6:24-cv-00622
VPN Technology Holdings LLC v. Microsoft Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: VPN Technology Holdings, LLC (Virginia)
- Defendant: Microsoft Corporation (Washington)
- Plaintiff’s Counsel: Garteiser Honea, PLLC; Sinergia Technology Law Group, PLLC
- Case Identification: 6:24-cv-00622, W.D. Tex., 12/05/2024
- Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Defendant maintains a regular and established place of business within the district, specifically an office in Austin.
- Core Dispute: Plaintiff alleges that Defendant’s Intune product, a cloud-based endpoint management solution, infringes a patent related to the automatic configuration of a remote computer for a Virtual Private Network (VPN) connection.
- Technical Context: The technology concerns automating the setup of VPNs, a process critical for enterprise IT departments to provide secure remote access to corporate networks, thereby aiming to reduce complexity and manual error.
- Key Procedural History: The complaint notes that during the patent's prosecution, the U.S. Patent and Trademark Office considered prior art including several U.S. patents and a 1998 Microsoft Systems Journal article titled "Gain Control of Application Setup and Maintenance with the New Windows Installer."
Case Timeline
| Date | Event |
|---|---|
| 2002-05-14 | '718 Patent Priority Date |
| 2010-11-30 | '718 Patent Issue Date |
| 2024-12-05 | Complaint Filing Date |
| 2025-02-22 | '718 Patent Nominal Expiration Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,844,718 - System and Method for Automatically Configuring Remote Computer
- Patent Identification: U.S. Patent No. 7,844,718, "System and Method for Automatically Configuring Remote Computer," issued November 30, 2010.
The Invention Explained
- Problem Addressed: The patent describes the process of manually configuring a remote computer for VPN access as inconvenient, time-consuming, and prone to error (Compl. ¶15; ’718 Patent, col. 2:9-24). This process could require a network administrator to physically handle the remote machine or a remote user to navigate multiple, complex authentication steps, creating delays and user difficulty (’718 Patent, col. 2:13-24).
- The Patented Solution: The invention is a system and method that automates this configuration. A configuration generator creates a self-contained executable file containing all necessary parameters to establish a VPN connection (Compl. ¶14; ’718 Patent, Abstract). When run on the remote computer, this file automatically modifies the computer’s operating system settings, such as the RAS phonebook or registry entries, to enable the VPN connection without further manual input from the user (’718 Patent, col. 3:39-45).
- Technical Importance: The technology sought to streamline a critical but cumbersome IT function, reducing the potential for user error and the need for direct administrator intervention in setting up remote access for an organization's employees (’718 Patent, col. 2:44-59).
Key Claims at a Glance
- The complaint asserts at least independent Claim 1 (Compl. ¶31).
- The essential elements of Claim 1, a method claim, include:
- Initiating, at a network administrator computer, an installer program having an empty binary file.
- Accessing a network database to extract configuration data representing binary settings of a network topology and the remote computer.
- Applying these binary settings to code a Remote Access Service (RAS) Application Programming Interface (API) to generate a configuration data binary file.
- Embedding the configuration data binary file as instructions in the RAS API.
- Replacing the empty binary file with the configuration data binary file to generate the final executable file.
- Deploying the executable file to the remote computer.
- Executing the file on the remote computer to modify its configuration settings by editing RAS files of the operating system.
- Creating a connection profile containing information such as an IP address, gateway address, and DNS address.
- Coding and automatically transmitting WAN and LAN login credentials.
- Automatically deleting the executable file after the VPN connection terminates.
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
- The complaint identifies Microsoft’s "Intune" product as the accused instrumentality (Compl. ¶27).
Functionality and Market Context
- The complaint describes Intune as a "cloud-based endpoint management solution that has the capability to remotely configure multiple devices such as computers, laptops, and/or notebooks" (Compl. ¶27).
- Specifically, the accused functionality is Intune's ability to allow an administrator to "configure a remote computer for a Virtual Private Network (VPN) by deploying VPN profiles" (Compl. ¶27). The complaint does not provide further technical detail on the operation of Intune or its market position.
IV. Analysis of Infringement Allegations
The complaint references a claim chart in an "Exhibit B" to detail its infringement allegations; however, this exhibit was not included with the filed complaint (Compl. ¶31, ¶36). The narrative infringement theory presented in the complaint is that Microsoft's Intune product infringes at least Claim 1 of the ’718 Patent (Compl. ¶31). The core of the allegation is that the Intune system, when used by an administrator to create and deploy a VPN profile to a remote device, performs the steps of the patented method for automatically configuring a remote computer (’718 Patent, col. 21:4-22:2). The complaint alleges that this process of deploying "VPN profiles" via Intune constitutes the claimed method of generating and deploying an "executable file" that automatically configures the remote computer's settings (Compl. ¶27).
No probative visual evidence provided in complaint.
V. Key Claim Terms for Construction
The Term: "executable file"
Context and Importance: This term is central to the invention, as the generation and deployment of this file is the core of the claimed method. The outcome of the dispute may depend on whether a modern "VPN profile," as deployed by Intune, falls within the scope of an "executable file" as understood in the context of the patent.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification suggests the function of causing the computer to perform actions is key, stating that "it is possible to use scripting to cause the remote computer to execute certain procedures" (’718 Patent, col. 6:44-46). This may support an argument that any data package, such as a profile, that triggers configuration procedures is an "executable file."
- Evidence for a Narrower Interpretation: The patent repeatedly describes using a "compiler module" and references the "Microsoft installer program" as the "executable file" (’718 Patent, col. 9:25-27). This could support a narrower construction limited to a more traditional, compiled application (e.g., an .exe or .msi file), which may differ from a modern, declarative configuration profile.
The Term: "installer program having an empty binary file"
Context and Importance: This limitation defines the very first step of the claimed method. Plaintiff's ability to prove infringement will depend on showing that the process of creating a VPN profile in Intune includes a step that is the same as or equivalent to initiating an installer with an "empty binary file" that is later populated.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification describes this in functional terms: "the installer is the first program built. The binary resource includes the configuration data, and because it is the first program to be built, the configuration data is initially empty" (’718 Patent, col. 9:29-32). This could support construing the term to cover any process that starts with a configuration template that is subsequently populated with specific settings.
- Evidence for a Narrower Interpretation: The explicit language may be argued to require a literal empty file that is part of a specific type of installer framework, which may not be how a modern, cloud-based system like Intune architecturally functions. The patent's focus on a "Microsoft installer" could be used to argue for a scope tied to that era's specific technology (’718 Patent, col. 9:26-27).
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement of infringement, stating that Microsoft provides "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the ’718 Patent" (Compl. ¶34). A claim for contributory infringement is also made, though without specific supporting factual allegations (Compl. ¶31).
- Willful Infringement: Willfulness is alleged based on knowledge acquired "at least as of the service of the present complaint" (Compl. ¶29, ¶33). The complaint makes a conclusory allegation of pre-suit knowledge but provides no facts to support it beyond the act of filing the lawsuit itself.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of technical translation: does the process of an administrator using the cloud-based Microsoft Intune service to create and deploy a "VPN profile" meet the specific, sequential steps of Claim 1, which describe generating a self-contained "executable file" using an "installer program," a "network database," and a "RAS API"? The court will need to determine if there is a literal correspondence or an equivalence between the modern accused process and the claimed method.
- The case will also likely turn on a question of definitional scope: can claim terms rooted in the early-2000s computing environment, such as "executable file" and "installer program," be construed to encompass modern technological constructs like a "VPN profile" deployed by a cloud-based endpoint management system, or is there a fundamental mismatch in technology that places the accused product outside the patent's scope?