throbber

`
`
`
`
`
`
`
`
`Paper No.
`Filed: September 20, 2021
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`THE MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., and
`BLACK SWAMP IP, LLC,
`Petitioner
`v.
`VIRNETX INC.,
`Patent Owner
`
`
`
`Case IPR2015-010471
`Patent 7,490,151
`
`
`
`
`
`Patent Owner’s Request for Director Rehearing
`
`
`
`
`
`
`1 Apple Inc. and Black Swamp IP, LLC, who filed petitions in IPR2016-00063 and
`IPR2016-00167, respectively, have been joined as a Petitioner in the instant
`proceeding.
`
`

`

`
`
`Case No. IPR2015-01047
`
`
`
`
`
`B.
`
`TABLE OF CONTENTS
`Background ...................................................................................................... 1
`The Board Erred in Declaring the ’151 Patent Claims Unpatentable ............. 3
`A.
`The Board’s Reliance on a Combination of Different Elements
`in Kiuchi Is Improper ............................................................................ 4
`The Board’s Purported Combination Does Not Perform All the
`Recited Steps of the DNS Module ........................................................ 7
`C. Kiuchi Does Not Disclose the Forwarding of a DNS Request to
`a DNS Function ..................................................................................... 8
`The Board’s Obviousness Rulings Are Likewise Defective ...............11
`D.
` The Final Written Decision Should Be Vacated Under Facebook ...............12
` A Principal Officer Must Consider This Rehearing Request ........................13
`
`i
`
`
`
`
`
`
`
`

`

`
`
`
`
`Case No. IPR2015-01047
`
`On August 19, 2021, the Federal Circuit issued an order “allowing VirnetX
`
`the opportunity to request Director rehearing.” VirnetX Inc. v. Mangrove Partners
`
`Master Fund, Ltd., Nos. 2020-2271, 2020-2272, Dkt. No. 51 at 3 (Fed. Cir. Aug. 19,
`
`2021). Pursuant to that order, VirnetX hereby requests Director rehearing of the
`
`Final Written Decision on Remand issued July 14, 2020 (“Remand FWD”).
`
`Claim 13 of U.S. Patent No. 7,490,151, which is representative, recites “a
`
`computer readable medium storing a domain name server (DNS) module comprised
`
`of computer readable instructions that, when executed, cause a data processing
`
`device to perform” three steps relating to the establishment of secure computer
`
`communications. Ex. 1001 (48:18-29) (emphasis added). Originally, the Board
`
`found the claims anticipated by mapping the claim’s DNS module to a name server
`
`in the prior-art reference. But the Federal Circuit rejected that finding. On remand,
`
`the Board mapped the DNS module to a combination of separate elements in the
`
`prior-art reference. But that violates the cardinal anticipation rule that the reference
`
`must disclose the same elements arranged in the same way. Moreover, those
`
`elements in combination do not even perform the three functions of the claimed DNS
`
`module. This and other errors warrant rehearing by a properly appointed Director.
`
`
`
`Background
`The primary reference in this proceeding is Kiuchi (Ex. 1002). In Kiuchi, a
`
`user agent requests information residing in an “origin server.” Kiuchi at 64-67. Two
`
`
`
`1
`
`

`

`
`entities are interposed between the user agent and origin server and relay information
`
`Case No. IPR2015-01047
`
`between them. A “client-side proxy” relays information between a user agent and
`
`the Internet, and a “server-side proxy” relays information between the Internet and
`
`the origin server. Id. at 64. A “C-HTTP name server” facilitates exchange of
`
`encryption keys between the client-side and server-side proxy. Id. at 64-65.
`
`The Federal Circuit first considered whether Kiuchi could render the ’151
`
`patent claims unpatentable in VirnetX, Inc. v. Cisco Sys., Inc., 767 F.3d 1308 (Fed.
`
`Cir. 2014). In affirming a finding that it could not, Cisco found evidence that
`
`“Kiuchi fails to disclose the requirement that the DNS request be ‘sent by a client.’”
`
`Id. at 1324. The Board nonetheless found that Kiuchi rendered the challenged ’151
`
`patent claims unpatentable in the original Final Written Decision dated September
`
`9, 2016 (“Original FWD”). But the Federal Circuit vacated the Original FWD. It
`
`held “[t]he Board could not have found that the client-side proxy corresponds to the
`
`claimed ‘client’ and is also a part of the DNS proxy module, as the claim makes clear
`
`that these are separate components.” VirnetX Inc. v. Mangrove Partners Master
`
`Fund, Ltd., 778 F. App’x 897, 906 (Fed. Cir. 2019). The court also held “the C-
`
`HTTP name server [does not] perform the functions of the claimed DNS proxy
`
`module” because “[t]he C-HTTP name server does not forward a DNS request to a
`
`DNS function.’” Id. at 906-07. And the court found that, “[t]o the extent the Board
`
`intended to rely on different components in Kiuchi for the disclosure of all the
`
`
`
`2
`
`

`

`
`claimed limitations attributed to the ‘client’ or the ‘secure server,’ its finding of
`
`Case No. IPR2015-01047
`
`anticipation is not supported by substantial evidence.” Id. at 907-08.
`
`On remand, the Board found Kiuchi anticipated the claim. It reasoned that a
`
`“combination” of “the client-side proxy and C-HTTP name server, acting together,”
`
`in Kiuchi performed the function of the VirnetX’s DNS module. Remand FWD at
`
`11-12, 14. While the Federal Circuit held that Kiuchi’s C-HTTP name server does
`
`not forward a received DNS request to a DNS function like VirnetX’s DNS module
`
`the Board stated that holding did not preclude it from relying on the “asserted
`
`combination.” Id. at 12. The Board also concluded that the forwarding claim
`
`limitation was met when “the client-side proxy alone forwards the DNS request to a
`
`DNS function when it determines (in conjunction with the C-HTTP name server)
`
`that the request does not correspond to a secure server.” Id. (emphasis added).
`
` The Board Erred in Declaring the ’151 Patent Claims Unpatentable
`Claim 13 recites “a computer readable medium storing a domain name server
`
`(DNS) module comprised of computer readable instructions that, when executed,
`
`cause a data processing device to perform” three steps. Appx210 (48:18-29)
`
`(emphasis added). The first step is “determining whether a DNS request sent by a
`
`client corresponds to a secure server.” Appx210 (48:22-23). “[W]hen the DNS
`
`request does not correspond to a secure server,” the next step is “forwarding the DNS
`
`request to a DNS function that returns an IP address of a nonsecure computer.”
`
`
`
`3
`
`

`

`
`Appx210 (48:24-26). On the other hand, “when the intercepted DNS request
`
`Case No. IPR2015-01047
`
`corresponds to a secure server,” a “secure channel between the client and the secure
`
`server” is “automatically creat[ed].” Appx210 (48:27-29). Nothing in Kiuchi
`
`corresponds to the DNS module that performs the three enumerated limitations. The
`
`Board’s reliance upon a “combination” of Kiuchi’s client-side proxy and C-HTTP
`
`name server does not replicate what is claimed arranged in the same way, and indeed
`
`even that combination does not perform all three limitations.
`
`A. The Board’s Reliance on a Combination of Different Elements in
`Kiuchi Is Improper
`In Mangrove, the Federal Circuit considered whether VirnetX’s DNS module
`
`corresponded to Kiuchi’s C-HTTP name server. Mangrove, 778 F.3d at 906. It held
`
`there was no substantial evidence of anticipation because Kiuchi’s C-HTTP name
`
`server does not perform the second function of VirnetX’s DNS module. The Court
`
`reasoned that, if a DNS request does not correspond to a secure server, Kiuchi’s C-
`
`HTTP name server does not forward it to a DNS function, but instead returns an
`
`error message, and thus cannot be the claimed DNS module. Id. at 906-07.
`
`On remand, the Board pivoted to “rely” on the “combination” of two Kiuchi
`
`components, Remand FWD at 12, arguing that the “client-side proxy …, together
`
`with the C-HTTP name server, maps to the claimed ‘DNS proxy module.’” Id. at
`
`11; see also id. at 12 (relying on “functionality of the combined client-side proxy
`
`and C-HTTP name server”). But the fact that Kiuchi splits the various functions of
`4
`
`
`
`

`

`
`the DNS proxy module among different components (and even then, Kiuchi is
`
`Case No. IPR2015-01047
`
`missing key features) demonstrates that Kiuchi does not anticipate the claims.
`
`The Board found that the combination of the “the client-side proxy and the C-
`
`HTTP server, acting together, determine whether the intercepted DNS request
`
`corresponds to a secure server.” Id. at 14 (emphasis added). The Board declared
`
`that reliance on this “combination” did not run afoul of Mangrove because the Board
`
`did not use the C-HTTP server to satisfy two different claims limitations (unlike the
`
`client-side proxy in the Board’s Original FWD). Id. at 15. Accordingly, the Board
`
`“f[ou]nd that Kiuchi discloses its client-side proxy acting with the C-HTTP name
`
`server as the claimed DNS proxy module ‘determining whether the intercepted DNS
`
`request corresponds to a secure server.’” Id. at 15-16 (emphasis added).
`
`The Board’s reliance on this combination violates the cardinal anticipation
`
`rule that the prior-art reference must disclose “all of the limitations arranged or
`
`combined in the same way as recited in the claim.” Net MoneyIN, Inc. v. VeriSign,
`
`Inc., 545 F.3d 1359, 1371 (Fed. Cir. 2008) (emphasis added). Claim 13 recites a
`
`single computer-readable “domain name server (DNS) module” that comprises
`
`instructions to perform the recited tasks. Kiuchi’s client-side proxy and C-HTTP
`
`name server, however, are not part of the same software or memory “module,” as
`
`the claims require. Instead, Kiuchi’s client-side proxy and C-HTTP name server are
`
`arranged as separate modules where the client-side proxy makes a request to (and
`
`
`
`5
`
`

`

`
`receives a response from) the C-HTTP name server. Ex. 1002 at 8. The Federal
`
`Case No. IPR2015-01047
`
`Circuit previously described the user agent, client-side proxy, server-side proxy, and
`
`the origin server as “different components in Kiuchi.” Mangrove, 778 F. App’x at
`
`907. The same is true of the client-side proxy and C-HTTP name server. The
`
`Board’s finding that Kiuchi—where the secure-communications and DNS functions
`
`are separated and the client-side proxy forwards a domain name request to a C-HTTP
`
`name server for determination of whether the client’s domain name request is
`
`associated with a secure server—anticipates the asserted claims ignores the different
`
`arrangement in those claims. The Board cannot rely on two separate components of
`
`Kiuchi to perform the tasks that the claims ascribe to the DNS module. See Enfish,
`
`LLC v. Microsoft Corp., 822 F.3d 1327, 1342-43 (Fed. Cir. 2016) (claim requiring a
`
`single logical table not anticipated by prior art using two tables).
`
`The Board’s assertion that “[t]he Specification discloses that functionality
`
`may be located in a single computer or may instead by distributed among multiple
`
`computers,” Remand FWD at 14, is irrelevant. Those passages state only that the
`
`DNS proxy 2610 can be implemented on the same or different computer as other
`
`functionality (such as Gatekeeper 2603 or DNS Server 2609)—i.e., the DNS module
`
`can be co-located on the same physical computer with other functionality. See Ex.
`
`1001 at 38:30–50. While the Board is correct “that the claims are not limited to a
`
`particular arrangement of hardware,” Remand FWD at 15 (emphasis added), that
`
`
`
`6
`
`

`

`
`does not mean that two distinct modules/sets of instructions in Kiuchi (client-side
`
`Case No. IPR2015-01047
`
`proxy and C-HTTP name server) disclose the single DNS module of the claims.
`
`The Board also relied on the specification’s disclosure that, if it is determined
`
`that access to a secure host was requested, “a further check [whether the user is
`
`authorized to connect to the secure host] can be made by communicating with
`
`gatekeeper 2603,” Ex. 1001 at 38:44-50, as evidence that the DNS proxy module
`
`can be composed of multiple separate functions. Remand FWD at 15. But this
`
`section refers to an authorization check after the association of the DNS request with
`
`a secure server has already occurred. The only disclosure with regard to the
`
`determination of whether a secure server is associated with a DNS request is that the
`
`DNS proxy server 2610 itself “determines whether access to a secure site has been
`
`requested”—“for example, by a domain name extension, or by reference to an
`
`internal table of such sites,” and “DNS proxy 2610 determines whether the user has
`
`sufficient security privileges to access the site.” Ex. 1001 at 37:60-66. No other
`
`functionality is involved in this determination. Because Kiuchi does not disclose a
`
`single “domain name service (DNS) module,” but instead a proxy and name server
`
`in a client-server relationship, it does not disclose this limitation.
`
`B.
`
`The Board’s Purported Combination Does Not Perform All the
`Recited Steps of the DNS Module
`The combination of elements on which the Board relied do not even perform
`
`all the steps performed of VirnetX’s DNS module. VirnetX’s DNS module performs
`7
`
`
`
`

`

`
`three distinct functions. But the Board nowhere found that Kiuchi’s client-side
`
`Case No. IPR2015-01047
`
`proxy and the C-HTTP name server together perform the second step. Ex. 1001 at
`
`48:24-26. In fact, the Board acknowledged that “the client-side proxy alone
`
`forwards the DNS request to a DNS function” if the request is not for a secure server.
`
`Remand FWD at 12 (emphasis added). Nor did the Board find Kiuchi’s client-side
`
`proxy and the C-HTTP name server together performed the third step. It instead
`
`found that the combination of the client-side proxy and the server-side proxy
`
`“automatically creat[es] a secure channel between the client and the secure server.”
`
`Ex. 1001 at 46:55-67; see Remand FWD at 16-18 (relying on “Kiuchi’s disclosure
`
`of encrypting connections between client-side and server-side proxies,” and the end
`
`legs protected by firewalls). Thus, the Board relied on the combination of the client-
`
`side proxy and the C-HTTP name server for the first step, the client-side proxy alone
`
`for the second step, and the two proxies for the third step. This amalgamation of
`
`Kiuchi components treats the claims “as mere catalogs of separate parts, in disregard
`
`of the part-to-part relationships set forth in the claims.” Therasense, Inc. v. Becton,
`
`Dickinson & Co., 593 F.3d 1325, 1332 (Fed. Cir. 2010). Kiuchi fails to “disclose[]
`
`exactly what is claimed” in the ’151 patent, Titanium Metals Corp. v. Banner, 778
`
`F.2d 775, 780 (Fed. Cir. 1985)—a single DNS module performing all three steps.
`
`C. Kiuchi Does Not Disclose the Forwarding of a DNS Request to a
`DNS Function
`The Board’s analysis of Claim 13 is deficient for another reason. The Board
`8
`
`
`
`

`

`
`found that Kiuchi’s client-side proxy performs the second step of VirnetX’s DNS
`
`Case No. IPR2015-01047
`
`module—“forwarding the DNS request to a DNS function that returns an IP address
`
`of a nonsecure computer”—based on Kiuchi’s passing statement that, “[i]f the client-
`
`side proxy receives an error status, then it performs DNS lookup, behaving like an
`
`ordinary HTTP/1.0 proxy.” Ex. 1002 at 8. However, Kiuchi never says what it
`
`sends for DNS lookup. No substantial evidence supports the Board’s assumption
`
`that Kiuchi’s client-side proxy forwards the very same request that it receives.
`
`In fact, Kiuchi is inconsistent with that assumption. Kiuchi repeatedly
`
`differentiates its C-HTTP features from DNS. Ex. 2038 ¶¶ 41-42. For example,
`
`Kiuchi explains that the C-HTTP name service is used “instead of DNS,” the “DNS
`
`name service is not used for hostname resolution,” and a “DNS lookup” is only
`
`performed after a permission request to the C-HTTP name server fails. Ex. 1002 at
`
`7-8; see also Ex. 1002 at 11 (explaining that C-HTTP involves a different naming
`
`scheme). Thus, in order to perform DNS lookup, the client-side proxy necessarily
`
`generates a new DNS request—it does not “forward[] the DNS request” it previously
`
`received like the DNS module in VirnetX’s claims.2
`
`
`2 The client-side proxy follows a different protocol (C-HTTP) than what would be
`
`used to perform the “DNS lookup” in Kiuchi; “C-HTTP protocol … is different than
`
`the protocol you would use to access the public DNS, so packet wise, there would
`
`
`
`9
`
`

`

`
`
`Case No. IPR2015-01047
`
`The Board cast aside the C-HTTP/DNS dichotomy, asserting that “Kiuchi’s
`
`statement that it uses C-HTTP name service instead of DNS does not mean all
`
`aspects of Kiuchi’s system use a different format from DNS.” Remand FWD at 12-
`
`13. This is precisely VirnetX’s point. Up until when DNS lookup is performed
`
`because of an error status message, Ex. 1002 at 8, C-HTTP format is used, not DNS
`
`format. Thus, far from teaching “forwarding the DNS request to a DNS function
`
`that returns an IP address of a nonsecure computer,” Kiuchi indicates that a new
`
`DNS request is generated and sent to a DNS function.
`
`The Board further asserted that “the format of Kiuchi’s C-HTTP requests is
`
`not at issue because the claim limitation relates to requests for resources outside the
`
`secure system—those for which the C-HTTP name server returns an error,” Remand
`
`FWD at 13 (citing Ex. 1002 at 9), and therefore deduced that in Kiuchi “nonsecure
`
`requests use standard DNS,” id. (citing Ex. 1002 at 7). The Board appears to suggest
`
`that Kiuchi’s C-HTTP system is bypassed when a DNS request is received that does
`
`not correspond to a secure server. That, however, is not how Kiuchi works.
`
`Kiuchi explains that when a new connection request is received, the “client-
`
`side proxy asks the C-HTTP name server whether it can communicate with the host
`
`specified in a given URL.” Ex. 1002 at 8. “If the [C-HTTP] name server confirms
`
`
`be some format differences.” Ex. 2039 at 110:12-17.
`
`
`
`10
`
`

`

`
`that the query is legitimate, it examines whether the requested server-side proxy is
`
`Case No. IPR2015-01047
`
`registered in the closed network and is permitted to accept the connection from the
`
`client-side proxy.” Ex. 1002 at 8. In other words, the C-HTTP server must receive
`
`a legitimate C-HTTP query before it can determine that the connection “is not
`
`permitted,” and therefore “send a status code which indicates an error” to the client-
`
`side proxy. Ex. 1002 at 8. Indeed, the Board’s rationale is contradicted by
`
`Petitioners’ own expert, who explained that the error message in Kiuchi is what
`
`“triggers then the client-side proxy to initiate, you know, a DNS request to the DNS
`
`system,” Ex. 2039 at 80:21-81:5, and that you would have to “construct [the] DNS
`
`request … that you would send,” id. at 106:18-107:1. Because Kiuchi’s client-side
`
`proxy generates a new DNS request for a nonsecure server—as opposed to
`
`forwarding an existing request—there is no anticipation.
`
`D. The Board’s Obviousness Rulings Are Likewise Defective
`The Board found that Kiuchi anticipated claims 13 and 14 but not 1, 2, 6-8,
`
`and 12 because the latter set of claims required an encrypted channel between the
`
`client and the secure server that Kiuchi does not disclose. Remand FWD at 30. But
`
`the Board also found that Kiuchi, combined with Rescorla, rendered all the
`
`challenged claims unpatentable. Id. at 16-19, 22-27. Because the Kiuchi/Rescorla
`
`combination depends on Kiuchi for all of the limitations discussed above, the
`
`Board’s ruling on obviousness should be withdrawn for the reasons given above.
`
`
`
`11
`
`

`

`
`The Board declined to address Petitioners’ alternative ground of obviousness over
`
`Case No. IPR2015-01047
`
`Kiuchi and RFC 1034. Remand FWD at 28. But that ground likewise depends on
`
`Kiuchi’s disclosures of the DNS module/DNS proxy module.
`
` The Final Written Decision Should Be Vacated Under Facebook
`As the Federal Circuit explained in Facebook, Inc. v. Windy City Innovations,
`
`LLC, Section 315(c) “does no more than authorize the Director to join 1) a person
`
`2) as a party, 3) to an already instituted IPR.” Id. at 1335. It “does not authorize the
`
`joined party to bring new issues from its new proceeding into the existing
`
`proceeding.” 973 F.3d 1321, 1336 (Fed. Cir. 2020) (emphasis added). Here, the
`
`Board improperly allowed Black Swamp, a joined party, to introduce new issues.
`
`While Black Swamp relied on Kiuchi, Black Swamp’s petition offered
`
`different unpatentability rationales from Mangrove’s, as Petitioners previously
`
`acknowledged. See Appellees Br., VirnetX Inc. v. Mangrove Partners Master Fund,
`
`Ltd., No. 17-1368, Docket No. 58, at 22 n.6, 25 n.7 (Fed. Cir. May 14, 2018).
`
`Moreover, Black Swamp’s petition provided additional arguments in favor of
`
`Mangrove’s proposed mappings, on which Petitioners relied. Paper 57 at 3-4, 9, 12-
`
`13. And Petitioners cited Black Swamp’s petition in mapping the encrypted channel
`
`limitation to a path between the user agent and origin server. Id. at 12.
`
`In permitting joinder, the Board did not deny that Black Swamp’s petition
`
`added new issues and arguments, but declared them not “sufficiently different and
`
`
`
`12
`
`

`

`
`complex to preclude joinder.” IPR2016-00167, Paper 12 at 5 (emphasis added); see
`
`Case No. IPR2015-01047
`
`Paper 57 at 3-4. After Facebook issued and made clear no new issues or arguments
`
`are permitted, the Board did not permit VirnetX even to brief the issue, denying
`
`VirnetX’s request in an email within two hours.
`
`Although the Board summarily stated it did not consider “the similar petitions
`
`filed by the joined parties,” Remand FWD at 2 n.2, Black Swamp’s arguments were
`
`intertwined with other petitioners’ arguments throughout the proceedings. The
`
`Board, moreover, refused even to consider whether the Facebook decision warranted
`
`a different result. To the extent the anticipation and obviousness findings are not
`
`reversed outright, reopened proceedings and further briefing is warranted.
`
` A Principal Officer Must Consider This Rehearing Request
`VirnetX’s rehearing request cannot be decided until a new Director is
`
`appointed and confirmed, as there currently is no officer who can issue a final
`
`decision. In United States v. Arthrex, Inc., 141 S. Ct. 1970, 1980, 1987 (2021), the
`
`Supreme Court held that inferior officers “lack[] the power under the Constitution
`
`to finally resolve” patentability questions, and “must be ‘directed and supervised . . .
`
`by others who were appointed by Presidential nomination with the advice and
`
`consent of the Senate.’” “Only an officer properly appointed to a principal office
`
`may issue a final decision binding the Executive Branch.” Id. at 1985. The Court
`
`thus held that a properly appointed principal officer—namely, “the Director”—must
`
`
`
`13
`
`

`

`
`have an opportunity “to review decisions rendered by APJs.” Id. at 1988.
`
`Case No. IPR2015-01047
`
`
`
`Currently, there is “no principal officer” who can direct and supervise other
`
`Board members and “issue a final decision binding the Executive.” Id. at 1980,
`
`1985. The Senate-confirmed post of Director is vacant. While Commissioner of
`
`Patents Hirshfeld is temporarily performing certain functions and duties of the
`
`Director, he was not “appointed to a principal office” by the President and Senate.
`
`Id. at 1985 (emphasis added). As Commissioner, he was appointed to an inferior
`
`office by the Secretary of Commerce—just like the other Board members who,
`
`Arthrex held, “lacked the power under the Constitution to finally resolve the matter
`
`within the Executive Branch.” Id. at 1987; see 35 U.S.C. §§3(b)(2)(A), (6)(a). Nor
`
`is Mr. Hirschfeld exercising authority delegated by a principal officer under that
`
`officer’s supervision: The Directorship is vacant, so there is no one who could
`
`revoke the delegation or supervise the exercise of delegated authority.
`
`Arthrex’s passing reference to a “remand to the Acting Director,” 141 S. Ct.
`
`at 1987, is not to the contrary. In Arthrex, neither the parties nor the Court addressed
`
`Mr. Hirshfeld’s status or appointment; whether he qualifies as “Acting Director”; or
`
`whether a non-Senate-confirmed officer could fill that role. The Office does not
`
`even assert Mr. Hirshfeld is “Acting Director.” Construing a stray line to permit
`
`someone appointed as an inferior officer to have the final say would be defy the
`
`Court’s express holding that “[o]nly an officer properly appointed to a principal
`
`
`
`14
`
`

`

`
`office may issue a final decision.” Id. at 1985 (emphasis added).
`
`Case No. IPR2015-01047
`
`The Federal Vacancies Reform Act (“FVRA”) also precludes Mr. Hirshfeld
`
`from exercising the Director’s review authority. When a principal office is vacant,
`
`any functions or duties “required by statute to be performed by the [principal] officer
`
`(and only that officer)” may be performed only by “the first assistant to the office”
`
`or someone directed by “the President (and only the President)” to perform them.
`
`5 U.S.C. §§3345(a), 3348(a)-(b); see id. §3347. Final review of Board decisions is
`
`a function or duty only the Director may perform. After Arthrex, the Patent Act
`
`permits “the Director” to singlehandedly “review final PTAB decisions.” 141 S. Ct.
`
`at 1987. But the Act’s prohibition on anyone else doing so “remains operative as to
`
`the other [PTAB] members”—including the Commissioner. Id. The FVRA thus
`
`would allow only “the first assistant” (Deputy Director), or someone so-directed by
`
`“the President,” to exercise the Director’s review authority. 5 U.S.C. §3345(a).
`
`Because Mr. Hirschfeld is neither—he is performing the Director’s functions and
`
`duties in accordance with the succession plan promulgated by the Secretary of
`
`Commerce—any attempted exercise of that authority would be “of no force or
`
`effect.” Id. §3348(d)(1).
`
`Dated: September 20, 2021
`
`
`
`Respectfully submitted,
`
`By: /Joseph E. Palys/
`Joseph E. Palys
`Registration No. 46,508
`Counsel for VirnetX Inc.
`15
`
`
`
`

`

`
`
`
`
`Case No. IPR2015-01047
`
`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. § 42.6(e), I certify that I caused to be served on the
`
`counsel for Petitioners a true and correct copy of the foregoing Patent Owner’s
`
`Request for Director Rehearing by electronic means on the date below at the
`
`following address of record:
`
`Abraham Kasdan
`Wiggin and Dana LLP
`akasdan@wiggin.com
`IP@wiggin.com
`
`James T. Bailey
`jtb@jtbaileylaw.com
`
`Jeffrey P. Kushan
`Scott Border
`Thomas A. Broughan III
`Sidley Austin LLP
`iprnotices@sidley.com
`
`Thomas H. Martin
`Wesley C. Meinerding
`Martin & Ferraro, LLP
`tmartin@martinferraro.com
`docketing@martinferraro.com
`
`Dated: September 20, 2021
`
`
`
`
`
`Respectfully submitted,
`
` /Joseph E. Palys/
`Joseph E. Palys
`Counsel for VirnetX Inc.
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket