Virnetx Inc. v. Mangrove Partners Master Fund

Case: 20-2271 Document: 114 Page: 1 Filed: 03/30/2023 NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit ______________________ VIRNETX INC., Appellant v. MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., Appellees KATHERINE K. VIDAL, UNDER SECRETARY OF COMMERCE FOR INTELLECTUAL PROPERTY AND DIRECTOR OF THE UNITED STATES PATENT AND TRADEMARK OFFICE, Intervenor ______________________ 2020-2271 ______________________ Appeal from the United States Patent and Trademark Office, Patent Trial and Appeal Board in Nos. IPR2015- 01046, IPR2016-00062. ------------------------------------------------- VIRNETX INC., Appellant v. Case: 20-2271 Document: 114 Page: 2 Filed: 03/30/2023 2 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND MANGROVE PARTNERS MASTER FUND, LTD., APPLE INC., BLACK SWAMP IP, LLC, Appellees KATHERINE K. VIDAL, UNDER SECRETARY OF COMMERCE FOR INTELLECTUAL PROPERTY AND DIRECTOR OF THE UNITED STATES PATENT AND TRADEMARK OFFICE, Intervenor ______________________ 2020-2272 ______________________ Appeal from the United States Patent and Trademark Office, Patent Trial and Appeal Board in Nos IPR2015- 01047, IPR2016-00063, IPR2016-00167. ______________________ Decided: March 30, 2023 ______________________ STEPHEN BLAKE KINNAIRD, Paul Hastings LLP, Wash- ington, DC, argued for appellant. Also represented by NAVEEN MODI, JOSEPH PALYS, IGOR VICTOR TIMOFEYEV, DANIEL ZEILBERGER; JEFFREY A. LAMKEN, MoloLamken LLP, Washington, DC. JAMES T. BAILEY, Law Office of James T. Bailey, New York, NY, for appellee Mangrove Partners Master Fund, Ltd. WILLIAM F. LEE, Wilmer Cutler Pickering Hale and Dorr LLP, Boston, MA, argued for Apple Inc. Also repre- sented by MARK CHRISTOPHER FLEMING, LAUREN B. FLETCHER; BRITTANY BLUEITT AMADI, STEVEN JARED HORN, Washington, DC; THOMAS GREGORY SPRANKLING, Palo Alto, CA; SCOTT BORDER, JEFFREY PAUL KUSHAN, Sidley Austin Case: 20-2271 Document: 114 Page: 3 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 3 LLP, Washington, DC. THOMAS H. MARTIN, Martin & Ferraro, LLP, Hartville, OH, for appellee Black Swamp IP, LLC. Also represented by WESLEY MEINERDING. MAUREEN DONOVAN QUELER, Office of the Solicitor, United States Patent and Trademark Office, Alexandria, VA for intervenor. Also represented by KAKOLI CAPRIHAN, DANIEL KAZHDAN, THOMAS W. KRAUSE, FARHEENA YASMEEN RASHEED; MICHAEL GRANSTON, SCOTT R. MCINTOSH, JOSHUA MARC SALZMAN Appellate Staff, Civil Division, United States Department of Justice, Washing- ton, DC. ______________________ Before MOORE, Chief Judge, HUGHES and STARK, Circuit Judges. STARK, Circuit Judge. In this consolidated appeal, VirnetX Inc. (“VirnetX”) appeals from two final written decisions of the Patent Trial and Appeal Board (“Board”) holding the challenged claims of U.S. Patent Nos. 6,502,135 (“’135 patent”) and 7,490,151 (“’151 patent”) unpatentable. J.A. 1-28 (regarding ’135 pa- tent); J.A. 29-60 (regarding ’151 patent). VirnetX also chal- lenges Black Swamp IP, LLC’s (“Black Swamp”) joinder. We affirm. I VirnetX owns the ’135 and ’151 patents. Both are gen- erally directed to a “secure mechanism for communicating over the internet.” ’135 patent cols. 2-3 ll. 66-67, 1-2; see also ’151 patent col. 3 ll. 8-11. These patents have been before us previously, see, e.g., VirnetX Inc. v. Mangrove Partners Master Fund, Ltd., 778 F. App’x 897 (Fed. Cir. 2019) (“Mangrove Appeal”); VirnetX, Inc. v. Cisco Sys., Inc., Case: 20-2271 Document: 114 Page: 4 Filed: 03/30/2023 4 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 767 F.3d 1308 (Fed. Cir. 2014) (“Cisco Appeal”), so we have had occasion to describe them, doing so as follows: The ’135 and ’151 patents share a com- mon specification disclosing a system in which, instead of a conventional DNS [(“Domain Name Service”)] re- ceiving the request, a DNS proxy inter- cepts it and determines whether the request is for a secure site. If the proxy determines that a request is for a se- cure site, the system automatically ini- tiates a virtual private network (“VPN”) between the proxy and the se- cure site. If the browser determines that the request was for a non-secure website, then the DNS proxy forwards the request to a conventional DNS for resolution. Cisco Appeal, 767 F.3d at 1315 (internal citations omitted). A The ’135 patent is entitled “Agile Network Protocol for Secure Communications with Assured System Availabil- ity.” Independent claim 1 is representative, with emphasis added to the term principally in dispute: 1. A method of transparently creating a virtual private network (VPN) be- tween a client computer and a target computer, comprising the steps of: (1) generating from the client computer a Domain Name Service (DNS) request that requests an IP address corre- sponding to a domain name associated with the target computer; Case: 20-2271 Document: 114 Page: 5 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 5 (2) determining whether the DNS re- quest transmitted in step (1) is request- ing access to a secure web site; and (3) in response to determining that the DNS request in step (2) is requesting access to a secure target web site, auto- matically initiating the VPN between the client computer and the target com- puter. ’135 patent col. 47 ll. 20-32. Mangrove Partners Master Fund, Ltd. (“Mangrove”) petitioned for inter partes review (“IPR”) of claims 1, 3-4, 7- 8, 10, and 12 of the ’135 patent, alleging that these claims were anticipated by a 1996 article authored by Kiuchi and Kaihara, entitled “C-HTTP – The Development of a Secure, Closed HTTP-based Network on the Internet” (“Kiuchi”), and that claim 8 was obvious based on Kiuchi in view of Mockapetris, Request for Comment 1034, “Domain Names – Concepts and Facilities,” Nov. 1997 (“RFC 1034”). J.A. 5. Once the Board instituted review, Apple Inc. (“Apple”) filed additional IPR petitions and was joined to Mangrove’s IPR proceeding. See Mangrove Appeal, 778 F. App’x at 900-01. B The ’151 patent is entitled “Establishment of a Secure Communication Link Based on a Domain Name Service (DNS) Request.” Independent claim 13 is representative, again with emphasis added to the terms in dispute: 13. A computer readable medium stor- ing a domain name server (DNS) mod- ule comprised of computer readable instructions that, when executed, cause a data processing device to per- form the steps of: Case: 20-2271 Document: 114 Page: 6 Filed: 03/30/2023 6 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND (i) determining whether a DNS request sent by a client corresponds to a secure server; (ii) when the DNS request does not cor- respond to a secure server, forwarding the DNS request to a DNS function that returns an IP address of a nonse- cure computer; and (iii) when the intercepted DNS request corresponds to a secure server, auto- matically creating a secure channel be- tween the client and the secure server. ’151 patent col. 48 ll. 18-29. Mangrove petitioned for IPR of claims 1-2, 6-8, and 12- 14 of the ’151 patent, alleging they were anticipated by Kiu- chi and obvious based on (a) Kiuchi in view of RFC 1034, (b) Kiuchi in view of a 1996 reference by Rescorla and Schiffman, entitled “The Secure Hypertext Transfer Proto- col” (“Rescorla”), and (c) Kiuchi in view of RFC 1034 and in further view of Rescorla. J.A. 33. Apple was also joined to the proceeding. See Mangrove Appeal, 778 F. App’x at 900- 01. Black Swamp then petitioned for IPR of claims 1-2, 6- 8, and 12-14 and moved for joinder, which the Board granted. See id. at 901 n.1. In the remainder of this opinion, we will refer to Man- grove, Apple, and Black Swamp collectively as “Petition- ers.” C Kiuchi is the only reference at issue in this appeal. This is because Kiuchi provided some or all of the bases on which the Board predicated its unpatentability decisions Case: 20-2271 Document: 114 Page: 7 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 7 with respect to the challenged claims in the ’135 and ’151 patents. See J.A. 26; J.A. 58. 1 Kiuchi’s secure network was developed to ensure the “[s]ecure transfer of patient information for clinical use” in a hospital setting. J.A. 5266. A depiction of an embodi- ment of Kiuchi – prepared by Petitioners’ expert, annotated by Petitioners’ counsel, and then relied on by the Board – 1 The Board determined that the challenged claims of the ’135 patent were all anticipated by Kiuchi and did not reach Mangrove’s additional unpatentability ground. J.A. 26. With respect to the ’151 patent, the Board found that Kiuchi anticipated claims 13 and 14 and the combina- tion of Kiuchi and Rescorla rendered claims 1-2, 6-8, and 12-14 obvious. J.A. 58. This appeal presents no issues re- lating to Rescorla or RFC 1034. Given that the only issues on appeal relate to Kiuchi, our affirmance of the Board’s judgment of anticipation by Kiuchi of claims 13 and 14 of the ’151 patent leads us also to affirm the Board’s determi- nation that claims 1-2, 6-8, and 12-14 of the same patent are unpatentable due to obviousness. Case: 20-2271 Document: 114 Page: 8 Filed: 03/30/2023 8 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND is reproduced and explained below. J.A. 12-13; see also J.A. 7066. As shown, in Kiuchi a client or “user agent” first sends a uniform resource locator (“URL”) to the client-side proxy (step 1 in Diagram 2). J.A. 5267; see also J.A. 5454. Next, the client-side proxy sends the URL to the C-HTTP secure name service, which checks if the client-side proxy is per- mitted to connect with the host (also known as an “origin server”) to which the URL corresponds (step 2). See J.A. 5267. If the client-side proxy is authorized to communicate with that host, “the C-HTTP name server sends the IP ad- dress and public key of the server-side proxy and both re- quest and response Nonce values” or returns an error code (step 3). Id. Then, the client-side proxy sends a connection request to the server-side proxy (step 4). Id. The server- side proxy checks with the C-HTTP name server to verify that the client-side proxy is “an appropriate member of the closed network” (steps 5 and 6). J.A. 5267-68. If so, “the C-HTTP name server sends the IP address and public key of the client-side proxy [to the server-side proxy] and both request and response Nonce values, which are the same as those sent to the client-side proxy” (step 7). J.A. 5268. Both the client-side proxy and server-side proxy then au- thenticate each other, and a secure connection – the dashed line “Virtual Private Network (VPN)” in Diagram 2 – is es- tablished. Id. As the Board stated, Kiuchi teaches that after the steps outlined above, “a VPN between the user agent and the origin server that passes through the client-side proxy and server-side proxy” is established. J.A. 12. At that point, the “client-side proxy forwards HTTP/1.0 requests from the user agent in encrypted form using C-HTTP format” to the server-side proxy, and the “server-side proxy forwards re- quests to the origin server.” J.A. 5268. Thereafter, the origin server’s response is “encrypted in C-HTTP format by the server-side proxy and is forwarded to the client-side Case: 20-2271 Document: 114 Page: 9 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 9 proxy” which decrypts it, and the response is ultimately sent to the user agent. Id. D In September 2016, the Board issued a final written decision finding all challenged claims of the ’135 patent un- patentable. J.A. 1723-58. VirnetX had argued that the preamble of claim 1, which recites a virtual private network (VPN) between a client computer and a target computer, was limiting and must be construed in light of a disclaimer VirnetX had made during reexamination of its ’135 patent. See, e.g., J.A. 1737-38. VirnetX argued that it had “dis- claimed any virtual private networks and virtual private network communication links that are not direct,” J.A. 1192, and had done so to distinguish Aventail, a prior-art reference teaching “a system and architecture for transmit- ting data between two computers using the SOCKS proto- col,” J.A. 7763-64. The Board disagreed, finding no disclaimer. See J.A. 1738. VirnetX then appealed to this Court. See Mangrove Ap- peal, 778 F. App’x at 909-10. Contrary to the Board, we determined that “[t]he statements VirnetX made during reexamination constitute disclaimer.” Id. at 910. The source of this disclaimer is VirnetX’s 2010 response to an Office Action rejection based on Aventail. See J.A. 7760, 7763-66. In that response, VirnetX stated: Aventail discloses a system where a cli- ent on a public network transmits data to a SOCKS server via a singular, point-to-point SOCKS connection at the socket layer of the network architecture. The SOCKS server then relays that data to a target computer on a private network on which the SOCKS server also resides. All communications be- tween the client and target stop and start at the intermediate SOCKS Case: 20-2271 Document: 114 Page: 10 Filed: 03/30/2023 10 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND server. The client cannot open a con- nection with the target itself. J.A. 7766 (internal citations omitted and emphasis added). In the Mangrove Appeal, we held: VirnetX described a system in which a client computer communicates with an intermediate server via a singular, point-to-point connection. That inter- mediate server then relays the data to a target computer on the same private network on which the server resides. VirnetX stated that because the com- puters “do not communicate directly with each other” and “[t]he client can- not open a connection with the target itself,” the computers are not on the same VPN. This clearly and unmistak- ably states that a “VPN between the client computer and the target com- puter” requires direct communication between the client and target comput- ers. Id. at 910 (quoting J.A. 7766) (internal citations omitted and emphasis added). We vacated the Board’s judgment of unpatentability and remanded for the Board to consider whether, as a fac- tual matter, Kiuchi taught a direct-communication VPN – in which case it would anticipate the challenged claims of the ’135 patent – or whether, instead, Kiuchi taught an in- direct-communication VPN – which would bring Kiuchi within the scope of VirnetX’s disclaimer and, consequently, render it non-anticipating. See id. On remand, the Board issued a second final written de- cision in July 2020. J.A. 1-28 (“2020 ’135 FWD”). There, the Board again found all the challenged claims in the ’135 Case: 20-2271 Document: 114 Page: 11 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 11 patent unpatentable. J.A. 26. In particular, the Board found that Kiuchi disclosed a virtual private network (VPN) between a client computer and a target computer with direct communication and, thus, Kiuchi anticipated the chal- lenged claims. J.A. 18. After considering VirnetX’s de- scription of its claimed VPN as one “where data can be addressed to one or more different computers across the network, regardless of the location of the computer,” and VirnetX’s expert’s testimony that “direct communication refers to direct addressability,” the Board concluded that “the ability to address data to a particular computer is a key aspect of the claimed VPN.” J.A. 14. The Board rea- soned that “Kiuchi’s system, unlike the disclaimed scope, allows a client (the user agent) to connect to a remote [origin] server transparently and access resources with only the single URL identifying the remote resource.” J.A. 15. Therefore, according to the Board, Kiuchi discloses a direct-communication VPN between the client and target and anticipates the challenged claims of the ’135 patent. J.A. 18. E Meanwhile, also in September 2016, the Board issued its first final written decision concerning the challenged claims of the ’151 patent. See J.A. 4233-70. In it, the Board found that all challenged claims (1-2, 6-8, and 12-14) were unpatentable as anticipated by Kiuchi or obvious in view of Kiuchi and other references. Id. We addressed VirnetX’s subsequent appeal as part of our opinion in the Mangrove Appeal, 778 F. App’x at 906. As with the ’135 patent, we disagreed with the Board, holding that “[s]ubstantial evi- dence does not support the Board’s finding that the C- HTTP name server [of Kiuchi] performs the functions of the claimed DNS proxy module” in the ’151 patent. Id. Case: 20-2271 Document: 114 Page: 12 Filed: 03/30/2023 12 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND Accordingly, we vacated the Board’s judgment and re- manded for further proceedings. See id. at 911. On remand, in July 2020, the Board issued a second final written decision regarding the ’151 patent. J.A. 29-60 (“2020 ’151 FWD”). The Board explained that Petitioners were asserting that Kiuchi’s “client-side proxy – working in concert with the C-HTTP name server – is a domain name server (DNS) proxy module that intercepts DNS requests sent by a user agent acting as a client.” J.A. 38-39. The Board agreed with Petitioners’ analysis, finding that Kiu- chi’s client-side proxy and C-HTTP name server together perform all the DNS module’s pertinent claim limitations and, therefore, that Kiuchi anticipates claims 13 and 14, see J.A. 39-47, and Kiuchi in combination with Rescorla renders all of the challenged claims obvious, J.A. 58. 2 F VirnetX timely appealed the Board’s determinations that Kiuchi anticipates the challenged claims of the ’135 patent, as the Board explained in the 2020 ’135 FWD, and anticipates claims 13 and 14 of the ’151 patent, as ex- plained in the 2020 ’151 FWD. On appeal, VirnetX’s main contention with respect to the ’135 patent is that Kiuchi does not teach direct communication but, instead, only in- direct communication, which brings Kiuchi within the scope of VirnetX’s disclaimer and outside the scope of its 2 On appeal, VirnetX challenges only the Board’s as- sessment of Kiuchi; it presents no non-Kiuchi-based criti- cism of the Board’s obviousness analysis. VirnetX does not dispute that if we affirm the Board’s determination that claims 13 and 14 of the ’151 patent are anticipated by Kiu- chi then we must also affirm the Board’s conclusion that all of the challenged claims of the ’151 patent are unpatenta- ble as obvious. We will do so. Case: 20-2271 Document: 114 Page: 13 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 13 claims. Its principal argument with respect to the ’151 pa- tent is that Kiuchi does not teach a DNS proxy module ca- pable of performing the determining, forwarding, and creating steps of the challenged claims. Finally, VirnetX argues that the Board improperly joined Black Swamp to the IPR concerning the ’151 patent (i.e., IPR2015-01047). 3 We have jurisdiction to review final written decisions of the Board under 28 U.S.C. § 1295(a)(4)(A). II We review the Board’s legal determinations de novo and its factual findings for substantial evidence. See Almi- rall, LLC v. Amneal Pharms. LLC, 28 F.4th 265, 271 (Fed. Cir. 2022). Substantial evidence is “such relevant evidence as a reasonable mind might accept as adequate to support a conclusion.” Consol. Edison Co. v. NLRB, 305 U.S. 197, 229 (1938). “[T]he possibility of drawing two inconsistent conclusions from the evidence does not prevent an admin- istrative agency’s finding from being supported by substan- tial evidence.” Consolo v. Fed. Maritime Comm’n, 383 U.S. 607, 620 (1966). Anticipation presents a question of fact we review for substantial evidence. See Husky Injection Molding Sys. Ltd. v. Athena Automation Ltd., 838 F.3d 1236, 1248 (Fed. Cir. 2016). The Board’s conclusions about what a prior-art reference discloses are also reviewed for substantial 3 VirnetX initially challenged the authority of Acting Director Commissioner Hirshfeld to issue final decisions in light of United States v. Arthrex, Inc., 141 S. Ct. 1970 (2021). The government intervened to address this chal- lenge. VirnetX later acknowledged that this argument is foreclosed by our decision in Arthrex, Inc. v. Smith & Nephew, Inc., 35 F.4th 1328 (Fed. Cir. 2022). See No. 20- 2271 ECF No. 107. Therefore, we do not address it. Case: 20-2271 Document: 114 Page: 14 Filed: 03/30/2023 14 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND evidence. See Elbit Sys. of Am. v. Thales Visionix, Inc., 881 F.3d 1354, 1357 (Fed. Cir. 2018). To anticipate under 35 U.S.C. § 102, a single prior-art reference “must not only disclose all elements of the claim within the four corners of the document, but must also dis- close those elements ‘arranged as in the claim.’” NetMoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359, 1369 (Fed. Cir. 2008) (quoting Connell v. Sears, Roebuck & Co., 722 F.2d 1542, 1548 (Fed. Cir. 1983)). “The requirement that the prior art elements themselves be arranged as in the claim means that claims cannot be treated . . . as mere catalogs of separate parts, in disregard of the part-to-part relationships set forth in the claims and that give the claims their meaning.” Therasense, Inc. v. Becton, Dickin- son & Co., 593 F.3d 1325, 1332 (Fed. Cir. 2010) (internal quotation marks omitted). III Substantial evidence supports the Board’s conclusion that Kiuchi teaches a direct-communication VPN and is therefore within the scope of the claims of VirnetX’s ’135 patent, and not an indirect-communication VPN, which would have brought Kiuchi within the scope of VirnetX’s disclaimer. It follows that Kiuchi, which is undisputedly prior art to the ’135 patent, anticipates the challenged claims of the ’135 patent. A As we explained in the Mangrove Appeal, when Vir- netX distinguished Aventail during reexamination of the ’135 patent, VirnetX disclaimed “a system in which a client computer communicates with an intermediate server via a singular, point-to-point connection.” 778 F. App’x at 910. To be within the scope of VirnetX’s claims, therefore, “re- quires direct communication between the client and target computers.” Id. We remanded for the Board to make a factual determination as to whether Kiuchi involves Case: 20-2271 Document: 114 Page: 15 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 15 “singular, point-to-point connection[s]” with intermediate components sitting between a client and a target computer, or whether, instead, Kiuchi involves “direct communica- tion” between a client and target computer, even if inter- mediate components sit between the client and target. Id. On remand, the Board found “by a preponderance of evidence that Kiuchi discloses direct communication that satisfies the claimed VPN.” J.A. 18. In doing so, the Board expressly found “that Kiuchi’s system does not use a singu- lar, point-to-point connection as was disclaimed,” and as had been used in Aventail. Id. The Board rejected Vir- netX’s contrary arguments as “conflat[ing] link with con- nection,” J.A. 13, and focused instead on the “nature of the overall connection,” J.A. 14. In particular, the Board found that “Kiuchi’s user agent does not communicate with the client-side proxy using a singular, point-to-point connec- tion because the user agent addresses the desired endpoint and the VPN provides the required message routing for the user agent to receive a response from the desired end- point.” J.A. 15. The Board’s conclusions are grounded in its reading of Kiuchi and the ’135 patent. Its conclusions are supported by substantial evidence. 4 We agree with the Board the VirnetX “provides no ex- planation of why Kiuchi’s connection is a point-to-point connection.” J.A. 16. To the contrary, as the Board ex- plained: Kiuchi’s system . . . allows a client (the user agent) to connect to a remote server transparently and access 4 The Board stated that a declaration filed by Peti- tioners’ expert, Dr. Guerin, “d[id] not drive [its] conclusion on any disputed issue.” J.A. 24; J.A. 56. Case: 20-2271 Document: 114 Page: 16 Filed: 03/30/2023 16 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND resources with only the single URL identifying the remote resource. Kiu- chi’s system operates like the ’135 pa- tent’s TARP,[ 5] which allows the system to route a packet as required to reach the destination address provided by the client computer. Kiuchi’s user agent does not communicate with the client-side proxy using a singular, point-to-point connection because the user agent addresses the desired end- point and the VPN provides the re- quired message routing for the user agent to receive a response from the de- sired endpoint. J.A. 15 (internal citations omitted). As the Board further found, Kiuchi’s proxy servers for- ward data packets and do not, instead, relay data packets from point to point. See, e.g., J.A. 12; see also J.A. 5268 (Kiuchi using language such as “client-side proxy for- wards,” “[f]orwarding requests to an origin server,” “server- side proxy forwards,” “[a]n HTTP/1.0 response sent from the origin server to the server-side proxy is encrypted in C- HTTP format by the server-side proxy, and is forwarded to the client-side proxy”). Forwarding is within the scope of the claims, while relaying – which involves point-to-point communication, as data packets are accumulated at an in- termediate point before being relayed to their next destina- tion – is within the scope of VirnetX’s disclaimer. We know this from Aventail, which is the basis for VirnetX’s dis- claimer, and in which the SOCKS server “relays . . . data to 5 TARP is the ’135 patent’s “Tunneled Agile Routing Protocol.” See, e.g., J.A. 4. TARP routing, which is ex- pressly within the scope of the claims, uses “multiple links between two TARP terminals.” J.A. 14. Case: 20-2271 Document: 114 Page: 17 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 17 a target computer on a private network on which the SOCKS server also resides.” J.A. 7766 (emphasis added); see also Mangrove Appeal, 778 F. App’x at 910 (describing VirnetX’s disclaimer as encompassing systems where “in- termediate server then relays the data to a target com- puter”). In this way, communications between the client and target “stop and start at the intermediate SOCKS server,” preventing “[t]he client [from] open[ing] a connec- tion with the target itself.” Id. at 909. Kiuchi, by using forwarding, instead involves direct communication within the scope of VirnetX’s claims. 6 Additionally, the Board found that Kiuchi discloses “di- rect addressability,” which is “the ability to address data to a particular computer,” a “key aspect of the claimed VPN.” J.A. 14. The Board found that Kiuchi teaches direct ad- dressability because “Kiuchi’s user agent generates a re- quest that includes a resource address (in the form of a 6 VirnetX argues that Kiuchi’s proxies “modif[y] HTML documents” and that this prevents direct communi- cation. See, e.g., Opening Br. 42 (citing J.A. 5267-68). As Petitioners point out, however, there is substantial evi- dence that Kiuchi transmits at least some data, like image or sound data, without modification. See, e.g., Answering Br. 31 (citing J.A. 5893 (VirnetX’s expert agreeing that Kiuchi “can transfer files of various kinds”); J.A. 5910 (Vir- netX’s expert unable to “recall” anything in Kiuchi “that said that sound or image data files are modified when they are transferred from an origin server to a user agent”)). This is sufficient to satisfy the requirement for direct com- munication. See J.A. 17 (“Kiuchi’s disclosures of at least those types of resources [e.g., image and sound objects] maintain the requirement for direct communication.”). Case: 20-2271 Document: 114 Page: 18 Filed: 03/30/2023 18 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND URL).” Id. (citing portions of Kiuchi). 7 As support, the Board observed that a VirnetX expert, Dr. Monrose, “testi- fied that Kiuchi’s URL provided by the user agent is an ad- dress of the resource on an origin server.” J.A. 14-15. To the extent “direct communication refers to direct address- ability,” as another VirnetX expert, Dr. Jones, testified (J.A. 6206), substantial evidence supports the Board’s find- ing that Kiuchi discloses direct addressability and, there- fore, direct communication. The Board’s factual finding that Kiuchi discloses direct communication within the scope of VirnetX’s claims, and not indirect communication within the scope of VirnetX’s disclaimer, is also consistent with the infringement claims VirnetX has litigated. In the Cisco Appeal, we affirmed a judgment that Apple’s VPN On Demand service infringed the ’135 patent, finding substantial evidence existed to sup- port the conclusion that VPN On Demand involved direct communication even though it used “security measures in- cluding VPN servers, VPN authentication servers, proxy servers, and firewalls,” all placed between a client and tar- get computer. 767 F.3d at 1321. In the same opinion, we affirmed a finding that certain embodiments of Apple’s FaceTime service infringed claims of related patents. See id. at 1319-20. Part of the Cisco Appeal involved VirnetX’s assertion of U.S. Patent Nos. 7,418,504 and 7,921,211 against Apple’s FaceTime servers. Id. at 1313. The asserted claims included a “secure com- munication link” limitation that required direct 7 VirnetX argues that Kiuchi’s use of a URL cannot alone distinguish direct communication from indirect com- munication. See, e.g., Reply Br. 7. We agree, but we do not read the Board’s decision as stating otherwise. See, e.g., J.A. 14-15 (explaining that once connection is established, IP addresses of proxies are used, and proxies forward pack- ets to user agent or origin server as needed). Case: 20-2271 Document: 114 Page: 19 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 19 communication, just like the claims of the ’135 patent. Id. at 1314. We rejected Apple’s contention that it was entitled to judgment of non-infringement as a matter of law, a re- quest Apple based on its argument that the accused FaceTime servers addressed communication to intermedi- ate network address translators (“NATs”) rather than di- rectly to the receiving device, preventing – according to Apple – direct communication. See id. at 1319-20. To the contrary, we determined that the district court did not err in concluding that there was “substantial evi- dence to support the jury’s finding that NAT routers used by FaceTime do not impede direct communication” “be- cause they merely translate addresses from the public ad- dress space to the private address space, but do not terminate the connection” between the FaceTime server and the receiving device. Id.; see also id. at 1314 (“Apple’s FaceTime server . . . forwards the invitation to a network address translator (‘NAT’) which, in turn, readdresses the invitation and sends it on to the receiving device.”). We found support for this conclusion in the district court’s claim construction, which provided that “routers, firewalls, and similar servers . . . do not impede ‘direct’ communica- tion.” Id. at 1320 (quoting VirnetX Inc. v. Apple Inc., 925 F. Supp. 2d 816, 831 (E.D. Tex. 2013)). Further confirmation for our holding today is found in the fact that, in the litigation leading to the Cisco Appeal, VirnetX agreed that another FaceTime embodiment – the relay embodiment – did not have an infringing direct-com- munication VPN. Specifically, VirnetX “concede[d] that the [FaceTime] feature does not infringe if calls are routed through a relay server, because there is no direct commu- nication through a relay server.” VirnetX Inc., 925 F. Supp. 2d at 830 (emphasis added). In this respect, the relay server embodiment of FaceTime was like the Aventail em- bodiment VirnetX has clearly and unmistakably dis- claimed. Case: 20-2271 Document: 114 Page: 20 Filed: 03/30/2023 20 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND Thus, again, substantial evidence supports the Board’s finding that Kiuchi anticipates the challenged claims of the ’135 patent. 8 B In its reply brief, VirnetX refined its argument as to what constitutes “direct communication,” now asserting that its claims specifically require “a transport-layer [or TCP] connection directly between the user agent and the origin server.” Reply Br. 3 (emphasis added). 9 At oral ar- gument, VirnetX placed significant emphasis on this new argument, suggesting that the ’135 patent’s claims only en- compass direct connections between a user and target com- puter at the transport layer, so direct connections at any of the other six layers would be outside the scope of its claims 8 We recognize that in the Cisco Appeal, 767 F.3d at 1324, we affirmed the district court’s entry of judgment of no invalidity, based on the jury having “heard expert testi- mony that Kiuchi’s client-side and server-side proxies ter- minate the connection, process information, and create a new connection – actions that are not ‘direct’ within the meaning of the asserted claims.” That we upheld this ver- dict, which was based on a finding that Apple failed to prove anticipation by clear and convincing evidence, did not preclude the Board from finding, on a different record, anticipation by its own standard of a preponderance of the evidence. 9 VirnetX was referring to the seven-layer Open Sys- tems Interconnection (“OSI”) model, which consists of the following layers: physical, data link, network, transport, session, presentation, and application. See Reply Br. 2; see also ’135 patent col. 4 ll. 3-6 (referencing network layer, data link layer, and application layer); ’151 patent col. 4 ll. 11-14 (same). Case: 20-2271 Document: 114 Page: 21 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 21 (and therefore do not anticipate). See Oral Arg. at 6:20- 6:36 (VirnetX counsel distinguishing TARP embodiments, which are within scope of ’135 patent’s claims, from Kiuchi, based on TARP routers’ operation at network layer). 10 VirnetX’s argument that direct connections at layers other than the transport layer are irrelevant was not made in its opening brief and is forfeited. See Quanergy Sys., Inc. v. Velodyne Lidar USA, Inc., 24 F.4th 1406, 1415 n.6 (Fed. Cir. 2022) (party’s failure to challenge Board’s findings in opening brief constituted forfeiture). “[F]orfeiture is the failure to make the timely assertion of a right.” United States v. Olano, 507 U.S. 725, 733 (1993). At oral argu- ment, VirnetX’s counsel conceded that VirnetX had not, as the Court put it, made “this much more fine-tuned distinc- tion between saying . . . connection means one thing in the network layer and a different thing in the transport layer” in its opening brief. Oral Arg. at 30:25-41. Even consider- ing the parties’ uninvited post-argument letters (No. 20- 2271 ECF Nos. 111, 112), we have been pointed to nowhere in our record where VirnetX made this distinction prior to its reply brief in this appeal. 11 Accordingly, this issue is 10 Oral Argument (“Oral Arg.”), available at https://oralarguments.cafc.uscourts.gov/default.aspx?fl=20 -2271_09082022.mp3. 11 Perplexingly, VirnetX attached to its letter ex- cerpts from a brief and oral presentation Petitioners made to the Board. See No. 20-2271 ECF No. 111 Exs. A & B. VirnetX also now insists it raised the issue in its opening brief. See No. 20-2271 ECF No. 111 at 1. But all it said there was the following: Case: 20-2271 Document: 114 Page: 22 Filed: 03/30/2023 22 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND forfeited and we need not, and will not, address it. See gen- erally Quanergy Sys., Inc., 24 F.4th at 1415 n.6 (“Quanergy failed to challenge these findings in its opening brief, and its attempt to do so in its reply brief is untimely.”); see also SmithKline Beecham Corp. v. Apotex Corp., 439 F.3d 1312, 1319 (Fed. Cir. 2006) (“Our law is well established that ar- guments not raised in the opening brief are waived.”). Accordingly, we affirm the Board’s finding that Kiuchi anticipates the challenged claims of the ’135 patent. IV Substantial evidence also supports the Board’s conclu- sion that Kiuchi teaches a domain name server (“DNS”) module and, therefore, anticipates claims 13 and 14 of the ’151 patent. Claim 13 of the ’151 patent requires a DNS module to “perform the steps” of “determining whether a DNS request TARP is a packet-routing proto- col that, like the IP protocol, op- erates at or below the network layer of Internet communica- tions. End-to-end “connections” between computers are formed at a higher layer, the transport layer, typically using the TCP protocol. . . . TARP routing does not affect how computers form connections or engage in direct or indirect communication. Opening Br. 36 (internal citations omitted). As is evident, VirnetX did not argue in its opening brief that only connec- tions at the transport layer matter for assessing infringe- ment, anticipation, or the scope of VirnetX’s claims or disclaimer. Case: 20-2271 Document: 114 Page: 23 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 23 sent by a client corresponds to a secure server;” “when the DNS request does not correspond to a secure server, for- warding the DNS request to a DNS function that returns an IP address of a nonsecure computer;” and “when the in- tercepted DNS request corresponds to a secure server, au- tomatically creating a secure channel between the client and the secure server.” ’151 patent col. 48 ll. 18-29 (em- phasis added). In the Mangrove Appeal, we held that sub- stantial evidence did not support the Board’s finding that Kiuchi’s C-HTTP name server alone taught the determin- ing, forwarding, and creating limitations of claim 13. See 778 F. App’x at 906-07. In particular, we determined that Kiuchi’s C-HTTP name server “does not forward a DNS re- quest to a DNS function.” Id. at 906. On remand, Petitioners argued that Kiuchi’s “client- side proxy, working with the C-HTTP name server, acts as the claimed DNS proxy module.” J.A. 38. 12 The Board adopted this mapping of Kiuchi onto claim 13 and found anticipation. See, e.g., J.A. 43-44. We find substantial ev- idence, primarily Kiuchi itself, supports the Board’s find- ing. As an initial matter, we agree with the Board that the ’151 patent explicitly teaches that its “claims are not lim- ited to a particular arrangement of hardware,” as even Vir- netX acknowledges. J.A. 42-43; see also Opening Br. 49 (“[T]he claims [of the ’151 patent] are not limited to a par- ticular arrangement of hardware.”) (emphasis omitted). 12 Notwithstanding VirnetX’s argument to the con- trary, see, e.g., Opening Br. 13, Petitioners have, from the outset of the IPR, mapped two of Kiuchi’s parts – the client- side proxy and the C-HTTP server – to the DNS proxy mod- ule. See, e.g., J.A. 2652 (Mangrove, in its petition for insti- tution of IPR, arguing, “[f]or example, Kiuchi’s client-side proxy – working in concert with the C-HTTP name server – is a domain name server (DNS) proxy module . . . .”). Case: 20-2271 Document: 114 Page: 24 Filed: 03/30/2023 24 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND The ’151 patent’s specification contemplates combining the functions of DNS proxy 2610 and DNS server 2609 for con- venience. See ’151 patent col. 38 ll. 30-32; see also, e.g., id. col. 38 ll. 22-24 (“Gatekeeper 2603 can be implemented on a separate computer (as shown in FIG. 26) or as a function within modified DNS server 2602.”). Nonetheless, VirnetX asserts that Kiuchi’s client-side proxy and C-HTTP name server are “two distinct mod- ules/sets of instructions” that do not “disclose the single DNS module of the claims.” See, e.g., Opening Br. 49. We disagree. Nothing in the record warrants limiting the mod- ule of claim 13 in the way VirnetX insists we must. Nor does VirnetX persuasively explain why a “module” cannot be composed of components in a client-server relationship. See, e.g., Opening Br. 47-51; Reply Br. 13-18. As we have already noted, the specification contemplates different ar- rangements of hardware, and VirnetX cites no meritorious reason why two components of Kiuchi could not comprise one module. Kiuchi’s client-side proxy and C-HTTP name server work cooperatively to “determin[e] whether a DNS request sent by a client corresponds to a secure server,” as required by the determining limitation of claim 13. See J.A. 42-44. Kiuchi teaches that its “client-side proxy asks the C-HTTP name server whether it can communicate with the host specified in a given URL.” J.A. 5267. The C-HTTP name server then “examines whether the requested server-side proxy is registered in the closed network and is permitted to accept the connection from the client-side proxy.” Id. In this way, again, Kiuchi discloses the ’151 patent’s deter- mining limitation. Kiuchi’s client-side proxy and C-HTTP name server also, together, teach the forwarding limitation. In Kiuchi, when the client-side proxy’s request to communicate with a host is not permitted, the C-HTTP name server sends an error status code to the client-side proxy, which then Case: 20-2271 Document: 114 Page: 25 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 25 “performs DNS lookup, behaving like an ordinary HTTP/1.0 proxy.” J.A. 39; see also J.A. 5267. The Board found that “[b]ehaving like an ordinary proxy to perform the DNS lookup means that the client-side proxy will send the DNS request to a public DNS server,” citing numerous disclosures in Kiuchi as support. J.A. 41; see also J.A. 39- 42 (citing J.A. 5266-67). Therefore, Kiuchi’s client-side proxy and C-HTTP name server work together, as a DNS module, to “forward[] the DNS request to a DNS function that returns an IP address of a nonsecure computer” “when the DNS request does not correspond to a secure server,” as required by claim 13. 13 Kiuchi also teaches the creating limitation. Kiuchi’s client-side proxy “initiates an encrypted channel on public communication paths between the user agent and the origin server.” J.A. 44. The Board reasoned that claim 13 only requires a secure connection between the user and the secure server, see id., and looked to the ’151 patent’s back- ground-of-the-invention section to define “secure” as “im- mune to eavesdropping,” J.A. 46 (citing ’151 patent col. 1 ll. 13 Even if, as VirnetX argues (see Opening Br. 50-51), only the client-side proxy is involved in Kiuchi’s forwarding step, while the combination of the C-HTTP name server and client-side proxy disclose the determining limitation, our anticipation cases do not require that every component of the DNS module must be involved in performing every limitation of the challenged claims. VirnetX relies on NetMoneyIN, Inc., 545 F.3d at 1371, and Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1343 (Fed. Cir. 2016), for its counter to Petitioners’ anticipation theory, but each of those cases involved different embodiments in a single prior-art reference. Here, by contrast, both the client-side server and C-HTTP name server of Kiuchi are part of the same embodiment and work together as the DNS module. Our cases do not preclude such a theory of anticipation. Case: 20-2271 Document: 114 Page: 26 Filed: 03/30/2023 26 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 34-35 (“It is desired for the communications to be secure, that is, immune to eavesdropping.”)). The Board was free to credit Petitioners’ evidence that Kiuchi taught the nec- essary secure channel “because data in Kiuchi’s C-HTTP network is encrypted when sent over public segments of the network path and protected using firewalls when sent over private segments.” J.A. 46 & n.9; see also J.A. 5266-67 (Kiuchi discussing communications between client-side and server-side proxies and user agents/origin servers, which are “within the firewalls”); J.A. 5268 (explaining that proxies encrypt information passing between them). Therefore, Kiuchi’s client-side proxy and C-HTTP name server work together to “automatically creat[e] a secure channel between the client and the secure server” “when the intercepted DNS request corresponds to a secure server,” as required by the creating limitation of claim 13 of the ’151 patent. For all of these reasons, we affirm the Board’s conclu- sion that Kiuchi anticipates claims 13 and 14 of the ’151 patent. 14 Therefore, we also affirm the Board’s conclusion that Kiuchi in view of Rescorla renders all challenged claims of the ’151 patent obvious. V Finally, VirnetX contends that Black Swamp was im- properly joined in IPR2015-01047, regarding the ’151 pa- tent, and asks us to vacate and remand the Board’s decision based on Facebook, Inc. v. Windy City Innovations, LLC, 973 F.3d 1321 (Fed. Cir. 2020). Opening Br. 63-65. The Board granted Black Swamp’s motion for joinder, over VirnetX’s opposition, in early 2016. J.A. 5249-55; see also J.A. 5213-22. VirnetX then appealed the Board’s finding 14 Claim 14 depends from claim 13. VirnetX raises no additional issues with respect to claim 14 that we have not already considered in connection with claim 13. Case: 20-2271 Document: 114 Page: 27 Filed: 03/30/2023 VIRNETX INC. v. MANGROVE PARTNERS MASTER FUND 27 that certain claims of the ’151 patent were unpatentable, but it did not in that appeal – which we have referred to as the Mangrove Appeal – raise any issue regarding the Board’s joinder of Black Swamp. See 778 F. App’x at 901 n.1 (acknowledging Black Swamp’s joinder); id. at 900 (Vir- netX challenging Board’s allowance of Apple’s joinder but not challenging Black Swamp’s joinder). Accordingly, the issue is forfeited. See, e.g., Vivint v. Alarm.com Inc., 856 F. App’x 300, 304 (Fed. Cir. 2021) (explaining “it was [appel- lant’s] obligation to raise its [issue] before the first court who could have provided it relief” and holding that failure to do so led to forfeiture). We need not, and will not, ad- dress this forfeited issue. VI The Board’s findings that Kiuchi anticipates claims of the ’135 and ’151 patents are supported by substantial evi- dence. VirnetX’s challenge to Black Swamp’s joinder is for- feited. We have considered VirnetX’s additional arguments and find them unpersuasive. Accordingly, we affirm. AFFIRMED