throbber
Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 1 of 30 Page ID #:981
`
`
`
`
`John P. Schnurer, Bar No. 185725
`JSchnurer@perkinscoie.com
`Yun (Louise) Lu, Bar No. 253114
`LLu@perkinscoie.com
`Kyle R. Canavera Bar No. 314664
`KCanavera@perkinscoie.com
`PERKINS COIE LLP
`11452 El Camino Real, Suite 300
`San Diego, CA 92130-2080
`Telephone: 858.720.5700
`Facsimile: 858.720.5799
`
`Attorneys for Defendants
`TCT Mobile (US) Inc., Huizhou TCL Mobile
`Communication Co., Ltd., and Shenzhen TCL
`Creative Cloud Technology Co., Ltd.
`
`
`
`UNITED STATES DISTRICT COURT
`
`CENTRAL DISTRICT OF CALIFORNIA
`
`ANCORA TECHNOLOGIES, INC.,
`
`Plaintiff,
`
`v.
`
`TCT MOBILE (US) INC., HUIZHOU
`TCL MOBILE COMMUNICATION
`CO. LTD., and SHENZHEN TCL
`CREATIVE CLOUD TECHNOLOGY
`CO., LTD.,
`
`
`
`Defendants.
`
`
`
`Case No. 8:19-CV-02192-GW-ASx
`(LEAD CASE)
`
`Case No. 2:20-cv-01252-GW-ASx
`(CONSOLIDATED CASE)
`
`Judge: Hon. George H. Wu
`Judge: Hon. Alka Sagar
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 2 of 30 Page ID #:982
`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`Page
`
`
`INTRODUCTION ........................................................................................... 1
`
`BACKGROUND ............................................................................................. 2
`
`A.
`
`B.
`
`C.
`
`The ’941 Patent ..................................................................................... 2
`
`Prosecution History and Post-Issuance Proceedings ............................ 5
`
`Ancora’s Infringement Allegations Against TCL ................................ 7
`
`III. LEGAL STANDARDS ................................................................................... 9
`
`IV. CLAIM TERMS IN DISPUTE ....................................................................... 9
`
`A.
`
`“Memory of the BIOS” ......................................................................... 9
`
`1.
`
`2.
`
`Applicant’s Disclaimer During Prosecution ............................. 10
`
`TCL’s Construction Accurately Reflects the Disclaimer. ........ 13
`
`“Set Up a Verification Structure” ....................................................... 14
`
`“License Record” ................................................................................ 18
`
`“Selecting a Program Residing in the Volatile Memory” .................. 20
`
`“Volatile Memory” ............................................................................. 21
`
`“First Non-Volatile Memory Area of the Computer” ......................... 23
`
`Claim 8 Language ............................................................................... 24
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`V.
`
`CONCLUSION ............................................................................................. 25
`
`
`
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-i-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 3 of 30 Page ID #:983
`
`
`TABLE OF AUTHORITIES
`
`Page
`
`
`CASES
`
`Am. Piledriving Equip., Inc. v. Geoquip, Inc.,
`637 F.3d 1324 (Fed. Cir. 2011) ............................................................... 14, 18, 19
`
`Ancora Technologies, Inc. v. HTC America, Inc.,
`908 F.3d 1343 (Fed. Cir. 2018) ......................................................................... 6, 8
`
`Ancora Techs., Inc. v. Apple, Inc.,
`744 F.3d 732 (Fed. Cir. 2014) ............................................................................. 22
`
`Aquastar Pool Prods., Inc. v. Color Match Pool Fittings, Inc.,
`EDCV 5:18-CV-00094-GW (SPx), Dkt. 83, slip. op. at 4-6 (C.D.
`Cal. Nov. 21, 2018) ................................................................................................ 9
`
`Aylus Networks, Inc. v. Apple Inc.,
`856 F.3d 1353 (Fed. Cir. 2017) ............................................................... 10, 13, 14
`
`HTC Corp. v. Ancora Techs., Inc.,
`No. CBM2017-00054, 2017 WL 6032605 (PTAB Dec. 1, 2017) ........................ 6
`
`SiRF Technologies, Inc. v. International Trade Commission,
`601 F.3d 1319 (Fed. Cir. 2010) ............................................................................. 7
`
`Tech. Props. Ltd. LLC v. Huawei Techs. Co., Ltd.,
`849 F.3d 1349 (Fed. Cir. 2017) ........................................................................... 10
`
`Techtronic Indus. Co. Ltd. v. Int’l Trade Comm’n,
`944 F.3d 901 (Fed. Cir. 2019) ....................................................................... 15, 17
`
`STATUTES
`
`35 U.S.C. § 271(a) ...................................................................................................... 7
`
`35 U.S.C. § 271(b) ...................................................................................................... 7
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-ii-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 4 of 30 Page ID #:984
`
`
`I.
`
`INTRODUCTION
`
`Plaintiff (“Ancora”) has asserted claims 1–3, 6–14, and 16 of U.S. Patent No.
`
`6,411,941 against Defendants (“TCL”). The ’941 Patent discloses and claims a
`
`method for verifying that a program is operating within a license when it operates
`
`on a specific computer. The purported invention provides assurance to a software
`
`distributor that only licensed users/computers are running the software, i.e., that the
`
`software is not being pirated.
`
`Ancora asserts the claims against a “verified boot” procedure used in the
`
`Android operating system on the accused TCL smartphones. But verified boot does
`
`not perform the disclosed and claimed functionality. Rather, verified boot is a
`
`safety check. Unlike the ’941 patent, where the claimed invention is directed to
`
`checking whether a specific computer or user is licensed to run a program, verified
`
`boot provides assurance to the user of the smartphone that the software is the same
`
`as was provided by the software distributor, i.e., the software is not damaged or
`
`malicious.
`
`There are seven disputed claim terms. Four of the disputed terms deal with
`
`attempts by Ancora to read the terms to fit the infringement read, but in ways that
`
`are fundamentally incompatible with the claim language, the specification, the
`
`prosecution history, and the extensive post-issuance litigation of the ’941 Patent.
`
`See infra §§ IV.A–D. One of the disputed terms deals with an overly broad and
`
`needlessly confusing construction by Ancora. See infra § IV.E. Two of the
`
`disputed terms deal with language that will be confusing to the jury, and which
`
`should be resolved now through claim construction. See infra §§ IV.F–G.
`
`For the reasons that follow, TCL requests that the Court adopt its
`
`constructions for the disputed terms.
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-1-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 5 of 30 Page ID #:985
`
`
`II. BACKGROUND
`
`A. The ’941 Patent
`
`The ’941 Patent claims priority to May 21, 1998 and describes a “Method of
`
`Restricting Software Operation within a License Limitation.” ’941 Patent, Cover
`
`Page.
`
`The ’941 Patent motivates its disclosure by noting the “grand proliferation of
`
`illegally copied software, which is engulfing the marketplace” and causing “billions
`
`of dollars in lost profits to commercial software developers.” Id. at 1:14–18.
`
`Because of that illegal copying problem, prior art techniques were devised for “the
`
`identifying and restricting of an unauthorized software program’s operation.” Id. at
`
`1:12–14. But none of those prior art techniques were apparently adequate, so the
`
`’941 Patent disclosed that “[t]he present invention relates to a method of restricting
`
`software operation within a license limitation.” Id. at 1:38–40. “This method
`
`strongly relies on the use of a key and of a record, which have been written into the
`
`non-volatile memory of a computer.” Id. at 1:40–43.
`
`Against that backdrop, the ’941 Patent depicts the invention with respect to
`
`Figure 1, shown below. A computer processor (1) includes a first non-volatile
`
`memory area (4) (in red), a second non-volatile memory area (5) (in blue), and a
`
`volatile memory area (6) (in green). Id. at 5:9–16. The first non-volatile memory
`
`(4) can be “e.g., the ROM section of the BIOS” and stores a key (8). Id. at 5:13–14,
`5:19–24. The second non-volatile memory (5) can be “e.g., the E2PROM section of
`
`the BIOS” and stores license records (10), (11), (12). Id. at 5:14–15, 5:25–27. The
`
`volatile memory (6) can be “e.g. the internal RAM memory of the computer” and
`
`stores a license program (16). Id. at 5:15–16, 5:27–29.
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-2-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 6 of 30 Page ID #:986
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`’941 Patent, Fig. 1 (color annotations added).
`
`In order to provide a “better understanding of the underlying concept of the
`
`invention,” the ’941 Patent makes the following observations.
`
`The first non-volatile memory can be a “ROM section” of a “conventional
`
`BIOS module,” and the key can be embedded therein “during manufacture.” Id. at
`
`1:45–52. ROM, or “read-only memory,” is a memory module that is written with
`
`data once, and then cannot be rewritten. That is, it permanently stores some data.
`
`ROM, like other non-volatile memory, maintains the data stored thereon even when
`
`the power supply is lost. “It is important to note that the key . . . cannot be removed
`
`or modified.” Id. at 1:50–52.
`
`The volatile memory can be “RAM memory,” and stores a license program.
`
`Id. at 5:15–16, 5:27–29. The license program can be an “application program that
`
`is to be licensed to run on the specified computer.” Id. at 1:53–54. The license
`
`program is “associated with a license record.” Id. at 1:53–55. RAM, or “random-
`
`access memory,” is typically used to stored working data and running programs in a
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-3-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 7 of 30 Page ID #:987
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`computer. RAM, like other volatile memory, loses data stored thereon when the
`
`power supply is lost.
`The second non-volatile memory can be “E2PROM” and stores an “encrypted
`license record” that is encrypted using the key. Id. at 1:59–67. E2PROM, or
`
`“electrically erasable programmable read-only memory,” is a type of memory that
`can have its data written and rewritten multiple times. E2PROM, like other non-
`
`volatile memory, maintains the data stored thereon even when the power supply is
`
`lost. “It should be noted that unlike the first non-volatile section, the data in the
`second non-volatile memory may optionally be erased or modified (using E2PROM
`
`manipulation commands), so as to enable to add, modify or remove licenses.” Id. at
`
`2:1–5.
`
`The ’941 Patent disclosed a method of using the aforementioned structures in
`
`order to achieve the aim of reducing illegal software copying. That method,
`
`described with respect to Figure 2 contains four steps. First, at step (17), the
`
`program to be verified is selected from volatile memory. Id. at 2:62–3:3, 6:7–16.
`
`Second, at step (18), a “verification structure” is set up in the non-volatile memory.
`
`Id. at 2:62–3:3, 6:18–27. Third, at step (19), the selected program is verified using
`
`the verification structure. Id. at 2:62–3:3, 6:28–39. Fourth, at step (20), the
`
`selected program is acted on based on the result of the verification. Id. at 2:62–3:3,
`
`6:40–53.
`
`The ’941 Patent observes the following supposed benefits of the above-
`
`described arrangement.
`
`First, because the license record stored in the second non-volatile memory is
`
`encrypted using a key unique to the computer, that encrypted license record is not
`
`effective on a second computer, which would have a different unique key. Id. at
`
`2:27–59. Thus, “any attempt to run a program at an unlicensed site will be
`
`immediately detected.” Id. at 2:27–30. That is, the license record cannot be used to
`
`run an illegal copy of the software on the second, unlicensed computer.
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-4-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 8 of 30 Page ID #:988
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Second, because the license record is stored in BIOS memory, it is more
`
`difficult for a malicious actor to tamper with the license record data. Id. at 3:4–17.
`
`Namely, because BIOS was typically stored in specialized memory modules like
`E2PROM, “the required level of system programming expertise that is necessary to
`
`intercept or modify commands, interacting with the BIOS, is substantially higher
`
`than those needed for tampering with data residing in volatile memory such as hard
`
`disk.” Id. at 3:4–9. Also, the risk involved in tampering with data stored in BIOS
`
`memory was higher. Id. at 3:13–17. If the hacker inadvertently changed the BIOS
`
`data itself, then the computer could be rendered inoperable. Id. “This is too high of
`
`a risk for the ordinary software hacker to pay.” Id.
`
`B.
`
`Prosecution History and Post-Issuance Proceedings
`
`Claim 1 as originally filed covered setting up a verification structure in two
`
`non-volatile memories, and verifying a program in volatile memory based thereon.
`
`(Ex. 1 at 1.) During prosecution, the Applicant amended the claims to recite, as in
`
`its ultimately issued form, that the verification structure was stored “in the erasable,
`
`non-volatile memory of the BIOS.” (Ex. 2 at 10.) The Applicant later argued that
`
`this storing of the license record in the memory of the BIOS was what distinguished
`
`claim 1 over the prior art of record. (Ex. 4 at 3–7.) The Applicant alleged that this
`
`storage in the memory of the BIOS was unknown in the prior art both because
`
`“[t]here is no OS support whatsoever to write data to the system BIOS,” and
`
`because “no file system is associated with the BIOS.” (Id. at 6.)
`
`The Examiner allowed the claims based on this distinction. The prior art of
`
`record disclosed, for instance, a licensing software that stored licenses in a device’s
`
`ordinary “persistent non-volatile storage,” (Ex. 5 at 3 (citing U.S. Pat. No.
`
`6,189,146 at 12:8–31)), and “the use of BIOS memory for storing licensing
`
`numbers,” (id. at 4 (citing U.S. Pat. No. 5,479,639)). But, according to the
`
`Examiner, the prior art failed to show “licensed programs running at the OS level
`
`interacting with a program verification structure stored in the BIOS . . . [.]” (Id. at
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-5-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 9 of 30 Page ID #:989
`
`
`4.) “Further, it is well known to those of ordinary skill of the art that a computer
`
`BIOS is not setup to manage a software license verification structure.” (Id.)
`
`According to the Examiner, the ’941 Patent solved that problem by using the
`
`“agent” to set up the verification structure in the memory of the BIOS. (Id.)
`
`This feature was cemented as the supposed invention in two post-issuance
`
`proceedings.
`
`First, the ’941 Patent was subject to a covered business method review. The
`
`Board denied institution, finding that the ’941 Patent was not a covered business
`
`method patent because it disclosed a technical solution in the form of storing the
`
`license record in the memory of the BIOS. HTC Corp. v. Ancora Techs., Inc., No.
`
`CBM2017-00054, 2017 WL 6032605, at *3–*5 (PTAB Dec. 1, 2017).
`
`Second, the ’941 Patent was subject an appeal to the Federal Circuit in
`
`Ancora Technologies, Inc. v. HTC America, Inc., 908 F.3d 1343 (Fed. Cir. 2018).
`
`Reviewing a district court ruling on the pleadings that the claims of the ’941 Patent
`
`were patent ineligible, the Federal Circuit reversed. The court found that, at step 1
`
`of the Alice analysis, claim 1 was not directed to an abstract idea. Id. at 1348–49.
`
`The court found that claim 1 was directed to an improvement to computer security
`
`with its alleged improvement of “a structure containing a license record is stored in
`
`a particular, modifiable, non-volatile portion of the computer’s BIOS, and the
`
`structure in that memory location is used for verification by interacting with the
`
`distinct computer memory that contains the program to be verified.” Id. On the
`
`pleadings, the court did not find any reason to dispute the ’941 Patent’s assertion
`
`that this storage in BIOS memory resulted in a “beneficial reduction of the risk of
`
`hacking.” Id. at 1349.
`
`Two other district courts have issued orders construing the claims of the ’941
`
`Patent. (Exs. 10–12.)
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-6-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 10 of 30 Page ID #:990
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`C. Ancora’s Infringement Allegations Against TCL
`
`Ancora’s infringement allegations against TCL string together two aspects of
`
`the Android operating system running on TCL smartphones: (1) over-the-air
`
`(“OTA”) updates; and (2) verified boot. An OTA update is a software package that
`
`a TCL smartphone downloads and installs. (Ex. 6.) Verified boot is a process by
`
`which the TCL smartphone uses cryptographic checks to ensure the safety of
`
`software, i.e., that it is not malicious or corrupted. (Ex. 7.)
`
`The OTA update functionality is mostly irrelevant to the ’941 Patent’s
`
`claims. The TCL smartphone functionality that Ancora maps to the claim features
`
`is primarily the verified boot functionality. But Ancora accuses the TCL
`
`smartphones’ use of OTA updates for a simple reason: TCL does not itself perform
`
`the verified boot functionality. The TCL smartphones have long since left the
`
`control of TCL when the TCL smartphones perform a verified boot. Thus, TCL
`
`does not directly infringe the claims, all of which are method claims. But TCL also
`
`cannot be liable for indirect infringement, because Ancora brought suit, and TCL
`
`gained knowledge of the ’941 Patent, after the patent had already expired. Hence,
`
`the requisite scienter is impossible for an induced infringement claim.
`
`Ancora thus accuses the OTA update functionality because, according to
`
`Ancora, the interaction of the TCL servers with the TCL smartphones for an OTA
`
`update somehow invokes the narrow legal precedent in SiRF Technologies, Inc. v.
`
`International Trade Commission, 601 F.3d 1319 (Fed. Cir. 2010). Other than that
`
`attempt at reading an infringement theory in between the lines of 35 U.S.C.
`
`§ 271(a) and § 271(b), the OTA update functionality is mostly irrelevant to the ’941
`
`Patent’s claims.
`
`As for the accused verified boot functionality, Ancora’s allegations go far
`
`afield of the ’941 Patent’s disclosure and the reasonable scope of its claims.
`
`For the “erasable, non-volatile memory of the BIOS” where a license record
`
`is stored—the feature emphasized repeatedly as being the inventive feature of claim
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-7-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 11 of 30 Page ID #:991
`
`
`1—Ancora points to the equivalent of the “hard disk” in the TCL smartphones, the
`
`very thing that the ’941 Patent contrasts with the “erasable, non-volatile memory of
`
`the BIOS.” For example, for the accused BlackBerry KEY2 smartphone, Ancora
`
`alleges that the 32 GB or 64 GB Flash memory is the “erasable, non-volatile
`
`memory of the BIOS.” As best can be understood, the software that Ancora alleges
`
`is the “BIOS” is a software package that is stored in the same primary storage
`
`device, the Flash memory, where the operating system and user data are stored.
`
`In other words, the alleged “erasable, non-volatile memory of the BIOS” in
`
`the TCL smartphones has none of the characteristics previously relied on for
`
`distinguishing the memory from other storage devices. It is not true that “the
`
`required level of system programming expertise” needed to tamper with the Flash
`
`memory is “substantially higher than those needed for tampering with data residing
`
`in volatile memory such as hard disk.” ’941 Patent at 3:4–9. It is the exact same
`
`level of expertise, because it is the exact same memory. It is not true that the TCL
`
`smartphones “rely[ ] on specific and unique characteristics of certain aspects of the
`
`BIOS,” Ancora v. HTC, 908 F.3d at 1349, because the BIOS is stored in the same
`
`memory as all of the other system resources. The memory in the TCL smartphones
`
`that Ancora points to as the “erasable, non-volatile memory of the BIOS” is the
`
`modern equivalent of the hard disk, the very thing that the ’941 Patent distinguished
`
`the BIOS memory from throughout its disclosure, and not the BIOS memory itself.
`
`For other disputed terms, Ancora similarly stretches their meaning beyond
`
`that reasonably afforded by the claim language and the intrinsic record.
`
`For example, for the “set up a verification structure” term, Ancora accuses an
`
`encryption process that uses a key that is not unique to a specific TCL smartphone.
`
`As best can be understood, the encryption key that Ancora accuses is a key that is
`
`shared by all TCL smartphones of the same model. That is the exact opposite of
`
`the way the encryption works in the ’941 Patent. ’941 Patent, 4:12–18.
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-8-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 12 of 30 Page ID #:992
`
`
`For the “license record” term, Ancora points to an authentication hash value,
`
`i.e., a hash value that verifies that a software package has not been altered from its
`
`original form. This is a safety check to make sure the user is receiving software
`
`that has not been maliciously altered or corrupted. Contrary to what has been
`
`accused in the TCL smartphones, the license record disclosed and claimed in the
`
`’941 Patent prevents illegal software copying by verifying that it is within the scope
`
`of a license for the software to run on a particular device.
`
`For the “selecting a program residing in the volatile memory” term, the OTA
`
`update is “verified” (as alleged by Ancora) before it is loaded into volatile memory.
`
`Ancora’s infringement allegations and claim construction leave these two steps in
`
`the TCL smartphones untethered from one another, and makes the “selecting a
`
`program” step essentially meaningless.
`
`As discussed further below, when the asserted claims are construed properly
`
`in light of their plain language, the specification, and the prosecution history,
`
`Ancora’s infringement allegations are seen for the great overreach that they are.
`
`III. LEGAL STANDARDS
`
`Given the Court’s experience with claim construction, TCL foregoes
`
`recitation of general claim construction law. See, e.g., Aquastar Pool Prods., Inc. v.
`
`Color Match Pool Fittings, Inc., EDCV 5:18-cv-00094-GW(SPx), Dkt. 83, slip. op.
`
`at 4–6 (C.D. Cal. Nov. 21, 2018).
`
`IV. CLAIM TERMS IN DISPUTE
`
`Seven claim terms are in dispute, the first five of which relate to the only
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`asserted independent claim, claim 1.
`
`A.
`
`“Memory of the BIOS”
`
`Claim
`
`1
`
`Ancora’s Construction
`plain and ordinary meaning
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`TCL’s Construction
`a memory that: (i) stores the BIOS;
`(ii) is not recognized by an operating
`system as a storage device; and (iii)
`does not have a file system
`
`-9-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 13 of 30 Page ID #:993
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`TCL’s proposed construction is drawn directly from the arguments made by
`
`the Applicant during prosecution, arguments that the Examiner relied on to allow
`
`the claims. As such, those arguments should be treated as prosecution disclaimer,
`
`and TCL’s construction should be adopted.
`
`“An applicant’s statements to the PTO characterizing its invention may give
`
`rise to prosecution disclaimer.” Tech. Props. Ltd. LLC v. Huawei Techs. Co., Ltd.,
`
`849 F.3d 1349, 1357 (Fed. Cir. 2017) (citing Uship Intellectual Props., LLC v.
`
`United States, 714 F.3d 1311, 1315 (Fed. Cir. 2013)). “Prosecution disclaimer can
`
`arise from both claim amendments and arguments made to the PTO.” Tech. Props.,
`
`849 F.3d at 1357 (citing Biogen Idec, Inc. v. GlaxoSmithKline LLC, 713 F.3d 1090,
`
`1095 (Fed. Cir. 2013)). The doctrine does not apply unless the disclaimer is ‘both
`
`clear and unmistakable to one of ordinary skill in the art.’” Tech. Props., 849 F.3d
`
`at 1357 (Fed. Cir. 2017) (quoting Elbex Video, Ltd. v. Sensormatic Elecs. Corp.,
`
`508 F.3d 1366, 1371 (Fed. Cir. 2007)). “‘[W]hen the patentee unequivocally and
`
`unambiguously disavows a certain meaning to obtain a patent, the doctrine of
`
`prosecution history disclaimer narrows the meaning of the claim consistent with the
`
`scope of the claim surrendered.’” Aylus Networks, Inc. v. Apple Inc., 856 F.3d
`
`1353, 1359 (Fed. Cir. 2017) (quoting Biogen Idec, 713 F.3d at 1090)).
`
`TCL’s proposed construction for this term reflects such a clear and
`
`unmistakable disclaimer made by the applicant during prosecution.
`
`1.
`
`Applicant’s Disclaimer During Prosecution
`
`Claim 1 as originally filed recited the following:
`
`1. A method of restricting software operation within a license limitation
`
`comprising; for a computer having a first non-volatile memory area, a second
`
`non-volatile memory area, and a volatile memory area; the steps of:
`
`selecting a program residing in the volatile memory,
`
`setting up a verification structure in the non-volatile memories,
`
`verifying the program using the structure, and
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-10-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 14 of 30 Page ID #:994
`
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`acting on the program according to the verification.
`
`’941 File Wrapper, Claims, dated Oct. 1, 1998, p. 1.
`
`During prosecution, the applicant introduced the “memory of the BIOS”
`
`feature through the following claim amendments (with underlining indicating added
`
`language, and strikethrough indicating deleted language):
`
`(Ex. 2 at 10.)
`
`In the next action from the Patent Office, the Examiner rejected claim 1, as
`
`amended, over the combination of prior art references referred to as “Misra” and
`
`“Ewertz.” (Ex. 3 at 4–6.) The Examiner explained that Misra disclosed most of the
`
`features of claim 1, including “using an agent to set up a verification structure in
`
`computer memory where structure data includes a license record.” (Id. at 4.)
`
`However, the Examiner admitted that Misra did not disclose “constructing license
`
`records within a computer BIOS.” (Id. at 6.) The Examiner found that Ewetz
`
`disclosed “expanding BIOS memory to store identification and/or configuration
`
`data such as software licenses.” (Id.) Based on the teachings of Ewertz, the
`
`Examiner found that “it would have been obvious to one of ordinary skill to use the
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-11-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 15 of 30 Page ID #:995
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`BIOS to store licenses in the Misra et al. system as they teach of users storing
`
`license data in persistent- non-volatile storage.” (Id.)
`
`In order to overcome this rejection, the applicant did not further amend claim
`
`1. (Ex. 4 at 9.) Rather, the applicant relied on two arguments to overcome the
`
`rejection. First, the applicant argued that the Examiner misinterpreted Ewertz, and
`
`the combination of Misra and Ewertz would not result in Misra’s license record
`
`being stored in BIOS memory. (Id. at 3–5.) Second, the applicant argued that there
`
`was no motivation to combine Misra and Ewertz. (Id. at 5–6.) In explaining why
`
`there was no motivation to combine Misra and Ewertz, the applicant argued the
`
`following:
`
`Moreover, the present invention proceeds against conventional
`
`wisdom in the art. Using BIOS to store application data such as that stored in
`
`Misra’s local cache for licenses is not obvious. The BIOS area is not
`
`considered a storage area for computer applications. An ordinary skilled
`
`artisan would not consider the BIOS a storage medium to preserve
`
`application data for at least two reasons.
`
`First, OS does not support this functionality and is not recognized as a
`
`hardware device like other peripherals. . . . There is no OS support
`
`whatsoever to write data to the system BIOS. Therefore, an ordinary person
`
`skilled in the art would not consider the BIOS as a possible storage medium.
`
`Furthermore, it is common that all peripheral devices in the PC are listed and
`
`recognized by the OS except for the BIOS. This supports the fact that the
`
`BIOS is not considered a peripheral device. Accordingly, an ordinary person
`
`skilled in the art would not consider the BIOS for any operation, including
`
`writing to the BIOS.
`
`Second, no file system is associated with the BIOS. Every writable
`
`device connected to the PC is associated with an OS file system to arrange
`
`and manage data structures. . . . No such file system is associated with the
`
`
`
`TCL’S OPENING CLAIM
`CONSTRUCTION BRIEF
`
`
`-12-
`
`Case No. 8:19-CV-02192-GW-ASx
`
`

`

`
`
`Case 8:19-cv-02192-GW-AS Document 53 Filed 09/03/20 Page 16 of 30 Page ID #:996
`
`
`BIOS. This is further evidence that OS level application programmers would
`
`not consider the BIOS as a storage medium for license data.
`
`(Id. at 6 (emphasis added).)
`
`In the next action from the Patent Office, the Examiner allowed the claims.
`
`(Ex. 5 at 3–4.) In explaining the reasons for allowance, the Examiner directly relied
`
`on the two representations quoted above: “Further, it is well known to those of
`
`ordinary skill of the art that a computer BIOS is not setup to manage a software
`
`license verification structure.” (Id. at 4.)
`
`2.
`
`TCL’s Construction Accurately Reflects the Disclaimer.
`
`The above-quoted arguments made by the applicant are a textbook case of
`
`prosecution disclaimer. The then pending (and now issued) claim 1 recited storing
`
`a license record in the “erasable, non-volatile memory of the BIOS.” The applicant
`
`described two characteristics of the BIOS memory that allegedly made the license
`
`record there non-obvious over the prior art: (1) the operating system does not
`
`recogni

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket