throbber
Paper No. 26
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––––––
`
`APPLE INC.,
`Petitioner,
`
`v.
`VIRNETX INC.,
`Patent Owner.
`
`––––––––––––––––––
`
`Case No. IPR2015-00866
`U.S. Patent No. 8,458,341
`
`––––––––––––––––––
`
`PETITIONER’S REPLY BRIEF
`
`
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`Table of Contents
`
`I.
`
`Introduction .................................................................................................... 1
`
`II. Claim Construction ....................................................................................... 1
`
`III. Beser and RFC 2401 Render Claims 1-11, 14-25, and 28 Obvious ........... 2
`
`A. A Person of Ordinary Skill Would Have Combined Beser and RFC
`2401 ....................................................................................................... 3
`
`B.
`
`Independent Claims 1 and 15 ................................................................ 7
`
`1.
`
`2.
`
`3.
`
`4.
`
`Beser Teaches a Request to Lookup an IP Address ................... 8
`
`Beser Teaches “Intercepting” a Request to Lookup an IP
`Address ...................................................................................... 12
`
`Beser and RFC 2401 Teach a “Virtual Private Network
`Communication Link” .............................................................. 15
`
`Beser Teaches that Originating Device 24 Receives an
`Indication, a Network Address, and Provisioning Information 16
`
`C.
`
`Dependent Claims ............................................................................... 17
`
`1.
`
`2.
`
`3.
`
`Claims 4, 5, 18, and 19 ............................................................. 17
`
`Claim 17 .................................................................................... 18
`
`Claims 2, 3, 6-11, 14, 16, 20-25, and 28 ................................... 18
`
`IV. RFC 2401 Is a Prior Art Printed Publication ........................................... 19
`
`A.
`
`B.
`
`The Evidence Shows RFC 2401 Is a Prior Art Printed Publication ... 19
`
`Patent Owner’s Arguments Lack Any Merit ...................................... 20
`
`V. Dr. Tamassia’s Testimony is Probative ..................................................... 23
`
`VI. Conclusion .................................................................................................... 25
`
`i
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`TABLE OF AUTHORITIES
`
`Cases
`
`Page(s)
`
`Arthrocare Corp. v. Smith & Nephew, Inc.,
`406 F.3d 1365 (Fed. Cir. 2005) .......................................................................... 11
`
`Belden Inc. v. Berk-Tek LLC,
`805 F.3d 1064 (Fed. Cir. 2015) .................................................................... 24, 25
`
`Brand v. Miller,
`487 F.3d 862 (Fed. Cir. 2007) ............................................................................ 24
`
`Poole v. Textron, Inc.,
`192 F.R.D. 494 (D. Md. 2000) ........................................................................... 22
`
`Randall Mfg. v. Rea,
`733 F.3d 1355 (Fed. Cir. 2013) .......................................................................... 18
`
`Schumer v. Lab. Computer Sys., Inc.,
`308 F.3d 1304 (Fed. Cir 2002) ........................................................................... 24
`
`Sundance, Inc. v. Demonte Fabricating Ltd,
`550 F.3d 1356 (Fed. Cir. 2008) .......................................................................... 23
`
`Titanium Metals Corp. of America v. Banner,
`778 F.2d 775 (Fed. Cir. 1985) ............................................................................ 25
`
`U.S. v. Taylor,
`166 F.R.D. 356 (M.D.N.C.) aff'd, 166 F.R.D. 367 (M.D.N.C. 1996) ................ 22
`
`Ultratec, Inc. v. Sorenson Commc'ns, Inc.,
`No. 13-CV-346, 2014 WL 4829173 (W.D. Wis. Sept. 29, 2014) ...................... 22
`
`Guangdong Xinbao Elec. Appliances Holdings v. Adrian Rivera,
`IPR2014-00042, Paper 50 (Feb. 6, 2015) .......................................................... 24
`
`Laird Tech., Inc., v. Graftech Int’l Holdings, Inc.,
`IPR2014-00023, Paper 49 (Mar. 25, 2015) ....................................................... 18
`
`LG Display Co., Ltd, v. Innovative Display Techs. LLC,
`IPR2014-01362, Paper 32 at 15-16 (Feb. 8, 2016) ............................................ 25
`
`ii
`
`

`
`IPR2015-00866
`
`Statutes
`
`
`
`Petitioner’s Reply (Paper 26)
`
`35 U.S.C. § 6 ............................................................................................................ 25
`
`Other Authorities
`
`37 C.F.R. 42.65 ............................................................................................ 18, 22, 25
`
`Fed. R. Evid. 702 ..................................................................................................... 23
`
`
`
`iii
`
`

`
`IPR2015-00866
`
`I.
`
`Introduction
`
`
`
`Petitioner’s Reply (Paper 26)
`
`In its Institution Decision, the Board correctly found that Beser and RFC
`
`2401 render claims 1-11, 14-25, and 28 of the ’341 patent obvious. Paper 8 (Dec.)
`
`at 7-12. In its Response (“Resp.”) (Paper 23), Patent Owner advances a number of
`
`irrelevant claim construction challenges, makes several narrow challenges to the
`
`substance of the Board’s findings about Beser and RFC 2401, challenges whether
`
`RFC 2401 is a printed publication, and then concludes by asserting that the Board
`
`lacks the ability to compare the prior art to the challenged claims on its own
`
`without expert testimony. Each of Patent Owner’s arguments lacks merit and
`
`should be rejected. The Board’s initial determination that the challenged claims
`
`are unpatentable was correct and should be maintained.
`
`II. Claim Construction
`
`In the Institution Decision, the Board correctly found that it need not rely on
`
`the broadest reasonable construction of any of the disputed terms, noting that under
`
`any reasonable construction, Beser and RFC 2401 render the claims obvious.
`
`Many of the terms Patent Owner construes in its Response are irrelevant to
`
`this proceeding because it does not dispute that Beser and RFC 2401 teach those
`
`terms. These include: “provisioning information” (Resp. at 5-7), “secure
`
`communication service” (id. at 20), “indication” (id. at 20-21), “domain name” (id.
`
`at 21), and “modulation” (id. at 21). The Board need not address the remaining
`
`1
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`two terms, i.e., “interception” (id. at 4-5) and “[VPN] communication link” (id. at
`
`8-20), because as explained below, , Beser and RFC 2401 discloses these
`
`limitations under any reasonable construction of those terms.
`
`III. Beser and RFC 2401 Render Claims 1-11, 14-25, and 28 Obvious
`
`The Board correctly found that Beser and RFC 2401 render claims 1-11, 14-
`
`25, and 28 obvious. In its Response, Patent Owner raises five primary challenges:
`
`(i) a person of ordinary skill would not have combined Beser and RFC 2401, (ii)
`
`Beser does not disclose a “request to lookup an IP address,” (iii) Beser does not
`
`disclose “intercepting” such a request, (iv) Beser and RFC 2401 do not disclose a
`
`“[VPN] communication link,” and (v) Beser and RFC 2401 do not suggest that
`
`originating device 24 receives all three elements specified by the “receiving” step.
`
`Initially, this panel should reject Patent Owner’s arguments because most of
`
`them were already considered and rejected by another panel in a proceeding
`
`involving a closely related patent. In the Final Written Decision in IPR2014-00237,
`
`the Board found that Beser and RFC 2401 rendered claims containing elements
`
`similar to the ’341 patent invalid. Paper 41 at 37-41 (May 11, 2015). There, the
`
`Board rejected Patent Owner’s arguments that a person of ordinary skill would not
`
`have combined Beser and RFC 2401, (Paper 41 at 37-41), and that Beser does not
`
`disclose the step of “intercepting a request to lookup an IP address,” (id. at 22-28).
`
`In the current proceeding, Patent Owner simply rehashes those same rejected
`
`2
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`arguments. This panel should reject those arguments again. Even if those
`
`arguments are reconsidered on the merits, they are wrong and must be rejected.
`
`A. A Person of Ordinary Skill Would Have Combined Beser and
`RFC 2401
`
`As explained in the petition and by Dr. Tamassia, a person of ordinary skill
`
`in the art would have found it obvious to combine Beser and RFC 2401 to provide
`
`end-to-end encryption in an IP tunnel between Beser’s originating and terminating
`
`end devices. Pet. at 29-33; Ex. 1005 at ¶¶421-441. The petition explained that the
`
`Beser IP tunnel would hide the true addresses of two communicating end devices
`
`providing user anonymity, and that a person of ordinary skill would have been
`
`motivated to follow Beser’s suggestion to use IPsec (RFC 2401) to hide the data
`
`transmitted between the end devices. Pet. at 31; Ex. 1005 at ¶¶436-37. In its
`
`Institution Decision, the Board agreed and preliminarily found a person of ordinary
`
`skill would have combined Beser and RFC 2401. Dec. at 11-14.
`
`In its Response, Patent Owner primarily repeats the arguments it raised in
`
`IPR2014-00237 and which were rejected by the Board. See Paper 41 at 37-41
`
`(May 11, 2015); Paper 30 at 56-58 (Aug. 29, 2014). It again argues that Beser’s
`
`statements recognizing that encryption can present practical challenges in some
`
`circumstances “teaches away” from the use of encryption. Resp. at 34-40. Patent
`
`Owner’s argument still cannot be squared with Beser’s disclosure.
`
`Beser recognizes encryption ordinarily should be used when the contents of
`3
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`a communication need to be protected (Ex. 1007 at 1:54-56), and it discloses using
`
`encryption when user-identifiable data are sent over the network such as during
`
`establishment of the IP tunnel, (id. at 11:22-25); Pet. at 30. Beser also criticizes
`
`prior art IP tunneling methods that sometimes prevent use of encryption, (Ex. 1007
`
`at 2:1-8, 2:22-24), and states its tunneling method is intended to overcome such
`
`problems, (id. at 2:43-45). A person of ordinary skill reading Beser would have
`
`understood that encryption should ordinarily be used to protect the contents of
`
`communications in an IP tunnel. Ex. 1005 at ¶¶422-24, 427-28, 436-37.
`
`Neither Patent Owner nor Dr. Monrose have asserted Beser’s tunneling
`
`method is technically incompatible with encryption – they simply raise practical
`
`concerns that only affect some configurations of the system. Dr. Monrose has
`
`admitted that there was no inherent incompatibility with using IPsec to encrypt
`
`multimedia data, and that a person of ordinary skill would have had computational
`
`concerns only if IPsec was configured to use certain types of encryption. Ex. 1066
`
`at 80:20-81:8, 82:7-17. He also admitted a person of ordinary skill in February
`
`2000 would have been able to adjust the configuration of a system to allow
`
`multimedia data to be encrypted. Id. at 79:3-11. Petitioner’s expert Dr. Tamassia
`
`similarly explained that a skilled person would be able to change a system’s
`
`configuration to accommodate use of encryption in Beser’s IP tunnel. Ex. 1005 at
`
`¶¶427-28 (adding more computing power or using a lower resolution media stream
`
`4
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`could solve any issues). Patent Owner criticizes the Board for finding that adding
`
`more computer power to a system would alleviate the potential concerns identified
`
`in Beser, arguing that approach is not always the solution to every problem. Resp.
`
`at 35-36. But adding more computing power is one of several ways to address the
`
`practical considerations mentioned in Beser, as Dr. Monrose has previously
`
`recognized. Ex. 1067 at 206:20-208:6 (admitting more powerful computers or
`
`lower recording fidelity would resolve Beser’s concerns), 211:16-212:2.
`
`Patent Owner also argues Beser teaches away from encryption because its
`
`tunneling method was designed to have a low computational burden on a system,
`
`and therefore, it was designed to replace computationally expensive security
`
`techniques such as encryption. Resp. at 36, 38. But Patent Owner mischaracterizes
`
`the purpose of Beser’s design. Beser was designed to provide a better method for
`
`ensuring user privacy by allowing communications over the Internet to be
`
`anonymous. See Ex. 1007 at 2:36-40, 3:4-9. Beser explains users increasingly had
`
`privacy concerns, (id. at 1:13-25), and that it was easy for computer hackers to
`
`determine the identity of two users communicating over the Internet because the
`
`source and destination addresses of IP packets were viewable, (id. at 1:26-53).
`
`Beser explains that while encrypting data could protect the contents of the
`
`communication, encryption did not provide privacy because it did not hide the
`
`identities of devices that are communicating. Id. at 2:1-5; id. at 1:56-58. Beser
`
`5
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`then discusses conventional IP tunneling techniques, which could provide privacy
`
`by hiding the true addresses of end devices, but notes those techniques sometimes
`
`were incompatible with encryption. Ex. 1007 at 2:22-24; see also id. at 1:54-2:35;
`
`see Pet. at 29-30. Beser also notes that both encryption and prior art IP tunnels
`
`were computationally expensive. Ex. 1007 at 1:60-63, 2:12-17, 2:33-35.
`
`Beser states that its IP tunneling technique was designed to overcome these
`
`problems with the prior art. Ex. 1007 at 2:43-45. Beser’s IP tunnel hides the
`
`identities of communicating devices, but in contrast to prior art IP tunnels which
`
`were computationally expensive, (id. at 2:33-35), Beser’s IP tunnel has a low
`
`“computational burden,” (id. at 3:4-9). Because of its low computational burden,
`
`Beser’s method is flexible and can be integrated into existing communications
`
`systems and combined with other security techniques. See Ex. 1005 at ¶¶426, 431;
`
`Ex. 1007 at 3:4-9, 4:55-5:2. Beser’s tunneling method also can be combined with
`
`encryption: Beser specifically notes the its IP tunnel can improve the security of
`
`encryption by helping to “prevent a hacker from intercepting all media flow
`
`between the ends,” (Ex. 1007 at 2:36-40), and from “accumulating . . . sufficient
`
`information to decrypt the message,” (id. at 1:56-58). In addition, IPsec was
`
`known to be highly adaptable, enabling it to accommodate computational burdens
`
`of a particular configuration by adjusting parameters of the IPsec protocol (e.g.,
`
`adjusting the strength or type of encryption used). See Ex. 1008 at 4, 7, 10.
`
`6
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`Next, Patent Owner argues that using encryption in Beser’s system would be
`
`“redundant” because Beser teaches hiding the identities of the end devices instead
`
`of protecting the contents of a communication. Resp. at 38; see id. at 36 (arguing
`
`Beser is intended to replace encryption). But Beser never states its technique is
`
`intended to replace encryption. In fact, Beser distinguishes between using
`
`encryption to protect the data inside packets and using IP tunnels to hide the true
`
`addresses of the end devices, as Patent Owner recognizes. Resp. at 34-35. And
`
`Dr. Monrose agreed a person of ordinary skill would have recognized that using a
`
`security technique to protect the identities of the parties communicating is not a
`
`substitute for using encryption to protect the contents of the communications sent
`
`between the parties. Ex. 1066 at 74:4-15; 74:25-75:3. Thus, the Board correctly
`
`found a person of ordinary skill would have combined Beser and RFC 2401.
`
`B.
`
`Independent Claims 1 and 15
`
`The Board correctly found Beser discloses “intercepting” a “request to
`
`lookup an [IP] address.” Dec. at 9-10. As explained in the Petition, Beser shows
`
`an originating device 24 initiates an IP tunnel with terminating device 26 by
`
`sending out a tunneling request that contains device 26’s unique identifier. Pet. at
`
`34-37. This request is intercepted by each of first network device 14 and trusted-
`
`third-party network device 30. Id. In IPR2014-00237, the Board relied on this
`
`same request in finding that “Beser’s trusted-third-party device 30 is ‘informed of
`
`7
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`the request’ from device 14; thereby ‘receiving a request pertaining to a first entity
`
`[26] at another entity [14 or 30]’ and satisfying the ‘intercepting a request’ element
`
`of claim 1 (and a similar element in claim 16).” Paper 41 at 24.
`
`Patent Owner asserts that Beser and RFC 2401 do not teach four limitations
`
`of claims 1 and 15. See Resp. at 25-34. Each of Patent Owner’s contentions
`
`reflects a misunderstanding of its own claims and a mischaracterization of what
`
`Beser actually discloses.
`
`1.
`
`Beser Teaches a Request to Lookup an IP Address
`
`The tunneling request sent by originating device 24 is a “request to lookup
`
`an [IP] address” because in response to receiving the request, the Beser trusted
`
`device 30 looks up two IP addresses. Pet. at 34-36. First, it consults an internal
`
`database of registered devices to look up the IP address of second network device
`
`16 that is associated with the unique identifier. Id. at 21-22, 35-36; Ex. 1007 at
`
`11:45-58. Second, it looks up a private IP address for terminating device 26 by
`
`sending a message to network device 16 requesting the address. Pet. at 22-23, 35-
`
`36; Ex. 1007 at 9:29-30, 12:16-19, 14:14-27, Figs. 6 & 9. As a result of this
`
`process, originating device 24 receives an IP address for terminating device 26.
`
`Pet. at 23; Ex. 1007 at 21:48-52; see Ex. 1066 at 103:22-104:3 (Dr. Monrose not
`
`disputing the originating device receives an IP address for the terminating device).
`
`Patent Owner argues the tunneling request cannot be a request to “lookup an
`
`8
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`IP address” because trusted device 30 does not “look up” any IP addresses in
`
`response to the request. Resp. at 26. Initially, that argument is irrelevant to the
`
`claims, which specify intercepting “a request to lookup an [] IP address,” and
`
`under the broadest reasonable construction, do not require a lookup to be
`
`performed, let alone specify that a particular device perform the lookup. Thus,
`
`Patent Owner’s arguments about performing a lookup can be dismissed because
`
`the claims do not require a lookup.
`
`Based on its incorrect theory that a lookup is required, Patent Owner argues
`
`that neither of Beser’s lookups actually lookup an IP address. First, Patent Owner
`
`argues Beser does not disclose that trusted device 30 performs a “lookup” of
`
`network device 16’s public IP address in response to a tunneling request. Resp. at
`
`27. It admits that trusted device 30 contains a database or similar structure that
`
`correlates each unique identifier to the public IP addresses of a second network
`
`device 16 and terminating device 26, but asserts Beser “never suggests that this
`
`data structure is looked up when the tunnel request is received by device 30.”
`
`Resp. at 27. That position is contrary to Beser’s explicit disclosure.
`
`Beser describes the database as an example of how the trusted-third-party
`
`network device 30 performs Step 116 of Figure 5, “associat[ing] a public IP
`
`address for a second network device,” which it performs after receiving the
`
`tunneling request sent to it in Step 114. Ex. 1007 at Fig. 5, 11:26-58. Figure 5 has
`
`9
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`four steps, and Beser walks through each step sequentially on 9:64 to 12:19. See
`
`Ex. 1066 at 104:25-107:13. Beser discusses Step 116 in two sequential paragraphs
`
`that appear at 11:26-58, as Dr. Monrose agreed. Ex. 1066 at 107:15-108:8. The
`
`first paragraph explains trusted device 30 associates the public IP address for
`
`second network device 16 with the unique identifier in the request. Ex. 1007 at
`
`11:26-32. The second paragraph describes an example of how the association is
`
`performed, stating “[f]or example, the trusted-third-party network device 30
`
`may . . . retain[]a list of E.164 numbers of its subscribers [and] [a]ssociated with a
`
`E.164 number in the directory database is the IP 58 address of a particular second
`
`network device 16.” Id. at 11:45-50; see id. at 11:55-58 (noting other types of
`
`unique identifiers could be used). Thus, Beser teaches that in Step 116 of Figure 5,
`
`trusted device 30 receives the tunneling request, (id. at 11:9-20), and in response, it
`
`associates an IP address with the unique identifier by looking it up in its internal
`
`database, (id. at 11:26-58). See Ex. 1066 at 107:15-108:8.
`
`Patent Owner also suggests the Beser tunneling request cannot be one to
`
`“lookup an IP address” because trusted device 30 looks up the public IP address of
`
`second network device 16 instead of terminating device 26. Resp. at 27. But the
`
`claims only specify a request to lookup an “[IP] address … based on a domain
`
`name associated with second network device,” (Ex. 1001 at 56:8-10) (emphasis
`
`added), and the ’341 specification provides that the IP address looked up “need not
`
`10
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`be the actual address of the destination computer,” (id. at 40:43-44). Dr. Monrose
`
`agreed. Ex. 1066 at 63:25-64:24. In Beser’s system, the IP address of network
`
`device 16 is “associated with” the unique identifier (e.g., domain name) of
`
`terminating device 26. Thus, the tunneling request meets the claim language.
`
`Second, Patent Owner challenges the “lookup” of the private IP address by
`
`arguing the first and second devices (14 & 16), and not trusted device 30, negotiate
`
`private IP addresses for end devices 24 & 26. Resp. at 26. That argument is
`
`premised on a single embodiment in Beser, and ignores that Beser discloses
`
`embodiments where trusted device 30 performs the negotiation with the first and
`
`second network devices (14 & 16). Ex. 1007 at 9:29-30, 12:16-19, 14:19-27, Figs.
`
`6 and 9; see Pet. at 21-22, 35-36. Petitioner established certain embodiments in
`
`Beser met the claim limitations, which is all that is required. Arthrocare Corp. v.
`
`Smith & Nephew, Inc., 406 F.3d 1365, 1372 (Fed. Cir. 2005) (no requirement that
`
`every possible embodiment of a prior art reference satisfy the claims).
`
`Patent Owner also asserts that no private IP addresses are “looked up”
`
`during the negotiation because second network device 16 “assigns” a private IP
`
`address to terminating device 26. Resp. at26. That argument fails for at least two
`
`reasons. One, even if second network device 16 “assigns” the IP address to
`
`terminating device 24, the trusted device 30 “looks up” the IP address when it
`
`sends a message to network device 16 requesting a private IP address. Ex. 1007 at
`
`11
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`Fig. 9 (packets 164 & 166), 13:34-48, 13:66-14:18; Pet. at 20-21, 38. Two, second
`
`device 16 does not simply “assign” an IP address – it looks one up by selecting an
`
`unused address out of a pool of IP addresses. Ex. 1007 at 13:49-64; Pet. at 20.
`
`Thus, the Board should find Beser teaches a “request to lookup an IP address.”
`
`IPR2014-00237, Paper 41 at 22-23 (finding Beser discloses such a request).
`
`2.
`
`Beser Teaches “Intercepting” a Request to Lookup an IP
`Address
`
`Beser shows that each of the first network device 14 and the trusted-third-
`
`party network device 30 “intercept” the tunneling request sent by originating
`
`device 24. Pet. at 36-37. The tunneling request contains the unique identifier for
`
`terminating device 26, (Ex. 1007 at 8:1-3, 10:37-42), but it is received and
`
`processed by first network device 14, (id. at 8:21-22, 8:39-43, 10:22-23). Because
`
`the request pertains to terminating device 26 but is received by network device 14,
`
`it is intercepted by network device 14. Pet. at 37. If network device 14 determines
`
`the request needs special processing by detecting a unique sequence of bits in the
`
`packet, (Ex. 1007 at 8:34-43), network device 14 forwards the request, where it is
`
`received by trusted device 30, (id. at 8:3-7, 8:48-49). Pet. at 36-37; see also Ex.
`
`1007 at Figs. 4 & 6. The trusted device 30 device thus also “intercepts” the
`
`tunneling request. Pet. at 37; see also IPR2014-00237, Paper 41 at 23-24.
`
`Patent Owner contends that neither first network device 14 nor trusted-third-
`
`party network device 30 “intercept” the tunneling request because Beser’s system
`12
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`is designed such that tunneling requests are always “intended for” and received by
`
`those two devices. Resp. at 29-31. But Patent Owner’s arguments are irrelevant to
`
`what the claims require. The ’341 patent’s only disclosure of a DNS device that
`
`“intercepts” lookup requests is DNS proxy 2610, which “intercepts all DNS
`
`lookup functions from client 2605.” Ex. 1001 at 40:26-27 (emphasis added). The
`
`’341 patent thus provides that DNS proxy 2610 “intercepts” lookup functions, even
`
`though the DNS proxy receives every single lookup request sent by the client. Id.
`
`at Fig. 26, 40:26-27. Dr. Monrose agreed the DNS proxy receives every DNS
`
`request and that the system is designed, i.e., “pre-established” to intercept every
`
`DNS request. Ex. 1066 at 55:8-20. Thus, the Board should reject Patent Owner’s
`
`arguments that Beser cannot show “intercepting” because it is designed such that
`
`IP tunnel requests are received by network device 14 and trusted device 30.
`
`Moreover, Patent Owner mischaracterizes Beser. Even if “intercepting”
`
`were to include an “intent” element—a position that no party has taken in this
`
`proceeding—Beser discloses such as system. See Resp. at 4. The originating
`
`device 24 never “intends for” its tunneling request to be received by the trusted
`
`device 30. As the petition explains, the originating device 24 sends tunneling
`
`requests to first network device 14. Pet. at 36. Dr. Monrose agreed that the
`
`tunneling request is addressed to the first network device and not the trusted-third-
`
`party network device. Ex. 1066 at 94:7-95:14. Network device 14 runs a
`
`13
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`tunneling application that monitors traffic for a distinctive sequence of bits, and if
`
`it detects a packet containing those bits, it forwards that packet to trusted device
`
`30. Pet. at 36; Ex. 1007 at 8:39-43. In Beser’s system, it is first network device 14
`
`that “intends” for trusted device 30 to receive the request. Ex. 1066 at 97:8-98:10,
`
`101:9-14. The originating device 24 only “intends” for the tunneling request to go
`
`to network device 14. Thus, the tunnel request is received by trusted device 30,
`
`even though originating device 14 did not “intend” to send the tunnel request to
`
`that device, and thus trusted device 30 “intercepts” the request. See Pet. at 37.
`
`All of Patent Owner’s arguments about the “intercepting” step are anchored
`
`on it including an “intent” element, and not on any of the actual proposed
`
`constructions. Resp. at 23-27; see Ex. 1066 at 124:23-127:13, 132:8-13 (Dr.
`
`Monrose admitting he did not apply any constructions and had no opinion on the
`
`term “intercepting”). The Board can reject those arguments because no one in this
`
`proceeding has advanced such a construction of “intercepting.” Patent Owner
`
`asserts Dr. Tamassia “clarified” his construction of “interception” to mean
`
`“receiving a request pertaining to intended for or ordinarily received by a first
`
`entity at another entity.” Resp. at 28-29; Ex. 1005 at ¶73. But here Patent Owner
`
`simply mischaracterizes Dr. Tamassia’s testimony; he was at that point explaining
`
`the rationale underpinning his construction, and was neither proposing nor
`
`applying a different construction. Ex. 2019 at 79:9-80:13, 85:9-12; see Ex. 1005 at
`
`14
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`¶72. Even if “intercepting” were found to require receiving a request “intended
`
`for” another entity, that is disclosed by Beser, as explained above. Further, even if
`
`Patent Owner’s “alternative” construction specifying “performing an additional
`
`evaluation” on the request were adopted, (Resp. at 4-5), Beser discloses that as
`
`well: the trusted device 30 evaluates the request by checking an internal table of
`
`secure devices, (Ex. 1007 at 11:45-58), which is the same process shown in the
`
`’341 patent, (Ex. 1001 at 40:28-31).
`
`3.
`
`Beser and RFC 2401 Teach a “Virtual Private Network
`Communication Link”
`
`Petitioner explained that Beser and RFC 2401 teach a “[VPN]
`
`communication link” because Beser’s obfuscation provides anonymity while RFC
`
`2401 encrypts data. Pet. at 41-43. The same glossary of terms that Patent Owner
`
`and Dr. Monrose rely on to inform their understanding of this term explicitly
`
`provides that IPsec and RFC 2401 can be used to create VPNs. Resp. at 17, 19;
`
`Ex. 2008 at 25; see id. at 21; Ex. 1070 at 101:3-115:16; Prelim. Resp. at 42.
`
`Patent Owner argues that Beser differentiates its tunnel from a “virtual
`
`private network communication link” because Beser identifies a limitation of prior
`
`art “VPN” methods. Resp. at 31. But Patent Owner relies only on Beser’s
`
`purported definition of a VPN, not a construction of “[VPN] communication link”
`
`proposed in this case. Id.; Ex. 1070 at 72:21-73:14 (Dr. Monrose testifying his
`
`15
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`opinion was based on Beser’s “understanding of virtual private networks”).1
`
`Neither Patent Owner nor Dr. Monrose apply either party’s proposed construction
`
`of the term to Beser, nor do they respond to Petitioner’s reliance on the
`
`combination of Beser and RFC 2401. Pet. at 42; Ex. 1070 at 79:3-21, 83:2-22.
`
`Therefore, Patent Owner’s challenge to this claim limitation can be dismissed.
`
`4.
`
`Beser Teaches that Originating Device 24 Receives an
`Indication, a Network Address, and Provisioning Information
`
`Patent Owner argues that Petitioner relies on two features in Beser and RFC
`
`2401 to teach three different claim elements, and asserts that such reliance is
`
`improper. Resp. at 32-34. Patent Owner’s argument suffers from a fatal flaw:
`
`Petitioner relies on three different features in Beser and RFC 2401 to teach the
`
`three claim elements. Pet. at 39-44. Claims 1 and 15 specify that a first device
`
`“receive … an indication that the second network device is available …, the
`
`requested IP address of the second network device, and provisioning information
`
`for a virtual private network communication link.” Ex. 1001 at 56:11-18. Patent
`
`Owner asserts that Petitioner relied on the same two features in Beser for the
`
`indication and the requested network address, but Patent Owner is wrong.
`
`Petitioner explained that after Beser’s originating device 24 sends out a tunneling
`
`1 Beser’s solution is also plainly a VPN as Beser defines it: “a tunneling connection
`
`between edge routers on the public network.” Ex. 1007 at 2:6-8, 2:43-67, 4:19-21.
`
`16
`
`

`
`IPR2015-00866
`
`
`
`Petitioner’s Reply (Paper 26)
`
`request, it receives the private IP address of the terminating device 26 as well as its
`
`own private IP address. Pet at 39-41; Ex. 1007 at 21:48-62. The originating
`
`device 24 receives the claimed “requested IP address” because it receives the
`
`private IP address of terminating device 26. Pet. at 41. It also receives the claimed
`
`“indication” because originating device 24 receives a second private IP address: its
`
`own.2 Pet. at 40. Thus, Petitioner has relied on two separate elements to teach two
`
`claim limitations. Patent Owner’s contrary argument can be dismissed.
`
`C. Dependent Claims
`
`1.
`
`Claims 4, 5, 18, and 19
`
`Petitioner explained it would have been obvious to send email through
`
`Beser’s IP tunnel per claims 4, 5, 18, and 19 “because [Beser] already transmits
`
`other types of communication data such as audio and video, and extending it to e-
`
`mail would have been an obvious design choice.” Pet. at 51; Ex. 1005 at ¶350 (“E-
`
`mail is a type of data . . . and transmitting it via Beser’s secure IP tunnel would
`
`protect it in the same way”). It also pointed to Beser’s use of email addresses and
`
`disclosure that “the ends of the data flow may be other types of network devices”
`
`as suggestions for such a modification. Pet. at 51; Ex. 1005

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket