throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re Application of:
`
`Larsonet al.
`
`Application Serial Ne.
`
`LE/679,416
`
`Filing Date:
`
`Title:
`
`Rebruary 27, 2007
`
`METHOD FOR ESTABLISHING SECURE COMMUNICATION
`LINK BETWEEN COMPUTERS OF VIRTUAL PRIVATE
`NETWORK
`
`Examiner:
`
`Art Unit:
`
`Confirmation Noa.:
`
`Lim, Krisna
`
`245
`
`3
`
`3528
`an fae
`
`Atty. Docket No.:
`
`077580-0015 (VRNK-LCP2DVCON}
`
`Mail Stop Amendment
`Commissionerfor Patents
`P.O. Box 1456
`Alexandria, VA 22313-1450
`
`RESPONSE AND REQUEST FOR RECONSIDERATION
`
`The Applicants responds to the non-final Office Action mailed December7, 2010 (‘the
`
`Office Action’) as follows:
`
`Remarks, beginning on page 2 ofthis paper.
`
`Page 1 of 10
`
`-1-
`
`VirnetX Exhibit 2007
`Black SwampIP, LLC v. VirnetX Inc.
`IPR2016-00957
`
`
`
`
`VirnetX Exhibit 2007
`Black Swamp IP, LLC v. VirnetX Inc.
`IPR2016-00957
`Trial PGR2016-00007
`
`Page 1 of 10
`
`

`

`Serial No.: 11/679,416
`Response to December 7, 2010 Office Action
`
`Applicants appreciate the Examiner’s examination of the subject application. Claims 2-
`
`Remarks
`
`36 are currently pending. No claims have been amended or cancelled.
`
`In the Office Action, the Examiner has rejected Claims 2-30 under 35 U.S.C. § 1020b), as
`
`being anticipated by Aventail Connect v 3.1/v2.6 Admuinistrator’s Guide (‘Aventail”’).
`
`Applicants respectfully traverse the outstanding rejection and requests reconsideration of
`
`the subject application in light of the following remarks.
`
`Patentability under 35 U.S.C. § £02
`
`The Examiner has rejected Claims 2-30 under 35 U.S.C. § 102(b), as being anticipated by
`
`Aventail. These rejections are respectfully traversed, and reconsideration and withdrawal of
`
`these rejections are respectfully requested.
`
`independent claim 2 recites the following:
`
`A method of using a first device to cornmunicate with a second device having a
`secure name, the method comprising:
`from the first device, sending 4 message to a secure name service, the
`message requesting a network address associated with the secure name of the
`second device;
`at the first device, receiving a message containing the network address
`associated with the secure mame of the second device; and
`fromthe first device, sending a message to the network address associated
`with the secure name ofthe seconddevice using a secure communication link.
`
`(ermphasis added).
`
`As a preliminary matter,Aventatl has not been shown to be priorart to all pending claims
`
`in the present application, including claim 2. In fact, Aventail is not prior art. The present
`
`application claims priority to U.S. Patent Nos. 6,502,135 (hereinafter “the °135 patent’) and
`
`7,188,180 Chereinafter “the °180 patent”). The 7135 and ’180 Patents were subject to inter partes
`
`reexamination proceedings, Control Nos. 93/001,269 (heremafter “the “269 Reexam’”) and
`
`Page 2 of 10
`
`~2-
`
`Page 2 of 10
`
`

`

`Serial No.: 11/679,415
`Response to December 7, 2010 Office Action
`
`95/001 ,270 (heremafter “the "270 Reexam’”), respectively (collectively “Reexams”). In both
`
`Reexams, the USPTO determined that “Aventail cannot be relied uponas prior art to the
`
`fpatents].” See Reexamination Control No. 95/001,269, Action Closing Prosecution, June 16,
`
`2010, p. 3 (Exhibit A}; Reexamination Control No. 95/001,270, Action Ciosing Prosecution,
`
`June 16, 2610, p. 3 (Exhibit B). This sound determination was based on the fact that no evidence
`
`was found to establish Aventail’s publication date.
`
`Indeed, Aventail’s identification of a copyright date range of 1996 — 1999 is not
`
`equivalent to a publication date. The distinction between a publication date and a copyright date
`
`is critical. To establish a date of publication, the reference rust be shown to have “been
`
`disserninated or otherwise made available to the extent that persons interested and ordinarily
`
`skilled in the subject matter or art, exercising reasonable diligence, can locate it.” fn re Wyre,
`
`655 F.2d 221 (C.C.PLA. 1981). Aventail, on its face, provides “© 1996-1999 Aventail
`
`Corporation.” The copyright date does not meet this standard. Unlike a publication date, a
`
`copyright date merely establishes “the date that the document was created or printed.”
`
`Hilgraeve, inc. v. Symantec Corp., 271 F. Supp. 2d 964, 975 CE.D. Mich, 2003).
`
`Even presuming the author of the document accurately represented the date the document
`
`was created, a creation date alone is not evidence of arysort of publication or dissemination.
`
`Without more, this bald assertion of the creation of the document does not meet the “publication”
`
`standard requnred for a document to be relied uponas prior art.
`
`Further exacerbating matters is the filing date of the ’135 Patent: February 15, 2006.
`
`Suppose the relied upon sections of the Aventail reference were created on December 31, 1999,
`
`and the copyright date range were accordingly amended to read “1996-1999.” Underthese
`
`circurnstances, it is possible that the document, although created, was not made publicly
`
`Page 3 of 10
`
`Page 3 of 10
`
`

`

`Serial No.: 11/679,415
`Response to December 7, 2010 Office Action
`
`available until after the filing date of the °135 Patent, six weeks after creation. And, under these
`
`circurnstances, Aventail clearly would not be cligible to be relied upon as prior art to the °135
`
`Patent.
`
`As an aside, the Applicant notes that the present assignee (VirnetX Inc.) and its
`
`prosecution counsel have been accused of inequitabie conduct during the °269 Roexarn ina
`
`litigation proceeding, VirnetX Inc. v. Cisco Systems, Inc., et al., United States District Court for
`
`the Eastern District of Texas, Tyler Division, Case No. 6:10-cv-417. Exhibits C-E.
`
`Inits
`
`OriginalAnswer, Affirmative Defenses, and Counterclaims to the Virnetx’s Original Complaint,
`
`the Defendant Apple Inc. (Apple) alleges that evidence of Aventail’s publication as early as
`
`June 1999 was presented in a different tral mvolving Microsoft Corporation. Exhibit C at | 23
`
`(p. 14). Apple farther alleges that “VirnetX was aware that the Aventail reference may have
`
`been published at least as early as Ime 1999." Exhibit C at 423. Defendants Aastra
`
`Technologies Limited and Aastra USA Inc. (“Aastra’’) have made similar allegations in their
`
`responsive pleadings. Exhibit D at 7 86 (p. 19); Exhibit E at 7 86 (p. 19).
`
`To the contrary, the applicants are unaware of evidence establishing Aventail’s
`
`publication date, and specifically are unaware of the June 1999 publication date alleged by Apple
`
`and Aastra in their pleadings. The trial transcript from the Microsoft trial doos not discuss
`
`anything about a publication date for the Aventail reference. Exhibit F. While thetrial transeript
`
`references the Aventail product, tt does not mention anything about a publication date. See e.g.
`
`Exhibit F-2, pp. 112, 146; Exhibit F-3, pp. 115, 119-20; Exhibit F-10 pp. 21-40; Exhibit F-11,
`
`pp. 21-32, 120-150. The deposition of Gary Tomlinson (former ernaployee of Aventail) taken
`
`during discovery prior to the Microsoft trial is inconclusive, at best. Exhibit H at pp. 33-36.
`
`Thus, although an allegation of knowledge has been made bya third party, the applicants, the
`
`Page 4 of 10
`
`Page 4 of 10
`
`

`

`Serial No.: 11/679,416
`Response to December 7, 2010 Office Action
`
`assignee and applicants’ prosecution counsel have not had and do not have such knowledge. To
`
`be sure, the Applicants will notify the USPTO immediately ifit becomes aware of evidence of
`
`Aventail’s publication date,
`
`Assuming arguendo, that Aventail is prior art to the present application, it is not
`
`understood to disclose the features of claim 2, particularly with respectto at least the features of
`
`“a secure communication link,”
`
`39 66,
`“a secure name service,” and a “secure namc.”
`
`Aventail’s disclosure was summarized in the Declaration of Professor Jason Nich in
`
`support of the "270 Reexam. Reexamination Control No. 95/001,270, Declaration ofJason
`
`Nieh, PhD, Pursuant to 37 CPR. § 1.432, April 19, 2010, 4) 14 - 29 CExhibit G) (hereinafter
`
`“Nieh Decl”). The Nich Decl. is cited hereto characterize the cited references andtheir
`
`deficiencies.
`
`Aventail discloses a system and architecture for transmitting data between two
`
`computers using the SOCKS protocol. Nich Decl. at] 14. The system routes certain, predefined
`
`network traffic from a WinSock (Windows sockets) application to an extranct (SOCKS) server,
`
`possibly through successive servers. Aventail at 7; Nich Decl. at #14. Upon receipt of the
`
`network traffic, the SOCKS server then transmits the network traffic to the Internet or external
`
`network. Aventail at 7; Nich Deci. at @ 14. Aventail’s disclosure is limited to connections
`
`created at the socket layer of the network architecture. Nich Decl. at { 14.
`
`In operation, a component of the Aventail Connect software described in the reference
`
`resides between WinSock andthe underlying TCP/IP stack. See Aventail at 9; Nieh Decl. at |
`
`15. The Aventail Connect software intercepts all connection requests from the user, and
`
`determines whether cach request matches local, preset criteria for redirection to a SOCKSserver.
`
`See Aventail at 10; Nich Decl. at15. If redirection is appropriate, then Aventall Connect
`
`Page 5 of 10
`
`Page 5 of 10
`
`

`

`Serial No.: 11/679,416
`Response to December 7, 2010 Office Action
`
`creates a false DNS entry to return to the requesting application. See Aventail at 12; Nich Decl.
`
`at 16. Aventail discloses that Aventail Connect then forwards the destination hostname to the
`
`extranet SOCK server over a SOCKS connection. SeeAventail at 12; Nich Decl. at 16. The
`
`SOCKSserver performs the hostname resolution. Aventail at 12; Nich Decl. at 17. Once the
`
`hostname is resolved, the user can transmit data over a SOCKSconnection to the SOCKSserver.
`
`Nich Decl. at { 17. The SOCKSserver, then, separatelyrelays that transmitteddatato the target.
`
`Nich Decl. at Y 17.
`
`Aventail fails to disclose “a secure name service” and a “secure name.” Aventail
`
`discloses conventional domain name services and domain names. Indeed, in reexamination of
`
`the “180 Patent, the Patent Office found that Aventail discloses a conventional “DNS server and
`
`the creation of a secure tunnel to 4 secure remote site.” Reexamination Control No. 95/001,270,
`
`Action Closing Prosecution, une 16, 2016, Exhibit B, at 48] 6-7. Aventail does nat disclose a
`
`non-conventional system. fa In contrast to Aventail, paragraphs [6318] — [6320] of the present
`
`application distinguish the claimed mvention from conventional systems. See, generally, Nich
`
`Dec, at 4] 10-13.
`
`Aventail also does not teach the claimed secure communication link. First,Aventail has
`
`not been shown to demonstrate that computers connected via the Aventail system are able to
`
`comumunicate with each other as though they were on the same network. fd. at | 25. Aventail
`
`discloses establishing point-to-point SOCKS connections betweena chent computer and a
`
`SOCKSserver. fd. The SOCKSserver then relays data received to the intended target.
`
`fd.
`
`Aventail does not disclose a secure communication link, where data can be addressed to a target,
`
`ey
`regardicss of the location ofthe target. See, generally, id., (24-27.
`
`Page 6 of 10
`
`Page 6 of 10
`
`

`

`Serial No.: 11/679,415
`Response to December 7, 2010 Office Action
`
`Second, according to Aventail, Aventail Connect’s fundamental operation is
`
`mcompatible with users transmitting data that are sensitive to network information. /d. at 728.
`
`As stated above, Aventail discloses thatAventail Connect operates between the WinSock and
`
`TCP/IP layers, as depicted on page 9:
`
`;:::i
`
`:
`
`S
`eRSnaeBoece
`
`:
`i
`
`|
` Asmervheadl Comeynect
`
`aygeramed Sarees: Poagtetieer :
`
`PORAS ohoesk
`|
`
`
`Aventail at 9; id. Because Aventail discloses that Aventail Connect operates between these
`
`layers, it can intercept DNS requests. Nich Decl. at 728. Aventail discloses that Aventail
`
`Connect intercepts certain DNS requests and returns a false DNS response to the user if the
`
`requested hostrarne rnatches a hostname or a user-defined list. fd. Accordingly, Aventail
`
`discloses that the user will receive false network information from Aventail Connect for these
`
`hostnames.
`
`/d. If the client computer hopes to transfer to the target data that is sensitive to
`
`network information, Aventail Connect’s falsification of the network information would prevent
`
`the correct transfer of data. fd. Aventail has not been shownto disclose a secure communication
`
`link.
`
`Page 7 of 10
`
`Page 7 of 10
`
`

`

`Serial No.: 11/679,416
`Response to December 7, 2010 Office Action
`
`Third, Aventail has not been shown to disclose a secure communication link because
`
`computers connected according to Aventail do not cornmunicate directly with each other. fd. at
`
`#29. Aventail discloses a system where a client on a public network transmits data to a SOCKS
`
`server via a singular, point-to-point SOCKS connection at the socket layer of the network
`
`architecture. fd. The SOCKSserver then relays that data to a target computer on a private
`
`network on which the SOCKS server alse resides. fd. All communications between the client
`
`and target stop andstart at the intermediate SOCKS server. fd. The chent cannot open a
`
`connection with the target itself. Therefore, one skilled in the art would not have considered the
`
`chent and target to be virtually on the same private network. Jd. Instead, the client computer
`
`and target computer are deliberately separated by the interrnediate SOCKS server. Ad. For these
`
`reasons, Aventatl not onlyfails to disclose the claimed secure communication link.
`
`For all these reasons, Applicant respectfully submits that Aventail does not disclose the
`
`elements of independent claim 2. Applicant respectfully submits that claim 2 is in condition for
`
`allowance. Reconsideration and withdrawal ofthe rejection of independent claim 2 is
`
`respectfully requested.
`
`independent claims 24, 26, and 28-30 recite one or more of “a secure name,” “a secure
`
`name service,” or “a secure cornmunication link.” For the reasons stated above, Applicant
`
`respectfully submits that claims 24, 26, and 26-30 are in condition for allowance.
`
`Reconsideration and withdrawal ofthe rejection of independent claim 2 is respectfully requested.
`
`The other claims currently under consideration in the application are dependent from
`
`their respective independent claims discussed above and therefore are believed to be allowable
`
`over the applied reterences for at least the reasons providedabovefor their respective
`
`independent claims. Because cach dependent claimis deernedto define anadditional aspect of
`
`Page 8 of 10
`
`Page 8 of 10
`
`

`

`Serial No.: 11/679,415
`Response to December 7, 2010 Office Action
`
`the invention, the individual consideration of each on its own merits is respectfully requested.
`
`Reconsideration and withdrawal of the rejections of the dependent clairns are respecttully
`
`requested.
`
`The absence of a reply to a specific rejection, issue, or comment does not signify
`
`agreernent with or concession of that rejection, issue, or comment. In addition, because the
`
`arguments made above maynot be exhaustive, there may be other reasons for patentability of
`
`any or all claims that have not been expressed. Finally, nothing in this paper should be construed
`
`as an intent to concede, or an actual concession of, any issue with regard to any claim, or any
`
`cited art, except as specifically stated in this paper, and the amendment or cancellation of any
`
`claim does not necessarily signify concession of unpatentability of the claimpriorto its
`
`amendment or cancellation.
`
`Page 9 of 10
`
`Page 9 of 10
`
`

`

`Serial No.: 11/679,415
`Response to December 7, 2010 Office Action
`
`In light of the Amendments and Remarks herein, the Applicant submits that the pending
`
`CONCLUSION
`
`claims, claims 2-30, are in condition for allowance and respectfully requests a notice to this
`
`effect. Should the Examiner have any questions, please call the undersigned at the phone
`
`number listed below.
`
`To the extent necessary, a petition for an extension of time (@ months} under 37 CLFLR. §
`
`1.136 is hereby made. Please charge any shortage in fees due in connection with the filing of
`
`this paper, including extension of time fees, to Deposit Account 501133 and please credit any
`
`excess fees to such deposit account.
`
`Respectfully submitted,
`
`McDERMOTT WILL & EMERY LLP
`
`‘Toby H. Kusmer/
`Toby H. Kusrner
`Registration No. 26,418
`28 State Street
`Boston, MA 02109
`Phone: 617-335-4065
`Facsimile: 617-535-3800
`Date: Fune 7, 2073
`
`DM_US 28866337-1.077580.G015
`
`Date: June 7, 2011
`
`Please recognize our Customer No. 23638 as
`our correspondence address.
`
`Page 10 of 10
`
`-10-
`
`Page 10 of 10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket