throbber
Paper No.
`Filed: January 25, 2016
`
`Naveen Modi
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1990
`Facsimile: (202) 551-0490
`E-mail: naveenmodi@paulhastings.com
`
`
`Filed on behalf of: VirnetX Inc.
`By:
`
`Joseph E. Palys
`Paul Hastings LLP
`875 15th Street NW
`Washington, DC 20005
`Telephone: (202) 551-1996
`Facsimile: (202) 551-0496
`E-mail: josephpalys@paulhastings.com
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.
`Petitioner
`
`v.
`
`VIRNETX INC.
`Patent Owner
`
`
`
`
`
`
`
`Case IPR2015-00866
`Patent 8,458,341
`
`
`
`
`
`
`
`
`
`
`Patent Owner’s Response
`
`
`
`
`
`
`
`

`
`
`
`
`
` I.
`
`
`
` II.
`
`
`
`Case No. IPR2015-00866
`
`TABLE OF CONTENTS
`
`Introduction ...................................................................................................... 1
`
`Claim Construction .......................................................................................... 1
`
`A.
`
`B.
`
`C.
`
`“Interception of the Request” (Claims 1, 11, 14, 15, 25, and 28) ......... 4
`
`“Provisioning Information” (Claims 1 and 15) ..................................... 5
`
`“Virtual Private Network Communication Link” (Claims 1, 3,
`15, and 17) ............................................................................................. 8
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`A “VPN Communication Link” Requires a Virtual
`Private Network .......................................................................... 9
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Virtual Private Network Communication
`Link” .........................................................................................10
`
`A “Virtual Private Network Communication Link” Must
`Be Direct ...................................................................................12
`
`A “Virtual Private Network Communication Link”
`Requires a Network ...................................................................17
`
`A “Virtual Private Network Communication Link”
`Requires Encryption ..................................................................18
`
`D. Other terms ..........................................................................................20
`
` The Cited References Do Not Render Claims 1–11, 14–25, and 28 III.
`
`
`Unpatentable ..................................................................................................22
`
`A.
`
`Beser and RFC 2401 Do Not Render Claims 1–11, 14–25, and
`28 Unpatentable ...................................................................................22
`
`1.
`
`2.
`
`Beser’s Disclosure.....................................................................22
`
`Beser and RFC 2401 Do Not Disclose a “Send[ing] a
`Request to Look Up an Internet Protocol (IP) Address of
`a Second Network Device Based On a Domain Name
`Associated With the Second Network Device” ........................25
`
`i
`
`

`
`
`
`Case No. IPR2015-00866
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`Beser and RFC 2401 Do Not Disclose “Interception of
`the Request” ..............................................................................28
`
`Beser and RFC 2401 Do Not Disclose “Virtual Private
`Network Communication Link” ...............................................31
`
`The Petition’s Mapping of Beser and RFC 2401 Does
`Not Show the Features as Arranged in the Claims ...................32
`
`Beser and RFC 2401 Would Not Have Been Combined
`as the Petition Suggests .............................................................34
`
`Beser and RFC 2401 Do Not Render Obvious Dependent
`Claims 4-5 and 18-19 ................................................................40
`
`Beser in view of RFC 2401 Does Not Disclose the
`Features of Claim 17 .................................................................43
`
`Dependent Claims 2, 3, 6-11, 14, 16, 20-25, and 28 ................44
`
` Petitioner’s Expert Testimony Should be Accorded Little, If Any IV.
`
`
`Weight ............................................................................................................44
`
`
`
` V.
`
`The Instituted Ground Is Based on At Least One Reference That Does
`Not Qualify As Prior Art ...............................................................................48
`
`A.
`
`Petitioner Has Not Established that RFC 2401 Is a Prior Art
`Printed Publication ..............................................................................49
`
`1.
`
`2.
`
`3.
`
`The Evidence Presented with the Petition Cannot
`Establish by a Preponderance of the Evidence that RFC
`2401 Was Publicly Accessible ..................................................49
`
`The Board’s Findings Are Insufficient to Establish by a
`Preponderance of the Evidence that RFC 2401 Was
`Publicly Accessible ...................................................................52
`
`The Supplemental Information Is Also Insufficient to
`Establish by a Preponderance of the Evidence that RFC
`2401 Was Publicly Accessible ..................................................55
`
`
`
` Conclusion .....................................................................................................57 VI.
`
`ii
`
`

`
`
`
`
`
`
`
`
`
`Case No. IPR2015-00866
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`Cases
`Alexsam, Inc. v. IDT Corp.,
`715 F.3d 1336, (Fed. Cir. 2013) ........................................................................ 47
`
`Apple Inc. v. DSS Technology Management, Inc.,
`IPR2015-00369, Paper No. 9 (June 25, 2015) ................................................... 50
`
`Apple Inc. v. VirnetX Inc.,
`IPR2014-00237, Paper No. 15 (May 14, 2014) .............................................. 4, 29
`
`Apple Inc. v. VirnetX Inc.,
`IPR2015-00811, Paper No. 8 (Sept. 11, 2015) .................................................... 6
`
`Apple Inc. v. VirnetX Inc.,
`IPR2015-00871, Paper No. 8 (Oct. 1, 2015) ..................................................... 15
`
`Aspex Eyewear, Inc. v. Concepts In Optics, Inc.,
`111 F. App’x 582 (Fed. Cir. 2004) .............................................................. 45, 47
`
`Becton, Dickenson & Co. v. Tyco Healthcare Group, LP,
`616 F.3d 1249 (Fed. Cir. 2010) ......................................................................... 33
`
`Biogen Idec, Inc. v. GlaxoSmithKline LLC,
`713 F.3d 1090 (Fed. Cir. 2013) ......................................................................... 14
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) ........................................................................... 45
`
`Bruckelmyer v. Ground Heaters, Inc.,
`445 F.3d 1374 (Fed. Cir. 2006) ......................................................................... 49
`
`Centricut, LLC v. Esab Group, Inc.,
`390 F.3d 1361 (Fed. Cir. 2004) ......................................................................... 45
`
`In re Cuozzo,
`793 F.3d 1297 (Fed. Cir. 2015) ........................................................................... 3
`
`Cuozzo Speed Techs., LLC v. Lee, No. 15-446,
`2016 WL 205946, (U.S. Jan. 15, 2016) ............................................................... 3
`
`iii
`
`

`
`
`Cyber Corp. v. FAS Techs., Inc.,
`138 F.3d 1448 (Fed. Cir. 1998) ......................................................................... 14
`
`Case No. IPR2015-00866
`
`Dish Network L.L.C. v. Dragon Intellectual Property, LLC,
`IPR2015-00499, Paper No. 7 (July 17, 2015) ................................................... 52
`
`Elec. Frontier Found. v. Pers. Audio, LLC,
`IPR2014-00070, Paper No. 21 (Apr. 18, 2014) ................................................. 54
`
`Eon–Net LP v. Flagstar Bancorp.,
`653 F.3d 1314 (Fed. Cir. 2011) ......................................................................... 18
`
`Finnigan Corp. v. ITC,
`180 F.3d 1354 (Fed. Cir. 1999) .......................................................................... 57
`
`Ex Parte Weideman,
`Appeal No. 2008-3454, Decision on Appeal (BPAI Jan. 27, 2009) ................. 33
`
`In re Fulton,
`391 F.3d 1195 (Fed. Cir. 2004) ......................................................................... 39
`
`Garmin Int’l inc. v. Cuozzo Speed Tech, LLC,
`IPR2012-00001, Paper No. 15 (Jan. 9, 2013) .................................................... 16
`
`Google Inc. v. Art+Com Innovationpool GMBH,
`IPR2015-00788, Paper No. 7 (September 2, 2015) ........................................... 50
`
`In re Gurley,
`27 F.3d 551 (Fed. Cir. 1994) ............................................................................. 39
`
`Heart Failure Techs., LLC v. Cardiokinetix, Inc.,
`IPR2013-00183, Paper No. 12 (July 31, 2013) ................................................. 42
`
`Kinetic Technologies, Inc. v. Skyworks Solutions, Inc.,
`IPR2014-00690, Paper No. 43 (October 19, 2015) ..................................... 48, 57
`
`In re Klopfenstein,
`380 F.3d 1345 (Fed. Cir. 2004) ......................................................................... 48
`
`Koito Mfg. Co. v. Turn-Key-Tech LLC,
`381 F.3d 1142 (Fed. Cir. 2004) ......................................................................... 45
`
`iv
`
`

`
`
`Lantech Inc. v. Keip Machine Co.,
`32 F.3d 542 (Fed. Cir. 1994) ............................................................................. 33
`
`Case No. IPR2015-00866
`
`In re Lister,
`583 F.3d 1307 (Fed. Cir. 2009) ................................................................... 53, 54
`
`Medichem, SA v. Rolabo, SL,
`437 F.3d 1157 (Fed. Cir. 2006) ......................................................................... 39
`
`Motorola Solutions, Inc. v. Mobile Scanning Techs., LLC,
`IPR2013-00093, Paper No. 28 (Apr. 29, 2013) ................................................. 16
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ........................................................... 2
`
`Microsoft Corp. v. Proxyconn, Inc.,
`789 F.3d 1292 (Fed. Cir. 2015) ..................................................................... 7, 10
`
`Moses Lake Indus. v. Enthone, Inc.,
`IPR2014-00243, Paper No. 6 (June 18, 2014) ................................................... 42
`
`Proveris Scientific Corp. v. Innovasystems, Inc.,
`536 F.3d 1256 (Fed. Cir. 2008) ................................................................... 45, 47
`
`In re Robertson,
`169 F.3d 743 (Fed. Cir. 1999) ........................................................................... 33
`
`Samsung Elecs. Co. v. Rembrandt Wireless Techs., LP,
`IPR2014-00514, Paper No. 18 (Sep. 9, 2014) ................................................... 54
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir. 2002) ................................................................... 45, 46
`
`In re Skvorecz,
`580 F.3d 1262 (Fed. Cir. 2009) ........................................................................... 2
`
`Straight Path IP Grp., Inc. v. Sipnet EU S.R.O.,
`No. 2015-1212, 2015 WL 7567492, (Fed. Cir. Nov. 25, 2015) ........................ 15
`
`Square Inc. v. Unwired Planet, LLC,
`CBM2014-00156, Paper No. 22 (Feb. 26, 2015) .............................................. 50
`
`v
`
`

`
`
`Symantec Corp. v. Trustees of Columbia Univ. in the City of N.Y.,
`IPR2015-00371, Paper No. 13 (July 17, 2015) ..................................... 50, 53, 55
`
`Case No. IPR2015-00866
`
`Tempo Lighting, Inc. v. Tivoli, LLC,
`742 F.3d 973 (Fed. Cir. 2014) ..................................................................... 15, 16
`
`In re Translogic Tech., Inc.,
`504 F.3d 1249(Fed. Cir. 2007) ............................................................................. 2
`
`Typeright Keyboard Corp. v. Microsoft Corp.,
`374 F.3d 1151 (Fed. Cir. 2004) .......................................................................... 57
`
`TRW Auto. US LLC v. Magna Elecs. Inc.,
`IPR2014-00293, Paper No. 19 (July 1, 2014) ................................................... 42
`
`VirnetX Inc. v. Cisco Systems, Inc.,
`767 F.3d 1308 (Fed. Cir. 2014) ......................................................................... 15
`
`VirnetX Inc. v. Microsoft Corp.,
`Case No. 6:07-CV-80 (E.D. Tex. Jul. 30, 2009) ............................................... 10
`
`Xilinx, Inc. v. Intellectual Ventures I LLC,
`IPR2013-00112, Paper No. 14 (June 27, 2013) ................................................. 16
`
`In re Yamamoto,
`740 F.2d 1569 (Fed. Cir. 1984) ........................................................................... 3
`
`In re Young,
`927 F.2d 588 (Fed. Cir. 1991) ........................................................................... 39
`
`ZTE Corp. & ZTE (USA) Inc. v. ContentGuard Holdings Inc.,
`IPR2013-00134, Paper No. 12 (June 19, 2013) ................................................. 16
`
`Federal Statutes
`
`35 U.S.C. § 103(a) .................................................................................................. 42
`
`35 U.S.C. § 311(b) .................................................................................................. 48
`
`35 U.S.C. § 316(e) ..................................................................................................... 1
`
`Federal Rules
`
`37 C.F.R. § 42.65(a) .......................................................................................... 56, 57
`
`vi
`
`

`
`
`37 C.F.R. § 42.100(b) ............................................................................................... 2
`
`Case No. IPR2015-00866
`
`37 C.F.R. § 42.104(b)(5) ......................................................................................... 51
`
`
`
`vii
`
`

`
`
`
`I.
`
`
`Introduction
`
`
`
`Case No. IPR2015-00866
`
`Patent Owner VirnetX Inc. respectfully submits this Response to the Board’s
`
`decision to institute inter partes review (Paper No. 8, the “Decision”) and to the
`
`petition for inter partes review (the “Petition” or “Pet.”) filed by Petitioner Apple
`
`Inc. The Board instituted review of U.S. Patent No. 8,458,341 (“the ’341 patent”)
`
`on one ground: obviousness of claims 1–11, 14–25, and 28 over Beser and RFC
`
`2401. Petitioner has not carried its “burden of proving . . . unpatentability by a
`
`preponderance of the evidence” (35 U.S.C. § 316(e)) because the asserted
`
`references fail to disclose each of the claimed features. In addition, Apple has
`
`failed to show that RFC 2401 is a prior art printed publication. Apple’s submitted
`
`expert testimony should also be given little to no weight because it fails to describe
`
`how any of the claim features are taught or suggested in the asserted references.
`
`Accordingly, the Board should enter judgment against Apple and terminate this
`
`proceeding.
`
` Claim Construction II.
`
`
`The Petition identified seven terms for construction. In its Preliminary
`
`Response, Patent Owner addressed Petitioner’s constructions. The Decision did
`
`not provide a construction for any of the terms, finding that “no claim terms
`
`require express construction.” (Decision at 6.) Patent Owner respectfully
`
` 1
`
`
`
`

`
`
`disagrees and addresses
`
`Case No. IPR2015-00866
`
`the
`
`terms below under
`
`the broadest reasonable
`
`interpretation (BRI) standard.
`
`In inter partes review, claims are to be given their “broadest reasonable
`
`construction in light of the specification.” 37 C.F.R. § 42.100(b). Under this
`
`standard, terms are “generally given their ordinary and customary meaning,” which
`
`is the meaning that the term would have to a person of ordinary skill1 at the time of
`
`the invention. See In re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir.
`
`2007) (quoting Phillips v. AWH Corp., 415 F.3d 1303, 1312, 1313 (Fed. Cir. 2005)
`
`(en banc)). Although VirnetX’s constructions represent the broadest reasonable
`
`interpretation (BRI) of the claims in light of the specification and prosecution
`
`history, the Board should apply the claim construction standard applied by the
`
`courts, especially given the litigations and prosecution histories of the patents in
`
`the same family as the ’341 patent. The BRI standard “is solely an examination
`
`expedient, not a rule of claim construction.” In re Skvorecz, 580 F.3d 1262, 1267-
`
`68 (Fed. Cir. 2009). It is certainly justified during the examination process
`
`because applicant has the opportunity to amend the claims during prosecution. In
`
`1 A person of ordinary skill in the art at the relevant time would have had a
`
`master’s degree in computer science or computer engineering and approximately
`
`two years of experience in computer networking and computer security. (Ex. 2018
`
`at ¶¶ 13-14.)
`
`2
`
`

`
`
`re Yamamoto, 740 F.2d 1569, 1571 (Fed. Cir. 1984). But, as the Board has noted,
`
`Case No. IPR2015-00866
`
`inter partes review is not an examination and is “more adjudicatory than
`
`examinational, in nature.” Idle Free Sys., Inc. v. Bergstrom, Inc., IPR2012-00027,
`
`Paper No. 26 at 6 (June 11, 2013).
`
`The ability to amend claims during inter partes review is so severely
`
`restricted that the rationale underpinning the BRI—the ability to freely amend
`
`claims—does not apply especially given the litigations and prosecution histories of
`
`patents in the same family as the ’341 patent. As a result, to the extent the Board
`
`would have adopted a narrower construction under the courts’ claim construction
`
`standard than it has adopted here, it should adopt the narrower construction
`
`because the BRI standard should not apply to this proceeding.
`
`The Court of Appeals for the Federal Circuit refused to reconsider en banc
`
`the application of the BRI standard in Board proceedings, but the Supreme Court
`
`recently granted certiorari. In re Cuozzo, 793 F.3d 1297 (Fed. Cir. 2015); Cuozzo
`
`Speed Techs., LLC v. Lee, No. 15-446, 2016 WL 205946, at *1 (U.S. Jan. 15,
`
`2016). VirnetX respectfully submits that, given “the adjudicative nature and the
`
`limited amendment process of IPRs,” claims in IPR proceedings should be given
`
`their “actual meaning.” In re Cuozzo, 793 F.3d at 1299, 1301–02 (Prost, C.J.,
`
`dissenting from denial of en banc rehearing). VirnetX preserves this argument in
`
`3
`
`

`
`
`the event the Supreme Court reverses the Federal Circuit’s decision in Cuozzo and
`
`Case No. IPR2015-00866
`
`instructs that a different standard should be applied.
`
`No construction proposed
`
`“Interception of the Request” (Claims 1, 11, 14, 15, 25, and 28)2
`A.
`Patent Owner’s Proposed
`Apple’s Proposed
`Decision’s Construction
`Construction
`Construction
`No construction
`Receiving a request
`necessary; alternatively,
`pertaining to a first entity
`receiving a request to
`at another entity
`look up an internet
`protocol address and,
`apart from resolving it
`into an address,
`performing an evaluation
`on it related to
`establishing a virtual
`private network
`communication link
`
`
`Petitioner proposes that “interception of a request” be construed similarly to
`
`an interpretation that the Board adopted in a related proceeding. (Pet. at 9-10,
`
`citing Apple Inc. v. VirnetX Inc., IPR2014-00237, Paper No. 15 at 12-13 (May 14,
`
`2014).) Though the Board declined to preliminarily construe this term in this
`
`proceeding, if the Board later deems construction necessary, it should construe the
`
`term in its entirety as proposed by Patent Owner’s alternative construction. As
`
`
`2 Patent Owner identifies only the challenged claims that expressly recite the
`
`terms at issue. Claims that depend from the identified claims may also implicitly
`
`contain the terms.
`
`4
`
`

`
`
`explained in Patent Owner’s Preliminary Response, in contrast to Petitioner’s
`
`Case No. IPR2015-00866
`
`proposal, Patent Owner’s alternative construction appropriately captures the notion
`
`of performing an additional evaluation on a request to look up an IP address related
`
`to establishing an encrypted communications channel, beyond conventionally
`
`resolving it and returning the address. (Prelim. Resp. at 24-28.) The independent
`
`claims support this construction, for example, by reciting that a determination is
`
`made as a result of the request [to look up an IP address] that the second network
`
`device is a device with which a secure communication link can be established.
`
`(Ex. 1001, claims 1 and 15.) Additionally, dependent claims 11 and 25 expressly
`
`specify the evaluation, reciting that the “interception” involves “receiving the
`
`request to determine that the second network device is available for the secure
`
`communications service.” (Ex. 1001, claims 1 and 15.)
`
`“Provisioning Information” (Claims 1 and 15)
`
`Apple’s Proposed
`Construction
`Information that enables
`communication in a
`virtual private network
`
`Decision’s Construction
`
`No construction proposed
`
`B.
`Patent Owner’s Proposed
`Construction
`Information that is used
`to establish a virtual
`private network
`communication link
`
`
`As discussed in the Preliminary Response, Patent Owner’s construction is
`
`more consistent with the general notion that provisioning refers to setting up or
`
`establishing a connection or service. (Prelim. Resp. at 28-30; Ex. 2018 at ¶¶ 15-
`
`17.) As the Board noted in a related proceeding involving U.S. Patent No.
`
`5
`
`

`
`
`8,868,705, IPR2015-00811 (“the ’811 proceeding”), one dictionary explains that
`
`Case No. IPR2015-00866
`
`provisioning is “[s]etting up a telecommunications service for a particular
`
`customer,” and that “[c]ommon carriers provision circuits by programming their
`
`computers to switch customer lines into the appropriate networks.” Apple,
`
`IPR2015-00811, Paper No. 8 at 9 (citing Ex. 2007 at 6, McGraw-Hill Computer
`
`Desktop Encyclopedia (9th ed. 2001).). Applying these principles to provisioning
`
`in the context of the ’341 patent, virtual private network communication link
`
`provisioning refers to setting up or establishing a virtual private network
`
`communication link—not merely the sending of any and all information that may
`
`“enable or aid in” communication. Thus, in the context of the ’341 patent, the
`
`“provisioning information” is “information that is used to establish a virtual private
`
`network communication link.” (Ex. 2018 at ¶ 16.)
`
`In
`
`the related ’811 proceeding,
`
`the Board preliminarily construed
`
`“provisioning information” to be “information that is provided to enable or aid in
`
`establishing a secure communications channel.” Apple Inc. v. VirnetX Inc.,
`
`IPR2015-00811, Paper No. 8 at 9 (Sept. 11, 2015). To the extent the Board
`
`considers construing “provisioning information” in a manner consistent with that
`
`proposed in the ’811 proceeding, such a construction would be incorrect. First, the
`
`construction in the ’811 proceeding refers to a secure communication channel,
`
`which is not recited in the claims. Instead, Patent Owner’s construction accurately
`
`6
`
`

`
`
`identifies a “virtual private network communication link,” which is consistent with
`
`Case No. IPR2015-00866
`
`the claims, which recite “provisioning information for a virtual private network.”
`
`(See e.g., Ex. 1001 at 56:16-18.). Second, such a construction would be overly
`
`broad in that it encompasses any information that “enables or aid[s] in”
`
`communication using a virtual private network communication link, even if that
`
`information has nothing to do with provisioning. For example, it would
`
`encompass source and destination information for individual packets of data that
`
`are traveling over a pre-existing channel. While this type of information may
`
`“enable or aid in” communication using a secure communication link, it has no
`
`relationship to the traditional notions as would be understood by one of ordinary
`
`skill in the art. Indeed, one of ordinary skill in the art would not have understood a
`
`virtual private network communication link to be provisioned every time a data
`
`packet is sent across it, but the Decision’s construction inaccurately encompasses
`
`this scenario. (Ex. 2018 at ¶ 17); see Microsoft Corp. v. Proxyconn, Inc., 789 F.3d
`
`1292, 1298 (Fed. Cir. 2015) (explaining that a construction is “unreasonably
`
`broad” where it is not “consistent with the one that those skilled in the art would
`
`reach”) (citation omitted).
`
`Accordingly, the BRI of “provisioning information” means “information that
`
`is used to establish virtual private network communication link.”
`
`7
`
`

`
`
`
`C.
`
`“Virtual Private Network Communication Link” (Claims 1, 3, 15,
`and 17)
`
`Case No. IPR2015-00866
`
`Patent Owner’s Proposed
`Construction
`A communication path
`between two devices in a
`virtual private network
`
`Decision’s Construction
`
`No construction proposed
`
`Petitioner’s Proposed
`Construction
`A transmission path
`between two devices that
`restricts access to data,
`addresses, or other
`information on the path,
`generally using obfuscation
`methods to hide
`information on the path,
`including, but not limited
`to, one or more of
`authentication, encryption,
`or address hopping
`
`
`
`As discussed in the preliminary response, a “virtual private network
`
`communication link” (or “VPN communication link”) in view of the specification
`
`is “a communication path between two devices in a virtual private network,” where
`
`a virtual private network is a network of computers which privately and directly
`
`communicate with each other by encrypting traffic on insecure paths between the
`
`devices where the communication is both secure and anonymous. (Prelim. Resp. at
`
`33-44; see also Ex. 2018 at ¶¶ 18-33.) Petitioner’s proposed construction
`
`contradicts the plain language of the claims, is internally inconsistent, and is
`
`inconsistent with the ’341 patent specification and prosecution history.
`
`8
`
`

`
`
`
`Case No. IPR2015-00866
`
`1.
`
`A “VPN Communication Link” Requires a Virtual Private
`Network
`
`Petitioner’s proposed construction does not require that the virtual private
`
`network communication link be between devices in a virtual private network. (Pet.
`
`at 14-15.) However, the ’341 patent discloses that a VPN communication link is a
`
`communication path between devices in a virtual private network. (Ex. 2018 at ¶
`
`20.)
`
`As explained in the ’341 patent, a VPN communication link does not exist
`
`outside of a virtual private network. For example, when a secure domain name
`
`service (SDNS) receives a query for a secure network address, it “accesses VPN
`
`gatekeeper 3314 for establishing a VPN communication link between software
`
`module 3309 [at the querying computer 3301] and secure server 3320.” (Ex. 1001
`
`at 51:54-56.) Then, “VPN gatekeeper 3314 provisions computer 3301 and secure
`
`web server computer 3320 . . . thereby creating the VPN” between the devices.
`
`(Ex. 1001 at 51:57-60.) Notably, secure server 3320 “can only be accessed
`
`through a VPN communication link.” (Ex. 1001 at 51:56-57.) And “[f]urther
`
`communication between computers 3301 and 3320 occurs via the VPN” through
`
`the VPN link. (Ex. 1001 at 52:20-22; Ex. 2018 at ¶ 20.)
`
`Patent Owner’s adversaries and
`
`their experts agree
`
`that a VPN
`
`communication link refers to a link in a virtual private network. Specifically,
`
`Petitioner itself has understood and construed a VPN communication link to be
`
`9
`
`

`
`
`“any communication link between two end points in a virtual private network.”
`
`Case No. IPR2015-00866
`
`(See, e.g., IPR2014-00481, Paper No. 1 at 6 (Mar. 7, 2014).) In district court,
`
`Microsoft proposed a similar construction requiring the link to be in a virtual
`
`private network. (Ex. 2001 at 25, Memorandum Opinion in VirnetX Inc. v.
`
`Microsoft Corp., Case No. 6:07-CV-80 (E.D. Tex. Jul. 30, 2009), a
`
`“communication link in a virtual private network.”) There, the court relied on its
`
`construction of VPN, finding it unnecessary to separately construe VPN
`
`communication link, suggesting that a VPN communication link is not separate
`
`from a VPN. (Id. at 25-26.)
`
`Thus, parties and courts have universally understood that a VPN
`
`communication link exists in a VPN. This is the BRI, and Petitioner’s proposed
`
`construction incorrectly deviates from this understanding.
`
`2.
`
`“Authentication” and “Address Hopping” Alone Do Not
`Result in a “Virtual Private Network Communication Link”
`
`Petitioner’s proposed construction is also internally inconsistent and
`
`technically flawed. (Pet. at 14-15.) Of the obfuscation methods in the proposed
`
`construction—authentication, encryption, and address hopping—only encryption
`
`restricts access to “data, addresses, or other information on the path,” as required
`
`by the first portion of the construction. (Ex. 2018 at ¶¶ 21-24.) The other
`
`techniques alone do not “hide information on the path,” as Petitioner’s construction
`
`requires. (Id.)
`
`10
`
`

`
`
`
`Case No. IPR2015-00866
`
`Authentication merely “[e]nsur[es] that a message originated from the
`
`expected sender and has not been altered on route.” (Ex. 2008 at 3, Glossary for
`
`the Linux FreeS/WAN Project.) It does not prevent an eavesdropper from
`
`accessing data transmitted over an unsecure communication link. (Ex. 2018 at
`
`¶ 22.) The specification supports this fact by describing at least one scenario
`
`where an authenticated transmission occurs “in the clear”—i.e., over an unsecured
`
`communication link:
`
`SDNS [secure domain name service] 3313 can be accessed
`through secure portal 3310 “in the clear”, that is, without using
`an administrative VPN communication link. In this situation,
`secure portal 3310 preferably authenticates the query using any
`well-known technique, such as a cryptographic technique,
`before allowing the query to proceed to SDNS [3313].
`
`(Ex. 1001 at 52:1-6.)
`
`Address hopping alone also does not provide the claimed security, as there is
`
`nothing inherent in moving from address to address that hides information on the
`
`path or precludes an eavesdropper from reading the details of a communication.
`
`(Ex. 2018 at ¶ 23.) This is why the ’341 patent discloses embodiments that use
`
`encryption in conjunction with address hopping to protect, for example, the next
`
`address in a routing scheme from being viewed by eavesdroppers. (See, e.g., Ex.
`
`1001 at 3:36-50, stating in part that “[e]ach TARP packet’s true destination is
`
`11
`
`

`
`
`concealed behind a layer of encryption generated using a link key.”) It is the
`
`Case No. IPR2015-00866
`
`encryption that hides information on the path while moving from address to
`
`address. (See, e.g., Ex. 1001 at 3:16-4:40; Ex. 2018 at ¶ 23.)
`
`While authentication and address hopping may be used in conjunction with
`
`encryption as an “obfuscation method,” this fact does not make them sufficient by
`
`themselves to “hide information on the path,” as Petitioner’s construction requires.
`
`(Ex. 2018 at ¶ 23-24.) Because Petitioner’s construction presents them as
`
`alternatives, allowing each to be sufficient, Petitioner’s construction must be
`
`rejected.
`
`Petitioner asserts, however, that Patent Owner’s expert agrees that address
`
`hopping hides information on the path. (Pet. at 13, citing Ex. 1055 at 113:16-
`
`114:12.) But, as Patent Owner’s expert explained, address hopping simply makes
`
`it such that “[y]ou may not be able to determine in isolation who is speaking to
`
`whom.” (Ex. 1055 at 114:1-6.) In other words, address hopping may make it more
`
`difficult to determine the originating and terminating devices, but it alone does not
`
`“hide” the addresses. (Ex. 2018 at ¶ 24.) Thus, Petitioner’s proposed construction
`
`of “secure communication link” should be rejected.
`
`3.
`
`A “Virtual Private Network Communication Link” Must Be
`Direct
`
`Petitioner’s construction incorrectly encompasses links that are not direct.
`
`The ’341 patent specification describes a virtual private network link as “direct”
`
`12
`
`

`
`
`between a client and target device and the prosecution history of related VirnetX
`
`Case No. IPR2015-00866
`
`patents supports this understanding.
`
`For instance, in one embodiment, the ’341 patent describes the link between
`
`an originating TARP terminal and a destination TARP terminal as direct. (See,
`
`e.g., Ex. 1001 at 10:9-18, Fig. 2; see also id. at 34:7-12 (describing a variation of
`
`the TARP embodiments as including a direct communication link); 38:34-37
`
`(describing the embodiment of Figure 24 in which a first computer and second
`
`computer are connected directly).) The ’341 patent similarly describes direct
`
`communications in later embodiments as well. (See, e.g., id. at 40:32-35, 41:25-28
`
`(describing a virtual private network as being direct between a user’s computer and
`
`target), 42:32-36, 43:25-29 (describing a load balancing example in which a virtual
`
`private network

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket