throbber
Paper No. 17
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––––––
`
`APPLE INC.,
`Petitioner,
`
`v.
`VIRNETX INC.,
`Patent Owner.
`
`––––––––––––––––––
`
`Case No. IPR2016-00331
`U.S. Patent No. 8,504,696
`
`––––––––––––––––––
`
`PETITIONER’S REPLY BRIEF
`
`
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`Table of Contents
`
`I.
`
`II.
`
`Introduction .................................................................................................... 1
`
`Effect of Recent Federal Circuit Decisions ................................................. 2
`
`III. Claim Construction ....................................................................................... 3
`
`IV. Beser and RFC 2401 Render Claims 1-11, 14-25, and 28-30 Obvious ..... 5
`
`A. A Person of Ordinary Skill Would Have Combined Beser and RFC
`2401 ....................................................................................................... 6
`
`B.
`
`Independent Claims 1 and 16 .............................................................. 11
`
`1.
`
`2.
`
`3.
`
`As Found in Prior Final Written Decisions Handling
`Substantially Similar Claims, Beser Teaches a Request to
`Lookup an IP Address ............................................................... 11
`
`Beser Teaches “Intercepting” a Request to Lookup an IP
`Address as the Board has Repeatedly Found ............................ 15
`
`Beser and RFC 2401 Teach a “Virtual Private Network
`Communication Link” .............................................................. 17
`
`C.
`
`Dependent Claims ............................................................................... 18
`
`1.
`
`2.
`
`3.
`
`Claims 3 and 18 ......................................................................... 18
`
`Claims 4-5 and 19-20 ................................................................ 19
`
`Claims 2, 6-11, 14-15, 17, 21-25, and 28-30 ............................ 20
`
`V. RFC 2401 Is a Prior Art Printed Publication ........................................... 20
`
`VI. Dr. Tamassia’s Testimony is Probative ..................................................... 22
`
`VII. Conclusion .................................................................................................... 25
`
`
`
`
`
`i
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`TABLE OF AUTHORITIES
`
`Cases
`
`Page(s)
`
`Arthrocare Corp. v. Smith & Nephew, Inc.,
`406 F.3d 1365 (Fed. Cir. 2005) .......................................................................... 14
`
`Belden Inc. v. Berk-Tek LLC,
`805 F.3d 1064 (Fed. Cir. 2015) .................................................................... 24, 25
`
`Bourns, Inc. v. U.S.,
`537 F.2d 486 (Ct. Cl. 1976) .................................................................................. 2
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) ............................................................................ 24
`
`Guangdong Xinbao Elec. Appliances Holdings v. Adrian Rivera,
`IPR2014-00042, Paper 50 (Feb. 6, 2015) ........................................................... 24
`
`Ohio Willow Wood Co. v. Alps South, LLC,
`735 F.3d 1333 (Fed. Cir. 2013) ........................................................................ 2, 5
`
`Poole v. Textron, Inc.,
`192 F.R.D. 494 (D. Md. 2000) ........................................................................... 22
`
`S. Corp v. U.S.,
`690 F.2d 1368 (Fed. Cir. 1982) (en banc) ............................................................ 2
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir 2002) ........................................................................... 24
`
`Sundance, Inc. v. Demonte Fabricating Ltd,
`550 F.3d 1356 (Fed. Cir. 2008) .......................................................................... 23
`
`Titanium Metals Corp. v. Banner,
`778 F.2d 775 (Fed. Cir. 1985) ............................................................................ 25
`
`U.S. v. Taylor,
`166 F.R.D. 356 (M.D.N.C.) aff’d, 166 F.R.D. 367 (M.D.N.C.
`1996) ................................................................................................................... 22
`
`Virnetx Inc. v. Apple Inc.,
`No. 2016-1211, 2016 WL 7174131 (Fed. Cir. Dec. 9, 2016) .......................... 1, 3
`
`ii
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc.,
`200 F.3d 795 (Fed. Cir. 1999) .............................................................................. 5
`
`Statutes
`
`35 U.S.C. § 6 ............................................................................................................ 25
`
`35 U.S.C. § 318(b) ..................................................................................................... 5
`
`Other Authorities
`
`37 CFR 42.73(d)(3) ............................................................................................ 2, 4, 5
`
`Fed. R. Evid. 702 ..................................................................................................... 23
`
`IPR2014-00237, Paper 41(May 14, 2014) ........................................................passim
`
`IPR2014-00481, Paper 35 (Aug. 24, 2015) ........................................................... 1, 3
`
`IPR2015-000812, Paper 43 ........................................................................................ 4
`
`IPR2015-00810, Paper 44 (Aug. 30, 2016) ......................................................passim
`
`IPR2015-00812, Paper 43 (Aug. 30, 2016) ............................................................... 1
`
`IPR2015-00866, Paper 39 (Sept. 28, 2016) ......................................................passim
`
`IPR2015-00868, Paper 39 (Sept. 28, 2016) ......................................................... 1, 19
`
`IPR2015-00870, Paper 39 (Sept. 28, 2016) ............................................................... 1
`
`
`
`iii
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`Ex. #
`1001
`1002
`1003
`1004
`1005
`1006
`1007
`1008
`
`1009
`1010
`1011
`1012
`1013
`
`1014
`
`1015
`1016
`1017
`
`1018
`
`1019
`1020
`1021
`1022
`
`UPDATED EXHIBIT LIST
`
`Reference Name
`U.S. Patent 8,504,696
`U.S. Patent 8,504,696 File History
`[RESERVED]
`[RESERVED]
`Declaration of Roberto Tamassia
`Curriculum Vitae of Roberto Tamassia
`U.S. Patent 6,496,867 to Beser
`Kent, S., et al., RFC 2401, “Security Architecture for the Internet
`Protocol” (November 1998)
`Aventail Connect v3.01/v2.51 Administrator’s Guide (1996-1999)
`Aventail Connect v3.01/v2.51 User’s Guide (1996-1999)
`Aventail ExtraNet Center v3.0 Administrator’s Guide (NT and UNIX)
`U.S. Patent 5,237,566 to Brand
`Handley, M., et al., RFC 2543, SIP: Session Initiation Protocol (March
`1999)
`RFC 793, DARPA Internet Program Protocol Specification
`(September 1991)
`U.S. Patent Number 6,430,176 to Christie
`U.S. Patent Number 6,930,998 to Sylvain
`Patent Owner Preliminary Response, IPR2014-00237, Paper 12
`(March 6, 2014)
`Leech, M., et al., RFC 1928, SOCKS Protocol Version 5 (March
`1996)
`Microsoft Computer Dictionary (4th Ed.)
`U.S. Patent Number 6,408,336 to Schneider
`U.S. Patent Number 5,633,934 to Hember
`Declaration of James Chester, Reexamination 95/001,697
`
`i
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`Ex. #
`1023
`1024
`1025
`1026
`
`1027
`1028
`
`1029
`1030
`1031
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`1038
`
`1039
`
`1040
`1041
`
`1042
`
`Reference Name
`Declaration of Chris Hopen, Reexamination 95/001,697
`U.S. Patent 6,557,037 to Provino
`Gunter, M., “Virtual Private Networks Over the Internet” (1998)
`Patent Owner Preliminary Response, IPR2014-00404, Paper 9 (May
`19, 2014)
`von Sommering, S., Space Multiplexed-Electrochemical Telegraph
`Licklider, J.C.R., Memorandum for Members and Affiliates of the
`Intergalactic Computer Network (December 11, 2001)
`BBN Report No. 1822, Interface Message Processor (January 1976)
`Koblas, D., et al., “SOCKS-Usenix Unix Security Symposium III”
`Windows NT for Dummies
`Mockapetris, P., RFC 882, “Domain Names – Concepts and Facilities”
`(November 1983)
`Mockapetris, P., RFC 883, “Domain Names – Implementation and
`Specification” (November 1983)
`Mockapetris, P., RFC 1034, “Domain Names – Concepts and
`Facilities” (November 1987)
`Mockapetris, P. RFC 1035, “Domain Names – Implementation and
`Specification” (November 1987)
`Bradner, S., RFC 2026, “The Internet Standards Process – Revision 3”
`(October 1996)
`Rosen, E., et al., RFC 2547, “BGP/MPLS VPNs” (March 1999)
`W3C and WAP Forum Establish Formal Liason Relationship
`(December 8, 1999)
`Wireless Application Protocol (WAP) Architecture Specification
`(April 30, 1998)
`H.323 ITU-T Recommendation (February, 1998)
`Kiuchi, T., et al., “C-HTTP – The Development of a Secure, Closed
`HTTP-Based Network on the Internet” (IEEE 1996) LOC Stamped
`VirnetX’s Opening Claim Construction brief, VirnetX, Inc. v. Cicso
`Systems, Inc., et al., Civil Action No. 6:10-cv-417 (EDTX)
`ii
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`Ex. #
`
`1043
`1044
`1045
`
`1046
`
`1047
`
`1048
`
`1049
`1050
`1051
`1052
`1053
`1054
`1055
`
`1056
`1057
`1058
`1059
`1060
`
`
`1061
`
`
`1062
`
`Reference Name
`(November 4, 20111)
`Declaration of Michael Fratto, Reexamination 95/001,682
`U.S. Patent 5,898,830 to Wesinger
`Steiner, J., et al., “Kerberos: An Authentication Service for Open
`Network Systems” (January 12, 1988)
`Harkins, D., et al., RFC 2409, “The Internet Key Exchange (IKE)
`(November 1998)
`Maughan, D., et al., “Internet Security Association and Key
`Management Protocol (ISAKMP)” (November 1998)
`Data-Over-Cable Interface Specifications (DOCIS), Radio Frequency
`Interface Specification (March 26, 1997)
`U.S. Patent 6,886,095 to Hind et al.
`[RESERVED]
`[RESERVED]
`U.S. Patent 6,609,148 to Salo et al.
`Dell Computer Corp., Fiscal 1999 in Review (1999)
`Charlie Scott et al., Virtual Private Networks (2nd ed. 1999)
`Deposition of Fabien Newman Monrose, PhD., IPR2014-00237,
`Exhibit 1083 (October 23, 2014)
`Declaration of Scott M. Border
`[RESERVED]
`[RESERVED]
`[RESERVED]
`Declaration of Sandy Ginoza on behalf of the RFC Publisher for the
`Internet Engineering Task Force, dated January 23, 2013, submitted in
`Investigation No. 337-TA-858
`Kent, S., et al., RFC 2401, “Security Architecture for the Internet
`Protocol” (November 1998), bearing Bates Nos. 337-TA-858-
`IETF001122 through 001183
`Redline comparison of Exhibit 1008 (IPR2015-00810) to Exhibit 1061
`
`iii
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`Ex. #
`1063
`
`1064
`
`1065
`
`1066-76
`1077
`
`Reference Name
`Transcript of Feb. 8, 2013 deposition of Sandy Ginoza, ITC Inv. No.
`337-TA-858
`The Reality of Virtual Private Networks, InfoWorld, Aug. 16, 1999
`(Advertising Supplement)
`Mark Gibbs, IP Security: Keeping your business private,
`NetworkWorld, Mar. 15, 1999
`[RESERVED]
`Transcript of Mar. 3, 2016 deposition of Fabian Monrose (IPR2015-
`00810, 811, 812)
`
`iv
`
`

`

`IPR2016-00331
`
`I.
`
`Introduction
`
`
`
`Petitioner’s Reply (Paper 17)
`
`In its Institution Decision, the Board correctly found that Beser and RFC
`
`2401 render claims 1-11, 14-25, and 28-30 of the ’696 patent obvious. Paper 9
`
`(Dec.), 12-29. The Board’s findings are consistent with other Final Written
`
`Decisions concerning related patents, in which claims substantially similar to the
`
`’696 claims were likewise found obvious in view of Beser and RFC 2401. E.g.,
`
`IPR2015-00812, Paper 43 (Aug. 30, 2016); IPR2015-00866, Paper 39 (Sept. 28,
`
`2016).1
`
`In its Response (“Resp.”) (Paper 14), Patent Owner advances the same
`
`arguments it made in those prior proceedings2 and relies on the same expert
`
`testimony. And recognizing that the issues and claims at issue here are
`
`
`1 See also IPR2015-00810, Paper 44 (Aug. 30, 2016); IPR2015-00868, Paper 39
`
`(Sept. 28, 2016); and IPR2015-00870, Paper 39 (Sept. 28, 2016); IPR2014-00237,
`
`Paper 41(May 14, 2014); aff’d on other grounds, No. 2015-1934, 2016 WL
`
`7174130 (Fed. Cir. Dec. 9, 2016) (Pet. re’hrg en banc pending); Virnetx Inc. v.
`
`Apple Inc., No. 2016-1211, 2016 WL 7174131, at *1 (Fed. Cir. Dec. 9, 2016)
`
`(affirming IPR2014-00403, IPR2014-00404, IPR2014-00481, IPR2014-00482).
`
`2 Patent Owner recognizes it is making the same arguments the Board has
`
`previously rejected. Resp., 1 n.1.
`
`1
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`substantially similar to those in prior proceedings (e.g., in IPR2015-00866 and
`
`IPR2014-00237), Patent Owner simply resubmits its expert’s earlier testimony.
`
`Resp., 4 n.5. Indeed, no issues are raised in this matter that have not already been
`
`previously considered and decided by the Board, and Patent Owner’s arguments
`
`rest largely on unwarranted or incorrect assertions about its claims and the
`
`teachings of Beser and RFC 2401. The Board’s initial determination that the
`
`challenged claims are unpatentable was correct and should be maintained.
`
`II. Effect of Recent Federal Circuit Decisions
`
`The Federal Circuit recently affirmed seven final decisions of the Board
`
`holding claims unpatentable in patents related to the ’696 patent. See Paper 16. In
`
`five of those appeals, the mandate has now issued. Id. Under both PTAB rules
`
`and the traditional doctrine of collateral estoppel, Patent Owner is precluded from
`
`taking positions in this proceeding that are inconsistent with the final judgment in
`
`those proceedings. 37 CFR 42.73(d)(3); see Ohio Willow Wood Co. v. Alps South,
`
`LLC, 735 F.3d 1333, 1342 (Fed. Cir. 2013) (“Our precedent does not limit
`
`collateral estoppel to patent claims that are identical. Rather, it is the identity of the
`
`issues that were litigated that determines whether collateral estoppel should
`
`apply.”); Bourns, Inc. v. U.S., 537 F.2d 486, 492 (Ct. Cl. 1976) (finding “collateral
`
`estoppel [is] applicable to unadjudicated claims where it was shown that the
`
`adjudicated and unadjudicated claims presented identical issues”); S. Corp v. U.S.,
`
`2
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`690 F.2d 1368, 1369 (Fed. Cir. 1982) (en banc) (holding decisions of the Court of
`
`Claims are binding precedent).
`
`Given these final decisions, Patent Owner in this proceeding is prohibited
`
`from maintaining its arguments related to the construction of “[VPN]
`
`communication link,” as those arguments have already been rejected by the Board
`
`in decisions affirmed by the Federal Circuit. See IPR2014-00481, Paper 35 at 7-11
`
`(Aug. 24, 2015); Virnetx, 2016 WL 7174131, at *1 (“[W]e find no error in the
`
`[Board’s] claim constructions or findings in the 403 and 481 proceedings.”).
`
`III. Claim Construction
`
`In its Institution Decision, the Board correctly found that it did not need to
`
`construe all but one of the disputed claims terms, noting that under any reasonable
`
`construction of those terms, Beser and RFC 2401 render the claims obvious.
`
`In addition, the construction of the term the Board construed –
`
`“intercept[ing]… a request” – is consistent with the ’696 specification and should
`
`be maintained. Pet., 12-13; Ex. 1001, 39:26-28, 40:26-32. In its Response, Patent
`
`Owner simply advances the same construction and arguments it made in its
`
`Preliminary Response and in prior proceedings. Resp., 17-18. In the alternative,
`
`Patent Owner argues that the “intercept[ing]” term needs no construction. Id.
`
`On the first point, the Board has already considered and rejected Patent
`
`Owner’s proposed construction (“receiving a request to look up an internet
`
`3
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`protocol address and, apart from resolving it into an address, performing an
`
`evaluation on it related to establishing a virtual private network communication
`
`link”), and should do so again here for the same reasons. See, e.g., IPR2015-
`
`000812, Paper 43 at 6-10; IPR2014-00237, Paper 41 at 10-12.
`
`As to the latter argument (that no construction is needed), that too conflicts
`
`with the Board’s earlier determinations. Specifically, in other proceedings, the
`
`parties disputed whether Beser and RFC 2401 teach the “intercepting” limitation,
`
`and in response, the Board concluded this term need construction and adopted the
`
`same construction the panel did here. See, e.g., IPR2015-000812, Paper 43 at 6-
`
`10. The Board’s initial construction was correct and should be maintained.
`
`Patent Owner also argues the Board should construe the term “[VPN]
`
`communication link” to mean “a communication path between two devices in a
`
`virtual private network,” (Resp., 3-15) the same construction it proposed in earlier
`
`proceedings. The Board can reject this argument because Patent Owner is
`
`estopped from advancing it in this proceeding pursuant to, inter alia, 37 C.F.R.
`
`§ 42.73(d)(3). Specifically, in the Final Written Decision in IPR2014-00481
`
`involving a patent that shares a common specification with the ’696 patent, the
`
`Board applied the same claim construction standard and rejected the same
`
`arguments Patent Owner makes here about the proper construction of the term
`
`“[VPN] communication link.” Paper 35 at 7-11. The Federal Circuit affirmed the
`
`4
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`Board’s constructions, and has issued a mandate; therefore, that Final Written
`
`Decision is now final and Patent Owner estopped from advancing a different
`
`position on the meaning of “[VPN] communication link.”3 See 37 CFR
`
`42.73(d)(3); Ohio Willow Wood, 735 F.3d at 1342.
`
`In addition, the Board need not provide a special construction of the term
`
`“[VPN] communication link” because as explained below, Beser and RFC 2401
`
`disclose this limitation under any reasonable interpretation of this phrase.
`
`IPR2015-00866, Paper 39 at 10 (Sept. 28, 2016); Vivid Techs., Inc. v. Am. Sci. &
`
`Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999) (claim terms need only be
`
`construed to the extent necessary to resolve the case).
`
`IV. Beser and RFC 2401 Render Claims 1-11, 14-25, and 28-30 Obvious
`
`The Board correctly found that Beser and RFC 2401 render claims 1-11, 14-
`
`25, and 28-30 obvious. In its Response, Patent Owner raises four primary
`
`challenges: (i) a person of ordinary skill would not have combined Beser and RFC
`
`2401, (ii) Beser does not disclose a “request to lookup an IP address,” (iii) Beser
`
`does not disclose “intercepting” such a request, and (iv) Beser and RFC 2401 do
`
`
`3 All claims were found to be unpatentable, and all appeals have been exhausted.
`
`The only step remaining is for the Office to issue a certificate canceling the claims.
`
`35 U.S.C. § 318(b).
`
`5
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`not disclose a “[VPN] communication link.”
`
`Initially, this panel should reject Patent Owner’s arguments about Beser and
`
`RFC 2401 because they have already been considered and rejected in multiple
`
`Final Written Decisions involving closely related patents with substantially similar
`
`claims. E.g., IPR2014-00237, Paper 41 at 22-28, 37-41; IPR2015-00812, Paper 43
`
`at 23-32, 35-38; IPR2015-00866, Paper 39 at 23-31, 34-39.4 In the current
`
`proceeding, Patent Owner simply rehashes those same rejected arguments. Even if
`
`the Board reconsiders those arguments on the merits, they are wrong and must be
`
`rejected.
`
`A. A Person of Ordinary Skill Would Have Combined Beser and
`RFC 2401
`
`As explained in the petition and by Dr. Tamassia, a person of ordinary skill
`
`in the art would have found it obvious to combine Beser and RFC 2401 to provide
`
`end-to-end encryption in an IP tunnel between Beser’s originating and terminating
`
`end devices. Pet., 31-35; Ex. 1005, ¶¶228-34. The Beser IP tunnel would provide
`
`anonymity by hiding the true addresses of two communicating end devices, and
`
`that a skilled person would have been motivated to follow Beser’s suggestion to
`
`4 Patent Owner recognizes the ’696 claims are substantially similar to those in prior
`
`proceedings (e.g., in IPR2015-00866) because it extensively relies testimony from
`
`those proceedings. See Exhibits 2009, 2018, 2019, 2022, 2025, and 2026.
`
`6
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`use IPsec (RFC 2401) to hide the data transmitted between the devices. Pet., 33;
`
`Ex. 1005, ¶234. In its Institution Decision, the Board agreed. Dec., 24-26.
`
`In its Response, Patent Owner relies on the same evidence5 and repeats the
`
`same arguments it has raised and the Board has rejected in numerous previous
`
`IPRs. E.g., IPR2014-00237, Paper 41 at 37-41; IPR2015-00866, Paper 39 at 34-
`
`37. It again incorrectly contends that statements in Beser indicating that
`
`encryption can present practical challenges in certain circumstances “teaches
`
`away” from the use of encryption. Resp., 31-38. Patent Owner’s arguments still
`
`cannot be squared with Beser’s actual disclosure.
`
`Beser recognizes encryption ordinarily should be used when the contents of
`
`a communication need to be protected (Ex. 1007, 1:54-56), and it discloses using
`
`encryption when user-identifiable data are sent over the network such as during
`
`establishment of the IP tunnel, (id., 11:22-25). Pet., 29, 32. Beser also criticizes
`
`prior art IP tunneling methods that sometimes prevent use of encryption, (Ex.
`
`1007, 2:1-8, 2:22-24), and states its tunneling method is intended to overcome such
`
`problems, (id., 2:43-45). A person of ordinary skill reading Beser would have
`
`understood that encryption should ordinarily be used to protect the contents of
`
`
`5 Patent Owner did not submit a new declaration from Dr. Monrose, but simply
`
`filed declarations that were submitted in related proceedings. See Exs. 2009, 2018.
`
`7
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`communications in an IP tunnel, and that encryption is compatible with Beser. Ex.
`
`1005, ¶¶224-26, 228, 230-31.
`
`Patent Owner has not asserted that Beser’s tunneling method cannot be
`
`implemented using encryption—at most it alleges that certain practical concerns
`
`can arise that, even if present, affect only certain system configurations. Dr.
`
`Monrose has admitted there IPsec is not inherently incompatible with encrypting
`
`multimedia data, and that a skilled person would have considered the
`
`computational concerns identified in Beser to be limited to configurations
`
`involving certain types of encryption. Ex. 1077, 80:20-81:8, 82:7-17.
`
`Dr. Monrose also admitted that a skilled person would have been able to
`
`adjust a system’s configuration to allow encryption of multimedia data. Id., 79:3-
`
`11; see Ex. 1055, 206:20-208:6 (Dr. Monrose admitting more powerful computers
`
`or lower recording fidelity would resolve Beser’s concerns), 211:16-212:2.
`
`Petitioner’s expert Dr. Tamassia similarly explained that a skilled person would be
`
`able to change a system’s configuration to accommodate use of encryption in
`
`Beser’s IP tunnel. Ex. 1005, ¶¶224-25 (adding more computing power or using a
`
`lower resolution media stream could solve any issues).
`
`Patent Owner also argues Beser teaches away from encryption because its
`
`tunneling method was designed to have a low computational burden on a system,
`
`and therefore, it was designed to replace computationally expensive security
`
`8
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`techniques such as encryption. Resp., 34, 35-36. But Patent Owner
`
`mischaracterizes the purpose of Beser’s design. Beser was designed to provide a
`
`better method for ensuring user privacy by allowing communications over the
`
`Internet to be anonymous, thus addressing a distinct security concern. Ex. 1007,
`
`2:36-40, 3:4-9. Beser explains users increasingly had privacy concerns, (id., 1:13-
`
`25), and that it was easy for computer hackers to determine the identity of two
`
`users communicating over the Internet because the source and destination
`
`addresses of IP packets were viewable, (id., 1:26-53). While encrypting data could
`
`protect a communication’s the contents, encryption did not provide privacy
`
`because it did not hide the identities of the communicating devices. Id., 2:1-5; id.,
`
`1:56-58. Beser then discusses conventional tunneling techniques, which could
`
`provide privacy but were sometimes incompatible with encryption. Ex. 1007,
`
`2:22-24; see id., 1:54-2:35; see Pet., 32-33. Beser also notes that both encryption
`
`and prior art IP tunnels were computationally expensive. Id., 1:60-63, 2:12-17,
`
`2:33-35.
`
`Beser explains that its IP tunneling technique was designed to overcome
`
`these problems with the prior art. Ex. 1007, 2:43-45. Beser’s IP tunnel hides the
`
`identities of communicating devices, but in contrast to prior art IP tunnels which
`
`were computationally expensive, (id., 2:33-35), Beser has a low “computational
`
`burden,” (id., 3:4-9). Because of its low computational burden, Beser’s method is
`
`9
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`flexible and can be combined with other security techniques. See Ex. 1005, ¶¶228-
`
`34; Ex. 1007, 3:4-9, 4:55-5:2. Beser’s tunneling method also can be combined
`
`with encryption: Beser specifically notes that its IP tunnel can improve the security
`
`of encryption by helping to “prevent a hacker from intercepting all media flow
`
`between the ends,” (Ex. 1007, 2:36-40), and from “accumulating... sufficient
`
`information to decrypt the message,” (id., 1:56-58). IPsec was known to be highly
`
`adaptable, enabling it to accommodate computational burdens by adjusting
`
`parameters of the IPsec protocol (e.g., adjusting the strength or type of encryption
`
`used). See Ex. 1008, 4, 7, 10. Thus, the evidence demonstrates that Beser’s IP
`
`tunneling technique complements encryption.
`
`Patent Owner also argues that using encryption in Beser’s system would be
`
`“redundant” because Beser teaches hiding the identities of the end devices instead
`
`of protecting the contents of a communication. Resp., 36. But Beser never states
`
`its technique is intended to replace encryption. In fact, Beser distinguishes
`
`between using encryption to protect the data inside packets and using IP tunnels to
`
`hide the true addresses of the end devices, as Patent Owner recognizes. Resp., 35-
`
`36. Dr. Monrose likewise agreed that using a security technique to provide
`
`anonymity is not a substitute for using encryption to protect the contents of the
`
`communications. Ex. 1077, 74:4-15; 74:25-75:3.
`
`Thus, the Board correctly found a person of ordinary skill would have
`
`10
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`combined Beser and RFC 2401 and thereby would have found it obvious to add
`
`encryption to Beser.
`
`B.
`
`Independent Claims 1 and 16
`
`The Board correctly found Beser and RFC 2401 teach all of the elements of
`
`claims 1 and 16. Dec., 14-26. Patent Owner disagrees, asserting that Beser and
`
`RFC 2401 do not teach three limitations. See Resp., 22-31. Each of Patent
`
`Owner’s contentions reflects a repeated misunderstanding of its own claims and a
`
`continued mischaracterization of what Beser actually discloses.
`
`1.
`
`As Found in Prior Final Written Decisions Handling
`Substantially Similar Claims, Beser Teaches a Request to
`Lookup an IP Address
`
`The tunneling request sent by originating device 24 is a “request to lookup
`
`an [IP] address” because in response to receiving the request, the Beser trusted
`
`device 30 looks up two IP addresses. Pet., 37-38. First, it consults an internal
`
`database of registered devices to look up the IP address of second device 16 that is
`
`associated with the unique identifier. Id, 21-22, 37-38; Ex. 1007, 11:45-58.
`
`Second, it looks up a private IP address for terminating device 26 by sending a
`
`message to device 16 requesting the address. Pet., 22-23, 37-38; Ex. 1007, 9:29-
`
`30, 12:16-19, 14:14-27, Figs. 6 & 9. As a result of this process, originating device
`
`24 receives an IP address for terminating device 26. Pet., 22; Ex. 1007, 21:48-52;
`
`see Ex. 1077, 103:22-104:3.
`
`11
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`In numerous prior Final Written Decisions, the Board agreed both these
`
`processes disclosed a “request to lookup an IP address.” IPR2015-00810, Paper 44
`
`at 33-40; IPR2015-00866, Paper 39 at 23-28. There is no reason to find differently
`
`here where Patent Owner admittedly relies on the same evidence and arguments
`
`made in those proceedings.
`
`Patent Owner nonetheless argues the tunneling request cannot be a request to
`
`“lookup an IP address” because trusted device 30 does not “look up” any IP
`
`addresses in response to the request. Resp., 23. Initially, that argument is
`
`irrelevant to the claims, which specify intercepting “a request to lookup an [] IP
`
`address,” and under the broadest reasonable construction, do not require a lookup
`
`to be performed, let alone specify that a particular device perform the lookup. In
`
`other words, Patent Owner’s lookup arguments can be dismissed because the
`
`claims do not require a lookup.
`
`Relying on its incorrect theory that a lookup is required, Patent Owner
`
`argues that neither of Beser’s lookups actually lookup an IP address. First, Patent
`
`Owner argues that trusted device 30 does not perform a “lookup” of network
`
`device 16’s public IP address. Resp., 24-25. Patent Owner admits that trusted
`
`device 30 contains a database or similar structure that correlates each unique
`
`identifier to the public IP addresses of a second network device 16 and terminating
`
`device 26, but asserts Beser “never suggests that this data structure is looked up
`
`12
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`when the tunnel request is received by device 30.” Resp., 24. Patent Owner also
`
`argues that because the database of registered identifiers is part of Beser’s
`
`modification to the conventional DNS functionality, where the trusted-third-party
`
`device is a DNS server, it would only perform a lookup on its conventional DNS
`
`tables and would not consult the database. Resp., 24-26. Those positions are
`
`contrary to Beser’s explicit disclosure.
`
`Beser describes the database as an example of how the trusted-third-party
`
`network device 30 performs the associating step (Step 116) of Figure 5, which it
`
`performs in response to receiving the tunneling request. Ex. 1007, Fig. 5, 11:26-
`
`58. Beser walks through each of the four steps of Figure 5 sequentially on 9:64 to
`
`12:19. See Ex. 1077, 104:25-107:13. Beser discusses Step 116 in two sequential
`
`paragraphs that appear at 11:26-58, as Dr. Monrose agreed. Ex. 1077, 107:15-
`
`108:8. The first paragraph explains trusted device 30 associates the public IP
`
`address for second device 16 with the unique identifier in the request. Ex. 1007,
`
`11:26-32. The second paragraph describes an example of how the association is
`
`performed, stating “the trusted-third-party network device 30 may... retain[]a list of
`
`E.164 numbers of its subscribers [and] [a]ssociated with a E.164 number in the
`
`directory database is the IP 58 address of a particular second network device 16.”
`
`Id., 11:45-50; see id., 11:55-58. Thus, Beser teaches that in Step 116, trusted
`
`device 30 receives the tunneling request, (id., 11:9-20), and in response, it
`
`13
`
`

`

`IPR2016-00331
`
`
`
`Petitioner’s Reply (Paper 17)
`
`associates an IP address with the unique identifier by looking it up in its internal
`
`database, (id., 11:26-58). See Ex. 1077, 107:15-108:8.
`
`Patent Owner also argues that Beser’s tunneling request cannot be one to
`
`“lookup an IP address” because trusted device 30 looks up the public IP address of
`
`second device 16 instead of terminating device 26. Resp., 24. But the claims only
`
`specify a request to lookup an “[IP] address… based on a domain name associated
`
`with second network device,” (Ex. 1001, 56:13-14) (emphasis added), and the ’696
`
`specification provides that the IP address looked up “need not be the actual address
`
`of the destination computer,” (id. at 40:43-44). In Beser’s system, the IP address
`
`of network device 16 is “associated with” the unique identifier (e.g., domain name)
`
`of terminating device 26. Thus, the tunneling request meets the claim language.
`
`Second, Patent Owner contend that Beser and RFC 2401 do not teach the
`
`“lookup” of the private IP address, arguing that the first and second devices, and
`
`not trusted device 30, negotiate private IP addresses for the end devices. Resp., 23.
`
`That argument is premised on a single embodim

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket