throbber
Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 1 of 37
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`ANCORA TECHNOLOGIES, INC.,
`
`Plaintiff,
`
`v.
`
`LG ELECTRONICS INC. and LG
`ELECTRONICS U.S.A., INC.,
`
`Defendants.
`
`CIVIL ACTION NO. 1:20-CV-0034
`
`JURY TRIAL DEMANDED
`
`ANCORA TECHNOLOGIES, INC.,
`
`CIVIL ACTION NO. 1:20-CV-0034
`
`Plaintiff,
`
`v.
`
`SAMSUNG ELECTRONICS CO., LTD., and
`SAMSUNG ELECTRONICS AMERICA,
`INC.,
`
`Defendants.
`
`JURY TRIAL DEMANDED
`
`PLAINTIFF’S RESPONSIVE CLAIM CONSTRUCTION BRIEF
`
`ANCORA Ex. 2013, Page 1
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 2 of 37
`
`TABLE OF CONTENTS
`
`I.
`
`INTRODUCTION ..................................................................................................................1
`
`II. DISPUTED CLAIM TERMS .................................................................................................2
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`“using an agent to set up a verification structure in the erasable, non-volatile
`memory of the BIOS” ...................................................................................................2
`
`“set up a verification structure” ....................................................................................9
`
`“non-volatile memory of the BIOS” ............................................................................13
`
`“verifying the program using at least the verification structure” ................................17
`
`“acting on the program according to the verification” .................................................18
`
`“license” (Claim 1 - Preamble) / “license record” .......................................................19
`
`The Order of the Claim 1 Steps ...................................................................................23
`
`“BIOS” .........................................................................................................................25
`
`“selecting a program residing in the volatile memory” ...............................................26
`
`10. “program” ....................................................................................................................27
`
`11. “volatile memory” ........................................................................................................28
`
`12. “first non-volatile memory area of the computer” .......................................................29
`
`III. CONCLUSION .....................................................................................................................30
`
`
`
`ANCORA Ex. 2013, Page 2
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 3 of 37
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`Absolute Software, Inc. v. Stealth Signal, Inc.,
`659 F.3d 1121 (Fed. Cir. 2011)................................................................................................11
`
`Ancora Techs., Inc. v. Apple, Inc. (“Apple II”),
`744 F.3d 732 (Fed. Cir. 2014)..................................................................................5, 16, 28, 29
`
`Ancora Techs., Inc. v. HTC Am., Inc.,
`908 F.3d 1343 (Fed. Cir. 2018)................................................................................................21
`
`Arctic Cat Inc. v. GEP Power Prod., Inc.,
`919 F.3d 1320 (Fed. Cir. 2019)................................................................................................20
`
`Astrazeneca LP v. Apotex, Inc.,
`633 F.3d 1042 (Fed. Cir. 2010)................................................................................................15
`
`Broadcom Corp. v. Emulex Corp.,
`732 F.3d 1325 (Fed. Cir. 2013)................................................................................................18
`
`Collaborative Agreements, LLC v. Adobe Sys. Inc.,
`2015 WL 2250391 (W.D. Tex. May 12, 2015) .........................................................................3
`
`Computer Docking Station Corp. v. Dell, Inc.,
`519 F.3d 1366 (Fed. Cir. 2008)................................................................................................14
`
`Cont’l Circuits LLC v. Intel Corp.,
`915 F.3d 788 (Fed. Cir. 2019)..................................................................................................13
`
`Digital Retail Apps, Inc. v. H-E-B, LP,
`2020 WL 376664 (W.D. Tex. Jan. 23, 2020) ............................................................................7
`
`E-Pass Techs., Inc. v. 3Com Corp.,
`343 F.3d 1364 (Fed. Cir. 2003)....................................................................................19, 20, 22
`
`Eolas Techs. Inc. v. Microsoft Corp.,
`399 F.3d 1325 (Fed. Cir. 2005)................................................................................................18
`
`Gemstar-TV Guide Int’l, Inc. v. Int’l Trade Comm’n,
`383 F.3d 1352 (Fed. Cir. 2004)................................................................................................14
`
`HTC Corp. v. Ancora Techs. Inc.,
`2017 WL 6032605 (Patent Tr. & App. Bd. Dec. 1, 2017) .......................................................21
`
`ANCORA Ex. 2013, Page 3
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 4 of 37
`
`HTC Corp. v. IPCom GmbH & Co., KG,
`667 F.3d 1270 (Fed. Cir. 2012)..................................................................................................9
`
`i4i Ltd. P’Ship v. Microsoft Corp.,
`598 F.3d 831 (Fed. Cir. 2010)....................................................................................................1
`
`InterDigital Commc’ns, LLC v. ITC,
`690 F.3d 1318 (Fed. Cir. 2012)................................................................................................11
`
`Interval Licensing LLC v. AOL, Inc.,
`766 F.3d 1364 (Fed. Cir. 2014)................................................................................................30
`
`Joao Control & Monitoring Sys., LLC v. Protect Am., Inc.,
`2015 WL 4937464 (W.D. Tex. Aug. 18, 2015) .........................................................................7
`
`Kaneka Corp. v. Xiamen Kingdomway Grp. Co.,
`790 F.3d 1298 (Fed. Cir. 2015)................................................................................................25
`
`Kroy IP Holdings, LLC v. Safeway, Inc.,
`2015 WL 3452050 (E.D. Tex. May 29, 2015) ...................................................................14, 16
`
`Linear Tech. Corp. v. Impala Linear Corp.,
`379 F.3d 1311 (Fed. Cir. 2004)..................................................................................................8
`
`Luminara Worldwide, LLC v. Liown Elecs. Co.,
`814 F.3d 1343 (Fed. Cir. 2016)................................................................................................11
`
`Nokia Sols. & Networks US LLC v. Huawei Techs. Co.,
`2017 WL 2226413 (E.D. Tex. May 19, 2017) .........................................................................27
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005)................................................................................................22
`
`Prowess, Inc. v. RaySearch Labs., AB,
`953 F. Supp. 2d 638 (D. Md. 2013) .........................................................................................27
`
`Samsung Elecs. Am., Inc. v. Prisua Eng’g Corp.,
`948 F.3d 1342 (Fed. Cir. 2020)..................................................................................................4
`
`Solvay S.A. v. Honeywell Int’l Inc.,
`742 F.3d 998 (Fed. Cir. 2014)..................................................................................................23
`
`Synchronoss Techs., Inc. v. Dropbox Inc.,
`2017 WL 6059302 (N.D. Cal. Dec. 7, 2017) .............................................................................7
`
`Techno View IP, Inc. v. Facebook Techs., LLC,
`2018 WL 6427874 (D. Del. Dec. 7, 2018).................................................................................9
`
`ANCORA Ex. 2013, Page 4
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 5 of 37
`
`TomTom, Inc. v. Adolph,
`790 F.3d 1315 (Fed. Cir. 2015)................................................................................................20
`
`Unwired Planet, LLC v. Apple Inc.,
`829 F.3d 1353 (Fed. Cir. 2016)................................................................................................13
`
`Verizon Calif. Inc. v. Ronald A. Katz Tech. Licensing, P.A.,
`326 F. Supp. 2d 1060 (C.D. Cal. 2003) .....................................................................................3
`
`VirnetX, Inc. v. Cisco Sys., Inc.,
`767 F.3d 1308 (Fed. Cir. 2014)..........................................................................................21, 26
`
`Vitronics Corp. v. Conceptronic, Inc.,
`90 F.3d 1576 (Fed. Cir. 1996)..................................................................................................11
`
`Williamson v. Citrix Online, LLC,
`792 F.3d 1339 (Fed. Cir. 2015)..................................................................................................7
`
`Zeroclick, LLC v. Apple Inc.,
`891 F.3d 1003 (Fed. Cir. 2018)........................................................................................ passim
`
`Statutes
`
`35 U.S.C. § 112 ...................................................................................................................... passim
`
`
`
`ANCORA Ex. 2013, Page 5
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 6 of 37
`
`I.
`
`INTRODUCTION
`
`Defendants’ attempt to convince the Court to adopt constructions at odds with the claims
`
`and the specification is premised on a number of fundamental errors. Two in particular stand out:
`
`(1) Defendants’ attempt to read limitations into the claim from embodiments the specification
`
`expressly describes as “non-limiting,” and (2) Defendants’ attempt to portray Ancora as taking a
`
`“shifting sands approach” and walking away from representations Defendants claim Ancora made
`
`either during prosecution or in other litigation. Defendants are wrong.
`
`As described below and in Ancora’s Opening Brief (Dkt. 44), Ancora’s constructions are
`
`taken directly from prior courts’ constructions and based on the plain meaning of each term as
`
`demonstrated by the entirety of the ’941 Patent. Further, Defendants’ “shifting sands” argument is
`
`a fiction, premised on statements plucked from the prosecution history that state the opposite of
`
`what Defendants argue—a reality demonstrated by the fact that many would render the invention
`
`inoperable. i4i Ltd. P’Ship v. Microsoft Corp., 598 F.3d 831, 843 (Fed. Cir. 2010) (stating that,
`
`“[i]n evaluating whether a patentee has disavowed claim scope, context matters” and one cannot
`
`just “pluck[]” statements “from the prosecution history”).
`
`Moreover, Ancora changed only three of the constructions it proposed in other litigations,
`
`and for good reason: in two cases (“program” and “volatile memory”), the Federal Circuit
`
`construed the term, and Ancora now has adopted the Federal Circuit’s construction. And in the
`
`third case (“selecting a program . . .”), Defendants explained that they understood Ancora’s prior
`
`construction to require a limitation that Ancora’s own prior briefing showed was never intended.
`
`In short, Ancora’s approach to claim construction is and remains the correct one, and its
`
`proposed constructions should be adopted. Because—as the Federal Circuit has explained—
`
`“context matters,” i4i Ltd., 598 F.3d at 843, Ancora addresses the specific flaws in Defendants’
`
`arguments below in the context of the specific terms and arguments to which they relate.
`
`ANCORA Ex. 2013, Page 6
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 7 of 37
`
`II.
`
`DISPUTED CLAIM TERMS
`
`Defendants have not addressed the 13 disputed terms and phrases in any discernable order.
`
`For the Court’s convenience, Ancora addresses those terms and phrases in the same order. Ancora
`
`also has noted below in super script the number corresponding to each Claim 1 term or phrase—
`
`underlining the disputed phrases and double-underlining/bolding the disputed terms:1
`
`1. A method of restricting software operation within a license for use with
`a computer[6] including an erasable, non-volatile memory area of a BIOS[8]
`of the computer, and a volatile memory[11] area; the method comprising the
`steps of:
`
`selecting a program[10] residing in the volatile memory;[9]
`
`using an agent to set up a verification structure in the erasable, non-
`volatile memory of the BIOS,[1, 2, 3, 8] the verification structure
`accommodating data that includes at least one license record,[6]
`
`verifying the program using at least the verification structure[4] from the
`erasable non-volatile memory of the BIOS,[8] and
`
`acting on the program according to the verification.[5]
`
`1. “using an agent to set up a verification structure in the erasable, non-volatile
`memory of the BIOS” (Claims 1, 3, 7, 14)
`
`Ancora’s Construction
`
`Defendants’ Construction
`
`plain and ordinary meaning
`
`“agent” means “a software
`program or routine”
`
`This limitation is a means plus function limitation governed
`by pre-AIA 35 U.S.C. § 112 ¶ 6.
`
`Function: “set up a verification structure in the erasable,
`non-volatile memory of the BIOS”
`
`Structure: Algorithm found at 6:18-28; if not, indefinite due
`to a lack of corresponding structure.
`
`
`As Ancora explained in its Opening Brief at pages 17-21, the crux of the parties’ dispute
`
`is whether “agent” is a nonce word such that 35 U.S.C. § 112 ¶ 6 applies. As explained, it is not.
`
`As used in the ’941 Patent, the term “agent” was well understood to refer to “a software
`
`1 Unless otherwise noted, any emphasis in this brief has been added.
`
`Further, Ancora Exhibits 1-17 are attached to Ancora’s Opening Brief at Dkt. 44. Ancora Exhibits
`18-23 are attached to the Second Declaration of Steve Seigel filed contemporaneously with this
`brief. Defendants’ Exhibits 1-24 are attached to their Opening Brief filed at Dkt. 45.
`
`ANCORA Ex. 2013, Page 7
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 8 of 37
`
`program or routine.” Indeed, the Examiner volunteered that he understood “agent” to be
`
`synonymous with a software “program.” Ancora Ex. 4 at ANCORA_426-27, -428. Nothing more
`
`is needed to show that § 112 ¶ 6 does not apply. Zeroclick, LLC v. Apple Inc., 891 F.3d 1003, 1008
`
`(Fed. Cir. 2018) (holding that court erred in treating “‘program’ and ‘user interface code’ as nonce
`
`words”); Collaborative Agreements, LLC v. Adobe Sys. Inc., 2015 WL 2250391, at *13 (W.D.
`
`Tex. May 12, 2015) (“Courts have consistently interpreted ‘software’ and similar terms to have
`
`sufficient structure so as to avoid an invocation of Section 112 ¶ 6.”).
`
`But more exists. The specification and prosecution history detail both what the recited
`
`software “agent” does and how it does it, including at least at 1:60-2:1, 3:51-61, and (as Defendants
`
`admit) 6:18-28. These disclosures further show that “agent” connotes sufficient structure to avoid
`
`§ 112 ¶ 6. Zeroclick, 891 F.3d at 1008 (looking to specification and other disclosures as further
`
`showing court erred in treating “‘program’ and ‘user interface code’ as nonce words”); see Verizon
`
`Calif. Inc. v. Ronald A. Katz Tech. Licensing, P.A., 326 F. Supp. 2d 1060, 1106 (C.D. Cal. 2003)
`
`(“[A]s Verizon itself concedes, ‘interface unit’ connotes some structure. Therefore, ‘[i]n the
`
`absence of any more compelling evidence of the understanding of one of ordinary skill in the art,
`
`the presumption that § 112, ¶ 6 does not apply is determinative.’” (citation omitted)).
`
`In response, Defendants go all-in on the argument that the term nevertheless is subject to
`
`§ 112 ¶ 6 because—according to Defendants—the patentee purportedly portrayed an “agent” as
`
`“a concept hitherto unknown in the prior art” during prosecution. Defs. Br. at 3. Defendants also
`
`rely on their expert’s opinion that a POSITA purportedly would not understand what an agent was.
`
`Id. at 7. Both assertions are demonstrably untrue. As explained below, not only did the patentee
`
`never claim that an “agent” was a novel concept, but Defendants’ expert relied on the term “agent”
`
`in his own pre-filing academic research papers—showing that, before he had an incentive to claim
`
`ANCORA Ex. 2013, Page 8
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 9 of 37
`
`otherwise, he knew exactly what “agent” meant (just as the Examiner or any POSITA would).
`
`Because “agent” is not a nonce word, § 112 ¶ 6 does not apply.
`
`i) As Used in the ’941 Patent, “Agent” Is Not a Nonce Word
`
`Defendants’ “nonce” word argument is incorrect for at least three reasons.
`
`a. The Intrinsic Record Shows That Agent Was an Understood Term.
`
`There is a reason that Defendants cite literally nothing (in the prosecution history or
`
`otherwise) supporting their assertion that the patentee purportedly represented that an “agent” was
`
`“a novel concept” that was “hitherto unknown in the prior art.” Defs. Br. at 5. No support exists.
`
`Not only did the patentee never represent that an “agent” was a new concept, but the file
`
`history plainly shows that both the applicant and the Examiner knew exactly what an agent was.
`
`In fact, the Examiner expressly defined the term to refer to a software “program,” including
`
`routines that were encompassed within a larger “software application.” Ancora Ex. 4 at
`
`ANCORA_426-27 (“Misra et al. also teach encryption keys and programs (‘agent’) used in the
`
`license collation process . . . .”); id. at -428 (“Smith et al. teach a system for distributing, registering
`
`and purchasing software . . . using an agent program embedded in each software application.”).
`
`Contemporaneous technical dictionaries further confirm this reality. Ancora Br. at 19 n.3.
`
`Indeed, even Defendants admit that “agent” is a defined term.
`
`Defendants nevertheless argue that “agent” is a nonce word because the definitions
`
`purportedly are too “disparate”—pointing to the fact that a single dictionary states that an “agent”
`
`may be “software or hardware.” Defs. Br. at 7 (citing DICTIONARY OF COMPUTING (1996) (Defs.
`
`Ex. 24)). But perfect uniformity is not required. All that is required is “that the term, as the name
`
`for structure, has a reasonably well understood meaning in the art.” Zeroclick, 891 F.3d at 1007
`
`(citation omitted); Samsung Elecs. Am., Inc. v. Prisua Eng’g Corp., 948 F.3d 1342, 1353-54 (Fed.
`
`Cir. 2020) (finding presumption not overcome where “the digital processing unit recited in the
`
`ANCORA Ex. 2013, Page 9
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 10 of 37
`
`claims is ‘an image processing device that people in the art are generally familiar with’”).
`
`Further, the point is moot here in any case because the ’941 Patent’s record makes clear
`
`that its claimed “agent” is software only. Zeroclick, 891 F.3d at 1008 (looking to the intrinsic
`
`record to understand scope of the term). Indeed, the Federal Circuit recognized that the “inventors
`
`stated that their method makes use of the existing computer hardware (eliminating the expense and
`
`inconvenience of using additional hardware).” Ancora Techs., Inc. v. Apple, Inc., 744 F.3d 732,
`
`735-36 (Fed. Cir. 2014) (“Apple II”).
`
`Specifically, among other disclosures, in support of their amendment adding “agent” to
`
`Claim 1, the patentee submitted to the Examiner a 2001 White Paper authored by one of the
`
`inventors (Miki Mullor) titled Hardware Stamping™ Technology Overview White Paper (the
`
`“Beeble White Paper”). Ancora Ex. 19 (Nov. 14, 2001 Remarks Made in Amendment) at
`
`ANCORA_374 (“As requested by the Examiner during the interview, a description of a specific
`
`embodiment of the invention is attached hereto.”). That paper explained both (1) how “[i]n order
`
`for a user to access the BIOS EEPROM[,] proprietary software” needed to be developed, and (2)
`
`how Beeble (the original owner of the patent) thus had created an OS-level software agent called
`
`a “Beeble driver” or “Kernel mode driver” that—as the patent claims—could be used to set up the
`
`verification structure in the BIOS. See Ancora Ex. 18 (Beeble White Paper) at ANCORA_278.
`
`Further, the Beeble Paper also described how specific E2PROM manipulation commands
`
`(including “DMI Function 52h”) could be used to write to BIOS—explaining:
`
`Beeble will attempt to write license data by utilizing the [Desktop
`Management Interface] Function 52h[2], which is designed to write DMI
`structures to EEPROM. If BIOS manufactures do not support DMI function
`52h, then Beeble will write to a [sic] EEPROM generically.
`
`[2] SMBIOS Reference Specifications, Version 2.2, 16 March 1998, page 11
`
`Id. Further, it explained how the recited technique was to be “accomplished through software”
`
`ANCORA Ex. 2013, Page 10
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 11 of 37
`
`such that it “does not require any additional hardware to be added to the PC.” Id. at ANCORA_275.
`
`And, to be clear, this disclosure was not new. The specification already taught how “the
`
`data in the second non-volatile memory may optionally be erased or modified (using E2PROM
`
`manipulation commands).” ’941 Patent at 2:1-6; id. at 3:4-9 (explaining that an “advantage in
`
`utilizing non-volatile memory such as that residing in the BIOS is that the required level of system
`
`programming expertise that is necessary to intercept or modify commands, interacting with the
`
`BIOS, is substantially higher than those needed for tampering with [other] data”).
`
`Such evidence is more than sufficient to show that—as used in the ’941 Patent—“agent”
`
`would have been understood to refer to sufficiently definite structure. Zeroclick, 891 F.3d at 1007.
`
`b. Defendants’ Expert Testimony Is Not Credible.
`
`The Court also should reject Defendants’ reliance on their expert’s opinion that a POSITA
`
`“would not understand the term ‘agent’ to connote sufficient structure.” Defs. Br. at 7. Not only is
`
`such testimony at odds with the testimony of Mr. Jestice, but—contrary to his testimony in this
`
`matter—Dr. Zadok used the term “agent” in his own academic pre-filing research papers.
`
`For example, in a July 1994 paper titled PGMAKE: A Portable Distributed Make System,
`
`he described a software program that includes “agent-daemons,” which “serve[] as an agent”
`
`because they “assist[] the remote [daemon] to fork a job, collect its status and output, and return it
`
`back to [the make utility].” Ancora Ex. 20 at 2. Similarly, in his 2006 On Incremental File System
`
`Development paper (Ancora Ex. 21 at 3), Dr. Zadok cited as an example of OS-level extensions
`
`“The Interposition Agents toolkit [Jones 1993],” which defines an “agent” as “a program.” Ancora
`
`Ex. 22 at 1. Given these references, it simply is not credible for Dr. Zadok to testify that “‘agent’
`
`is a nonce word [that] does not provide any indication of structure.” Defs. Mot. at 7.
`
`c. Defendants’ Cases Do Not Support Their Position.
`
`Finally, none of the case law Defendants cite supports their nonce-word argument.
`
`ANCORA Ex. 2013, Page 11
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 12 of 37
`
`In Synchronoss Techs., Inc. v. Dropbox Inc., the court held that the record in that case
`
`supported construing “synchronization agent” to refer to “hardware or software.” 2017 WL
`
`6059302, *9-*11 (N.D. Cal. Dec. 7, 2017). This is a key distinction. Terms that refer to software
`
`or hardware generally are considered to be nonce words. Williamson v. Citrix Online, LLC, 792
`
`F.3d 1339, 1350 (Fed. Cir. 2015) (holding that “module” was a nonce word because it referred
`
`generically to “software or hardware”). In contrast, terms that refer solely to software have not.
`
`Zeroclick, 891 F.3d at 1008. And here, as explained above, “agent” refers solely to software.
`
`Similarly, in Digital Retail Apps, Inc. v. H-E-B, LP, 2020 WL 376664, at *4 (W.D. Tex.
`
`Jan. 23, 2020), this Court found that Williamson applied and demonstrated that the term
`
`“communications module” was a nonce term. In reaching that conclusion, the Court explained
`
`that—“although software can serve as a corresponding structure”—the patent and other intrinsic
`
`evidence “provides no specific details concerning the ‘first communication module,’ such as what
`
`type of communication it undertakes or how the module is implemented.” Id. at *4-6. In short, this
`
`Court emphasized the absence of the very disclosures that are present here: the disclosures at 1:60-
`
`2:1, 3:51-61, and 6:18-28, the “Beeble White Paper,” and the dictionary definitions.
`
`Finally, it is unclear why Defendants cite Joao Control & Monitoring Sys., LLC v. Protect
`
`Am., Inc., 2015 WL 4937464, at *7 (W.D. Tex. Aug. 18, 2015). There, the court held that the terms
`
`“intelligent agent,” “mobile agent,” and “software agent” were indefinite because the intrinsic
`
`evidence contained “directly contradict[ory]” descriptions of the terms and there was nothing in
`
`the specification to which a POSITA could turn to resolve to discern the “contours of [such] ‘agent’
`
`terms with any degree of reasonable certainty.” Id. Defendants concede that is not the case here.
`
`ii) The Intrinsic Evidence Confirm That “Agent” Provides Structure.
`
`Defendants next claim that the intrinsic record proves that “agent” is a nonce word
`
`because—according to Defendants—(1) independent Claim 18 (which is not asserted in this
`
`ANCORA Ex. 2013, Page 12
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 13 of 37
`
`action) recites additional actions that, in some embodiments, an “agent” must perform and (2) as
`
`originally drafted, Claim 1 did not disclose the necessary hardware to “add, remove and modify a
`
`license record” in the BIOS Memory. Defs. Br. at 9. Neither argument is persuasive.
`
`Defendants cite nothing to support their first position. Nor do they explain how the need
`
`for one or more agents capable of performing the Claim 18 operations shows that the more limited
`
`Claim 1 embodiment must be a means-plus-function term., The opposite is true: simpler claims
`
`require simpler disclosures. See Zeroclick, 891 F.3d at 1008 (relying on the fact that “[t]he basic
`
`concept behind both of the patents-in-suit is relatively simple” to hold that the terms “program”
`
`and “user interface code . . . are used not as generic terms or black box recitations”).
`
`Regarding Defendants’ second argument, Defendants misunderstand the reason “agent”
`
`was added to the claims. Contrary to what Defendants argue, “agent” was not added to provide
`
`previously missing hardware. It was added to exclude the need for additional hardware. This is
`
`clear from the file history, which shows that—after the Examiner issued the notice Defendants
`
`cite—the applicant spoke to the Examiner and explained the specified operation was performed
`
`solely by software. Ancora Ex. 6 (Nov. 9, 2001 Interview Summ.). After the interview, the
`
`applicant thus amended the claims to include the word “agent” to refer to such software and
`
`submitted the Beeble White Paper to provide further detail regarding how the software could
`
`operate. Ancora Ex. 19 (Nov. 14, 2001 Remarks Made in Amendment) at ANCORA_347.
`
`In short, even though the term “agent” standing alone connotes sufficient structure, the
`
`specification and prosecution history further clarify that this “agent” must perform a specific
`
`operation (set up of a verification structure in BIOS memory) and even provides an exemplary
`
`example of how it can perform that operation (using E2PROM manipulation commands). Nothing
`
`more is needed to avoid § 112 ¶ 6. Linear Tech. Corp. v. Impala Linear Corp., 379 F.3d 1311
`
`ANCORA Ex. 2013, Page 13
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 14 of 37
`
`(Fed. Cir. 2004) (relying on the fact that the “term ‘circuit’ [wa]s coupled with a description of the
`
`circuit’s operation” to conclude that “sufficient structural meaning generally will be conveyed to
`
`persons of ordinary skill in the art, and § 112 ¶ 6 presumptively will not apply”); see Zeroclick,
`
`891 F.3d at 1008 (holding that “the mere fact that the disputed limitations incorporate functional
`
`language does not automatically convert the words into means for performing such functions”—
`
`explaining “[m]any devices take their names from the functions they perform” (citation omitted)).
`
`Techno View IP, Inc. v. Facebook Techs., LLC, 2018 WL 6427874 (D. Del. Dec. 7, 2018),
`
`does not dictate a different result. Contrary to Defendants’ portrayal, the court held that § 112 ¶ 6
`
`categorically does not apply to method claims unless (a) the word “means” is used, or (b) a
`
`“structural limitation clearly constitutes the point of novelty,” in which case the accused infringer
`
`must still rebut the presumption that § 112 ¶ 6 does not apply. Id.; see id. at *6-8 (holding that
`
`“processor” in steps performed “with a processor” did not invoke § 112 ¶ 6).
`
`iii) At a Minimum, Defendants’ Structure Is Incomplete.
`
`Even if this term is subject to § 112 ¶ 6, Defendants’ construction still would be incomplete
`
`because it fails to account for the alternative disclosures at 1:60-2:1 and 3:51-61. Thus, at a
`
`minimum, Defendants’ proposed means-plus-function construction should be amended to permit
`
`the “[a]lgorithm found at 1:60-2:1, 3:51-61, and/or 6:18-28, or their equivalents.” HTC Corp. v.
`
`IPCom GmbH & Co., KG, 667 F.3d 1270, 1278 (Fed. Cir. 2012) (explaining that, “[w]hen a
`
`patentee invokes such ‘means-plus-function’ claiming, the ‘claim shall be construed to cover the
`
`corresponding structure, material, or acts described in the specification and equivalents thereof’”).
`
`2. “set up a verification structure” (Claims 1, 3, 7, 14)
`
`Ancora’s Construction
`
`Defendants’ Construction
`
`plain and ordinary meaning
`
`
`
`“forming a structure by encrypting a license record
`using a pseudo-unique key for each computer”
`
`ANCORA Ex. 2013, Page 14
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 15 of 37
`
`Defendants’ amended construction of this term2 should be rejected because it (1) misstates
`
`the specification and would read out express distinctions between independent and dependent
`
`claims; and (2) is premised on a fundamental mischaracterization of the prosecution history.
`
`First, contrary to what Defendants suggest, the specification never limits the invention in
`
`this manner. The “Summary of Invention” states only that “[t]he present invention relates to a
`
`method of restricting software operation within a license limitation.” ’941 Patent at 1:39-40. And
`
`the next sentence states only that this method “strongly relies on the use of a key.” Id. at 1:40-41.
`
`The specification never states that the “present invention” (much less this limitation) requires
`
`“forming a structure by encrypting a license record using a pseudo-unique key for each computer.”
`
`The remaining portions of the specification Defendants cite only further support Ancora’s
`
`position. The teaching at 1:62-65 that the verification structure “is implemented by encrypting the
`
`license record (or portion thereof) using said key (or portion thereof) exclusively or in conjunction
`
`with other identification information)” is expressly described as “a specific non-limiting example.”
`
`Id. at 1:44-45. Similarly, the disclosure at 6:18-28 likewise is expressly described as a portion of
`
`“the sequence of operations performed according to one embodiment of the invention.”
`
`In fact, the portions of the specification Defendants emphasize on page 11 of their opening
`
`brief itself shows why Defendants construction is wrong. As Defendants’ quoted text
`
`demonstrates, even in the FIG. 2 embodiment, the specification expressly permits the “setting up”
`
`step to be satisfied by actions other than “encrypting a license record using a pseudo-unique key,”
`
`including “establishing or certifying the existence of a pseudo unique key in the first non-volatile
`
`memory area.” ’941 Patent at 6:18-28. Thus, even if the specification contained the “present
`
`2 Defendants previously proposed construing this term to mean “forming a verification structure
`using a unique key for each computer and license record information in the program.” Ancora
`addressed that prior construction in its Opening Brief.
`
`ANCORA Ex. 2013, Page 15
`
`

`

`Case 1:20-cv-00034-ADA Document 50 Filed 04/10/20 Page 16 of 37
`
`invention” language Defendants contend, because the specification “does not uniformly refer to
`
`[Defendants’ limitation] as being co-extensive with the entire i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket