Documente Academic
Documente Profesional
Documente Cultură
gov Paper 31
Tel: 571-272-7822 Entered: May 30, 2018
APPLE, INC.,
Petitioner,
v.
VIRNETX, INC.,
Patent Owner.
____________
Case IPR2017-00337
Patent 9,038,163 B2
____________
1
Judge Cherry replaced Judge Bisk on the panel following the hearing.
IPR2017-00337
Patent 9,038,163 B2
I. INTRODUCTION
Apple, Inc., (“Petitioner”) filed a request for an inter partes review of
claims 1–10, 12–18, 21–31, 33–39, and 42 (the “challenged claims”) of
U.S. Patent No. 9,038,163 B2 (Ex. 1001, “the ’163 patent”). Paper 1
(“Pet.”). VirnetX, Inc. (“Patent Owner”) filed a Preliminary Response to the
Petition. Paper 7 (“Prelim. Resp.”). We instituted an inter partes review of
the challenged claims of the ’163 patent. Paper 8 (“Dec. Inst.”). Patent
Owner filed a Patent Owner Response (Paper 17, “PO Resp.”) and Petitioner
filed a Petitioner Reply (Paper 21, “Pet. Reply”). On February 27, 2018, a
hearing was held, a transcript of which has been entered into the record.
Paper 30 (“Tr.”).
We have jurisdiction under 35 U.S.C. § 6(b). This Final Written
Decision is issued pursuant to 35 U.S.C. § 318(a) and 37 C.F.R. § 42.73.
We base our decision on the preponderance of the evidence. 35 U.S.C.
§ 316(e); 37 C.F.R. § 42.1(d). Having reviewed the arguments of the parties
and the supporting evidence, we find that Petitioner has demonstrated by a
preponderance of the evidence that each of challenged claims, 1–10, 12–18,
21–31, 33–39, and 42, of the ’163 patent are unpatentable.
2
IPR2017-00337
Patent 9,038,163 B2
3
IPR2017-00337
Patent 9,038,163 B2
II. DISCUSSION
A. Claim Construction
In an inter partes review, claim terms in an unexpired patent are given
their broadest reasonable construction in light of the specification of the
patent. 37 C.F.R. § 42.100(b); Cuozzo Speed Techs., LLC v. Lee, 136 S. Ct.
4
IPR2017-00337
Patent 9,038,163 B2
5
IPR2017-00337
Patent 9,038,163 B2
6
IPR2017-00337
Patent 9,038,163 B2
claims 1–10, 12–18, 21–31, 33–39, and 42 of the ’163 patent are
unpatentable as obvious under 35 U.S.C. § 103 over the combined teachings
of U.S. Patent No. 6,496,867 (Ex. 1007, “Beser”), “Security Architecture
for the Internet Protocol,” (Ex. 1008, “RFC 2401”), “SIP: Session Initiation
Protocol” (Ex. 1013, “RFC 2543”), and knowledge held by a person of
ordinary skill in the art. Pet. 2. In our Decision on Institution, we instituted
inter partes review on all the challenged claims alleged unpatentable in the
Petition based on this ground. Dec. Inst. 20.
D. Prior Art References
1. Beser (Ex. 1007)
Beser describes a tunneling system that establishes an IP (internet
protocol) tunneling association over a public network such as the Internet
between two end devices 24 and 26 on private networks. Ex. 1007, 3:60–
4:19, Abstract, Fig. 1. Beser’s system provides security for “[c]ompanies
who cannot afford a private network [and] often transfer sensitive corporate
information over the Internet.” Id. at 1:18–20.
Figure 1 of Beser follows:
7
IPR2017-00337
Patent 9,038,163 B2
8
IPR2017-00337
Patent 9,038,163 B2
identifier) in the request, with a public IP address for router device 16 (i.e.,
the association of the domain name with other stored information, including
Internet addresses, shows they are connected together at the edge of public
network 12). See Ex. 1007, 11:26–36, Figs. 1, 4, 5.2 As indicated, DNS 30
includes, in a directory database or otherwise, stored public IP addresses for
router 16 and terminal device 26 and other data that associates devices 16
and 26 together. Id. at 11:48–52. In other words, trusted-third-party
network device DNS 30, includes the “IP 58 addresses for the terminating . .
. device[s] 26,” and uses “data structures . . . known to those skilled in the art
. . . for the association of the unique identifiers [for terminating devices 26]
and IP 58 addresses for the . . . network devices 16”––including domain
names as unique identifiers, as noted above. Id. at 11:2–5, 32–36, 48–55.
At step 108 (or step 118), Beser’s system assigns, by negotiation,
private IP addresses to requesting network device 24 and terminating device
26. See id. at 11:59–12:19, 12:38–48, Figs. 4, 5. In an exemplary
embodiment, trusted-third-party network (DNS) device 30 performs the
negotiation for private addresses in order to further ensure anonymity of end
devices 24 and 26 (though device 30 need not be involved in the negotiation
in one embodiment). Id. at 9:29–35, 12:17–19. The negotiated private IP
addresses are “isolated from a public network such as the Internet,” and “are
not globally routable.” Id. at 11:63–65. “These IP 58 addresses may be
stored in network address tables on the respective network devices, and may
be associated with physical or local network addresses for the respective
2
Figure 5, which includes step 116, involves a specific Voice-over-Internet-
Protocol (VoIP) application of the general process of Figure 4, which
includes parallel step 106. See Ex. 1007, 3:26–30.
9
IPR2017-00337
Patent 9,038,163 B2
10
IPR2017-00337
Patent 9,038,163 B2
RFC 2543 explains that SIP supports five facets of establishing and
terminating multimedia communications:
User location: determination of the end system to be
used for communication;
User capabilities: determination of the media and
media parameters to be used;
User availability: determination of the willingness
of the called party to engage in communications;
Call setup: "ringing", establishment of call
parameters at both called and calling party; [and]
Call handling: including transfer and termination of
calls.
Ex. 1013, 7–8.
11
IPR2017-00337
Patent 9,038,163 B2
12
IPR2017-00337
Patent 9,038,163 B2
13
IPR2017-00337
Patent 9,038,163 B2
3
Beser also discloses other unique identifiers for a look up related to
terminating device 26, including, inter alia, a “domain name” and a
“previously assigned public IP 58 address.” Ex. 1007, 10:41–11:2.
14
IPR2017-00337
Patent 9,038,163 B2
15
IPR2017-00337
Patent 9,038,163 B2
16
IPR2017-00337
Patent 9,038,163 B2
17
IPR2017-00337
Patent 9,038,163 B2
(Internet Engineering Task Force) standards. Pet. 46; Ex. 1007, 4:55–62,
10:2–4. In this configuration, Petitioner explains, the originating and
terminating devices are SIP user agents, and the first and second network
devices are SIP proxy servers. Id.; Ex. 1003 ¶ 256. Petitioner asserts that
when the Beser originating device initiates an IP tunnel for a VoIP call, it
generates an INVITE message per RFC 2543, which then serves as a VOIP
request to initiate the VoIP association. Pet. 46; Ex. 1007, 10:2–6.
In this configuration, Petitioner explains, after the trusted-third-party
network device determined the unique identifier was registered, it would
look up the public IP address of the second network device. Pet. 47;
Ex. 1003 ¶¶ 258–260. The VoIP request (in Beser, the INVITE message)
would then be sent to the second network device. Id. Petitioner asserts that
this message could be sent by the trusted-third-party network device, as
shown in Beser Figure 9, or it could be sent by the first network device, as
shown in Figure 14. Id. Petitioner asserts that before selecting a private IP
address for the terminating device, the second network device would process
the INVITE message according RFC 2543. Pet. 47; Ex. 1003 ¶ 261. The
second network device would then forward the message to the terminating
end device, causing it to ring. Id.; Ex. 1013, 16, 75. If the user answered the
phone, Petitioner asserts, it would return a success status message to the
second network device as taught by RFC 2543. Pet. 47; Ex. 1013, 76, 92–
94.
Petitioner argues that in the combined system of Beser, RFC 2401,
and RFC 2543, a device that is registered with device 30 supports
“encrypted communication links” (i.e., it supports Beser’s IP tunnel
configured to provide end-to-end encryption), and thus, if the user answers
18
IPR2017-00337
Patent 9,038,163 B2
the phone, that device is available for such a link. Pet. 48; see Ex. 1003
¶¶ 237–241.
In its Response, Patent Owner does not respond specifically to
Petitioner’s evidence with respect to this limitation. See generally PO
Resp. 2–18.
19
IPR2017-00337
Patent 9,038,163 B2
20
IPR2017-00337
Patent 9,038,163 B2
21
IPR2017-00337
Patent 9,038,163 B2
22
IPR2017-00337
Patent 9,038,163 B2
that suite. Pet. 39; Ex. 1003 ¶ 243. The skilled person, Petitioner argues,
would have found it obvious to configure Beser to work with RFC 2543’s
call setup procedures, as this would have been simply substituting one well-
known VoIP protocol (RFC 2543) for another (H.323) with predictable
results. Pet. 39; Ex. 1003 ¶¶ 252–253.
Patent Owner argues that Petitioner’s proposed combination is flawed
because “Beser dismisses the idea of encryption entirely, noting that the
‘expense of added computer power might also dampen the customer’s desire
to invest in VoIP equipment’ at all.” PO Resp. 14 (quoting Ex. 1007, 1:65–
67; Ex. 2002 ¶ 55). Patent Owner also notes that Beser criticizes network
address translation as a form of security because it is similarly
“computationally expensive.” Id. (quoting Ex. 1007, 2:22–23).
To solve these problems, Patent Owner argues, Beser proposed a
method of hiding the addresses of originating and terminating devices. Id.
(citing Ex. 2002 ¶ 57). By hiding the identities of the network devices,
Patent Owner argues, “Beser touts that its method is able to increase
communication security without increasing computational burden.” Id. at 15
(citing Ex. 1007, 2:43–3:14). Thus, Patent Owner argues, one of ordinary
skill in the art would have understood that Beser is directed to providing a
method for securing communications other than encryption and teaches
away from encryption. Id.
Patent Owner argues that Beser’s statement that “IP tunnels are and
should ordinarily be encrypted” does not support Petitioner’s position
because this is limited to encryption being used to hide the identity of
network devices, and is not directed to encryption of traffic in one of Beser’s
tunnels. Id. at 16 (quoting Ex. 1007, 18:2–5). Beser, Patent Owner argues,
23
IPR2017-00337
Patent 9,038,163 B2
“does not use encryption in transmitting data over the established tunnel and,
in fact, teaches away from using encryption in transmitting data.” Id. at 16–
17.
Contrary to Patent Owner’s arguments, Beser recognizes that
encryption ordinarily should be used when the contents of a communication
need to be protected. See Ex. 1007, 1:54–56. Beser also teaches using
encryption when user-identifiable data are sent over a network, such as
during establishment of an IP tunnel. Id. at 11:22–25. Beser also criticizes
prior art IP tunneling methods that sometimes prevent use of encryption, (id.
at 2:1–8, 2:22–24), and states that its tunneling method is intended to
overcome such problems (id. at 2:43–45).
Although Beser expresses concern that some prior art encryption and
IP tunneling techniques may be computationally expensive, Beser’s design
provides an improved method for ensuring user privacy by allowing
communications over the Internet to be anonymous. See Ex. 1007, 2:36–40,
3:4–9. Beser explains that while encrypting data can protect the contents of
communications, prior art encryption did not always provide privacy
because it did not hide the identities of the devices that were communicating.
Id. at 2:1–5, 1:56–58. Beser’s IP tunneling technique was designed to
overcome these problems with the prior art. Id. at 2:43–45.
Beser notes that its IP tunnel can improve the security of encryption
by helping to “prevent a hacker from intercepting all media flow between
the ends” (id. at 2:36–40), and from “accumulating . . . sufficient
information to decrypt the message” (id. at 1:56–58). Beser’s tunneling
method is not technically incompatible with encryption, and a skilled person
would be able to adjust a system’s configuration to accommodate the use of
24
IPR2017-00337
Patent 9,038,163 B2
encryption with Beser’s IP tunnels. See Ex. 1003 ¶¶ 227–228; Ex. 1077,
79:3–11, 80:20–81:8, 82:7–17. Because Beser’s IP tunnel has a low
computational burden, a person of ordinary skill in the art would have
understood that Beser’s method is flexible and could be integrated into
existing communications systems and combined with other security
techniques. See Ex. 1003 ¶ 138; Ex. 1007, 3:4–9, 4:55–5:2.
A person of ordinary skill in the art reading Beser would have
understood that using encryption would help protect the contents of
communications in an IP tunnel. See Ex. 1003 ¶¶ 233–241. Based upon the
evidence presented, Petitioner has shown sufficiently that configuring
Beser’s IP tunneling scheme to include end-to-end encryption of all IP
traffic as provided by IPsec in RFC 2401, and incorporating SIP of RFC
2543, teaches or suggests the recited limitation “facilitating the
establishment of the direct encrypted communication link between the first
network device and the second network device, the facilitating . . . including
provisioning the first network device or the second network device with one
or more resources for the direct encrypted communication link, wherein the
. . . link carries encrypted data communicated between the first network
device and the second network device, and the first network device is a user
device.”
g. Additional Limitations of Claim 22
Claim 22 recites specific computer system components, including “a
memory,” “a network interface,” and “one or more processors configured
to” carry out the recited steps of the claim. Ex. 1001, 57:43–48. Petitioner
relies on Beser, asserting that Beser’s systems are implemented using
programmed computers and other programmable devices. Pet. 55; Ex. 1007,
25
IPR2017-00337
Patent 9,038,163 B2
4:7–5:2, 5:15–47. These network devices include at least one high speed
Central Processing Unit (CPU) and a memory. Ex. 1007, 5:15–47. The
network devices also include a network interface. Id., 7:26–42, 12:32–36,
22:22–31; Ex. 1003 ¶¶ 136–137, 147–148.
26
IPR2017-00337
Patent 9,038,163 B2
27
IPR2017-00337
Patent 9,038,163 B2
28
IPR2017-00337
Patent 9,038,163 B2
Id.
Patent Owner argues that “Beser teaches away from using
encryption,” and therefore Petitioner has failed to establish that claims 3, 4,
24, and 25 are unpatentable. PO Resp. 20.
We disagree with Patent Owner that Beser teaches away from using
encryption. As discussed above with respect to claim 1, Beser recognizes
that encryption ordinarily should be used when the contents of a
communication need to be protected. See Ex. 1007, 1:54–56. Beser also
teaches using encryption when user-identifiable data are sent over a network,
such as during establishment of an IP tunnel. Id. at 11:22–25. A person of
ordinary skill in the art reading Beser would have understood that using
encryption would help protect the contents of communications in an IP
tunnel. See Ex. 1003 ¶¶ 233–241.
We are persuaded that Petitioner has shown by a preponderance of the
evidence that the combination of Beser, RFC 2401, and RFC 2543 teaches
or suggests the limitations “direct encrypted communication link is a
communication link… in a virtual private network,” recited by dependent
claims 3 and 24, and “the virtual private network is an IPsec virtual private
network,” recited by claims 4 and 25.
c. Dependent Claims 5 and 26
Claims 5 and 26 depend from claims 1 and 22, respectively, and
further specify that the secure communications service includes a “telephony
service.” Petitioner asserts Beser explains that the originating and
terminating end devices can be “telephony devices” including “VoIP devices
(portable or stationary) or personal computers running facsimile or audio
applications.” Pet. 57 (citing Ex. 1007, 4:43–52, Figs. 1 and 17).
29
IPR2017-00337
Patent 9,038,163 B2
With respect to claims 5 and 26, Patent Owner contends generally that
“Beser and RFC 2401 do not render obvious claims 5–10, 12, 14–18, 26–31,
33, and 35–39 for at least the reasons discussed above for independent
claims 1 and 22, from which they depend.” PO Resp. 21.
We are persuaded that Petitioner has shown by a preponderance of the
evidence that Beser’s explanation that its originating and terminating end
devices can be “telephony devices” including “VoIP devices (portable or
stationary) or personal computers running facsimile or audio applications,”
teaches the recited limitation “wherein the established direct encrypted
communication link provides a telephony service,” of dependent claims 5
and 26. Pet. 57.
d. Dependent Claims 6, 7, 27, and 28
Claims 6 and 27 depend from claims 5 and 26, respectively, and
further specify that the telephony service uses “modulation.” Claims 7 and
28 depend from claims 6 and 27, respectively, and further specify that “the
modulation is based on one of frequency-division multiplexing (FDM), time-
division multiplexing (TDM), or code division multiple access (CDMA).”
Petitioner asserts Beser explains that VoIP or video conference data
can be transmitted through an IP tunnel, and shows several examples of
devices that can be used to transmit such data. Pet. 58 (citing Ex. 1007,
4:19–54; Ex. 1003 ¶¶ 141–157). For example, Petitioner asserts, Beser
explains that the first and second network device each can be a cable
modem. Id. (citing Ex. 1007, 4:30–42). Petitioner argues it was well known
before February of 2000 that data transmitted via a cable modem inherently
will be modulated, and that cable modems used various types of modulation,
including FDM and TDM. Id. (citing Ex. 1003 ¶ 152). Petitioner also
30
IPR2017-00337
Patent 9,038,163 B2
asserts Beser explains that end devices can include portable VoIP devices
such as mobile phones, and that data can be sent to and from such a device
using data transmission standards that were developed by the Wireless
Application Protocol (“WAP”) Forum. Id. (citing Ex. 1007, 4:43–63; Ex.
1003 ¶¶ 145–147). Petitioner argues that it was known in February 2000
that data transmitted to a mobile device using WAP could be transmitted
over a cellular network, such as a GSM network (which employed TDM) or
a CDMA network. Id. at 59 (citing Ex. 1003 ¶¶ 146–147; Ex. 1039).
With respect to claims 6, 7, 27, and 28, Patent Owner contends
generally that “Beser and RFC 2401 do not render obvious claims 5–10, 12,
14–18, 26–31, 33, and 35–39 for at least the reasons discussed above for
independent claims 1 and 22, from which they depend.” PO Resp. 21.
We are persuaded that Petitioner has shown by a preponderance of the
evidence that the combination of cited art teaches or suggests the recited
limitations “wherein the telephony service uses modulation,” and “wherein
the modulation is based on one of frequency-division multiplexing (FDM),
time-division multiplexing (TDM), or code division multiple access
(CDMA),” of dependent claims 6, 7, 27, and 28.
e. Dependent Claims 8 and 29
Claims 8 and 29 depend from claims 1 and 22, respectively, and
further specify that at least one of the first network device and the second
network device is a “mobile device.” Petitioner asserts that Beser’s
originating and terminating end devices can be “portable” devices. Pet. 59
(citing Ex. 1007, 4:50–52; Ex. 1003 ¶¶ 142, 145–147).
With respect to claims 8 and 29, Patent Owner contends generally that
“Beser and RFC 2401 do not render obvious claims 5–10, 12, 14–18, 26–31,
31
IPR2017-00337
Patent 9,038,163 B2
33, and 35–39 for at least the reasons discussed above for independent
claims 1 and 22, from which they depend.” PO Resp. 21.
We are persuaded by a preponderance of the evidence that Beser’s
discussion of its originating and terminating end devices as portable devices
teaches or suggests the limitation of a “wherein at least one of the first
network device and the second network device is a mobile device,” recited
by dependent claims 8 and 29.
f. Dependent Claims 9 and 30
Claims 9 and 30 depend from claims 1 and 22, respectively, and
further specify that the identifier associated with the second network device
is associated with a “domain name.” Petitioner asserts Beser’s tunneling
request from the originating end device contains a unique identifier
associated with the terminating end device. Pet. 59 (citing Ex. 1007, 8:1–3,
10:37–41; Ex. 1003 ¶ 173). Petitioner asserts Beser teaches many types of
identifiers can be used for the unique identifier, and that in one preferred
embodiment, the unique identifier is a domain name. Id. at 59–60 (citing
Ex. 1007, 10:37–41; see id., 10:37–11:8; Ex. 1003 ¶¶ 131, 174).
With respect to claims 9 and 30, Patent Owner contends generally that
“Beser and RFC 2401 do not render obvious claims 5–10, 12, 14–18, 26–31,
33, and 35–39 for at least the reasons discussed above for independent
claims 1 and 22, from which they depend.” PO Resp. 21.
We are persuaded by a preponderance of the evidence that Beser’s
tunneling request from the originating end device containing a unique
identifier associated with the terminating end device and that in one
embodiment the unique identifier is a domain name teaches or suggests the
limitation “wherein the identifier associated with the second network device
32
IPR2017-00337
Patent 9,038,163 B2
33
IPR2017-00337
Patent 9,038,163 B2
34
IPR2017-00337
Patent 9,038,163 B2
encrypted along the entirety of the path between the originating and
terminating devices. Id. (citing Ex. 1008, 25; Ex. 1007, Fig. 1).
Patent Owner argues Beser teaches away from using encryption, and
therefore, Petitioner has failed to establish that claims 13 and 34 are
unpatentable. PO Resp. 19–20 (citing PO Resp. Section III.D).
We disagree with Patent Owner that Beser teaches away from using
encryption. As discussed above with regard to claim 1, Beser recognizes
that encryption ordinarily should be used when the contents of a
communication need to be protected. See Ex. 1007, 1:54–56. Beser also
teaches using encryption when user-identifiable data are sent over a network,
such as during establishment of an IP tunnel. Id. at 11:22–25. A person of
ordinary skill in the art reading Beser would have understood that using
encryption would help protect the contents of communications in an IP
tunnel. See Ex. 1003 ¶¶ 233–241.
We are persuaded that Petitioner has shown by a preponderance of the
evidence that the combination of Beser, RFC 2401, and RFC 2543 teaches
or suggests the limitation “wherein the data is encrypted along an entirety of
the established direct encrypted communication link between the first
network device and the second network device,” recited by dependent claims
13 and 34.
j. Dependent Claims 14 and 35
Claims 14 and 35 depend from claims 1 and 22, respectively, and
further specify that the request is received at another network device or
processor that is “separate from the first network device.” Petitioner argues
each of Beser’s first network device 14 and trusted-third-party device 30
“receives” the tunneling request (here, a VoIP request). Pet. 61–62 (citing
35
IPR2017-00337
Patent 9,038,163 B2
Ex. 1007, Figs. 1 & 6, 8:1–3, 8:21–47, 8:58–50, 9:46–49, 10:2–6; Ex. 1003
¶¶ 171–72, 177). Petitioner argues each of first network device 24 and
trusted-third-party device 30 are a “device that is separate from the first
network device [originating device 24].” Id. at 62.
With respect to claims 14 and 35, Patent Owner contends generally
that “Beser and RFC 2401 do not render obvious claims 5–10, 12, 14-18,
26–31, 33, and 35–39 for at least the reasons discussed above for
independent claims 1 and 22, from which they depend.” PO Resp. 21.
We are persuaded by a preponderance of the evidence that Beser’s
discussion of transmitting a tunneling request between a first network device
and a trusted-third-party device teaches or suggests the limitation “wherein
the request is received and evaluated at another network device that is
separate from the first network device,” recited by dependent claims 14
and 35.
k. Dependent Claims 15, 16, 36, and 37
Claims 15 and 36 depend from claims 1 and 22, respectively, and
further specify that “the established direct encrypted communication link is a
secure communication link.” Claims 16 and 37 depend from claims 1 and
22, respectively, and further specify that “the established direct encrypted
communication link provides anonymity for at least one of the first network
device or the second network device.”
Petitioner argues it would have been obvious to configure the Beser IP
tunneling scheme to include end-to-end encryption of all IP traffic based on
the teachings of RFC 2401, in addition to using private network addresses
for the traffic sent between the originating and terminating end devices. Pet.
62 (citing Ex. 1003 ¶ 237; see Ex. 1008, 25). Petitioner argues that in the
36
IPR2017-00337
Patent 9,038,163 B2
37
IPR2017-00337
Patent 9,038,163 B2
38
IPR2017-00337
Patent 9,038,163 B2
39
IPR2017-00337
Patent 9,038,163 B2
40
IPR2017-00337
Patent 9,038,163 B2
4
In an earlier proceeding, IPR2016-00332, the Board found RFC 2401 and
RFC 2543 were prior art printed publications to U.S. Patent No. 8,504,696.
See IPR2016-00332, Paper 29, at 48-52 (June 22, 2017).
41
IPR2017-00337
Patent 9,038,163 B2
1998 and March 1999, respectively, as their publication date, and are
marked with “Distribution of this memo is unlimited” on their covers. Id.
(citing Ex. 1008, 1; Ex. 1013, 1). Further, Petitioner argues, RFC 2026
(Ex. 1036), which describes the IETF’s publication practices, explains that
RFCs can be obtained from a number of Internet hosts using anonymous
FTP, gopher, WWW, and other document-retrieval systems. Id. (citing
Ex. 1036, 3, 5; Ex. 1003 ¶¶ 117–124). Petitioner explains that RFCs are
“debated in open meetings and/or public electronic mailing lists, and [are]
made available for review via world-wide on-line directories.” Id. at 24
(citing Ex. 1036, 3; Ex. 1008, 1; Ex. 1003 ¶¶ 118–120).
Petitioner argues that one of ordinary skill in the art would have been
aware of the IETF’s publication practices, and would have known how to
obtain RFC publications because of their wide distribution and importance
to the Internet community as a whole. Id. (citing Ex. 1003 ¶¶ 122–124). For
example, Petitioner asserts, Beser notes that “IETF standards can be found at
the URL ‘www.ietf.org.’” Id. (citing Ex. 1007, 4:67–5:1). Petitioner notes
that a number of industry publications published prior to February 2000
explicitly reference RFC 2401 and state that RFC 2401 could be downloaded
from the IETF. Id. at 24–25 (citing Ex. 1064, 9; Ex. 1065, 3). Finally,
Petitioner asserts, the full text of RFC 2401 was included in the book
Implementing IPsec (submitted as Exhibit 1072), published in 1999, that
describes the IPsec protocol and compiles the relevant RFCs. Id. at 25; see
also Ex. 1073 (U.S. Copyright Registration form for Ex. 1072).
Moreover, Petitioner argues, the IETF confirmed RFC 2401’s
publication date through testimony by Sandy Ginoza, acting as a designated
representative of IETF, during proceedings in a related matter between
42
IPR2017-00337
Patent 9,038,163 B2
Petitioner and Patent Owner. Id. (citing Ex. 1060 ¶¶ 1–5; Ex. 1063, 6:23–
7:4; id. at 10:5–11:22). Ms. Ginoza, Petitioner explains, testified that the
“RFC Editor maintained a copy of RFC 2401 in the ordinary course of its
regularly conducted activities” and that RFC 2401 was published and “has
been publicly available through the RFC Editor’s web site or through other
means since its publication in November 1998.” Id. (citing Ex. 1060 ¶ 107;
id. at ¶¶ 105–107). Petitioner points out that in a deposition about her
declaration, Ms. Ginoza testified that RFC 2401 was made publicly available
in “November 1998.” Id. (citing Ex. 1063, 39:14–40:24; Ex. 1062.
Ms. Ginoza also testified that RFC 2543 was published on March 1999. Id.
at 28 (citing Ex. 1060 ¶¶ 168–170; Ex. 1063, 45:5–46:17).
Patent Owner argues that Petitioner’s assertion that the RFCs were
published by the date on their covers is insufficient to establish that a
reference qualifies as a printed publication. PO Resp. 22–23. Patent Owner
also argues that Dr. Tamassia’s testimony does not constitute sufficient
evidence because it has not been established that Dr. Tamassia has personal
knowledge that the RFCs were released to the public or that Dr. Tamassia is
familiar with the workings of the IETF. Id. at 23–24.
Patent Owner also argues that Ms. Ginoza does not have any personal
knowledge of when the RFCs became publicly available and Ms. Ginoza has
not provided the underlying facts or data on which her opinion is based. Id.
at 25–26. Patent Owner argues that the procedures described in RFC 2026
are meant to be “flexible” and reflect “generally-accepted practices,” and
there is no assurance that the procedures of RFC 2026 that were quoted by
Petitioner were actually applied to the RFCs. Id. at 27. Patent Owner argues
that the notation that “Distribution of this memo is unlimited” on the cover
43
IPR2017-00337
Patent 9,038,163 B2
pages of the RFCs does not indicate that the RFCs were “actually . . .
released or distributed to the public” to meet the requirement of public
accessibility. Id. at 27–28.
“A given reference is ‘publicly accessible’ upon a satisfactory
showing that such document has been disseminated or otherwise made
available to the extent that persons interested and ordinarily skilled in the
subject matter or art exercising reasonable diligence, can locate it.” SRI
Int’l, Inc. v. Internet Sec. Sys., Inc., 511 F.3d 1186, 1194 (Fed. Cir. 2008)
(quoting Bruckelmyer v. Ground Heaters, Inc., 445 F.3d 1374, 1378 (Fed.
Cir. 2006)).
Here, the evidence supports a finding that persons interested and
ordinarily skilled in the subject matter of RFC 2401 and RFC 2543 could
have located them. RFC 2401 and RFC 2543 each include dates on each
page, and the cover sheets bear the designations “Request for Comments”
from the “Network Working Group,” discussing particular standardized
protocols for the Internet. Ex. 1008, 1; Ex. 1013, 1. Each document
describes itself as a “document [that] specifies an Internet standards track
protocol for the Internet community, and requests discussion and
suggestions for improvements . . . . Distribution of this memo is unlimited.”
See Ex. 1008, 1; Ex. 1013, 1.
Ms. Ginoza, a representative of IETF, states in her declaration that
“RFC 2401 has been publicly available through the RFC Editor’s web site or
through other means since its publication in November 1998.” Ex. 1060
¶ 107. Ms. Ginoza also states that “RFC 2543 has been publicly available
through the RFC Editor’s web site or through other means since its
publication in March 1999.” Ex. 1060 ¶ 170. Patent Owner’s criticism of
44
IPR2017-00337
Patent 9,038,163 B2
45
IPR2017-00337
Patent 9,038,163 B2
46
IPR2017-00337
Patent 9,038,163 B2
47
IPR2017-00337
Patent 9,038,163 B2
Paper 39, 73–77 (Sept. 28, 2016); IPR2016-00331, Paper 29, 46–49 (June
22, 2017); IPR2016-00332, Paper 29, 80–85 (June 22, 2017).” Paper 26, 1.5
1. Exhibits 1008 and 1013
Patent Owner argues that Petitioner relies on the text, “November
1998,”on the cover of Exhibit 1008 and “March 1999,” on the cover of
Exhibit 1013 for the truth of the matter asserted. Paper 23, 2. Therefore,
Patent Owner argues, these portions of Exhibits 1008 and 1013 constitute
inadmissible hearsay and should be excluded. Id. Petitioner argues
Exhibits 1008 and 1013 are admissible under the business records exception.
Paper 26, 4–7.
The business records exception to the rule against hearsay applies if
“the record was kept in the course of a regularly conducted activity of …
[an] organization… [and] making the record was a regular practice of that
activity.” FRE 803(6)(B)-(C). In addition, the record must be “made at or
near the time by . . . someone with knowledge.” FRE 803(6)(A).
Both Dr. Tamassia and RFC 2026 (Ex. 1036) explain that publishing
RFCs were part of IETF’s standard process to “provide[] ample opportunity
for participation and comment by all interested parties.” Ex. 1036, 4;
Ex. 1003 ¶¶ 118–123. Dr. Tamassia testifies that IETF regularly specifies a
publication date on the top right corner of each RFC—here, “November
1998” at the top of RFC 2401 and “March 1999” at the top of RFC 2543—to
establish response deadlines for comments. Ex. 1003 ¶¶ 117–124, 126, 128.
5
Our reviewing court recently affirmed the Board’s final decisions in
IPR2015-00810, IPR2015-00811, IPR2015-00812, IPR2015-00866,
IPR2015-00868, IPR2015-00870, and IPR2015-00871, in Virentx, Inc. v.
Apple, Inc., 715 F. App’x 1024 (Fed. Cir. 2018) (Fed. Cir. R. 36).
48
IPR2017-00337
Patent 9,038,163 B2
49
IPR2017-00337
Patent 9,038,163 B2
We agree with the view [of other PTAB panels] that the dates [of
publications] are not hearsay because they are not assertions. . . .
We are supported in this by cases such as United States v. Snow,
517 F.2d 441, 445 (9th Cir. 1975), where a red tape bearing the
defendant’s name affixed to a briefcase where a gun was found
was admitted as circumstantial evidence that the defendant
possessed the weapon. To the same effect are United States v.
Koch, 625 F.3d 470, 480 (8th Cir. 2010) (computer flash drive
with manufacturer’s label “China” not inadmissible hearsay to
prove place of manufacture); and United States v. Bowling, 32
F.3d 326, 328 (8th Cir. 1994) (manufacturer’s name stamped on
firearm not hearsay). We are persuaded by these cases that dates
appearing in Exhibit 1003, like the examples in those cases, are
circumstantial evidence of publication and not assertions that
publication occurred on a date certain. We, therefore, overrule
the objection and admit the dates for this purpose.
See IPR2016-00840, Paper 60, 5–6 & n.2 (alternatively relying on the
residual exception to hearsay). For the same reasons enunciated in Seabery,
Patent Owner does not establish that the dates (“November 1998” and
“March 1999”) constitute hearsay, because these dates are not assertions of a
publication. Rather, they constitute evidence helping to identify the
documents and include circumstantial evidence that IEFT made the RFC
2401 and RFC 2543 publications available respectively in November 1998
and March 1999. The following notices, “Copyright Notice” and
“Copyright (C) The Internet Society (1998). All Rights Reserved,” on the
RFC 2401 document, with similar notation on the RFC 2543 document,
provides further corroboration and circumstantial evidence of the date and
authenticity. See Ex. 1008, 1.
Petitioner also shows, in the alternative, that Exhibits 1008 and 1013
satisfy Fed. R. Evid. 807(a) under the residual exception to hearsay. Paper
26, 8–15. We adopt Petitioner’s showing as persuasive. See id.
50
IPR2017-00337
Patent 9,038,163 B2
51
IPR2017-00337
Patent 9,038,163 B2
would have known about the technical features and developments in the
pertinent art.” See Apple v. DSS Tech. Mgmt., IPR2015-00369, Paper 40 at
38 (June 17, 2016); Liberty Mut. Ins. Co. v. Progressive Cas. Ins.,
CBM2012-00010, Paper 59 at 36–37 (Feb. 14, 2014).
Here, Petitioner relies on Exhibits 1032–35 to show that technologies
described in the ’163 patent, including DNS servers, domain names, and
VPNs, were well-known in the art prior to the ’163 patent’s effective filing
date. See Pet. 4. Exhibit 1036 shows that one of ordinary skill in the art
would have been aware of the IETF’s publication practices, and would have
known how to obtain RFC publications. Pet. 24. Such uses are for non-
hearsay purposes. Accordingly, Patent Owner’s motion to exclude Exhibits
1032–36 on hearsay grounds is denied.
3. Exhibits 1038–40, 1045–48, 1053, and 1074
Patent Owner argues that Petitioner’s expert relies on Exhibits 1038–
40, 1045–48, 1053, and 1074 for the purported truth of the matters asserted
in these documents, and that they should therefore be excluded as
inadmissible hearsay. Paper 23, 3.
As a threshold issue, Patent Owner’s motion with respect to Exhibits
1038–40, 1045–48, 1053, and 1074 fails to satisfy its burden of proof
because Patent Owner does not identify specifically what statements in these
exhibits are hearsay. See Paper 23, 3; 37 C.F.R. § 42.20(c); IPR2016-00331,
Paper 29 at 47 (“Patent Owner does not explain why [the exhibits] are
hearsay or what part of them constitute hearsay.”). Patent Owner merely
states “Petitioner’s expert relies on [the exhibits] for the purported truth of
the matters asserted” and cites large swaths of the Petition and Petitioner’s
expert declaration. Paper 23, 3. Patent Owner “does not identify
52
IPR2017-00337
Patent 9,038,163 B2
6
Patent Owner acknowledges that the Board admitted Exhibits 1060 and
1063–65 under the residual exception set forth in Rule 807 in a related
proceeding. Paper 23, 7; see IPR2016-00331, Paper No. 29.
53
IPR2017-00337
Patent 9,038,163 B2
the date printed on that reference for the assertion that Exhibit 1072 was
“published in 1999” is hearsay. Id. at 6 (quoting Pet. 26). Similarly, Patent
Owner argues Petitioner presents Exhibit 1073 solely for the improper
hearsay purpose of supporting its assertion that Exhibit 1072 was “published
in 1999.” Id.
Federal Rule of Evidence 807(a) states that a “statement is not
excluded by the rule against hearsay” if “(1) the statement has equivalent
circumstantial guarantees of trustworthiness; (2) it is offered as evidence of a
material fact; (3) it is more probative on the point for which it is offered than
any other evidence that the proponent can obtain through reasonable efforts;
and (4) admitting it will best serve the purposes of these rules and the
interests of justice.”
Exhibits 1060 and 1063 contain the testimony of Ms. Sandy Ginoza;
Exhibit 1064 is an InfoWorld magazine article from 1999; Exhibit 1065 is a
NetworkWorld magazine article from 1999; and Exhibit 1072 is a book
entitled Implementing IPsec from 1999. Petitioner relies on RFC 2401 and
RFC 2543 as prior art printed publications. Petitioner relies on Exhibits
1060, 1063–65, and 1072 to corroborate RFC 2401’s public availability and
distribution via the Internet prior to February 2000. Pet. 24–25; Pet. Reply,
19–22. Similarly, Petitioner relies on Exhibits 1060 and 1063 to corroborate
RFC 2543’s public availability and distribution prior to February 2000. Pet.
28; Pet. Reply, 19–22. The Board previously found that Exhibits 1064 and
1065 satisfy the residual hearsay exception (and dismissed as moot
challenges to Exhibits 1060 and 1063). See IPR2016-00331, Paper 29 at 48.
Exhibits 1060, 1063–65, and 1072 have equivalent circumstantial
guarantees of trustworthiness. Exhibits 1060 and 1063 contain the prior
54
IPR2017-00337
Patent 9,038,163 B2
sworn testimony of Ms. Ginoza and IETF and reflect Patent Owner’s cross-
examination of Ms. Ginoza on the substance of her testimony. Exhibit 1060
is a declaration from Sandy Ginoza, acting as a designated representative of
the IETF, created in response to a subpoena served as part of an
investigation initiated by Patent Owner before the International Trade
Commission (337-TA-858). Ex. 1060 ¶¶ 1–5; Ex. 1063, 6:23–7:4, 10:5–14.
In her declaration, Ms. Ginoza testified that RFC 2401 and RFC 2543
were published on the RFC Editor’s website and were publicly available
before February 2000. Ex. 1060 ¶¶ 105–107, 168–170. Exhibit 1063 is the
transcript of Ms. Ginoza’s February 8, 2013 deposition that was taken as
part of the ITC action, where she testified that both RFC 2401 and RFC
2543 were publicly available prior to February 2000. Ex. 1063, 39:14–24,
45:5–46:17; see id. at 10:5–11:22 (confirming her knowledge of IETF
publishing practices as they relate to RFCs). Patent Owner cross-examined
Ms. Ginoza about her testimony and declaration, but developed no contrary
testimony. See id. at 50:16–69:1.
This evidence is corroborated by and corroborates the disclosure in
Exhibits 1064 and 1065, which are excerpts from industry publications
predating February 2000 that state it was known that RFCs—and RFC 2401
specifically—were publicly available through the Internet, including through
the IETF’s website. See, e.g., Ex. 1064 at 9 (discussing RFCs 2401 to 2408
and stating “[a]ll of these documents are available on the IETF website:
www.ietf.org/rfc.html”); Ex. 1065 at 3 (discussing IP security protocols and
stating “[s]ee the IETF documents RFC 2401 ‘Security Architecture for the
Internet Protocol’ at www.ietf.org/rfc/rfc2401.txt”).
Further, Exhibit 1072 is corroborated by and corroborates Exhibits
55
IPR2017-00337
Patent 9,038,163 B2
56
IPR2017-00337
Patent 9,038,163 B2
III. CONCLUSION
Based on all the evidence of record, we determine that Petitioner has
established by a preponderance of the evidence that claims 1–10, 12–18, 21–
31, 33–39, and 42 of the ’163 patent would have been obvious under 35
U.S.C. § 103(a) over the combined teachings of Beser, RFC 2401, and RFC
2543.
IV. ORDER
For the reasons given, it is
ORDERED that claims 1–10, 12–18, 21–31, 33–39, and 42 of the
’163 patent are unpatentable; and
FURTHER ORDERED that Petitioner’s Motion to Exclude is denied;
and
FURTHER ORDERED that parties to the proceeding seeking judicial
review of the Final Written Decision must comply with the notice and
service requirements of 37 C.F.R. § 90.2.
57
IPR2017-00337
Patent 9,038,163 B2
PETITIONER:
Jeffrey P. Kushan
Thomas A. Broughan, III
SIDLEY AUSTIN LLP
jkushan@sidley.com
tbroughan@sidley.com
PATENT OWNER:
Joseph E. Palys
Naveen Modi
PAUL HASTINGS LLP
josephpalys@paulhastings.com
naveenmodi@paulhastings.com
58