Ssl Services, LLC v. Citrix Systems, Inc.

816 F. Supp. 2d 364, 2011 U.S. Dist. LEXIS 106725, 2011 WL 4378070
CourtDistrict Court, E.D. Texas
DecidedSeptember 20, 2011
Docket1:08-cv-00158
StatusPublished
Cited by1 cases

This text of 816 F. Supp. 2d 364 (Ssl Services, LLC v. Citrix Systems, Inc.) is published on Counsel Stack Legal Research, covering District Court, E.D. Texas primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Ssl Services, LLC v. Citrix Systems, Inc., 816 F. Supp. 2d 364, 2011 U.S. Dist. LEXIS 106725, 2011 WL 4378070 (E.D. Tex. 2011).

Opinion

MEMORANDUM OPINION AND ORDER

T. JOHN WARD, District Judge.

I. INTRODUCTION

Plaintiff SSL Services, LLC (“Plaintiff’) filed suit on April 11, 2008, alleging that Defendants Citrix Systems, Inc., and Citrix Online, LLC (collectively, “Defendants”) infringe Plaintiffs U.S. Pat. Nos. 6,061,796 (“the '796 patent”) and 6,158,011 (“the 'Oil patent”). On May 18, 2011, the Court held a claim construction hearing where the parties presented oral arguments regarding the disputed terms. This order will first briefly address the technology at issue in the case and then turn to the merits of the claim construction issues.

II. BACKGROUND OF THE TECHNOLOGY

Generally speaking, the '796 and 'Oil patents are directed to computer networks known as virtual private networks. “A virtual private network (VPN) is a system for securing communications between computers over an open network such as the Internet.” '796 patent, 1:14-16. The '796 and 'Oil patents claim methods and sys *367 terns for securely transmitting files from one computer to the other over publicly accessible networks such as the Internet. The asserted claims are claim 27 of the '796 patent and claims 2, 4 and 7 of the 'Oil patent.

The claimed methods and systems require an authentication and encryption program as part of their security protocol. The claims require that computer files are encrypted using a “session key” before they are transmitted over the Internet. The encrypted files can be sent securely over the public Internet to another computer because the files are unintelligible until they are decrypted. In order to decrypt the files, the receiving computer must have the same session key as the sending computer.

Using claim 27 of the '796 patent as an exemplary claim, the claimed method allows one client computer to send encrypted files to a second client computer over a “multi-tier virtual private network.” The patent refers to the direct communications between the two client computers as peer-to-peer communications. Abstract, Figs. 1A, IB and 6, 1:27-53. The two client computers communicate with a server to generate and recreate the session key. As shown in Figures 3-4 and 6, the claimed VPN includes “a plurality of client computers,” and “a server,” each of which has the ability to communicate over the Internet. In Figure 6, client computers are labeled “SmartGATE VPN Client” and the server is labeled “SmartGATE VPN Server.” Each client computer contains “client authentication software,” “shims” (shown in Figs. 3-4), and “applications with communications capabilities,” (labeled “Apps” and “Peer-to-Peer App”). The claim method starts when an application running on a first client computer attempts to open a communication link to a second client computer by making “function calls and requests for service” to “a lower level set of communications drivers.” These communications drivers are software on the first client computer that allows the computer to open the communication link. See Figs. 2-4. Before the communications drivers can execute the function call, the function call is intercepted by a different software module on the first client computer. The software that intercepts the function call is a “shim.” See, e.g., 6:35-59, 6:66-7:6, 8:23-32, 9:42-49, 10:66-11:14, Figs. 2-4. The interception of the function call causes “an applications level authentication and encryption program” in the first client computer to communicate with the Server and generate a session key. Fig. 3 see, e.g., also 9:42-52 (The shim intercepts a function call and “in response thereto” the “authentication client software initiate^] communications with the authentication server”); 9:53-59; (“session keys generated during the initial communications with the authentication server”); 11:23-27 (“the invention provides for the function calls ... to be intercepted and the initialization procedure routed through channel 61 to the authentication server”). In Figure 6, the session key generation occurs over communications link 60. 11:21-23. Since the claimed method involves communications between two client computers, the second client computer needs to have the same session key as the first client computer so that it can decrypt the encrypted files sent to it by the first computer. Accordingly, the shim on the first computer also intercepts the address of the second computer, and transmits it to the Server. 9:62-67 (“the principal function of shim 50 is to arrange for the destination of [sic] address of the communication to be supplied to ... authentication server”).

After receiving the address of the second client computer, the Server communicates with the second client computer. 9:60-10:8 (“[t]he latter function provides *368 the authentication server with the client address so that the authentication server can establish a secure and authenticated link with the peer application”). This communication link is shown as 63 in Figure 6. 11:22-36. The Server enables the second client computer to “recreate the session key” that was previously generated in steps. 11:24-37 (“In the case of a peer-to-peer application, in which the clients wish to communicate over a direct link 62 .... Server 23 then opens a secured channel 63 ... and transmits information ... which allows the client to recreate the channel 60 session key for use in decrypting communications sent over channel 62”). The session key is used by the first client computer to encrypt files, and the encrypted files are then transmitted to the second client computer. The link between the two client computers is shown as 62 on Figure 6.11:24-37.

The patents-in-suit share the same abstract that states:

A virtual private network for communicating between a server and clients over an open network uses an applications level encryption and mutual authentication program and at least one shim positioned above either the socket, transport driver interface, or network interface layers of a client computer to intercept function calls, requests for service, or data packets in order to communicate with the server and authenticate the parties to a communication and enable the parties to the communication to establish a common session key. Where the parties to the communication are peer-to-peer applications, the intercepted function calls, requests for service, or data packets include the destination address of the peer application, which is supplied to the server so that the server can authenticate the peer and enable the peer to decrypt further direct peer-to-peer communications

As an exemplary claim of the patents-in-suit, claim 27 of the '796 patent is reproduced below:

A method of carrying out communications over a multi-tier virtual private network, said network including a server and a plurality of client computers, the server and client computers each including means for transmitting data to and receiving data from an open network, comprising the steps of:
intercepting function calls and requests for service sent by an applications program in one of said client computers to a lower level set of communications drivers;

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Ssl Services, LLC v. Citrix Systems, Inc.
769 F.3d 1073 (Federal Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
816 F. Supp. 2d 364, 2011 U.S. Dist. LEXIS 106725, 2011 WL 4378070, Counsel Stack Legal Research, https://law.counselstack.com/opinion/ssl-services-llc-v-citrix-systems-inc-txed-2011.