`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`CITRIX SYSTEMS, INC.,
`
`Plaintiff,
`
`v.
`
`AVI NETWORKS, INC.,
`
`Defendant.
`
`C.A. No. 17-1843-LPS
`
`JURY TRIAL DEMANDED
`
`CITRIX’S OPENING CLAIM CONSTRUCTION BRIEF
`
`Douglas E. McCann (#3852)
`Robert M. Oakes (#5217)
`FISH & RICHARDSON P.C.
`222 Delaware Avenue, 17th Floor,
`P.O. Box 1114
`Wilmington, DE 19801
`Telephone: (302) 652-5070
`dmccann@fr.com; oakes@fr.com
`
`Ruffin B. Cordell
`Indranil Mukerji
`Laura C. Whitworth
`FISH & RICHARDSON P.C.
`1000 Maine Avenue SW, Suite 1000
`Washington, D.C. 20024
`Telephone: (202) 783-5070
`cordell@fr.com; mukerji@fr.com;
`whitworth@fr.com
`
`Adam J. Kessel
`FISH & RICHARDSON P.C.
`One Marina Park Drive
`Boston, MA 02210-1878
`Telephone: 617-542-5070
`kessel@fr.com
`
`Dated: March 28, 2019
`
`Katherine Reardon
`FISH & RICHARDSON P.C.
`601 Lexington Avenue, 52nd Floor
`New York, NY 10022-4611
`Telephone: 212-765-5070
`reardon@fr.com
`
`John-Paul Fryckman
`FISH & RICHARDSON P.C.
`12390 El Camino Real
`San Diego, CA 92130
`Telephone: 858-678-5070
`fryckman@fr.com
`
`Benjamin K. Thompson
`FISH & RICHARDSON P.C.
`1180 Peachtree Street NE
`21st Floor
`Atlanta, GA 30309
`Telephone: (404) 892-5005
`BThompson@fr.com
`
`ATTORNEYS FOR PLAINTIFF
`CITRIX SYSTEMS, INC
`
`1
`
`CITRIX 2006
`Avi Networks v. Citrix Systems
`IPR2019-00844
`IPR2019-00845
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 2 of 25 PageID #: 2372
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`
`
`
`
`
`
`
`
`
`INTRODUCTION .............................................................................................................. 1
`
`TECHNOLOGY BACKGROUND .................................................................................... 1
`
`SUMMARY OF THE PATENTS ...................................................................................... 5
`
`LEGAL STANDARDS FOR CLAIM CONSTRUCTION ................................................ 7
`
`CLAIM CONSTRUCTION ................................................................................................ 9
`
`A. “request” ............................................................................................................................. 9
`
`B. “response” ......................................................................................................................... 14
`
`C. “transport layer connection” ............................................................................................. 16
`
`
`
`CONCLUSION ................................................................................................................. 20
`
`
`
`
`
`i
`
`2
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 3 of 25 PageID #: 2373
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`Abbott Labs. v. Dey L.P.,
`287 F.3d 1097 (Fed. Cir. 2002)................................................................................................11
`
`ActiveVideo Networks, Inc. v. Verizon Comm’n, Inc.,
`694 F.3d 1312 (Fed. Cir. 2012)......................................................................................9, 10, 17
`
`Amgen, Inc. v. Ariad Pharms., Inc.,
`577 F. Supp. 2d 724 (D. Del. 2008) .........................................................................................18
`
`Baldwin Graphic Sys., Inc. v. Siebert, Inc.,
`512 F.3d 1338 (Fed. Cir. 2008)................................................................................................13
`
`Dealertrack, Inc. v. Huber,
`674 F.3d 1315 (Fed. Cir. 2012)..................................................................................................8
`
`Goldenberg v. Cytogen, Inc.,
`373 F.3d 1158 (Fed. Cir. 2004)................................................................................................11
`
`Interactive Gift Express, Inc. v. Compuserve Inc.,
`256 F.3d 1323 (Fed. Cir. 2001)..................................................................................................8
`
`KCJ Corp. v. Kinetic Concepts, Inc.,
`223 F.3d 1351 (Fed. Cir. 2002)................................................................................................13
`
`Mallinckrodt IP Unlimited Co. v. B. Braun Medical Inc.,
`No. 17-365-LPS, No. 17-660-LPS, 2018 WL 2684105 (D. Del. June 5, 2018) ......................13
`
`O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co., Ltd.,
`521 F.3d 1351 (Fed. Cir. 2008)..................................................................................................9
`
`Omega Eng’g, Inc., v. Raytek Corp.,
`334 F.3d 1314 (Fed. Cir. 2003)..........................................................................................12, 18
`
`On-Line Techs. v. Bodenseewerk Perkin-Elmer GmBH,
`386 F.3d 1133 (Fed. Cir. 2004)..........................................................................................13, 19
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ....................................................................... passim
`
`Smith Int’l, Inc. v. Baker Hughes Inc.,
`No. 16-0056, 2018 WL 3381299 (D. Del. July 11, 2018) .......................................................13
`
`ii
`
`3
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 4 of 25 PageID #: 2374
`
`Sorensen v. Int’l Trade Comm’n,
`427 F.3d 1375 (Fed. Cir. 2005)..................................................................................................9
`
`SRI Int’l, Inc. v. Cisco Sys., Inc.,
`No. 2017-2223, slip op. (Fed. Cir. March 20, 2019) ...............................................................12
`
`Teleflex, Inc. v. Ficosa N. Am. Corp.,
`299 F.3d 1313 (Fed. Cir. 2002)................................................................................................12
`
`Thorner v. Sony Computer Entertainment Am., LLC,
`669 F.3d 1362 (Fed. Cir. 2012)..................................................................................................8
`
`Transcenic, Inc. v. Google Inc.,
`7 F. Supp. 3d 405 (D. Del. 2013) .............................................................................................13
`
`Vitronics Corp. v. Conceptronic, Inc.,
`90 F.3d 1576 (Fed. Cir. 1996)....................................................................................................8
`
`Other Authorities
`
`37 CFR § 42.100(b) .......................................................................................................................20
`
`
`
`iii
`
`4
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 5 of 25 PageID #: 2375
`
`
`
`INTRODUCTION
`
`Plaintiff Citrix Systems, Inc. (“Citrix”) is a pioneer in the networking technology that
`
`enables the modern Internet. Citrix has sought and obtained thousands of patents globally for its
`
`inventions in this space. Defendant Avi Networks, Inc. (“Avi”) recently entered the market, and
`
`competes directly with Citrix. In addition to claims for false advertising, unfair competition, and
`
`deceptive trade practices, Citrix accuses Avi of infringing U.S. 9,148,493 (“the ’493 patent”) and
`
`8,631,120 (“the ’120 patent”) (collectively, the “Asserted Patents”) which relate to network
`
`connection reuse and share a common specification. The three claim terms at issue—“request,”
`
`“response,” and “transport layer connection”—do not require construction, as the plain and
`
`ordinary meaning is sufficient. Indeed, Avi does not argue that any of these terms would not be
`
`readily understood by one of skill in the art. Instead, Avi seeks to graft on extraneous limitations
`
`purportedly based on an undifferentiated list of every substantive office action response in the
`
`file histories of these two patents and others. But Avi’s proposed constructions depart from the
`
`cardinal rules of claim construction: they are not, in fact, supported by the file histories; they
`
`would read out preferred embodiments; and they advance meanings that are inconsistent with the
`
`technical facts. The Court should thus reject Avi’s results-driven positions.
`
`
`
`TECHNOLOGY BACKGROUND
`
`Servers on the Internet store information accessible by clients. Generally, a client sends a
`
`request for data to a server, such as a web server, and the server responds with the requested
`
`data. Information can be organized, for example, as webpages and exchanged using Hypertext
`
`Transfer Protocol (HTTP), a standard that specifies how requests for data (e.g., webpages), and
`
`1
`
`
`5
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 6 of 25 PageID #: 2376
`
`responses to those requests are formatted.1 Jones Decl. ¶29.
`
`Users typically access data on a webpage using a browser by specifying the uniform
`
`resource locator (URL) of a desired page. See, e.g., ’493 at 1:42-44. For example, a user may
`
`want to browse data at “https://www.supremecourt.gov,” which is the public URL for the United
`
`States Supreme Court website. Once the user specifies a URL, a client (e.g., the web browser)
`
`transmits an HTTP request message (e.g., a “GET request”) indicating the desired URL to the
`
`web server, and the server transmits back a response message containing a copy of data at the
`
`corresponding webpage. See, e.g., id. at 1:47-54. See also id. at FIG. 7, 7:54-55 (“GET request
`
`from client C1 specifying a path name of /sales/forecast.html”), and 7:61 (“Server S responds
`
`with the requested web page”).
`
`HTTP messages, in general, contain a header, and may also contain a payload. In the
`
`simple but common example discussed above, the HTTP request message utilizes a “GET
`
`method” by including the term (called a “token” in the HTTP standard) “GET” in the “header”
`
`portion of the message. Jones Decl. ¶30. The GET method request message in this example does
`
`not have a “payload,” however, because it is only requesting data from the server. Id. If the GET
`
`method request succeeds (i.e., the requested data resource is located), the HTTP response
`
`message will typically have both a header and a payload, where the payload includes the
`
`requested data (i.e., data at the requested webpage). Id.
`
`Many protocols other than HTTP are also often used to access data on the Internet, such
`
`as File Transfer Protocol (“FTP”) and the suite of protocols that enable email. See, e.g., ’493 at
`
`5:35-37. For example, FTP is a protocol used to transfer files. Unlike HTTP, the messages that
`
`
`1 The disclosed inventions and asserted claims cover protocols other than HTTP, each of which
`presents technical distinctions. Citrix focuses on HTTP to explain the background and inventions
`since web browsing will be familiar to the Court and is adequate to illustrate relevant principles.
`
`2
`
`6
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 7 of 25 PageID #: 2377
`
`constitute FTP requests and responses have neither a “header” nor a “payload.” Jones Decl. ¶42.
`
`Computer networking has long utilized a conceptual framework known as a “layered”
`
`model to characterize the communication functions of a network without regard to its underlying
`
`internal structure and technology. One common example is the Open Systems Interconnection
`
`model (typically referred to as the “OSI model”).2 Jones Decl. ¶¶ 32-40. This and similar models
`
`enabled various communication systems to interoperate based on standardized protocols, such as
`
`on the Internet.
`
`The OSI model partitions a communication system into seven “layers” (as shown below)
`
`each handling different aspects of communications, arranged in a vertical stack.
`
`L7
`
`L6
`
`L5
`
`L4
`
`L3
`
`L2
`
`L1
`
`Application Layer
`
`Presentation Layer
`
`Session Layer
`
`Transport Layer
`
`Network Layer
`
`Data Layer
`
`Physical Layer
`
`
`
`Jones Decl. ¶¶ 32-40. Each layer serves the layer above it and is served by the layer below it. For
`
`example, a layer that provides communications across a network provides the path needed by an
`
`application above it, while it calls the next lower layer to send and receive packets that include
`
`the contents sent over that path.
`
`While it is not necessary for present purposes to discuss all seven layers, the application
`
`and transport layers are relevant background to the instant dispute. Id. The application layer,
`
`depicted at the top of the stack, is closest (i.e., most directly exposed) to an end user.
`
`
`2 Another common model called the Internet Protocol suite uses four layers.
`
`3
`
`7
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 8 of 25 PageID #: 2378
`
`Applications, such as a web browser, Skype (for telephony), or Outlook (for email) directly
`
`interact with the end user at the application layer. Id. ¶¶37, 42. HTTP and its secure version
`
`called HTTPS, both of which are used by web browsers, are examples of protocols operating at
`
`an application layer to provide functionality that is directly accessible to an end user. Id. ¶¶32-
`
`40. FTP and email also rely on protocols implemented at the application layer. Id. ¶42.
`
`The transport layer, by contrast, is lower in the stack (and thus further from end-user
`
`application interaction) and provides device-to-device communication services for applications.
`
`Id. ¶¶32-40. The capabilities provided by this layer can include, e.g., connection-oriented
`
`communication, reliability, flow control, and multiplexing. Id. The network layer, which works
`
`closely with the transport layer in common network implementations, provides the means to
`
`address various end-points on a network such as clients and servers. Id.
`
`An application-layer protocol such as HTTP relies upon at least one protocol in a layer
`
`below it in a network protocol stack to actually cause application messages to be transmitted
`
`between devices. Id. ¶¶32-40. For example, HTTP messages are usually transmitted over a
`
`TCP/IP connection, where the transmission control protocol (“TCP”) operates at a transport
`
`layer, and the Internet Protocol (“IP”) operates at a network layer. Id.; see also ’493 at 5:35-37
`
`(“The TCP/IP protocol suite supports many applications, such as Telnet, [FTP], e-mail, and
`
`HTTP”). HTTP relies on TCP, at the transport layer, to establish an ongoing connection between
`
`devices. Jones Decl. ¶¶ 38-42.
`
`Often, a transport layer connection is established between a client and server for the
`
`exchange of webpage data. In some web deployment scenarios at issue here, an intermediary
`
`device is arranged between one or more clients and servers and acts to, inter alia, direct requests
`
`and responses to their appropriate destinations. In such scenarios, a client-side TCP connection is
`
`4
`
`8
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 9 of 25 PageID #: 2379
`
`established between a client and an intermediary device, and a server-side TCP connection is
`
`established between the intermediary device and a server. E.g., ’493 at FIG. 2.
`
`A client’s HTTP request message and a server’s HTTP corresponding response message
`
`at the application layer do not flow immediately due to overhead associated with lower layers,
`
`such as the TCP transport layer. For example, establishing a TCP connection requires the
`
`sequential exchange of three network packets between devices to establish the connection, and
`
`the subsequent closing of the connection requires the exchange of up to four sequential network
`
`packets. See, e.g., ’493 at 2:7-18; see also Jones Decl. ¶41.
`
`As described below, the claimed inventions enable a transport layer connection, such as
`
`that utilizing TCP, between an intermediary and a server to be reused to service multiple requests
`
`from different clients, and thus avoid the time and processing overhead of setting up and taking
`
`down that connection multiple times. See, e.g., ’493 at 1:23-28, 2:1-50, and 3:63-4:10. These
`
`improvements, commercialized in Citrix’s NetScaler product line, have enabled thousands of
`
`customers worldwide to upgrade their application performance and reliability and operate at a
`
`scale necessary to service the modern Internet.
`
`
`
`SUMMARY OF THE PATENTS
`
`The ’493 and ’120 patents are both entitled “Apparatus, method and computer program
`
`product for efficiently pooling connections between clients and servers.” Both claim priority to
`
`an application filed on Oct. 18, 2000, and issued as U.S. Patent 7,801,978 (“the ’978 patent”).
`
`The ’493 and ’120 patents, as well as the ’978 patent, share a common specification, and as such,
`
`the ’493 patent is used herewith for citation purposes. These patents disclose technology related
`
`to client-server applications such as HTTP applications where the efficient reuse of transport
`
`layer connections between an intermediary device and one or more backend servers is important
`
`in the handling of client requests and server responses. See, e.g., ’493 at 1:23-28, FIG. 2, 4:5-10;
`
`5
`
`9
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 10 of 25 PageID #: 2380
`
`see also Jones Decl. ¶43.
`
`These patents describe a problem particular to servers in computer networks where
`
`efficient utilization of computer and network resources are key technical concerns. See, e.g., ’493
`
`at 1:23-28, 2:1-50. These concerns arise, for example, when client devices, such as personal
`
`computers or smartphones, request content from a website hosted by a webserver. To
`
`accommodate numerous clients requesting content from the same server in a short period of
`
`time, a system administrator may configure a server farm where each server therein is capable of
`
`handling the same content requests. See, e.g., ’493 at FIG. 2, 3:63-4:10. Incoming requests are
`
`then distributed among the farm’s servers. Id. An intermediary device, also called a front-end
`
`server or interface unit, is placed between the client devices and the server farm, and manages a
`
`pool of one or more server-side connections with respective servers. Id. The intermediary device
`
`is responsible for distributing requests efficiently and making sure the responses are relayed back
`
`to the correct client.
`
`As noted above, connections between client devices and web servers are established
`
`using a transport layer connection, such as that utilizing TCP, which requires the overhead of
`
`exchanging initializing network packets and local computing resources, such as processor time
`
`and memory, to properly monitor and maintain the connection. See, e.g., ’493 at 2:1-50. Since
`
`the front-end server acts as a go-between, the front-end server must commit resources to
`
`maintain transport layer connections with clients as well as with the farm’s servers.
`
`One source of increased efficiency is reusing the server-side connections to handle more
`
`requests. Reusing an established connection avoids having to exchange the initial packets to
`
`setup that connection. The inventors recognized that one key technical question for the
`
`intermediary device is to determine when a server-side connection may be reused. One method
`
`6
`
`10
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 11 of 25 PageID #: 2381
`
`to make that determination is for the client to properly close its connection, which signals to the
`
`intermediary that the client has received its requested data. However, there is a delay after the
`
`client receives the last of its data before it closes the connection. In some cases, the delay is due
`
`to “think time” where a web browser holds open a connection to handle other requests, e.g., if a
`
`browser receives a web page, and then, after several seconds of a user reviewing, the user “clicks
`
`on” a link contained in that web page that corresponds to resource data on the same webserver.
`
`See, e.g., ’493 at 1:23-28 and 6:4-12. In other cases, the delay is due to the intermediary device
`
`waiting to receive a close command from the client notwithstanding the client doing so
`
`immediately after receiving webpage data. E.g., id. at 12:18-32. The specifications disclose that
`
`such delay unnecessarily ties up a server-side connection. E.g., id. at 1:23-28, 4:67-5:2.
`
`The inventors recognized that the intermediary device does not necessarily need to wait
`
`for a close command from the client to know that the server is finished sending a response.
`
`Information contained in the server’s response, such as a content-length parameter or a chunked
`
`transfer encoding header, can be examined to detect server response message completion faster
`
`than waiting for a close command from either the client or the server. The invention allows for
`
`faster reuse of the connection between the intermediary device and the server to service other
`
`client requests. See, e.g., id. at 6:3-12, 12:25-32. Further, this improved method reduces the need
`
`to maintain more simultaneous server-side connections and more hardware or computing
`
`resources at higher cost to support those connections.
`
`
`
`LEGAL STANDARDS FOR CLAIM CONSTRUCTION
`
`Claim construction must focus on the claim language itself because it is a “bedrock
`
`principle” that “the claims of a patent define the invention to which the patentee is entitled the
`
`right to exclude.” Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc). Claim
`
`terms “are generally given their ordinary and customary meaning” as understood by the skilled
`
`7
`
`11
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 12 of 25 PageID #: 2382
`
`artisan at the time of the invention in the context of the specification. Id. “There are only two
`
`exceptions to this general rule: 1) when a patentee sets out a definition and acts as his own
`
`lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the
`
`specification or during prosecution.” Thorner v. Sony Computer Entertainment Am., LLC, 669
`
`F.3d 1362, 1365 (Fed. Cir. 2012). Where “the claim language is clear on its face, then [the]
`
`consideration of the rest of the intrinsic evidence is restricted to determining if a deviation from
`
`the clear language of the claims is specified.” Interactive Gift Express, Inc. v. Compuserve Inc.,
`
`256 F.3d 1323, 1331 (Fed. Cir. 2001).
`
`Claim construction begins with the intrinsic evidence—namely, the claim language, the
`
`specification, and the prosecution history. Phillips, 415 F.3d at 1312-17. The claims provide
`
`important guidance both through “the context in which a term is used” and “differences among
`
`claims.” Id. at 1314-15. The specification is “always highly relevant,” id. at 1315, and “may
`
`reveal a special definition given to a claim term by the patentee that differs from the meaning it
`
`would otherwise possess.” Id. at 1317. While it is improper to import limitations from a preferred
`
`embodiment described in the specification into the claim, it is equally improper to define a term
`
`that would exclude a preferred embodiment from the scope of the invention. Compare
`
`Dealertrack, Inc. v. Huber, 674 F.3d 1315, 1327 (Fed. Cir. 2012) (rejecting a construction that
`
`narrowed the claim scope to the preferred embodiment) with Vitronics Corp. v. Conceptronic,
`
`Inc., 90 F.3d 1576, 1583-84 (Fed. Cir. 1996) (rejecting a construction that would exclude a
`
`preferred embodiment finding that “[s]uch an interpretation is rarely, if ever, correct and would
`
`require highly persuasive evidentiary support.”). Likewise, the prosecution history may shed
`
`light on what a term means, but “it often lacks the clarity of the specification and thus is less
`
`useful for claim construction purposes,” id., and it will not limit claim scope unless it contains a
`
`8
`
`12
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 13 of 25 PageID #: 2383
`
`“clear and unmistakable” disclaimer. Sorensen v. Int’l Trade Comm’n, 427 F.3d 1375, 1378-79
`
`(Fed. Cir. 2005).
`
`The “construction that stays true to the claim language and most naturally aligns with the
`
`patent’s description of the invention will be, in the end, the correct construction.” Phillips, 415
`
`F.3d at 1316. And, “in some cases,” like this one, “the ordinary meaning of claim language as
`
`understood by a person of skill in the art may be readily apparent even to lay judges, and claim
`
`construction in such cases involves little more than the application of the widely accepted
`
`meaning of commonly understood words.” Id.
`
`It is sometimes unnecessary to construe claim language at all. See, e.g., O2 Micro Int’l
`
`Ltd. v. Beyond Innovation Tech. Co., Ltd., 521 F.3d 1351, 1362 (Fed. Cir. 2008) (“[D]istrict
`
`courts are not (and should not be) required to construe every limitation present in a patent’s
`
`asserted claims.”). One way to appropriately resolve a dispute is to give the term its plain
`
`meaning and reject a narrower alternative proposed by a party. See, e.g., ActiveVideo Networks,
`
`Inc. v. Verizon Comm’n, Inc., 694 F.3d 1312, 1326 (Fed. Cir. 2012) (affirming “plain meaning”
`
`construction which rejected construction that “erroneously reads limitations into the claims”).
`
`
`
`CLAIM CONSTRUCTION
`A.
`
` “request”
`
`Term
`“request”
`
`
`’493: 1, 5, 7, 8, 9, 13,
`15, 16, 17, 18, 19, 20;
`’120: 1, 2, 4, 5, 6, 7, 8,
`9, 10, 12, 13, 14, 15, 16,
`17
`
`Citrix’s Construction
`Plain and ordinary meaning. To the
`extent the Court finds construction
`helpful to assist the factfinder in
`applying the claim, the term’s
`plain and ordinary meaning is “a
`message for retrieving data”
`
`Avi’s Construction
`“Application layer message
`requesting data from a server
`and consisting of a header
`and payload”
`
`No construction of this term is necessary. The phrase “request” is easily understood by
`
`those of ordinary skill in the art, particularly given the clarity of the claim language and the
`
`9
`
`13
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 14 of 25 PageID #: 2384
`
`corresponding description in the specification. Jones Decl. ¶¶47-50. Tellingly, in its recent inter
`
`partes review (IPR) petition filings against the ’493 and ’120 patents, Avi did not contend this
`
`term needed any construction. See Avi’s ’493 and ’120 IPR Petitions at 7, which are attached as
`
`Exhibits J and K in the Jones Decl.
`
`The specification supports the plain and ordinary meaning, describing an exchange of
`
`messages that includes a “request” and a “response.” See, e.g., ’493 at 2:7-18, 10:1-11:38, FIG.
`
`8, 12:49-14:41, FIG. 10, 7:45-8:21, FIG. 7. A client sends a request to retrieve data. Id. at 2:9-10
`
`(“client sends a URL (page) request”), 8:25-26 (“the client has retrieved all requested data”). As
`
`one example, a client sends a request to retrieve sales forecast data from a website. Id. at 7:54-55
`
`(“GET request from client C1 specifying a path name of /sales/forecast.html”). Because the
`
`term’s meaning is plain, no further clarification is necessary. See ActiveVideo, 694 F.3d at 1326;
`
`Phillips, 415 F.3d at 1314. Alternatively, “a message for retrieving data” is wholly consistent
`
`with the plain and ordinary meaning of this term, to the extent the Court finds that a construction
`
`would be useful to guide a factfinder.
`
`Avi’s proposed construction should be rejected for several reasons. While both parties
`
`agree that a “request” is a message for retrieving or requesting3 data, Avi seeks to further impose
`
`unnecessary and incorrect technical limitations on the construction of this term, without support
`
`from the claim language or specifications of the ’493 and ’120 patents. Avi’s construction, for
`
`example, requires that the message must be an “application layer message.” The claim language
`
`does not limit the request to a particular type of message (e.g., application layer). Nothing in the
`
`specifications limits the claimed “request” to a particular type of message. Moreover, this
`
`
`3 Citrix is not aware of any meaningful difference between “retrieve” or “request” in this context,
`but suggests “retrieving” in its proposed alternate construction to avoid any concern of
`circularity that would arise from using the word “request” in the construction of “request.”
`
`10
`
`14
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 15 of 25 PageID #: 2385
`
`additional requirement does not appear to be material to any infringement or validity dispute, but
`
`in any case is unnecessary, redundant, and potentially confusing to the jury because the claims
`
`separately refer to “application data.” For example, claim 1 of the ’120 patent recites
`
`“determining… via a content length parameter identified in application data of a first response
`
`that a last byte of the application data has been transmitted from the server and the server has
`
`completed communicating the first response to the first request over the second transport layer
`
`connection.”
`
`In the Joint Claim Chart, Avi identifies, among other things, the file histories of the two
`
`Asserted Patents to support its construction, citing a laundry list of every substantive office
`
`action response, interview summary, and notice of allowance, in the file histories as purported
`
`support for all three of its proposed constructions. See D.I. 98. Moreover, Avi identifies the file
`
`histories of the ’978 patent (a related Citrix patent corresponding to the priority patent
`
`application for the Asserted Patents), and U.S. Patent 6,411,986 (an unrelated Citrix patent, the
`
`specification of which is incorporated by reference in the Asserted Patents) (the “’986 patent”),
`
`in addition to the file histories of the two Asserted Patents, to support its construction—again
`
`citing a laundry list of every substantive paper. 4 See Id. at 2.
`
`Avi’s laundry list of file history items provided in the Joint Claim Chart fails to explain
`
`why or how it intends to import limitations into this term. While it would be impractical in view
`
`of page constraints to walk through each of the 19 or more prosecution items to prove the
`
`
`4 Avi’s reliance on the ’986 file history is also misplaced because the ’986 patent is unrelated to
`the ’493 and ’120 patents and does not support any priority claim from the Asserted Patents. See
`Goldenberg v. Cytogen, Inc., 373 F.3d 1158, 1167-68 (Fed. Cir. 2004) (finding statements in
`another patent or its prosecution history irrelevant to claim construction “[a]bsent a formal
`relationship or incorporation during prosecution” of the patent at issue); cf. Abbott Labs. v. Dey
`L.P., 287 F.3d 1097, 1104-05 (Fed. Cir. 2002) (finding arguments made during prosecution of a
`commonly-owned but unrelated patent did not create prosecution history estoppel).
`
`11
`
`15
`
`
`
`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 16 of 25 PageID #: 2386
`
`negative—i.e., that there was no disavowal or disclaimer—at a high level, the applicants
`
`consistently argued that their invention distinguished over the prior art based on its improved
`
`method of determining that a transport layer connection is available for reuse, specifically based
`
`on the application data transmitted over that connection. Nothing in those arguments constituted
`
`an admission that the applicants intended to re-define the claim terms, and none of these file
`
`histories provide any disclaimer or claim scope disavowal that would support Avi’s proposed
`
`limitations. Jones Decl. ¶49.
`
`In particular, none of the evidence Avi points out arises to the standard of clear disavowal
`
`to overturn the “heavy presumption that claim terms carry their full ordinary and customary
`
`meaning.” Omega Eng’g, Inc., v. Raytek Corp., 334 F.3d 1314, 1323-25 (Fed. Cir. 2003) (“For a
`
`prosecution disclaimer to attach, the alleged disavowing statements [must] be both so clear as to
`
`show reasonable clarity and deliberateness, and so unmistakable as to be unambiguous evidence
`
`of disclaimer.”) (internal citations omitted); see also SRI Int’l, Inc. v. Cisco Sys., Inc., No. 2017-
`
`2223, slip op. at 12-13 (Fed. Cir. March 20, 2019) (rejecting argument that patentee had
`
`disclaimed claim scope finding that “[t]o invoke argument-based estoppel, the prosecution
`
`history must evince a clear and unmistakable surrender.”) (internal citations omitted); Teleflex,
`
`Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1325-26 (Fed. Cir. 2002) (requiring a patentee to
`
`unequivocally impart a novel meaning to terms or expressly relinquished claim scope during
`
`prosecution for claim scope disavowal to apply). Indeed, Citrix can identify no material in the
`
`plethora of cited documents that purports to define or limit the “request” term at all.
`
`Avi’s construction also improperly requires that the message must “consist[] of a header
`