`
`
`
`
`John P. Schnurer, Bar No. 185725
`JSchnurer@perkinscoie.com
`Yun (Louise) Lu, Bar No. 253114
`LLu@perkinscoie.com
`Kyle R. Canavera Bar No. 314664
`KCanavera@perkinscoie.com
`PERKINS COIE LLP
`11452 El Camino Real, Suite 300
`San Diego, CA 92130-2080
`Telephone: 858.720.5700
`Facsimile: 858.720.5799
`
`Attorneys for Defendants
`TCT Mobile (US) Inc., Huizhou TCL Mobile
`Communication Co., Ltd., and Shenzhen TCL
`Creative Cloud Technology Co., Ltd.
`
`
`
`UNITED STATES DISTRICT COURT
`
`CENTRAL DISTRICT OF CALIFORNIA
`
`ANCORA TECHNOLOGIES, INC.,
`
`Plaintiff,
`
`v.
`
`TCT MOBILE (US) INC., HUIZHOU
`TCL MOBILE COMMUNICATION
`CO. LTD., and SHENZHEN TCL
`CREATIVE CLOUD TECHNOLOGY
`CO., LTD.,
`
`
`
`Defendants.
`
`
`
`Case No. 8:19-CV-02192-GW-ASx
`(LEAD CASE)
`
`Case No. 2:20-cv-01252-GW-ASx
`(CONSOLIDATED CASE)
`
`Judge: Hon. George H. Wu
`Judge: Hon. Alka Sagar
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 2 of 30 Page ID #:982
`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`Page
`
`
`INTRODUCTION ........................................................................................... 1
`
`BACKGROUND ............................................................................................. 2
`
`A.
`
`B.
`
`C.
`
`The ’941 Patent ..................................................................................... 2
`
`Prosecution History and Post-Issuance Proceedings ............................ 5
`
`Ancora’s Infringement Allegations Against TCL ................................ 7
`
`III. LEGAL STANDARDS ................................................................................... 9
`
`IV. CLAIM TERMS IN DISPUTE ....................................................................... 9
`
`A.
`
`“Memory of the BIOS” ......................................................................... 9
`
`1.
`
`2.
`
`Applicant’s Disclaimer During Prosecution ............................. 10
`
`TCL’s Construction Accurately Reflects the Disclaimer. ........ 13
`
`“Set Up a Verification Structure” ....................................................... 14
`
`“License Record” ................................................................................ 18
`
`“Selecting a Program Residing in the Volatile Memory” .................. 20
`
`“Volatile Memory” ............................................................................. 21
`
`“First Non-Volatile Memory Area of the Computer” ......................... 23
`
`Claim 8 Language ............................................................................... 24
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`V.
`
`CONCLUSION ............................................................................................. 25
`
`
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-i-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 3 of 30 Page ID #:983
`
`
`TABLE OF AUTHORITIES
`
`Page
`
`
`CASES
`
`Am. Piledriving Equip., Inc. v. Geoquip, Inc.,
`637 F.3d 1324 (Fed. Cir. 2011) ............................................................... 14, 18, 19
`
`Ancora Technologies, Inc. v. HTC America, Inc.,
`908 F.3d 1343 (Fed. Cir. 2018) ......................................................................... 6, 8
`
`Ancora Techs., Inc. v. Apple, Inc.,
`744 F.3d 732 (Fed. Cir. 2014) ............................................................................. 22
`
`Aquastar Pool Prods., Inc. v. Color Match Pool Fittings, Inc.,
`EDCV 5:18-CV-00094-GW (SPx), Dkt. 83, slip. op. at 4-6 (C.D.
`Cal. Nov. 21, 2018) ................................................................................................ 9
`
`Aylus Networks, Inc. v. Apple Inc.,
`856 F.3d 1353 (Fed. Cir. 2017) ............................................................... 10, 13, 14
`
`HTC Corp. v. Ancora Techs., Inc.,
`No. CBM2017-00054, 2017 WL 6032605 (PTAB Dec. 1, 2017) ........................ 6
`
`SiRF Technologies, Inc. v. International Trade Commission,
`601 F.3d 1319 (Fed. Cir. 2010) ............................................................................. 7
`
`Tech. Props. Ltd. LLC v. Huawei Techs. Co., Ltd.,
`849 F.3d 1349 (Fed. Cir. 2017) ........................................................................... 10
`
`Techtronic Indus. Co. Ltd. v. Int’l Trade Comm’n,
`944 F.3d 901 (Fed. Cir. 2019) ....................................................................... 15, 17
`
`STATUTES
`
`35 U.S.C. § 271(a) ...................................................................................................... 7
`
`35 U.S.C. § 271(b) ...................................................................................................... 7
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-ii-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 4 of 30 Page ID #:984
`
`
`I.
`
`INTRODUCTION
`
`Plaintiff (“Ancora”) has asserted claims 1–3, 6–14, and 16 of U.S. Patent No.
`
`6,411,941 against Defendants (“TCL”). The ’941 Patent discloses and claims a
`
`method for verifying that a program is operating within a license when it operates
`
`on a specific computer. The purported invention provides assurance to a software
`
`distributor that only licensed users/computers are running the software, i.e., that the
`
`software is not being pirated.
`
`Ancora asserts the claims against a “verified boot” procedure used in the
`
`Android operating system on the accused TCL smartphones. But verified boot does
`
`not perform the disclosed and claimed functionality. Rather, verified boot is a
`
`safety check. Unlike the ’941 patent, where the claimed invention is directed to
`
`checking whether a specific computer or user is licensed to run a program, verified
`
`boot provides assurance to the user of the smartphone that the software is the same
`
`as was provided by the software distributor, i.e., the software is not damaged or
`
`malicious.
`
`There are seven disputed claim terms. Four of the disputed terms deal with
`
`attempts by Ancora to read the terms to fit the infringement read, but in ways that
`
`are fundamentally incompatible with the claim language, the specification, the
`
`prosecution history, and the extensive post-issuance litigation of the ’941 Patent.
`
`See infra §§ IV.A–D. One of the disputed terms deals with an overly broad and
`
`needlessly confusing construction by Ancora. See infra § IV.E. Two of the
`
`disputed terms deal with language that will be confusing to the jury, and which
`
`should be resolved now through claim construction. See infra §§ IV.F–G.
`
`For the reasons that follow, TCL requests that the Court adopt its
`
`constructions for the disputed terms.
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-1-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 5 of 30 Page ID #:985
`
`
`II. BACKGROUND
`
`A. The ’941 Patent
`
`The ’941 Patent claims priority to May 21, 1998 and describes a “Method of
`
`Restricting Software Operation within a License Limitation.” ’941 Patent, Cover
`
`Page.
`
`The ’941 Patent motivates its disclosure by noting the “grand proliferation of
`
`illegally copied software, which is engulfing the marketplace” and causing “billions
`
`of dollars in lost profits to commercial software developers.” Id. at 1:14–18.
`
`Because of that illegal copying problem, prior art techniques were devised for “the
`
`identifying and restricting of an unauthorized software program’s operation.” Id. at
`
`1:12–14. But none of those prior art techniques were apparently adequate, so the
`
`’941 Patent disclosed that “[t]he present invention relates to a method of restricting
`
`software operation within a license limitation.” Id. at 1:38–40. “This method
`
`strongly relies on the use of a key and of a record, which have been written into the
`
`non-volatile memory of a computer.” Id. at 1:40–43.
`
`Against that backdrop, the ’941 Patent depicts the invention with respect to
`
`Figure 1, shown below. A computer processor (1) includes a first non-volatile
`
`memory area (4) (in red), a second non-volatile memory area (5) (in blue), and a
`
`volatile memory area (6) (in green). Id. at 5:9–16. The first non-volatile memory
`
`(4) can be “e.g., the ROM section of the BIOS” and stores a key (8). Id. at 5:13–14,
`5:19–24. The second non-volatile memory (5) can be “e.g., the E2PROM section of
`
`the BIOS” and stores license records (10), (11), (12). Id. at 5:14–15, 5:25–27. The
`
`volatile memory (6) can be “e.g. the internal RAM memory of the computer” and
`
`stores a license program (16). Id. at 5:15–16, 5:27–29.
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-2-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 6 of 30 Page ID #:986
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`’941 Patent, Fig. 1 (color annotations added).
`
`In order to provide a “better understanding of the underlying concept of the
`
`invention,” the ’941 Patent makes the following observations.
`
`The first non-volatile memory can be a “ROM section” of a “conventional
`
`BIOS module,” and the key can be embedded therein “during manufacture.” Id. at
`
`1:45–52. ROM, or “read-only memory,” is a memory module that is written with
`
`data once, and then cannot be rewritten. That is, it permanently stores some data.
`
`ROM, like other non-volatile memory, maintains the data stored thereon even when
`
`the power supply is lost. “It is important to note that the key . . . cannot be removed
`
`or modified.” Id. at 1:50–52.
`
`The volatile memory can be “RAM memory,” and stores a license program.
`
`Id. at 5:15–16, 5:27–29. The license program can be an “application program that
`
`is to be licensed to run on the specified computer.” Id. at 1:53–54. The license
`
`program is “associated with a license record.” Id. at 1:53–55. RAM, or “random-
`
`access memory,” is typically used to stored working data and running programs in a
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-3-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 7 of 30 Page ID #:987
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`computer. RAM, like other volatile memory, loses data stored thereon when the
`
`power supply is lost.
`The second non-volatile memory can be “E2PROM” and stores an “encrypted
`license record” that is encrypted using the key. Id. at 1:59–67. E2PROM, or
`
`“electrically erasable programmable read-only memory,” is a type of memory that
`can have its data written and rewritten multiple times. E2PROM, like other non-
`
`volatile memory, maintains the data stored thereon even when the power supply is
`
`lost. “It should be noted that unlike the first non-volatile section, the data in the
`second non-volatile memory may optionally be erased or modified (using E2PROM
`
`manipulation commands), so as to enable to add, modify or remove licenses.” Id. at
`
`2:1–5.
`
`The ’941 Patent disclosed a method of using the aforementioned structures in
`
`order to achieve the aim of reducing illegal software copying. That method,
`
`described with respect to Figure 2 contains four steps. First, at step (17), the
`
`program to be verified is selected from volatile memory. Id. at 2:62–3:3, 6:7–16.
`
`Second, at step (18), a “verification structure” is set up in the non-volatile memory.
`
`Id. at 2:62–3:3, 6:18–27. Third, at step (19), the selected program is verified using
`
`the verification structure. Id. at 2:62–3:3, 6:28–39. Fourth, at step (20), the
`
`selected program is acted on based on the result of the verification. Id. at 2:62–3:3,
`
`6:40–53.
`
`The ’941 Patent observes the following supposed benefits of the above-
`
`described arrangement.
`
`First, because the license record stored in the second non-volatile memory is
`
`encrypted using a key unique to the computer, that encrypted license record is not
`
`effective on a second computer, which would have a different unique key. Id. at
`
`2:27–59. Thus, “any attempt to run a program at an unlicensed site will be
`
`immediately detected.” Id. at 2:27–30. That is, the license record cannot be used to
`
`run an illegal copy of the software on the second, unlicensed computer.
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-4-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 8 of 30 Page ID #:988
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Second, because the license record is stored in BIOS memory, it is more
`
`difficult for a malicious actor to tamper with the license record data. Id. at 3:4–17.
`
`Namely, because BIOS was typically stored in specialized memory modules like
`E2PROM, “the required level of system programming expertise that is necessary to
`
`intercept or modify commands, interacting with the BIOS, is substantially higher
`
`than those needed for tampering with data residing in volatile memory such as hard
`
`disk.” Id. at 3:4–9. Also, the risk involved in tampering with data stored in BIOS
`
`memory was higher. Id. at 3:13–17. If the hacker inadvertently changed the BIOS
`
`data itself, then the computer could be rendered inoperable. Id. “This is too high of
`
`a risk for the ordinary software hacker to pay.” Id.
`
`B.
`
`Prosecution History and Post-Issuance Proceedings
`
`Claim 1 as originally filed covered setting up a verification structure in two
`
`non-volatile memories, and verifying a program in volatile memory based thereon.
`
`(Ex. 1 at 1.) During prosecution, the Applicant amended the claims to recite, as in
`
`its ultimately issued form, that the verification structure was stored “in the erasable,
`
`non-volatile memory of the BIOS.” (Ex. 2 at 10.) The Applicant later argued that
`
`this storing of the license record in the memory of the BIOS was what distinguished
`
`claim 1 over the prior art of record. (Ex. 4 at 3–7.) The Applicant alleged that this
`
`storage in the memory of the BIOS was unknown in the prior art both because
`
`“[t]here is no OS support whatsoever to write data to the system BIOS,” and
`
`because “no file system is associated with the BIOS.” (Id. at 6.)
`
`The Examiner allowed the claims based on this distinction. The prior art of
`
`record disclosed, for instance, a licensing software that stored licenses in a device’s
`
`ordinary “persistent non-volatile storage,” (Ex. 5 at 3 (citing U.S. Pat. No.
`
`6,189,146 at 12:8–31)), and “the use of BIOS memory for storing licensing
`
`numbers,” (id. at 4 (citing U.S. Pat. No. 5,479,639)). But, according to the
`
`Examiner, the prior art failed to show “licensed programs running at the OS level
`
`interacting with a program verification structure stored in the BIOS . . . [.]” (Id. at
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-5-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 9 of 30 Page ID #:989
`
`
`4.) “Further, it is well known to those of ordinary skill of the art that a computer
`
`BIOS is not setup to manage a software license verification structure.” (Id.)
`
`According to the Examiner, the ’941 Patent solved that problem by using the
`
`“agent” to set up the verification structure in the memory of the BIOS. (Id.)
`
`This feature was cemented as the supposed invention in two post-issuance
`
`proceedings.
`
`First, the ’941 Patent was subject to a covered business method review. The
`
`Board denied institution, finding that the ’941 Patent was not a covered business
`
`method patent because it disclosed a technical solution in the form of storing the
`
`license record in the memory of the BIOS. HTC Corp. v. Ancora Techs., Inc., No.
`
`CBM2017-00054, 2017 WL 6032605, at *3–*5 (PTAB Dec. 1, 2017).
`
`Second, the ’941 Patent was subject an appeal to the Federal Circuit in
`
`Ancora Technologies, Inc. v. HTC America, Inc., 908 F.3d 1343 (Fed. Cir. 2018).
`
`Reviewing a district court ruling on the pleadings that the claims of the ’941 Patent
`
`were patent ineligible, the Federal Circuit reversed. The court found that, at step 1
`
`of the Alice analysis, claim 1 was not directed to an abstract idea. Id. at 1348–49.
`
`The court found that claim 1 was directed to an improvement to computer security
`
`with its alleged improvement of “a structure containing a license record is stored in
`
`a particular, modifiable, non-volatile portion of the computer’s BIOS, and the
`
`structure in that memory location is used for verification by interacting with the
`
`distinct computer memory that contains the program to be verified.” Id. On the
`
`pleadings, the court did not find any reason to dispute the ’941 Patent’s assertion
`
`that this storage in BIOS memory resulted in a “beneficial reduction of the risk of
`
`hacking.” Id. at 1349.
`
`Two other district courts have issued orders construing the claims of the ’941
`
`Patent. (Exs. 10–12.)
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-6-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 10 of 30 Page ID #:990
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`C. Ancora’s Infringement Allegations Against TCL
`
`Ancora’s infringement allegations against TCL string together two aspects of
`
`the Android operating system running on TCL smartphones: (1) over-the-air
`
`(“OTA”) updates; and (2) verified boot. An OTA update is a software package that
`
`a TCL smartphone downloads and installs. (Ex. 6.) Verified boot is a process by
`
`which the TCL smartphone uses cryptographic checks to ensure the safety of
`
`software, i.e., that it is not malicious or corrupted. (Ex. 7.)
`
`The OTA update functionality is mostly irrelevant to the ’941 Patent’s
`
`claims. The TCL smartphone functionality that Ancora maps to the claim features
`
`is primarily the verified boot functionality. But Ancora accuses the TCL
`
`smartphones’ use of OTA updates for a simple reason: TCL does not itself perform
`
`the verified boot functionality. The TCL smartphones have long since left the
`
`control of TCL when the TCL smartphones perform a verified boot. Thus, TCL
`
`does not directly infringe the claims, all of which are method claims. But TCL also
`
`cannot be liable for indirect infringement, because Ancora brought suit, and TCL
`
`gained knowledge of the ’941 Patent, after the patent had already expired. Hence,
`
`the requisite scienter is impossible for an induced infringement claim.
`
`Ancora thus accuses the OTA update functionality because, according to
`
`Ancora, the interaction of the TCL servers with the TCL smartphones for an OTA
`
`update somehow invokes the narrow legal precedent in SiRF Technologies, Inc. v.
`
`International Trade Commission, 601 F.3d 1319 (Fed. Cir. 2010). Other than that
`
`attempt at reading an infringement theory in between the lines of 35 U.S.C.
`
`§ 271(a) and § 271(b), the OTA update functionality is mostly irrelevant to the ’941
`
`Patent’s claims.
`
`As for the accused verified boot functionality, Ancora’s allegations go far
`
`afield of the ’941 Patent’s disclosure and the reasonable scope of its claims.
`
`For the “erasable, non-volatile memory of the BIOS” where a license record
`
`is stored—the feature emphasized repeatedly as being the inventive feature of claim
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-7-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 11 of 30 Page ID #:991
`
`
`1—Ancora points to the equivalent of the “hard disk” in the TCL smartphones, the
`
`very thing that the ’941 Patent contrasts with the “erasable, non-volatile memory of
`
`the BIOS.” For example, for the accused BlackBerry KEY2 smartphone, Ancora
`
`alleges that the 32 GB or 64 GB Flash memory is the “erasable, non-volatile
`
`memory of the BIOS.” As best can be understood, the software that Ancora alleges
`
`is the “BIOS” is a software package that is stored in the same primary storage
`
`device, the Flash memory, where the operating system and user data are stored.
`
`In other words, the alleged “erasable, non-volatile memory of the BIOS” in
`
`the TCL smartphones has none of the characteristics previously relied on for
`
`distinguishing the memory from other storage devices. It is not true that “the
`
`required level of system programming expertise” needed to tamper with the Flash
`
`memory is “substantially higher than those needed for tampering with data residing
`
`in volatile memory such as hard disk.” ’941 Patent at 3:4–9. It is the exact same
`
`level of expertise, because it is the exact same memory. It is not true that the TCL
`
`smartphones “rely[ ] on specific and unique characteristics of certain aspects of the
`
`BIOS,” Ancora v. HTC, 908 F.3d at 1349, because the BIOS is stored in the same
`
`memory as all of the other system resources. The memory in the TCL smartphones
`
`that Ancora points to as the “erasable, non-volatile memory of the BIOS” is the
`
`modern equivalent of the hard disk, the very thing that the ’941 Patent distinguished
`
`the BIOS memory from throughout its disclosure, and not the BIOS memory itself.
`
`For other disputed terms, Ancora similarly stretches their meaning beyond
`
`that reasonably afforded by the claim language and the intrinsic record.
`
`For example, for the “set up a verification structure” term, Ancora accuses an
`
`encryption process that uses a key that is not unique to a specific TCL smartphone.
`
`As best can be understood, the encryption key that Ancora accuses is a key that is
`
`shared by all TCL smartphones of the same model. That is the exact opposite of
`
`the way the encryption works in the ’941 Patent. ’941 Patent, 4:12–18.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-8-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 12 of 30 Page ID #:992
`
`
`For the “license record” term, Ancora points to an authentication hash value,
`
`i.e., a hash value that verifies that a software package has not been altered from its
`
`original form. This is a safety check to make sure the user is receiving software
`
`that has not been maliciously altered or corrupted. Contrary to what has been
`
`accused in the TCL smartphones, the license record disclosed and claimed in the
`
`’941 Patent prevents illegal software copying by verifying that it is within the scope
`
`of a license for the software to run on a particular device.
`
`For the “selecting a program residing in the volatile memory” term, the OTA
`
`update is “verified” (as alleged by Ancora) before it is loaded into volatile memory.
`
`Ancora’s infringement allegations and claim construction leave these two steps in
`
`the TCL smartphones untethered from one another, and makes the “selecting a
`
`program” step essentially meaningless.
`
`As discussed further below, when the asserted claims are construed properly
`
`in light of their plain language, the specification, and the prosecution history,
`
`Ancora’s infringement allegations are seen for the great overreach that they are.
`
`III. LEGAL STANDARDS
`
`Given the Court’s experience with claim construction, TCL foregoes
`
`recitation of general claim construction law. See, e.g., Aquastar Pool Prods., Inc. v.
`
`Color Match Pool Fittings, Inc., EDCV 5:18-cv-00094-GW(SPx), Dkt. 83, slip. op.
`
`at 4–6 (C.D. Cal. Nov. 21, 2018).
`
`IV. CLAIM TERMS IN DISPUTE
`
`Seven claim terms are in dispute, the first five of which relate to the only
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`asserted independent claim, claim 1.
`
`A.
`
`“Memory of the BIOS”
`
`Claim
`
`1
`
`Ancora’s Construction
`plain and ordinary meaning
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`TCL’s Construction
`a memory that: (i) stores the BIOS;
`(ii) is not recognized by an operating
`system as a storage device; and (iii)
`does not have a file system
`
`-9-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 13 of 30 Page ID #:993
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`TCL’s proposed construction is drawn directly from the arguments made by
`
`the Applicant during prosecution, arguments that the Examiner relied on to allow
`
`the claims. As such, those arguments should be treated as prosecution disclaimer,
`
`and TCL’s construction should be adopted.
`
`“An applicant’s statements to the PTO characterizing its invention may give
`
`rise to prosecution disclaimer.” Tech. Props. Ltd. LLC v. Huawei Techs. Co., Ltd.,
`
`849 F.3d 1349, 1357 (Fed. Cir. 2017) (citing Uship Intellectual Props., LLC v.
`
`United States, 714 F.3d 1311, 1315 (Fed. Cir. 2013)). “Prosecution disclaimer can
`
`arise from both claim amendments and arguments made to the PTO.” Tech. Props.,
`
`849 F.3d at 1357 (citing Biogen Idec, Inc. v. GlaxoSmithKline LLC, 713 F.3d 1090,
`
`1095 (Fed. Cir. 2013)). The doctrine does not apply unless the disclaimer is ‘both
`
`clear and unmistakable to one of ordinary skill in the art.’” Tech. Props., 849 F.3d
`
`at 1357 (Fed. Cir. 2017) (quoting Elbex Video, Ltd. v. Sensormatic Elecs. Corp.,
`
`508 F.3d 1366, 1371 (Fed. Cir. 2007)). “‘[W]hen the patentee unequivocally and
`
`unambiguously disavows a certain meaning to obtain a patent, the doctrine of
`
`prosecution history disclaimer narrows the meaning of the claim consistent with the
`
`scope of the claim surrendered.’” Aylus Networks, Inc. v. Apple Inc., 856 F.3d
`
`1353, 1359 (Fed. Cir. 2017) (quoting Biogen Idec, 713 F.3d at 1090)).
`
`TCL’s proposed construction for this term reflects such a clear and
`
`unmistakable disclaimer made by the applicant during prosecution.
`
`1.
`
`Applicant’s Disclaimer During Prosecution
`
`Claim 1 as originally filed recited the following:
`
`1. A method of restricting software operation within a license limitation
`
`comprising; for a computer having a first non-volatile memory area, a second
`
`non-volatile memory area, and a volatile memory area; the steps of:
`
`selecting a program residing in the volatile memory,
`
`setting up a verification structure in the non-volatile memories,
`
`verifying the program using the structure, and
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-10-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 14 of 30 Page ID #:994
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`acting on the program according to the verification.
`
`’941 File Wrapper, Claims, dated Oct. 1, 1998, p. 1.
`
`During prosecution, the applicant introduced the “memory of the BIOS”
`
`feature through the following claim amendments (with underlining indicating added
`
`language, and strikethrough indicating deleted language):
`
`(Ex. 2 at 10.)
`
`In the next action from the Patent Office, the Examiner rejected claim 1, as
`
`amended, over the combination of prior art references referred to as “Misra” and
`
`“Ewertz.” (Ex. 3 at 4–6.) The Examiner explained that Misra disclosed most of the
`
`features of claim 1, including “using an agent to set up a verification structure in
`
`computer memory where structure data includes a license record.” (Id. at 4.)
`
`However, the Examiner admitted that Misra did not disclose “constructing license
`
`records within a computer BIOS.” (Id. at 6.) The Examiner found that Ewetz
`
`disclosed “expanding BIOS memory to store identification and/or configuration
`
`data such as software licenses.” (Id.) Based on the teachings of Ewertz, the
`
`Examiner found that “it would have been obvious to one of ordinary skill to use the
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-11-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 15 of 30 Page ID #:995
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`BIOS to store licenses in the Misra et al. system as they teach of users storing
`
`license data in persistent- non-volatile storage.” (Id.)
`
`In order to overcome this rejection, the applicant did not further amend claim
`
`1. (Ex. 4 at 9.) Rather, the applicant relied on two arguments to overcome the
`
`rejection. First, the applicant argued that the Examiner misinterpreted Ewertz, and
`
`the combination of Misra and Ewertz would not result in Misra’s license record
`
`being stored in BIOS memory. (Id. at 3–5.) Second, the applicant argued that there
`
`was no motivation to combine Misra and Ewertz. (Id. at 5–6.) In explaining why
`
`there was no motivation to combine Misra and Ewertz, the applicant argued the
`
`following:
`
`Moreover, the present invention proceeds against conventional
`
`wisdom in the art. Using BIOS to store application data such as that stored in
`
`Misra’s local cache for licenses is not obvious. The BIOS area is not
`
`considered a storage area for computer applications. An ordinary skilled
`
`artisan would not consider the BIOS a storage medium to preserve
`
`application data for at least two reasons.
`
`First, OS does not support this functionality and is not recognized as a
`
`hardware device like other peripherals. . . . There is no OS support
`
`whatsoever to write data to the system BIOS. Therefore, an ordinary person
`
`skilled in the art would not consider the BIOS as a possible storage medium.
`
`Furthermore, it is common that all peripheral devices in the PC are listed and
`
`recognized by the OS except for the BIOS. This supports the fact that the
`
`BIOS is not considered a peripheral device. Accordingly, an ordinary person
`
`skilled in the art would not consider the BIOS for any operation, including
`
`writing to the BIOS.
`
`Second, no file system is associated with the BIOS. Every writable
`
`device connected to the PC is associated with an OS file system to arrange
`
`and manage data structures. . . . No such file system is associated with the
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-12-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`
`
`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 16 of 30 Page ID #:996
`
`
`BIOS. This is further evidence that OS level application programmers would
`
`not consider the BIOS as a storage medium for license data.
`
`(Id. at 6 (emphasis added).)
`
`In the next action from the Patent Office, the Examiner allowed the claims.
`
`(Ex. 5 at 3–4.) In explaining the reasons for allowance, the Examiner directly relied
`
`on the two representations quoted above: “Further, it is well known to those of
`
`ordinary skill of the art that a computer BIOS is not setup to manage a software
`
`license verification structure.” (Id. at 4.)
`
`2.
`
`TCL’s Construction Accurately Reflects the Disclaimer.
`
`The above-quoted arguments made by the applicant are a textbook case of
`
`prosecution disclaimer. The then pending (and now issued) claim 1 recited storing
`
`a license record in the “erasable, non-volatile memory of the BIOS.” The applicant
`
`described two characteristics of the BIOS memory that allegedly made the license
`
`record there non-obvious over the prior art: (1) the operating system does not
`
`recogni