throbber
Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 1 of 27 Page ID #:553
`
`
`
`
`
`William E. Thomson, Jr. (SBN 47195)
`BROOKS KUSHMAN P.C.
`601 S. Figueroa Street, Suite 2080
`Los Angeles, California 90017-5780
`Tel: (213) 622-3003
`wthomson@brookskushman.com
`
`Marc Lorelli (Admitted pro hac vice)
`mlorelli@brookskushman.com
`John P. Rondini (Admitted pro hac vice)
`jrondini@brookskushman.com
`Mark A. Cantor (Admitted pro hac vice)
`mcantor@brookskushman.com
`John S. LeRoy (Admitted pro hac vice)
`jleroy@brookskushman.com
`BROOKS KUSHMAN P.C.
`1000 Town Center, 22nd Floor
`Southfield, MI 48075
`Tel: (248) 358-4400
`
`Attorneys for Plaintiff
`Ancora Technologies, Inc.
`
`
`
`
`
`ANCORA TECHNOLOGIES,
`INC.
`
`
`
`
`
`
`Plaintiff,
`
`UNITED STATES DISTRICT COURT
`
`CENTRAL DISTRICT OF CALIFORNIA
`
`
`Case No. 8:19-cv-02192-GW-ASx
`(LEAD CASE)
`
`Consolidated Case No.:
`Case No. 2:20-cv-01252-GW-ASx
`
`[Hon. George H. Wu]
`
`
`ANCORA TECHNOLOGIES, INC.’S
`OPENING MARKMAN BRIEF
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`v.
`
`TCT MOBILE (US) INC.,
`HUIZHOU TCL MOBILE
`COMMUNICATION CO.,
`LTD., and SHENZHEN TCL
`CREATIVE CLOUD
`TECHNOLOGY CO., LTD.,
`
`
`
`
`
`Defendants.
`
`22
`
`
`
`23
`
`24
`
`25
`
`26
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 2 of 27 Page ID #:554
`
`
`
`1
`
`2
`
`
`
`TABLE OF CONTENTS
`
`3
`
`I.
`
`INTRODUCTION ........................................................................................... 1
`
`II.
`
`THE ’941 PATENT ......................................................................................... 2
`
`III. CLAIM CONSTRUCTION LAW .................................................................. 4
`
`IV. CLAIM CONSTRUCTION DISPUTES ......................................................... 6
`
`A.
`
`“volatile memory” ................................................................................. 7
`
`B.
`
`“Selecting a program residing in the volatile memory” ........................ 8
`
`C.
`
`“Set up a verification structure” .......................................................... 11
`
`D.
`
`“license record” ................................................................................... 13
`
`E.
`
`“memory of the BIOS” ........................................................................ 16
`
`F.
`
`“first non-volatile memory area of the computer” (Claims 7 and
`
`13) ........................................................................................................ 20
`
`G.
`
`“wherein establishing a license-record includes the steps of: . . . ”
`
`(Claim 6) .............................................................................................. 21
`
`V.
`
`CONCLUSION .............................................................................................. 22
`
`
`
`
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`i
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 3 of 27 Page ID #:555
`
`
`
`TABLE OF AUTHORITIES
`
`Cases
`
`Ancora Techs., Inc. v. Apple Inc.,
`
`2012 WL 6738761 (N.D. Cal. Dec. 31, 2012) ............................... 1, 3, 7, 13-16
`
`Ancora Techs., Inc. v. Apple, Inc.,
`
`744 F.3d 732 (Fed. Cir. 2014) ........................................................ 1, 3, 7, 17-18
`
`Ancora Techs., Inc. v. HTC Am., Inc.,
`
`908 F.3d 1343 (Fed. Cir. 2018) ..................................................... 1, 2, 3, 13, 14
`
`Ancora Techs., Inc. v. LG Elecs., Samsung Elecs., ECF No. 69,
`
`Civil No. 1-20-cv-00034-ADA (W.D. Tex. June 2, 2020)
`
`(Attached as Ex. 3) ............................................................................................ 1
`
`Ancora Techs., Inc. v. LG Elecs., Samsung Elecs., ECF No. 93,
`
`Civil No. 1-20-cv-00034-ADA (W.D. Tex. Aug. 19, 2020)
`
`(Attached as Ex. 4.) ..................................................................................... 1, 13
`
`CCS Fitness, Inc. v. Brunswick Corp.,
`
`288 F.3d 1359 (Fed. Cir. 2002) ........................................................................ 4
`
`Chef Am., Inc. v. Lamb Weston, Inc.,
`
`358 F.3d 1371 (Fed. Cir. 2004) ........................................................................ 9
`
`Facebook, Inc. v. Pragmatus AV, LLC,
`
`582 F. App’x 864 (Fed. Cir. 2014) .................................................................. 17
`
`Finjan, Inc. v. Secure Computing Corp.,
`
`626 F.3d 1197 (Fed. Cir. 2011) ........................................................................ 4
`
`Harris Corp. v. IXYS Corp.,
`
`114 F.3d 1149 (Fed. Cir. 1997) ....................................................................... 12
`
`Home Diagnostics, Inc. v. LifeScan, Inc.,
`
`381 F.3d 1352 (Fed. Cir. 2004) ........................................................................ 5
`
`HTC Corp. v. Ancora Techs. Inc.,
`
`2017 WL 6032605 (Patent Tr. & App. Bd. Dec. 1, 2017) .............................. 14
`
`Johns Hopkins Univ. v. Cellpro,
`
`152 F.3d 1342 (Fed. Cir. 1998) ....................................................................... 11
`
`K–2 Corp. v. Salomon S.A.,
`
`191 F.3d 1356 (Fed. Cir. 1999) ........................................................................ 9
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`ii
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 4 of 27 Page ID #:556
`
`
`
`Linear Tech. Corp. v. ITC,
`
`566 F.3d 1049 (Fed. Cir. 2009) ....................................................................... 17
`
`Markman v. Westview Instruments, Inc.,
`52 F.3d 967 (Fed. Cir. 1995) (en banc), aff’d, 517 U.S. 370 (1996) ............ 5, 6
`
`
`Medrad, Inc. v. MRI Devices Corp.,
`
`401 F.3d 1313 (Fed. Cir. 2005) ....................................................................... 11
`
`Merck & Co. v. Teva Pharms. USA, Inc.,
`
`395 F.3d 1364 (Fed. Cir. 2005) ....................................................................... 22
`
`Nokia Sols. & Networks US LLC v. Huawei Techs. Co.,
`
`2017 WL 2226413 (E.D. Tex. May 19, 2017) .................................................. 9
`
`Omega Eng’g, Inc, v. Raytek Corp.,
`
`334 F.3d 1314 (Fed. Cir. 2003) ....................................................................... 17
`
`Phillips v. AWH Corp.,
`
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ..................................................... 4, 5
`
`Prowess, Inc. v. RaySearch Labs., AB,
`
`953 F. Supp. 2d 638 (D. Md. 2013) ................................................................... 9
`
`Purdue Pharma L.P. v. Endo Pharmaceuticals Inc.,
`
`438 F.3d 1123 (Fed. Cir. 2006) ....................................................................... 19
`
`Seachange Int’l, Inc. v. C-COR Inc.,
`
`413 F.3d 1361 (Fed. Cir. 2005) ....................................................................... 19
`
`Southwall Technologies, Inc. v. Cardinal IG Company,
`
`54 F.3d 1570 (Fed. Cir. 1995) ........................................................................... 6
`
`Thorner v. Sony Computer Enter. Am. LLC,
`
`669 F.3d 1362 (Fed. Cir. 2012) ......................................................................... 4
`
`U.S. Surgical Corp. v. Ethicon, Inc.,
`
`103 F.3d 1554 (Fed. Cir. 1997) ......................................................................... 4
`
`Vitronics Corp. v. Conceptronic, Inc.,
`
`90 F.3d 1576 (Fed. Cir. 1996) ....................................................................... 4, 6
`
`Statutes
`
`U.S.C. § 101 ................................................................................................................ 1
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`iii
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 5 of 27 Page ID #:557
`
`
`
`I.
`
`INTRODUCTION
`
`This case concerns a single patent: U.S. Patent No. 6,411,941. (“the ’941
`
`Patent,” Ex. 1.) The ’941 Patent has a lengthy history. It was invented in the late
`
`1990s by Ancora’s president, Mr. Miki Mullor and a colleague and was described by
`
`the Patent and Trademark Office during prosecution as proceeding against the
`
`conventional wisdom in the art to do something “the closest prior art, singly or
`
`collectively,” never contemplated: “using an agent to set up a verification structure
`
`in the erasable, non-volatile memory of the BIOS.” Ex. 2, Examiner’s Reasons for
`
`Allowance at ANCC 408.
`
`Moreover, since it issued, the patent has been examined repeatedly. Its claims
`
`have been construed by multiple courts, including the Federal Circuit. Ancora
`
`Techs., Inc. v. Apple Inc., 2012 WL 6738761 (N.D. Cal. Dec. 31, 2012) (“Apple I”);
`
`Ancora Techs., Inc. v. Apple, Inc., 744 F.3d 732 (Fed. Cir. 2014) (“Apple II”). Many
`
`other claim terms were construed by Judge Albright in the Western District of Texas
`
`in 2020. Ancora Techs., Inc. v. LG Elecs., Samsung Elecs., ECF No. 69, Civil No. 1-
`
`20-cv-00034-ADA (W.D. Tex. June 2, 2020) (Attached as Ex. 3); Ancora Techs.,
`
`Inc. v. LG Elecs., Samsung Elecs., ECF No. 93, Civil No. 1-20-cv-00034-ADA
`
`(W.D. Tex. Aug. 19, 2020) (Attached as Ex. 4.) (“Samsung/LG”.) And the validity
`
`of the ’941 Patent has been confirmed repeatedly, including most recently by the
`
`Federal Circuit in Ancora Techs., Inc. v. HTC Am., Inc., 908 F.3d 1343 (Fed. Cir.
`
`2018), which held that the asserted claims satisfied 35 U.S.C. § 101 as a matter of
`
`law. (“HTC”.)
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`1
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 6 of 27 Page ID #:558
`
`
`
`1
`
`In asserting infringement in this matter, Ancora has relied on the entirety of
`
`2
`
`these courts’ guidance. In fact, with limited exceptions, Ancora simply asks this
`
`3
`
`Court to adopt constructions already reached by prior courts. In contrast, Defendants
`
`4
`
`seek to avoid infringement by offering a raft of constructions—constructions that
`
`5
`
`conflict not just with the claims and specification, but the prior holdings and
`
`6
`
`constructions already provided by prior courts.
`
`
`
`II.
`
`THE ’941 PATENT
`
`The ’941 Patent relates to a specific technique for “identifying and restricting
`
`of an unauthorized software program’s operation.” ’941 Patent at 1:6-8.
`
`Specifically, before the ’941 Patent, there were two basic (and sub-optimal)
`
`methods of verifying and restricting the operation of a program. One involved
`
`“software-based methods” that “require[d] writing a license signature on the
`
`computer’s hard drive.” HTC, 908 F.3d at 1344. A key “flaw in those methods,”
`
`however, “is that such a signature can be changed by hackers without damaging
`
`other aspects of computer functionality.” Id. (citing ’941 Patent at 1:19-26.)
`
`Hardware-based methods also existed, but “require[d] inserting a dongle into a
`
`computer port to authenticate the software authorization.” Id. (citing ’941 Patent at
`
`1:27-32.) As a result, those “methods are costly, inconvenient, and not suitable for
`
`software sold and downloaded over the internet.” Id.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`2
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 7 of 27 Page ID #:559
`
`
`
`1
`
`The ’941 Patent improved over these prior art techniques by “using the
`
`2
`
`memory space associated with the computer’s basic input/output system (BIOS),1
`
`3
`
`rather than other memory space, to store appropriately encrypted license information
`
`4
`
`to be used in the verification process.” Apple II, 744 F.3d at 733 (citing ’941 Patent
`
`5
`
`at 1:46-2:5, 4:45-48, and 5:19-24). Such BIOS memory space was and “is typically
`
`6
`
`used for storing programs that assist in the start-up of a computer.” HTC, 908 F.3d at
`
`7
`
`1345. Prior to the ’941 invention, however, it was not contemplated that operating
`
`8
`
`system (“OS”) level programs could interact with the BIOS at all—much less “us[e]
`
`9
`
`an agent to setup a verification structure in the erasable non-volatile memory area of
`
`10
`
`the BIOS.” Ex. 2, Reasons for Allowance at ANCC 408; HTC, 908 F.3d at 1348-49
`
`11
`
`(stating that “[t]he claimed method here specifically identifies how that functionality
`
`12
`
`improvement is effectuated in an assertedly unexpected way: a structure containing a
`
`13
`
`license record is stored in a particular, modifiable, non-volatile portion of the
`
`14
`
`computer’s BIOS, and the structure in that memory location is used for
`
`15
`
`verification”).
`
`16
`
`As the Federal Circuit explained, using the BIOS in this unexpected manner
`
`17
`
`“improves computer security, . . . because successfully hacking BIOS memory (i.e.,
`
`18
`
`altering it without rendering the computer inoperable) is much harder than hacking
`
`19
`
`the memory used by the prior art to store license-verification information.” HTC,
`
`20
`
`908 F.3d at 1345.
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`1 The BIOS “is the set of essential startup operations that run when a computer
`is turned on, which tests hardware, starts the operating system, and supports the
`transfer of data among hardware devices.” Apple I, 2012 WL 6738761, at *7.
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`3
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 8 of 27 Page ID #:560
`
`
`
`III. CLAIM CONSTRUCTION LAW
`
`“It is a bedrock principle of patent law that the claims of the patent define the
`
`invention to which the patentee is entitled the right to exclude.” Phillips v. AWH
`
`Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc) (internal quotation marks
`
`omitted). Claim terms should generally be “given their ordinary and customary
`
`meaning” to those skilled in the art as informed by the specification. ld. at 1312-14.
`
`However, it is not necessary to construe every claim. E.g. Finjan, Inc. v. Secure
`
`Computing Corp., 626 F.3d 1197, 1207 (Fed. Cir. 2011) (holding that the district
`
`court did not err by rejecting defendants’ construction and instructing the jury to
`
`give the claim term its “ordinary meaning”); U.S. Surgical Corp. v. Ethicon, Inc.,
`
`103 F.3d 1554, 1568 (Fed. Cir. 1997) (claim construction “is not an obligatory
`
`exercise in redundancy”).
`
`
`
`There are only two exceptions to the general rule that words are generally
`
`given their ordinary and customary meaning: “1) when a patentee sets out a
`
`definition and acts as his own lexicographer, or 2) when the patentee disavows the
`
`full scope of a claim term either in the specification or during prosecution.” Thorner
`
`v. Sony Computer Enter. Am. LLC, 669 F.3d 1362, 1365 (Fed. Cir. 2012) (citing
`
`Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1580 (Fed. Cir. 1996)). “To act
`
`as its own lexicographer, a patentee must ‘clearly set forth a definition of the
`
`disputed claim term’ other than its plain and ordinary meaning.” Id. (quoting CCS
`
`Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366 (Fed. Cir. 2002)). “The
`
`standard for disavowal of claim scope is similarly exacting.” Id. at 1366. “Absent a
`
`clear disavowal or contrary definition in the specification or the prosecution history,
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 9 of 27 Page ID #:561
`
`
`
`1
`
`the patentee is entitled to the full scope of its claim language.” Home Diagnostics,
`
`2
`
`Inc. v. LifeScan, Inc., 381 F.3d 1352, 1358 (Fed. Cir. 2004).
`
`3
`
`
`
`Although a patentee may use the specification to assign unique definitions to
`
`4
`
`claim terms, when it does so expressly and clearly as set forth above, limitations
`
`5
`
`from the written description should not be imported into the claims. Phillips, 415
`
`6
`
`F.3d at 1315-16, 1320, 1323 ([A]lthough the specification often describes very
`
`7
`
`specific embodiments of the invention, we have repeatedly warned against confining
`
`8
`
`the claims to those embodiments.”); Markman v. Westview Instruments, Inc., 52
`
`9
`
`F.3d 967, 980 (Fed. Cir. 1995) (en banc), aff’d, 517 U.S. 370 (1996) (“The written
`
`10
`
`description part of the specification does not delimit the right to exclude. That is the
`
`11
`
`function and purpose of the claims.”) Nevertheless, a claim is read “in the context of
`
`12
`
`the entire patent, including the specification.” Id. at 1313. In particular, the
`
`13
`
`description of an embodiment in the specification does not, without more, limit the
`
`14
`
`claims to that single embodiment. Id. at 1323 (“we have expressly rejected the
`
`15
`
`contention that if a patent describes only a single embodiment, the claims of the
`
`16
`
`patent must be construed as being limited to that embodiment”). A patent’s
`
`17
`
`prosecution history may also be considered. Id. at 1317 (“Like the specification, the
`
`18
`
`prosecution history provides evidence of how the PTO and the inventor understood
`
`19
`
`the patent.”).
`
`20
`
`
`
`While the Court may consider other evidence extrinsic to the patent, the use of
`
`21
`
`extrinsic evidence (such as expert testimony and dictionaries) must be secondary and
`
`22
`
`subservient to the intrinsic evidence. As explained in Phillips, 415 F.3d at 1318, the
`
`23
`
`Federal Circuit “view[s] extrinsic evidence in general as less reliable than the patent
`
`24
`
`and its prosecution history in determining how to read claim terms, for several
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`5
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 10 of 27 Page ID #:562
`
`
`
`1
`
`reasons.” For example, extrinsic evidence is not tied to the teachings of the patent
`
`2
`
`and “undue reliance on extrinsic evidence poses the risk that it will be used to
`
`3
`
`change the meaning of the claims.” Id. at 1319. Indeed, it is improper to rely on
`
`4
`
`extrinsic evidence where “the claims, specification and file history” adequately
`
`5
`
`define a claim term. Vitronics, 90 F.3d at 1583. The intrinsic evidence defines the
`
`6
`
`public record from which the public is entitled to rely. Id. (citing Markman, 52 F.3d
`
`7
`
`at 978-79.) “Allowing the public record to be altered or changed by extrinsic
`
`8
`
`evidence introduced at trial, such as expert testimony, would make this right
`
`9
`
`meaningless.” Id. (citing Southwall Technologies, Inc. v. Cardinal IG Company, 54
`
`10
`
`F.3d 1570, 1579 (Fed. Cir. 1995)).
`
`11
`
`
`
`IV. CLAIM CONSTRUCTION DISPUTES
`
`In this matter, Ancora asserts that TCL infringes Claims 1-3, 6-14 and 16 of
`
`the ’941 Patent. For these claims, TCL identifies 7 phrases for construction.
`
`For the Court’s convenience, Ancora addresses the first 5 phrases in the order
`
`in which they first appear in the asserted claim 1. Ancora includes the full claim
`
`below that include the disputed phases, with underlining or emphasis for the
`
`disputed phrases:
`
`A method of restricting software operation within a
`1.
`license for use with a computer including an erasable, non-volatile
`memory area of a BIOS of the computer, and a volatile memory area
`the method comprising the steps of:
`
`selecting a program residing in the volatile memory;
`
`using an agent to set up a verification structure in the erasable,
`non-volatile memory of
`the BIOS,
`the verification structure
`accommodating data that includes at least one license record,
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`6
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 11 of 27 Page ID #:563
`
`
`
`verifying the program using at least the verification structure
`from the erasable non-volatile memory of the BIOS, and
`
`acting on the program according to the verification.
`
`The remining phrases in dispute are from dependent claims 7 and 13.
`
`A.
`
`“volatile memory”
`
`Claim Term/Phrase
`
`Ancora Construction
`
`TCL Construction
`
`Volatile memory
`(Claim 1)
`
`
`
`Memory whose data is not
`maintained or becomes
`inaccessible when the
`power is removed.
`
`“memory whose data is
`not maintained when the
`power is removed”
`
`The parties agree that volatile memory means memory whose data is not
`
`maintained when the power is removed. They disagree only as to whether the term
`
`also includes memory whose data “becomes inaccessible” after the power is
`
`removed. As the Federal Circuit already has held, it does.
`
`In Apple II, the Federal Circuit held that, “as a general matter, ‘[t]o one of
`
`ordinary skill in the art, a volatile memory is memory whose data is not maintained
`
`when the power is removed . . . .’” 744 F.3d at 737 (quoting Apple I, 2012 WL
`
`6738761, at *4). The Federal Circuit then went on to identify an important exception
`
`to that “general” understanding—explaining that the ’941 Patent’s disclosure “of a
`
`hard disk as ‘volatile’ memory” showed that the ’941 Patent contemplated that
`
`memory typically thought of as non-volatile also fell within the scope of the term
`
`“volatile memory” to the extent such memory was being used in a volatile manner.
`
`Id. at 737-38.
`
`The Federal Circuit even identified an example of when non-volatile memory
`
`could be understood to be operating in a volatile manner, explaining:
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`7
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 12 of 27 Page ID #:564
`
`
`
`
`it is well known that a computer’s hard disk is routinely used as
`‘virtual’ memory to provide temporary storage when there is
`insufficient RAM to complete an operation, in which case (it is
`undisputed) the data become inaccessible through the usual means
`once power is removed (even if the data can still be found on the hard
`disk by more sophisticated means).
`
`Id. at 738 (internal citations omitted).
`
`Thus, unlike Defendants’ construction, Plaintiff’s construction adheres to the
`
`entirety of the Federal Circuit’s guidance and recognizes that “volatile memory”
`
`includes both (1) memory whose data is not maintained when the power is removed
`
`and (2) memory whose data becomes inaccessible when the power is removed such
`
`that it is recoverable only through “sophisticated means.” Id.; see Ex. 5, Jestice Decl.
`
`at ¶¶ 10-12. Indeed, when the Western District of Texas addressed this term after the
`
`Federal Circuit’s decision, the court made clear that “where the hard disk is used as
`
`virtual RAM, the data is not accessible by normal means after the power is
`
`removed.” Ex. 3, Final Claim Constructions at 2. Accordingly, Ancora’s
`
`construction should be adopted.
`
`B.
`
`“Selecting a program residing in the volatile memory”
`
`Claim Term/Phrase
`
`Ancora Construction
`
`TCL Construction
`
`Selecting a program
`residing in the volatile
`memory
`(Claim 1)
`
`
`Plain and ordinary
`meaning
`
`“accessing a program to be
`verified in the volatile
`memory”
`
`Defendants next ask the Court to re-write the phrase “selecting a program
`
`residing in the volatile memory” by changing the word “selecting” to “accessing”
`
`and deleting the word “residing” and implying that this memory is the location of the
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 13 of 27 Page ID #:565
`
`
`
`1
`
`verification. No support exists for this re-write. K–2 Corp. v. Salomon S.A., 191 F.3d
`
`2
`
`1356, 1364 (Fed. Cir. 1999) (“Courts do not rewrite claims; instead, we give effect
`
`3
`
`to the terms chosen by the patentee.”).
`
`4
`
`First, the words “selecting” and “residing” are simple English words that, as a
`
`5
`
`general matter, do not require construction. See Chef Am., Inc. v. Lamb Weston, Inc.,
`
`6
`
`358 F.3d 1371, 1373 (Fed. Cir. 2004) (“[O]rdinary, simple English words whose
`
`7
`
`meaning is clear and unquestionable . . . mean exactly what they say.”); Nokia Sols.
`
`8
`
`& Networks US LLC v. Huawei Techs. Co., 2017 WL 2226413, at *26 (E.D. Tex.
`
`9
`
`May 19, 2017) (construing the term “[select/selecting] a communication resource . .
`
`10
`
`.” to have its plain and ordinary meaning (alteration in original)); Prowess, Inc. v.
`
`11
`
`RaySearch Labs., AB, 953 F. Supp. 2d 638, 672 (D. Md. 2013) (same).
`
`12
`
`Second, the patent itself demonstrates that, at a minimum, “selecting” is not
`
`13
`
`synonymous with “accessing” or the running of a program.2 In describing
`
`14
`
`embodiments of the “selecting” step, the specification never refers to the “accessing”
`
`15
`
`of a program—a concept it references for other steps. Compare ’941 Patent at 2:66-
`
`16
`
`67, 6:7-17 (describing the “selecting”), with id. at 1:53-57, 1:59-62, 2:19-26, 2:27-
`
`17
`
`32, 2:36-39 (describing how the program can be “run” after it is verified); see also
`
`18
`
`id. at 3:57, 4:1 (referencing a “selected program”). Instead, the specification explains
`
`19
`
`that “[s]electing (17) a program” can include “the step of: establishing a licensed-
`
`20
`
`software-program in the volatile memory of the computer wherein the licensed-
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`2 Other parties have been unsuccessful in their attempts to change the
`language “selecting” to “running” so TCL presents the work “accessing” which
`introduces ambiguity so TCL make improper arguments to the jury regarding
`running of a program. Claim construction is used to clarify language, not add
`ambiguity.
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`9
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 14 of 27 Page ID #:566
`
`
`
`1
`
`software program includes contents used to form a license-record.” Id. at 6:7-10;
`
`2
`
`accord id. at Claim 6 (“A method according to claim 1 wherein selecting a program
`
`3
`
`includes the steps of establishing a licensed software-program in the volatile
`
`4
`
`memory of the computer . . . .”). Introduction of the term “accessing” adds
`
`5
`
`ambiguity and it certainly is not “running” of a program.
`
`6
`
`Further, the specification teaches that, in at least one embodiment, this
`
`7
`
`“establishing” (or “loading”) of the program in the volatile memory, as well as its
`
`8
`
`verification, occurs before the selected program can accessed for running. Id. at
`
`2:10-26. As the ’941 Patent explains:
`[W]hen a program is loaded into the memory of the computer, a so-
`called license verifier application, that is a priori running in the
`computer, accesses the program under question, retrieves therefrom
`the license record, encrypts the record utilizing the specified unique
`key (as retrieved from the ROM section of the BIOS) and compares
`the so encrypted record to the encrypted records that reside in the
`E2PROM. In the case of match, the program is verified to run on the
`computer.
`
`Id. Indeed, this passage alone demonstrates that the patentee understood what
`
`“running” and “accessing” a program meant and intended that “selecting a program”
`
`confer a different meaning.
`
`In short, TCL’s construction is inconsistent with the primary objective of at
`
`least some of the patent’s preferred embodiments: to require that a program be
`
`verified before it is accessed for running. ’941 Patent at 2:19-20 (describing the
`
`verification process and stating that, “[i]n the case of match, the program is verified
`
`to run on the computer”). Defendants’ construction adds ambiguity and would also
`
`negate some of
`
`the
`
`invention’s embodiments—violating a cardinal claim
`
`construction rule.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`10
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 15 of 27 Page ID #:567
`
`
`
`1
`
`Again, recently when faced with similar arguments regarding this claim
`
`2
`
`phrase, the Western District of Texas concluded that the construction for this phrase
`
`3
`
`should be the “plain and ordinary meaning” as proposed here by Ancora. Ex. 3,
`
`4
`
`Final Claim Constructions at 3.
`
`C.
`
`“Set up a verification structure”
`
`Claim Term/Phrase
`
`Ancora Construction
`
`TCL Construction
`
`Set up a verification
`structure
`(Claim 1)
`
`
`Plain and ordinary
`meaning
`
`“store information
`encrypted with a key
`unique to the computer”
`
`Defendant’s construction is inconsistent with the specification and the claims,
`
`which make clear that this step can comprise just “establishing or certifying the
`
`existence of a pseudo-unique key in the first non-volatile memory area; and
`
`establishing at least one license-record location in the first or the second nonvolatile
`
`memory area.” ’941 Patent at 6:18-22; see also Claim 7. And it is black-letter law
`
`that a construction that would “exclude[] a [disclosed] embodiment from the scope
`
`of the claim is rarely, if ever, correct.” Broadcom, 732 F.3d at 1333 (citation and
`
`quotation marks omitted) Medrad, Inc. v. MRI Devices Corp., 401 F.3d 1313, 1320
`
`(Fed. Cir. 2005) (“A ‘claim construction that does not encompass a disclosed
`
`embodiment is … rarely, if ever, correct.’”) (quoting Johns Hopkins Univ. v.
`
`Cellpro, 152 F.3d 1342, 1355 (Fed. Cir. 1998)). Here, the specification is express
`
`that “[t]he license record may be held in either encrypted or explicit form.” ’941
`
`Patent at 1:55, emphasis added. Yet, TCL seeks to exclude this example from the
`
`scope of the claims with its proposed construction.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`11
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 16 of 27 Page ID #:568
`
`
`
`1
`
`At a basic level it appears that TCL is conflating the “set up a verification
`
`2
`
`structure” step with the process for “establishing a license-record,” which dependent
`
`3
`
`Claim 8 teaches can comprise “forming a license record by encrypting of the
`
`4
`
`contents used to form a license record with other predetermined data contents, using
`
`5
`
`the key.” Id. at 5:40-52 (teaching that “encrypted license records” can be “form[ed] .
`
`6
`
`. . from the contents” of the program “using the key”).
`
`7
`
`TCL’s “using a unique key for each computer” limitation fails for the same
`
`8
`
`reason: the specification and the claims expressly contemplate embodiments that do
`
`9
`
`not use a “key” to set up a verification structure. See id. at 2:62-3:3 (“In its broadest
`
`10
`
`aspect, the invention provides for a method of restricting software operation within a
`
`11
`
`license limitation including; . . . setting up a verification structure in the non-volatile
`
`12
`
`memories, verifying the program using the structure, and acting on the program
`
`13
`
`according to the verification.”). Further, those embodiments that do use a key are not
`
`14
`
`limited to using a “unique key.” Rather, as dependent Claim 7 teaches, a “pseudo-
`
`15
`
`unique key” may be used as part of the process to “set up the verification structure.”
`
`16
`
`Finally, what Defendants intend by their “using . . . license record information
`
`17
`
`in the program” limitation is unclear, but it appears that the text is entirely redundant
`
`18
`
`of the already-present requirement that “the verification structure accommodat[e]
`
`19
`
`data that includes at least one license record.” Accordingly, it should be rejected. See
`
`20
`
`Harris Corp. v. IXYS Corp., 114 F.3d 1149, 1152 (Fed. Cir. 1997) (rejecting
`
`21
`
`“construction [that] would contribute nothing but meaningless verbiage”).
`
`22
`
`In short, “set up a verification structure” requires no construction; the claim
`
`23
`
`already states in clear language what is required. The Court should adopt its plain
`
`24
`
`and ordinary meaning.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`12
`
`25
`
`26
`
`

`

`Case 8:19-cv-02192-GW-AS Do

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket