throbber
Trials@uspto.gov
`571-272-7822
`
`
`Paper 112
`Entered: July 14, 2020
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`THE MANGROVE PARTNERS MASTER FUND, LTD., and
`APPLE INC.,
`Petitioner,
`
`v.
`
`VIRNETX INC.,
`Patent Owner.
`____________
`
`IPR2015-010461
`Patent 6,502,135 B1
`____________
`
`Before MICHAEL P. TIERNEY, Vice Chief Administrative Patent Judge,
`KARL D. EASTHOM, JASON W. MELVIN, Administrative Patent Judges.
`
`MELVIN, Administrative Patent Judge.
`
`
`
`JUDGMENT
`Final Written Decision on Remand
`Determining All Challenged Claims Unpatentable
`35 U.S.C. §§ 144, 318
`
`
`
`
`
`
`1 Apple Inc., which filed a petition in IPR2016-00062, has been joined as a
`Petitioner in this proceeding.
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`INTRODUCTION
`I.
`A. BACKGROUND AND SUMMARY
`The Mangrove Partners Master Fund, Ltd., and Apple Inc.
`(collectively, “Petitioner”) requested inter partes review of claims 1, 3, 4, 7,
`8, 10, and 12 of U.S. Patent No. 6,503,135 B1 (Ex. 1001, “the ’135 patent”).
`Paper 1, (“Pet.”).2 We issued a Decision instituting inter partes review.
`Paper 11 (“Inst. Dec.”).
`After Institution, VirnetX Inc. (“Patent Owner”) filed a Patent
`Owner’s Response (Paper 49 (redacted version), “PO Resp.”; Paper 44 (non-
`redacted version)), to which Petitioner replied (Paper 51 (redacted version),
`“Pet. Reply”; Paper 50 (non-redacted version); and Paper 53, “Pet. Separate
`Reply”). Oral argument was conducted on June 30, 2016. Our Final Written
`Decision was issued September 9, 2016. Paper 71 (“Original Decision”).
`On appeal, the Federal Circuit vacated our Original Decision and
`remanded the case for further proceedings. VirnetX Inc. v. Mangrove
`Partners Master Fund, Ltd., 778 F. App’x 897 (Fed. Cir. 2019). After
`conferring with the parties, we permitted Patent Owner to file a Motion for
`Additional Discovery (Paper 81), to which Petitioner filed an Opposition
`(Paper 82) and Patent Owner filed a Reply (Paper 87). We granted in part
`Patent Owner’s Motion. Paper 88. Patent Owner requested rehearing of our
`Decision on its Motion for Additional Discovery (Paper 92), to which
`Petitioner opposed (Paper 93) and Patent Owner replied (Paper 94).
`We permitted the parties to brief the issues for consideration on
`remand from the Federal Circuit. Petitioner filed a principal brief (Paper 95,
`
`
`2 We consider the Petition filed by The Mangrove Partners Master Fund,
`Ltd., not the similar petition filed by the joined party.
`
`2
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`“Pet. Remand Br.”), Patent Owner filed an Opposition (Paper 96, “PO
`Remand Br.”), Petitioner filed a Reply (Paper 97, “Pet. Remand Reply”),
`and Patent Owner filed a Sur-Reply (Paper 98, “PO Remand Sur-Reply”).
`Oral argument was conducted on January 24, 2020, and a transcript appears
`in the record. Paper 105 (“Tr.”).
`This is a Final Written Decision on Remand as to the patentability of
`the challenged claims. For the reasons discussed below, we determine that
`Petitioner has shown by a preponderance of the evidence that the challenged
`claims are unpatentable.
`
`B. RELATED MATTERS
`The ’135 patent is at issue in the following civil actions: (i) Civ. Act.
`No. 6:13-cv-00211-LED (E.D. Tex.), filed February 26, 2013; (ii) Civ. Act.
`No. 6:12-cv-00855-LED (E.D. Tex.), filed November 6, 2012; and (iii) Civ.
`Act. No. 6:10-cv-00417-LED (E.D. Tex.), filed August 11, 2010. Pet. 1;
`Paper 8, 11–12.
`The ’135 patent is the subject of Reexamination Control
`Nos. 95/001,679 and 95/001,682. Pet. 2; Paper 8, 2–3.
`Petitioner additionally describes a related matter as follows:
`
`On January 21, 2020, the Federal Circuit issued its opinion in
`VirnetX Inc. v. Cisco Systems, Inc., No. 2019-1043 (Fed. Cir.
`Jan. 21, 2020), affirming, under Fed. Cir. R. 36, the Board’s
`decisions in Cisco Systems, Inc. v. VirnetX Inc., Control
`No. 95/001,746, Appeal Nos. 2015-007843, 2017-010852,
`2017-010852, each involving related U.S. Patent No. 6,839,759
`and, inter alia, the Kiuchi reference at issue in this proceeding.
`Paper 102, 1.
`
`3
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`Additionally, Patent Owner identifies a number of PTO proceedings
`that involve U.S. Patent No. 7,490,151 (“the ’151 patent”). Paper 8, 3–4. Of
`particular significance here, the ’151 patent is at issue in IPR2015-01047,
`which has been treated as largely a companion proceeding to the present.
`See, e.g., VirnetX, 778 F. App’x at 904 (describing the ’135 patent and the
`’151 patent collectively; noting the patents “share a substantially identical
`specification”).
`Patent Owner identifies multiple other proceedings involving “patents
`stemming from the same applications that led to the ’135 patent.” Paper 8,
`3–10.
`
`C. THE ’135 PATENT
`The ’135 patent discloses a system and method for communicating
`over the Internet and the automatic creation of a virtual private network
`(VPN) in response to a domain-name server look-up function. Ex. 1001,
`2:66–3:2, 37:19–21. The ’135 patent describes “a protocol referred to as the
`Tunneled Agile Routing Protocol (TARP), [which] uses a unique two-layer
`encryption format and special TARP routers.” Id. at 2:66–3:2.
`
`ILLUSTRATIVE CLAIMS
`D.
`Claim 1 of the ’135 patent is illustrative of the claimed subject matter
`and is reproduced below:
`1. A method of transparently creating a virtual private network
`(VPN) between a client computer and a target computer,
`comprising the steps of:
`(1) generating from the client computer a Domain Name
`Service (DNS) request that requests an IP address
`corresponding to a domain name associated with the
`target computer;
`
`4
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`(2) determining whether the DNS request transmitted in
`step (1) is requesting access to a secure web site; and
`(3) in response to determining that the DNS request in step
`(2) is requesting access to a secure target web site,
`automatically initiating the VPN between the client
`computer and the target computer.
`Ex. 1001, 47:20–32.
`
`E. PRIOR ART AND ASSERTED GROUNDS
`Petitioner asserts unpatentability on the following grounds:
`Claim(s) Challenged 35 U.S.C. § Reference(s)
`1, 3, 4, 7, 8, 10, 12
`102
`Kiuchi3
`
`8
`
`103
`
`Kiuchi, RFC 10344
`
`Pet. 4.
`
`F. CAFC REMAND
`On appeal, the Federal Circuit held that our prior decision erred by
`failing to construe “client computer” and reading it on Kiuchi’s client-side
`proxy without adequate analysis. VirnetX, 778 F. App’x at 908–09. It further
`held that reading “client computer” on Kiuchi’s user agent did not deprive
`VirnetX of adequate notice or opportunity to respond under the APA. Id.
`at 909.
`Considering the construction for “VPN between the client and target
`computers,” the Federal Circuit held that “[t]he statements VirnetX made
`
`
`3 Takahiro Kiuchi and Shigekoto Kaihara, “C-HTTP – The Development of
`a Secure, Closed HTTP-based Network on the Internet,” published by
`IEEE in the Proceedings of SNDSS 1996 (Ex. 1002).
`4 Mockapetris, P., RFC 1034, “Domain Names–Concepts and Facilities,”
`Nov. 1997 (Ex. 1005).
`
`5
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`during reexamination constitute disclaimer.” VirnetX, 778 F. App’x at 910.
`The Federal Circuit determined that “a ‘VPN between the client computer
`and the target computer’ requires direct communication between the client
`and target computers” because VirnetX distinguished its claims over “a
`system in which a client computer communicates with an intermediate
`server via a singular, point-to-point connection.” Id.; see id. at 909–910
`(describing statements made to distinguish a prior art reference called
`“Aventail”). In light of that new construction, the Court remanded the case
`for us to determine whether Kiuchi satisfies the VPN limitation. Id.
`
`II. ANALYSIS
`A. CLAIM CONSTRUCTION
`The ’135 patent expired October 29, 2019, and we therefore construe
`its claims according to the standard used by district courts, as expressed in
`Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc). PO
`Remand Br. 2–3; see In re CSB-Sys. Int’l, Inc., 832 F.3d 1335, 1342 (Fed.
`Cir. 2016).
`The Federal Circuit instructed us as to the correct construction for a
`“VPN between the client computer and the target computer.” VirnetX,
`778 F. App’x at 909–10. Additionally, as to the ’151 patent, it held that,
`“[t]o the extent the Board intended to rely exclusively on Kiuchi’s client-
`side proxy for the claimed ‘client,’” it was necessary to construe the
`meaning of “client.” Id. at 907–08.
`
`1. “virtual private network (VPN)”
`The Federal Circuit held that the claim language “a virtual private
`network (VPN) between a client computer and a target computer” “requires
`
`6
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`direct communication between the client and target computers” because,
`during reexamination, VirnetX disclaimed scope that would read on “a
`system in which a client computer communicates with an intermediate
`server via a singular, point-to-point connection.” 778 F. App’x at 910.
`The parties continue to dispute the impact of the Federal Circuit’s
`claim construction. Petitioner contends that, during the concurrent litigation,
`Patent Owner’s expert “testified that direct communication refers to direct
`addressability of the target computer.” Pet. Remand Br. 10 (emphasis
`omitted) (citing Ex. 1044, 50:25–51:5). Patent Owner takes the view that,
`regardless of how one understands “direct communication,” the claims
`cannot encompass “a ‘system in which a client computer communicates with
`an intermediate server via a singular, point-to-point connection,’ wherein
`‘[t]hat intermediate server then relays the data to a target computer on the
`same private network on which the server resides.” PO Remand Br. 12
`(quoting VirnetX, 778 F. App’x at 910).
`At bottom, the parties dispute whether Kiuchi describes direct
`communication that would fall within the claims’ scope as properly
`construed, and we address that issue below.
`
`2. “client computer”
`As to the proper construction of “client computer,” Petitioner submits
`that its “first anticipation mapping does not implicate this issue—there, the
`‘user agent’ is the ‘client computer.’” Pet. Remand Br. 6. Patent Owner does
`not dispute that assertion. PO Remand Br. 15–21. The construction does,
`however, impact Petitioner’s second anticipation mapping and we therefore
`address the dispute.
`
`7
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`Petitioner submits that a “client computer” should be construed as a
`“computer from which a data request to a server is generated.” Pet. Remand
`Br. 6–9. Patent Owner, on the other hand, submits that the claimed client
`computer must refer to a “user’s computer.” PO Remand Br. 3–12.
`Petitioner contends that “client computer” refers to the “conventional
`client component of a client/server architecture.” Pet. Remand Br. 7 (citing
`Ex. 1003 ¶ 19; Ex. 1014, 5 (defining “client” as “[a]n application program
`that establishes connections for the purpose of sending requests.”)).
`According to Petitioner, that usage is consistent with the Specification’s
`specific use of “user’s computer” and description, for example, that “[a]
`user’s computer 2601 includes a conventional client (e.g., a web browser)
`2605.” Pet. Remand Br. 8 (quoting Ex. 1001, 38:14–15; citing Ex. 1001,
`37:30–32; 39:17–20, 39:22–29, 44:40–45). Petitioner reasons that because
`the ’135 patent uses the term “user’s computer” when desired, it does not
`indicate that the term is synonymous with “client computer.” Id. at 9.
`Finally, Petitioner argues that the Specification describes embodiments
`where a VPN is initiated by client software that runs on a computer not
`described as a user’s computer, showing that a client computer refers simply
`to the computer from which a data request to a server is generated. Id. (citing
`Ex. 1001, 31:57–64, 36:26–28, 40:27–30).
`Patent Owner focuses initially on the claim language reciting
`“initiating the VPN between the client computer and the target computer.”
`PO Remand Br. 3. In Patent Owner’s view, that language reflects the
`Specification’s description that the invention provides secure
`communication between a user’s computer running a web browser and a
`secure target site. Id. at 4 (citing Ex. 1001, 1:15–31, 4:59–5:12, 38:13–33).
`
`8
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`In that way, Patent Owner contrasts its proposed construction with
`Petitioner’s, which Patent Owner contends would permit a server to act as
`the “client computer” and therefore contort the claim in an unnatural way.
`Id. at 8. Regarding the Specification’s description of a user’s computer
`including a conventional client application (Ex. 1001, 38:14–15), Patent
`Owner asserts it supports Patent Owner’s construction for “client computer”
`because it shows that the relevant client applications are those on user-
`operated computers, not just any software that communicates with a server.
`PO Remand Br. 8–9. Finally, Patent Owner addresses Petitioner’s contention
`that the Specification describes VPN connections involving a client
`computer that is not operated by a user. Id.at 10–11. In Patent Owner’s view,
`each of the Specification portions identified by Petitioner either does involve
`a user-operated computer or relates to embodiments outside the scope of the
`challenged claims. Id.
`The proper construction for “client computer” presents a close issue.
`Although we agree that the plain words seemingly refer to a computer that
`acts as a client in a client–server relationship, the Specification demonstrates
`that the claims are not so broad.
`The preamble recites “transparently creating a virtual private network
`(VPN) between a client computer and a target computer.”5 The Specification
`describes “automatic creation of a virtual private network (VPN) in response
`to a domain-name server look-up function” under a heading that states “Use
`
`
`5 Although the preamble does not necessarily limit the claim, here, the term
`“virtual private network” in the preamble provides antecedent basis for that
`term later in the claim. See Catalina Marketing Intern. v. Coolsavings.com,
`289 F. 3d 801, 808 (Fed. Cir. 2002). Moreover, the parties do not assert
`that the preamble here limits the claim.
`
`9
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`of a DNS Proxy to Transparently Create Virtual Private Networks.”
`Ex. 1001, 37:17–21. The embodiment described in that section includes
`determining the need for a secure connection based on a DNS request from
`the user’s computer. Id. at 37:63–38:2; accord id. at 38:23–25 (“According
`to one embodiment, DNS proxy 2610 intercepts all DNS lookup functions
`from client 2605 and determines whether access to a secure site has been
`requested.”). The Specification explains that Figure 26 depicts the same
`embodiment and confirms that, when created, the VPN extends from the
`user’s computer with client software to the desired target site. Id. at 38:13–
`65. Although we are mindful that a single embodiment in the Specification
`should not be used to limit the claims, the close fit between this embodiment
`and the claims at issue counsels close consideration. Moreover, the
`Specification does not appear to discuss operations using DNS requests
`outside of the embodiment associated with Figure 26. Cf. id. at 32:27–35
`(describing improvements added through a continuation-in-part application
`as including “a DNS proxy server that transparently creates a virtual private
`network in response to a domain name inquiry”).
`If we were to construe the claimed “client computer” as Petitioner
`seeks, it would permit a claim scope that exceeds the Specification’s
`description. The parties essentially assert two ordinary meanings exist––one
`related to the user, the other related to the client–server relationship––but the
`Specification only describes the client computer vis-à-vis the user. So if we
`were to construe the claimed “client computer” as Petitioner seeks, it would
`read a meaning into the claim that the Specification does not describe.
`Though Petitioner’s proposed construction accurately expresses that the
`described client software generates a request for data from a server, the
`
`10
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`construction is incomplete because it does not identify where the client
`computer fits within the overall VPN claimed. Patent Owner’s construction,
`on the other hand, is consistent with the Specification’s description that the
`VPN extends from a user’s computer to a desired target site.6
`Accordingly, we adopt Patent Owner’s construction for “client
`computer” as “a user’s computer.”
`
`B. ANTICIPATION
`Kiuchi discloses systems and methods for facilitating “secure HTTP
`communication mechanisms within a closed group of institutions on the
`Internet, where each member is protected by its own firewall.” Ex. 1002, 64
`(Abstract). It terms its approach C-HTTP, indicating “a closed HTTP
`(Hypertext Transfer Protocol)-based network (C-HTTP).” Id.
`C-HTTP allows a conventional user agent (such as web browser
`software running on a user’s computer) to request a resource identified in a
`URL. Id. at 65 (§ 2.3). A client-side proxy intercepts all such resource
`requests made by a user agent. Id. (“A client-side proxy behaves as an
`HTTP/1.0 compatible proxy, and it should be specified as a proxy server for
`external (outside the firewall) access in each user agent within the
`
`
`6 Petitioner points to a progeny of the ’135 patent, US 9,386,000, reciting
`claims with a “client device” further restricted “wherein the client device is
`a user device.” See Pet. Remand Reply 3–4. Petitioner reasons that “client”
`cannot restrict a device (like the computer claimed here) to a user device
`because then the further restriction in the ’000 patent would be
`superfluous. Id. Under the circumstances here with two ordinary meanings
`at issue, we view the claim language of the ’000 patent as only marginally
`relevant to the construction of the challenged claims, and potentially
`superfluous language does not persuade us that our construction discussed
`above is erroneous.
`
`11
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`firewall.”). The “client-side proxy asks the C-HTTP name server whether it
`can communicate with the host specified in a given URL.” Id. “If the
`connection is permitted, the C-HTTP name server sends the IP address and
`public key of the server-side proxy” to the client-side proxy. Id. Once the
`client-side proxy receives that information, it “sends a request for connection
`to the server-side proxy.” Id. After verifying the client-side proxy’s
`information and access permission, the server-side proxy sends connection
`information to the client-side proxy, which in turn checks the connection
`information and establishes a secure connection. Id. at 65–66 (§ 2.3). In that
`connection, the client-side proxy encrypts requests from the user agent and
`forwards them to the server-side proxy, which in turn forwards them to “an
`origin server inside the firewall.” Id. at 66 (§ 2.3). Responses from the origin
`server are returned to the user agent, through the server-side proxy and
`client-side proxy, in turn. Id.
`Petitioner argues the Petition proposes two fundamental mappings of
`the claim language to Kiuchi’s disclosures. Pet. Remand Br. 11–13.
`
`1. Kiuchi anticipates claim 1 under Petitioner’s first mapping
`In Petitioner’s first mapping, Kiuchi’s user agent running on a
`computer acts as the claimed “client computer” to generate a DNS request
`using a domain name associated with an origin server, causing creation of a
`VPN between the user agent and the origin server that passes through the
`client-side proxy and server-side proxy. Id. at 11–12 (citing Pet. 26–27;
`Reply 8–11), 13–24. Petitioner illustrates this mapping using the following
`annotated version of a diagram appearing in the declaration of Dr. Guerin:
`
`12
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`
`
`Pet. Remand Br. 12 (annotating Ex. 1003 ¶ 24).
`a. Kiuchi discloses “direct” communication
`Patent Owner argues that Petitioner’s first mapping does not satisfy
`the claim language because Kiuchi does not disclose a direct connection
`between the user agent and origin server. PO Remand Br. 15–21. According
`to Patent Owner, Kiuchi discloses three separate links, one between each
`pair of devices in the chain from the user agent to the origin server depicted
`above. Id. at 15. That argument, however, conflates link with connection.
`The two are not the same. The disclaimer recognized by the Federal Circuit
`relates to “a system in which a client computer communicates with an
`intermediate server via a singular, point-to-point connection” wherein “[t]hat
`intermediate server then relays the data to a target computer on the same
`private network on which the server resides.” VirnetX, 778 F. App’x at 910.
`
`13
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`Interpreting the disclaimed scope as Patent Owner urges would
`contrast with the ’135 patent’s disclosure of multiple links between two
`TARP terminals as consistent with the claimed invention. See Ex. 1001,
`Fig. 2.7 Thus, simply using multiple links does not push a system outside the
`scope of the claims. Rather, we must consider the nature of the overall
`connection. Before the Office, Patent Owner described the claimed VPN as
`one “where data can be addressed to one or more different computers across
`the network, regardless of the location of the computer.” Ex. 2036, 5–6.
`Thus, the ability to address data to a particular computer is a key aspect of
`the claimed VPN. Id.; Ex. 1044, 50:25–51:5 (Patent Owner’s district-court
`expert stating that “direct communication refers to direct addressability”).8
`Kiuchi’s system is consistent with Patent Owner’s description of the
`claimed VPN. Kiuchi’s user agent generates a request that includes a
`resource address (in the form of a URL). See Ex. 1002 § 2.3 (“A client-side
`proxy behaves as an HTTP/1.0 compatible proxy, and it should be specified
`as a proxy server for external (outside the firewall) access in each user agent
`within the firewall.”); id. (“A client-side proxy asks the C-HTTP name
`server whether it can communicate with the host specified in a given
`URL.”). Indeed, Patent Owner’s expert, Dr. Monrose, testified that Kiuchi’s
`
`
`7 Patent Owner takes the position that the claimed VPN should be consistent
`with the described TARP routing. See, e.g., Tr. 37:24, 39:2–14, 40:5–15.
`8 With the same claim construction but a different factual record, the Federal
`Circuit held that substantial evidence supported a jury’s finding of no
`anticipation by Kiuchi. VirnetX, Inc. v. Cisco Systems, Inc., 767 F.3d 1308,
`1323–24 (Fed. Cir. 2014). That does not compel the same finding in this
`proceeding, where we reach a determination based on a preponderance of
`the evidence. Our unique factual record—including expert testimony—
`justifies our finding that Kiuchi does anticipate the claims.
`
`14
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`URL provided by the user agent is an address of the resource on an origin
`server. Ex. 1036, 240:21–241:14; see also Tr. 38:13–16 (stating that the
`URL is “the identifier to the resource that you want that sits on the origin
`server”). The client-side proxy intercepts the request and, using the C-HTTP
`name server, maps the request to the particular server-side proxy that can
`access the requested resource. Ex. 1002, 65 (§ 2.3) (“If the connection is
`permitted, the C-HTTP name server sends the IP address and public key of
`the server-side proxy . . . .”). The client-side proxy establishes a connection
`with the server-side proxy, which retrieves the resource from the appropriate
`origin server and returns it to the client-side proxy, which in turn returns the
`resource to the user agent. Id. at 66 (“Once the connection is established, a
`client-side proxy forwards HTTP/1.0 requests from the user agent in
`encrypted form using C-HTTP format. . . . Using HTTP/1.0, a server-side
`proxy communicates with an origin server inside the firewall. . . . The
`resulting HTTP/1.0 response is sent to the user agent.”).
`Thus, Kiuchi’s system, unlike the disclaimed scope, allows a client
`(the user agent) to connect to a remote server transparently and access
`resources with only the single URL identifying the remote resource.
`Kiuchi’s system operates like the ’135 patent’s TARP, which allows the
`system to route a packet as required to reach the destination address
`provided by the client computer. Ex. 1001, 3:5–31. Kiuchi’s user agent does
`not communicate with the client-side proxy using a singular, point-to-point
`connection because the user agent addresses the desired endpoint and the
`VPN provides the required message routing for the user agent to receive a
`response from the desired endpoint.
`
`15
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`Patent Owner asserts that Kiuchi discloses “a client computer
`communicating with an intermediary computer and a point-to-point . . .
`connection,” like the disclaimed system. Tr. 36:4–7. But Patent Owner
`provides no explanation of why Kiuchi’s connection is a point-to-point
`connection. Such a characterization belies Kiuchi’s disclosures, which state
`that, “[f]rom the view of the user agent or client-side proxy, all resources
`appear to be located in a server side proxy on the firewall” and further that
`“the server-side proxy forwards requests to the origin server.” Ex. 1002, 66
`(§ 2.3). Further, Patent Owner contends that Kiuchi’s connection stops at the
`proxies because “the communication is only configured to reach . . . the
`intermediary server.” Tr. 63:18–20. Similarly, Patent Owner contends that
`Kiuchi’s URL is “not to get the communication to the origin server.” Id.
`at 63:22–26. That argument is not consistent with Patent Owner’s
`acknowledgement that the URL is “the identifier to the resource that you
`want that sits on the origin server.” Tr. 38:13–16; accord Ex. 1036, 240:21–
`241:14. We find Kiuchi does not disclose that “a client computer
`communicates with an intermediate server via a singular, point-to-point
`connection” as was disclaimed.
`Patent Owner argues that Kiuchi’s URL, while identifying the desired
`resource on the origin server, is not an address because “it’s not the ultimate,
`the IP address that you're actually going to use to get to the target
`computer.” Tr. 38:13–25. But Patent Owner does not contend that the claims
`require such an IP address. Id. at 38:26–39:2. Rather, Patent Owner contends
`that Kiuchi does not disclose direct communication because its user agent
`does not provide the server-side proxy’s address. Tr. 39:6–12 (“[T]he client-
`side proxy doesn’t send that [the server-side proxy’s IP address] back to the
`
`16
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`client and then the client sets up a direct communication with the server-side
`proxy or anything like that . . . .”). The claims, however, do not require that
`the client computer must provide the address of the target computer. Rather,
`they require only that the client computer generates a request for “an IP
`address corresponding to a domain name associated with the target
`computer.” Nor does Patent Owner’s distinction explain why Kiuchi’s
`communication is meaningfully less direct than that described in the ’135
`patent.
`Patent Owner argues that Kiuchi discloses modifying messages
`between an origin server and user agent and thus does not disclose direct
`communication. PO Resp. 31. But, as Petitioner points out (Reply 16;
`Remand Br. 16), Kiuchi teaches modifying content only for HTML objects,
`not for image and sound objects. Ex. 1002, 66–67; Ex. 1036, 229:22–230:12
`(Patent Owner’s declarant agreeing). Thus, Kiuchi’s disclosures of at least
`those types of resources maintain the requirement for direct communication.
`Indeed, although Kiuchi’s requests and responses are wrapped and encrypted
`over the proxy-to-proxy link, the user agent and origin server communicate
`using standard HTTP requests and responses. Ex. 1002, 66 (§ 2.3); see Pet.
`Remand Br. 21–22; Tr. 13:7–18; see also Ex. 1001, 13:33–39 (describing
`that an encrypted TARP packet is wrapped with an IP header for
`transmission over an intermediate link). Despite repeated questioning on
`Patent Owner’s distinction from Kiuchi, Patent Owner could not articulate a
`clear line between direct versus indirect communication. See Tr. 45:12–
`47:17, 49:13–50:14, 52:14–54:4. Patent Owner argues that Kiuchi does not
`use the URL sent by the user agent to get to the desired endpoint (see id. at
`42:14–43:1), but that is not consistent with Kiuchi’s disclosures as described
`
`17
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`above. Patent Owner contends also that “direct” must be whatever the
`’135 patent’s Specification describes (see id. at 53:16–22), but that sidesteps
`the question. Patent Owner has not adequately distinguished what was
`disclaimed from what the Specification describes. That is particularly
`important where Kiuchi shares many characteristics with the disclosed
`TARP system. As discussed above, we find that Kiuchi’s system does not
`use a singular, point-to-point connection as was disclaimed.
`Based on the totality of evidence in the record, we have evaluated the
`parties’ evidence and argument, and we find by a preponderance of evidence
`that Kiuchi discloses direct communication that satisfies the claimed VPN.
`b. Kiuchi discloses the additional limitations of claim 1
`Other than whether Kiuchi discloses a direct connection, on remand
`Patent Owner does not dispute Petitioner’s assertions for the first mapping.
`See PO Remand Br. 15–21. In the Original Decision, we found that Kiuchi
`discloses the remaining claim elements. Original Decision 5–10. Without
`any reason to reach a contrary conclusion, we maintain those findings.
`Kiuchi discloses all other elements of claim 1. The claimed client
`computer reads on Kiuchi’s user agent. See id. at 9–10. The claimed
`generating and determining steps of claim 1, relating to a DNS request, read
`on Kiuchi’s request from a user agent for a resource, which is sent by the
`client-side proxy to the C-HTTP name server and resolved to the IP address
`of a server-side proxy if directed at a resource on an origin server. See id.
`at 5–8. The claimed target computer reads on Kiuchi’s origin server. See id.
`at 8–9.
`
`18
`
`

`

`IPR2015-01046
`Patent 6,502,135 B1
`
`
`2. Kiuchi does not anticipate claim 1 under Petitioner’s second mapping
`In Petitioner’s second asserted mapping, Kiuchi’s client-side proxy
`acts as the claimed “client computer” to create a VPN between the client-
`side proxy and server-side proxy. Id. at 12–13 (citing Pet. 26–27; Reply 8–
`11), 24–30. As part of that process, Petitioner asserts, the client-side proxy
`“generates a request” to the C-HTTP name server to request the IP address
`corresponding to a hostname associated with the server-side proxy. Id. at 25
`(citing Pet. 26–27; Ex. 1002, 65).
`Our construction for “client computer” forecloses that language
`reading on Kiuchi’s client-side proxy. Quite simply, the client-side proxy is
`not a user’s computer. Rather, it is a computer configured to manage the
`connection between a user’s computer and nonlocal networks. Ex. 1002, 65
`(§ 2.3) (“A client-side proxy behaves as an HTTP/1.0 compatible proxy, and
`it should be specified as a proxy server for external (outside the firewall)
`access in each user agent within the firewall.”).
`Petitioner argues that the client-side proxy is a “user’s computer” and
`thus a “client computer” under Patent Owner’s construction. Pet. Remand
`Br. 29–30. That argument is not persuasive. Petitioner argues that the client-
`side proxy has administrative users. Id. (citing Ex. 1002, 64–65). We agree
`with Patent Owner that Kiuchi does not describe that such users perform the
`claimed VPN method, and thus, administrative users do not show the client-
`side proxy is a client computer as claimed. See PO Remand Br. 22–23.
`Petitioner suggests additionally that Kiuchi’s disclosures encompass a
`“single-user institution, where every computer, including the client-side
`proxy, is that ‘user’s computer.’” See Pet. Remand Br. 30 (citing Ex. 1002,
`64–65, 69). We do not understand the term “user’s computer,”

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket