throbber

`
`
`
`
`
`
`
`
`Paper No.
`Filed: December 20, 2019
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., and
`BLACK SWAMP IP, LLC,
`Petitioner
`v.
`VIRNETX INC.,
`Patent Owner
`
`
`
`Case IPR2015-010471
`Patent 7,490,151
`
`
`
`
`
`Patent Owner’s Opposition Brief
`
`
`
`
`
`
`1 Apple Inc. and Black Swamp IP, LLC, who filed petitions in IPR2016-00063 and
`IPR2016-00167, respectively, have been joined as a Petitioner in the instant
`proceeding.
`
`

`

`
`
`Case No. IPR2015-01047
`
`
`
`TABLE OF CONTENTS
`Introduction ...................................................................................................... 1
`The Federal Circuit’s Decision ........................................................................ 1
` Claim Construction .......................................................................................... 2
`A.
`“Client” .................................................................................................. 2
`B.
`“Between [A] and [B]” .......................................................................... 9
` Kiuchi Does Not Anticipate Claims 1, 2, 6-8, and 12-14 .............................10
`A. Kiuchi’s System ..................................................................................11
`B.
`Petitioners’ Mapping Fails to Demonstrate Anticipation ...................12
` Kiuchi Combined with RFC 1034, With or Without Rescorla, Does
`Not Render Obvious Claims 1, 2, 6-8, and 12-14 .........................................16
` The Board Should Not Rely on Dr. Guerin’s Testimony ..............................25
` The Board Should Draw an Adverse Inference Regarding the RPI or
`Privity Relationship Between Mangrove and RPX, and Terminate the
`Proceeding .....................................................................................................26
` A New Panel Should Consider this Remand Proceeding To Avoid
`Constitutional Concerns ................................................................................29
` The Proceedings Should Be Terminated in View of 35 U.S.C.
`§ 315(b) ..........................................................................................................29
`Conclusion .....................................................................................................30
`
`
`
`i
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`Case No. IPR2015-01047
`
`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`Alexander v. FBI,
`186 F.R.D. 113 (D.D.C. 1998) ........................................................................... 27
`Applications in Internet Time, LLC v. RPX Corp.,
`897 F.3d 1336 (Fed. Cir. 2018) .......................................................................... 28
`Arthrex, Inc. v. Smith & Nephew, Inc.,
`941 F.3d 1320 (Fed. Cir. 2019) .......................................................................... 29
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ............................................................ 2
`U.S. v. $671,160.00 in U.S. Currency,
`730 F.3d 1051 (9th Cir. 2013) ............................................................................ 28
`VirnetX Inc. v. Cisco Systems Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) ............................................................ 1, 9, 12, 21
`VirnetX Inc. v. Mangrove Partners Master Fund, Ltd.,
`778 F. App’x 897 (Fed. Cir. 2019) ..............................................................passim
`Statutes
`35 U.S.C. § 315(b) ................................................................................... 2, 28, 29, 30
`35 U.S.C. § 315(c) ..................................................................................................... 2
`
`
`
`
`
`ii
`
`

`

`
`
`
`
`
`
`Case No. IPR2015-01047
`
`Introduction
`Patent Owner VirnetX Inc. (“VirnetX”) respectfully submits that Petitioners
`
`have failed to meet their burden to show that the challenged claims of U.S. Patent
`
`No. 7,490,151 (“the ’151 patent”) are unpatentable. Petitioners’ arguments are
`
`foreclosed by the Federal Circuit’s decision in VirnetX Inc. v. Mangrove Partners
`
`Master Fund, Ltd., 778 F. App’x 897 (Fed. Cir. 2019), and the record evidence in
`
`this proceeding. In fact, the Federal Circuit rejected identical arguments—
`
`addressing the same patent and prior art—in VirnetX Inc. v. Cisco Systems Inc., 767
`
`F.3d 1308, 1323-24 (Fed. Cir. 2014).
`
` The Federal Circuit’s Decision
`The Federal Circuit vacated the Board’s claim constructions, and directed the
`
`Board to construe the term “client.” The Court “agree[d] with VirnetX that the
`
`Board erred in failing to resolve the claim construction dispute as to the meaning of
`
`‘client.’” VirnetX, 778 F. App’x at 908. The Federal Circuit observed that
`
`“VirnetX’s proposed construction [of ‘client’] is a user’s computer, not any device
`
`that is associated with a user, however indirectly,” and instructed the Board to
`
`“analyz[e] the language of [VirnetX’s] proposed construction, which the patent
`
`owner response makes clear does not cover the client-side proxy.” Id.
`
`Because those errors were dispositive of the Board’s anticipation and
`
`obviousness findings, the Federal Circuit vacated those findings and remanded to
`
` 1
`
`
`
`
`
`
`

`

`
`the Board. Id. at 909, 911.
`
`Case No. IPR2015-01047
`
`VirnetX also argued that Apple Inc.’s (“Apple’s”) joinder to these
`
`proceedings violates 35 U.S.C. § 315(b)-(c). The Federal Circuit declined to address
`
`that argument, finding VirnetX had not shown prejudice from Apple’s joinder, but
`
`“le[ft] open the question of whether prejudice could arise” on remand. VirnetX, 778
`
`F. App’x at 901-02. The Federal Circuit also held that the Board erred in denying
`
`VirnetX leave to file a motion seeking additional discovery into the relationship
`
`between Mangrove Partners Master Fund, Ltd. (“Mangrove”) and RPX Corporation
`
`(“RPX”). Id. at 904.
`
` Claim Construction
`“Client”
`A.
`The proper construction of “client” is a “user’s computer.” (PO Response at
`
`8-10.) The claims recite initiating/creating the encrypted/secure channel between a
`
`client and a secure server. (See, e.g., Ex. 1001 at claim 1.) One of ordinary skill in
`
`the art would read “client computer” in the claims in view of the specification—the
`
`“single best guide to the meaning of a disputed term,” Phillips v. AWH Corp., 415
`
`F.3d 1303, 1315 (Fed. Cir. 2005) (en banc). (Ex. 2038 at ¶ 26.) The specification
`
`explains that the claimed inventions allow for secure communications between a
`
`user’s computer and a target computer. Thus, the “Background of the Invention”
`
`describes the importance of securing communications between an originating
`
`
`
`
`2
`
`

`

`
`terminal 100 where a user is located and a destination terminal 110 that hosts a web
`
`Case No. IPR2015-01047
`
`site. (Ex. 1001 at 1:26-42.) The “Summary of the Invention” offers an example
`
`where the originating terminal is a laptop computer used by an executive and that a
`
`destination terminal is a server. (See id. at 4:66-5:19.) The “Detailed Description
`
`of the Invention” explains that a VPN is created between a user’s computer running
`
`a web browser and a secure target site. (See id. at 37:50-38:2.)
`
`The embodiments consistently show that a VPN is established “between [a]
`
`user computer” and a “secure target site.” (See, e.g., Ex. 1001 at 37:66-38:2; 38:60-
`
`61 (“secure VPN is established between the user’s computer and the secure target”);
`
`Ex. 2038 at ¶ 26.) In these embodiments, the “user computer,” which communicates
`
`via VPN with the “target computer,” is the claimed “client.” The specification also
`
`explains that it is the “user’s computer” that performs “client” functions. It explains
`
`that the “user’s computer 2501 includes a client application.” (Ex. 1001 at 37:1-3;
`
`see also id. at 37:51-52 (“[a] user’s computer 2601 includes a conventional client
`
`(e.g., a web browser)”).) It discloses an embodiment that checks whether “client
`
`3103 is a validly registered user” (id. at 44:43-44), and another where “client
`
`computer 801” is shown as a user’s computer, namely a laptop device (id. at 15:61-
`
`62; Fig. 8). In every example, the computer at the other end of the encrypted/secure
`
`channel from the “secure server”—the claimed “client”—is the computer being
`
`operated by the user.
`
`
`
`
`3
`
`

`

`
`
`Case No. IPR2015-01047
`
`The specification also expressly distinguishes the “client” from proxies like
`
`Kiuchi’s client-side proxy. It explains that a “proxy” is something that is “interposed
`
`between client and destination.” (Ex. 1001 at 1:60-64 (emphasis added); see id. at
`
`1:64-65 (distinguishing “proxy” from “originating client”).)
`
`As VirnetX’s expert observed, dictionary definitions confirm that the ordinary
`
`meaning of “client” is consistent with the ’151 patent’s description of the same as a
`
`“user’s computer.” (Ex. 2038 at ¶¶ 27-28.) The dictionary defines “client machine”
`
`as “[a] user’s workstation that is attached to a network.” (Ex. 2028 at 3.) The
`
`definitions for the other client-related terms also unanimously require a user, by
`
`identifying a “client” as a “workstation,” “personal computer,” “user’s machine,” or
`
`“user’s PC”:
`
`Term
`
`Client
`
`Dictionary
`
`A workstation or personal computer in a client/server
`
`environment
`
`Client application
`
`An application running in a workstation or personal
`
`computer on a network
`
`Client based
`
`Refers to hardware or software that runs in the user’s
`
`machine (client)
`
`Client program
`
`Software that runs in the user’s PC or workstation
`
`Client/server
`
`An architecture in which the user’s PC (the client) is the
`
`
`
`
`4
`
`

`

`
`
`
`
`Case No. IPR2015-01047
`
`requesting machine and the server is the supplying
`
`machine[.]
`
`(Id.; see also PO Response at 9-10.) Each of those definitions demonstrates that the
`
`“client,” as used in the ’151 patent, is a user’s computer.2
`
`By contrast, Petitioners’ proposed definition of “client” as a “device,
`
`computer, system, or program from which a data request to a server is generated,”
`
`Pet. at 15; Petitioners’ Remand Brief, Paper 104 at 6-7, finds no support in the text
`
`of the claims or the specification. Petitioners incorrectly characterize expert
`
`testimony when they contend that “[b]oth experts agreed that a skilled person would
`
`
`2 Petitioners’ assertion that “[n]umerous dictionaries … including ones cited by
`
`VirnetX” confirm its position is simply not correct. (Petitioners’ Remand Brief,
`
`Paper 104 at 7 n.3 (citing Exs. 2028, 1014, 1037, 1043).) Exhibit 2028 is discussed
`
`above and repeatedly equates a client with a user’s computer. Exhibit 1014 is an
`
`RFC, not a dictionary. In any event, while Exhibit 1014 defines “client” as “[a]n
`
`application program that establishes connections for the purpose of sending
`
`requests,” it also defines a “user agent” as “[t]he client which initiates a request,”
`
`Ex. 1014 at 5 (emphasis added)—a definition that supports VirnetX’s construction.
`
`Exhibits 1037 and 1043 discuss “client” in a similar manner.
`
`
`
`
`5
`
`

`

`
`have understood a conventional ‘client’ to be any application that generates a request
`
`Case No. IPR2015-01047
`
`for data from a server.” (Petitioners’ Remand Brief, Paper 104 at 7 (citing Ex. 1003
`
`¶ 16; Ex. 1036 at 97:8-15, 101:1-10).) Dr. Monrose mentioned that the term “client
`
`computer” in U.S. Patent No. 6,502,135 (“the ’135 patent”) should be viewed “in
`
`the context of a client/server relationship” (Ex. 1036 at 97:8-15), but emphasized
`
`that, in light of the ’135 patent and the specification’s “repeated references and
`
`connections between the user’s computer and the client computer,” a skilled artisan
`
`would “view[] the client computer as the user’s computer” (Ex. 1036 at 97:1-6).
`
`And Dr. Monrose explained that he provided no opinion on Petitioners’ proposed
`
`construction (Ex. 1036 at 101:1-10), although he observed that it does not reflect the
`
`specification’s “repeated references and connections between the user’s computer
`
`and the client computer” (Ex. 1036 at 97:1-7).
`
`More importantly, Petitioners’ proposed construction would effectively mean
`
`that any device that sends a data request to a server is a “client.” Paradoxically, that
`
`could even include the server itself, which can generally request data from another
`
`server. Such an illogical construction—one that does violence to the claim language
`
`and the specification—cannot be correct.
`
`Petitioners attempt to anchor their proposed construction in the specification,
`
`Petitioners’ Remand Brief, Paper 104 at 8-9, but profoundly misread it. They invoke
`
`the specification’s statement that “[a] user’s computer 2601 includes a conventional
`
`
`
`
`6
`
`

`

`
`client (e.g., a web browser) 2605.” (Ex. 1001 at 37:51-52, quoted in Petitioners’
`
`Case No. IPR2015-01047
`
`Remand Brief, Paper 104 at 8.) That example, however, shows that the “client” is a
`
`“user’s computer,” running applications like web browsers that would run on a
`
`computer being operated by a user, and not on a proxy. It thus supports VirnetX’s
`
`construction, not Petitioners’.3
`
`Petitioners also rely on the specification’s statement that “[t]he user’s security
`
`level can also be determined by transmitting a request message back to the user’s
`
`computer.” (Ex. 1001 at 38:54-57, quoted in Petitioners’ Remand Brief, Paper 104
`
`at 8.) Again, this reference reinforces VirnetX’s proposed construction. The
`
`security level sent back to the “user’s computer” is for a user, and the computer that
`
`receives that message is the computer employed by the user to request information
`
`from the secure target site (e.g., item 2601 depicted in Figure 26). These features
`
`are entirely consistent with those relating to the claimed “client” (defined as a “user’s
`
`computer”) in the context of the claims.
`
`Similarly, the specification’s reference to “a secure VPN [that] is established
`
`
`3 As explained below, infra at Section V, this construction is irreconcilable with
`
`Petitioners’ argument that Kiuchi’s client-side proxy is the claimed “client.” It is
`
`undisputed that Kiuchi’s client-side proxy does not contain any such user-facing
`
`software, such as a browser.
`
`
`
`
`7
`
`

`

`
`between the user’s computer and the secure target site … by allocating a hopping
`
`Case No. IPR2015-01047
`
`regime that will be carried out between the user’s computer and the secure target
`
`site,” Ex. 1001 at 38:59-66, quoted in Petitioners’ Remand Brief, Paper 104 at 8, is
`
`entirely consistent with the features relating to the claimed “client” in the context of
`
`the claims. Here, the specification describes establishment of a VPN between the
`
`user’s computer and the secure target site, but does not distinguish a “client” from a
`
`“user’s computer.” On the contrary, they are described synonymously.
`
`Another portion of the specification Petitioners invoke (Ex. 1001 at 44:8-11,
`
`cited in Petitioners’ Remand Brief, Paper 104 at 8) describes a “Signaling
`
`Synchronizer” embodiment where a large number of users communicate with a
`
`central node. The description of a user’s computer in that portion is again consistent
`
`with that of a “client” as a computer used by a user to access a web site. (See Ex.
`
`1001 at 43:50-65.) Nothing in this portion of the specification draws a distinction
`
`between a user’s computer and a client; instead, the two terms are entirely consistent
`
`with each other.
`
`Petitioners also argue that their construction is supported by embodiments
`
`“where a VPN is initiated by a ‘client’ that is not running on a computer portrayed
`
`as being operated by a user.” (Petitioners’ Remand Brief, Paper 104 at 9.) None of
`
`the embodiments Petitioners invoke support their proposed construction. The first
`
`portion of the specification Petitioners cite (Ex. 1001 at 31:26-33) simply describes
`
`
`
`
`8
`
`

`

`
`Figure 20; it lends no support to Petitioners’ claim that “a VPN is established
`
`Case No. IPR2015-01047
`
`between two computers described simply as a first and second computer and not
`
`showing any user involvement” (Petitioners’ Remand Brief, Paper 104 at 9). This
`
`portion of the specification describes routers and an ISP, and does not speak to the
`
`establishment of a VPN. Petitioners’ reference to the next portion of the
`
`specification (Ex. 1001 at 35:65-67) is equally unavailing. This portion refers to
`
`Figure 24, and describes use of routers to assist in communications between
`
`computers 2401 and 2402. Nothing in this disclosure describes the claimed VPN.
`
`VirnetX’s proposed construction is further reinforced by relevant extrinsic
`
`evidence from the proceedings in the parallel district-court litigation. There,
`
`Petitioner Apple’s own expert acknowledged that Kiuchi’s user agent—i.e., the web
`
`browser operated by the user, not the client-side proxy—“would be read naturally as
`
`a client computer.” Ex. 2048 at 50:7-24; VirnetX, 767 F.3d at 1324.
`
`For these reasons, the Board should construe the claimed term “client” as a
`
`“user’s computer.
`
`“Between [A] and [B]”
`B.
`Claims 1, 2, 6-8, and 12-14 all include a phrase written in the form “between
`
`[A] and [B].” In related district court proceedings, Patent Owner’s adversaries
`
`argued that “between [A] and [B]” should be construed as “extending from [A] to
`
`[B].” (See, e.g., Ex. 2031 at 25-26.) The district court reached the same
`
`
`
`
`9
`
`

`

`
`construction. (See, e.g., Ex. 2029 at 26.) This construction is supported by the
`
`Case No. IPR2015-01047
`
`claims and the specification. (Ex. 2038 at ¶¶ 29-30.) For example, claim 1 recites
`
`“automatically initiating an encrypted channel between the client and the secure
`
`server.” (Ex. 1001 at 46:66-67 (emphasis added).) The specification explains that
`
`security and anonymity should be provided all the way from an originating terminal
`
`to a destination terminal. (Id. at 1:30-48.) As Petitioner Apple has previously
`
`recognized, if “between [A] and [B]” does not mean “extending from [A] to [B],”
`
`“the entire security objective of the patents would be undermined because there
`
`would be unprotected gaps along the way.” (Ex. 2031 at 22.)4
`
` Kiuchi Does Not Anticipate Claims 1, 2, 6-8, and 12-14
`“Anticipation requires that ‘every element and limitation of the claimed
`
`invention must be found in a single prior art reference, arranged as in the claim.’”
`
`VirnetX, 778 F. App’x at 907 (quoting Brown v. 3M, 265 F.3d 1349, 1351 (Fed. Cir.
`
`2001)). Petitioners attempt to contort Kiuchi to support their arguments, but Kiuchi
`
`is a fundamentally different system than that required by challenged claims 1, 2, 6-
`
`
`4 While the Board previously noted that “claim 1 does not recite ‘end-to-end
`
`encryption’ or that encryption must extend to the user agent,” (Paper 80 at 9),
`
`resolution of the construction was not relevant under the Board’s prior client-side
`
`proxy to server-side proxy mapping.
`
`
`
`
`10
`
`

`

`
`8, and 12. Because Kiuchi does not disclose each and every feature of claims 1, 2,
`
`Case No. IPR2015-01047
`
`6-8, and 12, it cannot anticipate these claims.
`
`A. Kiuchi’s System
`The Federal Circuit provided a detailed description of how Kiuchi works. As
`
`an initial matter, “[i]ts system consists of five relevant elements: a user agent (also
`
`referred to as a client), a client-side proxy, a C-HTTP name server, a server-side
`
`proxy, and an origin server.” VirnetX, 778 F. App’x at 905. “The user agent and
`
`client-side proxy communicate behind one firewall, and the origin server and server-
`
`side proxy communicate behind another.” Id. “When the user agent requests access
`
`to a host, the client-side proxy asks the C-HTTP name server whether it can
`
`communicate with that host,” which causes “[t]he C-HTTP name server to check[]
`
`whether the server-side proxy associated with that host is registered on the network
`
`and is permitted to accept the connection from the client-side proxy.” Id. “If [the
`
`C-HTTP name server] determines the communication is not permitted, it returns an
`
`error code to the client-side proxy, which then acts as a typical DNS.” Id. On the
`
`other hand, “[i]f the communication is permitted, the C-HTTP name server sends the
`
`server-side proxy’s information to the client-side proxy, which then sends a
`
`connection request to the server-side proxy.” Id. “The server-side proxy similarly
`
`communicates with the C-HTTP server to verify the request,” and then, “[o]nce
`
`verified, a connection between the client-side and server-side proxies is established,
`
`
`
`
`11
`
`

`

`
`and communication occurs over a secure, encrypted protocol.” Id. “All encryption
`
`Case No. IPR2015-01047
`
`and decryption occur at the proxies, and the user agent and origin server receive the
`
`relevant decrypted information from their respective proxies.” Id.
`
`As the Federal Circuit explained, Kiuchi discloses three separate links: the
`
`“user agent and client-side proxy communicate” via one link, and “the origin server
`
`and server-side proxy communicate” via another. 778 F. App’x at 905. Then, there
`
`is a third “secure, encrypted” “connection between the client-side and server-side
`
`proxies.” Id.; see id. (user agent and origin server “receive . .. information” not from
`
`each other, but “from their respective proxies”); see also VirnetX, 767 F.3d at 1325
`
`(“Kiuchi’s client-side and server-side proxies terminate the connection, process
`
`information, and create a new connection”).
`
`Petitioners’ Mapping Fails to Demonstrate Anticipation
`B.
`The Federal Circuit found on appeal that “substantial evidence does not
`
`support the Board’s finding of anticipation of claims 1-2, 6-8, and 12-14 of the ’151
`
`based on Kiuchi.” VirnetX, 778 F. App’x at 911. Petitioners nonetheless ask for a
`
`second bite at the apple and argue that Kiuchi can anticipate if its client-side proxy
`
`is mapped to the claimed “DNS proxy module.” (Petitioners’ Remand Brief, Paper
`
`104 at 10.) For context, as the Federal Circuit observed, this is a mapping that
`
`Petitioners originally offered in their Petition, but later abandoned on reply. VirnetX,
`
`
`
`
`12
`
`

`

`
`778 F. App’x at 906.5 It does not appear the Federal Circuit even intended for
`
`Case No. IPR2015-01047
`
`anticipation to be revisited, as the Federal Circuit did not instruct the Board to do so,
`
`and instead instructed the Board to “consider Petitioners’ obviousness challenges in
`
`light of this opinion.” VirnetX, 778 F. App’x at 908. Petitioners’ rediscovered
`
`mapping suffers from much of the same problems as those in the mapping rejected
`
`by the Federal Circuit and cannot withstand scrutiny.
`
`First, in finding that substantial evidence did not support the Board’s finding
`
`of anticipation, the Federal Circuit provided critical guidance. In particular, it
`
`explained that
`
`the DNS proxy module
`that
`[t]he claims require
`“forward[s] the DNS request to a DNS function that
`returns an IP address of a nonsecure computer” “when the
`
`
`5 Petitioners seem to hesitate on their basis since, at one point, they suggest they are
`
`relying on the combination of Kiuchi’s client-side proxy and C-HTTP name server.
`
`(Petitioners’ Remand Brief, Paper 104 at 13.) However, all of the analysis presented
`
`by Petitioners focuses solely on attempting to show that Kiuchi’s client-side proxy
`
`can be mapped to the claimed “DNS proxy module.” (See id. at 10-15; see also id.
`
`at 15 (contending that “[t]here is no such ‘merging’”).) As such, any subsequent
`
`attempt by Petitioners to rely on the combination in these remand proceedings should
`
`be rejected.
`
`
`
`
`13
`
`

`

`
`
`Case No. IPR2015-01047
`
`intercepted DNS request does not correspond to a secure
`server.” That is not how Kiuchi’s system works. Instead,
`if a connection between the client-side and server-side
`proxies is not permitted, the C-HTTP name server sends
`an error status to the client-side proxy. … Upon receipt,
`the client-side proxy “performs DNS lookup, behaving
`like an ordinary HTTP/1.0 proxy.” … The C-HTTP name
`server does not forward a DNS request to a DNS function,
`but rather sends an error message back to what the Board
`relied on as the claimed “client.”
`
`VirnetX, 778 F. App’x at 906-07 (emphasis added). Kiuchi’s client-side proxy fares
`
`no better. Indeed, Petitioners do not even attempt to explain how the client-side
`
`proxy “forward[s] the DNS request to a DNS function that returns an IP address of
`
`a nonsecure computer,” as recited in all of the independent claims. It does not.
`
`Rather, as the Federal Circuit observed, Kiuchi simply discloses that “[i]f the client-
`
`side proxy receives an error status, then it performs DNS lookup, behaving like an
`
`ordinary HTTP/1.0 proxy.” (Ex. 1002 at 8.) Just like the Federal Circuit observed
`
`with respect to the C-HTTP name server, there is no disclosure of any forwarding of
`
`the DNS request to a DNS function. This is fatal to Petitioners’ position and supports
`
`a finding that Petitioners failed to meet their burden to prove anticipation.
`
`Second, Kiuchi’s client-side proxy does not disclose “determining whether
`
`[the/a] [intercepted DNS request / DNS request sent by a client] corresponds to a
`
`
`
`
`14
`
`

`

`
`secure server,” as recited in all of the independent claims. Indeed, Petitioners only
`
`Case No. IPR2015-01047
`
`point to operations performed by the C-HTTP name server—which the Federal
`
`Circuit said cannot map to the DNS proxy module—to show that this “determining”
`
`step is performed by the DNS proxy module. (See, e.g., Petitioners’ Remand Brief,
`
`Paper 104 at 11-12.) And while Petitioners appear to suggest that the C-HTTP name
`
`server’s determination can be imputed to the client-side proxy because the client-
`
`side proxy receives information responsive to the C-HTTP name server’s
`
`determination, Petitioners cite no legal support for that contention. (Id. at 12-13.)
`
`Indeed, the Board appears to have previously agreed that only the C-HTTP name
`
`server performs an operation that it believed could map to the claimed
`
`“determining.” (Final Written Decision, Paper 80 at 8-9.)
`
`Third, Petitioners’ anticipation-based mapping suffers from yet another
`
`problem. Claims 1 and 7 require “an encrypted channel between the client and the
`
`secure server,” and claim 13 similarly requires “a secure channel between the client
`
`and the secure server.” Kiuchi, however, only discloses a C-HTTP link between the
`
`client-side proxy and the server-side proxy. (See, e.g., Ex. 2039 at 19:7-18
`
`(Petitioners’ expert admitting that “the client-side proxy and the server-side proxy
`
`are communicating using C-HTTP, and you have user agent and origin servers that
`
`are only running HTTP/1.0”), 21:3-7 (Petitioners’ expert admitting that the
`
`“encrypted communications in the C-HTTP connection between the proxies . . .
`
`
`
`
`15
`
`

`

`
`doesn’t extend past [the] proxies to the origin server or the user agent”).) Indeed,
`
`Case No. IPR2015-01047
`
`Kiuchi explains that its “approach is aimed at assuring proxy-proxy security” and is
`
`“fundamentally different” from “[o]ther secure protocols [that] are designed to be
`
`implemented in origin servers and user agents in order to assure ‘end-to-end’
`
`security protection.” (Ex. 1002 at 10-11.) Kiuchi discourages end-to-end
`
`encryption, from a client to a target device, so that “no end-user has any chance to
`
`obtain keys for encryption or decryption” and compromise security. (Id. at 11.) As
`
`such, Kiuchi cannot disclose the claimed “[encrypted/secure] channel between the
`
`client and the secure server.”6 Petitioners’ analysis comes down to the bare assertion
`
`that Kiuchi “establishes an encrypted C-HTTP connection which allows the user
`
`agent and origin server to securely communicate.” (Petitioners’ Remand Brief,
`
`Paper 104 at 12-13.) Kiuchi’s C-HTTP connection, however, does not extend
`
`between the user agent and origin server. (Ex. 1002 at 11 (“C-HTTP-based
`
`communication is performed only between two types of C-HTTP proxies and
`
`between a C-HTTP proxy and C-HTTP name server.”).) For this additional reason,
`
`Petitioners failed to meet their burden to demonstrate anticipation by Kiuchi.
`
` Kiuchi Combined with RFC 1034, With or Without Rescorla, Does Not
`Render Obvious Claims 1, 2, 6-8, and 12-14
`Petitioners’ obviousness-based mapping suffers from even more problems
`
`
`6 Petitioners rely on encryption to address the limitations of claim 13.
`
`
`
`
`16
`
`

`

`
`than their anticipation-based mapping, and likewise cannot support a finding of
`
`Case No. IPR2015-01047
`
`unpatentability of the challenged claims.
`
`First, Petitioners’ acknowledge that their “obviousness ground relies on
`
`Kiuchi’s client-side proxy as the ‘client’.” (Petitioners’ Remand Brief, Paper 104 at
`
`16; see also id. at 24.) Kiuchi’s client-side proxy is not a “client” under VirnetX’s
`
`construction of the term. Kiuchi does not disclose any user associated with the
`
`client-side proxy; in fact, Petitioner Apple’s own expert admitted so in district court
`
`litigation. (See, e.g., Ex. 2041 at 37:9-18, 43:10-13, 46:16-19, 53:18-23.) Indeed,
`
`Apple’s expert was unequivocal. When asked to confirm that “there’s no user … at
`
`this client-side proxy,” he emphatically stated “No. There’s no user,” and suggested
`
`only that his opinion could stand because he did not “think that’s needed in the
`
`claims.” (Id. at 53:18-23.) In Kiuchi, the user’s computer is the user agent, not the
`
`client-side proxy. (See, e.g., Ex. 1002 at 8; Ex. 2038 at ¶ 48; see also Ex. 2041 at
`
`50:7-14 (the user agent “would be read naturally as a client computer”).)
`
`Petitioners nonetheless argue that “Kiuchi’s client-side proxy is a ‘client’ even
`
`under VirnetX’s construction.” (Petitioners’ Remand Brief, Paper 104 at 27.)
`
`Specifically, Petitioners argue that “[t]he Board was [previously] correct to
`
`determine that” Kiuchi’s client-side proxy is a client even under VirnetX’s
`
`construction because it is associated with the user agent. (Id.) The Federal Circuit
`
`has already weighed in on this approach and rejected it:
`
`
`
`
`17
`
`

`

`
`
`Case No. IPR2015-01047
`
`The Board declined to explicitly construe “client”
`because, in its view, Kiuchi’s client-side proxy is a client
`even under VirnetX’s construction. But it only reached
`this determination by redefining VirnetX’s proposed
`construction so that the client-side proxy is a “client” as
`long as it is associated with a user. After twisting
`VirnetX’s proposed construction, the Board found that the
`client-side proxy meets this definition because it is
`“associated with” the user agent, which is “associated
`with” a user. … VirnetX’s proposed construction is a
`user’s computer, not any device that is associated with a
`user, however indirectly.
`
`VirnetX, 778 F. App’x at 908.
`
`Petitioners also argue that “Kiuchi’s firewall proxies have ‘users’ in the form
`
`of the ‘administrators of proxies on the firewall.’” (Petitioners’ Remand Brief, Paper
`
`104 at 27.) This is a new argument that Petitioners did not present in their Petition
`
`or their Reply during the original proceeding, and thus is not properly within the
`
`scope of remand. VirnetX would be prejudiced if the Board were to consider this
`
`argument, as VirnetX has had no opportunity to submit evidence (e.g., expert
`
`testimony, documentary evidence, etc.) on the issue. Regardless, Petitioners are
`
`wrong to twist VirnetX’s construction to somehow equate “user” with any “human”
`
`out of context. Any administrator of Kiuchi’s client-side proxy would not be a user
`
`of the claimed system as required by the claims, but rather an administrator for
`
`
`
`
`18
`
`

`

`
`processes associated with the proxy operations. In fact, the one place where Kiuchi
`
`Case No. IPR2015-01047
`
`mentions an administrator, Kiuchi notes that in some cases, “administrators of
`
`proxies on the firewall can not know the contents of any information exchanged.”
`
`(Ex. 1002 at 12.) Thus, Kiuchi distinguishes a user at a user agent, who initiates a
`
`request for information at the origin server, from any potential administrator
`
`associated with a client-side proxy. This point is consistent with the ’151 patent,
`
`which explicitly distinguishes between users and administrators. (Se

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket