throbber
Trials@uspto.gov
`571-272-7822
`
`Paper No. 44
`
` Entered: August 30, 2016
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`____________
`
`Case IPR2015-00810
`Patent 8,868,705 B2
`____________
`
`
`
`Before KARL D. EASTHOM, JENNIFER S. BISK, and
`GREGG I. ANDERSON, Administrative Patent Judges.
`
`ANDERSON, Administrative Patent Judge.
`
`
`
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`
`
`
`
`
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`I. INTRODUCTION
`
`Apple Inc. (“Petitioner”) filed a Petition (Paper 1, “Pet.”) pursuant to
`
`35 U.S.C. §§ 311–319 to institute an inter partes review of claims 1–34 of
`
`U.S. Patent No. 8,868,705 B2 (Ex. 1001, “the ’705 patent”). VirnetX Inc.
`
`(“Patent Owner”)1 filed a Preliminary Response. Paper 6 (“Prelim. Resp.”).
`
`We have jurisdiction under 35 U.S.C. § 314. On September 11, 2015, we
`
`granted the Petition and instituted trial on claims 1–34 of the ’705 patent.
`
`Paper 8 (“Institution Decision” or “Dec. Inst.”)
`
`After institution of trial, Patent Owner filed a Patent Owner Response
`
`(Paper 25, “PO Resp.”), and Petitioner filed a Reply (Paper 29, “Reply”). In
`
`addition, Petitioner proffered the Declaration of Dr. Roberto Tamassia
`
`(“Tamassia Declaration,” Ex. 1005). The deposition of Dr. Tamassia was
`
`taken by Patent Owner and filed by both parties. (“Tamassia Deposition,”
`
`Ex. 1068).2 Patent Owner proffered the Declaration of Dr. Fabian Monrose.
`
`(“Monrose Declaration,” Ex. 2016).3 The deposition of Dr. Monrose was
`
`taken in this proceeding4 and in the ’237 IPR. (“Monrose Deposition,” Ex.
`
`1066).
`
`An oral hearing was held on June 8, 2016. The transcript of the
`
`hearing has been entered into the record. Paper 43 (“Tr.”).
`
`
`1 The Petition also names Science Application International Corporation as
`Patent Owner. However, the Patent Owner Response names only VirnetX.
`2 Patent Owner filed the Tamassia Deposition as Exhibit 2015. We refer
`only to Ex. 1068 unless otherwise noted.
`3 Patent Owner also filed a Declaration of Dr. Monrose (Ex. 2001) from
`Apple Inc. v. VirnetX Inc., IPR2014-00237 (“’237 IPR”). Patent Owner does
`not cite to Exhibit 2001.
`4 The deposition of Dr. Monrose (Ex. 1067) from the ’237 IPR was also filed
`here by Patent Owner. Patent Owner does not cite to Exhibit 1067.
`
`
`
`2
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`We have jurisdiction under 35 U.S.C. § 6(c). This Final Written
`
`Decision is issued pursuant to 35 U.S.C. § 318(a). We conclude, for the
`
`reasons that follow, that Petitioner has shown by a preponderance of the
`
`evidence that claims 1–34 of the ʼ705 patent are unpatentable.
`
`A. The ’705 Patent
`
`The ’705 patent describes a system and method for transparently
`
`creating an encrypted communications channel between a client device and a
`
`target device. Ex. 1001, Abstract, Figs. 26, 27 (elements 2601, 2604).
`
`Secure communication is based on a protocol called the “Tunneled Agile
`
`Routing Protocol” or “TARP.” Id. at 3:16–19. Once the encrypted
`
`communications channel is created, the devices are configured to allow
`
`encrypted communications between themselves over the encrypted
`
`communications channel. Id. at 40:66–41:9. Figure 26 of the ’705 patent is
`
`reproduced below.
`
`
`
`3
`
`
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`
`
`Referring to Figure 26, user’s computer 2601 is a conventional client, e.g., a
`
`web browser. Ex. 1001, 39:58–60. Gatekeeper server 2603 is interposed
`
`between modified Domain Name Server (“DNS”) 2602 and secure target
`
`site 2604. Id. at 39:62–66. The DNS includes both conventional DNS
`
`server function 2609 and DNS proxy 2610. Id. Conventional IP protocols
`
`allow access to unsecure target site 2611. Id. at 39:66–67.
`
`In one described embodiment, establishing the encrypted
`
`communications channel includes intercepting from the client device a
`
`request to look up an Internet Protocol (IP) address corresponding to a
`
`domain name associated with the target device. Ex. 1001, 40:1–19. It
`
`further includes determining whether the request to look up the IP address
`
`corresponds to a device that accepts an encrypted channel connection with
`
`the client device. Id. at 40:1–29. Gatekeeper 2603 facilitates and allocates
`
`the exchange of information for secure communication, such as using
`
`“hopped” IP addresses. Id. at 40:32–35.
`
`The DNS proxy server handles requests for DNS look-up for secure
`
`hosts. Ex. 1001, 40:43–45. If the host is secure, then it is determined
`
`whether the user is authorized to connect with the host. Id. at 40:51–53. If
`
`the user is authorized to connect, a secure Virtual Private Network (VPN) is
`
`established between the user’s computer and the secure target site. Id. at
`
`40:66–41:2.
`
`B. Illustrative Claim
`
`Petitioner challenges claims 1–34 of the ’705 patent. Claim 1 is an
`
`independent method claim and claim 21 is an independent system claim. All
`
`
`
`4
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`remaining claims depend directly or indirectly from claim 1 or 21. Claim 1
`
`is reproduced below.
`
`1.
`transparently creating an encrypted
`A method of
`communications channel between a client device and a target
`device, each device being configured to allow secure data
`communications between the client device and the target device
`over the encrypted communications channel once the encrypted
`communications channel is created, the method comprising:
`
`(1) intercepting from the client device a request to look up an
`Internet Protocol (IP) address corresponding to a domain name
`associated with the target device;
`
`(2) determining whether the request to look up the IP address
`transmitted5 in step (1) corresponds to a device that accepts an
`encrypted channel connection with the client device; and
`
`
`(3) in response to determining, in step (2), that the request to
`look up the IP address in step (2) corresponds to a device that
`accepts an encrypted communications channel connection with
`the client device, providing provisioning information required
`to initiate the creation of the encrypted communications channel
`between the client device and the target device such that the
`encrypted communications channel supports secure data
`communications transmitted between the two devices, the client
`device being a device at which a user accesses the encrypted
`communications channel.
`
`Ex. 1001, 55:43–67.
`
`
`5 Patent Owner asserts “transmitted” was printed in error and that the claim
`was amended to include “intercepted” instead of “transmitted.” See Prelim.
`Resp. 29, n.3 (citing Ex. 1002, 638–639, 641, 655–656). In our Order dated
`December 9, 2015, (Paper 24) we authorized Patent Owner to file a request
`for a certificate of correction changing the word “transmitted” in claims 1
`and 21 to “intercepted.” Paper 24, 3. In addition, as stipulated by the
`parties, we ordered that the change of wording does not affect the patentable
`significance of claims 1 and 21. Id.
`
`
`
`5
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`C. Instituted Grounds of Unpatentability
`
`We instituted on the following grounds asserted by Petitioner under
`
`35 U.S.C. § 103: (1) claims 1–4, 6–10, 12–26, and 28–34 as unpatentable
`
`over Beser6 and RFC 2401;7 (2) claims 5, 11, and 27 as unpatentable over
`
`Beser, RFC 2401, and Brand.8 Dec. Inst. 23.
`
`A. Claim Construction
`
`II. ANALYSIS
`
`In an inter partes review, the Board construes claim terms in an
`
`unexpired patent under their broadest reasonable construction in light of the
`
`specification of the patent in which they appear. See 37 C.F.R. § 42.100(b);
`
`Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2142 (2016) (affirming
`
`the Patent Office’s authority to issue regulations establishing and governing
`
`inter partes review under 35 U.S.C. § 316(a)(4)). Under this standard,
`
`absent any special definitions, claim terms or phrases are given their
`
`ordinary and customary meaning, as would be understood by one of ordinary
`
`skill in the art, in the context of the entire disclosure. In re Translogic Tech.,
`
`Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). The Board construed claim
`
`terms in a related patent in the Final Written Decision for the ’237 IPR. See
`
`’237 IPR, (PTAB May 11, 2015) (Paper No. 41) ( “’237 FWD”) (on appeal
`
`at the Federal Circuit). See also VirnetX, Inc. v. Cisco Systems, Inc., 767
`
`
`6 US 6,496,867 B1, issued Dec. 17, 2002, to Nurettin B. Beser and Michael
`Borella (“Beser,” Ex. 1007).
`7 S. Kent and R. Atkinson, Security Architecture for the Internet Protocol,
`Request for Comments: 2401, BBN Corp., November 1998 (“RFC 2401,”
`Ex. 1008).
`8 US 5,237,566, issued Aug. 17, 1993, to Robert C. Brand and Stanford L.
`Mantiply (“Brand,” Ex. 1012).
`
`
`
`6
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`F.3d 1308, 1317–19 (Fed. Cir. 2014) (addressing ancestor VirnetX patents
`
`having similar claim terms).
`
`Petitioner and Patent Owner each proffer proposed constructions of
`
`several claim terms. See Pet. 9–15; PO Resp. 1–17. Regardless of the
`
`preceding, Petitioner contends that the only terms Patent Owner argues are
`
`not disclosed by Beser and RFC 2401 are “secure domain name” and
`
`“intercepting.” Pet. Reply 1–2. Patent Owner disagrees with Petitioner and
`
`with the Institution Decision’s determination that no term requires
`
`construction. PO Resp. 1–2 (citing Dec. Inst. 8). Patent Owner identifies
`
`seven terms for construction. Id. at 3–17.
`
`We have compared Patent Owner’s arguments in its Response to the
`
`terms it identifies for construction. Specifically, Patent Owner argues
`
`Besser and RFC 2401 do not disclose: (1) “intercepting from the client
`
`device a request to look up an Internet Protocol (IP) address;”9 and (2)
`
`“secure domain name.”10 No other argument in the Response is based on a
`
`term Patent Owner proposes for construction. We, therefore, agree with
`
`Petitioner that the only terms that may require construction are “intercepting
`
`from the client device a request to look up an Internet Protocol (IP) address”
`
`and “secure domain name.” See Pet. Reply 1–2. With respect to all other
`
`claim terms Patent Owner identifies for construction, our analysis is based
`
`on plain and ordinary meaning as understood by the person of ordinary skill
`
`in the art.
`
`
`9 PO Resp. 21–27.
`10 PO Resp. 33–34.
`
`
`
`7
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`1. “intercepting from the client device a request to look up an Internet
`Protocol (IP) address” (claims 1 and 21)
`
`Independent method claim 1 recites “intercepting from the client
`
`device a request to look up an Internet Protocol (IP) address corresponding
`
`to a domain name associated with the target device” (the “intercepting
`
`limitation”). Independent system claim 21 recites similarly “intercept from
`
`the client device a request to look up an Internet Protocol (IP) address.”
`
`Petitioner proposes a construction from the institution decision in the ’237
`
`IPR, “receiving a request pertaining to a first entity at another entity.” Pet.
`
`10–11. This construction was adopted in the Final Written Decision in the
`
`’237 IPR. ’237 FWD 10–12.
`
`Quoting Patent Owner in the ’237 IPR, we noted that Patent Owner
`
`“disagrees with this construction” (’237 PO Resp. 23), but “believes that no
`
`construction is necessary” (id. at 26), because “it does not appear that the
`
`construction of ‘intercepting’ will bear on the outcome of the issues in this
`
`inter partes review” (id. at 23). ’237 FWD 11. The ’237 IPR and this
`
`proceeding involve the same issue with respect to this term and the asserted
`
`prior art. Patent Owner does not dispute the relevance of the ’237 IPR,
`
`including the construction of the intercepting limitation. See PO Resp. 24,
`
`n5 (referencing our construction of the intercepting limitation in the ’237
`
`IPR). Patent Owner states in the instant proceeding that “no construction is
`
`necessary.” PO Resp. 11. Nevertheless, Patent Owner urges that if we
`
`construe the term, then we should adopt Patent Owner’s construction:
`
`“receiving a request to look up an internet protocol address and, apart from
`
`resolving it into an address, preforming an evaluation on it related to
`
`establishing a secure communication channel.” Id.
`
`
`
`8
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`To support its proposed alternative construction in this proceeding,
`
`Patent Owner argues its alternative construction “appropriately captures the
`
`notion of performing an additional evaluation on a request to look up an IP
`
`address related to establishing an encrypted communications channel,
`
`beyond conventionally resolving it and returning the address.” PO Resp. 12
`
`(citing Prelim. Resp. 29–32;11 Ex. 2016 ¶ 24). Patent Owner’s arguments
`
`and the record show that Patent Owner’s proposed construction adds
`
`unnecessary functionality to “intercepting a request” and violates the plain
`
`language of the claim. According to Patent Owner’s arguments, another
`
`recited phrase in claim 1 (and a similar phrase in claim 21), captures the
`
`functionality, in particular, the “determination” clause of claim 1. Id. More
`
`specifically, Patent Owner argues in the determination clause of claims 1
`
`and 21 “a determination is made whether the request to look up the IP
`
`address corresponds to a device that accepts an encrypted channel
`
`connection with the client device, and that ‘in response to’ this
`
`determination, provisioning information required to initiate the encrypted
`
`communications channel is provided.” Id. We are not persuaded that
`
`functionality in another step of claim 1 supports Patent Owner’s proposal.
`
`Indeed, that the additional functionality Patent Owner proposes is covered
`
`elsewhere in the same claim would make Patent Owner’s proposed
`
`construction of the intercepting limitation duplicative and/or confusing.
`
`The parties agree that the intercepting limitation (at least) involves
`
`receiving a request at some intermediate device. PO Resp. 11; Pet. 10–11.
`
`
`11 To the extent it attempts to do so, it is improper for Patent Owner to
`incorporate the Preliminary Response in its Response by reference. 37
`C.F.R. § 42.6(a)(3). To the extent the arguments are repeated in the
`Response, they are proper and will be considered.
`
`
`
`9
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`Patent Owner’s proposed construction does not create any distinction
`
`between receiving and intercepting. According to Petitioner’s proposed
`
`construction, an “interception” by (intermediate) proxy DNS includes
`
`“receiving” a request to look up an address for another (downstream) entity
`
`(i.e., the request pertains to that downstream entity). Pet. 10 (citing Ex.
`
`1001, 39:1–3, 40:1–7, Figs. 26, 27). Furthermore, as quoted above, Patent
`
`Owner agreed in the ’237 IPR that Petitioner’s construction captured “the
`
`disclosed embodiments.” ’237 PO Resp. 26. In essence, Petitioner’s
`
`construction captures the notion of interception as disclosed in the ’705
`
`patent, by requiring receiving to “pertain” to another entity.
`
`Patent Owner alleges that Petitioner adopted an “intent” requirement
`
`in the “interception” clause. PO Resp. 23–24, n.5. Patent Owner points to a
`
`discussion by the Board in the ’237 IPR institution decision that Dr.
`
`Tamassia discusses. Id. at 24 (citing Ex. 2015, 80:3–13; Ex. 2016 ¶ 36); see
`
`also id. at 24, n.5 (citing ’237 IPR, Paper 15, 12). Petitioner disagrees with
`
`any intent requirement and contends that Patent Owner mischaracterizes Dr.
`
`Tamassia’s testimony. Pet. Reply 14–15.
`
`Patent Owner only addresses this “intent” requirement in an attempt to
`
`distinguish its claims over the prior art and does not propose it as part of its
`
`claim construction. See id. at 23–24. Furthermore, any alleged prior
`
`requirement of “intent” did not survive to the ’237 FWD. Compare ’237
`
`IPR, Paper 15 (institution decision), 13, with ’237 FWD 10–12. More
`
`importantly, Patent Owner does not allege or attempt to show that the ’705
`
`patent supports or requires such “intent” as part of the broadest reasonable
`
`
`
`10
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`construction of the intercepting limitation. The record fails to show support
`
`for it.12
`
`Based on the foregoing discussion, the record shows that the
`
`additional functionality urged by Patent Owner should not be imported into
`
`the intercepting limitation, and Petitioner’s construction tracks the claim and
`
`Specification. Accordingly, as set forth in the ’237 FWD, the broadest
`
`reasonable construction of the intercepting limitation is “receiving a request
`
`pertaining to a first entity at another entity.”
`
`2. “secure domain name” (claims 3, 10, and 25)
`
`Dependent claims 3 and 10 depend respectively from claims 1 and 8,
`
`which depends from claim 1. Claim 25 depends from claim 21. Claims 3,
`
`10, and 25 each recite “wherein the domain name is a secure domain name.”
`
`Relying, in part, on a related inter partes proceeding, Petitioner argues
`
`“secure domain name” is “a name that corresponds to a secure computer
`
`network address.” Pet. 11–12 (citing IPR2015-00481).13 Petitioner
`
`contends its proposed construction is consistent with the Specification. Id. at
`
`12 (citing Ex. 1001, 51:6–42 (“a ‘secure domain name’ [is] a domain name
`
`that corresponds to the secure network address of a secure server 3320”).
`
`
`12 Although not part of the claim construction, a requestor may “intend” for
`the entered domain name in a request to reach the target device, but the DNS
`intercepts it to perform the look up. See, e.g., Ex. 1001, 39:41–46 (“DNS
`server traps DNS requests”), id. at 39:64–66 (“A gatekeeper server 2603 is
`interposed between the modified DNS server and a secure target site
`2701.”).
`13 The full citation is Apple Inc. v. Virnetx, Inc., IPR2014-00481 (“’481
`IPR”), slip. op. at 8 (PTAB Sept. 3, 2014) (Paper 11); see also ’481 IPR,
`Final Written Decision, at 13–14 (Paper 35) (declining to modify
`construction).
`
`
`
`
`11
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`Petitioner notes additional disclosure from the Specification in support of its
`
`construction. Id. (citing Ex. 1001, 40:1–7, 7:39–42). Finally, Petitioner
`
`refers to testimony from the Tamassia Declaration, which relies on the same
`
`portions of the Specification to conclude that the term has “a more general
`
`meaning of being a name that corresponds to a particular device on a secure
`
`computer network (i.e., one that would have an address on that secure
`
`computer network).” Id. (citing Ex. 1005 ¶ 73).
`
`Patent Owner acknowledges Petitioner’s proposed construction was
`
`adopted in the ’237 IPR. PO Resp. 4. 14 However, Patent Owner argues
`
`“secure domain name” means “a non-standard domain name that
`
`corresponds to a secure computer network address and cannot be resolved by
`
`a conventional domain name service (DNS).” Id. at 3 (Table). Patent
`
`Owner argues its proposed construction was an agreed construction from the
`
`related district court litigation. Id. at 4 (citing Virnetx Inc. v. Apple Inc.,
`
`Case 6:10-cv-00417-LED (E.D. Tex., Dec. 21, 2011), Joint Claim
`
`Construction Chart, 19–20, Ex. 2002). PO Resp. 4. Patent Owner cites to
`
`the Specification as also supporting its proposal, specifically including that
`
`the “secure domain name” is a “nonstandard domain name.” Id. (citing Ex.
`
`1001, 7:29–31, 7:39–42, 50:22–31, 51:6–10, Figs. 33–34). Testimony from
`
`the Monrose Declaration ’810 is also cited as support that “SDNS 3313
`
`contains a cross-reference database of secure domain names and
`
`corresponding secure network addresses.” Id. (citing Ex. 2016 ¶¶ 15–16).15
`
`
`14 The ’237 IPR construction of “secure domain name” is the same as the
`construction in the ’481 IPR cited above by Petitioner.
`15 The cited portion of the Monrose Declaration includes quotes from the
`’705 Patent. The Monrose Declaration does conclude, based on the
`Specification, that “[o]ne of ordinary skill in the art would understand based
`
`
`
`12
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`Patent Owner further contends it disclaimed Petitioner’s proposed
`
`construction in a now completed inter partes reexamination of a related
`
`patent. PO Resp. 5 (citing Control No. 95/001,270, Response to Office
`
`Action, 5 (Apr. 19, 2010), Ex. 2008; Control No. 95/001,270, Right of
`
`Appeal Notice, 4 (Dec. 3, 2010), Ex. 2006). Patent Owner acknowledges
`
`this is a prosecution history estoppel argument which “generally binds only
`
`the patent owner.” Id. at 6–7 (citing Tempo Lighting, Inc. v. Tivoli, LLC,
`
`742 F.3d 973, 978 (Fed. Cir. 2014). Patent Owner urges the prosecution
`
`history should be consulted in subsequent reviews of the patent in
`
`determining the broadest reasonable interpretation. Id. at 7 (citing Microsoft
`
`Corp. v. Proxyconn, Inc., 789 F.3d 1292, 1298 (Fed. Cir. 2015); Straight
`
`Path IP Grp., Inc. v. Sipnet EU S.R.O., 806 F.3d 1356, 1362 (Fed. Cir.
`
`2015)).
`
`We start with the language of claims 3, 10, and 25. These dependent
`
`claims recite that the domain name is a “secure domain name.” The plain
`
`meaning of those words is found in Petitioner’s proposed construction, “a
`
`name that corresponds to a secure computer network address.” The
`
`language is clear and straightforward and any construction under the
`
`broadest reasonable interpretation standard should not lead us away from
`
`that clarity. Phillips v. AWH Corp., 415 F.3d 1303, 1314 (Fed. Cir. 2005)
`
`(en banc) (“In some cases, the ordinary meaning of claim language as
`
`understood by a person of skill in the art may be readily apparent even to lay
`
`judges, and claim construction in such cases involves little more than the
`
`
`on the disclosure of the ’705 patent that to obtain the URL for a ‘secure
`domain name,’ ‘a secure domain name service (SDNS)’ must be queried.”
`Ex. 2016 ¶ 17. This opinion is not supportive of the proposed construction.
`
`
`
`13
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`application of the widely accepted meaning of commonly understood
`
`words.”).
`
`We turn now to the Specification. The patent may set out a particular
`
`meaning of a claim term that diverges from its plain meaning so long as it
`
`does so “with reasonable clarity, deliberateness, and precision.” In re
`
`Paulsen, 30 F.3d 1475, 1480 (Fed. Cir. 1994). “Without an express intent to
`
`impart a novel meaning to claim terms, an inventor’s claim terms take on
`
`their ordinary meaning.” York Prods., Inc. v. Central Tractor Farm &
`
`Family Ctr., 99 F.3d 1568, 1572 (Fed. Cir. 1996).
`
`The ’705 patent states that “[a]lternatively, software module 3409 can
`
`replace the top-level domain name of server 3304 with any other
`
`non-standard top-level domain name.” Ex. 1001, 50:29–31. The column 50
`
`quote follows a description of standard domain names like .com, including
`
`adding “s” for secure. Id. In addition to the preceding, the Specification
`
`discloses an example of “replac[ing] the top-level domain name . . . with a
`
`secure top-level domain name.” Ex. 1001, 50:22–25, see also id. at 51:6–42
`
`(a “secure domain name” is a domain name that corresponds to the secure
`
`network address of a secure server 3320), id. at 40:1–7 (evaluating domain
`
`names in DNS requests to determine whether access to a secure site has been
`
`requested), id. at 7:39–42 (“Each secure computer network address is based
`
`on a non-standard top-level domain name, such as .scom,.sorg, .snet, .sedu,
`
`.smil and .sint.”). Thus, the Specification does not expressly state that the
`
`“secure domain name” must be “non-standard,” only that it is secure, which
`
`is encompassed in Petitioner’s proposed construction.
`
`Next we address Patent Owner’s prosecution history estoppel
`
`argument. There is nothing in the Federal Circuit case law which dictates
`
`
`
`14
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`that prosecution history is anything more than something to be consulted in
`
`claim interpretation. Philips, 415 F.3d at 1317 (“[T]he prosecution history
`
`provides evidence of how the PTO and the inventor understood the patent.
`
`. . . Yet because the prosecution history represents an ongoing negotiation
`
`between the PTO and the applicant, rather than the final product of that
`
`negotiation, it often lacks the clarity of the specification and thus is less
`
`useful for claim construction purposes.”); Tempo Lighting, Inc. v. Tivoli,
`
`LLC, 742 F.3d 973, 978 (Fed. Cir. 2014) (The “court also observes that the
`
`PTO is under no obligation to accept a claim construction proffered as a
`
`prosecution history disclaimer, which generally only binds the patent
`
`owner.”).
`
`The Specification and claims record do not support the prosecution
`
`history arguments. The plain language of the claims outweighs the
`
`arguments made. For example, Patent Owner contends that Patentee
`
`disclaimed “a domain name that just happens to be associated with a secure
`
`computer or just happens to be associated win an address requiring
`
`authorization” during an inter partes reexamination of a related patent, and
`
`that the Specification supports its construction. See PO Resp. 5 (citing
`
`Response to Office Action in control No. 95/001,270 (Apr. 19, 2010), 5 (Ex.
`
`2008)). It is not clear how this argument creates a distinction, or what “just
`
`happens to be associated with a secure computer” means, but Patent Owner
`
`appears to contend it means “a secure domain name cannot be resolved by a
`
`conventional domain name service.”16 See PO Resp. 5; Ex. 2008, 6 (arguing
`
`
`16 The Examiner’s citations and reasoning in the 95/001,270 reexamination
`proceeding involving the ’180 patent track Patent Owner’s arguments and do
`not support the specific disclaimer argued. The Examiner states that “[f]or
`
`
`
`15
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`“a secure domain name cannot be resolved by a conventional domain name
`
`service, for example, but relying on “the inventors . . . acting as their own
`
`lexicographers” and citing disclosed examples in the ’180 patent of non-
`
`standard top-level domain names).
`
`Nothing in the ’705 (or ’180) patent requires a conventional DNS not
`
`to return an address for all of the disclosed secure domain names, for
`
`example, if the name happens to be listed in that DNS and also another
`
`DNS, such as a secure DNS. A conventional DNS function involves
`
`resolving names into addresses. See Ex. 1005 ¶¶ 126–27 (“much like a file
`
`system”), 304–08 (citing Ex. 1001, 39:1–3 (describing Conventional DNS
`
`functionality)). The ’705 patent contemplates returning different addresses
`
`for the same domain name based on a user’s security levels, identity, and/or
`
`subscription level, , and combining conventional DNS and proxy functions.
`
`Ex. 1001, 40:20–29, 38–40, 51–57, 51:6–27. Furthermore, rather than not
`
`returning a secure domain name from a conventional DNS based on the type
`
`of name itself, the Specification states that a “DNS proxy” returns a “host-
`
`unknown” “if the user had requested lookup of a secure web site but lacked
`
`credentials to create such a connection.” Id. at 40:24–27 (emphases added).
`
`
`example, the ’180 patent explains that a secure domain name service can
`resolve addresses for a secure domain name whereas a conventional domain
`name service cannot resolve addresses for a secure domain name.” Ex.
`2006, 6 (citing ’180 patent, 51:25–53). Citing the same passage, the
`Examiner also states that “querying a convention[al] domain name server
`using a secure domain name will result in a return message indicating that
`the URL is unknown.” Id. The cited examples do not support a clear
`disclaimer that distinguishes a “secure domain name” from a secure domain
`name that happens to correspond to a secure computer. See id. These
`passages describe examples that correspond to a non-standard top-level
`domain name. See ’180 patent, 51:25–53.
`
`
`
`16
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`
`Patentee’s attempt during prosecution of the ’180 patent to act as its
`
`“own lexicographer[]” by relying on examples in the ’180 patent that relate
`
`to non-standard top-level domain names indicates (Ex. 2008, 6) that the
`
`disclaimer argument does not pass muster. Patent Owner does not argue
`
`here that the ’705 patent supports a lexicographic definition for all its
`
`disclosed secure domain names based on unclaimed examples related to top-
`
`level secure domain names.
`
`Furthermore, Petitioner contends that Patent Owner argued during
`
`prosecution of a related patent that the term “secure name” encompassed a
`
`“secure non-standard domain name” such as “a secure nonstandard top-level
`
`domain name (e.g., .scom) or a telephone number.” Pet. Reply 16 (citing
`
`Ex. 1069, 9). The cited prosecution history by Petitioner shows that
`
`Patentee urged a construction that more closely tracks Petitioner’s
`
`construction here and does not require a conventional DNS not to recognize
`
`a secure name:
`
`Applicant submits that a “secure name” is a name associated
`with a network address of a first device. The name can be
`registered such that a second device can obtain the network
`address associated with the first device from a secure name
`registry and send a message to the first device. The first device
`can then send a secure message to the second device. The
`claimed “secure name” includes, but is not limited to, a secure
`domain name. For example, a “secure name” can be a secure
`non-standard domain name, such as a secure non-standard top-
`level domain name (e.g., .scom) or a telephone number.
`
`Ex. 1069, 9 (emphasis added).
`
`Patent Owner does not demonstrate that the Specification requires a
`
`secure domain name to be “top-level” or “non-standard.” And more
`
`importantly, setting aside the top-level domain names, which are mere
`
`
`
`17
`
`

`
`IPR2015-00810
`Patent 8,868,705 B2
`
`examples that Patent Owner does not rely on as part of its proposed claim
`
`construction, Patent Owner fails to explain clearly what the term “non-
`
`standard” means or how a “non-standard” domain name differs from a
`
`“secure computer network address.” As discussed below, even if we
`
`adopted Patent Owner’s narrower claim construction, as supported by the
`
`prosecution history, our obviousness analysis would remain unchanged.
`
`We determine that the prosecution history argument is not supported by the
`
`Specification and is outweighed by the plain language of the claim.
`
`Similarly, in addition to the just-described prosecution history, in the
`
`final written decision in the ’481 IPR, the Board found that “Patent Owner . .
`
`. made the opposite argument to a district court that it is making here, and
`
`argued that the ‘non-standard’ distinction ‘is not supported by the
`
`specification or the prosecution history.’” IPR2014-00481, Paper 35, 13
`
`(quoting ’481 IPR Ex. 1018, 18 (district court findings and rationale)).17
`
`The record here supports the argument made by Patent Owner in the district
`
`court––the Specification and prosecution history do not support the non-
`
`standard distinction.
`
`Neither are we persuaded that what the parties agreed to in the district
`
`court binds us. First, Petitioner does not agree to that construction in this
`
`proceeding. We are unaware of any precedent preventing Petitioner from
`
`taking inconsistent positions in different forums and Patent Owner does not
`
`cite any either. Further, as has now been confirmed in Cuozzo, we apply the
`
`broadest reasonable interpretation standard and not the litigation standard in
`
`
`17 The district court case cited in the ’481 IPR involved a finding of a
`disclaimer of a different but related term: “secure domain name service.”
`See ’481 IPR, Ex. 1018, 17–18; ’481 IPR, Ex. 2003, 91.
`
`
`
`
`18
`
`

`
`IPR2015-00810
`Patent 8

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket