throbber
Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 1 of 25 PageID #: 2371
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`CITRIX SYSTEMS, INC.,
`
`Plaintiff,
`
`v.
`
`AVI NETWORKS, INC.,
`
`Defendant.
`
`C.A. No. 17-1843-LPS
`
`JURY TRIAL DEMANDED
`
`CITRIX’S OPENING CLAIM CONSTRUCTION BRIEF
`
`Douglas E. McCann (#3852)
`Robert M. Oakes (#5217)
`FISH & RICHARDSON P.C.
`222 Delaware Avenue, 17th Floor,
`P.O. Box 1114
`Wilmington, DE 19801
`Telephone: (302) 652-5070
`dmccann@fr.com; oakes@fr.com
`
`Ruffin B. Cordell
`Indranil Mukerji
`Laura C. Whitworth
`FISH & RICHARDSON P.C.
`1000 Maine Avenue SW, Suite 1000
`Washington, D.C. 20024
`Telephone: (202) 783-5070
`cordell@fr.com; mukerji@fr.com;
`whitworth@fr.com
`
`Adam J. Kessel
`FISH & RICHARDSON P.C.
`One Marina Park Drive
`Boston, MA 02210-1878
`Telephone: 617-542-5070
`kessel@fr.com
`
`Dated: March 28, 2019
`
`Katherine Reardon
`FISH & RICHARDSON P.C.
`601 Lexington Avenue, 52nd Floor
`New York, NY 10022-4611
`Telephone: 212-765-5070
`reardon@fr.com
`
`John-Paul Fryckman
`FISH & RICHARDSON P.C.
`12390 El Camino Real
`San Diego, CA 92130
`Telephone: 858-678-5070
`fryckman@fr.com
`
`Benjamin K. Thompson
`FISH & RICHARDSON P.C.
`1180 Peachtree Street NE
`21st Floor
`Atlanta, GA 30309
`Telephone: (404) 892-5005
`BThompson@fr.com
`
`ATTORNEYS FOR PLAINTIFF
`CITRIX SYSTEMS, INC
`
`1
`
`CITRIX 2006
`Avi Networks v. Citrix Systems
`IPR2019-00844
`IPR2019-00845
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 2 of 25 PageID #: 2372
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`
`
`
`
`
`
`
`
`
`INTRODUCTION .............................................................................................................. 1
`
`TECHNOLOGY BACKGROUND .................................................................................... 1
`
`SUMMARY OF THE PATENTS ...................................................................................... 5
`
`LEGAL STANDARDS FOR CLAIM CONSTRUCTION ................................................ 7
`
`CLAIM CONSTRUCTION ................................................................................................ 9
`
`A. “request” ............................................................................................................................. 9
`
`B. “response” ......................................................................................................................... 14
`
`C. “transport layer connection” ............................................................................................. 16
`
`
`
`CONCLUSION ................................................................................................................. 20
`
`
`
`
`
`i
`
`2
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 3 of 25 PageID #: 2373
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`Abbott Labs. v. Dey L.P.,
`287 F.3d 1097 (Fed. Cir. 2002)................................................................................................11
`
`ActiveVideo Networks, Inc. v. Verizon Comm’n, Inc.,
`694 F.3d 1312 (Fed. Cir. 2012)......................................................................................9, 10, 17
`
`Amgen, Inc. v. Ariad Pharms., Inc.,
`577 F. Supp. 2d 724 (D. Del. 2008) .........................................................................................18
`
`Baldwin Graphic Sys., Inc. v. Siebert, Inc.,
`512 F.3d 1338 (Fed. Cir. 2008)................................................................................................13
`
`Dealertrack, Inc. v. Huber,
`674 F.3d 1315 (Fed. Cir. 2012)..................................................................................................8
`
`Goldenberg v. Cytogen, Inc.,
`373 F.3d 1158 (Fed. Cir. 2004)................................................................................................11
`
`Interactive Gift Express, Inc. v. Compuserve Inc.,
`256 F.3d 1323 (Fed. Cir. 2001)..................................................................................................8
`
`KCJ Corp. v. Kinetic Concepts, Inc.,
`223 F.3d 1351 (Fed. Cir. 2002)................................................................................................13
`
`Mallinckrodt IP Unlimited Co. v. B. Braun Medical Inc.,
`No. 17-365-LPS, No. 17-660-LPS, 2018 WL 2684105 (D. Del. June 5, 2018) ......................13
`
`O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co., Ltd.,
`521 F.3d 1351 (Fed. Cir. 2008)..................................................................................................9
`
`Omega Eng’g, Inc., v. Raytek Corp.,
`334 F.3d 1314 (Fed. Cir. 2003)..........................................................................................12, 18
`
`On-Line Techs. v. Bodenseewerk Perkin-Elmer GmBH,
`386 F.3d 1133 (Fed. Cir. 2004)..........................................................................................13, 19
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ....................................................................... passim
`
`Smith Int’l, Inc. v. Baker Hughes Inc.,
`No. 16-0056, 2018 WL 3381299 (D. Del. July 11, 2018) .......................................................13
`
`ii
`
`3
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 4 of 25 PageID #: 2374
`
`Sorensen v. Int’l Trade Comm’n,
`427 F.3d 1375 (Fed. Cir. 2005)..................................................................................................9
`
`SRI Int’l, Inc. v. Cisco Sys., Inc.,
`No. 2017-2223, slip op. (Fed. Cir. March 20, 2019) ...............................................................12
`
`Teleflex, Inc. v. Ficosa N. Am. Corp.,
`299 F.3d 1313 (Fed. Cir. 2002)................................................................................................12
`
`Thorner v. Sony Computer Entertainment Am., LLC,
`669 F.3d 1362 (Fed. Cir. 2012)..................................................................................................8
`
`Transcenic, Inc. v. Google Inc.,
`7 F. Supp. 3d 405 (D. Del. 2013) .............................................................................................13
`
`Vitronics Corp. v. Conceptronic, Inc.,
`90 F.3d 1576 (Fed. Cir. 1996)....................................................................................................8
`
`Other Authorities
`
`37 CFR § 42.100(b) .......................................................................................................................20
`
`
`
`iii
`
`4
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 5 of 25 PageID #: 2375
`
`
`
`INTRODUCTION
`
`Plaintiff Citrix Systems, Inc. (“Citrix”) is a pioneer in the networking technology that
`
`enables the modern Internet. Citrix has sought and obtained thousands of patents globally for its
`
`inventions in this space. Defendant Avi Networks, Inc. (“Avi”) recently entered the market, and
`
`competes directly with Citrix. In addition to claims for false advertising, unfair competition, and
`
`deceptive trade practices, Citrix accuses Avi of infringing U.S. 9,148,493 (“the ’493 patent”) and
`
`8,631,120 (“the ’120 patent”) (collectively, the “Asserted Patents”) which relate to network
`
`connection reuse and share a common specification. The three claim terms at issue—“request,”
`
`“response,” and “transport layer connection”—do not require construction, as the plain and
`
`ordinary meaning is sufficient. Indeed, Avi does not argue that any of these terms would not be
`
`readily understood by one of skill in the art. Instead, Avi seeks to graft on extraneous limitations
`
`purportedly based on an undifferentiated list of every substantive office action response in the
`
`file histories of these two patents and others. But Avi’s proposed constructions depart from the
`
`cardinal rules of claim construction: they are not, in fact, supported by the file histories; they
`
`would read out preferred embodiments; and they advance meanings that are inconsistent with the
`
`technical facts. The Court should thus reject Avi’s results-driven positions.
`
`
`
`TECHNOLOGY BACKGROUND
`
`Servers on the Internet store information accessible by clients. Generally, a client sends a
`
`request for data to a server, such as a web server, and the server responds with the requested
`
`data. Information can be organized, for example, as webpages and exchanged using Hypertext
`
`Transfer Protocol (HTTP), a standard that specifies how requests for data (e.g., webpages), and
`
`1
`
`
`5
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 6 of 25 PageID #: 2376
`
`responses to those requests are formatted.1 Jones Decl. ¶29.
`
`Users typically access data on a webpage using a browser by specifying the uniform
`
`resource locator (URL) of a desired page. See, e.g., ’493 at 1:42-44. For example, a user may
`
`want to browse data at “https://www.supremecourt.gov,” which is the public URL for the United
`
`States Supreme Court website. Once the user specifies a URL, a client (e.g., the web browser)
`
`transmits an HTTP request message (e.g., a “GET request”) indicating the desired URL to the
`
`web server, and the server transmits back a response message containing a copy of data at the
`
`corresponding webpage. See, e.g., id. at 1:47-54. See also id. at FIG. 7, 7:54-55 (“GET request
`
`from client C1 specifying a path name of /sales/forecast.html”), and 7:61 (“Server S responds
`
`with the requested web page”).
`
`HTTP messages, in general, contain a header, and may also contain a payload. In the
`
`simple but common example discussed above, the HTTP request message utilizes a “GET
`
`method” by including the term (called a “token” in the HTTP standard) “GET” in the “header”
`
`portion of the message. Jones Decl. ¶30. The GET method request message in this example does
`
`not have a “payload,” however, because it is only requesting data from the server. Id. If the GET
`
`method request succeeds (i.e., the requested data resource is located), the HTTP response
`
`message will typically have both a header and a payload, where the payload includes the
`
`requested data (i.e., data at the requested webpage). Id.
`
`Many protocols other than HTTP are also often used to access data on the Internet, such
`
`as File Transfer Protocol (“FTP”) and the suite of protocols that enable email. See, e.g., ’493 at
`
`5:35-37. For example, FTP is a protocol used to transfer files. Unlike HTTP, the messages that
`
`
`1 The disclosed inventions and asserted claims cover protocols other than HTTP, each of which
`presents technical distinctions. Citrix focuses on HTTP to explain the background and inventions
`since web browsing will be familiar to the Court and is adequate to illustrate relevant principles.
`
`2
`
`6
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 7 of 25 PageID #: 2377
`
`constitute FTP requests and responses have neither a “header” nor a “payload.” Jones Decl. ¶42.
`
`Computer networking has long utilized a conceptual framework known as a “layered”
`
`model to characterize the communication functions of a network without regard to its underlying
`
`internal structure and technology. One common example is the Open Systems Interconnection
`
`model (typically referred to as the “OSI model”).2 Jones Decl. ¶¶ 32-40. This and similar models
`
`enabled various communication systems to interoperate based on standardized protocols, such as
`
`on the Internet.
`
`The OSI model partitions a communication system into seven “layers” (as shown below)
`
`each handling different aspects of communications, arranged in a vertical stack.
`
`L7
`
`L6
`
`L5
`
`L4
`
`L3
`
`L2
`
`L1
`
`Application Layer
`
`Presentation Layer
`
`Session Layer
`
`Transport Layer
`
`Network Layer
`
`Data Layer
`
`Physical Layer
`
`
`
`Jones Decl. ¶¶ 32-40. Each layer serves the layer above it and is served by the layer below it. For
`
`example, a layer that provides communications across a network provides the path needed by an
`
`application above it, while it calls the next lower layer to send and receive packets that include
`
`the contents sent over that path.
`
`While it is not necessary for present purposes to discuss all seven layers, the application
`
`and transport layers are relevant background to the instant dispute. Id. The application layer,
`
`depicted at the top of the stack, is closest (i.e., most directly exposed) to an end user.
`
`
`2 Another common model called the Internet Protocol suite uses four layers.
`
`3
`
`7
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 8 of 25 PageID #: 2378
`
`Applications, such as a web browser, Skype (for telephony), or Outlook (for email) directly
`
`interact with the end user at the application layer. Id. ¶¶37, 42. HTTP and its secure version
`
`called HTTPS, both of which are used by web browsers, are examples of protocols operating at
`
`an application layer to provide functionality that is directly accessible to an end user. Id. ¶¶32-
`
`40. FTP and email also rely on protocols implemented at the application layer. Id. ¶42.
`
`The transport layer, by contrast, is lower in the stack (and thus further from end-user
`
`application interaction) and provides device-to-device communication services for applications.
`
`Id. ¶¶32-40. The capabilities provided by this layer can include, e.g., connection-oriented
`
`communication, reliability, flow control, and multiplexing. Id. The network layer, which works
`
`closely with the transport layer in common network implementations, provides the means to
`
`address various end-points on a network such as clients and servers. Id.
`
`An application-layer protocol such as HTTP relies upon at least one protocol in a layer
`
`below it in a network protocol stack to actually cause application messages to be transmitted
`
`between devices. Id. ¶¶32-40. For example, HTTP messages are usually transmitted over a
`
`TCP/IP connection, where the transmission control protocol (“TCP”) operates at a transport
`
`layer, and the Internet Protocol (“IP”) operates at a network layer. Id.; see also ’493 at 5:35-37
`
`(“The TCP/IP protocol suite supports many applications, such as Telnet, [FTP], e-mail, and
`
`HTTP”). HTTP relies on TCP, at the transport layer, to establish an ongoing connection between
`
`devices. Jones Decl. ¶¶ 38-42.
`
`Often, a transport layer connection is established between a client and server for the
`
`exchange of webpage data. In some web deployment scenarios at issue here, an intermediary
`
`device is arranged between one or more clients and servers and acts to, inter alia, direct requests
`
`and responses to their appropriate destinations. In such scenarios, a client-side TCP connection is
`
`4
`
`8
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 9 of 25 PageID #: 2379
`
`established between a client and an intermediary device, and a server-side TCP connection is
`
`established between the intermediary device and a server. E.g., ’493 at FIG. 2.
`
`A client’s HTTP request message and a server’s HTTP corresponding response message
`
`at the application layer do not flow immediately due to overhead associated with lower layers,
`
`such as the TCP transport layer. For example, establishing a TCP connection requires the
`
`sequential exchange of three network packets between devices to establish the connection, and
`
`the subsequent closing of the connection requires the exchange of up to four sequential network
`
`packets. See, e.g., ’493 at 2:7-18; see also Jones Decl. ¶41.
`
`As described below, the claimed inventions enable a transport layer connection, such as
`
`that utilizing TCP, between an intermediary and a server to be reused to service multiple requests
`
`from different clients, and thus avoid the time and processing overhead of setting up and taking
`
`down that connection multiple times. See, e.g., ’493 at 1:23-28, 2:1-50, and 3:63-4:10. These
`
`improvements, commercialized in Citrix’s NetScaler product line, have enabled thousands of
`
`customers worldwide to upgrade their application performance and reliability and operate at a
`
`scale necessary to service the modern Internet.
`
`
`
`SUMMARY OF THE PATENTS
`
`The ’493 and ’120 patents are both entitled “Apparatus, method and computer program
`
`product for efficiently pooling connections between clients and servers.” Both claim priority to
`
`an application filed on Oct. 18, 2000, and issued as U.S. Patent 7,801,978 (“the ’978 patent”).
`
`The ’493 and ’120 patents, as well as the ’978 patent, share a common specification, and as such,
`
`the ’493 patent is used herewith for citation purposes. These patents disclose technology related
`
`to client-server applications such as HTTP applications where the efficient reuse of transport
`
`layer connections between an intermediary device and one or more backend servers is important
`
`in the handling of client requests and server responses. See, e.g., ’493 at 1:23-28, FIG. 2, 4:5-10;
`
`5
`
`9
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 10 of 25 PageID #: 2380
`
`see also Jones Decl. ¶43.
`
`These patents describe a problem particular to servers in computer networks where
`
`efficient utilization of computer and network resources are key technical concerns. See, e.g., ’493
`
`at 1:23-28, 2:1-50. These concerns arise, for example, when client devices, such as personal
`
`computers or smartphones, request content from a website hosted by a webserver. To
`
`accommodate numerous clients requesting content from the same server in a short period of
`
`time, a system administrator may configure a server farm where each server therein is capable of
`
`handling the same content requests. See, e.g., ’493 at FIG. 2, 3:63-4:10. Incoming requests are
`
`then distributed among the farm’s servers. Id. An intermediary device, also called a front-end
`
`server or interface unit, is placed between the client devices and the server farm, and manages a
`
`pool of one or more server-side connections with respective servers. Id. The intermediary device
`
`is responsible for distributing requests efficiently and making sure the responses are relayed back
`
`to the correct client.
`
`As noted above, connections between client devices and web servers are established
`
`using a transport layer connection, such as that utilizing TCP, which requires the overhead of
`
`exchanging initializing network packets and local computing resources, such as processor time
`
`and memory, to properly monitor and maintain the connection. See, e.g., ’493 at 2:1-50. Since
`
`the front-end server acts as a go-between, the front-end server must commit resources to
`
`maintain transport layer connections with clients as well as with the farm’s servers.
`
`One source of increased efficiency is reusing the server-side connections to handle more
`
`requests. Reusing an established connection avoids having to exchange the initial packets to
`
`setup that connection. The inventors recognized that one key technical question for the
`
`intermediary device is to determine when a server-side connection may be reused. One method
`
`6
`
`10
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 11 of 25 PageID #: 2381
`
`to make that determination is for the client to properly close its connection, which signals to the
`
`intermediary that the client has received its requested data. However, there is a delay after the
`
`client receives the last of its data before it closes the connection. In some cases, the delay is due
`
`to “think time” where a web browser holds open a connection to handle other requests, e.g., if a
`
`browser receives a web page, and then, after several seconds of a user reviewing, the user “clicks
`
`on” a link contained in that web page that corresponds to resource data on the same webserver.
`
`See, e.g., ’493 at 1:23-28 and 6:4-12. In other cases, the delay is due to the intermediary device
`
`waiting to receive a close command from the client notwithstanding the client doing so
`
`immediately after receiving webpage data. E.g., id. at 12:18-32. The specifications disclose that
`
`such delay unnecessarily ties up a server-side connection. E.g., id. at 1:23-28, 4:67-5:2.
`
`The inventors recognized that the intermediary device does not necessarily need to wait
`
`for a close command from the client to know that the server is finished sending a response.
`
`Information contained in the server’s response, such as a content-length parameter or a chunked
`
`transfer encoding header, can be examined to detect server response message completion faster
`
`than waiting for a close command from either the client or the server. The invention allows for
`
`faster reuse of the connection between the intermediary device and the server to service other
`
`client requests. See, e.g., id. at 6:3-12, 12:25-32. Further, this improved method reduces the need
`
`to maintain more simultaneous server-side connections and more hardware or computing
`
`resources at higher cost to support those connections.
`
`
`
`LEGAL STANDARDS FOR CLAIM CONSTRUCTION
`
`Claim construction must focus on the claim language itself because it is a “bedrock
`
`principle” that “the claims of a patent define the invention to which the patentee is entitled the
`
`right to exclude.” Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc). Claim
`
`terms “are generally given their ordinary and customary meaning” as understood by the skilled
`
`7
`
`11
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 12 of 25 PageID #: 2382
`
`artisan at the time of the invention in the context of the specification. Id. “There are only two
`
`exceptions to this general rule: 1) when a patentee sets out a definition and acts as his own
`
`lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the
`
`specification or during prosecution.” Thorner v. Sony Computer Entertainment Am., LLC, 669
`
`F.3d 1362, 1365 (Fed. Cir. 2012). Where “the claim language is clear on its face, then [the]
`
`consideration of the rest of the intrinsic evidence is restricted to determining if a deviation from
`
`the clear language of the claims is specified.” Interactive Gift Express, Inc. v. Compuserve Inc.,
`
`256 F.3d 1323, 1331 (Fed. Cir. 2001).
`
`Claim construction begins with the intrinsic evidence—namely, the claim language, the
`
`specification, and the prosecution history. Phillips, 415 F.3d at 1312-17. The claims provide
`
`important guidance both through “the context in which a term is used” and “differences among
`
`claims.” Id. at 1314-15. The specification is “always highly relevant,” id. at 1315, and “may
`
`reveal a special definition given to a claim term by the patentee that differs from the meaning it
`
`would otherwise possess.” Id. at 1317. While it is improper to import limitations from a preferred
`
`embodiment described in the specification into the claim, it is equally improper to define a term
`
`that would exclude a preferred embodiment from the scope of the invention. Compare
`
`Dealertrack, Inc. v. Huber, 674 F.3d 1315, 1327 (Fed. Cir. 2012) (rejecting a construction that
`
`narrowed the claim scope to the preferred embodiment) with Vitronics Corp. v. Conceptronic,
`
`Inc., 90 F.3d 1576, 1583-84 (Fed. Cir. 1996) (rejecting a construction that would exclude a
`
`preferred embodiment finding that “[s]uch an interpretation is rarely, if ever, correct and would
`
`require highly persuasive evidentiary support.”). Likewise, the prosecution history may shed
`
`light on what a term means, but “it often lacks the clarity of the specification and thus is less
`
`useful for claim construction purposes,” id., and it will not limit claim scope unless it contains a
`
`8
`
`12
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 13 of 25 PageID #: 2383
`
`“clear and unmistakable” disclaimer. Sorensen v. Int’l Trade Comm’n, 427 F.3d 1375, 1378-79
`
`(Fed. Cir. 2005).
`
`The “construction that stays true to the claim language and most naturally aligns with the
`
`patent’s description of the invention will be, in the end, the correct construction.” Phillips, 415
`
`F.3d at 1316. And, “in some cases,” like this one, “the ordinary meaning of claim language as
`
`understood by a person of skill in the art may be readily apparent even to lay judges, and claim
`
`construction in such cases involves little more than the application of the widely accepted
`
`meaning of commonly understood words.” Id.
`
`It is sometimes unnecessary to construe claim language at all. See, e.g., O2 Micro Int’l
`
`Ltd. v. Beyond Innovation Tech. Co., Ltd., 521 F.3d 1351, 1362 (Fed. Cir. 2008) (“[D]istrict
`
`courts are not (and should not be) required to construe every limitation present in a patent’s
`
`asserted claims.”). One way to appropriately resolve a dispute is to give the term its plain
`
`meaning and reject a narrower alternative proposed by a party. See, e.g., ActiveVideo Networks,
`
`Inc. v. Verizon Comm’n, Inc., 694 F.3d 1312, 1326 (Fed. Cir. 2012) (affirming “plain meaning”
`
`construction which rejected construction that “erroneously reads limitations into the claims”).
`
`
`
`CLAIM CONSTRUCTION
`A.
`
` “request”
`
`Term
`“request”
`
`
`’493: 1, 5, 7, 8, 9, 13,
`15, 16, 17, 18, 19, 20;
`’120: 1, 2, 4, 5, 6, 7, 8,
`9, 10, 12, 13, 14, 15, 16,
`17
`
`Citrix’s Construction
`Plain and ordinary meaning. To the
`extent the Court finds construction
`helpful to assist the factfinder in
`applying the claim, the term’s
`plain and ordinary meaning is “a
`message for retrieving data”
`
`Avi’s Construction
`“Application layer message
`requesting data from a server
`and consisting of a header
`and payload”
`
`No construction of this term is necessary. The phrase “request” is easily understood by
`
`those of ordinary skill in the art, particularly given the clarity of the claim language and the
`
`9
`
`13
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 14 of 25 PageID #: 2384
`
`corresponding description in the specification. Jones Decl. ¶¶47-50. Tellingly, in its recent inter
`
`partes review (IPR) petition filings against the ’493 and ’120 patents, Avi did not contend this
`
`term needed any construction. See Avi’s ’493 and ’120 IPR Petitions at 7, which are attached as
`
`Exhibits J and K in the Jones Decl.
`
`The specification supports the plain and ordinary meaning, describing an exchange of
`
`messages that includes a “request” and a “response.” See, e.g., ’493 at 2:7-18, 10:1-11:38, FIG.
`
`8, 12:49-14:41, FIG. 10, 7:45-8:21, FIG. 7. A client sends a request to retrieve data. Id. at 2:9-10
`
`(“client sends a URL (page) request”), 8:25-26 (“the client has retrieved all requested data”). As
`
`one example, a client sends a request to retrieve sales forecast data from a website. Id. at 7:54-55
`
`(“GET request from client C1 specifying a path name of /sales/forecast.html”). Because the
`
`term’s meaning is plain, no further clarification is necessary. See ActiveVideo, 694 F.3d at 1326;
`
`Phillips, 415 F.3d at 1314. Alternatively, “a message for retrieving data” is wholly consistent
`
`with the plain and ordinary meaning of this term, to the extent the Court finds that a construction
`
`would be useful to guide a factfinder.
`
`Avi’s proposed construction should be rejected for several reasons. While both parties
`
`agree that a “request” is a message for retrieving or requesting3 data, Avi seeks to further impose
`
`unnecessary and incorrect technical limitations on the construction of this term, without support
`
`from the claim language or specifications of the ’493 and ’120 patents. Avi’s construction, for
`
`example, requires that the message must be an “application layer message.” The claim language
`
`does not limit the request to a particular type of message (e.g., application layer). Nothing in the
`
`specifications limits the claimed “request” to a particular type of message. Moreover, this
`
`
`3 Citrix is not aware of any meaningful difference between “retrieve” or “request” in this context,
`but suggests “retrieving” in its proposed alternate construction to avoid any concern of
`circularity that would arise from using the word “request” in the construction of “request.”
`
`10
`
`14
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 15 of 25 PageID #: 2385
`
`additional requirement does not appear to be material to any infringement or validity dispute, but
`
`in any case is unnecessary, redundant, and potentially confusing to the jury because the claims
`
`separately refer to “application data.” For example, claim 1 of the ’120 patent recites
`
`“determining… via a content length parameter identified in application data of a first response
`
`that a last byte of the application data has been transmitted from the server and the server has
`
`completed communicating the first response to the first request over the second transport layer
`
`connection.”
`
`In the Joint Claim Chart, Avi identifies, among other things, the file histories of the two
`
`Asserted Patents to support its construction, citing a laundry list of every substantive office
`
`action response, interview summary, and notice of allowance, in the file histories as purported
`
`support for all three of its proposed constructions. See D.I. 98. Moreover, Avi identifies the file
`
`histories of the ’978 patent (a related Citrix patent corresponding to the priority patent
`
`application for the Asserted Patents), and U.S. Patent 6,411,986 (an unrelated Citrix patent, the
`
`specification of which is incorporated by reference in the Asserted Patents) (the “’986 patent”),
`
`in addition to the file histories of the two Asserted Patents, to support its construction—again
`
`citing a laundry list of every substantive paper. 4 See Id. at 2.
`
`Avi’s laundry list of file history items provided in the Joint Claim Chart fails to explain
`
`why or how it intends to import limitations into this term. While it would be impractical in view
`
`of page constraints to walk through each of the 19 or more prosecution items to prove the
`
`
`4 Avi’s reliance on the ’986 file history is also misplaced because the ’986 patent is unrelated to
`the ’493 and ’120 patents and does not support any priority claim from the Asserted Patents. See
`Goldenberg v. Cytogen, Inc., 373 F.3d 1158, 1167-68 (Fed. Cir. 2004) (finding statements in
`another patent or its prosecution history irrelevant to claim construction “[a]bsent a formal
`relationship or incorporation during prosecution” of the patent at issue); cf. Abbott Labs. v. Dey
`L.P., 287 F.3d 1097, 1104-05 (Fed. Cir. 2002) (finding arguments made during prosecution of a
`commonly-owned but unrelated patent did not create prosecution history estoppel).
`
`11
`
`15
`
`

`

`Case 1:17-cv-01843-LPS Document 103 Filed 03/28/19 Page 16 of 25 PageID #: 2386
`
`negative—i.e., that there was no disavowal or disclaimer—at a high level, the applicants
`
`consistently argued that their invention distinguished over the prior art based on its improved
`
`method of determining that a transport layer connection is available for reuse, specifically based
`
`on the application data transmitted over that connection. Nothing in those arguments constituted
`
`an admission that the applicants intended to re-define the claim terms, and none of these file
`
`histories provide any disclaimer or claim scope disavowal that would support Avi’s proposed
`
`limitations. Jones Decl. ¶49.
`
`In particular, none of the evidence Avi points out arises to the standard of clear disavowal
`
`to overturn the “heavy presumption that claim terms carry their full ordinary and customary
`
`meaning.” Omega Eng’g, Inc., v. Raytek Corp., 334 F.3d 1314, 1323-25 (Fed. Cir. 2003) (“For a
`
`prosecution disclaimer to attach, the alleged disavowing statements [must] be both so clear as to
`
`show reasonable clarity and deliberateness, and so unmistakable as to be unambiguous evidence
`
`of disclaimer.”) (internal citations omitted); see also SRI Int’l, Inc. v. Cisco Sys., Inc., No. 2017-
`
`2223, slip op. at 12-13 (Fed. Cir. March 20, 2019) (rejecting argument that patentee had
`
`disclaimed claim scope finding that “[t]o invoke argument-based estoppel, the prosecution
`
`history must evince a clear and unmistakable surrender.”) (internal citations omitted); Teleflex,
`
`Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1325-26 (Fed. Cir. 2002) (requiring a patentee to
`
`unequivocally impart a novel meaning to terms or expressly relinquished claim scope during
`
`prosecution for claim scope disavowal to apply). Indeed, Citrix can identify no material in the
`
`plethora of cited documents that purports to define or limit the “request” term at all.
`
`Avi’s construction also improperly requires that the message must “consist[] of a header
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket