throbber
Trials@uspto.gov
`571-272-7822
`
` Paper No. 44
`Entered: September 8, 2016
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`____________
`
`Case IPR2015-00811
`Patent 8,868,705 B2
`____________
`
`
`
`Before KARL D. EASTHOM, JENNIFER S. BISK, and
`GREGG I. ANDERSON, Administrative Patent Judges.
`
`ANDERSON, Administrative Patent Judge.
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`
`
`
`
`
`
`
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`
`I. INTRODUCTION
`
`Apple Inc. (“Petitioner”) filed a Petition (Paper 1, “Pet.”) pursuant to
`
`35 U.S.C. §§ 311–319 to institute an inter partes review of claims 1–34 of
`
`U.S. Patent No. 8,868,705 B2 (Ex. 1001, “the ’705 patent”). VirnetX Inc.
`
`(“Patent Owner”)1 filed a Preliminary Response. Paper 6 (“Prelim. Resp.”).
`
`On September 11, 2015, we granted the Petition and instituted trial on
`
`claims 1–34 of the ’705 patent. Paper 8 (“Institution Decision” or “Inst.
`
`Dec.”)
`
`After institution of trial, Patent Owner filed a Patent Owner Response
`
`(Paper 25, “PO Resp.”), and Petitioner filed a Reply (Paper 29, “Pet.
`
`Reply”). In addition, Petitioner proffered the Declaration of Dr. Roberto
`
`Tamassia (“Tamassia Declaration,” Ex. 1005). The deposition of Dr.
`
`Tamassia was taken by Patent Owner and the deposition transcript was filed
`
`by both parties. (“Tamassia Deposition,” Ex. 1068).2 Patent Owner
`
`proffered the Declaration of Dr. Fabian Monrose. (“Monrose Declaration,”
`
`Ex. 2016).3 The deposition of Dr. Monrose was taken in this proceeding
`
`(“Monrose Deposition,” Ex. 1066).
`
`An oral hearing was held on June 8, 2016. The transcript of the
`
`hearing has been entered into the record. Paper 43 (“Tr.”).
`
`We have jurisdiction under 35 U.S.C. § 6(c). This Final Written
`
`Decision is issued pursuant to 35 U.S.C. § 318(a). We conclude for the
`
`
`1 The Petition also names Science Application International Corporation as
`Patent Owner. However, the Patent Owner Response names only VirnetX.
`2 Patent Owner filed the Tamassia Deposition transcript as Exhibit 2015.
`We refer only to Ex. 1068 unless otherwise noted.
`3 Patent Owner also filed a Declaration of Dr. Monrose from Apple Inc. v.
`VirnetX Inc., IPR2014-00237 (“’237 IPR”) (“Monrose Declaration ’237,”
`Ex. 2001). Patent Owner does not cite to Exhibit 2001.
`
`
`
`2
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`reasons that follow that Petitioner has shown by a preponderance of the
`
`evidence that claims 1–34 of the ʼ705 patent are unpatentable
`
`A. The ’705 Patent
`
`The ’705 patent describes a system and method for transparently
`
`creating an encrypted communications channel between a client device and a
`
`target device. Ex. 1001, Abstract, Figs. 26, 27 (elements 2601, 2604).
`
`Secure communication is based on a protocol called the “Tunneled Agile
`
`Routing Protocol” or “TARP.” Id. at 3:16–19. Once the encrypted
`
`communications channel is created, the devices are configured to allow
`
`encrypted communications between themselves over the encrypted
`
`communications channel. Id. at 40:66–41:9. Figure 26 of the ’705 patent is
`
`reproduced below.
`
`Referring to Figure 26, user’s computer 2601 is a conventional client, e.g., a
`
`web browser. Ex. 1001, 39:58–60. Gatekeeper server 2603 is interposed
`
`between modified Domain Name Server (“DNS”) 2602 and secure target
`
`
`
`
`
`3
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`site 2604. Id. at 39:62–66. The DNS includes both conventional DNS
`
`server function 2609 and DNS proxy 2610. Id. Conventional IP protocols
`
`allow access to unsecure target site 2611. Id. at 39:66–67.
`
`In one described embodiment, establishing the encrypted
`
`communications channel includes intercepting from the client device a
`
`request to look up an Internet Protocol (IP) address corresponding to a
`
`domain name associated with the target device. Ex. 1001, 40:1–19. It
`
`further includes determining whether the request to look up the IP address
`
`corresponds to a device that accepts an encrypted channel connection with
`
`the client device. Id. at 40:1–29. Gatekeeper 2603 facilitates and allocates
`
`the exchange of information for secure communication, such as using
`
`“hopped” IP addresses. Id. at 40:32–35.
`
`The DNS proxy server handles requests for DNS look-up for secure
`
`hosts. Ex. 1001, 40:43–45. If the host is secure, then it is determined
`
`whether the user is authorized to connect with the host. Id. at 40:51–53. If
`
`the user is authorized to connect, a secure Virtual Private Network (VPN) is
`
`established between the user’s computer and the secure target site. Id. at
`
`40:66–41:2.
`
`B. Illustrative Claim
`
`Petitioner challenges claims 1–34 of the ’705 patent. Claim 1 is an
`
`independent method claim and claim 21 is an independent system claim. All
`
`remaining claims depend directly or indirectly from claim 1 or 21. Claim 1
`
`is reproduced below.
`
`1. A method of
`transparently creating an encrypted
`communications channel between a client device and a
`target device, each device being configured to allow secure
`data communications between the client device and the
`
`
`
`4
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`
`
`
`target device over the encrypted communications channel
`once the encrypted communications channel is created, the
`method comprising:
`
`(1) intercepting from the client device a request to look up an
`Internet Protocol (IP) address corresponding to a domain
`name associated with the target device;
`
`(2) determining whether the request to look up the IP address
`transmitted4 in step (1) corresponds to a device that accepts
`an encrypted channel connection with the client device; and
`
`
`(3) in response to deterring in step (2), that the request to look
`up the IP address in step (2) corresponds to a device that
`accepts an encrypted communications channel connection
`with the client device, providing provisioning information
`required
`to
`initiate
`the creation of
`the encrypted
`communications channel between the client device and the
`target device such that the encrypted communications
`channel supports secure data communications transmitted
`between the two devices, the client device being a device at
`which a user accesses the encrypted communications
`channel.
`
`Ex. 1001, 55:43–67.
`
`C. Instituted Grounds of Unpatentability
`
`We instituted on the following grounds asserted by Petitioner under
`
`35 U.S.C. § 103: (1) claims 1–3, 6, 14, 16–25, 28, 31, 33, and 34 as obvious
`
`
`4 Patent Owner asserts “transmitted” was printed in error and that the
`limitation was amended to include “intercepted” instead of “transmitted.”
`Prelim. Resp. 30 n.3 (citing Ex. 1002, 638–639, 641, 655–656). In our Order
`dated December 9, 2015 (Paper 24), we authorized Patent Owner to file a
`request for a certificate of correction changing the word “transmitted” in
`claims 1 and 21 to “intercepted.” Paper 24, 3. In addition, we observed that
`the parties stipulated that the change of wording was not of patentable
`significance. Id. Patent Owner filed a Certificate of Correction. Ex. 2017.
`
`
`
`5
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`under 35 U.S.C. § 103 over Aventail5 and RFC 24016; (2) claims 8–10, 12,
`
`15, 30, and 32 as obvious under 35 U.S.C. § 103 over Aventail, RFC 2401,
`
`and RFC 25437; (3) claims 4, 5, 7, 26, 27, and 29 as obvious under 35
`
`U.S.C. § 103 over Aventail, RFC 2401, and Brand8; and (4) claims 11 and
`
`13 as obvious under 35 U.S.C. § 103 over Aventail, RFC 2401, RFC 2543,
`
`and Brand. Inst. Dec. 24.
`
`A. Claim Construction
`
`II. ANALYSIS
`
`In an inter partes review, the Board construes claim terms in an
`
`unexpired patent under their broadest reasonable construction in light of the
`
`specification of the patent in which they appear. See 37 C.F.R. § 42.100(b);
`
`Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct. 2131, 2142 (2016) (affirming
`
`the Patent Office’s authority to issue regulations establishing and governing
`
`inter partes review under 35 U.S.C. § 316(a)(4)). Under this standard,
`
`absent any special definitions, claim terms or phrases are given their
`
`
`5 Exhibits 1009–1011 are manuals documenting software created by
`Aventail Corporation. Both parties use “Aventail” in citing to the
`documentation for the client software, Exhibit 1009. Exhibit 1009 is the
`primary exhibit cited. We will use “Aventail” or “Aventail Connect” when
`referring to Exhibit 1009. See Aventail Connect v3.01/v2.51
`Administrator’s Guide (Ex. 1009), Aventail Connect v3.01/v2.51 User’s
`Guide (1996-1999) (Exhibit 1010), and Aventail ExtraNet Center v3.0
`Administrator’s Guide (NT and UNIX) (Exhibit 1011).
`6 S. Kent and R. Atkinson, Security Architecture for the Internet Protocol,
`Request for Comments: 2401, BBN Corp., November 1998 (“RFC 2401,”
`Ex. 1008).
`7 Handley, M., et al., SIP: Session Initiation Protocol, published March 1999
`(“RFC 2453,” Ex. 1013).
`8 US 5,237,566, issued Aug. 17, 1993, to Robert C. Brand and Stanford L.
`Mantiply (“Brand,” Ex. 1012).
`
`
`
`6
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`ordinary and customary meaning, as would be understood by one of ordinary
`
`skill in the art, in the context of the entire disclosure. In re Translogic Tech.,
`
`Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). The Board construed similar
`
`claim terms in the Final Written Decision for the ’237 IPR. See ’237 IPR,
`
`slip op. 5–15 (PTAB May 11, 2015) (Paper No. 41) (“’237 FWD”). See also
`
`VirnetX, Inc. v. Cisco Systems, Inc., 767 F.3d 1308, 1317–19 (Fed. Cir.
`
`2014) (addressing ancestor VirnetX patents having similar claim terms).
`
`Petitioner and Patent Owner each proffer proposed constructions of
`
`several claim terms. See Pet. 8–14, PO Resp. 2–15. Both parties argue for
`
`the construction of four terms: “secure domain name” (PO Resp. 4–8, Pet.
`
`Reply 2–3); “encrypted communications channel” (PO Resp. 8–10, Pet.
`
`Reply 3); “provisioning information” (PO Resp. 10–13, Pet. Reply 4); and
`
`“intercept[ing] . . . a request to look up an Internet Protocol (IP) address”
`
`(PO Resp. 13–15, Pet. Reply 4). Our review of Patent Owner’s arguments
`
`confirms these four terms form the basis for Patent Owner’s patentability
`
`arguments. See PO Resp. 23, 25, 26, 28.
`
`The additional terms proposed initially for construction in the Petition
`
`are: “domain name;” “modulated/unmodulated transmission;” and “phone.”
`
`See Pet. 10, 13–14. As of now, these terms are not in dispute and
`
`construction is not required to resolve the issues before us. We do not
`
`identify any additional terms for construction.
`
`1. “secure domain name” (claims 3, 10, 25)
`
`Dependent claims 3 and 10 depend respectively from claims 1 and 8,
`
`which depends from claim 1. Claim 25 depends from claim 21. Claims 3,
`
`10, and 25 each recite “wherein the domain name is a secure domain name.”
`
`Relying, in part, on a related inter partes proceeding, Petitioner argues
`
`
`
`7
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`“secure domain name” is “a name that corresponds to a secure computer
`
`network address.” Pet. 11 (citing IPR2015-00481, “’481 IPR”).9 Petitioner
`
`contends its proposed construction is consistent with the Specification. Id.
`
`(citing Ex. 1001, 51:6–42 (“a ‘secure domain name’ [is] a domain name that
`
`corresponds to the secure network address of a secure server 3320”).
`
`Petitioner notes additional disclosures from the Specification in support of
`
`its construction. Id. (citing Ex. 1001, 40:1–7, 7:39–42). Finally, Petitioner
`
`refers to testimony from the Tamassia Declaration, which relies on the same
`
`portions of the Specification to conclude that the term has “a more general
`
`meaning of being a name that corresponds to a particular device on a secure
`
`computer network (i.e., one that would have an address on that secure
`
`computer network).” Id. (citing Ex. 1005 ¶ 73).
`
`Patent Owner acknowledges Petitioner’s proposed construction was
`
`adopted in the ’237 IPR. PO Resp. 4. However, Patent Owner argues
`
`“secure domain name” means “a non-standard domain name that
`
`corresponds to a secure computer network address and cannot be resolved by
`
`a conventional domain name service (DNS).” Id. (Table). Patent Owner’s
`
`proposed construction was an agreed construction from the related district
`
`court litigation. Id. (citing VirnetX Inc. v. Apple Inc., Case 6:10-cv-00417-
`
`LED (E.D. Tex. Dec. 21, 2011), Joint Claim Construction Chart, 19–20, Ex.
`
`2002). Patent Owner cites to the Specification as also supporting its
`
`proposal, specifically including that the “secure domain name” is a
`
`
`9 The full citation is Apple Inc. v. VirnetX, Inc., IPR2014-00481 (“’481
`IPR”), Institution Decision, slip. op. at 8 (PTAB Sept. 3, 2014) (Paper 11);
`see also ’481 IPR, Final Written Decision, slip op. at 13–14 (Aug. 24, 2015)
`(Paper 35) (declining to modify construction).
`
`
`
`
`8
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`“nonstandard domain name.” Id. (citing Ex. 1001, 7:29–31, 7:39–42, 50:22–
`
`31, 51:6–10, Figs. 33, 34). Testimony from the Monrose Declaration is also
`
`cited as support that “SDNS 3313 contains a cross-reference database of
`
`secure domain names and corresponding secure network addresses.” Id. at 5
`
`(citing Ex. 2016 ¶¶ 15–16).10
`
`Patent Owner further contends it disclaimed Petitioner’s proposed
`
`construction in a now completed inter partes reexamination of a related
`
`patent. PO Resp. 5 (citing Control No. 95/001,270, Response to Office
`
`Action, 5 (Apr. 19, 2010), Ex. 2008; Control No. 95/001,270, Right of
`
`Appeal Notice, 4 (Dec. 3, 2010), Ex. 2006). Patent Owner acknowledges
`
`this is a prosecution history disclaimer argument which “generally only
`
`binds the patent owner.” Id. at 6–7 (citing Tempo Lighting, Inc. v. Tivoli,
`
`LLC, 742 F.3d 973, 978 (Fed. Cir. 2014)). Patent Owner urges the
`
`prosecution history should be consulted in subsequent reviews of the patent
`
`in determining the broadest reasonable interpretation. Id. at 7 (citing
`
`Microsoft Corp. v. Proxyconn, Inc., 789 F.3d 1292, 1298 (Fed. Cir. 2015);
`
`Straight Path IP Grp., Inc. v. Sipnet EU S.R.O., 806 F.3d 1356, 1362 (Fed.
`
`Cir. 2015)). We start with the language of claims 3, 10, and 25. These
`
`dependent claims recite that the domain name is a “secure domain name.”
`
`The plain meaning of those words is found in Petitioner’s proposed
`
`construction, “a name that corresponds to a secure computer network
`
`address.” The language is clear and straightforward and any construction
`
`
`10 The Monrose Declaration ’810 has one opinion based on the Specification,
`that “[o]ne of ordinary skill in the art would understand based on the
`disclosure of the ’705 patent that to obtain the URL for a ‘secure domain
`name,’ ‘a secure domain name service (SDNS)’ must be queried.” Ex. 2016
`¶ 17.
`
`
`
`9
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`under the broadest reasonable interpretation standard should not lead us
`
`away from that clarity. Phillips v. AWH Corp., 415 F.3d 1303, 1314 (Fed.
`
`Cir. 2005) (en banc) (“In some cases, the ordinary meaning of claim
`
`language as understood by a person of skill in the art may be readily
`
`apparent even to lay judges, and claim construction in such cases involves
`
`little more than the application of the widely accepted meaning of commonly
`
`understood words.”).
`
`We turn now to the Specification. The patent may set out a particular
`
`meaning of a claim term so long as it does so “with reasonable clarity,
`
`deliberateness, and precision.” In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir.
`
`1994). “Without an express intent to impart a novel meaning to claim terms,
`
`an inventor's claim terms take on their ordinary meaning.” York Prods., Inc.
`
`v. Central Tractor Farm & Family Ctr., 99 F.3d 1568, 1572 (Fed. Cir.
`
`1996).
`
`The ’705 patent states that “[a]lternatively, software module 3409 can
`
`replace the top-level domain name of server 3304 with any other non-
`
`standard top-level domain name.” Ex. 1001, 50:22–31 (emphasis added).
`
`The column 50 quote follows a description of standard domain names like
`
`.com, including adding “s” for secure. Id. In addition to the preceding, the
`
`Specification discloses an example of “replac[ing] the top-level domain
`
`name . . . with a secure top-level domain name.” Ex. 1001, 50:22–25; see
`
`also id. at 51:6–42 (a “secure domain name” is a domain name that
`
`corresponds to the secure network address of a secure server 3320), 40:1–7
`
`(evaluating domain names in DNS requests to determine whether access to a
`
`secure site has been requested), 7:39–42 (“[e]ach secure computer network
`
`address is based on a non-standard top-level domain name, such as .scom,
`
`
`
`10
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`.sorg, .snet, .sedu, .smil and .sint”). Thus, the Specification does not
`
`expressly state that the “secure domain name” must be “non-standard,” only
`
`that it is secure, which is encompassed in Petitioner’s proposed construction.
`
`Further, a conventional DNS function involves resolving names into
`
`addresses. See Ex. 1005 ¶¶ 126–27 (“much like a file system”), 304–306
`
`(citing Ex. 1001, 39:1–3 (describing Conventional DNS functionality)). The
`
`Specification includes additional discussion of conventional DNS. For
`
`example, the ’705 patent contemplates returning different addresses for the
`
`same domain name based on a user’s security levels, identity, and/or
`
`subscription level, and combining conventional DNS and proxy functions.
`
`Ex. 1001, 40:20–29, 38–40, 51–57, 51:6–27. Rather than not returning a
`
`secure domain name from a conventional DNS based on the type of name
`
`itself, the Specification states that a “DNS proxy” returns a “host-unknown”
`
`“if the user had requested lookup of a secure web site but lacked credentials
`
`to create such a connection.” Id. at 40:24–27 (emphases added). Thus, we
`
`are not persuaded to depart from the plain and ordinary meaning of the term
`
`previously discussed.
`
`Next we address Patent Owner’s prosecution history disclaimer
`
`argument. We consider the prosecution history, if raised, in construing
`
`claim terms. Philips, 415 F.3d at 1317 (“[T]he prosecution history provides
`
`evidence of how the PTO and the inventor understood the patent. . . . Yet
`
`because the prosecution history represents an ongoing negotiation between
`
`the PTO and the applicant, rather than the final product of that negotiation, it
`
`often lacks the clarity of the specification and thus is less useful for claim
`
`construction purposes.”); Tempo Lighting, 742 F.3d at 978 (The “court also
`
`observes that the PTO is under no obligation to accept a claim construction
`
`
`
`11
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`proffered as a prosecution history disclaimer, which generally only binds the
`
`patent owner.”).
`
`The Specification and claims record do not support the prosecution
`
`history arguments discussed above. The plain language of the claims
`
`outweighs the arguments made. For example, Patent Owner contends that
`
`Patentee disclaimed “a domain name that just happens to be associated with
`
`a secure computer or just happens to be associated with an address requiring
`
`authorization” during an inter partes reexamination of a related patent, and
`
`that the Specification supports its construction. See PO Resp. 5 (citing
`
`Response to Office Action in Control No. 95/001,270 (Apr. 19, 2010), 5
`
`(Ex. 2008)). It is not clear how this argument creates a distinction, or what
`
`“just happens to be associated with a secure computer” means, but Patent
`
`Owner appears to contend it means “a secure domain name cannot be
`
`resolved by a conventional domain name service.” See PO Resp. 5; Ex.
`
`2008, 6 (arguing “a secure domain name cannot be resolved by a
`
`conventional domain name service, for example, but relying on “the
`
`inventors . . . acting as their own lexicographers” and citing disclosed
`
`examples in the ’180 patent of non-standard top-level domain names)
`
`(emphasis added).
`
`This argument obscures the meaning of the challenged claims when
`
`viewed in light of the Specification’s disclosure of secure domain names.
`
`Contrary to its prosecution history arguments, nothing in the ’705 (or ’180)
`
`patent requires a conventional DNS not to return an address for all of the
`
`disclosed secure domain names, let alone, sets forth a lexicographic
`
`definition for such a preclusion. Rather, as discussed above, the ’705 patent
`
`discloses using conventional DNS look up functionality (e.g., using internal
`
`
`
`12
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`tables) to determine whether access to a secure website has been requested,
`
`adding other layers of functionality, including employing user priority
`
`levels, and/or credentials, etc. See, e.g., Ex. 1050, 40:1–6 (“proxy . . .
`
`intercepts all DNS look up functions” and determines access “by reference
`
`to an internal table”), 38–42 (combining proxy and conventional “functions .
`
`. . into a single server”), 51–58 (“using an internally stored list of authorized
`
`IP addresses”), 51:10–28 (users can “automatically obtain the secure
`
`network address” by “register[ing] a secure domain name” with possible
`
`additional use of “the user’s identity and the user’s subscription level.”)11
`
`Patentee’s attempt during prosecution of the ’180 patent to act as its “own
`
`lexicographer[]” by relying on examples in the ’180 patent that relate to non-
`
`standard top-level domain names indicates (Ex. 2008, 6) that the disclaimer
`
`argument does not pass muster.
`
`Patent Owner does not argue here that the ’705 patent supports a
`
`lexicographic definition for all its disclosed secure domain names based on
`
`unclaimed examples related to top-level secure domain names. Contrary to
`
`
`11 The Examiner’s citations and reasoning in the 95/001,270 reexamination
`proceeding involving the ’180 patent track Patent Owner’s arguments and do
`not support the specific disclaimer argued. The Examiner states that “[f]or
`example, the ’180 patent explains that a secure domain name service can
`resolve addresses for a secure domain name whereas a conventional domain
`name service cannot resolve addresses for a secure domain name.” Ex.
`2006, 6 (citing ’180 patent, 51:25–53). Citing the same passage, the
`Examiner also states that “querying a convention[al] domain name server
`using a secure domain name will result in a return message indicating that
`the URL is unknown.” Id. The cited examples do not support a clear
`disclaimer that distinguishes a “secure domain name” from a secure domain
`name that happens to correspond to a secure computer. See id. These
`passages describe examples that correspond to a non-standard top-level
`domain name. See ’180 patent, 51:25–53.
`
`
`
`13
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`Patentee’s assertion of a lexicographic definition during prosecution, no
`
`reasonably clear and precise disclaimer appears in the Specification with
`
`respect to secure domain names. See, e.g., Paulsen, 30 F.3d at 1480
`
`(disclaimer requires “reasonable clarity, deliberateness, and precision”).
`
`Patentee did not disclaim conventional look up functionality when employed
`
`to look up secure domain names. The arguments obscure what a “non-
`
`standard” name means and what “conventional” means in terms of the look
`
`up function that rises in context to the arguments.
`
`Patent Owner does not demonstrate that the Specification requires a
`
`secure domain name to be “top-level” or “non-standard.” And more
`
`importantly, setting aside the top-level domain names, which are mere
`
`examples that Patent Owner does not rely on as part of its proposed claim
`
`construction, Patent Owner fails to explain clearly what the term “non-
`
`standard” means or how a “non-standard” domain name differs from a
`
`“secure computer network address.”
`
`Therefore, Patent Owner’s construction and its prosecution history
`
`arguments obscure the clear meaning of the claim terms––because they
`
`attempt to preclude the ability of “conventional” DNS from resolving a
`
`“non-standard” name. As the record shows, the conventional DNS
`
`functionality at issue simply involves looking up names (using for an
`
`example an internal table). Therefore, if a DNS resolves a non-standard
`
`name (whatever that means if not limited to a top-level domain name), the
`
`resolution itself would be “conventional,” whereas Patent Owner’s
`
`construction implies that any DNS that resolves a “non-standard” name
`
`cannot be “conventional.”
`
`
`
`14
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`
`Accordingly, we determine that the prosecution history argument is
`
`not clear and precise, nor is it supported by the Specification, and it is
`
`outweighed by the plain language of the claim. As discussed below, even if
`
`we adopted Patent Owner’s narrower claim construction, as supported by the
`
`prosecution history, our obviousness analysis would remain unchanged.
`
`Similarly, in addition to the just-described prosecution history, in the final
`
`written decision in the ’481 IPR, the Board found that “Patent
`
`Owner . . . made the opposite argument to a district court that it is making
`
`here, and argued that the ‘non-standard’ distinction ‘is not supported by the
`
`specification or the prosecution history.’” IPR2014-00481, Paper 35, 13
`
`(quoting ’481 IPR Ex. 1018, 18 (district court findings and rationale)).12
`
`The record here supports the argument made by Patent Owner in the district
`
`court––the Specification and prosecution history do not support the non-
`
`standard distinction.
`
`Neither are we persuaded that what the parties agreed to in the district
`
`court binds us. First, Petitioner does not agree to that construction in this
`
`proceeding. We are unaware of any precedent preventing Petitioner from
`
`taking inconsistent positions in different forums and Patent Owner does not
`
`cite any either. Further, as has now been confirmed in Cuozzo, we apply the
`
`broadest reasonable interpretation standard and not the litigation standard in
`
`district court. On the other hand, the construction Petitioner now proposes is
`
`taken directly from other inter partes reviews. These circumstances are
`
`
`12 The district court case cited in the ’481 IPR involved a finding of a
`disclaimer of a different but related term: “secure domain name service.”
`See ’481 IPR, Ex. 1018, 17–18; ’481 IPR, Ex. 2003, 91.
`
`
`
`
`15
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`adequate justification for a differing construction from that of the district
`
`court.
`
`In addition to the preceding reasons, we agree with the analysis made
`
`in the construction of “secure domain name” in a prior inter partes review
`
`proceeding. See ’481 IPR, Paper 35, 13–14. Thus, we construe “secure
`
`domain name” as “a name that corresponds to a secure computer network
`
`address.”
`
`2. “encrypted communications channel” (claims, 1–2, 4–7, 9, 11–13,
`18, 21–22, 26–29)
`
`The Petition did not propose a construction for “encrypted
`
`communications channel.” Patent Owner proposes that an “encrypted
`
`communications channel” should be construed to mean “a direct
`
`communications channel that is encrypted.” PO Resp. 8–10. Petitioner
`
`argues the inclusion of “direct” adds an additional limitation we have
`
`previously rejected in the related ’481 IPR. Pet. Reply 3 (citing ’481, Paper
`
`35, 10). In the ’481 IPR we concluded the addition of direct was
`
`unnecessary to resolve the dispute. ’481 IPR, Paper 34, 4.
`
`Patent Owner argues one embodiment in the Specification describing
`
`TARP (“Tunneled Agile Routing Protocol,” Ex. 1001, 3:14–17) terminals
`
`supports its construction by describing that encrypted communications
`
`between a client device and target device are “direct.” PO Resp. 9 (citing
`
`Ex. 1001, 9:41–50, 33:43–51, 38:6–9 (describing Figure 24 as first and
`
`second computers directly connected), Fig. 2). Other embodiments
`
`described in the Specification are also argued as supporting the addition of
`
`“direct” to the construction of “encrypted communications channel.” Id.
`
`(citing Ex. 1001, 40:7–10, 40:66–41:2, 42:6–10, 42:66–43:3, Figs. 24, 26,
`
`
`
`16
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`28, 29, 33; Ex. 2016 ¶ 19). The citations to the Specification are examples
`
`of different embodiments and do not persuade us that the addition of “direct”
`
`is warranted. In the absence of such a special definition or other
`
`consideration, “limitations are not to be read into the claims from the
`
`specification.” In re Van Geuns, 988 F.2d 1181, 1184 (Fed. Cir. 1993).
`
`Patent Owner next argues that in district court litigation Petitioner
`
`argued that traversing a network, including being passed or routed through
`
`various networks, is “direct.” PO Resp. 10 (citing Markman Hearing
`
`Transcript, 42:16–21, 44:13–45:12,13 44:13–45:12 (Ex. 2003). This
`
`argument is not persuasive. First, the record does not show and Patent
`
`Owner does not explain the context in which the statements were made or
`
`what construction issue was being argued. Second, the attorney argument is
`
`by an attorney representing another party and not Petitioner. See Ex. 2003,
`
`90:2–3 (representing Cisco). Patent Owner has not presented any reason to
`
`accept statements from a co-defendant in the district court as binding on
`
`another co-defendant. None of Patent Owner’s arguments are persuasive,
`
`and we decline to require that “direct” should be included in the
`
`construction.
`
`However, the Federal Circuit on appeal “construed the related terms
`
`‘secure communication link’ and ‘virtual private network’ to include ‘direct’
`
`communication.” PO Resp. 10 (citing VirnetX Inc. v. Cisco Sys. Inc., 767
`
`F.3d 1308, 1317 n.1, 1319 (Fed. Cir. 2014) (“Cisco”)). Specifically, the
`
`Federal Circuit construed “secure communication link” to mean “a direct
`
`communication link that provides data security and anonymity.” Cisco, 767
`
`F.3d at 1319 (emphasis omitted). Our determination not to limit the claims
`
`
`13 Patent Owner cites to pages 2 and 4, which it appears was not intended.
`
`
`
`17
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`to “direct communication” is not inconsistent with the construction in Cisco.
`
`In contrast to the broadest reasonable interpretation standard employed by
`
`the Board for an unexpired patent, the Federal Circuit employs a narrower
`
`claim construction standard when reviewing the construction of a claim
`
`applied by the district court. See In re Rambus, Inc., 694 F.3d 42, 46 (Fed.
`
`Cir. 2012) (contrasting the Board’s review of expired patents, which is
`
`“similar to that of a district court’s review,” with the Board’s review of
`
`unexpired patents, which involves the broadest reasonable interpretation
`
`standard); Cuozzo, 136 S. Ct. at 2142. As discussed above the addition of
`
`“direct” to the construction is narrower and does not comport with the
`
`broadest reasonable interpretation. In addition, a reading of Cisco indicates
`
`that the parties did not dispute the “direct” requirement in Cisco. As
`
`indicated above, the ’705 patent Specification does not require a channel to
`
`be direct. Furthermore, although Patent Owner lists examples that
`
`encompass a direct link, Patent Owner fails to explain clearly on this record
`
`what “direct” means. See PO Resp. 10 (“the ’705 patent specification
`
`discloses that the communication traverses a network (or networks) through
`
`which it is simply passed or routed via network devices such as Internet
`
`Service Providers, firewalls, and routers”).
`
`The patents at issue in Cisco have common descriptions to the ’705
`
`patent. The ’705 patent is a continuation of U.S. Patent No. 7,921,211
`
`(“’211 patent”), which is a continuation of U.S. Patent No. 7,418,504 (“’504
`
`patent”). Ex. 1001 (63). Cisco was an appeal relating to the ’504 and ’211
`
`
`
`18
`
`

`
`IPR2015-00811
`Patent 8,868,705 B2
`
`patents, among others. Cisco, 767 F.3d at 1313.14 In Cisco, the court found
`
`that “[b]oth the claims and the specification of the ’151 patent make clear
`
`that encryption is a narrower, more specific requirement than security.” Id.
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket