throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`Paper 32
`Entered: February 20, 2018
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`
`Case IPR2016-01585
`Patent 8,904,516 B2
`
`
`
`
`
`
`
`
`
`
`Before Vice Chief Administrative Patent Judge MICHAEL P. TIERNEY,
`KARL D. EASTHOM and STEPHEN C. SIU, Administrative Patent Judges
`
`EASTHOM, Administrative Patent Judge.
`
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`I. INTRODUCTION
`
`A. Background
`
`Petitioner, Apple Inc., filed a Petition (Paper 1, “Pet.”) requesting an
`
`inter partes review of claims 1–9, 11–23, and 25–28 (the “challenged
`
`claims”) of U.S. Patent No. 8,904,516 B2 (Ex. 1001, “the ’516 patent”).
`
`Patent Owner, VirnetX Inc., filed a Preliminary Response. Paper 6 (“Prelim.
`
`Resp.”).
`
`Subsequent to institution (Paper 9, “Inst. Dec.”), Patent Owner filed a
`
`Patent Owner Response (Paper 14, “PO Resp.”), and Petitioner filed a Reply
`
`(Paper 19, “Pet. Reply”). Patent Owner also filed a Motion to Exclude
`
`evidence (Paper 21), Petitioner filed an Opposition (Paper 24), and Patent
`
`Owner filed a Reply to the Opposition (Paper 26).
`
`The record includes a transcription of the Oral Hearing held on
`
`November 2, 2017. Paper 31. The Board has jurisdiction under 35 U.S.C.
`
`§ 6(c). This Final Written Decision issues pursuant to 35 U.S.C. § 318(a)
`
`and 37 C.F.R. § 42.73. For the reasons that follow, we determine that
`
`Petitioner has shown by a preponderance of the evidence that claims 1–9,
`
`11–23, and 25–28 of the ’516 patent are unpatentable.
`
`B. Related Matters
`
`Petitioner and Patent Owner provide listings of district court actions,
`
`other inter partes reviews, and inter partes reexamination proceedings
`
`challenging related patents. See Pet. ix–xiii, Paper 4, 2–16; see also VirnetX,
`
`Inc. v. Cisco Systems, Inc., 767 F.3d 1308, 1316–19 (Fed. Cir. 2014)
`
`(addressing ancestor VirnetX patents); VirnetX Inc. v. Apple Inc., 665 F.
`
`App’x 880 (Fed. Cir. 2016) (affirming Apple Inc. v. VirnetX Inc., Cases
`
`IPR2014-00237 & 238 (PTAB May 11, 2015) (final written decisions “’237
`
`2
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`FWD,” “’238 FWD,” or generally, “’237 IPR,” “’238 IPR”) (appealed by
`
`VirnetX))1; VirnetX Inc. v. Apple Inc., 671 F. App’x. 786 (Fed. Cir. 2016)
`
`(affirming Apple Inc. v. VirnetX Inc., Cases IPR2014-00403, IPR2014-
`
`00404 (PTAB July 29, 2015) (appealed by VirnetX); Apple Inc. v. VirnetX
`
`Inc., Cases IPR2014-00481 & 482 (PTAB August 24, 2015) (appealed by
`
`VirnetX))2; Apple Inc. v. VirnetX Inc., Case IPR2015-00811 (PTAB Sept. 8,
`
`2016) (appealed by VirnetX); Apple Inc. v. VirnetX Inc., Case IPR2015-
`
`00812 (PTAB Aug. 30, 2016) (appealed by VirnetX); Apple Inc. v. VirnetX
`
`Inc., Cases IPR2015-00870 & 871 (PTAB Sept. 28, 2016) (appealed by
`
`VirnetX); Apple Inc. v. VirnetX Inc., Cases IPR2016-00331 & 332 (PTAB
`
`June 22, 2017) (as to the former, final written decision “’331 FWD” (Paper
`
`29), or generally, “’331 IPR)) (appealed by VirnetX). At least the ’237
`
`FWD and the ’331 FWD involve materially the same claim construction and
`
`prior art issues as the instant case as discussed further below.
`
`C. Instituted Grounds of Unpatentability
`
`We instituted on the ground that the combination of Beser3 and RFC
`
`24014 would have rendered obvious claims 1–9, 11–23, and 25–28 of the
`
`’516 patent. Petitioner relies on the Tamassia Declaration (Ex. 1003). In
`
`1 Our reviewing court affirmed the ’237 FWD and the ’238 FWD without
`reaching the merits of the ’237 FWD. See 665 F. App’x. at 889 (citing In re
`Gleave, 560 F.3d 1331, 1338 (Fed. Cir. 2009) (“declining to address
`alternative grounds of invalidity when the court upholds one such ground”)).
`2 The court affirmed the four final written decisions without reaching the
`merits of the ’404 and ’482 proceedings. See 671 F. App’x at 787 (finding
`“no error in the Patent Trial and Appeal Board’s . . . claim constructions or
`findings in the 403 and 481 proceedings).
`3 U.S. Patent No. 6,496,867 B1 (Ex. 1007).
`4 S. Kent and R. Atkinson, Security Architecture for the Internet Protocol,
`Request for Comments: 2401, BBN Corp., November 1998 (Ex. 1008).
`
`3
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`response, Patent Owner relies on the Monrose Declaration (Ex. 2009), which
`
`Patent Owner submitted in the related ’237 IPR.
`
`D. The ’516 Patent
`
`The ’516 patent describes secure methods for communicating over the
`
`Internet. Ex. 1001, Abstract, 10:7–12. According to “BACKGROUND OF
`
`THE INVENTION” as described in the ’516 patent, “[a] tremendous variety
`
`of methods have been proposed and implemented to provide security and
`
`anonymity for communications over the Internet.” Id. at 1:38–40. In
`
`general, “two security issues may be called data security and anonymity,
`
`respectively.” Id. at 1:57–59. At least one prior art system provides
`
`anonymity by hiding the originating terminal address. See id. at 2:47–57
`
`(describing “[s]till another anonymity technique” using “groups of proxies
`
`called crowds”). A system disclosed in the ’516 patent hides the identity of
`
`the destination address by encrypting a packet portion that indicates the true
`
`final destination of the packet. See id. at 2:4–9, 10:7–49. With respect to
`
`data security (i.e., as opposed to anonymity or packet address security), the
`
`’516 patent admits “[d]ata security is usually tackled using some form of
`
`data encryption.” Id. at 1:60–61.
`
`To provide anonymity regarding the “true destination address,” one
`
`disclosed, but unclaimed, aspect of the system “preferably” uses “an IP
`
`hopping function” (id. at 40:27–28), and employs, in one embodiment,
`
`“Tunneled Agile Routing Protocol (TARP)” (id. at 3:19–32) routers 122–
`
`127, described as “special routers or servers” along the hopping path, which
`
`“are similar to regular IP routers 128–132” (id. at 10:8–10). See id. Fig. 2.
`
`TARP routers determine the “next-hop in a series of TARP router hops” (id.
`
`at 10:18–19) in the path and the final destination, by authenticating or
`
`4
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`decrypting transmitted encrypted parts of packets to find the next-hop TARP
`
`router address. Id. at 3:40–67, 10:12–35. “Once the outer layer of
`
`encryption is removed, the TARP router determines the final destination.
`
`Each TARP packet 140 undergoes a minimum number of hops to help foil
`
`traffic analysis.” Id. at 3:51–54. “The hops may be chosen at random.” Id.
`
`at 3:54. “The fact that different packets take different routes provides
`
`distinct advantages by making it difficult for an interloper to obtain all the
`
`packets forming an entire multi-packet message.” Id. at 3:60–63. As noted
`
`above, the system also may encrypt data in the packets. See id. at 1:60–61,
`
`4:11–16.
`
`As a “second improvement,” the ’516 patent also describes “the
`
`automatic creation of a virtual private network (VPN) in response to a
`
`domain-name server look-up function.” Id. at 39:31–33. The challenged
`
`claims here also do not recite or require a VPN.
`
`To create a VPN automatically, the ’516 patent describes employing a
`
`modified Domain Name Server, which may include a conventional Domain
`
`Name Server (DNS) and a DNS proxy. Id. at 40:28–30.
`
`Conventional Domain Name Servers (DNSs) provide a
`look-up function that returns the IP address of a requested
`computer or host. For example, when a computer user types in
`the web name “Yahoo.com,” the user’s web browser transmits a
`request to a DNS, which converts the name into a four-part IP
`address that is returned to the user’s browser and then used by
`the browser to contact the destination web site.
`
`Id. at 39:34–40.
`
`The DNS proxy of the modified DNS server intercepts DNS
`
`lookup requests, determines whether the user has requested access to a
`
`secure site (using for example, a domain name extension or an internal
`
`5
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`table of secure sites), and if so, whether the user has sufficient security
`
`privileges to access the requested site. Id. at 40:34–40. If the user
`
`requests access to a secure site to which it has insufficient security
`
`privileges, the DNS proxy returns a “‘host unknown’” error to the
`
`user. Id. at 40:57–60. If the user requests access to a secure site to
`
`which it has sufficient security privileges, the DNS proxy requests a
`
`gatekeeper to create a VPN between the user’s computer and the
`
`secure target site. Id. at 40:36–52. The DNS proxy then returns to the
`
`user the resolved address passed to it by the gatekeeper, which need
`
`not be the actual address of the destination computer. Id. at 40:47–52.
`
`The (unclaimed) VPN embodiment also is “preferably
`
`implemented using the IP address ‘hopping’ features,” (i.e., changing
`
`IP addresses based upon an agreed upon algorithm) as described
`
`above, “such that the true identity of the two nodes cannot be
`
`determined even if packets during the communication are
`
`intercepted.” Id. at 40:13–17.
`
`E. Illustrative Challenged Claim 1
`
`
`
`Independent claims 1 and 15 recite similar limitations respectively
`
`in system and method format. Compare Ex. 1001, 56:13–32, with id. at
`
`57:8–27. All other challenged claims depend from claims 1 or 15.
`
`Illustrative claim 1 of the challenged claims follows:
`
`1. A system for connecting a first network device and a second
`network device, the system including one or more servers
`configured to:
`
`intercept, from the first network device, a request to look
`up an internet protocol (IP) address of the second network
`device based on an identifier associated with the second
`network device;
`
`
`6
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`determine, in response to the request, whether the second
`
`network device is available for a secure communications
`service; and
`
`initiate an encrypted communication link between the
`first network device and the second network device based on a
`determination that the second network device is available for
`the secure communications service,
`service
`
`wherein
`the
`secure
`communications
`communicates using the encrypted communication link, the
`first network device is a device at which a user uses the secure
`communications service to access the encrypted communication
`link, and;
`
`the one or more servers includes one or more processors.
`
`Ex. 1001, 56:13–32.
`
`
`
`II. ANALYSIS
`
`A. Claim Construction
`
`In an inter partes review, the Board construes claims in an unexpired
`
`patent by applying the broadest reasonable interpretation in light of the
`
`specification. 37 C.F.R. § 42.100(b); Cuozzo Speed Techs., LLC v. Lee, 136
`
`S. Ct. 2131, 2144–46 (2016) (upholding the use of the broadest reasonable
`
`interpretation standard under 37 C.F.R. § 42.100(b)). Under this standard,
`
`absent any special definitions, claim terms or phrases carry their ordinary
`
`and customary meaning, as would be understood by one of ordinary skill in
`
`the art, in the context of the entire disclosure. In re Translogic Tech., Inc.,
`
`504 F.3d 1249, 1257 (Fed. Cir. 2007).
`
`1. “intercept . . . a request”
`
`Relying on the ’516 patent Specification and citing to the ’237 FWD,
`
`Petitioner proposes construing the claim 1 phrase “intercept . . . a request” as
`
`“receiving a request pertaining to a first entity at another entity.” Pet. 10
`
`(citing ’237 FWD, 10–12; Ex. 1003 ¶ 62) (emphasis omitted). Claim 15
`
`7
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`recites a similar “intercepting a request” phrase. We adopted this
`
`construction in the Institution Decision, and we maintain it for the reasons
`
`provided therein and as summarized below. See Inst. Dec. 6–9. 5
`
`Patent Owner disagrees with this construction, but contends “[n]o
`
`construction is necessary.” PO Resp. 3. Patent Owner also contends that
`
`“[i]f the Board decides to provide a construction, it should modify its current
`
`construction.” Id. Patent Owner proposes that the phrase means “receiving
`
`a request to look up an internet protocol address and, apart from resolving it
`
`into an address, performing an evaluation on it related to establishing a
`
`virtual private network communication link.” Id. Patent Owner contends
`
`that its “construction appropriately captures the notion of performing an
`
`additional evaluation on a request to look up an IP address related to
`
`establishing a secure communication link, beyond conventionally resolving
`
`it and returning the address.” Id. at 6.
`
`Patent Owner’s contentions are not persuasive. Patent Owner fails to
`
`explain sufficiently why the notion of “performing an additional evaluation”
`
`
`5 Claim 1 at issue in the ’237 IPR (U.S. Patent No. 8,504,697) (the “’697
`patent”) recites a similar clause: “intercepting, from the first network
`device, a request to look up an internet protocol (IP) address of the second
`network device based on a domain name associated with the second network
`device.” ’237 FWD 4. The Board employed the same construction therein.
`Id. at 10–12; note 6 infra. The ’697 and ’516 patents have common ancestor
`patents at issue in Cisco, 767 F.3d at 1308; i.e., both patents ultimately
`continue through one or more applications of U.S. Patent No. 7,921,211,
`which is a continuation of U.S. Patent No. 7,418,504 (“’504 patent”), which
`is a continuation-in-part of U.S. Patent No. 6,502,135––three of the four
`patents at issue in Cisco. See 767 F.3d at 1313. (The fourth patent at issue
`in Cisco, is U.S. Patent No. 7,490,151 (“’151 patent”), a division of the ’135
`patent.)
`
`8
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`constitutes an implicit part of the claimed intercept clause. Addressing
`
`similar arguments by Patent Owner, the Board made a similar determination
`
`in the ’237 FWD. See ’237 FWD 12 (“the record shows that the additional
`
`functionality urged by Patent Owner should not be imported into the
`
`intercepting phrase”).
`
`To support its construction, Patent Owner points to embodiments
`
`drawn to a VPN, which includes DNS proxy 2610. PO Resp. 5. Patent
`
`Owner also argues “the claimed embodiments differ from [a] conventional
`
`DNS, in part, because they apply an additional layer of functionality to a
`
`request to look up a network address beyond merely resolving it and
`
`returning the network address.” Id. (citing Ex. 2009 ¶ 24).
`
`According to Patent Owner, these “example” “additional . . .
`
`functionality” features include the following:
`
`For example, the DNS proxy 2610 may intercept the request
`and “determine[] whether access to a secure side has been
`requested,” “determine[] whether the user has sufficient
`security privileges to access the site,” and/or “transmit[] a
`message to gatekeeper 2603 requesting that a virtual private
`network be created between 40 user computer 2601 and secure
`target site 2604.”
`
`Id. (quoting Ex. 1001, 40:34–43; citing Ex. 2009 ¶ 24).
`
`Patent Owner concludes “[t]he Board’s preliminary construction
`
`overlooks these aspects that distinguish the ‘intercepting’ phrase from
`
`conventional DNS.” Id. at 6.
`
`Contrary to Patent Owner’s arguments, none of the challenged claims
`
`recite a VPN, a DNS proxy, a non-conventional DNS, or setting up a VPN
`
`link. Furthermore, the additional disclosed functions of a DNS or VPN fail
`
`9
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`to show that the “intercept” clause at issue requires the unclaimed additional
`
`functionality.
`
`In addition, the disclosed VPN embodiment cited by Patent Owner
`
`supports Petitioner’s proposed claim construction, as DNS server 2602
`
`performs the intercept by “receiving a request pertaining to a first entity
`
`[2604 or 2611] at another entity [2602].” As the ’516 patent discloses, in
`
`one embodiment, a “single server” 2602 having “the functions of DNS
`
`proxy 2610 and DNS server 2609” (Ex. 1001, 41:4–6, Fig. 26) “intercepts
`
`all DNS lookup functions” (id. at 40:34–36). In other words, pursuant to
`
`requests for a connection to a secure or unsecure device (first entity),
`
`intercepting DNS server 2602 (another entity) returns the IP address of the
`
`first entity after looking up the domain name. See id. at 40:24–52; Pet. 11
`
`(“Because the request is seeking an address corresponding to a destination
`
`(e.g., site 2604 or 2611), it pertains to an entity other than DNS proxy 2010
`
`or DNS server 2609. Thus, the ’516 patent uses the term ‘intercept’ as
`
`meaning receipt by an entity of a message pertaining to a different entity.”).
`
`Based on the foregoing discussion, we maintain Petitioner’s proposed
`
`construction as adopted in the Institution Decision. The phrase “intercept . .
`
`. a request” means “receiving a request pertaining to a first entity at another
`
`entity.” As indicated above (note 1), this claim construction comports with
`
`our previous final decisions (e.g., ’237 FWD and ’331 FWD).6 Patent
`
`
`6 See ’237 FWD 12 (reaching materially the same construction for a similar
`phrase). As also noted in the ’237 FWD (a final judgment affirmed by our
`reviewing court, supra note 1), “Patent Owner concedes that ‘[t]he
`Decision’s construction [of intercepting a request] addresses a common
`aspect of a conventional DNS and the disclosed embodiments, namely that a
`request to look up an address of one entity may be received at another
`
`10
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`Owner does not present arguments or evidence showing a reason to modify
`
`the previous construction, and Patent Owner does not argue its proposed
`
`claim construction is dispositive.
`
`2. Other Terms
`
`Petitioner and Patent Owner each proffer proposed constructions of
`
`several claim terms. Pet. 9–14; PO Resp. 2–11. Neither party identifies a
`
`dispositive term for construction. No other claim term or clause needs
`
`express construction. See Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200
`
`F.3d 795, 803 (Fed. Cir. 1999) (only terms in controversy require an explicit
`
`construction and only to the extent necessary to resolve the controversy). To
`
`the extent any term requires explicit construction, we rely on our previous
`
`constructions in the ’237 FWD, with the evidence and arguments here and
`
`those cases materially the same. See Pet. 9–14; PO Resp. 2–11; ’237 FWD
`
`5–15; note 5 (same common ancestor patent).
`
`B. Prior Art Printed Publication Status of RFC 2401
`
`Patent Owner asserts that Petitioner fails to show that RFC 2401 was
`
`publicly accessible as of November 1998 (the date recited on each of its
`
`pages). PO Resp. 34 (citing Ex. 1008). On this basis, according to Patent
`
`Owner, Petitioner cannot rely upon RFC 2401 as prior art to meet its burden
`
`of showing obviousness of the challenged claims over the combination of
`
`Beser and RFC 2401. See id.
`
`The determination of whether a given reference qualifies as a prior art
`
`“printed publication” involves a case-by-case inquiry into the facts and
`
`circumstances surrounding the reference’s disclosure to members of the
`
`entity.’” ’237 FWD 24 (quoting ’237 Patent Owner Response 26)
`(emphases added).
`
`11
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`public. In re Klopfenstein, 380 F.3d 1345, 1350 (Fed. Cir. 2004). On its
`
`face, RFC 2401 is a dated “Request for Comments” from the “Network
`
`Working Group,” discussing a particular standardized security protocol for
`
`the Internet. Ex. 1008, 1. Moreover, RFC 2401 describes itself as a
`
`“document [that] specifies an Internet standards track protocol for the
`
`Internet community, and requests discussion and suggestions for
`
`improvements. . . . Distribution of this memo is unlimited.” Id. These
`
`indicia suggest that the document was accessible by the interested public
`
`(over the Internet), in order to obtain feedback prior to implementation of the
`
`standard it describes.
`
`To bolster its showing, Petitioner provides evidence suggesting that
`
`RFC 2401 would have been accessible to the interested public. For
`
`example, Petitioner relies on testimony by Dr. Tamassia, and at least two
`
`articles dated prior to February 2000, referencing RFC 2401 availability on a
`
`website. Pet. 23–24 (citing Ex. 1003 ¶¶ 117–19, 124–25; Ex. 1064, 9; Ex.
`
`1065, 3). As one example, Ex. 1064, an August 16, 1999 magazine article,
`
`discusses RFC 2401 and IPsec protocols and states “[a]ll of these documents
`
`are available on the IETF website.” Ex. 1064, 9.
`
`Petitioner explains that RFC 2401 describes the IPsec protocol
`
`promulgated by the Internet Engineering Task Force (IETF). Pet. 25–26.
`
`Petitioner provides the Ginoza Declaration, by Sandy Ginoza, who, acting as
`
`a designated representative of the IETF, previously testified that RFC 2401
`
`was published on the RFC Editor’s website and was publicly available in
`
`November 1998. Id. at 24–25 (citing Ex. 1060 ¶¶ 105–07; Ex. 1063, 39:14–
`
`40:24). Petitioner provides additional documentary evidence in the form of
`
`an October 1996 RFC 2026 publication (Ex. 1036, 5–6 (explaining that any
`
`12
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`interested person can obtain RFC documents from a number of Internet hosts
`
`using anonymous FTP, gopher, WWW, and other document-retrieval
`
`systems)). Pet. 23 (citing Ex.1036, 3, 5). The additional documentary
`
`evidence further corroborates the indicia of availability on the face of RFC
`
`2401. Exhibit 1036, RFC 2026, states it reflects “generally-accepted
`
`practices” for RFC documents and states any interested person can obtain
`
`RFCs “from a number of Internet hosts.” Ex. 1036, 4, 6. “They [the
`
`procedures described in the document] provide ample opportunity for
`
`participation and comment by all interested parties.” Id. at 4 (“The goal of
`
`technical competence, the requirement for prior implementation and testing,
`
`and the need to allow all interested parties to comment all require significant
`
`time and effort.”).
`
`Patent Owner characterizes Petitioner’s showing as insufficient. PO
`
`Resp. 34–39. Patent Owner contends that Sandy Ginoza and Dr. Tamassia
`
`lack personal knowledge about the publication of RFC 2401, and challenges
`
`other evidence as too general and lacking a sufficient foundation. See PO
`
`Resp. 34–38 (discussing Pet. 24–26, Ex. 1036, 4–5; Ex. 1060–65; Ex. 2022,
`
`22: 7–19). Patent Owner does not contest Petitioner’s characterization of the
`
`two magazine articles, Exhibits 1064 and 1065, other than to refer to them as
`
`follows: “Exhibit 1064 is allegedly an article from InfoWorld magazine
`
`(dated August 16, 1999) and Exhibit 1065 is allegedly an article from
`
`NetworkWorld magazine (dated March 15, 1999).” PO Resp. 36. As
`
`Petitioner argues, the articles show that “the skilled person would have
`
`known that RFCs such as RFC 2401 could be downloaded from the IETF’s
`
`website.” Reply Br. 18 n.2.
`
`13
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`In addition, RFC 2026 states it reflects “generally-accepted practices”
`
`for RFC documents and states any interested person can obtain RFCs “from
`
`a number of Internet hosts.” See PO Resp. 38 & n.6 (citing Ex. 1036, 4,
`
`discussing Inst. Dec. 11); Ex. 1036, 4, 6. Patent Owner contends that
`
`Petitioner has not shown that this evidence of “generally accepted practices”
`
`“is accurate.” Id. Patent Owner notes that the document represents
`
`“flexible” standards, so that “there is no assurance that the procedures of
`
`RFC 2026 that were quoted by Petitioner were actually applied.” Id. at 38.
`
`We find Dr. Tamassia’s testimony as to public accessibility of RFCs
`
`based on his general knowledge as a user of RFCs to be credible, especially
`
`given the independent support of RFC 2026 (Ex. 1036).7 See Ex. 1003
`
`¶¶ 116–23; Ex. 2019, 103:1–12 (testifying his “business includes having
`
`viewed RFCs, having discussed RFCs”), 106:11–17 (describing an RFC
`
`document); Ex. 1036, 5–6. Moreover, RFC 2401’s contents are consistent
`
`with the publication process described by RFC 2026 and Dr. Tamassia,
`
`including the inclusion of a date “November 1998” on the top right corner of
`
`the first page of the document. Ex. 1008, 1. In addition, this document—a
`
`request for suggestions and improvements for an Internet standards protocol,
`
`having no indication of being a mere draft or internal paper—is precisely the
`
`type of document whose very purpose is public disclosure, including on the
`
`Internet. Both of the magazine articles, Exhibits 1064 and 1065, further
`
`corroborate the indicia of availability on the face of RFC 2401, although
`
`they are not necessary to our finding of public accessibility. We do not rely
`
`
`7 As addressed below, Patent Owner objects and moves to dismiss a number
`of Exhibits based on hearsay and relevancy. See Paper 21 (Motion to
`Exclude).
`
`14
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`on the testimony of Sandy Ginoza, Exhibits 1060 and 1063, which Patent
`
`Owner seeks to exclude as discussed further below.
`
`In making our determination, we note least one District Court
`
`characterized RFCs as having “been written and circulated”: “[M]uch of the
`
`development and technical management of the Internet has been by the
`
`consensus of Internet users. This is evidenced . . . by IETF and the more
`
`than 2000 RFC’s which have been written and circulated.” (quoting
`
`PGMedia, Inc. v. Network Sols., Inc., 51 F. Supp. 2d 389, 406 (S.D.N.Y.
`
`1999) (internal citation omitted)).8
`
`“A given reference is ‘publicly accessible’ upon a satisfactory
`
`showing that such document has been disseminated or otherwise made
`
`available to the extent that persons interested and ordinarily skilled in the
`
`subject matter or art exercising reasonable diligence, can locate it.” SRI
`
`Int’l, Inc. v. Internet Sec. Sys., Inc., 511 F.3d 1186, 1194 (Fed. Cir. 2008)
`
`(quoting Bruckelmyer v. Ground Heaters, Inc., 445 F.3d 1374, 1378 (Fed.
`
`Cir. 2006)). We find that Petitioner has established, by a preponderance of
`
`the evidence, that RFC 2401 (dated November 1998) was disseminated and
`
`made available to persons of ordinary skill interested in computer
`
`networking and security to be deemed “publicly accessible” at the relevant
`
`time. Therefore, on this record, we determine RFC 2401 qualifies as a prior
`
`art printed publication under 35 U.S.C. § 102(b).
`
`C. Tamassia Declaration (Ex. 1003)
`
`Patent Owner argues that the entirety of the Tamassia Declaration
`
`should be given little or no weight because Dr. Tamassia “failed to consider,
`
`
`8 See ’331 FWD (Paper 29), 13 (citing the case).
`
`15
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`let alone opine on, how any of the claim features are disclosed in asserted
`
`references.” PO Resp. 42. Patent Owner also contends “the technology
`
`involved is undisputedly complex,” and “[t]he cited references are similarly
`
`complex, and require explanatory expert testimony.” Id. at 45.
`
`Petitioner responds that Dr. Tamassia has “offered probative
`
`testimony on many of the factual inquiries underpinning an obvious[ness]
`
`analysis” that “can certainly ‘help the trier of fact to understand the evidence
`
`or determine a fact in issue.’” Pet. Reply 19 (quoting Fed. R. Evid. 702).9
`
`Petitioner also contends “no rule requires an expert to opine on the ultimate
`
`question of obviousness or on every potentially relevant fact [at] issue for
`
`his opinion to be admissible or entitled to weight.” Id. at 20.
`
`Patent Owner does not articulate a persuasive reason for giving Dr.
`
`Tamassia’s declaration, as a whole, little or no weight in our analysis. We
`
`agree with Petitioner that the panel can determine the appropriate amount of
`
`weight to afford to expert testimony without requiring the expert to opine on
`
`every relevant factual and legal issue. The cases upon which Patent Owner
`
`relies do not show otherwise. For example, Patent Owner cites Schumer v.
`
`Lab. Comput. Sys., Inc., 308 F.3d 1304, 1315 (Fed. Cir. 2002), for the
`
`proposition that “[expert] testimony . . . must identify each claim element,
`
`state the witnesses’ interpretation of the claim element, and explain in detail
`
`how each claim element is disclosed in the prior art reference.” PO Resp. 43
`
`(emphasis by Patent Owner).
`
`9 The parties do not dispute the panel’s preliminary findings regarding
`qualifications of a person of ordinary skill in the art, maintained here after
`considering the record anew. See Inst. Dec. 14–15 (citing Okajima v.
`Bourdeau, 261 F.3d 1350, 1355 (Fed. Cir. 2001) (prior art can reflect the
`appropriate level of ordinary skill in the art)).
`
`16
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`Patent Owner’s quotation of Schumer omits introductory words
`
`necessary to the meaning of the quoted sentence. In its entirety, the quoted
`
`portion of Schumer states the following:
`
`Typically, testimony concerning anticipation must be testimony
`from one skilled in the art and must identify each claim
`element, state the witnesses’ interpretation of the claim element,
`and explain in detail how each claim element is disclosed in the
`prior art reference. The testimony is insufficient if it is merely
`conclusory.
`
`Schumer, 308 F.3d at 1315–16 (emphasis added). The Federal Circuit then
`
`adds that it is not the task of the courts to “attempt to interpret confusing or
`
`general testimony to determine whether a case of invalidity has been made
`
`out” and “if the testimony relates to prior invention and is from an interested
`
`party, as here, it must be corroborated.” Id. at 1316. Instead of requiring a
`
`specific format for the content of all testimony regarding invalidity as
`
`asserted by Patent Owner, this portion of Schumer confirms that a tribunal
`
`should not rely upon conclusory, overly general, confusing, and self-
`
`interested testimony. Id.; see also Koito Mfg. Co., Ltd. v. Turn-Key-Tech,
`
`LLC, 381 F.3d 1142, 1152 (Fed. Cir. 2004) (“General and conclusory
`
`testimony, such as that provided by Dr. Kazmer in this case, does not suffice
`
`as substantial evidence of invalidity.”). Patent Owner does not show that the
`
`whole of Dr. Tamassia’s testimony suffers from any of these failings.
`
`
`
`As Petitioner notes, in Belden Inc. v. Berk-Tek LLC, 805 F.3d 1064
`
`(Fed. Cir. 2015), the Federal Circuit states that in IPRs, “Board members,
`
`because of expertise, may more often find it easier to understand and
`
`soundly explain the teachings and suggestions of prior art without expert
`
`assistance.” Pet. Reply 21 (quoting Belden, 805 F.3d at 1079). Relying on
`
`17
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`Belden, the court dismissed Patent Owner’s similar argument in its appeal of
`
`the related ’238 FWD, holding “even if the record contains expert testimony,
`
`the law does not require the PTAB to rely upon it.” VirnetX, 665 F. App’x
`
`at 884 (quoting Patent Owner’s argument: “[B]ecause [according to
`
`VirnetX] ‘the technology involved is undisputedly complex,’ VirnetX avers
`
`that the PTAB could not have made ‘unpatentability findings in the absence
`
`of any supporting expert evidence.’”) (nonprecedential). The ’237 IPR and
`
`’238 IPR (challenging the same patent) involved the same secure
`
`communications technology as involved here (supra note 5).
`
`Under 35 U.S.C. § 316(e), the preponderance of the evidence standard
`
`governs in determining whether Petitioner establishes unpatentability. We
`
`exercise discretion to determine the appropriate weight to accord the
`
`evidence presented, including expert opinions, based on the underlying facts
`
`supporting the opinion. We accord relevant portions of Dr. Tamassia’s
`
`testimony the appropriate weight based on that particular testimony and
`
`supporting evidence.
`
`D. Obviousness Over Beser and RFC 2401
`
`1. Overview of Beser
`
`Beser describes a system that establishes an IP (internet protocol)
`
`tunneling association on a public network between two end devices. See Ex.
`
`1007, Abs.
`
`18
`
`

`

`IPR2016-01585
`Patent 8,904,516 B2
`
`Figure 1 of Beser follows:
`
`
`
`Figure 1 of Beser illustrates a network system, including public network 12,
`
`network devices 24 and 26, private network 20, trusted third-party network
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket