throbber
Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 1 of 123 PageID #: 6479
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`Civil Action No. 2:14-CV-903-JRG
`
`§§§§§§§§§§§
`
`BMC SOFTWARE, INC.,
`
`Plaintiff,
`
`v.
`
`SERVICENOW, INC.,
`
`
`
`Defendant.
`
`MEMORANDUM OPINION AND ORDER
`
`On July 10, 2015, the Court held a hearing to determine the proper construction of the
`
`disputed claim terms in United States Patent Nos. 5,978,594 (“the ’594 Patent”), 6,816,898 (“the
`
`’898 Patent”), 6,895,586 (“the ’586 Patent”), 7,062,683 (“the ’683 Patent”), 7,617,073 (“the ’073
`
`Patent”), 8,646,093 (“the ’093 Patent”), and 8,674,992 (“the ’992 Patent”) (collectively, the
`
`“Asserted Patents”). After considering the arguments made by the parties at the hearing and in
`
`the parties’ claim construction briefing (Dkt. Nos. 99, 106, and 108), the Court issues this Claim
`
`Construction Memorandum and Order.
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 1 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 2 of 123 PageID #: 6480
`
`TABLE OF CONTENTS
`
`I.
`
`II.
`III.
`IV.
`
`BACKGROUND ................................................................................................................ 4
`A.
`The ’586 Patent...................................................................................................... 4
`B.
`The ’898 Patent...................................................................................................... 6
`C.
`The ’594 Patent...................................................................................................... 8
`D.
`The ’683 Patent.................................................................................................... 11
`E.
`The ’093 Patent.................................................................................................... 14
`F.
`The ’073 Patent.................................................................................................... 16
`G.
`The ’992 Patent.................................................................................................... 18
`APPLICABLE LAW ........................................................................................................ 21
`CONSTRUCTION OF AGREED TERMS ...................................................................... 23
`CONSTRUCTION OF DISPUTED TERMS ................................................................... 25
`A.
`The ’586 Patent.................................................................................................... 25
`
`1. “sharing the plurality of objects with a plurality of the one or more computer
`system[s]” ............................................................................................................ 25
`
`2. “hierarchical namespace” ............................................................................. 29
`
`3. “dynamically inherits traits from the prototype” and “wherein the values of
`the traits inherited from the prototype change dynamically” ............................... 33
`
`4. “traits” ........................................................................................................... 37
`
`B.
`
`The ’898 Patent.................................................................................................... 42
`
`1. “periodically” ................................................................................................ 42
`
`2. “script-based program” ................................................................................. 46
`
`3. “service monitor” .......................................................................................... 49
`
`C.
`
`The ’594 Patent.................................................................................................... 55
`
`1. “interpreting the instructions” ....................................................................... 55
`
`2. “interpretable high-level computer programming language” ....................... 58
`
`3. “uninterpreted form” and “stored on the storage device in their uninterpreted
`form” ................................................................................................................... 61
`Page 2 of 123(cid:3)
`(cid:3)
`
`(cid:3)
`
`(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 3 of 123 PageID #: 6481
`
`D.
`
`The ’683 Patent.................................................................................................... 65
`
`1. “node” and “nodes” ...................................................................................... 65
`
`2. “fault model” and “fault model having a plurality of nodes” ....................... 70
`
`3. “enterprise” ................................................................................................... 73
`
`4. “up-stream,” “most up-stream,” and “down-stream” .................................... 76
`
`5. “a root cause” ................................................................................................ 79
`
`6. “impact value” .............................................................................................. 81
`
`E.
`
`The ’093 Patent.................................................................................................... 84
`
`1. “license certificate” ....................................................................................... 84
`
`2. “exception indication” .................................................................................. 88
`
`F.
`
`The ’073 Patent.................................................................................................... 91
`
`1. “wherein the first and second indicator are each separately visible at the
`same time on a single display window of a display unit” ................................... 91
`
`2. “subcomponent” and “IT subcomponent” ..................................................... 96
`
`3. “IT component processor,” “IT subcomponent processor,” and “processor” 99
`
`G.
`
`The ’992 Patent.................................................................................................. 101
`
`1. “importance” and “importance of the corresponding service” .................... 101
`
`2. “service level agreement (SLA)” and “SLA violation” ............................. 105
`
`3. “graph” and “node” .................................................................................... 108
`
`4. “variable graphical image,” “a variable graphical image positioned with the
`node,” “spotlight,” and “displaying a spotlight with each of the nodes of the
`plurality of nodes” ............................................................................................. 113
`
`V.
`
`CONCLUSION ............................................................................................................... 118
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 3 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 4 of 123 PageID #: 6482
`
`I.
`
`BACKGROUND
`
`A. The ’586 Patent
`
`The ’586 Patent is titled “Enterprise Management System and Method which Includes a
`
`Common Enterprise-wide Namespace and Prototype-based Hierarchical Inheritance.” It was
`
`filed on August 30, 2000, and issued on May 17, 2005. The ’586 Patent generally relates to an
`
`improved namespace and object description system for enterprise management. See ’586 Patent
`
`at Abstract.1
`
`The specification states that “the term ‘namespace’ generally refers to a set of names in
`
`which all names are unique,” and that “[a] namespace is typically a logical organization and not
`
`a physical one.” Id. at 1:52–54; 2:12–13. The specification describes an embodiment where
`
`“[t]he namespace comprises a logical arrangement of the objects, stored hierarchically.” Id. at
`
`3:62–63. The specification states that “a plurality of objects may be added to the namespace,
`
`wherein the objects relate to software and hardware of the one or more computer systems.” Id. at
`
`3:63–65. The specification adds that “at least one of the objects is a prototype and at least one of
`
`the objects is an instance.” Id. at 4:8–10.
`
`The specification defines “prototype” as “an object in a namespace from which attributes,
`
`values, and/or children are dynamically inherited by another object.” Id. at 14:44–46. The
`
`specification further defines “instance” as “an object in a namespace which dynamically inherits
`
`attributes, values, and/or children from another object in the namespace.” Id. at 14:47–49. The
`
`specification states that “[t]he instance inherits from the prototype traits such as attribute values
`
`(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)
`1 The Abstract of the ’586 Patent follows:
`A system and method for providing an improved namespace and object
`description system for enterprise management are disclosed. The system and
`method employ a hierarchical namespace with objects including prototypes and
`instances where an instance inherits traits from a prototype, such as attribute
`values and/or child objects.(cid:3)
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 4 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 5 of 123 PageID #: 6483
`
`and/or child objects.” Id. at 4:8–10. The specification states that Figure 7 illustrates an example
`
`of a namespace which includes a prototype-instance relationship. Id. at 14:49–51.
`
`Id. at Figure 7. The specification states that Figure 7 illustrates a “dynamic inheritance link from
`
`object ‘b’ 456 to object ‘a’ 454; the link is shown as a dashed arrow.” Id. at 14:53–54. The
`
`specification further states that “[o]bject ‘a’ 454 functions as the prototype and object ‘b’ 456
`
`functions as the instance.” Id. at 14:54-55. The specification concludes that “object ‘b’ 456
`
`dynamically inherits the attributes, values, and children of object ‘a’ 454.” Id. at 4:55–57. For
`
`example, “object ‘b’ 456 has an attribute called ‘x’ of its own and also inherits the attribute ‘y’
`
`from object ‘a’ 454.” Id. at 14:60–62.
`
`Claim 1 of the ’586 Patent is representative of the asserted claims and recites the
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 5 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 6 of 123 PageID #: 6484
`
`following elements (disputed terms in italics):
`
`1. A method for managing an enterprise, wherein the enterprise
`comprises one or more networked computer systems, the
`method comprising:
`providing a hierarchical namespace;
`adding a plurality of objects to the namespace, wherein the
`objects relate to software and hardware of the one or more
`computer systems;
`sharing the plurality of objects with a plurality of the one or
`more computer system, wherein at least one of the objects
`is a prototype and at least one of the objects is an instance,
`wherein the instance dynamically inherits traits from the
`prototype; and wherein the values of the traits inherited
`from the prototype change dynamically.
`
`B. The ’898 Patent
`
`The ’898 Patent is titled “Interfacing External Metrics into a Performance Management
`
`System.” It was filed on August 16, 2000, and issued on November 9, 2004. The ’898 Patent
`
`generally relates to performing operations on performance management data, and generating
`
`output data for display using collected performance management data. See ’898 Patent at
`
`Abstract.2
`
`The specification describes Figure 3 as illustrating “a data flow diagram of the claimed
`
`invention.” Id. at 7:13–14.
`
`(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)
`2 The Abstract of the ’898 Patent follows:
`A method and apparatus for network management is described. In one
`embodiment, a method comprises collecting performance data having
`accompanying meta data including information defining the performance
`management data and information indicating operations to be performed on the
`performance management data, and generating output data for display using
`collected performance management data according to the information indicating
`the operations to be performed on the performance management data. (cid:3)
`Page 6 of 123(cid:3)
`(cid:3)
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 7 of 123 PageID #: 6485
`
`Id. at Figure 3. Referring to Figure 3, the specification states that “a user provides at least one
`
`script-based program [110] to the meta API 130.” Id. at 7:14–15. The specification further states
`
`that “[i]n one embodiment, the user provides the script-based program by copying the script into
`
`a directory server on a server used by the network managing system (e.g., network monitor
`
`150).” Id. at 7:15–18. The specification adds that “[t]he user may also provide information 120
`
`to the meta API.” Id. at 7:22–23. The specification further discloses that “[i]nformation 120 may
`
`comprise poling [sic] rate, IP address, names and types, and units of input and output variables.”
`
`Id. at 7:23–24. “In other words, information 120 comprise user defined customized data types.”
`
`Id. at 7:24–26.
`
`The specification further states that “[n]etwork monitor 150 collects meta data and data
`
`defined by the script-based programs from the network 160 using service monitor 140.” Id. at
`
`7:28–30. The specification states that “[t]he returned data 170 is then processed by network
`
`monitor 150.” Id. at 7:30–31. The specification adds that “[t]he processing by network monitor
`
`150 may include generated customized graphs 181, customized records 182, and/or setting an
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 7 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 8 of 123 PageID #: 6486
`
`alarm 183.” Id. at 7:31–34.
`
`Claim 6 of the ’898 Patent is representative of the asserted claims and recites the
`
`following elements (disputed terms in italics):
`
`6. A method for providing an interface between a user and a
`performance management
`system,
`the performance
`management system being connected with a network, the
`network including a plurality of components coupled by a
`plurality of connections, the performance management
`system collecting data of the components, the method
`comprising:
`receiving at least one script-based program from the user, the
`script-based programs defining data types not provided by
`the performance management system;
`integrating the program to the performance management system
`as a service monitor, the performance management system
`using the service monitor to periodically collect data of
`the defined data types from the components.
`
`C. The ’594 Patent
`
`The ’594 Patent is titled “System for Managing Computer Resources Across a
`
`Distributed Computing Environment by First Reading Discovery Information about How to
`
`Determine System Resources Presence.” It was filed on March 6, 1997, and issued on
`
`November 2, 1999. The ’594 Patent generally relates to method and apparatus for managing a
`
`computer network. See ’594 Patent at Abstract.3
`
`(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)
`3 The Abstract of the ’594 Patent follows:
`A method and apparatus are disclosed for managing a computer network. A
`manager software system is installed on a network management computer system
`within the network, and one agent software system is installed on each of the
`server computer systems in the network. A knowledge module in the form of a
`text fie [sic] is stored on the network manager computer system so that the
`manager software system can transmit knowledge to the various agent software
`systems throughout the network, for use by the agents in monitoring and
`managing the server on which they are installed. Interpretable script language
`programs are present on all computers in the network, expanding and customizing
`the functionality of the agent software systems. A method is disclosed for using
`the high level interpretable script language programs in connection with the agent
`Page 8 of 123(cid:3)
`(cid:3)
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 9 of 123 PageID #: 6487
`
`The Background section of the specification states that a need existed “for a network
`
`management system that [would] provide an increase in automation and efficiency for network
`
`management and a decrease in the complexity of such management.” Id. at 1:56–58. The
`
`specification states that “FIG. 8 shows a preferred procedure, implemented according to the
`
`method of the invention, for discovering resources on a server computer system 14 in the
`
`network using a high-level interpretable language.” Id. at 7:45–48.
`
`(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)
`software systems for discovering resources on the network, monitoring aspects of
`resources, and taking recovery actions automatically in the event of an alarm
`condition. (cid:3)
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 9 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 10 of 123 PageID #: 6488
`
`Id. at Figure 8. The specification discloses that “[t]he discovery procedure is initiated either in
`
`step 116 when the timer within agent software system 36 indicates that a discovery procedure
`
`stored in run queue 71 is ready to be executed, or in step 118 when manager software system 34
`
`sends a message to agent software system 36 indicating that a discovery procedure should be
`
`executed.” Id. at 7:48–53. The specification adds that “[w]hen the discovery procedure begins,
`
`in step 120, the agent software system 36 reads knowledge database 75 to determine the name of
`
`a resource class that should be searched for.” Id. at 7:56–58. The specification states that “[i]n
`
`step 122, if a resource class is found that should be searched for, execution continues with step
`
`124.” Id. at 7:58–59.
`
`The specification continues that “[i]n step 124, the knowledge database on the server is
`
`read to find the name and location of the script program that will search for the particular
`
`resource in question.” Id. at 7:60–62. The specification states that “[i]n step 126, the script
`
`program indicated is found,” and “[i]n step 128, agent software system 36 determines whether or
`
`not the script program has yet been compiled.” Id. at 7:62–65. The specification further
`
`discloses that if the script program has not been compiled, “script program compiler 64 compiles
`
`the script program in step 130 and execution continues with step 132, in which the script
`
`program is interpreted, thereby searching for the presence of the resource in question.” Id. at
`
`7:65–8:2. The specification further states that “[t]he results of the search are stored in step 134,
`
`and the process continues at step 120 once again until in step 122 no further resources are found
`
`to be searched for, in which case execution continues with step 136.” Id. at 8:2–6.
`
`Claim 1 of the ’594 Patent is representative of the asserted claims and recites the
`
`following elements (disputed terms in italics):
`
`1. A method of determining whether a resource is present on a
`computer system, comprising the steps of:
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 10 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 11 of 123 PageID #: 6489
`
`(a) reading, from a storage device coupled to the computer
`system, discovery information about how to determine
`whether the resource is present on the computer system;
`(b) finding, on the storage device, instructions that are referred
`to in the discovery information, that are written in an
`interpretable high-level computer programming language,
`and that are stored on the storage device in their
`uninterpreted form;
`(c) interpreting the instructions for the purpose of collecting
`data for use in determining whether the resource is present
`on the computer system; and
`(d) determining, responsive to the collected data, whether the
`resource is present on the computer system.
`
`D. The ’683 Patent
`
`The ’683 Patent is titled “Two-phase Root Cause Analysis.” It was filed on April 22,
`
`2003, and issued on June 13, 2006. The ’683 Patent generally relates to a two-phase method to
`
`perform root-cause analysis over an enterprise-specific fault model. See ’683 Patent at Abstract.4
`
`The specification states that Figure 1 is a flowchart that illustrates an enterprise
`
`monitoring and analysis method in accordance with one embodiment of the invention.
`
`(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)
`4 The Abstract of the ’683 Patent follows:
`A two-phase method to perform root-cause analysis over an enterprise-specific
`fault model is described. In the first phase, an up-stream analysis is performed
`(beginning at a node generating an alarm event) to identify one or more nodes that
`may be in failure. In the second phase, a down-stream analysis is performed to
`identify those nodes in the enterprise whose operational condition are impacted by
`the prior determined failed nodes. Nodes identified as failed as a result of the up-
`stream analysis may be reported to a user as failed. Nodes identifies [sic] as
`impacted as a result of the down-stream analysis may be reported to a user as
`impacted and, beneficially, any failure alarms associated with those impacted
`nodes may be masked. Up-stream (phase 1) analysis is driven by inference
`policies associated with various nodes in the enterprise’s fault model. An
`inference policy is a rule, or set of rules, for inferring the status or condition of a
`fault model node based on the status or condition of the node’s immediately
`down-stream neighboring nodes. Similarly, down-stream (phase 2) analysis is
`driven by impact policies associated with various nodes in the enterprise’s fault
`model. An impact policy is a rule, or set of rules, for assessing the impact on a
`fault model node based on the status or condition of the node’s immediately up-
`stream neighboring nodes.(cid:3)
`
`Page 11 of 123(cid:3)
`(cid:3)
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 12 of 123 PageID #: 6490
`
`’683 Patent at Figure 1. Referring to FIG. 1, the specification discloses “a model based
`
`reasoning (MBR) approach 100 to enterprise monitoring and fault analysis in accordance with
`
`the invention uses a combination of up-stream analysis (based on the evaluation of inference
`
`policies) and down-stream analysis (based on the evaluation of impact policies) on an Impact
`
`Graph to efficiently and effectively identify and isolate root cause faults from the myriad of
`
`event notifications or alarms, many or most of which may be ‘sympathetic,’ that one or more
`
`underlying fault conditions may trigger.” Id. at 4:31–40. The specification adds that “[o]n event
`
`notification (block 105), an up-stream analysis of the Impact Graph beginning with the node
`
`receiving the event notification is performed (block 110).” Id. at 4:40–43. The specification
`
`states that an “[u]p-stream analysis in accordance with block 110 may modify the status value of
`
`zero or more nodes in the enterprise’s Impact Graph up-stream from the node receiving the event
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 12 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 13 of 123 PageID #: 6491
`
`notification.” Id. at 4:43–46. The specification describes the next step as “the furthest up-stream
`
`node (relative to the node receiving the initial event notification) whose status value was
`
`modified in accordance with block 110 is selected as a starting point from which a down-stream
`
`analysis is performed (block 115).” Id. at 4:46–50. The specification further states that “[d]own-
`
`stream analysis in accordance with block 115 may modify the impact value of zero or more
`
`nodes in the enterprise’s Impact Graph down-stream from the down-stream analysis’ starting
`
`node.” Id. at 4:50–53.
`
`The specification adds that “[o]ne of ordinary skill in the art will recognize that if there is
`
`more than one node equally distant from the node receiving the event notification and which has
`
`had its status value modified in accordance with block 110, an arbitrary one of these nodes may
`
`be selected to begin the down-stream analysis in accordance with block 115.” Id. at 4:53–59.
`
`The specification further states that “[w]ith up-stream and down-stream analysis completed
`
`enterprise status, including identification of one or more root-cause failures and identification of
`
`sympathetic event notifications, may be reported (block 120).” Id. at 4:60–63. The specification
`
`concludes that “those furthest up-stream nodes in the Impact Graph having a status value
`
`indicative of failure are identified as ‘root causes.’” Id. at 4:63–65.
`
`Claim 1 of the ’683 Patent is representative of the asserted claims and recites the
`
`following elements (disputed terms in italics):
`
`1. An enterprise fault analysis method, wherein at least a portion
`of the enterprise is represented by a enterprise-specific
`fault model having a plurality of nodes, comprising:
`receiving an event notification for a first node in the fault
`model;
`performing an up-stream analysis of the fault model beginning
`at the first node;
`identifying a second node, the second node having a status
`value modified during the up-stream analysis to indicate a
`failed status;
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 13 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 14 of 123 PageID #: 6492
`
`performing a down-stream analysis of the fault model beginning
`at the second node;
`identifying those nodes in a contiguous path between the second
`node and the first node in the fault model whose impact
`values indicate an impacted performance condition in
`accordance with the down-stream analysis;
`reporting the second node as a root cause of the received event
`notification; and
`reporting at least one of the identified nodes as impacted by the
`root cause of the received event notification and not as
`root causes of the received event notification.
`
`E. The ’093 Patent
`
`The ’093 Patent is titled “Method and System for Configuration Management Database
`
`Software License Compliance.” It was filed on December 9, 2009, and issued on February 4,
`
`2014. The ’093 Patent generally relates to a software license engine that allows an enterprise to
`
`model software license contracts and evaluate deployment of software for compliance with the
`
`software license contracts. See ’093 Patent at Abstract.5
`
`The specification states that Figure 2 is “a block diagram illustrating a system 200
`
`according to one embodiment with a Configuration Management Database (“CMDB”) server
`
`110 and a pair of clients 210 and 220.” Id. at 3:50–52.
`
`(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)
`5 The Abstract of the ’093 Patent follows:
`A software license engine allows an enterprise to model software license contracts
`and evaluate deployment of software for compliance with the software license
`contracts. Deployment of software products in the enterprise is modeled in a
`configuration management database. The software license engine maintains a
`license database for connecting software license contracts with software
`deployment modeled by the configuration management database. Users of the
`software license engine may use license types that are predefined in the software
`license engine or may define custom license types. The software license engine
`may indicate compliance or non-compliance with the software license contracts. (cid:3)
`Page 14 of 123(cid:3)
`(cid:3)
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 15 of 123 PageID #: 6493
`
`Id. at Figure 2. The specification states that “[t]he CMDB server 110 may comprises [sic] a
`
`number of software components, including a web services component 230 for interacting with a
`
`web client computer 210, and an Application Programming Interface (API) 240 for interacting
`
`with an application client computer 220.” Id. at 3:53–57. The specification further states that
`
`“[t]he application client computer 220 may be a computer running any application designed to
`
`interact with the CMDB server 110 through the API, including, for example, a desktop computer
`
`with a CMDB client application . . . that provides a graphical user interface (GUI) to the user of
`
`the client computer 220.” Id. at 3:57–65. The specification adds that “[t]he CMDB server 110
`
`also comprises a license engine 250” and “other software components for providing CMDB
`
`functionality as desired.” Id. at 3:66–4:3.
`
`The specification continues that “[d]ata for the CMDB server 110 is illustrated as stored
`
`in a CMDB datastore 260 and a license datastore 270.” Id. at 4:4–5. The specification states that
`
`“[t]he CMDB datastore 260 comprises the storage for the conventional CMDB data, including
`
`(cid:3)
`(cid:3)
`
`(cid:3)
`
`Page 15 of 123(cid:3)
`(cid:3)
`
`

`
`Case 2:14-cv-00903-JRG Document 131 Filed 08/13/15 Page 16 of 123 PageID #: 6494
`
`CIs [Configuration Item].” Id. at 4:5–7. The specification further states that “[t]he license
`
`datastore 270 provides storage for to model software contracts, including rules against which the
`
`CIs are evaluated for software license compliance and other information necessary for processing
`
`those rules.” Id. at 4:14–17.
`
`Claim 1 of the ‘093 Patent is representative of the asserted claims and recites the
`
`following elements (disputed terms in italics):
`
`1. A computer-implemented method, comprising:
`modeling deployment of a software product and a software
`license contract for the software product;
`st

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket