`
`
`
`
`
`
`
`
`Paper No.
`Filed: September 20, 2021
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., and
`BLACK SWAMP IP, LLC,
`Petitioner
`v.
`VIRNETX INC.,
`Patent Owner
`
`
`
`Case IPR2015-010471
`Patent 7,490,151
`
`
`
`
`
`Patent Owner’s Request for Director Rehearing
`
`
`
`
`
`
`1 Apple Inc. and Black Swamp IP, LLC, who filed petitions in IPR2016-00063 and
`IPR2016-00167, respectively, have been joined as a Petitioner in the instant
`proceeding.
`
`
`
`
`
`Case No. IPR2015-01047
`
`
`
`
`
`B.
`
`TABLE OF CONTENTS
`Background ...................................................................................................... 1
`The Board Erred in Declaring the ’151 Patent Claims Unpatentable ............. 3
`A.
`The Board’s Reliance on a Combination of Different Elements
`in Kiuchi Is Improper ............................................................................ 4
`The Board’s Purported Combination Does Not Perform All the
`Recited Steps of the DNS Module ........................................................ 7
`C. Kiuchi Does Not Disclose the Forwarding of a DNS Request to
`a DNS Function ..................................................................................... 8
`The Board’s Obviousness Rulings Are Likewise Defective ...............11
`D.
` The Final Written Decision Should Be Vacated Under Facebook ...............12
` A Principal Officer Must Consider This Rehearing Request ........................13
`
`i
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case No. IPR2015-01047
`
`On August 19, 2021, the Federal Circuit issued an order “allowing VirnetX
`
`the opportunity to request Director rehearing.” VirnetX Inc. v. Mangrove Partners
`
`Master Fund, Ltd., Nos. 2020-2271, 2020-2272, Dkt. No. 51 at 3 (Fed. Cir. Aug. 19,
`
`2021). Pursuant to that order, VirnetX hereby requests Director rehearing of the
`
`Final Written Decision on Remand issued July 14, 2020 (“Remand FWD”).
`
`Claim 13 of U.S. Patent No. 7,490,151, which is representative, recites “a
`
`computer readable medium storing a domain name server (DNS) module comprised
`
`of computer readable instructions that, when executed, cause a data processing
`
`device to perform” three steps relating to the establishment of secure computer
`
`communications. Ex. 1001 (48:18-29) (emphasis added). Originally, the Board
`
`found the claims anticipated by mapping the claim’s DNS module to a name server
`
`in the prior-art reference. But the Federal Circuit rejected that finding. On remand,
`
`the Board mapped the DNS module to a combination of separate elements in the
`
`prior-art reference. But that violates the cardinal anticipation rule that the reference
`
`must disclose the same elements arranged in the same way. Moreover, those
`
`elements in combination do not even perform the three functions of the claimed DNS
`
`module. This and other errors warrant rehearing by a properly appointed Director.
`
`
`
`Background
`The primary reference in this proceeding is Kiuchi (Ex. 1002). In Kiuchi, a
`
`user agent requests information residing in an “origin server.” Kiuchi at 64-67. Two
`
`
`
`1
`
`
`
`
`entities are interposed between the user agent and origin server and relay information
`
`Case No. IPR2015-01047
`
`between them. A “client-side proxy” relays information between a user agent and
`
`the Internet, and a “server-side proxy” relays information between the Internet and
`
`the origin server. Id. at 64. A “C-HTTP name server” facilitates exchange of
`
`encryption keys between the client-side and server-side proxy. Id. at 64-65.
`
`The Federal Circuit first considered whether Kiuchi could render the ’151
`
`patent claims unpatentable in VirnetX, Inc. v. Cisco Sys., Inc., 767 F.3d 1308 (Fed.
`
`Cir. 2014). In affirming a finding that it could not, Cisco found evidence that
`
`“Kiuchi fails to disclose the requirement that the DNS request be ‘sent by a client.’”
`
`Id. at 1324. The Board nonetheless found that Kiuchi rendered the challenged ’151
`
`patent claims unpatentable in the original Final Written Decision dated September
`
`9, 2016 (“Original FWD”). But the Federal Circuit vacated the Original FWD. It
`
`held “[t]he Board could not have found that the client-side proxy corresponds to the
`
`claimed ‘client’ and is also a part of the DNS proxy module, as the claim makes clear
`
`that these are separate components.” VirnetX Inc. v. Mangrove Partners Master
`
`Fund, Ltd., 778 F. App’x 897, 906 (Fed. Cir. 2019). The court also held “the C-
`
`HTTP name server [does not] perform the functions of the claimed DNS proxy
`
`module” because “[t]he C-HTTP name server does not forward a DNS request to a
`
`DNS function.’” Id. at 906-07. And the court found that, “[t]o the extent the Board
`
`intended to rely on different components in Kiuchi for the disclosure of all the
`
`
`
`2
`
`
`
`
`claimed limitations attributed to the ‘client’ or the ‘secure server,’ its finding of
`
`Case No. IPR2015-01047
`
`anticipation is not supported by substantial evidence.” Id. at 907-08.
`
`On remand, the Board found Kiuchi anticipated the claim. It reasoned that a
`
`“combination” of “the client-side proxy and C-HTTP name server, acting together,”
`
`in Kiuchi performed the function of the VirnetX’s DNS module. Remand FWD at
`
`11-12, 14. While the Federal Circuit held that Kiuchi’s C-HTTP name server does
`
`not forward a received DNS request to a DNS function like VirnetX’s DNS module
`
`the Board stated that holding did not preclude it from relying on the “asserted
`
`combination.” Id. at 12. The Board also concluded that the forwarding claim
`
`limitation was met when “the client-side proxy alone forwards the DNS request to a
`
`DNS function when it determines (in conjunction with the C-HTTP name server)
`
`that the request does not correspond to a secure server.” Id. (emphasis added).
`
` The Board Erred in Declaring the ’151 Patent Claims Unpatentable
`Claim 13 recites “a computer readable medium storing a domain name server
`
`(DNS) module comprised of computer readable instructions that, when executed,
`
`cause a data processing device to perform” three steps. Appx210 (48:18-29)
`
`(emphasis added). The first step is “determining whether a DNS request sent by a
`
`client corresponds to a secure server.” Appx210 (48:22-23). “[W]hen the DNS
`
`request does not correspond to a secure server,” the next step is “forwarding the DNS
`
`request to a DNS function that returns an IP address of a nonsecure computer.”
`
`
`
`3
`
`
`
`
`Appx210 (48:24-26). On the other hand, “when the intercepted DNS request
`
`Case No. IPR2015-01047
`
`corresponds to a secure server,” a “secure channel between the client and the secure
`
`server” is “automatically creat[ed].” Appx210 (48:27-29). Nothing in Kiuchi
`
`corresponds to the DNS module that performs the three enumerated limitations. The
`
`Board’s reliance upon a “combination” of Kiuchi’s client-side proxy and C-HTTP
`
`name server does not replicate what is claimed arranged in the same way, and indeed
`
`even that combination does not perform all three limitations.
`
`A. The Board’s Reliance on a Combination of Different Elements in
`Kiuchi Is Improper
`In Mangrove, the Federal Circuit considered whether VirnetX’s DNS module
`
`corresponded to Kiuchi’s C-HTTP name server. Mangrove, 778 F.3d at 906. It held
`
`there was no substantial evidence of anticipation because Kiuchi’s C-HTTP name
`
`server does not perform the second function of VirnetX’s DNS module. The Court
`
`reasoned that, if a DNS request does not correspond to a secure server, Kiuchi’s C-
`
`HTTP name server does not forward it to a DNS function, but instead returns an
`
`error message, and thus cannot be the claimed DNS module. Id. at 906-07.
`
`On remand, the Board pivoted to “rely” on the “combination” of two Kiuchi
`
`components, Remand FWD at 12, arguing that the “client-side proxy …, together
`
`with the C-HTTP name server, maps to the claimed ‘DNS proxy module.’” Id. at
`
`11; see also id. at 12 (relying on “functionality of the combined client-side proxy
`
`and C-HTTP name server”). But the fact that Kiuchi splits the various functions of
`4
`
`
`
`
`
`
`the DNS proxy module among different components (and even then, Kiuchi is
`
`Case No. IPR2015-01047
`
`missing key features) demonstrates that Kiuchi does not anticipate the claims.
`
`The Board found that the combination of the “the client-side proxy and the C-
`
`HTTP server, acting together, determine whether the intercepted DNS request
`
`corresponds to a secure server.” Id. at 14 (emphasis added). The Board declared
`
`that reliance on this “combination” did not run afoul of Mangrove because the Board
`
`did not use the C-HTTP server to satisfy two different claims limitations (unlike the
`
`client-side proxy in the Board’s Original FWD). Id. at 15. Accordingly, the Board
`
`“f[ou]nd that Kiuchi discloses its client-side proxy acting with the C-HTTP name
`
`server as the claimed DNS proxy module ‘determining whether the intercepted DNS
`
`request corresponds to a secure server.’” Id. at 15-16 (emphasis added).
`
`The Board’s reliance on this combination violates the cardinal anticipation
`
`rule that the prior-art reference must disclose “all of the limitations arranged or
`
`combined in the same way as recited in the claim.” Net MoneyIN, Inc. v. VeriSign,
`
`Inc., 545 F.3d 1359, 1371 (Fed. Cir. 2008) (emphasis added). Claim 13 recites a
`
`single computer-readable “domain name server (DNS) module” that comprises
`
`instructions to perform the recited tasks. Kiuchi’s client-side proxy and C-HTTP
`
`name server, however, are not part of the same software or memory “module,” as
`
`the claims require. Instead, Kiuchi’s client-side proxy and C-HTTP name server are
`
`arranged as separate modules where the client-side proxy makes a request to (and
`
`
`
`5
`
`
`
`
`receives a response from) the C-HTTP name server. Ex. 1002 at 8. The Federal
`
`Case No. IPR2015-01047
`
`Circuit previously described the user agent, client-side proxy, server-side proxy, and
`
`the origin server as “different components in Kiuchi.” Mangrove, 778 F. App’x at
`
`907. The same is true of the client-side proxy and C-HTTP name server. The
`
`Board’s finding that Kiuchi—where the secure-communications and DNS functions
`
`are separated and the client-side proxy forwards a domain name request to a C-HTTP
`
`name server for determination of whether the client’s domain name request is
`
`associated with a secure server—anticipates the asserted claims ignores the different
`
`arrangement in those claims. The Board cannot rely on two separate components of
`
`Kiuchi to perform the tasks that the claims ascribe to the DNS module. See Enfish,
`
`LLC v. Microsoft Corp., 822 F.3d 1327, 1342-43 (Fed. Cir. 2016) (claim requiring a
`
`single logical table not anticipated by prior art using two tables).
`
`The Board’s assertion that “[t]he Specification discloses that functionality
`
`may be located in a single computer or may instead by distributed among multiple
`
`computers,” Remand FWD at 14, is irrelevant. Those passages state only that the
`
`DNS proxy 2610 can be implemented on the same or different computer as other
`
`functionality (such as Gatekeeper 2603 or DNS Server 2609)—i.e., the DNS module
`
`can be co-located on the same physical computer with other functionality. See Ex.
`
`1001 at 38:30–50. While the Board is correct “that the claims are not limited to a
`
`particular arrangement of hardware,” Remand FWD at 15 (emphasis added), that
`
`
`
`6
`
`
`
`
`does not mean that two distinct modules/sets of instructions in Kiuchi (client-side
`
`Case No. IPR2015-01047
`
`proxy and C-HTTP name server) disclose the single DNS module of the claims.
`
`The Board also relied on the specification’s disclosure that, if it is determined
`
`that access to a secure host was requested, “a further check [whether the user is
`
`authorized to connect to the secure host] can be made by communicating with
`
`gatekeeper 2603,” Ex. 1001 at 38:44-50, as evidence that the DNS proxy module
`
`can be composed of multiple separate functions. Remand FWD at 15. But this
`
`section refers to an authorization check after the association of the DNS request with
`
`a secure server has already occurred. The only disclosure with regard to the
`
`determination of whether a secure server is associated with a DNS request is that the
`
`DNS proxy server 2610 itself “determines whether access to a secure site has been
`
`requested”—“for example, by a domain name extension, or by reference to an
`
`internal table of such sites,” and “DNS proxy 2610 determines whether the user has
`
`sufficient security privileges to access the site.” Ex. 1001 at 37:60-66. No other
`
`functionality is involved in this determination. Because Kiuchi does not disclose a
`
`single “domain name service (DNS) module,” but instead a proxy and name server
`
`in a client-server relationship, it does not disclose this limitation.
`
`B.
`
`The Board’s Purported Combination Does Not Perform All the
`Recited Steps of the DNS Module
`The combination of elements on which the Board relied do not even perform
`
`all the steps performed of VirnetX’s DNS module. VirnetX’s DNS module performs
`7
`
`
`
`
`
`
`three distinct functions. But the Board nowhere found that Kiuchi’s client-side
`
`Case No. IPR2015-01047
`
`proxy and the C-HTTP name server together perform the second step. Ex. 1001 at
`
`48:24-26. In fact, the Board acknowledged that “the client-side proxy alone
`
`forwards the DNS request to a DNS function” if the request is not for a secure server.
`
`Remand FWD at 12 (emphasis added). Nor did the Board find Kiuchi’s client-side
`
`proxy and the C-HTTP name server together performed the third step. It instead
`
`found that the combination of the client-side proxy and the server-side proxy
`
`“automatically creat[es] a secure channel between the client and the secure server.”
`
`Ex. 1001 at 46:55-67; see Remand FWD at 16-18 (relying on “Kiuchi’s disclosure
`
`of encrypting connections between client-side and server-side proxies,” and the end
`
`legs protected by firewalls). Thus, the Board relied on the combination of the client-
`
`side proxy and the C-HTTP name server for the first step, the client-side proxy alone
`
`for the second step, and the two proxies for the third step. This amalgamation of
`
`Kiuchi components treats the claims “as mere catalogs of separate parts, in disregard
`
`of the part-to-part relationships set forth in the claims.” Therasense, Inc. v. Becton,
`
`Dickinson & Co., 593 F.3d 1325, 1332 (Fed. Cir. 2010). Kiuchi fails to “disclose[]
`
`exactly what is claimed” in the ’151 patent, Titanium Metals Corp. v. Banner, 778
`
`F.2d 775, 780 (Fed. Cir. 1985)—a single DNS module performing all three steps.
`
`C. Kiuchi Does Not Disclose the Forwarding of a DNS Request to a
`DNS Function
`The Board’s analysis of Claim 13 is deficient for another reason. The Board
`8
`
`
`
`
`
`
`found that Kiuchi’s client-side proxy performs the second step of VirnetX’s DNS
`
`Case No. IPR2015-01047
`
`module—“forwarding the DNS request to a DNS function that returns an IP address
`
`of a nonsecure computer”—based on Kiuchi’s passing statement that, “[i]f the client-
`
`side proxy receives an error status, then it performs DNS lookup, behaving like an
`
`ordinary HTTP/1.0 proxy.” Ex. 1002 at 8. However, Kiuchi never says what it
`
`sends for DNS lookup. No substantial evidence supports the Board’s assumption
`
`that Kiuchi’s client-side proxy forwards the very same request that it receives.
`
`In fact, Kiuchi is inconsistent with that assumption. Kiuchi repeatedly
`
`differentiates its C-HTTP features from DNS. Ex. 2038 ¶¶ 41-42. For example,
`
`Kiuchi explains that the C-HTTP name service is used “instead of DNS,” the “DNS
`
`name service is not used for hostname resolution,” and a “DNS lookup” is only
`
`performed after a permission request to the C-HTTP name server fails. Ex. 1002 at
`
`7-8; see also Ex. 1002 at 11 (explaining that C-HTTP involves a different naming
`
`scheme). Thus, in order to perform DNS lookup, the client-side proxy necessarily
`
`generates a new DNS request—it does not “forward[] the DNS request” it previously
`
`received like the DNS module in VirnetX’s claims.2
`
`
`2 The client-side proxy follows a different protocol (C-HTTP) than what would be
`
`used to perform the “DNS lookup” in Kiuchi; “C-HTTP protocol … is different than
`
`the protocol you would use to access the public DNS, so packet wise, there would
`
`
`
`9
`
`
`
`
`
`Case No. IPR2015-01047
`
`The Board cast aside the C-HTTP/DNS dichotomy, asserting that “Kiuchi’s
`
`statement that it uses C-HTTP name service instead of DNS does not mean all
`
`aspects of Kiuchi’s system use a different format from DNS.” Remand FWD at 12-
`
`13. This is precisely VirnetX’s point. Up until when DNS lookup is performed
`
`because of an error status message, Ex. 1002 at 8, C-HTTP format is used, not DNS
`
`format. Thus, far from teaching “forwarding the DNS request to a DNS function
`
`that returns an IP address of a nonsecure computer,” Kiuchi indicates that a new
`
`DNS request is generated and sent to a DNS function.
`
`The Board further asserted that “the format of Kiuchi’s C-HTTP requests is
`
`not at issue because the claim limitation relates to requests for resources outside the
`
`secure system—those for which the C-HTTP name server returns an error,” Remand
`
`FWD at 13 (citing Ex. 1002 at 9), and therefore deduced that in Kiuchi “nonsecure
`
`requests use standard DNS,” id. (citing Ex. 1002 at 7). The Board appears to suggest
`
`that Kiuchi’s C-HTTP system is bypassed when a DNS request is received that does
`
`not correspond to a secure server. That, however, is not how Kiuchi works.
`
`Kiuchi explains that when a new connection request is received, the “client-
`
`side proxy asks the C-HTTP name server whether it can communicate with the host
`
`specified in a given URL.” Ex. 1002 at 8. “If the [C-HTTP] name server confirms
`
`
`be some format differences.” Ex. 2039 at 110:12-17.
`
`
`
`10
`
`
`
`
`that the query is legitimate, it examines whether the requested server-side proxy is
`
`Case No. IPR2015-01047
`
`registered in the closed network and is permitted to accept the connection from the
`
`client-side proxy.” Ex. 1002 at 8. In other words, the C-HTTP server must receive
`
`a legitimate C-HTTP query before it can determine that the connection “is not
`
`permitted,” and therefore “send a status code which indicates an error” to the client-
`
`side proxy. Ex. 1002 at 8. Indeed, the Board’s rationale is contradicted by
`
`Petitioners’ own expert, who explained that the error message in Kiuchi is what
`
`“triggers then the client-side proxy to initiate, you know, a DNS request to the DNS
`
`system,” Ex. 2039 at 80:21-81:5, and that you would have to “construct [the] DNS
`
`request … that you would send,” id. at 106:18-107:1. Because Kiuchi’s client-side
`
`proxy generates a new DNS request for a nonsecure server—as opposed to
`
`forwarding an existing request—there is no anticipation.
`
`D. The Board’s Obviousness Rulings Are Likewise Defective
`The Board found that Kiuchi anticipated claims 13 and 14 but not 1, 2, 6-8,
`
`and 12 because the latter set of claims required an encrypted channel between the
`
`client and the secure server that Kiuchi does not disclose. Remand FWD at 30. But
`
`the Board also found that Kiuchi, combined with Rescorla, rendered all the
`
`challenged claims unpatentable. Id. at 16-19, 22-27. Because the Kiuchi/Rescorla
`
`combination depends on Kiuchi for all of the limitations discussed above, the
`
`Board’s ruling on obviousness should be withdrawn for the reasons given above.
`
`
`
`11
`
`
`
`
`The Board declined to address Petitioners’ alternative ground of obviousness over
`
`Case No. IPR2015-01047
`
`Kiuchi and RFC 1034. Remand FWD at 28. But that ground likewise depends on
`
`Kiuchi’s disclosures of the DNS module/DNS proxy module.
`
` The Final Written Decision Should Be Vacated Under Facebook
`As the Federal Circuit explained in Facebook, Inc. v. Windy City Innovations,
`
`LLC, Section 315(c) “does no more than authorize the Director to join 1) a person
`
`2) as a party, 3) to an already instituted IPR.” Id. at 1335. It “does not authorize the
`
`joined party to bring new issues from its new proceeding into the existing
`
`proceeding.” 973 F.3d 1321, 1336 (Fed. Cir. 2020) (emphasis added). Here, the
`
`Board improperly allowed Black Swamp, a joined party, to introduce new issues.
`
`While Black Swamp relied on Kiuchi, Black Swamp’s petition offered
`
`different unpatentability rationales from Mangrove’s, as Petitioners previously
`
`acknowledged. See Appellees Br., VirnetX Inc. v. Mangrove Partners Master Fund,
`
`Ltd., No. 17-1368, Docket No. 58, at 22 n.6, 25 n.7 (Fed. Cir. May 14, 2018).
`
`Moreover, Black Swamp’s petition provided additional arguments in favor of
`
`Mangrove’s proposed mappings, on which Petitioners relied. Paper 57 at 3-4, 9, 12-
`
`13. And Petitioners cited Black Swamp’s petition in mapping the encrypted channel
`
`limitation to a path between the user agent and origin server. Id. at 12.
`
`In permitting joinder, the Board did not deny that Black Swamp’s petition
`
`added new issues and arguments, but declared them not “sufficiently different and
`
`
`
`12
`
`
`
`
`complex to preclude joinder.” IPR2016-00167, Paper 12 at 5 (emphasis added); see
`
`Case No. IPR2015-01047
`
`Paper 57 at 3-4. After Facebook issued and made clear no new issues or arguments
`
`are permitted, the Board did not permit VirnetX even to brief the issue, denying
`
`VirnetX’s request in an email within two hours.
`
`Although the Board summarily stated it did not consider “the similar petitions
`
`filed by the joined parties,” Remand FWD at 2 n.2, Black Swamp’s arguments were
`
`intertwined with other petitioners’ arguments throughout the proceedings. The
`
`Board, moreover, refused even to consider whether the Facebook decision warranted
`
`a different result. To the extent the anticipation and obviousness findings are not
`
`reversed outright, reopened proceedings and further briefing is warranted.
`
` A Principal Officer Must Consider This Rehearing Request
`VirnetX’s rehearing request cannot be decided until a new Director is
`
`appointed and confirmed, as there currently is no officer who can issue a final
`
`decision. In United States v. Arthrex, Inc., 141 S. Ct. 1970, 1980, 1987 (2021), the
`
`Supreme Court held that inferior officers “lack[] the power under the Constitution
`
`to finally resolve” patentability questions, and “must be ‘directed and supervised . . .
`
`by others who were appointed by Presidential nomination with the advice and
`
`consent of the Senate.’” “Only an officer properly appointed to a principal office
`
`may issue a final decision binding the Executive Branch.” Id. at 1985. The Court
`
`thus held that a properly appointed principal officer—namely, “the Director”—must
`
`
`
`13
`
`
`
`
`have an opportunity “to review decisions rendered by APJs.” Id. at 1988.
`
`Case No. IPR2015-01047
`
`
`
`Currently, there is “no principal officer” who can direct and supervise other
`
`Board members and “issue a final decision binding the Executive.” Id. at 1980,
`
`1985. The Senate-confirmed post of Director is vacant. While Commissioner of
`
`Patents Hirshfeld is temporarily performing certain functions and duties of the
`
`Director, he was not “appointed to a principal office” by the President and Senate.
`
`Id. at 1985 (emphasis added). As Commissioner, he was appointed to an inferior
`
`office by the Secretary of Commerce—just like the other Board members who,
`
`Arthrex held, “lacked the power under the Constitution to finally resolve the matter
`
`within the Executive Branch.” Id. at 1987; see 35 U.S.C. §§3(b)(2)(A), (6)(a). Nor
`
`is Mr. Hirschfeld exercising authority delegated by a principal officer under that
`
`officer’s supervision: The Directorship is vacant, so there is no one who could
`
`revoke the delegation or supervise the exercise of delegated authority.
`
`Arthrex’s passing reference to a “remand to the Acting Director,” 141 S. Ct.
`
`at 1987, is not to the contrary. In Arthrex, neither the parties nor the Court addressed
`
`Mr. Hirshfeld’s status or appointment; whether he qualifies as “Acting Director”; or
`
`whether a non-Senate-confirmed officer could fill that role. The Office does not
`
`even assert Mr. Hirshfeld is “Acting Director.” Construing a stray line to permit
`
`someone appointed as an inferior officer to have the final say would be defy the
`
`Court’s express holding that “[o]nly an officer properly appointed to a principal
`
`
`
`14
`
`
`
`
`office may issue a final decision.” Id. at 1985 (emphasis added).
`
`Case No. IPR2015-01047
`
`The Federal Vacancies Reform Act (“FVRA”) also precludes Mr. Hirshfeld
`
`from exercising the Director’s review authority. When a principal office is vacant,
`
`any functions or duties “required by statute to be performed by the [principal] officer
`
`(and only that officer)” may be performed only by “the first assistant to the office”
`
`or someone directed by “the President (and only the President)” to perform them.
`
`5 U.S.C. §§3345(a), 3348(a)-(b); see id. §3347. Final review of Board decisions is
`
`a function or duty only the Director may perform. After Arthrex, the Patent Act
`
`permits “the Director” to singlehandedly “review final PTAB decisions.” 141 S. Ct.
`
`at 1987. But the Act’s prohibition on anyone else doing so “remains operative as to
`
`the other [PTAB] members”—including the Commissioner. Id. The FVRA thus
`
`would allow only “the first assistant” (Deputy Director), or someone so-directed by
`
`“the President,” to exercise the Director’s review authority. 5 U.S.C. §3345(a).
`
`Because Mr. Hirschfeld is neither—he is performing the Director’s functions and
`
`duties in accordance with the succession plan promulgated by the Secretary of
`
`Commerce—any attempted exercise of that authority would be “of no force or
`
`effect.” Id. §3348(d)(1).
`
`Dated: September 20, 2021
`
`
`
`Respectfully submitted,
`
`By: /Joseph E. Palys/
`Joseph E. Palys
`Registration No. 46,508
`Counsel for VirnetX Inc.
`15
`
`
`
`
`
`
`
`
`
`Case No. IPR2015-01047
`
`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. § 42.6(e), I certify that I caused to be served on the
`
`counsel for Petitioners a true and correct copy of the foregoing Patent Owner’s
`
`Request for Director Rehearing by electronic means on the date below at the
`
`following address of record:
`
`Abraham Kasdan
`Wiggin and Dana LLP
`akasdan@wiggin.com
`IP@wiggin.com
`
`James T. Bailey
`jtb@jtbaileylaw.com
`
`Jeffrey P. Kushan
`Scott Border
`Thomas A. Broughan III
`Sidley Austin LLP
`iprnotices@sidley.com
`
`Thomas H. Martin
`Wesley C. Meinerding
`Martin & Ferraro, LLP
`tmartin@martinferraro.com
`docketing@martinferraro.com
`
`Dated: September 20, 2021
`
`
`
`
`
`Respectfully submitted,
`
` /Joseph E. Palys/
`Joseph E. Palys
`Counsel for VirnetX Inc.
`
`