`
`
`
`
`
`William E. Thomson, Jr. (SBN 47195)
`BROOKS KUSHMAN P.C.
`601 S. Figueroa Street, Suite 2080
`Los Angeles, California 90017-5780
`Tel: (213) 622-3003
`wthomson@brookskushman.com
`
`Marc Lorelli (Admitted pro hac vice)
`mlorelli@brookskushman.com
`John P. Rondini (Admitted pro hac vice)
`jrondini@brookskushman.com
`Mark A. Cantor (Admitted pro hac vice)
`mcantor@brookskushman.com
`John S. LeRoy (Admitted pro hac vice)
`jleroy@brookskushman.com
`BROOKS KUSHMAN P.C.
`1000 Town Center, 22nd Floor
`Southfield, MI 48075
`Tel: (248) 358-4400
`
`Attorneys for Plaintiff
`Ancora Technologies, Inc.
`
`
`
`
`
`ANCORA TECHNOLOGIES,
`INC.
`
`
`
`
`
`
`Plaintiff,
`
`UNITED STATES DISTRICT COURT
`
`CENTRAL DISTRICT OF CALIFORNIA
`
`
`Case No. 8:19-cv-02192-GW-ASx
`(LEAD CASE)
`
`Consolidated Case No.:
`Case No. 2:20-cv-01252-GW-ASx
`
`[Hon. George H. Wu]
`
`
`ANCORA TECHNOLOGIES, INC.’S
`OPENING MARKMAN BRIEF
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`v.
`
`TCT MOBILE (US) INC.,
`HUIZHOU TCL MOBILE
`COMMUNICATION CO.,
`LTD., and SHENZHEN TCL
`CREATIVE CLOUD
`TECHNOLOGY CO., LTD.,
`
`
`
`
`
`Defendants.
`
`22
`
`
`
`23
`
`24
`
`25
`
`26
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 2 of 27 Page ID #:554
`
`
`
`1
`
`2
`
`
`
`TABLE OF CONTENTS
`
`3
`
`I.
`
`INTRODUCTION ........................................................................................... 1
`
`II.
`
`THE ’941 PATENT ......................................................................................... 2
`
`III. CLAIM CONSTRUCTION LAW .................................................................. 4
`
`IV. CLAIM CONSTRUCTION DISPUTES ......................................................... 6
`
`A.
`
`“volatile memory” ................................................................................. 7
`
`B.
`
`“Selecting a program residing in the volatile memory” ........................ 8
`
`C.
`
`“Set up a verification structure” .......................................................... 11
`
`D.
`
`“license record” ................................................................................... 13
`
`E.
`
`“memory of the BIOS” ........................................................................ 16
`
`F.
`
`“first non-volatile memory area of the computer” (Claims 7 and
`
`13) ........................................................................................................ 20
`
`G.
`
`“wherein establishing a license-record includes the steps of: . . . ”
`
`(Claim 6) .............................................................................................. 21
`
`V.
`
`CONCLUSION .............................................................................................. 22
`
`
`
`
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`i
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 3 of 27 Page ID #:555
`
`
`
`TABLE OF AUTHORITIES
`
`Cases
`
`Ancora Techs., Inc. v. Apple Inc.,
`
`2012 WL 6738761 (N.D. Cal. Dec. 31, 2012) ............................... 1, 3, 7, 13-16
`
`Ancora Techs., Inc. v. Apple, Inc.,
`
`744 F.3d 732 (Fed. Cir. 2014) ........................................................ 1, 3, 7, 17-18
`
`Ancora Techs., Inc. v. HTC Am., Inc.,
`
`908 F.3d 1343 (Fed. Cir. 2018) ..................................................... 1, 2, 3, 13, 14
`
`Ancora Techs., Inc. v. LG Elecs., Samsung Elecs., ECF No. 69,
`
`Civil No. 1-20-cv-00034-ADA (W.D. Tex. June 2, 2020)
`
`(Attached as Ex. 3) ............................................................................................ 1
`
`Ancora Techs., Inc. v. LG Elecs., Samsung Elecs., ECF No. 93,
`
`Civil No. 1-20-cv-00034-ADA (W.D. Tex. Aug. 19, 2020)
`
`(Attached as Ex. 4.) ..................................................................................... 1, 13
`
`CCS Fitness, Inc. v. Brunswick Corp.,
`
`288 F.3d 1359 (Fed. Cir. 2002) ........................................................................ 4
`
`Chef Am., Inc. v. Lamb Weston, Inc.,
`
`358 F.3d 1371 (Fed. Cir. 2004) ........................................................................ 9
`
`Facebook, Inc. v. Pragmatus AV, LLC,
`
`582 F. App’x 864 (Fed. Cir. 2014) .................................................................. 17
`
`Finjan, Inc. v. Secure Computing Corp.,
`
`626 F.3d 1197 (Fed. Cir. 2011) ........................................................................ 4
`
`Harris Corp. v. IXYS Corp.,
`
`114 F.3d 1149 (Fed. Cir. 1997) ....................................................................... 12
`
`Home Diagnostics, Inc. v. LifeScan, Inc.,
`
`381 F.3d 1352 (Fed. Cir. 2004) ........................................................................ 5
`
`HTC Corp. v. Ancora Techs. Inc.,
`
`2017 WL 6032605 (Patent Tr. & App. Bd. Dec. 1, 2017) .............................. 14
`
`Johns Hopkins Univ. v. Cellpro,
`
`152 F.3d 1342 (Fed. Cir. 1998) ....................................................................... 11
`
`K–2 Corp. v. Salomon S.A.,
`
`191 F.3d 1356 (Fed. Cir. 1999) ........................................................................ 9
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`ii
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 4 of 27 Page ID #:556
`
`
`
`Linear Tech. Corp. v. ITC,
`
`566 F.3d 1049 (Fed. Cir. 2009) ....................................................................... 17
`
`Markman v. Westview Instruments, Inc.,
`52 F.3d 967 (Fed. Cir. 1995) (en banc), aff’d, 517 U.S. 370 (1996) ............ 5, 6
`
`
`Medrad, Inc. v. MRI Devices Corp.,
`
`401 F.3d 1313 (Fed. Cir. 2005) ....................................................................... 11
`
`Merck & Co. v. Teva Pharms. USA, Inc.,
`
`395 F.3d 1364 (Fed. Cir. 2005) ....................................................................... 22
`
`Nokia Sols. & Networks US LLC v. Huawei Techs. Co.,
`
`2017 WL 2226413 (E.D. Tex. May 19, 2017) .................................................. 9
`
`Omega Eng’g, Inc, v. Raytek Corp.,
`
`334 F.3d 1314 (Fed. Cir. 2003) ....................................................................... 17
`
`Phillips v. AWH Corp.,
`
`415 F.3d 1303 (Fed. Cir. 2005) (en banc) ..................................................... 4, 5
`
`Prowess, Inc. v. RaySearch Labs., AB,
`
`953 F. Supp. 2d 638 (D. Md. 2013) ................................................................... 9
`
`Purdue Pharma L.P. v. Endo Pharmaceuticals Inc.,
`
`438 F.3d 1123 (Fed. Cir. 2006) ....................................................................... 19
`
`Seachange Int’l, Inc. v. C-COR Inc.,
`
`413 F.3d 1361 (Fed. Cir. 2005) ....................................................................... 19
`
`Southwall Technologies, Inc. v. Cardinal IG Company,
`
`54 F.3d 1570 (Fed. Cir. 1995) ........................................................................... 6
`
`Thorner v. Sony Computer Enter. Am. LLC,
`
`669 F.3d 1362 (Fed. Cir. 2012) ......................................................................... 4
`
`U.S. Surgical Corp. v. Ethicon, Inc.,
`
`103 F.3d 1554 (Fed. Cir. 1997) ......................................................................... 4
`
`Vitronics Corp. v. Conceptronic, Inc.,
`
`90 F.3d 1576 (Fed. Cir. 1996) ....................................................................... 4, 6
`
`Statutes
`
`U.S.C. § 101 ................................................................................................................ 1
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`iii
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 5 of 27 Page ID #:557
`
`
`
`I.
`
`INTRODUCTION
`
`This case concerns a single patent: U.S. Patent No. 6,411,941. (“the ’941
`
`Patent,” Ex. 1.) The ’941 Patent has a lengthy history. It was invented in the late
`
`1990s by Ancora’s president, Mr. Miki Mullor and a colleague and was described by
`
`the Patent and Trademark Office during prosecution as proceeding against the
`
`conventional wisdom in the art to do something “the closest prior art, singly or
`
`collectively,” never contemplated: “using an agent to set up a verification structure
`
`in the erasable, non-volatile memory of the BIOS.” Ex. 2, Examiner’s Reasons for
`
`Allowance at ANCC 408.
`
`Moreover, since it issued, the patent has been examined repeatedly. Its claims
`
`have been construed by multiple courts, including the Federal Circuit. Ancora
`
`Techs., Inc. v. Apple Inc., 2012 WL 6738761 (N.D. Cal. Dec. 31, 2012) (“Apple I”);
`
`Ancora Techs., Inc. v. Apple, Inc., 744 F.3d 732 (Fed. Cir. 2014) (“Apple II”). Many
`
`other claim terms were construed by Judge Albright in the Western District of Texas
`
`in 2020. Ancora Techs., Inc. v. LG Elecs., Samsung Elecs., ECF No. 69, Civil No. 1-
`
`20-cv-00034-ADA (W.D. Tex. June 2, 2020) (Attached as Ex. 3); Ancora Techs.,
`
`Inc. v. LG Elecs., Samsung Elecs., ECF No. 93, Civil No. 1-20-cv-00034-ADA
`
`(W.D. Tex. Aug. 19, 2020) (Attached as Ex. 4.) (“Samsung/LG”.) And the validity
`
`of the ’941 Patent has been confirmed repeatedly, including most recently by the
`
`Federal Circuit in Ancora Techs., Inc. v. HTC Am., Inc., 908 F.3d 1343 (Fed. Cir.
`
`2018), which held that the asserted claims satisfied 35 U.S.C. § 101 as a matter of
`
`law. (“HTC”.)
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`1
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 6 of 27 Page ID #:558
`
`
`
`1
`
`In asserting infringement in this matter, Ancora has relied on the entirety of
`
`2
`
`these courts’ guidance. In fact, with limited exceptions, Ancora simply asks this
`
`3
`
`Court to adopt constructions already reached by prior courts. In contrast, Defendants
`
`4
`
`seek to avoid infringement by offering a raft of constructions—constructions that
`
`5
`
`conflict not just with the claims and specification, but the prior holdings and
`
`6
`
`constructions already provided by prior courts.
`
`
`
`II.
`
`THE ’941 PATENT
`
`The ’941 Patent relates to a specific technique for “identifying and restricting
`
`of an unauthorized software program’s operation.” ’941 Patent at 1:6-8.
`
`Specifically, before the ’941 Patent, there were two basic (and sub-optimal)
`
`methods of verifying and restricting the operation of a program. One involved
`
`“software-based methods” that “require[d] writing a license signature on the
`
`computer’s hard drive.” HTC, 908 F.3d at 1344. A key “flaw in those methods,”
`
`however, “is that such a signature can be changed by hackers without damaging
`
`other aspects of computer functionality.” Id. (citing ’941 Patent at 1:19-26.)
`
`Hardware-based methods also existed, but “require[d] inserting a dongle into a
`
`computer port to authenticate the software authorization.” Id. (citing ’941 Patent at
`
`1:27-32.) As a result, those “methods are costly, inconvenient, and not suitable for
`
`software sold and downloaded over the internet.” Id.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`2
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 7 of 27 Page ID #:559
`
`
`
`1
`
`The ’941 Patent improved over these prior art techniques by “using the
`
`2
`
`memory space associated with the computer’s basic input/output system (BIOS),1
`
`3
`
`rather than other memory space, to store appropriately encrypted license information
`
`4
`
`to be used in the verification process.” Apple II, 744 F.3d at 733 (citing ’941 Patent
`
`5
`
`at 1:46-2:5, 4:45-48, and 5:19-24). Such BIOS memory space was and “is typically
`
`6
`
`used for storing programs that assist in the start-up of a computer.” HTC, 908 F.3d at
`
`7
`
`1345. Prior to the ’941 invention, however, it was not contemplated that operating
`
`8
`
`system (“OS”) level programs could interact with the BIOS at all—much less “us[e]
`
`9
`
`an agent to setup a verification structure in the erasable non-volatile memory area of
`
`10
`
`the BIOS.” Ex. 2, Reasons for Allowance at ANCC 408; HTC, 908 F.3d at 1348-49
`
`11
`
`(stating that “[t]he claimed method here specifically identifies how that functionality
`
`12
`
`improvement is effectuated in an assertedly unexpected way: a structure containing a
`
`13
`
`license record is stored in a particular, modifiable, non-volatile portion of the
`
`14
`
`computer’s BIOS, and the structure in that memory location is used for
`
`15
`
`verification”).
`
`16
`
`As the Federal Circuit explained, using the BIOS in this unexpected manner
`
`17
`
`“improves computer security, . . . because successfully hacking BIOS memory (i.e.,
`
`18
`
`altering it without rendering the computer inoperable) is much harder than hacking
`
`19
`
`the memory used by the prior art to store license-verification information.” HTC,
`
`20
`
`908 F.3d at 1345.
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`1 The BIOS “is the set of essential startup operations that run when a computer
`is turned on, which tests hardware, starts the operating system, and supports the
`transfer of data among hardware devices.” Apple I, 2012 WL 6738761, at *7.
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`3
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 8 of 27 Page ID #:560
`
`
`
`III. CLAIM CONSTRUCTION LAW
`
`“It is a bedrock principle of patent law that the claims of the patent define the
`
`invention to which the patentee is entitled the right to exclude.” Phillips v. AWH
`
`Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc) (internal quotation marks
`
`omitted). Claim terms should generally be “given their ordinary and customary
`
`meaning” to those skilled in the art as informed by the specification. ld. at 1312-14.
`
`However, it is not necessary to construe every claim. E.g. Finjan, Inc. v. Secure
`
`Computing Corp., 626 F.3d 1197, 1207 (Fed. Cir. 2011) (holding that the district
`
`court did not err by rejecting defendants’ construction and instructing the jury to
`
`give the claim term its “ordinary meaning”); U.S. Surgical Corp. v. Ethicon, Inc.,
`
`103 F.3d 1554, 1568 (Fed. Cir. 1997) (claim construction “is not an obligatory
`
`exercise in redundancy”).
`
`
`
`There are only two exceptions to the general rule that words are generally
`
`given their ordinary and customary meaning: “1) when a patentee sets out a
`
`definition and acts as his own lexicographer, or 2) when the patentee disavows the
`
`full scope of a claim term either in the specification or during prosecution.” Thorner
`
`v. Sony Computer Enter. Am. LLC, 669 F.3d 1362, 1365 (Fed. Cir. 2012) (citing
`
`Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1580 (Fed. Cir. 1996)). “To act
`
`as its own lexicographer, a patentee must ‘clearly set forth a definition of the
`
`disputed claim term’ other than its plain and ordinary meaning.” Id. (quoting CCS
`
`Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366 (Fed. Cir. 2002)). “The
`
`standard for disavowal of claim scope is similarly exacting.” Id. at 1366. “Absent a
`
`clear disavowal or contrary definition in the specification or the prosecution history,
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 9 of 27 Page ID #:561
`
`
`
`1
`
`the patentee is entitled to the full scope of its claim language.” Home Diagnostics,
`
`2
`
`Inc. v. LifeScan, Inc., 381 F.3d 1352, 1358 (Fed. Cir. 2004).
`
`3
`
`
`
`Although a patentee may use the specification to assign unique definitions to
`
`4
`
`claim terms, when it does so expressly and clearly as set forth above, limitations
`
`5
`
`from the written description should not be imported into the claims. Phillips, 415
`
`6
`
`F.3d at 1315-16, 1320, 1323 ([A]lthough the specification often describes very
`
`7
`
`specific embodiments of the invention, we have repeatedly warned against confining
`
`8
`
`the claims to those embodiments.”); Markman v. Westview Instruments, Inc., 52
`
`9
`
`F.3d 967, 980 (Fed. Cir. 1995) (en banc), aff’d, 517 U.S. 370 (1996) (“The written
`
`10
`
`description part of the specification does not delimit the right to exclude. That is the
`
`11
`
`function and purpose of the claims.”) Nevertheless, a claim is read “in the context of
`
`12
`
`the entire patent, including the specification.” Id. at 1313. In particular, the
`
`13
`
`description of an embodiment in the specification does not, without more, limit the
`
`14
`
`claims to that single embodiment. Id. at 1323 (“we have expressly rejected the
`
`15
`
`contention that if a patent describes only a single embodiment, the claims of the
`
`16
`
`patent must be construed as being limited to that embodiment”). A patent’s
`
`17
`
`prosecution history may also be considered. Id. at 1317 (“Like the specification, the
`
`18
`
`prosecution history provides evidence of how the PTO and the inventor understood
`
`19
`
`the patent.”).
`
`20
`
`
`
`While the Court may consider other evidence extrinsic to the patent, the use of
`
`21
`
`extrinsic evidence (such as expert testimony and dictionaries) must be secondary and
`
`22
`
`subservient to the intrinsic evidence. As explained in Phillips, 415 F.3d at 1318, the
`
`23
`
`Federal Circuit “view[s] extrinsic evidence in general as less reliable than the patent
`
`24
`
`and its prosecution history in determining how to read claim terms, for several
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`5
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 10 of 27 Page ID #:562
`
`
`
`1
`
`reasons.” For example, extrinsic evidence is not tied to the teachings of the patent
`
`2
`
`and “undue reliance on extrinsic evidence poses the risk that it will be used to
`
`3
`
`change the meaning of the claims.” Id. at 1319. Indeed, it is improper to rely on
`
`4
`
`extrinsic evidence where “the claims, specification and file history” adequately
`
`5
`
`define a claim term. Vitronics, 90 F.3d at 1583. The intrinsic evidence defines the
`
`6
`
`public record from which the public is entitled to rely. Id. (citing Markman, 52 F.3d
`
`7
`
`at 978-79.) “Allowing the public record to be altered or changed by extrinsic
`
`8
`
`evidence introduced at trial, such as expert testimony, would make this right
`
`9
`
`meaningless.” Id. (citing Southwall Technologies, Inc. v. Cardinal IG Company, 54
`
`10
`
`F.3d 1570, 1579 (Fed. Cir. 1995)).
`
`11
`
`
`
`IV. CLAIM CONSTRUCTION DISPUTES
`
`In this matter, Ancora asserts that TCL infringes Claims 1-3, 6-14 and 16 of
`
`the ’941 Patent. For these claims, TCL identifies 7 phrases for construction.
`
`For the Court’s convenience, Ancora addresses the first 5 phrases in the order
`
`in which they first appear in the asserted claim 1. Ancora includes the full claim
`
`below that include the disputed phases, with underlining or emphasis for the
`
`disputed phrases:
`
`A method of restricting software operation within a
`1.
`license for use with a computer including an erasable, non-volatile
`memory area of a BIOS of the computer, and a volatile memory area
`the method comprising the steps of:
`
`selecting a program residing in the volatile memory;
`
`using an agent to set up a verification structure in the erasable,
`non-volatile memory of
`the BIOS,
`the verification structure
`accommodating data that includes at least one license record,
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`6
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 11 of 27 Page ID #:563
`
`
`
`verifying the program using at least the verification structure
`from the erasable non-volatile memory of the BIOS, and
`
`acting on the program according to the verification.
`
`The remining phrases in dispute are from dependent claims 7 and 13.
`
`A.
`
`“volatile memory”
`
`Claim Term/Phrase
`
`Ancora Construction
`
`TCL Construction
`
`Volatile memory
`(Claim 1)
`
`
`
`Memory whose data is not
`maintained or becomes
`inaccessible when the
`power is removed.
`
`“memory whose data is
`not maintained when the
`power is removed”
`
`The parties agree that volatile memory means memory whose data is not
`
`maintained when the power is removed. They disagree only as to whether the term
`
`also includes memory whose data “becomes inaccessible” after the power is
`
`removed. As the Federal Circuit already has held, it does.
`
`In Apple II, the Federal Circuit held that, “as a general matter, ‘[t]o one of
`
`ordinary skill in the art, a volatile memory is memory whose data is not maintained
`
`when the power is removed . . . .’” 744 F.3d at 737 (quoting Apple I, 2012 WL
`
`6738761, at *4). The Federal Circuit then went on to identify an important exception
`
`to that “general” understanding—explaining that the ’941 Patent’s disclosure “of a
`
`hard disk as ‘volatile’ memory” showed that the ’941 Patent contemplated that
`
`memory typically thought of as non-volatile also fell within the scope of the term
`
`“volatile memory” to the extent such memory was being used in a volatile manner.
`
`Id. at 737-38.
`
`The Federal Circuit even identified an example of when non-volatile memory
`
`could be understood to be operating in a volatile manner, explaining:
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`7
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 12 of 27 Page ID #:564
`
`
`
`
`it is well known that a computer’s hard disk is routinely used as
`‘virtual’ memory to provide temporary storage when there is
`insufficient RAM to complete an operation, in which case (it is
`undisputed) the data become inaccessible through the usual means
`once power is removed (even if the data can still be found on the hard
`disk by more sophisticated means).
`
`Id. at 738 (internal citations omitted).
`
`Thus, unlike Defendants’ construction, Plaintiff’s construction adheres to the
`
`entirety of the Federal Circuit’s guidance and recognizes that “volatile memory”
`
`includes both (1) memory whose data is not maintained when the power is removed
`
`and (2) memory whose data becomes inaccessible when the power is removed such
`
`that it is recoverable only through “sophisticated means.” Id.; see Ex. 5, Jestice Decl.
`
`at ¶¶ 10-12. Indeed, when the Western District of Texas addressed this term after the
`
`Federal Circuit’s decision, the court made clear that “where the hard disk is used as
`
`virtual RAM, the data is not accessible by normal means after the power is
`
`removed.” Ex. 3, Final Claim Constructions at 2. Accordingly, Ancora’s
`
`construction should be adopted.
`
`B.
`
`“Selecting a program residing in the volatile memory”
`
`Claim Term/Phrase
`
`Ancora Construction
`
`TCL Construction
`
`Selecting a program
`residing in the volatile
`memory
`(Claim 1)
`
`
`Plain and ordinary
`meaning
`
`“accessing a program to be
`verified in the volatile
`memory”
`
`Defendants next ask the Court to re-write the phrase “selecting a program
`
`residing in the volatile memory” by changing the word “selecting” to “accessing”
`
`and deleting the word “residing” and implying that this memory is the location of the
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`8
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 13 of 27 Page ID #:565
`
`
`
`1
`
`verification. No support exists for this re-write. K–2 Corp. v. Salomon S.A., 191 F.3d
`
`2
`
`1356, 1364 (Fed. Cir. 1999) (“Courts do not rewrite claims; instead, we give effect
`
`3
`
`to the terms chosen by the patentee.”).
`
`4
`
`First, the words “selecting” and “residing” are simple English words that, as a
`
`5
`
`general matter, do not require construction. See Chef Am., Inc. v. Lamb Weston, Inc.,
`
`6
`
`358 F.3d 1371, 1373 (Fed. Cir. 2004) (“[O]rdinary, simple English words whose
`
`7
`
`meaning is clear and unquestionable . . . mean exactly what they say.”); Nokia Sols.
`
`8
`
`& Networks US LLC v. Huawei Techs. Co., 2017 WL 2226413, at *26 (E.D. Tex.
`
`9
`
`May 19, 2017) (construing the term “[select/selecting] a communication resource . .
`
`10
`
`.” to have its plain and ordinary meaning (alteration in original)); Prowess, Inc. v.
`
`11
`
`RaySearch Labs., AB, 953 F. Supp. 2d 638, 672 (D. Md. 2013) (same).
`
`12
`
`Second, the patent itself demonstrates that, at a minimum, “selecting” is not
`
`13
`
`synonymous with “accessing” or the running of a program.2 In describing
`
`14
`
`embodiments of the “selecting” step, the specification never refers to the “accessing”
`
`15
`
`of a program—a concept it references for other steps. Compare ’941 Patent at 2:66-
`
`16
`
`67, 6:7-17 (describing the “selecting”), with id. at 1:53-57, 1:59-62, 2:19-26, 2:27-
`
`17
`
`32, 2:36-39 (describing how the program can be “run” after it is verified); see also
`
`18
`
`id. at 3:57, 4:1 (referencing a “selected program”). Instead, the specification explains
`
`19
`
`that “[s]electing (17) a program” can include “the step of: establishing a licensed-
`
`20
`
`software-program in the volatile memory of the computer wherein the licensed-
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`2 Other parties have been unsuccessful in their attempts to change the
`language “selecting” to “running” so TCL presents the work “accessing” which
`introduces ambiguity so TCL make improper arguments to the jury regarding
`running of a program. Claim construction is used to clarify language, not add
`ambiguity.
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`9
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 14 of 27 Page ID #:566
`
`
`
`1
`
`software program includes contents used to form a license-record.” Id. at 6:7-10;
`
`2
`
`accord id. at Claim 6 (“A method according to claim 1 wherein selecting a program
`
`3
`
`includes the steps of establishing a licensed software-program in the volatile
`
`4
`
`memory of the computer . . . .”). Introduction of the term “accessing” adds
`
`5
`
`ambiguity and it certainly is not “running” of a program.
`
`6
`
`Further, the specification teaches that, in at least one embodiment, this
`
`7
`
`“establishing” (or “loading”) of the program in the volatile memory, as well as its
`
`8
`
`verification, occurs before the selected program can accessed for running. Id. at
`
`2:10-26. As the ’941 Patent explains:
`[W]hen a program is loaded into the memory of the computer, a so-
`called license verifier application, that is a priori running in the
`computer, accesses the program under question, retrieves therefrom
`the license record, encrypts the record utilizing the specified unique
`key (as retrieved from the ROM section of the BIOS) and compares
`the so encrypted record to the encrypted records that reside in the
`E2PROM. In the case of match, the program is verified to run on the
`computer.
`
`Id. Indeed, this passage alone demonstrates that the patentee understood what
`
`“running” and “accessing” a program meant and intended that “selecting a program”
`
`confer a different meaning.
`
`In short, TCL’s construction is inconsistent with the primary objective of at
`
`least some of the patent’s preferred embodiments: to require that a program be
`
`verified before it is accessed for running. ’941 Patent at 2:19-20 (describing the
`
`verification process and stating that, “[i]n the case of match, the program is verified
`
`to run on the computer”). Defendants’ construction adds ambiguity and would also
`
`negate some of
`
`the
`
`invention’s embodiments—violating a cardinal claim
`
`construction rule.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`10
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 15 of 27 Page ID #:567
`
`
`
`1
`
`Again, recently when faced with similar arguments regarding this claim
`
`2
`
`phrase, the Western District of Texas concluded that the construction for this phrase
`
`3
`
`should be the “plain and ordinary meaning” as proposed here by Ancora. Ex. 3,
`
`4
`
`Final Claim Constructions at 3.
`
`C.
`
`“Set up a verification structure”
`
`Claim Term/Phrase
`
`Ancora Construction
`
`TCL Construction
`
`Set up a verification
`structure
`(Claim 1)
`
`
`Plain and ordinary
`meaning
`
`“store information
`encrypted with a key
`unique to the computer”
`
`Defendant’s construction is inconsistent with the specification and the claims,
`
`which make clear that this step can comprise just “establishing or certifying the
`
`existence of a pseudo-unique key in the first non-volatile memory area; and
`
`establishing at least one license-record location in the first or the second nonvolatile
`
`memory area.” ’941 Patent at 6:18-22; see also Claim 7. And it is black-letter law
`
`that a construction that would “exclude[] a [disclosed] embodiment from the scope
`
`of the claim is rarely, if ever, correct.” Broadcom, 732 F.3d at 1333 (citation and
`
`quotation marks omitted) Medrad, Inc. v. MRI Devices Corp., 401 F.3d 1313, 1320
`
`(Fed. Cir. 2005) (“A ‘claim construction that does not encompass a disclosed
`
`embodiment is … rarely, if ever, correct.’”) (quoting Johns Hopkins Univ. v.
`
`Cellpro, 152 F.3d 1342, 1355 (Fed. Cir. 1998)). Here, the specification is express
`
`that “[t]he license record may be held in either encrypted or explicit form.” ’941
`
`Patent at 1:55, emphasis added. Yet, TCL seeks to exclude this example from the
`
`scope of the claims with its proposed construction.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`11
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Document 52 Filed 09/03/20 Page 16 of 27 Page ID #:568
`
`
`
`1
`
`At a basic level it appears that TCL is conflating the “set up a verification
`
`2
`
`structure” step with the process for “establishing a license-record,” which dependent
`
`3
`
`Claim 8 teaches can comprise “forming a license record by encrypting of the
`
`4
`
`contents used to form a license record with other predetermined data contents, using
`
`5
`
`the key.” Id. at 5:40-52 (teaching that “encrypted license records” can be “form[ed] .
`
`6
`
`. . from the contents” of the program “using the key”).
`
`7
`
`TCL’s “using a unique key for each computer” limitation fails for the same
`
`8
`
`reason: the specification and the claims expressly contemplate embodiments that do
`
`9
`
`not use a “key” to set up a verification structure. See id. at 2:62-3:3 (“In its broadest
`
`10
`
`aspect, the invention provides for a method of restricting software operation within a
`
`11
`
`license limitation including; . . . setting up a verification structure in the non-volatile
`
`12
`
`memories, verifying the program using the structure, and acting on the program
`
`13
`
`according to the verification.”). Further, those embodiments that do use a key are not
`
`14
`
`limited to using a “unique key.” Rather, as dependent Claim 7 teaches, a “pseudo-
`
`15
`
`unique key” may be used as part of the process to “set up the verification structure.”
`
`16
`
`Finally, what Defendants intend by their “using . . . license record information
`
`17
`
`in the program” limitation is unclear, but it appears that the text is entirely redundant
`
`18
`
`of the already-present requirement that “the verification structure accommodat[e]
`
`19
`
`data that includes at least one license record.” Accordingly, it should be rejected. See
`
`20
`
`Harris Corp. v. IXYS Corp., 114 F.3d 1149, 1152 (Fed. Cir. 1997) (rejecting
`
`21
`
`“construction [that] would contribute nothing but meaningless verbiage”).
`
`22
`
`In short, “set up a verification structure” requires no construction; the claim
`
`23
`
`already states in clear language what is required. The Court should adopt its plain
`
`24
`
`and ordinary meaning.
`
`ANCORA’S OPENING MARKMAN BRIEF
`Case No. 8:19-cv-02192-GW-ASx
`
`12
`
`25
`
`26
`
`
`
`Case 8:19-cv-02192-GW-AS Do