UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. APPLE INC. Petitioner,

Size: px
Start display at page:

Download "UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. APPLE INC. Petitioner,"

Transcription

1 Paper No. 1 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD APPLE INC. Petitioner, v. VIRNETX, INC. AND SCIENCE APPLICATION INTERNATIONAL CORPORATION, Patent Owner. Patent No. 8,850,009 Issued: September 30, 2014 Filed: June 6, 2013 Inventors: Victor Larson, et al. Title: SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES Inter Partes Review No. IPR Petition for Inter Partes Review of U.S. Patent No. 8,850,009

2 Table of Contents I. Introduction... 1 A. Certification the 009 Patent May Be Contested by Petitioner... 1 B. Fee for Inter Partes Review ( 42.15(a))... 1 C. Mandatory Notices (37 CFR 42.8(b)) Real Party in Interest ( 42.8(b)(1)) Other Proceedings ( 42.8(b)(2)) Lead and Backup Lead Counsel ( 42.8(b)(3)) Proof of Service ( 42.6(e) and (a))... 2 II. Identification of Claims Being Challenged ( (b))... 2 III. Relevant Information Concerning the Contested Patent... 3 A. Overview of the 009 Patent The 009 Patent Specification Representative Claims... 5 B. Patent Owner s Contentions About Related Patents... 5 C. Effective Filing Date... 6 D. The Person of Ordinary Skill in the Art... 8 E. Claim Construction domain name service (DNS) request interception of the DNS request encrypted communication link provisioning information secure communications service indication virtual private network communication link domain name modulation ii

3 IV. Analysis of the Patentability of the 009 Patent A. Summary of Prior Art to the 009 Patent Overview of Aventail (Ex. 1009), Aventail User s Guide (Ex. 1010) and Aventail Extranet Guide (Ex. 1011) a) Nature of the Aventail Documents b) Components of the Aventail scheme c) Incorporation of Aventail Into A Client Computer d) Handling Requests e) Establishing a Secure Connection f) Using Multiple Proxies g) Secure Extranet Explorer Overview of RFC 2401 (Ex. 1008) Overview of RFC 2543 (Ex. 1013) B. Aventail (Ex. 1009) in View of RFC 2401 (Ex. 1008) Would Have Rendered Claims 1, 6-14, and Obvious Aventail Describes or, with RFC 2401, Suggests Every Element of Independent Claims 1 and a) Claim 1 Preamble: a network device b) storage device storing an application program and processor configured to execute the application program c) Claim 14 Preamble: a method executed by a first device for communicating with a second network device d) sending... a domain name service (DNS) request to look up a network address... based on an identifier e) The receiving step f) connecting... over the encrypted communication link, using the received network address... and the provisioning information g) communicating data... using the secure communications service via the encrypted communication link iii

4 h) the first network device being a device at which a user uses the secure communications service to access the encrypted communication link The Distinctions Between the Claimed Methods and Systems Would Have Been Obvious Based on Aventail in View of RFC Claims 6 and 19 Would Have Been Obvious Claims 7 and 20 Would Have Been Obvious Claim 8 Would Have Been Obvious Claims 10 and 22 Would Have Been Obvious Claims 11 and 23 Would Have Been Obvious Claims 12 and 24 Would Have Been Obvious Claims 13 and 25 Would Have Been Obvious C. Aventail in view of RFC 2401 in Further View of RFC 2543 Would Have Rendered Claims 2-5 and Obvious Claims 2, 3, 15 and 16 Would Have Been Obvious Claims 4, 5, 17, and 18 Would Have Been Obvious D. No Secondary Considerations Exist V. Conclusion iv

5 I. Introduction A. Certification the 009 Patent May Be Contested by Petitioner Petitioner certifies that U.S. Patent No. 8,850,009 (Ex. 1003) (the 009 patent) is available for inter partes review. Petitioner also certifies it is not barred or estopped from requesting inter partes review of the claims of the 009 patent. Neither Petitioner, nor any party in privity with Petitioner, has filed a civil action challenging the validity of any claim of the 009 patent. The 009 patent has not been the subject of a prior inter partes review by Petitioner or a privy of Petitioner. Petitioner also certifies this petition for inter partes review is timely filed as it has never been asserted against Petitioner in litigation. Thus, because there is no patent owner s action, this petition complies with 35 U.S.C. 315(b). Petitioner also notes that the timing provisions of 35 U.S.C. 311(c) and 37 C.F.R (a) do not apply to the 009 patent, as it pre-dates the first-to-file system. See Pub. L (n), 126 Stat (Jan. 14, 2013). B. Fee for Inter Partes Review ( 42.15(a)) The Director is authorized to charge the fee specified by 37 CFR 42.15(a) to Deposit Account No C. Mandatory Notices (37 CFR 42.8(b)) 1. Real Party in Interest ( 42.8(b)(1)) The real party in interest of this petition pursuant to 42.8(b)(1) is Apple Inc. ( Apple ) located at One Infinite Loop, Cupertino, CA

6 1. Other Proceedings ( 42.8(b)(2)) IPR filed concurrently also involves the 009 patent. Each petition advances unique grounds and is based on different primary references. Each petition presents a unique correlation of the claims to the prior art, and warrants independent institution of trial. Petitioner respectfully requests the Board institute each petition, as each presents distinct and non-redundant grounds. 2. Lead and Backup Lead Counsel ( 42.8(b)(3)) Lead Counsel is: Jeffrey P. Kushan (Reg. No. 43,401), jkushan@sidley.com, (202) Back-Up Lead Counsel are: Scott Border (pro hac to be requested), sborder@sidley.com, (202) ; and Thomas A. Broughan III (Reg. No. 66,001), tbroughan@sidley.com, (202) Proof of Service ( 42.6(e) and (a)) Proof of service of this petition is provided in Attachment A. II. Identification of Claims Being Challenged ( (b)) Claims 1-8, 10-20, and of the 009 patent are unpatentable as obvious under 35 U.S.C Specifically: (i) claims 1, 6-8, 10-14, 19-20, and would have been obvious based on Aventail Connect v3.01/v2.51 Administrator s Guide ( Aventail ) (Ex. 1009) in view of RFC 2401, Security Architecture for the Internet Protocol ( RFC 2401 ) (Ex. 1008); and claims 2-5 and are obvious based on Aventail in view of RFC 2401 in further view of RFC 2543 SIP: Session Initiation Protocol ( RFC 2543 ) (Ex. 1013). 2

7 Attachment B lists the evidence relied upon in support of this petition. III. Relevant Information Concerning the Contested Patent A. Overview of the 009 Patent 1. The 009 Patent Specification The 009 patent is a member of a family of patents issued to Larson et al., including, inter alia, U.S. Patent Nos. 6,502,135 ( 135 patent ), 7,188,180 ( 180 patent ), 7,418,504 ( 504 patent ), 7,490,151 ( 151 patent ), 7,921,211 ( 211 patent ), 7,987,274 ( 274 patent ), 8,051,181 ( 181 patent ), 8,504,697 ( 697 patent ), and 8,868,705 ( 705 patent ). 1 The 009 patent disclosure, like other members of this patent family, is largely focused on techniques for securely communicating over the Internet based on a protocol called the Tunneled Agile Routing Protocol or TARP. Ex at 3: According to the 009 specification, TARP allows for secure and anonymous communications by using tunneling, an IP address hopping scheme where the IP addresses of the end devices and routers participating in the system can change over time, and a variety of other security techniques. Ex at 1:38-40, 3:20-6:13. Two short sections of the 009 specification spanning primarily columns 39 to 42 and 49 to 53 are directed to a different concept, namely, techniques for establishing secure communications in response to DNS requests 1 IPR and filed concurrently involve the 705 patent. 3

8 specifying a secure destination. See Ex at 39:36-42:29, 49:41-53:49. This material was added in a continuation-in-part application filed in February In proceedings involving related patents, Patent Owner has asserted that these short passages provide written description support for claim terms involving domain names, DNS requests, requests to look up network addresses, and DNS servers. These portions of the 009 specification describe a conventional DNS server that purportedly is modified to include additional functionality that allows it to support the creation of virtual private networks. See Ex at 40: According to the 009 specification, the modified DNS server (id. at 40:33-34) receives a request to look up a network address associated with a domain name, determines whether a secure site has been requested (for example, by checking an internal table of sites), and then performs additional steps to support establishing a virtual private network with the secure site. See Ex at 39:33-38, 40:11-28, 40:39-57, 41:31-49, 52:7-13. This process can include conventional devices such as personal computers running web browsers, proxy servers, intermediate routers, and web servers. Ex at 40:29-38, 49:55-65, 52:65-53:4. The 009 specification describes several optional features of this system, such as using IP hopblocks to create a VPN or incorporating user authentication. Ex at 40:18-22, 40:27-28, 41:42-49, 52: It also describes several optional configurations of the modified DNS server, including a standalone DNS 4

9 server and a system incorporating a DNS server, a DNS proxy server, and a gatekeeper. Ex at 41: Representative Claims Independent claims 1 and 14 of the 009 patent define a network device and a method, respectively, but recite the same operative steps. See Ex at 56:22-48, 57:22-58:3. Claim 14 is representative, specifying a method executed by a first network device for communicating with a second network device by: (1) sending a request to look up a network address of the second network device; (2) receiving, following interception of the request, (i) an indication that the second network device is available for a secure communications service; (ii) the requested network address; and (iii) provisioning information for an encrypted communication link; (3) connecting to the second network device over the encrypted communication link; and (4) communicating data using the secure communications service via the encrypted communication link, the first network device being a device at which a user uses the secure communications service to access the encrypted communication link. B. Patent Owner s Contentions About Related Patents Patent Owner has asserted varying sets of claims of its patents in this family against Petitioner and other entities in numerous lawsuits. In August of 2010, Patent Owner sued Petitioner and five other entities (the 2010 Litigation ) 5

10 asserting claims from the 135, 151, 504, and 211 patents. In November 2011, Patent Owner filed a lawsuit accusing Petitioner of infringing claims of the 181 patent. In December 2012, Patent Owner served a new complaint on Petitioner asserting infringement of numerous claims of the 135, 151, 504, and 211 patents (the 2012 Litigation ). In August 2013, Patent Owner served an amended complaint adding the 697 patent to the 2012 Litigation. Patent Owner also asserted patents from this family against Microsoft and others in separate lawsuits filed in February 2007, March 2010, and April 2013, and against numerous other defendants in actions filed in 2010 and C. Effective Filing Date The 009 patent issued from U.S. Appl. No. 13/911,792 ( the 792 application ). The 792 application claims the benefit as a continuation of the following applications: 13/903,788, filed May 28, 2013; 13/336,790 (issued as U.S. Patent No. 8,458,341); 13/049,552 (issued as U.S. Patent No. 8,572,247); 11/840,560 (issued as the 211 patent); 10/714,849 (issued as the 504 patent); and 09/558,210, filed April 26, 2000, and now abandoned. It also is designated a continuation-in-part of 09/504,783, filed on February 15, 2000 ( the 783 application ), which is a continuation-in-part of 09/429,643, filed on October 29, The 210, 783 and 643 applications also claim priority to 60/106,261, filed October 30, 1998 and 60/137,704, filed June 7,

11 Claims 1 and 14 of the 009 patent are independent claims. Claims 2-8 and depend directly or indirectly from claim 1, and claims and depend directly or indirectly from claim 14. Claims 2-8, 10-13, and cannot enjoy an effective filing date earlier than that of claims 1 and 14, respectively, from which they depend. Claims 1 and 14 of the 009 patent rely on information found only in the 783 application. For example, claim 1 of the 009 patent specifies a network device comprising at least one processor configured to execute an application program to enable the network device to send a domain name service (DNS) request and receive, following interception of the DNS request (emphasis added). Claim 14 specifies a method executed by a first network device comprising sending a domain name service (DNS) request and receiving, following interception of the DNS request (emphasis added). No application filed prior to the 783 application mentions the terms domain name, domain name service or DNS request, much less provide a written description of devices or methods corresponding to the 009 patent claims. In proceedings involving the related 135, 504, 151, 211, 274 and 697 patents, Patent Owner has not disputed that claims reciting a domain name or domain name service are not entitled to an effective filing date prior to February 15, See, e.g., Patent Owner Preliminary Oppositions in IPR , , ,

12 to , , , , and , as well as IPR , , , , and ; see also Inter Partes Reexamination Nos. 95/001,682, 95/001,679, 95/001,697, 95/001,714, 95/001,788, and 95/001,789. Accordingly, the effective filing date of the 009 patent claims is no earlier than February 15, D. The Person of Ordinary Skill in the Art A person of ordinary skill in the art in the field of the 009 patent would have been someone with a good working knowledge of networking protocols, including those employing security techniques, as well as computer systems that support these protocols and techniques. The person also would be very familiar with Internet standards related to communications and security, and with a variety of client-server systems and technologies. The person would have gained this knowledge either through education and training, several years of practical working experience, or through a combination of these. Ex E. Claim Construction In this proceeding, claims must be given their broadest reasonable construction in light of the specification. 37 CFR (b). The 009 patent shares a common disclosure and uses several of the same terms as the 697, 274, 180, 151, 504, and 211 patents with respect to which Patent Owner has advanced constructions. Also, if Patent Owner contends terms in the claims should 8

13 be read as having a special meaning, those contentions should be disregarded unless Patent Owner also amends the claims compliant with 35 U.S.C. 112 to make them expressly correspond to those contentions. See 77 Fed. Reg at II.B.6 (August 14, 2012); cf. In re Youman, 679 F.3d 1335, 1343 (Fed. Cir. 2012). In the constructions below, Petitioner identifies representative subject matter within the scope of the claims, read with their broadest reasonable interpretation. Petitioner expressly reserves its right to advance different constructions in any district court litigation, which employs a different claim construction standard. 1. domain name service (DNS) request Each independent claim recites the term domain name service (DNS) request. The 009 patent does not define the term domain name service (DNS) request. In IPR involving the related 151 patent, the Board has interpreted DNS request to mean a request for a resource corresponding to a domain name. Paper 9 at 6 (Oct. 15, 2014). This is consistent with the 009 patent specification, which provides examples of DNS requests seeking to obtain a network address corresponding to a web name or domain name. Ex at 39:39-45, 40:52-58; see also Ex at 85. Accordingly, the broadest reasonable interpretation of domain name service (DNS) request is a request for a resource corresponding to a domain name. Ex at interception of the DNS request 9

14 Each independent claim requires interception of a DNS request. In a related proceeding involving the 697 patent, the Board interpreted the phrase intercepting... a request as including receiving a request pertaining to a first entity at another entity. IPR , Paper 15 at 13 (May 14, 2014). The Board further explained that intercepting a request involves receiving and acting on a request, the request being intended for receipt at a destination other than the destination at which the request is intercepted. Id. at 12. The Board s construction is consistent with the 009 patent specification. Ex at 67. The 009 patent does not expressly define interception of a DNS request, but uses the term intercepting as meaning receiving a request at a device other than the device specified in the request. Ex at 68, 86. For example, the specification explains that a DNS proxy 2610 intercepts all DNS lookup functions to examine whether access to a secure site has been requested. Ex at 40:39-45, Figs. 26 & 27. The specification also shows the requests are routed to the DNS proxy instead of a DNS server 2609, which ordinarily would receive and resolve the domain name in the request. Id. at 39: Because the DNS proxy and DNS server as described as separate entities, the 009 patent uses the term intercept as meaning receipt of a message by a proxy server instead of the intended destination. Accordingly, the broadest reasonable interpretation of the term interception of the DNS request includes receiving a DNS request 10

15 pertaining to a first entity at another entity. Ex at encrypted communication link Each independent claim recites the term encrypted communication link. The 009 patent does not define encrypted communication link. The Board has not interpreted this term in proceedings involving related patents, but has construed the terms secure communication link and virtual private network communication link. Specifically, in IPR involving the related 697 patent, the Board interpreted secure communication link to mean a transmission path that restricts access to data, addresses, or other information on the path, generally using obfuscation methods to hide information on the path, including, but not limited to, one or more of authentication, encryption, or address hopping. Paper 15 at 10 (May 4, 2014). Also, in IPR involving the related 180 patent, the Board interpreted virtual private network communication link to mean a transmission path between two devices that restricts access to data, addresses, or other information on the path, generally using obfuscation methods to hide information on the path, including, but not limited to, one or more of authentication, encryption, or address hopping. Paper 11 at 6-7 (Sept. 3, 2014). Like the 697 and 180 patent claims, the 009 patent claims require communication over a communication link, but the 009 claims specify that the link is encrypted. All three patents generally claim DNS-based methods and 11

16 systems for establishing secure communications or VPNs. The common specification explains that the DNS-based VPN scheme permits computers to privately communicate with each other over a public network by protecting their anonymity. See Ex at 39: In other words, the communication link resulting from implementation of the claimed DNS-based methods and systems must be a transmission path that restricts access to data, addresses, or other information on the path, including, but not limited to, one or more of authentication, encryption, or address hopping. Ex at 88-90; see also IPR , Paper 15 at 10 (May 4, 2014); IPR , Paper 11 at 6-7 (Sept. 3, 2014). Thus, an encrypted communication link is a type of secure communication link that uses encryption. Ex at 90. The broadest reasonable interpretation of encrypted communication link in the context of the 009 claims is a transmission path that restricts access to data, addresses, or other information on the path at least by using encryption. Ex at provisioning information Each independent claim recites the term provisioning information. The 009 patent does not define provisioning information. The only discussion in specification concerning provisioning states that VPN gatekeeper 3314 provisions computer 3301 and secure web server computer 3320, or a secure edge router for server computer 3320, thereby creating the VPN. Ex at 52:

17 (emphasis added). The 009 specification also explains that, after a DNS proxy determines that access a secure site has been requested, it transmits a message to a gatekeeper requesting creation of a virtual private network. Id. at 40:45-48, 41: The gatekeeper returns a resolved IP address and IP address hopblocks to be used by the client computer and the target site to communicate securely. Id. at 40:48-57; see also Ex at 74. In IPR involving the 180 patent, whose claims recite provisioning information for a virtual private network rather than encrypted communications channel, the Board interpreted provisioning information as information that is provided to enable or to aid in establishing communications to occur in the VPN. Paper 11 at 11 (Sept. 3, 2014). The 009 patent disclosure only describes use of DNS systems to establish VPN connections between devices, and it does not describe creating encrypted channels that are isolated from a VPN. See Ex at 39:36-38, 51:31-33, 52:9-10, Fig. 37. Examples of provisioning information in the 009 patent includes IP address hopblocks or other data that enables or to aids in establishing communications in a VPN where the VPN uses encryption. Ex at 40:45-57: Ex at 75. Therefore, the broadest reasonable interpretation of the term provisioning information in the context of the 009 claims is information that enables communication in a virtual private network, where the virtual private network uses encryption. Ex at

18 5. secure communications service Each independent claim recites the term secure communications service. The 009 patent does not expressly define this term. In IPR involving the related 697 patent, the Board interpreted the term secure communications service as the functional configuration of a network device that enables it to participate in a secure communication link with another network device. Paper 15 at 10 (May 14, 2014). Secure communication link in turn has been interpreted by the Board to mean a transmission path that restricts access to data, addresses, or other information on the path, including, but not limited to, one or more of authentication, encryption, or address hopping. IPR , Paper 15 at 10 (May 4, 2014). This is consistent with the 009 patent specification, which uses the phrase secure communications service in a manner that indicates the term simply refers to the capacity of two computers to participate in a secure communications link. Ex at 95. For example, the 009 patent explains that a first network device communicat[es] at least one of video data and audio data with the second network device using the secure communications service via the secure communication link. Ex at 8:28-31, 8: Therefore, the broadest reasonable construction of the term secure communications service should encompass the functional configuration of a network device that enables it to participate in a 14

19 secure communications link with another computer or device. Ex at indication Each independent claim requires the first network device to receive an indication that the second network device is available for the secure communications service. The 009 specification does not define the term indication. In IPR involving the related 504 patent, the Board interpreted the term indication to mean something that shows the probable presence or existence or nature of. Paper 9 at (Oct. 15, 2014); see also IPR , Paper 9 (Oct. 15, 2014) (involving the related 211 patent). This is consistent with the 009 specification, which explains that, after a DNS proxy determines access to a secure site has been requested and forwards the request to a gatekeeper, the client receives a resolved address and is provisioned information such as hopblocks to be used for secure communication with the secure target site. Ex at 40:39-57; Ex at 99. In some scenarios, the DNS proxy may return a host unknown error message, such as if the user lacks appropriate credentials. Ex at 40: Although a web browser may show an icon indicating a secure connection has been established (id. at 52:37-40), the 009 specification contains no discussion of a client receiving a message explicitly confirming that the secure target site is available for secure communications. Ex at 100. Accordingly, the broadest reasonable interpretation of the term 15

20 indication should encompass something that shows the probable presence or existence or nature of. Ex at virtual private network communication link Dependent claims 8 and 21 specify that the encrypted communication link is part of a virtual private network communication link. The 009 patent does not provide an explicit definition for virtual private network communication link. In IPR involving the related 180 patent, the Board interpreted virtual private network communication link to mean a transmission path between two devices that restricts access to data, addresses, or other information on the path, generally using obfuscation methods to hide information on the path, including, but not limited to, one or more of authentication, encryption, or address hopping. Paper 11 at 6-7 (Sept. 3, 2014). The Board also read the 180 patent as employing various levels of security in a VPN that do not require encryption, such as authentication, or information or address hopping. Id. at 7. This is consistent with the 009 specification, which explains that software module 3309 accesses secure server 3320 through VPN communication link 3321 and the communication link 3321 is shown as only the portion of the path between computer 3301 and server 3320 that is over network Ex at 52:35-36, Fig. 33; Ex at 104. Accordingly, the broadest reasonable interpretation of virtual private network communication link is a transmission path between two 16

21 devices that restricts access to data, addresses, or other information on the path, generally using obfuscation methods to hide information on the path, including, but not limited to, one or more of authentication, encryption, or address hopping. Ex at domain name Dependent claims 7 and 20 recite the term domain name. The 009 patent does not define domain name. A domain name would be understood by a person of ordinary skill to be a hierarchical sequence of words in decreasing order of specificity that corresponds to a numerical IP address. Ex at 70. A more general description of domain name has been advanced by Patent Owner in other proceedings; namely, a name corresponding to an IP address. See, e.g., Ex at Both definitions are reasonable; thus the broadest reasonable interpretation of domain name is a name corresponding to an IP address. Ex at modulation Dependent claims 4, 5, 17 and 18 recite the term modulation. The term modulation is not defined in the 009 patent. In IPR involving the 697 patent, the Board interpreted modulation to include the process of encoding data for transmission over a medium by varying a carrier signal. Paper 15 at 14 (May 14, 2014). This is consistent with the 009 patent and the 17

22 understanding of a person of ordinary skill in the art. Ex at For example, the specification explains that transmission paths may comprise logically separate paths contained within a broadband communication medium (e.g., separate channels in an FDM, TDM, CDMA, or other type of modulated or unmodulated transmission link). Ex at 35: A person of skill would understand unmodulated and modulated to refer to whether data is encoded for transmission over a physical medium by varying or modulating a carrier signal. Ex at 80. Any data transmitted via a modem (i.e., a modulatordemodulator device) is modulated. Id. Similarly, any data transmitted via a cellular network is modulated. Id. Accordingly, the broadest reasonable interpretation of modulation is the process of encoding data for transmission over a medium by varying a carrier signal. Ex at 108. IV. Analysis of the Patentability of the 009 Patent The 009 patent has two independent claims (claims 1 and 14), each of which specifies the same operative steps. See III.A.2. Claim 14 is representative, and defines a process for establishing a secure communications service via an encrypted communications link between a first network device and a second network device based on intercepting a request to look up a network address of the second device. A. Summary of Prior Art to the 009 Patent 18

23 19 Well before 2000, there was an extensive amount of literature and other prior art describing techniques for establishing secure communication links, including VPNs. A person of ordinary skill would have been familiar with this prior art, and would have found it to render obvious the claimed methods for the reasons set forth below in IV.B-IV.D. A brief overview of the prior art and what it taught the person of ordinary skill is provided in this section. 1. Overview of Aventail (Ex. 1009), Aventail User s Guide (Ex. 1010) and Aventail Extranet Guide (Ex. 1011) a) Nature of the Aventail Documents The Aventail Connect v3.01/v2.51 Administrator s Guide (Ex. 1009, Aventail ), Aventail Connect v3.01/v2.51 User s Guide (Ex. 1010, Aventail User s Guide ), and Aventail ExtraNet Center v3.0 Administrator s Guide (Ex. 1011, Aventail Extranet Guide ) are documentation for software (version 3.0 of a product called Aventail Extranet Center) that were distributed together. Aventail is a printed publication that was distributed to the public without restriction no later than January 31, Enclosed with this request are declarations under 37 CFR 1.32 from three individuals having personal knowledge that Aventail was publicly distributed no later than January 31, The declarations were previously filed in inter partes reexamination 95/ In Exhibit 1023, Christopher Hopen, formerly of Aventail Corporation, explains that Aventail was distributed with Aventail Extranet Center v3.0, which was announced in August of 1998, and

24 shipped to customers between December 1998 and January of He further explains that Aventail was shipped with the installation discs for the Aventail Extranet Server v3.0 and Aventail Connect v3.01 software products. In Exhibit 1043, Michael Fratto, Editor of Network World, testifies that he received Aventail no later than the end of October of In Exhibit 1022, James Chester, formerly of IBM, testifies that he received Aventail no later than the end of December of 1998, and subsequently distributed this document to customers and IBM employees in connection with deployment of VPN solutions to these entities and individuals in mid-january of In view of this evidence, the publication date of Aventail is no later than January 31, 1999, and, accordingly, Aventail is prior art to the claims of the 009 patent under 35 U.S.C. 102(b). An summary of the scheme disclosed by Aventail can be found in Ex Aventail describes the configuration and operation of client and server components of the Aventail VPN system. See, e.g., Ex at The documents cross-reference each other, which is logical as they are describing two components of a single system that are designed to work together (i.e., the Aventail Connect client running on the client computer, and the Aventail Extranet Server running on a server computer). See, e.g., Ex at 3, 5, 6, 11, 14, 19, 36-40, 44, 46, 48, 50, 52, 55-56, 57, 61-71, 76-77, 79-83, 92-94, 96, 99, Given the close interrelationship between the documents, the fact that were distributed 20

25 together in a single product, and their extensive cross-referencing of the other document, each of the Aventail documents incorporates the others by reference. Ex at 145. b) Components of the Aventail scheme Aventail discloses a scheme for creating virtual private networks by establishing encrypted and authenticated connections between a client computer running the Aventail Connect software and a private network protected by a proxy server running Aventail Extranet server software. Ex at 12, 72; Ex at Aventail provides an example in which mobile computers running Aventail Connect establish a VPN (virtual private network) with a remote network by communicating over an encrypted link with a proxy server running Aventail Extranet server software: 21

26 Ex at 72-73; Ex at , 182. c) Incorporation of Aventail Into A Client Computer To provide VPN functionality to software on user devices, Aventail Connect inserts itself into the networking subsystem of the client computer. As Aventail explains, Aventail Connect slips in between Winsock and the underlying TCP/IP stack. Aventail Connect can change data (compressing it or encrypting it, for example) before routing it to the TCP/IP stack for transport over the network. Ex at 9; Ex at d) Handling Requests A flowchart (prepared for the purposes of this Petition) summarizing Aventail s handling of requests can be found in Exhibit 1005 at paragraph 218. See also id The process of communicating with a remote host starts with an application on a client computer running Aventail Connect requesting to lookup the network address associated with a domain name. For example, if a user enters into a web-browser application running on a client 22

27 computer, the web-browser will send a request to lookup the network address associated with to establish a network connection with the computer identified as Ex at 209. Aventail discloses two configuration options for Aventail Connect to handle this request. In one configuration, Aventail Connect consults a table of redirection rules to determine whether the request corresponds to a device on a remote network and must be proxied. See, e.g., Ex at 10; see also id. at 8-9, To do so, Aventail Connect compares the target of the request with a table that represents the remote hosts that Aventail Connect knows are available by way of an Aventail Extranet server. See, e.g., Ex at If the request relates to a host determined to be available by way of an Extranet server then Aventail Connect proxies that request to the Extranet server. Id. Otherwise Aventail Connect allows the request to be handled by the client computer s operating system. Id. In a second configuration where the client is configured to proxy all requests (rather than evaluating them on the client), Aventail Connect routes all requests to an Aventail Extranet server for handling and resolution. Ex at 61; see also Ex at 12. In this configuration, the server will receive the requests, and resolve the host name in the request if the request specifies one. Ex at 61; see also Ex at 12; Ex Regardless of configuration, if a request contains a domain name to be 23

28 proxied to the Extranet server (e.g., because the domain name matches an entry in a table of entries specifying hosts accessible via the Extranet server), Aventail Connect flags the request by inserting a false DNS entry called a HOSTENT, as the network address, into the response to the request to lookup the domain name. See Ex at 11-12; Ex The HOSTENT entry is recognized by the Aventail Connect client later when a connection request is sent. Id. Once the DNS query has been resolved and the requesting application has the network address for the host with which the application wishes to communicate, the client computer running Aventail Connect will send a connection request that includes this network address. See Ex at 12; Ex If that network address is a false entry that Aventail Connect provided, Aventail Connect will proxy the connection request to the Extranet server. See Ex at 12; Ex For these connections, Aventail Connect can be configured to establish an encrypted and authenticated connection that enables the application to securely communicate with the remote host. See Ex at 12; Ex , e) Establishing a Secure Connection Aventail explains that after determining whether the domain name lookup request corresponds to a remote host that is available for a secure communications service, the client computer will receive various parameters to establish an 24

29 encrypted connection. Ex at In one configuration, Aventail will encrypt communications according to a known encryption standard called Secure Sockets Layer (SSL). Ex at 12, 73, 110; Ex For example, Aventail explains that the Extranet server can be configured to send an SSL certificate to the client computer which uses the SSL certificate to verify the identity of the Extranet server. See Ex at 47; see also Ex at The Extranet server also sends a selection of the encryption method that can be used to the client computer. See Ex at 51. Aventail also explains that the client computer performs a TCP handshake. See Ex at 8; Ex at 210, 238. A person of ordinary skill in the art would have known that this handshake is specified by the TCP standard and would have understood Aventail s TCP-handshake disclosure to mean that the client computer will receive a synchronization packet and an acknowledgement packet. See Ex ; Ex at A person of ordinary skill would have understood packets contain sequence numbers that are parameters necessary to establish TCP communications. See Ex at 27-28; Ex Aventail explains that client computers also can also perform a SOCKSnegotiation. Ex at 12; Ex This negotiation involves authentication, with the Aventail client providing a list of authentication methods, and the server selecting an authentication method to use. Ex at 12; Ex

30 242. Aventail also explains that the SOCKS negotiation entails Aventail Connect providing a proxy request to the Extranet server. Ex at 12; Ex A person of ordinary skill in the art would have understood that the SOCKS 5 standard specifies this negotiation, and according to standard, if the client computer is allowed access to the requested remote host, the Extranet server will send a succeeded response to the client that provides the BIND network address and BIND network port to which the client computer should send its encrypted communications. See Ex ; Ex at 5-6. f) Using Multiple Proxies Another feature of Aventail s scheme is its multiproxy functionality, which allows routing of traffic through multiple firewalls or proxies, rather than through a single Aventail Extranet Server. Ex at 59-67; Ex Aventail explains that Aventail Connect can be configured to specify one or more intermediary proxies through which communications can be routed. Ex at After defining the final destination and the extranet server locations, one or more intermediary proxy servers could be added (i.e., a destination ). Ex at 59-62; Ex All or some of the traffic from the client could be routed through each destination, based on configuration. Ex at 59-62; Ex Aventail also describes another routing scheme used by client computers 26

31 running Aventail Connect called proxy chaining. Ex at 63-64; Ex In this scheme, the client computer running Aventail Connect is configured to send traffic to a specified intermediary proxy server. See Ex at That server then forwards the traffic on to one or more subsequent proxy servers. Id. The Aventail Connect client computer authenticates the connection to the first intermediary which would in turn authenticate to the next proxy server, and so on. See id. at 63. Again, the information being sent via these connections may be encrypted. See, e.g., Ex at 63. g) Secure Extranet Explorer Aventail describes client computers running Aventail Connect that can dynamically browse and access resources within a private network once a secure connection had been established using a feature called Secure Extranet Explorer (SEE). Ex at ; Ex This functionality allows a remote user who had successfully established a VPN to a private network to access the network resources that user was authorized to, just as [the user] would using the Windows network neighborhood as a local user. Ex at A person of ordinary skill would recognize based on the description of the SEE functionality that the functionality would have needed domain lookup and connection functionality, and looked to the description of the domain lookup and connection functionality in Aventail (e.g., to set up the VPN over which the 27

32 interactions via the SEE functionality are effected). See Ex at 11-12, Overview of RFC 2401 (Ex. 1008) RFC 2401, Security Architecture for the Internet Protocol, ( RFC 2401 ) (Ex. 1008) was published in November 1998, and is prior art to the 009 patent under 35 U.S.C. 102(b). Ex at 1; Ex , The operation and features of the systems described in RFC 2401 are explained in greater detail in Ex at RFC 2401 is an Internet standards track protocol for the Internet community, Ex at 1, and specifies the base architecture for IPsec compliant systems, Ex at 3. Among other things, RFC 2401 discloses a scheme for providing security services for network traffic at the IP layer. Ex at 3, 4; Ex at 346. Two of the security services that RFC 2401 provides are authentication and encryption. RFC 2401 incorporates by reference several other documents to further detail its authentication and encryption mechanisms. See, e.g., Ex at 4, 10; Ex at 347. For example, RFC 2401 refers to IP Security Document Roadmap (RFC 2411) as describing encryption and authentication algorithms for IPsec. Ex at 4, 64. RFC 2401 also refers to RFC 2402, IP Authentication and RFC 2406 IP Encapsulating Security Payload (ESP). Ex at 4, 63, 64; see also Ex at

33 RFC 2401 provides a set of models for implementing encryption using IPsec. Ex at 25-27; Ex at RFC 2401 shows that IPsec can be used to provide encryption over certain portions of a communications path, or can be used to provide end-to-end encryption (meaning that the entire path between the communicating devices is encrypted). Ex at 24-26; Ex at RFC 2401 shows one configuration (case 3) where there is one tunnel between two security gateways such as an edge router, and another encrypted tunnel between the two end devices: Ex at 25. In another configuration (case 4), RFC 2401 shows a host us[ing] the Internet to reach an organization s firewall (SG2) and to then gain access to some server or other machine (H2). Ex at 25; Ex

34 Ex at 26; Ex at 363. This illustration shows that in this configuration the computer accessing the resource on the remote network establishes a direct connection to the resource. 3. Overview of RFC 2543 (Ex. 1013) Request for Comments: 2543; SIP: Session Initiation Protocol ( RFC 2543 ) (Ex. 1013) was published in March 1999, and is prior art under 35 U.S.C. 102(b). Ex at 1; Ex ; RFC 2543 describes a network-based secure video telephony architecture that supports both audio and video conferences. See, e.g., Ex at 1 ( The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol for creating, modifying and terminating sessions with one or more participants. These sessions include Internet multimedia conferences, Internet telephone calls and multimedia distribution. ); id. at 137 ( assume that the caller Alice has included the following description in her INVITE request. It includes an audio stream and two bidirectional video streams. ); Ex RFC 2543 discloses that these multimedia telephony 30

35 sessions may be encrypted. Ex at 54; Ex B. Aventail (Ex. 1009) in View of RFC 2401 (Ex. 1008) Would Have Rendered Claims 1, 6-14, and Obvious Aventail describes systems and methods highly analogous to the systems and methods disclosed in and claimed by the 009 patent. Both describe techniques whereby connection requests made by a client computer are intercepted and evaluated, and where, if a secure destination has been specified in the connection request, a VPN/secure communication link is transparently established between the client computer and the host specified in the request, with network traffic between the client computer and secure network host being automatically encrypted/decrypted. In IV.B.1, below, the claims are compared to Aventail on an element-by-element basis. This analysis shows that the only distinction that may be found to exist between the systems and methods described in Aventail and the claimed systems and methods is the nature of the secure communication link in particular whether the secure communication link provides end-to-end encryption (i.e., data encrypted on the client remains encrypted as it passes through firewall or proxy computers until it arrives at the specified host computer). Even if the Board finds this end-to-end encryption to be a requirement of the claimed systems and methods, it would not render the claims patentable, as a person of ordinary skill would have considered deploying the Aventail system in a manner that provides end-to-end encryption to have been obvious based on the

36 guidance in Aventail with RFC Section IV.B.2, below, provides the explanation of the basis of this conclusion of obviousness. 1. Aventail Describes or, with RFC 2401, Suggests Every Element of Independent Claims 1 and 14 Claims 1 and 14 are defined using the same operative limitations. See III.A.2. Claim 14 is cast in the form of a method for two devices to communicate through a secure communications service and encrypted communications link; claim 1 is cast in the form of a network device configured to execute the steps of the method defined in claim 14. In this analysis, the steps of the method are addressed first, followed by the corresponding system elements of claim 1. a) Claim 1 Preamble: a network device 2 Aventail discloses, among other things, a scheme for creating secure, private communication and data channels over the Internet. See, e.g., Ex at 5. These channels are between a client computer (a network device ) and remote hosts (a second network device ), see e.g., Ex at 12; and can be encrypted, see, e.g., id. at 1, 77; see also id. at Aventail thus shows a method executed by a [first] network device for communicating with a second network device as specified by the preamble in claim 1. 2 Claim 1 specifies a network device while claim 14 specifies a first network device. For simplicity, references to the first network device of claim 14 in this analysis are intended to apply equally to the network device of claim 1. 32

37 b) storage device storing an application program and processor configured to execute the application program Aventail explains that software ( application program ) including Aventail Connect and an operating system (collectively the software ) executes on user workstations and enables these devices to access remote hosts run on users workstations. Ex at 4, 5, 7. Aventail explains the software intercepts connection requests made on the client computer, which specify a remote host either by name or by IP address, and then creates an encrypted channel between the client computer and remote host. See, e.g., Ex , ; Ex at 9-12, 73. Aventail further teaches that communications between the client computer and remote host are routed over the encrypted channel. See, e.g., Ex at 12, 73. Aventail thus shows an application program for a secure communications service as specified in claim 1. Aventail also explains that for the Aventail Connect software to operate the workstations must have a processor ( processor ) and RAM (a storage device ). Ex at 13. Aventail also explains that Aventail Connect is installed on the workstations and that the default installation paths are c:\program Files\Aventail\Connect and c:\connect. Ex at 26. A person of ordinary skill in the art would have understood that this disclosure to mean that Aventail Connect was installed on a hard drive (also a storage device ). Aventail also discloses that some Aventail Connect files may 33

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. APPLE INC. Petitioner,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. APPLE INC. Petitioner, UNITED STATES PATENT AND TRADEMARK OFFICE Paper No. 1 BEFORE THE PATENT TRIAL AND APPEAL BOARD APPLE INC. Petitioner, v. VIRNETX, INC. AND SCIENCE APPLICATION INTERNATIONAL CORPORATION, Patent Owner Title:

More information

PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. 8,301,833 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. 8,301,833 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In the Inter Partes Review of U.S. Patent No. 8,301,833 Trial No.: Not Yet Assigned Issued: October 30, 2012 Filed: September 29, 2008 Inventors: Chi-She

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. APPLE INC. Petitioner,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. APPLE INC. Petitioner, UNITED STATES PATENT AND TRADEMARK OFFICE Paper No. 1 BEFORE THE PATENT TRIAL AND APPEAL BOARD APPLE INC. Petitioner, v. VIRNETX, INC. AND SCIENCE APPLICATION INTERNATIONAL CORPORATION, Patent Owner Title:

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. THE MANGROVE PARTNERS MASTER FUND, LTD.

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. THE MANGROVE PARTNERS MASTER FUND, LTD. NO: IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD THE MANGROVE PARTNERS MASTER FUND, LTD. Petitioner, v. VIRNETX INC., Patent Owner. Case IPR2015- Patent U.S.

More information

Paper Entered: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 9 571-272-7822 Entered: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SYMANTEC CORP., Petitioner, v. FINJAN, INC., Patent Owner.

More information

Paper Entered: June 23, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: June 23, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 11 571 272 7822 Entered: June 23, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD FIELDCOMM GROUP, Petitioner, v. SIPCO, LLC, Patent Owner.

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE. Filing Date: Nov. 27, 2002 CONTROL PLANE SECURITY AND TRAFFIC FLOW MANAGEMENT

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE. Filing Date: Nov. 27, 2002 CONTROL PLANE SECURITY AND TRAFFIC FLOW MANAGEMENT IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In re Patent of: Smethurst et al. U.S. Patent No.: 7,224,668 Issue Date: May 29, 2007 Atty Docket No.: 40963-0006IP1 Appl. Serial No.: 10/307,154 Filing

More information

Paper 13 Tel: Entered: January 16, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper 13 Tel: Entered: January 16, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 13 Tel: 571-272-7822 Entered: January 16, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD DELL INC. Petitioner v. ACCELERON, LLC Patent Owner

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. KYOCERA CORPORATION, and MOTOROLA MOBILITY LLC Petitioners,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. KYOCERA CORPORATION, and MOTOROLA MOBILITY LLC Petitioners, Kyocera PX 1052_1 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD KYOCERA CORPORATION, and MOTOROLA MOBILITY LLC Petitioners, v. SOFTVIEW LLC, Patent Owner. SUPPLEMENTAL

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In re Patent of: Finn U.S. Patent No.: 8,051,211 Issue Date: Nov. 1, 2011 Atty Docket No.: 40963-0008IP1 Appl. Serial No.: 10/282,438 PTAB Dkt. No.: IPR2015-00975

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In re Patent of: Munger et al. U.S. Patent No.: 6,502,135 Attorney Docket No.: 38868-0004IP1 Issue Date: Dec. 31, 2002 Appl. Serial No.: 09/504,783 Filing

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ESET, LLC and ESET spol s.r.o Petitioners

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ESET, LLC and ESET spol s.r.o Petitioners Paper No. UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD ESET, LLC and ESET spol s.r.o Petitioners v. FINJAN, Inc. Patent Owner Patent No. 7,975,305 Issue Date: July

More information

Paper 10 Tel: Entered: October 10, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper 10 Tel: Entered: October 10, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 10 Tel: 571 272 7822 Entered: October 10, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD IRON DOME LLC, Petitioner, v. CHINOOK LICENSING

More information

Paper 7 Tel: Entered: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper 7 Tel: Entered: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 7 Tel: 571-272-7822 Entered: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD EMERSON ELECTRIC CO., Petitioner, v. SIPCO, LLC,

More information

Paper Entered: May 1, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: May 1, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 10 571-272-7822 Entered: May 1, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD ORACLE CORPORATION Petitioners, v. CLOUDING IP, LLC Patent

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. TALARI NETWORKS, INC., Petitioner,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. TALARI NETWORKS, INC., Petitioner, Trials@uspto.gov Paper No. 32 571.272.7822 Filed: November 1, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD TALARI NETWORKS, INC., Petitioner, v. FATPIPE NETWORKS

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. HEWLETT-PACKARD COMPANY, Petitioner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. HEWLETT-PACKARD COMPANY, Petitioner Paper No. Filed on behalf of Hewlett-Packard Company By: Stuart P. Meyer, Reg. No. 33,426 Jennifer R. Bush, Reg. No. 50,784 Fenwick & West LLP 801 California Street Mountain View, CA 94041 Tel: (650) 988-8500

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ServiceNow, Inc. Petitioner. BMC Software, Inc.

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ServiceNow, Inc. Petitioner. BMC Software, Inc. UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD ServiceNow, Inc. Petitioner v. BMC Software, Inc. Patent Owner Filing Date: August 30, 2000 Issue Date: May 17, 2005 TITLE:

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AMAZON.COM, INC., - vs. - SIMPLEAIR, INC.

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AMAZON.COM, INC., - vs. - SIMPLEAIR, INC. Paper No. 1 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AMAZON.COM, INC., - vs. - Petitioner SIMPLEAIR, INC., Patent Owner Patent No. 8,572,279 Issued: October

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Texas Association of REALTORS Petitioner,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Texas Association of REALTORS Petitioner, UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Texas Association of REALTORS Petitioner, v. POI Search Solutions, LLC Patent Owner PETITION FOR INTER PARTES REVIEW OF

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Oracle Corporation Petitioner,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Oracle Corporation Petitioner, UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Oracle Corporation Petitioner, v. Crossroads Systems, Inc. Patent Owner. IPR2015- U.S. Patent No. 7,934,041 PETITION FOR

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. GOOGLE INC., Petitioner,

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. GOOGLE INC., Petitioner, NO: 426476US IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD GOOGLE INC., Petitioner, v. ROCKSTAR CONSORTIUM US LP, Patent Owner. Case IPR2015- Patent U.S. 6,128,298

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. GOOGLE INC., Petitioner,

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. GOOGLE INC., Petitioner, NO: 426479US IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD GOOGLE INC., Petitioner, v. MOBILESTAR TECHNOLOGIES LLC, Patent Owners. Case IPR2015-00090 Patent

More information

Paper Date Entered: September 9, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper Date Entered: September 9, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 18 571-272-7822 Date Entered: September 9, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SAMSUNG ELECTRONICS CO. LTD., SAMSUNG ELECTRONICS

More information

Paper 62 Tel: Entered: October 9, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper 62 Tel: Entered: October 9, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 62 Tel: 571-272-7822 Entered: October 9, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SIPNET EU S.R.O. Petitioner, v. STRAIGHT PATH IP

More information

Paper Entered: July 15, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: July 15, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 14 571-272-7822 Entered: July 15, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SYMANTEC CORPORATION, Petitioner, v. RPOST COMMUNICATIONS

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE Attorney Docket: COX-714IPR IN THE UNITED STATES PATENT AND TRADEMARK OFFICE Inter Partes Review Case No. IPR2015- Inter Partes Review of: U.S. Patent No. 7,907,714 Issued: March 15, 2011 To: Paul G. Baniak

More information

Paper Entered: March 6, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: March 6, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 8 571-272-7822 Entered: March 6, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD HULU, LLC, Petitioner, v. INTERTAINER, INC., Patent Owner.

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. TALARI NETWORKS, INC., Petitioner,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. TALARI NETWORKS, INC., Petitioner, Trials@uspto.gov Paper No. 32 571.272.7822 Filed: November 1, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD TALARI NETWORKS, INC., Petitioner, v. FATPIPE NETWORKS

More information

Paper Date: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Date: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 9 571-272-7822 Date: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SYMANTEC CORP., Petitioner, v. FINJAN, INC., Patent Owner

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Unified Patents Inc., Petitioner v.

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Unified Patents Inc., Petitioner v. UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Unified Patents Inc., Petitioner v. Hall Data Sync Technologies LLC Patent Owner IPR2015- Patent 7,685,506 PETITION FOR

More information

Paper Date: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Date: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 10 571-272-7822 Date: January 14, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SYMANTEC CORP., Petitioner, v. FINJAN, INC., Patent Owner

More information

Paper 22 Tel: Entered: January 29, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper 22 Tel: Entered: January 29, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 22 Tel: 571-272-7822 Entered: January 29, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD RACKSPACE HOSTING, INC., Petitioner, v. CLOUDING

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. HULU, LLC, NETFLIX, INC., and SPOTIFY USA INC.

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. HULU, LLC, NETFLIX, INC., and SPOTIFY USA INC. IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD HULU, LLC, NETFLIX, INC., and SPOTIFY USA INC. Petitioners v. CRFD RESEARCH, INC. Patent Owner U.S. Patent No.

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In the Inter Partes Review of: Trial Number: To Be Assigned U.S. Patent No. 8,237,294 Filed: January 29, 2010 Issued: August 7, 2012 Inventor(s): Naohide

More information

Paper Entered: July 15, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: July 15, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 15 571-272-7822 Entered: July 15, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SYMANTEC CORPORATION, Petitioner, v. RPOST COMMUNICATIONS

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. SAS INSTITUTE, INC. Petitioner. COMPLEMENTSOFT, LLC Patent Owner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. SAS INSTITUTE, INC. Petitioner. COMPLEMENTSOFT, LLC Patent Owner Trials@uspto.gov Paper 9 Tel: 571-272-7822 Entered: August 12, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SAS INSTITUTE, INC. Petitioner v. COMPLEMENTSOFT,

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Cisco Systems, Inc., Petitioner, AIP Acquisition LLC, Patent Owner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Cisco Systems, Inc., Petitioner, AIP Acquisition LLC, Patent Owner UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Cisco Systems, Inc., Petitioner, v. AIP Acquisition LLC, Patent Owner PETITION FOR INTER PARTES REVIEW OF U.S. PATENT

More information

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's

More information

Virtual Private Radio via Virtual Private Network - patent application

Virtual Private Radio via Virtual Private Network - patent application From the SelectedWorks of Marc A Sherman February, 2006 Virtual Private Radio via Virtual Private Network - patent application Marc A Sherman Available at: https://works.bepress.com/marc_sherman/2/ UNITED

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. NETFLIX, INC., Petitioner, COPY PROTECTION LLC, Patent Owner.

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. NETFLIX, INC., Petitioner, COPY PROTECTION LLC, Patent Owner. UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD NETFLIX, INC., Petitioner, v. COPY PROTECTION LLC, Patent Owner. IPR Case No. Not Yet Assigned Patent 7,079,649 PETITION

More information

[MS-RTPRADEX]: RTP Payload for Redundant Audio Data Extensions. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-RTPRADEX]: RTP Payload for Redundant Audio Data Extensions. Intellectual Property Rights Notice for Open Specifications Documentation [MS-RTPRADEX]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

GOOGLE S MOTION TO COMPEL COMPLIANCE WITH PATENT RULE

GOOGLE S MOTION TO COMPEL COMPLIANCE WITH PATENT RULE Aloft Media, LLC v. Google, Inc. Doc. 52 Att. 2 GOOGLE S MOTION TO COMPEL COMPLIANCE WITH PATENT RULE 3-1 Exhibit 1 Dockets.Justia.com ALOFT MEDIA, LLC, IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN

More information

Paper 73 Tel: Entered: May 23, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper 73 Tel: Entered: May 23, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 73 Tel: 571-272-7822 Entered: May 23, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SIPNET EU S.R.O., Petitioner, v. STRAIGHT PATH IP GROUP,

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Paper Date: July 29, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Date: July 29, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 42 571-272-7822 Date: July 29, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD APPLE INC., Petitioner, v. VIRNETX INC., Patent Owner. Case

More information

Kyocera Corporation and Motorola Mobility LLC (Petitioners) v. SoftView LLC (Patent Owner)

Kyocera Corporation and Motorola Mobility LLC (Petitioners) v. SoftView LLC (Patent Owner) DX-1 Petitioners Exhibit 1054-1 Kyocera Corporation and Motorola Mobility LLC (Petitioners) v. SoftView LLC (Patent Owner) CASE IPR2013-00004; CASE IPR2013-00007; CASE IPR2013-00256; CASE IPR2013-00257

More information

Paper No Entered: March 6, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper No Entered: March 6, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper No. 31 571-272-7822 Entered: March 6, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AMAZON.COM, INC. and BLIZZARD ENTERTAINMENT, INC., Petitioner,

More information

Paper Entered: April 20, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: April 20, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 37 571-272-7822 Entered: April 20, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SONY MOBILE COMMUNICATIONS INC., Petitioner, v. SSH COMMUNICATIONS

More information

Paper Date Entered: June 9, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Date Entered: June 9, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 33 571-272-7822 Date Entered: June 9, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD APPLE INC., GOOGLE INC., and MOTOROLA MOBILITY LLC,

More information

Paper Entered: April 29, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: April 29, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 33 571-272-7822 Entered: April 29, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD SECURUS TECHNOLOGIES, INC., Petitioner, v. GLOBAL TEL*LINK

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In re Patent of: Jeffrey C. Hawkins, et al. U.S. Patent No.: 9,203,940 Attorney Docket No.: 39521-0049IP1 Issue Date: December 1, 2015 Appl. Serial No.:

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD LG ELECTRONICS, INC. et al. Petitioners v. STRAIGHT PATH IP GROUP, INC. (FORMERLY KNOWN AS INNOVATIVE COMMUNICATIONS TECHNOLOGIES,

More information

Paper No Entered: January 15, 2019 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper No Entered: January 15, 2019 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper No. 68 571-272-7822 Entered: January 15, 2019 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD GOOGLE LLC, Petitioner, v. SPRING VENTURES LTD.,

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO.

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. Filed on behalf of Apple Inc. By: Lori A. Gordon Sterne, Kessler, Goldstein & Fox PLLC 1100 New York Avenue, NW Washington, D.C. Tel: (202) 371-2600 Fax: (202) 371-2540 UNITED STATES PATENT AND TRADEMARK

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE. In the Inter Partes Review of: Attorney Docket No.:

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE. In the Inter Partes Review of: Attorney Docket No.: IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In the Inter Partes Review of: Attorney Docket No.: 044029-0025 U.S. Patent No. 6,044,382 Filed: June 20, 1997 Trial Number: To Be Assigned Panel: To Be

More information

Paper Date Entered: October 20, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper Date Entered: October 20, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 29 571-272-7822 Date Entered: October 20, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD PARROT S.A. and PARROT, INC., Petitioner, v. DRONE

More information

Paper Entered: February 27, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: February 27, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 39 571-272-7822 Entered: February 27, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD DELL INC., HEWLETT-PACKARD COMPANY, and NETAPP, INC.,

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. In Re: U.S. Patent 7,191,233 : Attorney Docket No

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. In Re: U.S. Patent 7,191,233 : Attorney Docket No UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD In Re: U.S. Patent 7,191,233 : Attorney Docket No. 081841.0106 Inventor: Michael J. Miller : Filed: September 17, 2001

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ITRON, INC., Petitioner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ITRON, INC., Petitioner UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD ITRON, INC., Petitioner v. SMART METER TECHNOLOGIES, INC., Patent Owner Case: IPR2017-01199 U.S. Patent No. 7,058,524

More information

Paper Entered: May 24, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: May 24, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 18 571-272-7822 Entered: May 24, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AVAYA INC. Petitioner v. NETWORK-1 SECURITY SOLUTIONS, INC.

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. MOTOROLA SOLUTIONS, INC. Petitioner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. MOTOROLA SOLUTIONS, INC. Petitioner Trials@uspto.gov 571-272-7822 Paper No. 61 Date Entered: April 24, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD MOTOROLA SOLUTIONS, INC. Petitioner v. MOBILE

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. GOOGLE INC., Petitioner,

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. GOOGLE INC., Petitioner, NO: 439226US IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD GOOGLE INC., Petitioner, v. MOBILESTAR TECHNOLOGIES LLC, Patent Owner. Case IPR2015- Patent U.S. 6,333,973

More information

a'^ DATE MAILED 119/lfi/2004

a'^ DATE MAILED 119/lfi/2004 Â UNITED STATES PATENT AND TRADEMARK OFFICE UNITEl> STATES DEPARTMENT OF COMMERCE Unilcd Slalcs Patent and Trademark Office Additss COMNflSSIONEK FOR I'ATEWTS PO Bin l4ul Ali-xiiinlri;~ Viryniiii22313-I450

More information

Case 1:14-cv UNA Document 1 Filed 01/03/14 Page 1 of 49 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE

Case 1:14-cv UNA Document 1 Filed 01/03/14 Page 1 of 49 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE Case 1:14-cv-00004-UNA Document 1 Filed 01/03/14 Page 1 of 49 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE MPHJ TECHNOLOGY INVESTMENTS, LLC, v. DILLARD S, INC., Plaintiff,

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. AUTOMOTIVE DATA SOLUTIONS, INC., Petitioner,

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. AUTOMOTIVE DATA SOLUTIONS, INC., Petitioner, Trials@uspto.gov Paper 23 571-272-7822 Entered: May 13, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AUTOMOTIVE DATA SOLUTIONS, INC., Petitioner, v. AAMP OF FLORIDA,

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In re Patent of: Howard G. Sachs U.S. Patent No.: 5,463,750 Attorney Docket No.: 39521-0009IP1 Issue Date: Oct. 31, 1995 Appl. Serial No.: 08/146,818 Filing

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ServiceNow, Inc. Petitioner. Hewlett Packard Company Patent Owner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ServiceNow, Inc. Petitioner. Hewlett Packard Company Patent Owner UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD ServiceNow, Inc. Petitioner v. Hewlett Packard Company Patent Owner Filing Date: May 14, 2003 Issue Date: April 12, 2011

More information

Paper Entered: April 6, 2018 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: April 6, 2018 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 17 571-272-7822 Entered: April 6, 2018 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD CISCO SYSTEMS, INC., Petitioner, v. UNILOC USA, INC. and

More information

Paper 17 Tel: Entered: September 5, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper 17 Tel: Entered: September 5, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper 17 Tel: 571-272-7822 Entered: September 5, 2017 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD FACEBOOK, INC., Petitioner, v. SOUND VIEW INNOVATIONS,

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. LG ELECTRONICS, INC. Petitioner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. LG ELECTRONICS, INC. Petitioner UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD LG ELECTRONICS, INC. Petitioner v. ADVANCED MICRO DEVICES, INC. Patent Owner Case No.: IPR2015-00328 Patent 5,898,849

More information

Vivek Ganti Reg. No. 71,368; and Gregory Ourada Reg. No UNITED STATES PATENT AND TRADEMARK OFFICE

Vivek Ganti Reg. No. 71,368; and Gregory Ourada Reg. No UNITED STATES PATENT AND TRADEMARK OFFICE By: Vivek Ganti (vg@hkw-law.com) Reg. No. 71,368; and Gregory Ourada (go@hkw-law.com) Reg. No. 55516 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Mail Stop PATENT

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. FACEBOOK, INC., WHATSAPP INC., Petitioners

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. FACEBOOK, INC., WHATSAPP INC., Petitioners UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD FACEBOOK, INC., WHATSAPP INC., Petitioners v. UNILOC USA, INC., UNILOC LUXEMBOURG, S.A., Patent Owners TITLE: SYSTEM AND

More information

Paper No Date Entered: August 19, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper No Date Entered: August 19, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper No. 8 571-272-7822 Date Entered: August 19, 2013 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD UNIVERSAL REMOTE CONTROL, INC. Petitioner v. UNIVERSAL

More information

RFC 3173 IP Payload Compression Protocol September 2001

RFC 3173 IP Payload Compression Protocol September 2001 Network Working Group Request for Comments: 3173 Obsoletes: 2393 Category: Standards Track A. Shacham Juniper B. Monsour Consultant R. Pereira Cisco M. Thomas Consultant September 2001 Status of this Memo

More information

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise System z Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise SC28-6880-00 System z Integrating the Hardware Management Console s Broadband Remote Support

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE PETITION FOR INTER PARTES REVIEW UNDER 35 U.S.C. 311 AND 37 C.F.R

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE PETITION FOR INTER PARTES REVIEW UNDER 35 U.S.C. 311 AND 37 C.F.R IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In the Inter Partes Review of: Trial Number: To Be Assigned U.S. Patent No. 5,839,108 Filed: June 30, 1997 Issued: November 17, 1998 Inventor(s): Norbert

More information

Paper Entered: December 15, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: December 15, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 36 571-272-7822 Entered: December 15, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD GENBAND US LLC and GENBAND MANAGEMENT SERVICES CORP.,

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Case 2:16-cv Document 1 Filed 11/14/16 Page 1 of 6 PageID #: 1

Case 2:16-cv Document 1 Filed 11/14/16 Page 1 of 6 PageID #: 1 Case 2:16-cv-01268 Document 1 Filed 11/14/16 Page 1 of 6 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS MARSHALL DIVISION SMART AUTHENTICATION IP, LLC, Plaintiff, Civil

More information

United States Court of Appeals for the Federal Circuit

United States Court of Appeals for the Federal Circuit Case: 17-2336 Document: 70 Page: 1 Filed: 11/09/2018 NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit ARISTA NETWORKS, INC., Appellant v. CISCO SYSTEMS,

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO.

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD PETITION FOR INTER PARTES REVIEW OF U.S. PATENT NO. Filed on behalf of Apple Inc. By: Lori A. Gordon Sterne, Kessler, Goldstein & Fox PLLC 1100 New York Avenue, NW Washington, D.C. Tel: (202) 371-2600 Fax: (202) 371-2540 UNITED STATES PATENT AND TRADEMARK

More information

Examination Guidelines for Design (Provisional translation)

Examination Guidelines for Design (Provisional translation) Examination Guidelines for Design (Provisional translation) Japan Patent Office Examination Guidelines for Design The Examination Guidelines for Design aims to ensure consistent interpretation and implementation

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AT&T MOBILITY, LLC AND CELLCO PARTNERSHIP D/B/A VERIZON WIRELESS Petitioners v. SOLOCRON MEDIA, LLC Patent Owner Case

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Emerson Electric Co., Petitioner. IP Co, LLC, Patent Owner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. Emerson Electric Co., Petitioner. IP Co, LLC, Patent Owner UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Emerson Electric Co., Petitioner v. IP Co, LLC, Patent Owner Case U.S. Patent 8,000,314 IP Co, LLC S PATENT OWNER S PRELIMINARY

More information

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Network Working Group J. Peterson Request for Comments: 3764 NeuStar Category: Standards Track April 2004 enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Status of this

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 38 Tel: 571.272.7822 Entered: June 17, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD GOOGLE INC., SAMSUNG ELECTRONICS AMERICA, INC., and

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In re Inter Partes Review of: ) U.S. Patent No. 8,468,174 ) Issued: June 18, 2013 ) Application No.: 13/301,448 ) Filing Date: Nov. 21, 2011 ) For: Interfacing

More information

Paper No Entered: February 22, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE

Paper No Entered: February 22, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE Trials@uspto.gov Paper No. 17 571.272.7822 Entered: February 22, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD GENBAND US LLC and GENBAND MANAGEMENT SERVICES CORP.,

More information

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA TECHNOLOGY PROPERTIES LIMITED LLC and MCM PORTFOLIO LLC, v. Plaintiffs, CANON INC. et al., Defendants. / No. C -0 CW ORDER GRANTING

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. MICROSOFT CORPORATION Petitioner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. MICROSOFT CORPORATION Petitioner Filed on behalf of Petitioners By: Richard D. Mc Leod (Reg. No. 46,921) Rick.mcleod@klarquist.com Klarquist Sparkman LLP One World Trade Center, Suite 1600 121 S.W. Salmon Street Portland, Oregon 97204

More information

Paper No Filed: May 30, 2018 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper No Filed: May 30, 2018 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper No. 37 571.272.7822 Filed: May 30, 2018 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD EMERSON ELECTRIC CO., Petitioner, v. IP CO., LLC, Patent

More information

Case 1:17-cv UNA Document 1 Filed 11/03/17 Page 1 of 11 PageID #: 1 IN THE UNITED STATES DISTRICT COURT DISTRICT OF DELAWARE

Case 1:17-cv UNA Document 1 Filed 11/03/17 Page 1 of 11 PageID #: 1 IN THE UNITED STATES DISTRICT COURT DISTRICT OF DELAWARE Case 1:17-cv-01586-UNA Document 1 Filed 11/03/17 Page 1 of 11 PageID #: 1 IN THE UNITED STATES DISTRICT COURT DISTRICT OF DELAWARE PURE DATA SYSTEMS, LLC Plaintiff, Civil Action No. v. JURY TRIAL DEMANDED

More information

Request for Comments: 3861 Category: Standards Track August 2004

Request for Comments: 3861 Category: Standards Track August 2004 Network Working Group J. Peterson Request for Comments: 3861 NeuStar Category: Standards Track August 2004 Address Resolution for Instant Messaging and Presence Status of this Memo This document specifies

More information

Case 1:18-cv Document 1 Filed 10/08/18 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS AUSTIN DIVISION

Case 1:18-cv Document 1 Filed 10/08/18 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS AUSTIN DIVISION Case 1:18-cv-00851 Document 1 Filed 10/08/18 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS AUSTIN DIVISION UNILOC 2017 LLC and UNILOC LICENSING USA, LLC, v. APPLE INC.,

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. AVOCENT HUNTSVILLE CORP. AND LIEBERT CORP.

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. AVOCENT HUNTSVILLE CORP. AND LIEBERT CORP. UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD AVOCENT HUNTSVILLE CORP. AND LIEBERT CORP., Petitioners v. CYBER SWITCHING PATENTS, LLC Patent Owner Case IPR2015-01438

More information

Paper Entered: March 6, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

Paper Entered: March 6, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD Trials@uspto.gov Paper 66 571-272-7822 Entered: March 6, 2015 UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD BROADCOM CORPORATION, Petitioner, v. WI-FI ONE, LLC, Patent

More information

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD

IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD In the Inter Partes Review of: ) ) Trial Number: To be assigned U.S. Patent No.: 7,126,940 ) ) Attorney Docket

More information