in Internet Time, LLC v. RPX Corp.,
`897 F.3d 1336 (Fed. Cir. 2018) .......................................................................... 28
`Arthrex, Inc. v. Smith & Nephew, Inc.,
`941 F.3d 1320 (Fed. Cir. 2019) .......................................................................... 29
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................ 2
`U.S. v. $671,160.00 in U.S. Currency,
`730 F.3d 1051 (9th Cir. 2013) ............................................................................ 28
`VirnetX Inc. v. Cisco Systems Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) ............................................................ 1, 9, 12, 21
`VirnetX Inc. v. Mangrove Partners Master Fund, Ltd.,
`778 F. App’x 897 (Fed. Cir. 2019) ..............................................................passim
`Statutes
`35 U.S.C. § 315(b) ................................................................................... 2, 28, 29, 30
`35 U.S.C. § 315(c) ..................................................................................................... 2
`
`
`
`
`
`ii
`
`
`
`
`
`
`
`
`
`Case No. IPR2015-01047
`
`Introduction
`Patent Owner VirnetX Inc. (“VirnetX”) respectfully submits that Petitioners
`
`have failed to meet their burden to show that the challenged claims of U.S. Patent
`
`No. 7,490,151 (“the ’151 patent”) are unpatentable. Petitioners’ arguments are
`
`foreclosed by the Federal Circuit’s decision in VirnetX Inc. v. Mangrove Partners
`
`Master Fund, Ltd., 778 F. App’x 897 (Fed. Cir. 2019), and the record evidence in
`
`this proceeding. In fact, the Federal Circuit rejected identical arguments—
`
`addressing the same patent and prior art—in VirnetX Inc. v. Cisco Systems Inc., 767
`
`F.3d 1308, 1323-24 (Fed. Cir. 2014).
`
` The Federal Circuit’s Decision
`The Federal Circuit vacated the Board’s claim constructions, and directed the
`
`Board to construe the term “client.” The Court “agree[d] with VirnetX that the
`
`Board erred in failing to resolve the claim construction dispute as to the meaning of
`
`‘client.’” VirnetX, 778 F. App’x at 908. The Federal Circuit observed that
`
`“VirnetX’s proposed construction [of ‘client’] is a user’s computer, not any device
`
`that is associated with a user, however indirectly,” and instructed the Board to
`
`“analyz[e] the language of [VirnetX’s] proposed construction, which the patent
`
`owner response makes clear does not cover the client-side proxy.” Id.
`
`Because those errors were dispositive of the Board’s anticipation and
`
`obviousness findings, the Federal Circuit vacated those findings and remanded to
`
` 1
`
`
`
`
`
`
`
`
`
`the Board. Id. at 909, 911.
`
`Case No. IPR2015-01047
`
`VirnetX also argued that Apple Inc.’s (“Apple’s”) joinder to these
`
`proceedings violates 35 U.S.C. § 315(b)-(c). The Federal Circuit declined to address
`
`that argument, finding VirnetX had not shown prejudice from Apple’s joinder, but
`
`“le[ft] open the question of whether prejudice could arise” on remand. VirnetX, 778
`
`F. App’x at 901-02. The Federal Circuit also held that the Board erred in denying
`
`VirnetX leave to file a motion seeking additional discovery into the relationship
`
`between Mangrove Partners Master Fund, Ltd. (“Mangrove”) and RPX Corporation
`
`(“RPX”). Id. at 904.
`
` Claim Construction
`“Client”
`A.
`The proper construction of “client” is a “user’s computer.” (PO Response at
`
`8-10.) The claims recite initiating/creating the encrypted/secure channel between a
`
`client and a secure server. (See, e.g., Ex. 1001 at claim 1.) One of ordinary skill in
`
`the art would read “client computer” in the claims in view of the specification—the
`
`“single best guide to the meaning of a disputed term,” Phillips v. AWH Corp., 415
`
`F.3d 1303, 1315 (Fed. Cir. 2005) (en banc). (Ex. 2038 at ¶ 26.) The specification
`
`explains that the claimed inventions allow for secure communications between a
`
`user’s computer and a target computer. Thus, the “Background of the Invention”
`
`describes the importance of securing communications between an originating
`
`
`
`
`2
`
`
`
`
`terminal 100 where a user is located and a destination terminal 110 that hosts a web
`
`Case No. IPR2015-01047
`
`site. (Ex. 1001 at 1:26-42.) The “Summary of the Invention” offers an example
`
`where the originating terminal is a laptop computer used by an executive and that a
`
`destination terminal is a server. (See id. at 4:66-5:19.) The “Detailed Description
`
`of the Invention” explains that a VPN is created between a user’s computer running
`
`a web browser and a secure target site. (See id. at 37:50-38:2.)
`
`The embodiments consistently show that a VPN is established “between [a]
`
`user computer” and a “secure target site.” (See, e.g., Ex. 1001 at 37:66-38:2; 38:60-
`
`61 (“secure VPN is established between the user’s computer and the secure target”);
`
`Ex. 2038 at ¶ 26.) In these embodiments, the “user computer,” which communicates
`
`via VPN with the “target computer,” is the claimed “client.” The specification also
`
`explains that it is the “user’s computer” that performs “client” functions. It explains
`
`that the “user’s computer 2501 includes a client application.” (Ex. 1001 at 37:1-3;
`
`see also id. at 37:51-52 (“[a] user’s computer 2601 includes a conventional client
`
`(e.g., a web browser)”).) It discloses an embodiment that checks whether “client
`
`3103 is a validly registered user” (id. at 44:43-44), and another where “client
`
`computer 801” is shown as a user’s computer, namely a laptop device (id. at 15:61-
`
`62; Fig. 8). In every example, the computer at the other end of the encrypted/secure
`
`channel from the “secure server”—the claimed “client”—is the computer being
`
`operated by the user.
`
`
`
`
`3
`
`
`
`
`
`Case No. IPR2015-01047
`
`The specification also expressly distinguishes the “client” from proxies like
`
`Kiuchi’s client-side proxy. It explains that a “proxy” is something that is “interposed
`
`between client and destination.” (Ex. 1001 at 1:60-64 (emphasis added); see id. at
`
`1:64-65 (distinguishing “proxy” from “originating client”).)
`
`As VirnetX’s expert observed, dictionary definitions confirm that the ordinary
`
`meaning of “client” is consistent with the ’151 patent’s description of the same as a
`
`“user’s computer.” (Ex. 2038 at ¶¶ 27-28.) The dictionary defines “client machine”
`
`as “[a] user’s workstation that is attached to a network.” (Ex. 2028 at 3.) The
`
`definitions for the other client-related terms also unanimously require a user, by
`
`identifying a “client” as a “workstation,” “personal computer,” “user’s machine,” or
`
`“user’s PC”:
`
`Term
`
`Client
`
`Dictionary
`
`A workstation or personal computer in a client/server
`
`environment
`
`Client application
`
`An application running in a workstation or personal
`
`computer on a network
`
`Client based
`
`Refers to hardware or software that runs in the user’s
`
`machine (client)
`
`Client program
`
`Software that runs in the user’s PC or workstation
`
`Client/server
`
`An architecture in which the user’s PC (the client) is the
`
`
`
`
`4
`
`
`
`
`
`
`
`Case No. IPR2015-01047
`
`requesting machine and the server is the supplying
`
`machine[.]
`
`(Id.; see also PO Response at 9-10.) Each of those definitions demonstrates that the
`
`“client,” as used in the ’151 patent, is a user’s computer.2
`
`By contrast, Petitioners’ proposed definition of “client” as a “device,
`
`computer, system, or program from which a data request to a server is generated,”
`
`Pet. at 15; Petitioners’ Remand Brief, Paper 104 at 6-7, finds no support in the text
`
`of the claims or the specification. Petitioners incorrectly characterize expert
`
`testimony when they contend that “[b]oth experts agreed that a skilled person would
`
`
`2 Petitioners’ assertion that “[n]umerous dictionaries … including ones cited by
`
`VirnetX” confirm its position is simply not correct. (Petitioners’ Remand Brief,
`
`Paper 104 at 7 n.3 (citing Exs. 2028, 1014, 1037, 1043).) Exhibit 2028 is discussed
`
`above and repeatedly equates a client with a user’s computer. Exhibit 1014 is an
`
`RFC, not a dictionary. In any event, while Exhibit 1014 defines “client” as “[a]n
`
`application program that establishes connections for the purpose of sending
`
`requests,” it also defines a “user agent” as “[t]he client which initiates a request,”
`
`Ex. 1014 at 5 (emphasis added)—a definition that supports VirnetX’s construction.
`
`Exhibits 1037 and 1043 discuss “client” in a similar manner.
`
`
`
`
`5
`
`
`
`
`have understood a conventional ‘client’ to be any application that generates a request
`
`Case No. IPR2015-01047
`
`for data from a server.” (Petitioners’ Remand Brief, Paper 104 at 7 (citing Ex. 1003
`
`¶ 16; Ex. 1036 at 97:8-15, 101:1-10).) Dr. Monrose mentioned that the term “client
`
`computer” in U.S. Patent No. 6,502,135 (“the ’135 patent”) should be viewed “in
`
`the context of a client/server relationship” (Ex. 1036 at 97:8-15), but emphasized
`
`that, in light of the ’135 patent and the specification’s “repeated references and
`
`connections between the user’s computer and the client computer,” a skilled artisan
`
`would “view[] the client computer as the user’s computer” (Ex. 1036 at 97:1-6).
`
`And Dr. Monrose explained that he provided no opinion on Petitioners’ proposed
`
`construction (Ex. 1036 at 101:1-10), although he observed that it does not reflect the
`
`specification’s “repeated references and connections between the user’s computer
`
`and the client computer” (Ex. 1036 at 97:1-7).
`
`More importantly, Petitioners’ proposed construction would effectively mean
`
`that any device that sends a data request to a server is a “client.” Paradoxically, that
`
`could even include the server itself, which can generally request data from another
`
`server. Such an illogical construction—one that does violence to the claim language
`
`and the specification—cannot be correct.
`
`Petitioners attempt to anchor their proposed construction in the specification,
`
`Petitioners’ Remand Brief, Paper 104 at 8-9, but profoundly misread it. They invoke
`
`the specification’s statement that “[a] user’s computer 2601 includes a conventional
`
`
`
`
`6
`
`
`
`
`client (e.g., a web browser) 2605.” (Ex. 1001 at 37:51-52, quoted in Petitioners’
`
`Case No. IPR2015-01047
`
`Remand Brief, Paper 104 at 8.) That example, however, shows that the “client” is a
`
`“user’s computer,” running applications like web browsers that would run on a
`
`computer being operated by a user, and not on a proxy. It thus supports VirnetX’s
`
`construction, not Petitioners’.3
`
`Petitioners also rely on the specification’s statement that “[t]he user’s security
`
`level can also be determined by transmitting a request message back to the user’s
`
`computer.” (Ex. 1001 at 38:54-57, quoted in Petitioners’ Remand Brief, Paper 104
`
`at 8.) Again, this reference reinforces VirnetX’s proposed construction. The
`
`security level sent back to the “user’s computer” is for a user, and the computer that
`
`receives that message is the computer employed by the user to request information
`
`from the secure target site (e.g., item 2601 depicted in Figure 26). These features
`
`are entirely consistent with those relating to the claimed “client” (defined as a “user’s
`
`computer”) in the context of the claims.
`
`Similarly, the specification’s reference to “a secure VPN [that] is established
`
`
`3 As explained below, infra at Section V, this construction is irreconcilable with
`
`Petitioners’ argument that Kiuchi’s client-side proxy is the claimed “client.” It is
`
`undisputed that Kiuchi’s client-side proxy does not contain any such user-facing
`
`software, such as a browser.
`
`
`
`
`7
`
`
`
`
`between the user’s computer and the secure target site … by allocating a hopping
`
`Case No. IPR2015-01047
`
`regime that will be carried out between the user’s computer and the secure target
`
`site,” Ex. 1001 at 38:59-66, quoted in Petitioners’ Remand Brief, Paper 104 at 8, is
`
`entirely consistent with the features relating to the claimed “client” in the context of
`
`the claims. Here, the specification describes establishment of a VPN between the
`
`user’s computer and the secure target site, but does not distinguish a “client” from a
`
`“user’s computer.” On the contrary, they are described synonymously.
`
`Another portion of the specification Petitioners invoke (Ex. 1001 at 44:8-11,
`
`cited in Petitioners’ Remand Brief, Paper 104 at 8) describes a “Signaling
`
`Synchronizer” embodiment where a large number of users communicate with a
`
`central node. The description of a user’s computer in that portion is again consistent
`
`with that of a “client” as a computer used by a user to access a web site. (See Ex.
`
`1001 at 43:50-65.) Nothing in this portion of the specification draws a distinction
`
`between a user’s computer and a client; instead, the two terms are entirely consistent
`
`with each other.
`
`Petitioners also argue that their construction is supported by embodiments
`
`“where a VPN is initiated by a ‘client’ that is not running on a computer portrayed
`
`as being operated by a user.” (Petitioners’ Remand Brief, Paper 104 at 9.) None of
`
`the embodiments Petitioners invoke support their proposed construction. The first
`
`portion of the specification Petitioners cite (Ex. 1001 at 31:26-33) simply describes
`
`
`
`
`8
`
`
`
`
`Figure 20; it lends no support to Petitioners’ claim that “a VPN is established
`
`Case No. IPR2015-01047
`
`between two computers described simply as a first and second computer and not
`
`showing any user involvement” (Petitioners’ Remand Brief, Paper 104 at 9). This
`
`portion of the specification describes routers and an ISP, and does not speak to the
`
`establishment of a VPN. Petitioners’ reference to the next portion of the
`
`specification (Ex. 1001 at 35:65-67) is equally unavailing. This portion refers to
`
`Figure 24, and describes use of routers to assist in communications between
`
`computers 2401 and 2402. Nothing in this disclosure describes the claimed VPN.
`
`VirnetX’s proposed construction is further reinforced by relevant extrinsic
`
`evidence from the proceedings in the parallel district-court litigation. There,
`
`Petitioner Apple’s own expert acknowledged that Kiuchi’s user agent—i.e., the web
`
`browser operated by the user, not the client-side proxy—“would be read naturally as
`
`a client computer.” Ex. 2048 at 50:7-24; VirnetX, 767 F.3d at 1324.
`
`For these reasons, the Board should construe the claimed term “client” as a
`
`“user’s computer.
`
`“Between [A] and [B]”
`B.
`Claims 1, 2, 6-8, and 12-14 all include a phrase written in the form “between
`
`[A] and [B].” In related district court proceedings, Patent Owner’s adversaries
`
`argued that “between [A] and [B]” should be construed as “extending from [A] to
`
`[B].” (See, e.g., Ex. 2031 at 25-26.) The district court reached the same
`
`
`
`
`9
`
`
`
`
`construction. (See, e.g., Ex. 2029 at 26.) This construction is supported by the
`
`Case No. IPR2015-01047
`
`claims and the specification. (Ex. 2038 at ¶¶ 29-30.) For example, claim 1 recites
`
`“automatically initiating an encrypted channel between the client and the secure
`
`server.” (Ex. 1001 at 46:66-67 (emphasis added).) The specification explains that
`
`security and anonymity should be provided all the way from an originating terminal
`
`to a destination terminal. (Id. at 1:30-48.) As Petitioner Apple has previously
`
`recognized, if “between [A] and [B]” does not mean “extending from [A] to [B],”
`
`“the entire security objective of the patents would be undermined because there
`
`would be unprotected gaps along the way.” (Ex. 2031 at 22.)4
`
` Kiuchi Does Not Anticipate Claims 1, 2, 6-8, and 12-14
`“Anticipation requires that ‘every element and limitation of the claimed
`
`invention must be found in a single prior art reference, arranged as in the claim.’”
`
`VirnetX, 778 F. App’x at 907 (quoting Brown v. 3M, 265 F.3d 1349, 1351 (Fed. Cir.
`
`2001)). Petitioners attempt to contort Kiuchi to support their arguments, but Kiuchi
`
`is a fundamentally different system than that required by challenged claims 1, 2, 6-
`
`
`4 While the Board previously noted that “claim 1 does not recite ‘end-to-end
`
`encryption’ or that encryption must extend to the user agent,” (Paper 80 at 9),
`
`resolution of the construction was not relevant under the Board’s prior client-side
`
`proxy to server-side proxy mapping.
`
`
`
`
`10
`
`
`
`
`8, and 12. Because Kiuchi does not disclose each and every feature of claims 1, 2,
`
`Case No. IPR2015-01047
`
`6-8, and 12, it cannot anticipate these claims.
`
`A. Kiuchi’s System
`The Federal Circuit provided a detailed description of how Kiuchi works. As
`
`an initial matter, “[i]ts system consists of five relevant elements: a user agent (also
`
`referred to as a client), a client-side proxy, a C-HTTP name server, a server-side
`
`proxy, and an origin server.” VirnetX, 778 F. App’x at 905. “The user agent and
`
`client-side proxy communicate behind one firewall, and the origin server and server-
`
`side proxy communicate behind another.” Id. “When the user agent requests access
`
`to a host, the client-side proxy asks the C-HTTP name server whether it can
`
`communicate with that host,” which causes “[t]he C-HTTP name server to check[]
`
`whether the server-side proxy associated with that host is registered on the network
`
`and is permitted to accept the connection from the client-side proxy.” Id. “If [the
`
`C-HTTP name server] determines the communication is not permitted, it returns an
`
`error code to the client-side proxy, which then acts as a typical DNS.” Id. On the
`
`other hand, “[i]f the communication is permitted, the C-HTTP name server sends the
`
`server-side proxy’s information to the client-side proxy, which then sends a
`
`connection request to the server-side proxy.” Id. “The server-side proxy similarly
`
`communicates with the C-HTTP server to verify the request,” and then, “[o]nce
`
`verified, a connection between the client-side and server-side proxies is established,
`
`
`
`
`11
`
`
`
`
`and communication occurs over a secure, encrypted protocol.” Id. “All encryption
`
`Case No. IPR2015-01047
`
`and decryption occur at the proxies, and the user agent and origin server receive the
`
`relevant decrypted information from their respective proxies.” Id.
`
`As the Federal Circuit explained, Kiuchi discloses three separate links: the
`
`“user agent and client-side proxy communicate” via one link, and “the origin server
`
`and server-side proxy communicate” via another. 778 F. App’x at 905. Then, there
`
`is a third “secure, encrypted” “connection between the client-side and server-side
`
`proxies.” Id.; see id. (user agent and origin server “receive . .. information” not from
`
`each other, but “from their respective proxies”); see also VirnetX, 767 F.3d at 1325
`
`(“Kiuchi’s client-side and server-side proxies terminate the connection, process
`
`information, and create a new connection”).
`
`Petitioners’ Mapping Fails to Demonstrate Anticipation
`B.
`The Federal Circuit found on appeal that “substantial evidence does not
`
`support the Board’s finding of anticipation of claims 1-2, 6-8, and 12-14 of the ’151
`
`based on Kiuchi.” VirnetX, 778 F. App’x at 911. Petitioners nonetheless ask for a
`
`second bite at the apple and argue that Kiuchi can anticipate if its client-side proxy
`
`is mapped to the claimed “DNS proxy module.” (Petitioners’ Remand Brief, Paper
`
`104 at 10.) For context, as the Federal Circuit observed, this is a mapping that
`
`Petitioners originally offered in their Petition, but later abandoned on reply. VirnetX,
`
`
`
`
`12
`
`
`
`
`778 F. App’x at 906.5 It does not appear the Federal Circuit even intended for
`
`Case No. IPR2015-01047
`
`anticipation to be revisited, as the Federal Circuit did not instruct the Board to do so,
`
`and instead instructed the Board to “consider Petitioners’ obviousness challenges in
`
`light of this opinion.” VirnetX, 778 F. App’x at 908. Petitioners’ rediscovered
`
`mapping suffers from much of the same problems as those in the mapping rejected
`
`by the Federal Circuit and cannot withstand scrutiny.
`
`First, in finding that substantial evidence did not support the Board’s finding
`
`of anticipation, the Federal Circuit provided critical guidance. In particular, it
`
`explained that
`
`the DNS proxy module
`that
`[t]he claims require
`“forward[s] the DNS request to a DNS function that
`returns an IP address of a nonsecure computer” “when the
`
`
`5 Petitioners seem to hesitate on their basis since, at one point, they suggest they are
`
`relying on the combination of Kiuchi’s client-side proxy and C-HTTP name server.
`
`(Petitioners’ Remand Brief, Paper 104 at 13.) However, all of the analysis presented
`
`by Petitioners focuses solely on attempting to show that Kiuchi’s client-side proxy
`
`can be mapped to the claimed “DNS proxy module.” (See id. at 10-15; see also id.
`
`at 15 (contending that “[t]here is no such ‘merging’”).) As such, any subsequent
`
`attempt by Petitioners to rely on the combination in these remand proceedings should
`
`be rejected.
`
`
`
`
`13
`
`
`
`
`
`Case No. IPR2015-01047
`
`intercepted DNS request does not correspond to a secure
`server.” That is not how Kiuchi’s system works. Instead,
`if a connection between the client-side and server-side
`proxies is not permitted, the C-HTTP name server sends
`an error status to the client-side proxy. … Upon receipt,
`the client-side proxy “performs DNS lookup, behaving
`like an ordinary HTTP/1.0 proxy.” … The C-HTTP name
`server does not forward a DNS request to a DNS function,
`but rather sends an error message back to what the Board
`relied on as the claimed “client.”
`
`VirnetX, 778 F. App’x at 906-07 (emphasis added). Kiuchi’s client-side proxy fares
`
`no better. Indeed, Petitioners do not even attempt to explain how the client-side
`
`proxy “forward[s] the DNS request to a DNS function that returns an IP address of
`
`a nonsecure computer,” as recited in all of the independent claims. It does not.
`
`Rather, as the Federal Circuit observed, Kiuchi simply discloses that “[i]f the client-
`
`side proxy receives an error status, then it performs DNS lookup, behaving like an
`
`ordinary HTTP/1.0 proxy.” (Ex. 1002 at 8.) Just like the Federal Circuit observed
`
`with respect to the C-HTTP name server, there is no disclosure of any forwarding of
`
`the DNS request to a DNS function. This is fatal to Petitioners’ position and supports
`
`a finding that Petitioners failed to meet their burden to prove anticipation.
`
`Second, Kiuchi’s client-side proxy does not disclose “determining whether
`
`[the/a] [intercepted DNS request / DNS request sent by a client] corresponds to a
`
`
`
`
`14
`
`
`
`
`secure server,” as recited in all of the independent claims. Indeed, Petitioners only
`
`Case No. IPR2015-01047
`
`point to operations performed by the C-HTTP name server—which the Federal
`
`Circuit said cannot map to the DNS proxy module—to show that this “determining”
`
`step is performed by the DNS proxy module. (See, e.g., Petitioners’ Remand Brief,
`
`Paper 104 at 11-12.) And while Petitioners appear to suggest that the C-HTTP name
`
`server’s determination can be imputed to the client-side proxy because the client-
`
`side proxy receives information responsive to the C-HTTP name server’s
`
`determination, Petitioners cite no legal support for that contention. (Id. at 12-13.)
`
`Indeed, the Board appears to have previously agreed that only the C-HTTP name
`
`server performs an operation that it believed could map to the claimed
`
`“determining.” (Final Written Decision, Paper 80 at 8-9.)
`
`Third, Petitioners’ anticipation-based mapping suffers from yet another
`
`problem. Claims 1 and 7 require “an encrypted channel between the client and the
`
`secure server,” and claim 13 similarly requires “a secure channel between the client
`
`and the secure server.” Kiuchi, however, only discloses a C-HTTP link between the
`
`client-side proxy and the server-side proxy. (See, e.g., Ex. 2039 at 19:7-18
`
`(Petitioners’ expert admitting that “the client-side proxy and the server-side proxy
`
`are communicating using C-HTTP, and you have user agent and origin servers that
`
`are only running HTTP/1.0”), 21:3-7 (Petitioners’ expert admitting that the
`
`“encrypted communications in the C-HTTP connection between the proxies . . .
`
`
`
`
`15
`
`
`
`
`doesn’t extend past [the] proxies to the origin server or the user agent”).) Indeed,
`
`Case No. IPR2015-01047
`
`Kiuchi explains that its “approach is aimed at assuring proxy-proxy security” and is
`
`“fundamentally different” from “[o]ther secure protocols [that] are designed to be
`
`implemented in origin servers and user agents in order to assure ‘end-to-end’
`
`security protection.” (Ex. 1002 at 10-11.) Kiuchi discourages end-to-end
`
`encryption, from a client to a target device, so that “no end-user has any chance to
`
`obtain keys for encryption or decryption” and compromise security. (Id. at 11.) As
`
`such, Kiuchi cannot disclose the claimed “[encrypted/secure] channel between the
`
`client and the secure server.”6 Petitioners’ analysis comes down to the bare assertion
`
`that Kiuchi “establishes an encrypted C-HTTP connection which allows the user
`
`agent and origin server to securely communicate.” (Petitioners’ Remand Brief,
`
`Paper 104 at 12-13.) Kiuchi’s C-HTTP connection, however, does not extend
`
`between the user agent and origin server. (Ex. 1002 at 11 (“C-HTTP-based
`
`communication is performed only between two types of C-HTTP proxies and
`
`between a C-HTTP proxy and C-HTTP name server.”).) For this additional reason,
`
`Petitioners failed to meet their burden to demonstrate anticipation by Kiuchi.
`
` Kiuchi Combined with RFC 1034, With or Without Rescorla, Does Not
`Render Obvious Claims 1, 2, 6-8, and 12-14
`Petitioners’ obviousness-based mapping suffers from even more problems
`
`
`6 Petitioners rely on encryption to address the limitations of claim 13.
`
`
`
`
`16
`
`
`
`
`than their anticipation-based mapping, and likewise cannot support a finding of
`
`Case No. IPR2015-01047
`
`unpatentability of the challenged claims.
`
`First, Petitioners’ acknowledge that their “obviousness ground relies on
`
`Kiuchi’s client-side proxy as the ‘client’.” (Petitioners’ Remand Brief, Paper 104 at
`
`16; see also id. at 24.) Kiuchi’s client-side proxy is not a “client” under VirnetX’s
`
`construction of the term. Kiuchi does not disclose any user associated with the
`
`client-side proxy; in fact, Petitioner Apple’s own expert admitted so in district court
`
`litigation. (See, e.g., Ex. 2041 at 37:9-18, 43:10-13, 46:16-19, 53:18-23.) Indeed,
`
`Apple’s expert was unequivocal. When asked to confirm that “there’s no user … at
`
`this client-side proxy,” he emphatically stated “No. There’s no user,” and suggested
`
`only that his opinion could stand because he did not “think that’s needed in the
`
`claims.” (Id. at 53:18-23.) In Kiuchi, the user’s computer is the user agent, not the
`
`client-side proxy. (See, e.g., Ex. 1002 at 8; Ex. 2038 at ¶ 48; see also Ex. 2041 at
`
`50:7-14 (the user agent “would be read naturally as a client computer”).)
`
`Petitioners nonetheless argue that “Kiuchi’s client-side proxy is a ‘client’ even
`
`under VirnetX’s construction.” (Petitioners’ Remand Brief, Paper 104 at 27.)
`
`Specifically, Petitioners argue that “[t]he Board was [previously] correct to
`
`determine that” Kiuchi’s client-side proxy is a client even under VirnetX’s
`
`construction because it is associated with the user agent. (Id.) The Federal Circuit
`
`has already weighed in on this approach and rejected it:
`
`
`
`
`17
`
`
`
`
`
`Case No. IPR2015-01047
`
`The Board declined to explicitly construe “client”
`because, in its view, Kiuchi’s client-side proxy is a client
`even under VirnetX’s construction. But it only reached
`this determination by redefining VirnetX’s proposed
`construction so that the client-side proxy is a “client” as
`long as it is associated with a user. After twisting
`VirnetX’s proposed construction, the Board found that the
`client-side proxy meets this definition because it is
`“associated with” the user agent, which is “associated
`with” a user. … VirnetX’s proposed construction is a
`user’s computer, not any device that is associated with a
`user, however indirectly.
`
`VirnetX, 778 F. App’x at 908.
`
`Petitioners also argue that “Kiuchi’s firewall proxies have ‘users’ in the form
`
`of the ‘administrators of proxies on the firewall.’” (Petitioners’ Remand Brief, Paper
`
`104 at 27.) This is a new argument that Petitioners did not present in their Petition
`
`or their Reply during the original proceeding, and thus is not properly within the
`
`scope of remand. VirnetX would be prejudiced if the Board were to consider this
`
`argument, as VirnetX has had no opportunity to submit evidence (e.g., expert
`
`testimony, documentary evidence, etc.) on the issue. Regardless, Petitioners are
`
`wrong to twist VirnetX’s construction to somehow equate “user” with any “human”
`
`out of context. Any administrator of Kiuchi’s client-side proxy would not be a user
`
`of the claimed system as required by the claims, but rather an administrator for
`
`
`
`
`18
`
`
`
`
`processes associated with the proxy operations. In fact, the one place where Kiuchi
`
`Case No. IPR2015-01047
`
`mentions an administrator, Kiuchi notes that in some cases, “administrators of
`
`proxies on the firewall can not know the contents of any information exchanged.”
`
`(Ex. 1002 at 12.) Thus, Kiuchi distinguishes a user at a user agent, who initiates a
`
`request for information at the origin server, from any potential administrator
`
`associated with a client-side proxy. This point is consistent with the ’151 patent,
`
`which explicitly distinguishes between users and administrators. (Se