DCT
3:25-cv-00286
Red Hat Inc v. VPN Technology Holdings Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Red Hat, Inc. (North Carolina)
- Defendant: VPN Technology Holdings, LLC (Virginia)
- Plaintiff’s Counsel: Kilpatrick Townsend & Stockton LLP
 
- Case Identification: 1:25-cv-00613, E.D. Va., 04/10/2025
- Venue Allegations: Venue is alleged to be proper in the Eastern District of Virginia because the defendant, VPN Technology Holdings, LLC, has its principal place of business in Virginia and is a resident of the district.
- Core Dispute: Plaintiff Red Hat seeks a declaratory judgment that its Red Hat Enterprise Linux software does not infringe Defendant VPN Technology Holdings' patent related to the automatic configuration of remote computers for network access.
- Technical Context: The technology concerns methods for automating the setup of Virtual Private Network (VPN) connections, a critical function for enabling secure remote access to corporate networks.
- Key Procedural History: This declaratory judgment action follows a prior lawsuit filed by VPN Technology against Red Hat in the Eastern District of Texas. After Red Hat sent a letter detailing its non-infringement positions, VPN Technology voluntarily dismissed its suit without prejudice. Red Hat filed this action, alleging it remains under threat of a renewed infringement suit.
Case Timeline
| Date | Event | 
|---|---|
| 2002-05-14 | ’718 Patent Priority Date | 
| 2010-11-30 | ’718 Patent Issue Date | 
| 2020-01-01 | ’718 Patent Assigned to VPN Technology Holdings, LLC | 
| 2020-01-06 | VPN Technology Holdings, LLC Formed | 
| 2024-10-03 | VPN Asserts '718 Patent in First of Several Lawsuits | 
| 2025-01-29 | VPN Sues Red Hat for Infringement in E.D. Texas | 
| 2025-02-22 | ’718 Patent Expiration Date | 
| 2025-03-28 | Red Hat Counsel Sends Non-Infringement Letter to VPN Counsel | 
| 2025-04-04 | VPN Voluntarily Dismisses E.D. Texas Lawsuit | 
| 2025-04-05 | VPN Counsel Sends Reply Letter Maintaining Infringement | 
| 2025-04-10 | Complaint for Declaratory Judgment Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,844,718 - “System and Method for Automatically Configuring Remote Computer”
- Patent Identification: U.S. Patent No. 7,844,718, “System and Method for Automatically Configuring Remote Computer,” issued November 30, 2010.
The Invention Explained
- Problem Addressed: The patent’s background section describes the problem that network administrators face when needing to individually and manually configure each remote computer to establish a secure VPN connection, a process that is described as inconvenient, time-consuming, and prone to data entry errors ( ’718 Patent, col. 2:9-34).
- The Patented Solution: The invention is a system and method that automates this process by generating an executable file. A network administrator provides the necessary network parameters (e.g., WAN, DNS, and WINS addresses) to a configuration program, which then creates a self-contained executable file. This file is sent to the remote user, and when run, it automatically configures the remote computer’s operating system settings (such as the Remote Access Service phonebook) to enable the VPN connection without further manual intervention ( ’718 Patent, Abstract; col. 3:35-48).
- Technical Importance: This approach sought to simplify the deployment of secure remote access for enterprise users by replacing complex manual setup procedures with a distributable, automated software tool, thereby reducing administrative burden and potential user error ( ’718 Patent, col. 2:44-54).
Key Claims at a Glance
- The complaint indicates that VPN had previously asserted infringement of the patent’s two independent claims, 1 and 13 (Compl. ¶49).
- Independent Claim 1 recites essential elements including:- A method initiated at a network administrator computer that begins with an "installer program having an empty binary file".
- Accessing a network database to "extract configuration data" representing network topology and remote computer settings.
- Applying these settings to code a "Remote Access Service (RAS) Application Programming Interface (API)" to generate a "configuration data binary file".
- "Replacing the empty binary file" with the newly generated configuration data binary file to create a final executable file.
- "Deploying" the executable file to the remote computer.
- "Executing" the file on the remote computer to "modify configuration settings... by installing the prescribed RAS settings to edit RAS files" of the operating system.
- The method includes "creating a connection profile" that contains information regarding "at least one of... an IP address, an address for a gateway, a DNS address, a WINS address, a DHCP address, and a NAT address".
 
- The complaint does not specify which, if any, dependent claims were asserted but notes that all dependent claims rely on the independent claims (Compl. ¶37).
III. The Accused Instrumentality
Product Identification
- Red Hat Enterprise Linux (“RHEL”) (Compl. ¶3).
Functionality and Market Context
- The complaint describes RHEL as an open-source operating system widely used in the enterprise market (Compl. ¶24). It is the software that manages computer hardware and software, acting as a bridge between the user and the hardware (Compl. ¶23).
- Red Hat derives revenue from services surrounding RHEL, including aggregating, certifying, testing, and supporting the open-source software (Compl. ¶21). The complaint emphasizes that RHEL is a Linux-based product, contrasting it with the Microsoft Windows environment described in the patent (Compl. ¶38-40, 44).
IV. Analysis of Infringement Allegations
The complaint alleges non-infringement by deconstructing VPN's apparent infringement theories from the prior, dismissed litigation. No probative visual evidence provided in complaint.
’718 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality (per Red Hat's description of VPN's theory) | Complaint Citation | Patent Citation | 
|---|---|---|---|
| ... an installer program having an empty binary file... replacing the empty binary file... with the configuration data binary file... | VPN allegedly identified a configuration file from Red Hat's instructional documentation, which Red Hat asserts is a text file and therefore cannot be a "binary file." | ¶35, 36 | col. 21:8-28 | 
| ... applying... the binary settings... to code a Remote Access Service (RAS) Application Programming Interface (API)... | RHEL allegedly does not comprise a "Remote Access Service (RAS)," which the complaint characterizes as a specific feature "built into Windows NT." | ¶37-40 | col. 21:17-23 | 
| ... creating a connection profile... wherein the connection profile contains information regarding at least one of... a WINS address... | Computers running RHEL are allegedly not configured with a "WINS address," which the complaint characterizes as outdated Windows-specific functionality. | ¶41-44 | col. 22:50-57 | 
- Identified Points of Contention:- Technical Questions: A primary factual dispute appears to be whether the configuration file identified by VPN in RHEL's documentation is a "binary file" as required by the claim, or a "text file" as asserted by Red Hat (Compl. ¶35). The complaint suggests VPN's evidence consisted of instructional documentation rather than source code, raising the question of what evidence exists that RHEL actually performs the claimed steps (Compl. ¶29).
- Scope Questions: The infringement analysis will turn on whether claim terms rooted in a Windows-centric disclosure can read on a Linux-based operating system. Key questions include: does the term "Remote Access Service (RAS)", which the patent specification links to Windows, cover analogous remote access functionality in Linux? (Compl. ¶38-40). Similarly, can the term "WINS address" be construed to cover name resolution protocols in RHEL, or is it limited to the specific "Windows Internet Naming Service" protocol? (Compl. ¶42-44).
 
V. Key Claim Terms for Construction
- The Term: "configuration data binary file" - Context and Importance: This term appears central to the infringement dispute. Red Hat alleges that VPN's infringement theory fails because the accused functionality involves a "text file," which it argues is definitionally excluded from being a "binary file" (Compl. ¶35). The construction of this term may determine whether the accused RHEL product can meet a foundational element of the claim.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent does not appear to provide an explicit definition. A party might argue that in the context of configuration data, any non-human-readable or compiled data format should be considered "binary," as opposed to plain, human-readable text.
- Evidence for a Narrower Interpretation: A party could argue that the term, as used in the claim ("replacing the empty binary file of the installer program"), implies a specific type of resource file integrated into a compiled application, distinguishing it from standalone configuration scripts or text-based data files. The patent's reference to the "Microsoft installer program" as the executable could be used to narrow the term to formats used by that specific technology ( ’718 Patent, col. 9:26-28).
 
 
- The Term: "Remote Access Service (RAS)" - Context and Importance: Practitioners may focus on this term because Red Hat's non-infringement defense relies heavily on characterizing RAS as a specific Microsoft Windows feature not present in Linux (Compl. ¶38-40). Whether this term is limited to the specific Windows embodiment or can be construed more broadly to mean any generic remote access service will be critical.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: A party could argue "RAS" is used as a generic descriptor for the type of service being configured. The patent's summary suggests a general object of providing "a system and method for remotely configuring an operating system of a remote computer" without limitation to Windows ( ’718 Patent, col. 2:60-64).
- Evidence for a Narrower Interpretation: The specification repeatedly and specifically links RAS to the Windows operating system, for example, by stating the invention configures "the RAS phonebook of the Windows operating system" and edits "RAS files of an operating system" ( ’718 Patent, col. 3:43-45; col. 21:33-34). The complaint also notes that during prosecution, the applicants did not dispute an examiner's characterization of RAS as a feature "built into Windows NT" (Compl. ¶38).
 
 
VI. Other Allegations
- Indirect Infringement: The complaint states that VPN's original suit alleged indirect infringement (Compl. ¶3). Red Hat argues that it has not induced anyone to infringe and that RHEL has substantial non-infringing uses (Compl. ¶33). The complaint notes that VPN's prior claim chart cited "instructional documentation" as evidence of infringement, which may form the basis of an inducement allegation by suggesting Red Hat instructs its users on how to perform an infringing method (Compl. ¶29).
- Willful Infringement: The complaint does not allege willfulness but seeks a finding of an "exceptional case" to recover attorneys' fees (Compl., Prayer for Relief ¶B). The factual basis for this appears to be Red Hat's allegation that VPN continued to maintain its infringement positions (Compl. ¶31) even after Red Hat provided "evidence of non-infringement" and after VPN dismissed its initial suit (Compl. ¶30).
VII. Analyst’s Conclusion: Key Questions for the Case
This declaratory judgment action appears poised to center on fundamental questions of claim scope and technical mismatch. The key issues for the court will likely be:
- A core issue will be one of technological scope: Can claim terms such as "Remote Access Service (RAS)" and "WINS address," which the patent’s specification repeatedly ties to the Microsoft Windows environment of the early 2000s, be construed broadly enough to read on the allegedly corresponding functionalities within the modern, open-source Red Hat Enterprise Linux operating system?
- A second key issue will be one of definitional and evidentiary conflict: Does the accused RHEL system in fact utilize a "configuration data binary file" as required by the claims? This will require the court to first construe the term and then determine whether the file identified by VPN—which Red Hat characterizes as a "text file"—falls within that definition.
- Finally, as this is a method patent, a central evidentiary question will be one of direct infringement by a third party: What proof exists that users of RHEL actually perform every step of the claimed method, and can VPN Technology link Red Hat’s "instructional documentation" to specific acts of inducement by showing Red Hat intended for its customers to infringe the patent?