throbber

`
`
`
`
`
`
`
`
`Paper No.
`Filed: September 20, 2021
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD. and APPLE INC.,
`Petitioner
`v.
`VIRNETX INC.,
`Patent Owner
`
`
`
`Case IPR2015-010461
`Patent 6,502,135
`
`
`
`
`
`Patent Owner’s Request for Director Rehearing
`
`
`
`
`
`
`1 Apple Inc., who filed a petition in IPR2016-00062, has been joined as a Petitioner
`in the instant proceeding.
`
`

`

`
`
`Case No. IPR2015-01046
`
`
`
`
`
`TABLE OF CONTENTS
`Background ...................................................................................................... 1
`The Remand Decision’s Rationale for Finding that Kiuchi Anticipates
`the Claims Contravenes the Federal Circuit’s Prior Holdings ........................ 3
` A Principal Officer Must Consider This Rehearing Request ........................13
`
`i
`
`
`
`
`
`
`
`

`

`
`
`
`
`Case No. IPR2015-01046
`
`On August 19, 2021, the Federal Circuit issued an order “allowing VirnetX
`
`the opportunity to request Director rehearing.” VirnetX Inc. v. Mangrove Partners
`
`Master Fund, Ltd., Nos. 2020-2271, 2020-2272, Dkt. No. 51 at 3 (Fed. Cir. Aug. 19,
`
`2021). Pursuant to that order, VirnetX hereby requests Director rehearing of the
`
`Final Written Decision on Remand issued July 14, 2020 (“Remand FWD”).
`
`The patent claims at issue are directed to the automatic generation of secure
`
`communications between client and target computers. On a prior appeal, the Federal
`
`Circuit held (based on a prosecution disclaimer to distinguish the prior art) that the
`
`claims require “direct communication,” whereby the client computer itself opens a
`
`connection with the target computer. On remand, the Board failed to heed the
`
`Federal Circuit’s guidance, and held the claims were anticipated by a prior-art
`
`system with no connection between the client and target computers. That material
`
`legal error warrants rehearing by a properly appointed Director.
`
`
`
`Background
`The primary reference in this proceeding is Kiuchi (Ex. 1002). In Kiuchi, a
`
`user agent requests information residing in an “origin server.” Kiuchi at 64-67. Two
`
`entities are interposed between the user agent and origin server and relay information
`
`between them. A “client-side proxy” relays information between a user agent and
`
`the Internet, and a “server-side proxy” relays information between the Internet and
`
`the origin server. Id. at 64. A “C-HTTP name server” facilitates exchange of
`
`
`
`1
`
`

`

`
`encryption keys between the client-side and server-side proxy. Id. at 64-65.
`
`Case No. IPR2015-01046
`
`The Federal Circuit first considered whether Kiuchi could render the ’135
`
`patent claims unpatentable in VirnetX, Inc. v. Cisco Systems, Inc., 767 F.3d 1308
`
`(Fed. Cir. 2014). In affirming a jury finding that it could not, Cisco explained that
`
`Kiuchi did not disclose direct communication required by the claims; “the jury heard
`
`expert testimony that Kiuchi’s client-side and server-side proxies terminate the
`
`connection, process information, and create a new connection—actions that are not
`
`‘direct’ within the meaning of the asserted claims.” Id. at 1323-24.
`
`In the original Final Written Decision issued September 9, 2016 (“Original
`
`FWD”), the Board nonetheless found Kiuchi rendered the challenged ’135 patent
`
`claims unpatentable. The Federal Circuit vacated that decision, holding that
`
`VirnetX’s claims should be construed to “require[] direct communication between
`
`the client and target computers.” VirnetX Inc. v. Mangrove Partners Master Fund,
`
`Ltd., 778 F. App’x 897, 910 (Fed. Cir. 2019). VirnetX’s claims, the court explained,
`
`exclude systems where “the client cannot open a connection with the target itself,”
`
`such as those that only communicate directly with an “intermediate server [that] then
`
`relays the data to [the] target computer.” Id. On remand, in addressing the VPN
`
`limitation,
`
`the Board
`
`found
`
`that Kiuchi nonetheless disclosed “direct
`
`communication” because the user agent generates a request that includes a URL that
`
`identifies the server on which the desired resource resides. Remand FWD at 14-15.
`
`
`
`2
`
`

`

`
`
`Case No. IPR2015-01046
`
` The Remand Decision’s Rationale for Finding that Kiuchi Anticipates
`the Claims Contravenes the Federal Circuit’s Prior Holdings
`In Mangrove, the Federal Circuit ruled that VirnetX had unambiguously
`
`disclaimed indirect-communication VPNs like those in a prior-art system, Aventail.
`
`778 F. App’x at 909. Aventail disclosed “a system in which a client computer
`
`communicates with an intermediate server via a singular, point-to-point connection.”
`
`Id. The “intermediate server then relays the data to a target computer.” Id. Unlike
`
`VirnetX’s invention, VirnetX explained during prosecution, “the computers [in
`
`Aventail] ‘do not communicate directly with each other” because “the client cannot
`
`open a connection with the target itself.” Id. (internal quotation marks omitted).
`
`VirnetX thus “clearly and unmistakably state[d] that . .. [its claims] require[] direct
`
`communication between the client and target computers.” Id. Mangrove thus sets
`
`clear bounds for what qualifies as “direct communication.” The client must be able
`
`to “open a connection with the target itself.” Id. Systems where the client’s
`
`connection is with an “intermediate server” that “relays the data” to the target server
`
`are outside the claims. Id.
`
`Under Mangrove’s claim construction, Kiuchi does not teach the required
`
`“direct communication between a client computer and a target computer.” Kiuchi’s
`
`“client” establishes a “connection ... to a client-side proxy”—not the origin server.
`
`Ex. 1002 at 8. The client and the client-side proxy communicate using unencrypted
`
`HTTP/1.0 communications. Id.; Ex. 2063 at 7. A second “connection is established”
`3
`
`
`
`

`

`
`between the client-side proxy and the server-side proxy. Ex. 1002 at 9. The client-
`
`Case No. IPR2015-01046
`
`side proxy then “forwards” the user agent’s request to the server-side proxy, using a
`
`C-HTTP encryption protocol. Ex. 1002 at 9. The server-side proxy creates a third
`
`connection, to the origin server, and “forward[s]” the user agent’s request using
`
`unencrypted HTTP/1.0. Id. The response is sent back the same way: “An HTTP/1.0
`
`response sent from the origin server to the server-side proxy is encrypted in C-HTTP
`
`format by the server-side proxy, and is forwarded to the client-side proxy. Then, in
`
`the client-side proxy, the C-HTTP response is decrypted and the HTTP/1.0 response
`
`extracted. . .. The resulting HTTP/1.0 response is sent to the user agent.” Id.
`
`The HTTP/1.0 specification makes Kiuchi’s separate connections clear.
`
`Kiuchi’s client is a conventional HTTP/1.0 user agent, and its client-side proxy is a
`
`“HTTP/1.0 compatible proxy.” Ex. 1002 at 8. The HTTP/1.0 specification explains
`
`that, where HTTP requests are made directly between a client and server, there is a
`
`“single connection” between them. Ex. 1014 at 7. Where, however, “one or more
`
`intermediaries” are involved, including a “proxy,” several connections are created.
`
`Id. This is generally how proxies work. The client sends a request to the proxy’s IP
`
`address; the proxy “must accept this incoming connection,” Ex. 1012 at 8; and then
`
`the proxy “attempts to establish a connection to” the final target system or another
`
`proxy, id. at 11. Id. at 7-12.
`
`Kiuchi is also clear that the client-side and server-side proxies rewrite the data
`
`
`
`4
`
`

`

`
`passing through them before forwarding it using a new connection. For example,
`
`Case No. IPR2015-01046
`
`when the client-side proxy receives an HTML document from the origin server, it
`
`“rewrite[s]” the document before being returning it to the user agent.2 Ex. 1002 at
`
`8-9 & Fig. b. The client- and server-side proxies also encrypt and decrypt the data.
`
`“All encryption and decryption occur at the proxies, and the user agent and origin
`
`server receive the relevant decrypted information from their respective proxies.”
`
`Mangrove, 778 F. App’x at 905; see also Ex. 2043 ¶ 58; Ex. 1012 at 3-6 (RFC 1919:
`
`distinguishing between “Direct communication (without a proxy)” and proxy
`
`communication, and declaring that “[t]he functional goal of the proxy is to relay
`
`application data between clients and servers that may not have direct IP
`
`connectivity”); Ex. 2028 at 6 (a proxy “breaks the connection between sender and
`
`receiver”). Kiuchi’s reliance on proxies to relay information by separate, rewritten
`
`requests over multiple point-to-point connections takes it outside the claims’ scope.
`
`
`2 The Board placed weight on testimony that Kiuchi does not expressly discuss
`
`whether image and sound objects are similarly modified. Remand FWD at 17. But
`
`that is a red herring. First, the absence of any discussion of the latter does not negate
`
`the disclosure of the former or somehow “maintain the requirement for direct
`
`communication,” id. Second, the SOCKS server in Aventail did not modify, but
`
`only relayed, the message. Mangrove, 778 F. App’x at 909; Ex. 2036 at 4-5.
`
`
`
`5
`
`

`

`
`
`Case No. IPR2015-01046
`
`Mangrove’s holding that Aventail does not teach direct communication
`
`compels the conclusion that Kiuchi does not either. 778 F. App’x at 909. The
`
`Federal Circuit held that Aventail does not teach direct communication because the
`
`“connection at the socket layer” is between the “client” and the “SOCKS server”;
`
`the SOCKS server “relays that data to a target computer” over a different connection.
`
`Id. A SOCKS server is a proxy. Ex. 2046 at 201; Ex. 1012 at 10. In Kiuchi, the
`
`client is connected to the client-side proxy, and two additional connections are
`
`required to “forward” the data to the origin server and receive data in return. The
`
`Federal Circuit also found it relevant that, in Aventail, the “communications between
`
`the client and target stop at the intermediate SOCKs server.” Mangrove, 778 F.
`
`App’x at 909. Likewise in Kiuchi, connections stop at the client-side and server-
`
`side proxies, which encrypt/decrypt the data and can rewrite the request. Ex. 2043
`
`at ¶ 58. Kiuchi’s communications is even less “direct” than in Aventail, for it uses
`
`two intermediate proxy servers, rather than one.
`
`It is thus not surprising that the Federal Circuit in Cisco upheld the jury
`
`determination that Kiuchi does not feature “direct communication.” 767 F.3d at
`
`1323-24. Cisco found evidence that the “client-side and server-side proxies
`
`terminate the connection, process information, and create a new connection.” Id.
`
`Those “actions,” it held, “are not ‘direct’ within the meaning of the asserted claims.”
`
`Id. While not binding on the Board, Cisco expressly articulated the Federal Circuit’s
`
`
`
`6
`
`

`

`
`view of “direct communication”: sending data through proxies, which terminate the
`
`Case No. IPR2015-01046
`
`connections and forward modified data using new connections and separate
`
`requests/responses, is “not ‘direct’ within the meaning of the claims.” Id.
`
`The Board acknowledged that Kiuchi involves relay of information by proxies
`
`over multiple connections. The Board found that when “Kiuchi’s user agent
`
`generates a request that includes a resource address,” the “client-side proxy
`
`intercepts the request and ... maps the request to the particular server-side proxy that
`
`can access the requested resource.” Remand FWD at 14-15. Instead of connecting
`
`the user agent and origin server directly, the “client-side proxy establishes a
`
`connection with the server-side proxy, which retrieves the resource from the
`
`appropriate origin server and returns it to the client-side proxy, which in turn returns
`
`the resource to the user agent.” Id. at 15. The Board’s finding that Kiuchi lacks a
`
`single “connection” from the client to the origin server, and instead relies on proxies
`
`to relay information across multiple separate connections, id., should have ended the
`
`inquiry. Under Mangrove, those features of Kiuchi defeat direct communication.
`
`The Board reached the opposite conclusion by effectively revisiting claim
`
`construction, in defiance of Mangrove’s mandate. Id. at 14. It pointed to the
`
`specification’s disclosure of interconnected TARP “routers” that pass data packets
`
`from a source device to a destination device. Id. Because the TARP embodiment
`
`includes routers connected with each other via “multiple links,” the Board reasoned,
`
`
`
`7
`
`

`

`
`“direct communication” encompasses relay of information by proxies over multiple
`
`Case No. IPR2015-01046
`
`connections. Id.
`
`That reasoning is an improper frontal challenge to Mangrove. The Federal
`
`Circuit has ruled that systems like Aventail—where a “client cannot open a
`
`connection with the target itself,” but instead “communicates with an intermediate
`
`server” that “relays the data to a target computer”—fall outside the claims.
`
`Mangrove, 778 F. App’x at 910. Under the Board’s reading of the claims, however,
`
`such systems are not excluded. Indeed, Aventail—the very reference that gave rise
`
`to the prosecution history disclaimer this Court identified in Mangrove—would
`
`feature direct communication under the Board’s construction, since Aventail’s
`
`“SOCKS server” “relays” data received on one connection to a target through a
`
`second connection. Id. The Board’s only task on remand was to apply the Federal
`
`Circuit’s construction to Kiuchi, to determine whether it disclosed a single direct
`
`connection between client and target, or multiple connections via intermediaries. Id.
`
`The Board was not entitled to reassess the “scope of the claims,” Remand FWD at
`
`14, to determine whether the claims could somehow be read to encompass systems
`
`with multiple connections that the Federal Circuit had already ruled out. See AFG
`
`Indus, Inc. v. Cardinal IG Co., 375 F.3d 1367, 1372 (Fed. Cir. 2004).
`
`The Board’s reasoning was infirm in any event. The Board incorrectly
`
`equated use of multiple TARP routers with Kiuchi’s multiple “connections” between
`
`
`
`8
`
`

`

`
`computers. TARP is a packet-routing protocol that, like the IP protocol, operates at
`
`Case No. IPR2015-01046
`
`or below the network layer of Internet communications. Ex. 1001 at 10:63-11:43;
`
`Ex. 1037 at 48 (“router” definition). End-to-end “connections” between computers
`
`are formed at a higher layer, the transport layer, typically using the TCP protocol.
`
`Id. at 54 (TCP); Ex. 1002 at 10-11 (Kiuchi discussing TCP connections between
`
`proxies); Ex. 1014 at 8 (“HTTP communication generally takes place over TCP/IP
`
`connections.”); Ex. 1012 at 2-4, 8. Data packets on the Internet are passed from one
`
`router to another until reaching the final destination. TARP adds security using
`
`“specialized TARP routers” that otherwise are “similar in function to regular IP
`
`routers.” Ex. 1001 at 3:1-3, 7:40-49, Fig. 2. TARP routing does not affect how
`
`computers form connections or engage in direct or indirect communication. As
`
`VirnetX’s expert attested, and Apple’s counsel had admitted in district court, TARP
`
`routers are just pass-through devices. Ex. 2043 at ¶¶ 19-23; Ex. 1036 at 248-249;
`
`Ex. 2035 at 3-6. Indeed, the Federal Circuit explained in Cisco that “routers” “do
`
`not impede direct communication” because “they do not terminate the connection.”
`
`767 F.3d at 1319-1320; Ex. 1019 at 8 n.2. The proxies used in Kiuchi function
`
`differently from routers, as discussed above.
`
`Rather than address the Federal Circuit construction, the Board pivoted to the
`
`question of direct addressability, noting the statement by VirnetX’s district-court
`
`expert that “‘direct communication refers to direct addressability.’” Remand FWD
`
`
`
`9
`
`

`

`
`at 14 (quoting Ex. 1044 at 51:3-5). But VirnetX’s expert was referring to the client’s
`
`Case No. IPR2015-01046
`
`ability to address packets to a target computer on the Internet, so that it can open a
`
`connection to the target computer. Ex. 1044 at 50:3-51:17; see also Mangrove, 778
`
`F. App’x at 910. VirnetX’s expert in this IPR verified that direct addressability
`
`refers to the addressing of messages for transmission from the client to the target
`
`computer. Ex. 1036 at 232. Direct addressability does not require that the client
`
`specify the target computer’s IP address, see Remand FWD at 16; for example, target
`
`computers may sit on private networks, and messages may be directly addressed to
`
`the network’s public-facing IP address and the target computer’s public transport
`
`address (port), which allows a Network Address Translation router to pass packets
`
`through to the target computer’s internal IP address, see Cisco, 767 F.3d at 1319-20;
`
`Ex. 1044 at 50:3-18. But direct addressability does require a network address so that
`
`the client can itself open a connection with the target computer. Mangrove, 778 F.
`
`App’x at 910; Ex. 1036 at 232.
`
`In Kiuchi, however, the client never has the network address of the origin
`
`server and cannot send IP packets to it. Kiuchi’s client connects only to the client-
`
`side proxy. Ex. 1002 at 8. Conversely, the origin server only ever connects to the
`
`server-side proxy. Id. “From the view of the user agent or client-side proxy, all
`
`resources appear to be located in [the] server-side proxy… .” Ex. 1002 at 9. As
`
`VirnetX’s expert attested, in Kiuchi “a user agent cannot directly address and cannot
`
`
`
`10
`
`

`

`
`connect to the origin server,” Ex. 1036 at 256, “because the client-side proxy and
`
`Case No. IPR2015-01046
`
`the server-side proxy precludes those communications,” id. at 258; see also id. at
`
`231-232, 264.
`
`The Board thought Kiuchi featured “direct addressability” because the user
`
`agent generates a request that includes a URL identifying the requested resource.
`
`Remand FWD at 14-15. But a URL does not enable sending IP packets or creating
`
`a connection to a target computer. Indeed, in Kiuchi, the client-side proxy uses the
`
`URL to look up the IP address of the server-side proxy. Ex. 1002 at 8; see also Ex.
`
`2047 at 25:5-13; Remand FWD at 15. That IP address is what enables the client-
`
`side proxy to establish a connection with the server-side proxy. Ex. 1002 at 8.
`
`The Board’s contrary analysis effectively reads VirnetX’s disclaimer out of
`
`the claims. A resource will be identified in nearly all communication systems, direct
`
`or indirect. Aventail illustrates this point. In Aventail, the initial request from the
`
`client includes a “destination hostname” akin to the URL in Kiuchi’s request. Ex.
`
`2036 at 4-5. But the connection in Aventail is still not direct because “the user
`
`transmits data over a SOCKS connection to the SOCKS server,” which “then,
`
`separately relays that transmitted data to the target” that has the resource identified
`
`by the destination hostname. Id. at 5. The connection in Kiuchi is not direct for the
`
`same reason. In Kiuchi, the user agent only communicates with the client-side
`
`proxy, which communicates with the server-side proxy, which in turn then provides
`
`
`
`11
`
`

`

`
`a separate connection to the origin server that includes the resource identified by the
`
`Case No. IPR2015-01046
`
`URL. A URL (or hostname) may be used in both direct communication, as in
`
`VirnetX’s invention, or indirect communication, as in Aventail and Kiuchi. The
`
`mere fact that a URL identifies “‘the resource that you want’” does not make a
`
`method using multiple connections to communicate with the origin server direct.
`
`See Remand FWD at 16.
`
`The Board also rejected the theory “that Kiuchi does not disclose direct
`
`communication because its user agent does not provide the server-side proxy’s
`
`address.” Id. at 16-17 (citing Paper 105 at 39:6-12). But that is immaterial. VirnetX
`
`never advanced that theory and, in fact, argued that Kiuchi’s involved indirect
`
`communications because requests are only addressed to the server-side proxy’s IP
`
`address. Paper 105 at 39:11-12. Besides, the Board’s conclusion that VirnetX’s
`
`claims “do not require the client computer [to] provide the address of the target
`
`computer” but instead “require only that the client computer generates a request for
`
`‘an IP address corresponding to a domain name associated with the target
`
`computer’” is confused. The direct-communication dispute concerns the VPN
`
`limitation, not the address-request limitation. And in any event the Board cited no
`
`evidence for the proposition that Kiuchi’s user agent ever directly addresses the
`
`origin server, much less that a URL satisfies direct addressability. In fact, Apple’s
`
`
`
`12
`
`

`

`
`expert in the district court trial admitted at deposition that the user agent did not
`
`Case No. IPR2015-01046
`
`directly address the origin server. Ex. 2048 at 60:8-63:14.
`
`Notably, unlike Kiuchi, the TARP routing encryption protocol described in
`
`the ’135 patent
`
`is compatible with direct addressing.
`
` In TARP-based
`
`communication, the IP address of the final destination (i.e., the “true destination”)
`
`for a packet is included when the communication is initiated by the client. Ex. 1001
`
`at 7:59-8:36. While that IP address is encrypted, its very presence is what enables
`
`the packet to be routed to the final destination. Id. at 7:59-8:36; see also Cisco, 767
`
`F.3d at 1318-20 (recognizing that each TARP packet includes the true destination,
`
`and that direct addressability is consistent with the use of firewalls and routers).
`
` A Principal Officer Must Consider This Rehearing Request
`VirnetX’s rehearing request cannot be decided until a new Director is
`
`appointed and confirmed, as there currently is no officer who can issue a final
`
`decision. In United States v. Arthrex, Inc., 141 S. Ct. 1970, 1980, 1987 (2021), the
`
`Supreme Court held that inferior officers “lack[] the power under the Constitution
`
`to finally resolve” patentability questions, and “must be ‘directed and supervised . . .
`
`by others who were appointed by Presidential nomination with the advice and
`
`consent of the Senate.’” “Only an officer properly appointed to a principal office
`
`may issue a final decision binding the Executive Branch.” Id. at 1985. The Court
`
`thus held that a properly appointed principal officer—namely, “the Director”—must
`
`
`
`13
`
`

`

`
`have an opportunity “to review decisions rendered by APJs.” Id. at 1988.
`
`Case No. IPR2015-01046
`
`
`
`Currently, there is “no principal officer” who can direct and supervise other
`
`Board members and “issue a final decision binding the Executive.” Id. at 1980,
`
`1985. The Senate-confirmed post of Director is vacant. While Commissioner of
`
`Patents Hirshfeld is temporarily performing certain functions and duties of the
`
`Director, he was not “appointed to a principal office” by the President and Senate.
`
`Id. at 1985 (emphasis added). As Commissioner, he was appointed to an inferior
`
`office by the Secretary of Commerce—just like the other Board members who,
`
`Arthrex held, “lacked the power under the Constitution to finally resolve the matter
`
`within the Executive Branch.” Id. at 1987; see 35 U.S.C. §§3(b)(2)(A), (6)(a). Nor
`
`is Mr. Hirschfeld exercising authority delegated by a principal officer under that
`
`officer’s supervision: The Directorship is vacant, so there is no one who could
`
`revoke the delegation or supervise the exercise of delegated authority.
`
`Arthrex’s passing reference to a “remand to the Acting Director,” 141 S. Ct.
`
`at 1987, is not to the contrary. In Arthrex, neither the parties nor the Court addressed
`
`Mr. Hirshfeld’s status or appointment; whether he qualifies as “Acting Director”; or
`
`whether a non-Senate-confirmed officer could fill that role. The Office does not
`
`even assert Mr. Hirshfeld is “Acting Director.” Construing a stray line to permit
`
`someone appointed as an inferior officer to have the final say would be defy the
`
`Court’s express holding that “[o]nly an officer properly appointed to a principal
`
`
`
`14
`
`

`

`
`office may issue a final decision.” Id. at 1985 (emphasis added).
`
`Case No. IPR2015-01046
`
`The Federal Vacancies Reform Act (“FVRA”) also precludes Mr. Hirshfeld
`
`from exercising the Director’s review authority. When a principal office is vacant,
`
`any functions or duties “required by statute to be performed by the [principal] officer
`
`(and only that officer)” may be performed only by “the first assistant to the office”
`
`or someone directed by “the President (and only the President)” to perform them.
`
`5 U.S.C. §§3345(a), 3348(a)-(b); see id. §3347. Final review of Board decisions is
`
`a function or duty only the Director may perform. After Arthrex, the Patent Act
`
`permits “the Director” to singlehandedly “review final PTAB decisions.” 141 S. Ct.
`
`at 1987. But the Act’s prohibition on anyone else doing so “remains operative as to
`
`the other [PTAB] members”—including the Commissioner. Id. The FVRA thus
`
`would allow only “the first assistant” (Deputy Director), or someone so-directed by
`
`“the President,” to exercise the Director’s review authority. 5 U.S.C. §3345(a).
`
`Because Mr. Hirschfeld is neither—he is performing the Director’s functions and
`
`duties in accordance with the succession plan promulgated by the Secretary of
`
`Commerce—any attempted exercise of that authority would be “of no force or
`
`effect.” Id. §3348(d)(1).
`
`Dated: September 20, 2021
`
`
`
`Respectfully submitted,
`
`By: /Joseph E. Palys/
`Joseph E. Palys
`Registration No. 46,508
`Counsel for VirnetX Inc.
`15
`
`
`
`

`

`
`
`
`
`Case No. IPR2015-01046
`
`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. § 42.6(e), I certify that I caused to be served on the
`
`counsel for Petitioners a true and correct copy of the foregoing Patent Owner’s
`
`Request for Director Rehearing by electronic means on the date below at the
`
`following address of record:
`
`Abraham Kasdan
`Wiggin and Dana LLP
`akasdan@wiggin.com
`IP@wiggin.com
`
`James T. Bailey
`jtb@jtbaileylaw.com
`
`Jeffrey P. Kushan
`Scott Border
`Thomas A. Broughan III
`Sidley Austin LLP
`iprnotices@sidley.com
`
`
`Dated: September 20, 2021
`
`
`
`
`
`Respectfully submitted,
`
` /Joseph E. Palys/
`Joseph E. Palys
`Counsel for VirnetX Inc.
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket