-
VirnetX Inc., et al v. Apple Inc. DC CAFC
- 6:10-cv-00417
- E.D. Tex.
- Filed: 08/11/2010
- Closed: 09/29/2017
- Latest Docket Entry: 09/01/2020
- Judge: Robert W. Schroeder III
- PACER
2
Plaintiffs
6
Defendants
49
Accused
Products
6
Patents-in-Suit
2,607
Days in
Litigation
-
VirnetX Inc., et al v. Apple Inc. DC CAFC
- 6:10-cv-00417
- E.D. Tex.
- Filed: 08/11/2010
- Closed: 09/29/2017
- Latest Docket Entry: 09/01/2020
- Judge: Robert W. Schroeder III
- PACER
Severance To
Causes of Action
Infringement
Willful Patent Infringement
Market Sector
Media Content and Distribution
Assigned Judge
Outcome Summary
Patent Information
-
Validity & Enforceability
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A system for providing a domain name service for establishing a secure communication link, the system comprising: a domain name service system configured and arranged to be connected to a communication network, store a plurality of domain names and
view more
|
Valid
Entry 792 Entry 790 |
8 |
The system of claim 1, wherein the domain name service system is connectable to a virtual private network through the communication network.
|
Valid
Entry 792 Entry 790 |
23 |
The system of claim 1, wherein the domain name service system is configured to authenticate the query for the network address.
|
Valid
Entry 792 Entry 790 |
27 |
The system of claim 1, wherein the domain name service system is configured to enable establishment of a secure communication link between a first location and a second location transparently to a user at the first location.
|
Valid
Entry 792 Entry 790 |
31 |
The system of claim 30, wherein the plurality of application programs comprises items selected from a group consisting of the following: video conferencing, e-mail, a word processing program, and telephony.
|
Valid
Entry 792 Entry 790 |
36 |
A non-transitory machine-readable medium comprising instructions executable in a domain name service system, the instructions comprising code for: connecting the domain name service system to a communication network; storing a plurality of domain
view more
|
Valid
Entry 742 Entry 598 |
37 |
The non-transitory machine-readable medium of claim 36, wherein the instructions comprise code for storing the plurality of domain names and corresponding network addresses including at least one top-level domain name.
|
Valid
Entry 742 Entry 598 |
47 |
The non-transitory machine-readable medium of claim 36, wherein the instructions comprise code for authenticating the query for the network address.
|
Valid
Entry 742 Entry 598 |
51 |
The non-transitory machine-readable medium of claim 36, wherein the domain name service system is configured to enable establishment of a secure communication link between a first location and a second location transparently to a user at the first
view more
|
Valid
Entry 742 Entry 598 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A data processing device, comprising memory storing a domain name server (DNS) proxy module that intercepts DNS requests sent by a client and, for each intercepted DNS request, performs the steps of: (i) determining whether the intercepted DNS
view more
|
Valid
Entry 742 Entry 598 |
13 |
A computer readable medium storing a domain name server (DNS) module comprised of computer readable instructions that, when executed, cause a data processing device to perform the steps of: (i) determining whether a DNS request sent by a client
view more
|
Valid
Entry 742 Entry 598 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A system for providing a domain name service for establishing a secure communication link, the system comprising: a domain name service system configured to be connected to a communication network, to store a plurality of domain names and
view more
|
Valid
Entry 742 Entry 598 |
2 |
The system of claim 1, wherein at least one of the plurality of domain names comprises a top-level domain name.
|
Valid
Entry 742 Entry 598 |
5 |
The system of claim 2, wherein the domain name service system is configured to authenticate the query using a cryptographic technique.
|
Valid
Entry 742 Entry 598 |
16 |
The system of claim 1, wherein the domain name service system is configured to receive the query initiated from a first location, the query requesting the network address associated with a domain name, wherein the domain name service system is
view more
|
Valid
Entry 742 Entry 598 |
21 |
The system of claim 1, wherein the domain name service system comprises a server, wherein the server comprises a domain name database, and wherein the domain name database stores the plurality of domain names and the corresponding network addresses.
|
Valid
Entry 742 Entry 598 |
27 |
The system of claim 1, wherein the domain name service system is configured to enable establishment of a secure communication link between a first location and a second location transparently to a user at the first location.
|
Valid
Entry 742 Entry 598 |
36 |
A machine-readable medium comprising instructions executable in a domain name service system, the instructions comprising code for: connecting the domain name service system to a communication network; storing a plurality of domain names and
view more
|
Valid
Entry 792 Entry 790 |
47 |
The machine-readable medium of claim 36, wherein the instructions comprise code for authenticating the query for the network address.
|
Valid
Entry 792 Entry 790 |
51 |
The machine-readable medium of claim 36, wherein the domain name service system is configured to enable establishment of a secure communication link between a first location and a second location transparently to a user at the first location.
|
Valid
Entry 792 Entry 790 |
Claim | Outcome |
---|---|
All challenged claims |
Valid (102)
Entry 555 |
Claim # | Claim Text | Outcome |
---|---|---|
2 |
The method according to claim 1, further comprising steps of: determining whether a secure communication software module is stored on the first computer in response to the step of enabling the secure communication mode of communication; accessing a
view more
|
Valid
Entry 792 |
17 |
The computer-readable storage medium according to claim 16, further comprising steps of: determining whether a secure communication software module is stored on the first computer in response to the step of enabling the secure communication mode of
view more
|
Valid
Entry 792 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A method of transparently creating a virtual private network (VPN) between a client computer and a target computer, comprising the steps of:</claim-text> (1) generating from the client computer a Domain Name Service (DNS) request that requests an IP
view more
|
Valid
Entry 742 Entry 598 |
3 |
The method of claim 1, further comprising the step of:</claim-text> (4) in response to determining that the DNS request in step (2) is not requesting access to a secure target web site, resolving the IP address for the domain name and returning the
view more
|
Valid
Entry 742 Entry 598 |
7 |
The method of claim 1, wherein step (3) comprises the step of using a gatekeeper computer that allocates VPN resources for communicating between the client computer and the target computer.
|
Valid
Entry 742 Entry 598 |
8 |
The method of claim 1, wherein step (2) is performed in a DNS proxy server that passes through the request to a DNS server if it is determined in step (3) that access is not being requested to a secure target web site.
|
Valid
Entry 742 Entry 598 |
10 |
A system that transparently creates a virtual private network (VPN) between a client computer and a secure target computer, comprising:</claim-text> a DNS proxy server that receives a request from the client computer to look up an IP address for a
view more
|
Valid
Entry 792 Entry 790 |
12 |
The system of claim 10, wherein the gatekeeper computer determines whether the client computer has sufficient security privileges to create the VPN and, if the client computer lacks sufficient security privileges, rejecting the request to create the
view more
|
Valid
Entry 792 Entry 790 |
-
Infringement
Apple Inc.
- 4 Details
Accused Product | Patent # | Claim # | Outcome |
---|---|---|---|
Agile network protocol for secure communications with assured system availability | US 6,502,135 B1 |
1, 3, 7, 8
|
Infringement
Entry 742Entry 598 |
Agile network protocol for secure communications using secure domain namesApple's FaceTime | US 7,418,504 B2 |
1, 2, 5, 16, 21, 27
|
Infringement
Entry 742Entry 598 Entry 1025 |
Establishment of a secure communication link based on a domain name service (DNS) request | US 7,490,151 B2 |
1, 13
|
Infringement
Entry 742Entry 598 |
Agile network protocol for secure communications using secure domain namesApple's FaceTime | US 7,921,211 B2 |
36, 37, 47, 51
|
Infringement
Entry 742Entry 598 Entry 1025 |
Cisco Systems, Inc.
- 4 Details
Accused Product | Patent # | Claim # | Outcome |
---|---|---|---|
10001100130026002600, 2800, 3700, 3800 Series Integrated Services Routers28003000303320037003800 Series Integrated Services Routers3900500 Series TelePresence Systems501G502G504G508G509G525G/525G26900790089009900 Series IP PhonesAnyConnect Secure Mobility Client software application for Apple’s iPhoneASA 5500 Series Adaptive Security AppliancesCisco’s AnyConnect Secure Mobility Client software applicationCisco TelePresence Multipoint SwitchCiusCius, 3200, 3000, 1300, 1100, 1000iPadiPad 2IP CommunicatoriPhone 3GiPhone 3GSiPhone 4GiPod touchIP Phones 3900, 6900, 7900, 8900, 9900Manager Unified CallManagerSIP Proxy ServerSPA 301SPA 301, 303, 501G, 502G, 504G, 508G, 509G, 525G/525G2, SPA962, SPA942, SPA941, SPA932, SPA922, SPA921, SPA901 IP PhonesSPA901 IP PhonesSPA921SPA922SPA932SPA941SPA942SPA962TelePresence Multipoint SwitchUnified Border ElementUnified CallManagerUnified Communications ManagerUnified Communications Manager Business EditionUnified Communications Manager ExpressUnified SIP Proxy | US 6,502,135 B1 |
10, 12
|
No infringement
Entry 792Entry 790 |
17001800190028002900 Series Integrated Services Routers370038003900 Series Integrated Services Routers7200 Series Routers7301 Routers800AnyConnect VPN ClientASA 5500 Series Adaptive Security AppliancesASR 1000 Series RoutersCatalyst 6500 Series Switchescertain PIX Security AppliancesEasy VPN ClientEasy VPN RemoteEasy VPN ServerIntegrated Services Routers 3700, 3800, 3900 SeriesIntegrated Services Routers 800, 1700, 1800, 1900, 2800, 2900 SeriesMaster discsPIX Security AppliancesserversUBR900 | US 6,839,759 B2 |
2, 17
|
No infringement
Entry 792Entry 790 |
100011001300180019002600 Integrated Services Routers2800 Integrated Services Routers2900300032003700 Integrated Services Routers3800 Series Integrated Services Routers39003900 Series Integrated Services Routers500 Series TelePresence Systems69007200 Series Routers7200VXR Routers7301 Routers7600 Series Routers790087088089089009900 Series IP PhonesASR 1000 Series RoutersCatalyst 6500 Series SwitchesCisco IOS softwareCisco TelePresence Multipoint SwitchCiusCius, 3200, 3000, 1300, 1100, 1000Integrated Service Routers 2600, 2800, 3700, 3800Integrated Service Routers Series 870, 880, 890, 1800, 1900, 2900, 3900IOS softwareIP CommunicatorIP Phones 3900, 6900, 7900, 8900, 9900Master discsserversTelePresence Multipoint SwitchUnified CallManagerUnified Communications ManagerUnified Communications Manager Business EditionUnified Communications Manager Express | US 7,418,504 B2 |
36, 47, 51
|
No infringement
Entry 792Entry 790 |
100011001300180019002600280029003000320037003800 Series Integrated Services Routers39003900 Series Integrated Services Routers500 Series TelePresence Systems69007200 Series Routers7200VXR Routers7301 Routers7600 Series Routers79008708808908900and 9900 Series IP PhonesASR 1000 Series RoutersCatalyst 6500 Series SwitchesCisco IOS softwareCisco TelePresence Multipoint SwitchCiusCius, 3200, 3000, 1300, 1100, 1000Integrated Service Routers 2600, 2800, 3700, 3800Integrated Service Routers Series 870, 880, 890, 1800, 1900, 2900, 3900IOS softwareIP CommunicatorIP Phones 3900, 6900, 7900, 8900, 9900TelePresence Multipoint SwitchUnified CallManagerUnified Communications ManagerUnified Communications Manager Business EditionUnified Communications Manager Express | US 7,921,211 B2 |
1, 8, 23, 27, 31
|
No infringement
Entry 792Entry 790 |
-
Damages