DCT

2:25-cv-00001

VPN Technology Holdings LLC v. Microsoft Corp

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:25-cv-1, E.D. Tex., 01/02/2025
  • Venue Allegations: Plaintiff alleges venue is proper because Microsoft maintains regular and established places of business within the district, both directly through facilities like data centers and indirectly through its Authorized Service Providers (ASPs), such as DXC Technology and TD Synnex, over whose local operations Microsoft allegedly exerts control and ratifies as its own.
  • Core Dispute: Plaintiff alleges that Defendant’s Intune cloud-based endpoint management solution infringes a patent related to the automatic generation of a single executable file for configuring a remote computer's VPN settings.
  • Technical Context: The technology addresses the automated configuration of Virtual Private Networks (VPNs), a foundational element of secure remote access for enterprise and corporate IT infrastructure.
  • Key Procedural History: The complaint notes that the patent-in-suit was examined by the USPTO, which considered several prior art patents and publications before allowing the claims. No prior litigation or post-grant proceedings are mentioned.

Case Timeline

Date Event
2002-05-14 ’718 Patent Priority Date
2010-11-30 ’718 Patent Issue Date
2025-01-02 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 7,844,718 - "System and Method for Automatically Configuring Remote Computer" (Issued Nov. 30, 2010)

The Invention Explained

  • Problem Addressed: The patent describes the process of setting up a remote computer for VPN access as inconvenient, time-consuming, and error-prone (’718 Patent, col. 2:9-18). It notes that manual configuration by an administrator can require physical travel or complex, ineffective instructions (such as an HTML wizard) that users may fail to follow correctly, leading to delays and mistakes (’718 Patent, col. 2:25-34; Compl. ¶¶25-26).
  • The Patented Solution: The invention proposes a system where a network administrator can generate a single executable file that, when run on the remote computer, automatically configures all necessary settings to establish the VPN connection (’718 Patent, Abstract). This is achieved by a "compiler module" that takes in network and user information and produces an executable program that can manipulate the remote computer's registry entries or other system settings, such as the Remote Access Service (RAS) phonebook, to enable the connection (’718 Patent, col. 2:45-58, col. 3:41-45).
  • Technical Importance: The technology aimed to replace manual, user-driven VPN setup with a distributable, automated software solution, thereby increasing efficiency and reducing the potential for human error in enterprise IT management (’718 Patent, col. 2:15-18).

Key Claims at a Glance

  • The complaint asserts at least independent Claim 1 (Compl. ¶40).
  • The essential elements of Claim 1 include:
    • Initiating, at a network administrator computer, an installer program with an empty binary file.
    • Accessing a network database to extract configuration data.
    • Applying the data to code a Remote Access Service (RAS) Application Programming Interface (API) and generate a configuration data binary file.
    • Embedding the configuration data binary file as instructions in the RAS API.
    • Replacing the empty binary file with the configuration data binary file to generate the executable file.
    • Deploying the executable file to the remote computer.
    • Executing the file on the remote computer to modify its configuration settings and establish a VPN connection, which includes creating a connection profile and coding WAN/LAN login credentials.

III. The Accused Instrumentality

Product Identification

The accused instrumentality is Microsoft’s “Intune” product (Compl. ¶35).

Functionality and Market Context

The complaint describes Intune as a "cloud-based endpoint management solution" with the capability to "remotely configure multiple devices such as computers, laptops, and/or notebooks" (Compl. ¶35). Specifically, the complaint alleges that Intune permits an administrator to "configure a remote computer for a Virtual Private Network (VPN) by deploying VPN profiles" (Compl. ¶35). The complaint does not provide further technical detail on the operational mechanics of Intune.

IV. Analysis of Infringement Allegations

The complaint alleges that Microsoft’s Intune product infringes at least Claim 1 of the ’718 Patent but does not include the referenced claim chart (Exhibit B) that purportedly details this infringement (Compl. ¶¶40, 45-46). The narrative infringement theory suggests that an administrator using the Intune service (the "network administrator computer") to create and deploy a VPN profile to a remote device (deploying the "executable file") practices the claimed method when that profile automatically modifies the remote device's settings to enable a VPN connection (Compl. ¶¶35, 40). The complaint includes a screenshot from the TD Synnex website listing a facility in Garland, Texas, to support its venue allegations by showing the physical presence of a Microsoft ASP in the district (Compl. p. 5).

  • Identified Points of Contention:
    • Scope Questions: The core of the dispute may center on whether a modern, cloud-based policy management system (Intune) falls within the scope of claims drafted for a 2002-era client-server architecture. A key question is whether a deployed "VPN profile" can be considered an "executable file" as specifically defined by the claim's sequence of creating an installer, populating a binary file, and coding a RAS API.
    • Technical Questions: The complaint does not specify how Intune technically implements the deployment of VPN settings. This raises the question of what evidence Plaintiff will present to show that Intune's functionality maps to the specific claimed steps of using an "installer program having an empty binary file" (Claim 1, preamble) or directly "coding" the "Remote Access Service (RAS) Application Programming Interface (API)" (’718 Patent, Claim 1).

V. Key Claim Terms for Construction

  • The Term: "executable file"

    • Context and Importance: The infringement theory depends on equating Microsoft's "VPN profile" with the claimed "executable file." Practitioners may focus on this term because its construction will determine whether a modern configuration policy file is equivalent to the self-contained, compiled program seemingly described in the patent.
    • Intrinsic Evidence for a Broader Interpretation: The patent's objective is to provide a method for "generating an executable code to be run on the remote computer that configures the remote computer" (’718 Patent, col. 2:46-49), which could arguably encompass any file that causes configuration changes upon execution.
    • Intrinsic Evidence for a Narrower Interpretation: Claim 1 recites a specific method of "generating the executable file using the configuration data binary file" after a series of steps involving an "installer program." The specification further describes the process as building an "installer program" where "blank data on the installer is replaced with the configuration data file" (’718 Patent, col. 9:34-36). This suggests a specific type of self-contained, compiled installer package.
  • The Term: "Remote Access Service (RAS) Application Programming Interface (API)"

    • Context and Importance: Claim 1 requires "coding" this specific API and "embedding... instructions in the RAS API." The term's definition is critical because Intune manages a wide variety of modern operating systems, many of which may not use the specific Windows RAS technology prevalent when the patent was filed.
    • Intrinsic Evidence for a Broader Interpretation: A party could argue that "RAS API" should be construed functionally to mean any API on a remote device that manages remote network access, thus covering modern equivalents.
    • Intrinsic Evidence for a Narrower Interpretation: The specification repeatedly refers to "RAS files," the "RAS phonebook," and the "RAS API," grounding the invention in a specific Microsoft Windows technology (’718 Patent, col. 9:12-16, 36-39). A narrow construction would limit the claim to systems that interact with that particular, and potentially legacy, API.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges inducement of infringement, stating that Microsoft distributes "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the "718 Patent" (Compl. ¶43).
  • Willful Infringement: The allegation of willful infringement is based on post-suit conduct. The complaint asserts that Microsoft has knowledge of its infringement "at least as of the service of the present complaint" and "continues to make, use, test, sell, offer for sale, market, and/or import" the accused products despite this knowledge (Compl. ¶¶38, 43).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A central issue will be one of technological translation: can the plaintiff demonstrate that the operational steps of Microsoft’s modern, cloud-based Intune service are legally equivalent to the specific, sequential process of building and deploying a self-contained "executable file" as recited in Claim 1 of the ’718 patent?
  • The case will likely involve a significant claim construction dispute over whether key terms grounded in early-2000s computing—such as "installer program," "executable file," and "RAS API"—can be interpreted broadly enough to read on the architecture of a modern, multi-platform, cloud-based management service, or if they are fatally tied to an obsolete implementation.
  • An initial procedural question may be one of venue, as the complaint dedicates substantial effort to arguing that Microsoft's control over its third-party Authorized Service Providers creates a "regular and established place of business" for the defendant within the Eastern District of Texas, a point Microsoft may choose to contest.