throbber
Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 1 of 60 PageID #: 4370
`
`UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`IN RE: TAASERA LICENSING LLC,
`PATENT LITIGATION
`
`THIS DOCUMENT RELATES TO ALL
`CASES
`
`CIVIL ACTION NO. 2:22-MD-03042-JRG
`
`JURY TRIAL DEMANDED
`
`DEFENDANTS CHECK POINT SOFTWARE TECHNOLOGIES LTD., TREND
`MICRO INC., FORTINET, INC., MUSARUBRA US LLC, D/B/A TRELLIX, PALO
`ALTO NETWORKS, INC., AND CROWDSTRIKE, INC. AND CROWDSTRIKE
`HOLDINGS, INC.’S RESPONSIVE CLAIM CONSTRUCTION BRIEF
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 1
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 2 of 60 PageID #: 4371
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`
`Page
`
`Level of Ordinary Skill in the Art ....................................................................................................1
`
`U.S. Patent No. 6,842,796................................................................................................................1
`
`1.
`
`“regular expression”/”regularly identifiable expression” (‘796 Patent, 1,
`12, 23-25) ................................................................................................................ 1
`
`U.S. Patent No. 7,673,137................................................................................................................3
`
`2.
`
`3.
`
`“if the new program is validated, permitting the new program to continue
`loading and to execute in connection with the computing device” (‘137
`Patent, 6, 13, 14, 24) ............................................................................................... 3
`
`“an execution module coupled to the detection module and operable for
`monitoring, at the operating system kernel of the computing device, the
`program in response to the trigger intercepted by the detection module”
`(‘137 Patent, Cl. 1) .................................................................................................. 5
`
`U.S. Patent No. 8,127,356................................................................................................................7
`
`4.
`
`“network administration traffic” (‘356 Patent Cls. 1, 2, 9, 10, 13, 14, 17,
`18) “[third/fourth] program instructions to determine if the packet is
`network administration traffic” (‘356 Patent Cls. 1, 9, 10, 13, 17) ........................ 7
`
`A.
`
`B.
`
`The ‘356 Patent does not disclose “adequate” structure for the claimed
`function. ...................................................................................................... 7
`
`The term “network administration traffic” is also indefinite because it does
`not have a reasonably certain meaning to a POSITA. ................................ 9
`
`U.S. Patent Nos. 8,327,441, 8,990,948, and 9,092,616 .................................................................10
`
`5.
`
`6.
`
`7.
`
`8.
`
`“attestation” (‘441 Patent Cls. 1, 2, 3, 5, 7; ‘616 Patent Cl. 1) ............................. 10
`
`“runtime” (‘616 Patent Cl. 1); “at runtime” (‘616 Patent Cl. 1) ........................... 11
`
`“a computing platform comprising a network trust agent” (‘616 Patent Cl.
`1) ........................................................................................................................... 13
`
`“receiving … a runtime execution context indicating attributes of the
`application at runtime, wherein the attributes comprise one or more
`executable file binaries of the application and loaded components of the
`application” (‘441 Patent Cls. 1, 4) ....................................................................... 14
`
`i
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 2
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 3 of 60 PageID #: 4372
`
`
`
`
`
`
`
`
`9.
`
`“a security context providing security information about the application”
`(‘441 Patent Cls. 1, 4, 5) ....................................................................................... 16
`
`10.
`
`“an application artifact” (‘441 Patent Cl. 2) ......................................................... 18
`
`11.
`
`“introspective security context” (‘441 Patent Cls. 4, 5) ........................................ 19
`
`12.
`
`20.
`
`“the application of the restriction of the user’s transaction” (‘441 Patent
`Cl. 11) ................................................................................................................... 20
`
`“which includes a network analyzer, an integrity processor, an event
`correlation matrix, a risk correlation matrix, and a trust supervisor” (‘948
`Patent Cl. 1) .......................................................................................................... 21
`
`21.
`
`“operational integrity of the application” (‘948 Patent Cl. 1) ............................... 21
`
`22.
`
`“an event correlation matrix” (‘948 Patent, Cl. 1) ................................................ 23
`
`23.
`
`“a risk correlation matrix” (‘948 Patent, Cl. 1) .................................................... 25
`
`24.
`
`“correlating, by the event and risk correlation matrix” (‘948 Patent Cl. 1) .......... 26
`
`19.
`
`“real-time” / “real time” (‘948 Patent, Cls. 1, 2) .................................................. 27
`
`U.S. Patent No. 9,071,518..............................................................................................................29
`
`19.
`
`27.
`
`“substantially real time”/ “substantially real-time data” (‘518 Patent Cls. 1,
`10, 17) ................................................................................................................... 30
`
`“initiating... at least one action”/”initiate an action” (‘518 Patent Cls. 1,
`10, 17) ................................................................................................................... 32
`
`U.S. Patent Nos. 8,819,419, 9,118,634, 9,628,453, and 9,860,251 ...............................................34
`
`13.
`
`14.
`
`15.
`
`“return URL” (‘419 Patent Cls. 1, 3, 4, 6, 7, 9, 10, 12, 13, 15, 16, 19; ‘634
`Patent Cls. 1, 3, 4, 5, 6, 8; ‘251 Patent Cls. 1-6, 8-10; ‘453 Patent Cls. 1, 5,
`6, 10-12, 16-18)..................................................................................................... 35
`
`“evaluating[, by the computer,] the URL to determine whether encryption
`of [none, part, or all of] the URL is required” (‘419 Patent Cls. 1, 4, 10,
`13; ‘634 Patent Cls. 1, 4) ...................................................................................... 36
`
`“determining whether encryption of none, part, or all of a return URL of
`the requested resource that is to be returned to a location of the resource
`request” (‘419 Patent Cl. 10) ................................................................................ 39
`
`16.
`
`“determining[, by the computer,] whether the URL of the requested
`resource is required” (‘419 Patent Cls. 2, 11; ‘634 Patent Cl. 2) .......................... 40
`
`
`
`ii
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 3
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 4 of 60 PageID #: 4373
`
`
`
`
`
`
`
`
`U.S. Patent No. 8,955,038, 9,608,997, and 9,923,918 ...................................................................41
`
`17.
`
`18.
`
`“compliance state of the endpoint” (‘038 Patent Cls. 1, 12, 23; ‘997 Patent
`Cls. 1, 11, 21; ‘918 Patent Cls. 1, 9, 17) ............................................................... 42
`
`“compliance polic[y/ies]” (‘038 Patent Cls. 1, 12, 23; ‘997 Patent Cls. 1,
`11, 21; ‘918 Patent Cls. 1, 9, 17) .......................................................................... 44
`
`
`
`
`
`
`
`
`
`
`iii
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 4
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 5 of 60 PageID #: 4374
`
`
`
`
`Federal Cases
`
`
`
`
`
`TABLE OF AUTHORITIES
`
`Barkan Wireless IP Holdings, L.P. v. Samsung Elecs. Co., No. 2:18-CV-28-JRG,
`2019 U.S. Dist. LEXIS 20394 (E.D. Tex. Feb. 7, 2019) .........................................................18
`
`Berkheimer v. HP Inc., 881 F.3d 1360 (Fed. Cir. 2018) ................................................................31
`
`Blackboard, Inc. v. Desire2Learn, Inc., 574 F.3d 1371 (Fed. Cir. 2009) ........................................6
`
`Bos. Sci. Scimed, Inc. v. Cordis Corp., 554 F.3d 982 (Fed. Cir. 2009) .........................................34
`
`Bushnell Hawthorne, LLC v. Cisco Sys., Inc., 813 F. App’x 522, 525-527 (Fed.
`Cir. 2020) .................................................................................................................................20
`
`CBT Flint Partners, LLC v. Return Path, Inc., 654 F.3d 1353 (Fed. Cir. 2011) ...........................40
`
`Clear Imaging Rsch., LLC v. Samsung Elecs. Co., 2020 WL 6384731 (E.D. Tex.
`Oct. 30, 2020) ..........................................................................................................................31
`
`Grp. One, Ltd. v. Hallmark Cards, Inc., 407 F.3d 1297 (Fed. Cir. 2005) .....................................27
`
`Hologic, Inc. v. SenoRx, Inc., 639 F.3d 1329 (Fed. Cir. 2011) ......................................................33
`
`Indacon, Inc. v. Facebook, Inc., 824 F.3d 1352 (Fed. Cir 2016) ............................ 16, 18-19, 24-25
`
`Intel Corp. v. Qualcomm Inc., 21 F.4th 784 (Fed. Cir. 2021) .........................................................2
`
`Interval Licensing LLC v. AOL, Inc., 766 F.3d 1364 (Fed. Cir. 2014) ..........................................26
`
`Irdeto Access, Inc. v. Echostar Satellite Corp., 383 F.3d 1295 (Fed. Cir. 2004) ... 14-15, 18-19, 23
`
`Liberty Ammunition, Inc. v. United States, 835 F.3d 1388 (Fed. Cir. 2016) ...................................5
`
`Lucent Tech., Inc. v. Gateway, Inc., 525 F.3d 1200 (Fed. Cir. 2008) ............................................27
`
`Merck & Co. v. Teva Pharmaceuticals USA, Inc., 395 F.3d 1364, 1372 (Fed. Cir.
`2005) ........................................................................................................................... 12, 31-32
`
`Mobile Telecommunications Technologies, LLC v. Google Inc., No. 2:16-cv-2-
`JRG-RSP, 2016 WL 7338398 (E.D. Tex. Dec. 19, 2016) .......................................................13
`
`Nautilus, Inc. v. Biosig Instruments, Inc., 572 U.S. 898 (2014) ............................14, 19, 21, 26, 31
`
`Novo Indus., L.P. v. Micro Molds Corp., 350 F.3d 1348 (Fed. Cir. 2003) ..............................20, 27
`
`Nystrom v. Trex Co., 424 F.3d 1136 (Fed. Cir. 2005) ...................................................................18
`
`
`
`iv
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 5
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 6 of 60 PageID #: 4375
`
`
`
`
`
`
`
`
`O2 Micro Int’l. v. Beyond Innovation Tech. Co., 521 F.3d 1351 (Fed. Cir. 2008) .......................37
`
`Oatey Co. v. IPS Corp., 514 F.3d 1271 (Fed. Cir. 2008)............................................................. 8-9
`
`Omega Eng’g, Inc, v. Raytek Corp., 334 F.3d 1314 (Fed. Cir. 2003) ......................................... 8-9
`
`Pavo Sols. LLC v. Kingston Tech. Co., Inc., 35 F.4th 1367 (Fed. Cir. 2022) ..........................40, 42
`
`Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc) ...........................................2, 16
`
`Renishaw PLC v. Marposs Societa’, 158 F.3d 1243 (Fed. Cir. 1998) ...........................................29
`
`SIMO Holdings Inc. v. Hong Kong uCloudlink Network Tech. Ltd., 983 F.3d 1367
`(Fed. Cir. 2021) ........................................................................................................................13
`
`SpeedTrack, Inc. v. Amazon.com, 998 F.3d 1373 (Fed. Cir. 2021) ...............................................33
`
`Teleflex, Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313 (Fed. Cir. 2002) ...........................................3
`
`Ultravision Techs., LLC v. Holophane Eur. Ltd, 2020 WL 6271231 (E.D. Tex.
`Oct. 26, 2020) ..........................................................................................................................32
`
`Vehicle IP, LLC v. Cellco P’ship, 757 Fed. Appx. 954 (Fed. Cir. Jan. 22, 2019) ...................19, 24
`
`Williamson v. Citrix Online, LLC, 792 F.3d 1339 (Fed. Cir. 2015) ................................................7
`
`Federal Statutes
`
`35 U.S.C. § 112, ¶ 6 ..................................................................................................................... 5-9
`
`
`
`
`
`
`
`
`
`v
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 6
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 7 of 60 PageID #: 4376
`
`
`
`
`
`
`
`
`TABLE OF EXHIBITS AND ABBREVIATIONS
`
`Ex. #1
`
`Document/Exhibit Description (Abbreviation)
`
`
`
`A
`
`B
`
`C
`
`D
`
`E
`
`F
`
`G
`
`H
`
`I
`
`J
`
`K
`
`L
`
`M
`
`N
`
`O
`
`P
`
`Q
`
`R
`
`1
`
`2
`
`3
`
`4
`
`Taasera Licensing LLC’s Opening Claim Construction Brief, Dkt. 256 (“Br.”)
`
`U.S. Patent No. 6,842,796, Dkt. 256-2 (the “‘796 Patent”)
`
`U.S. Patent No. 7,673,137, Dkt. 256-3 (the “‘137 Patent”)
`
`U.S. Patent No. 8,127,356, Dkt. 256-4 (the “‘356 Patent”)
`
`U.S. Patent No. 8,327,441, Dkt. 256-5 (the “‘441 Patent”)
`
`U.S. Patent No. 8,819,419, Dkt. 256-6 (the “‘419 Patent”)
`
`U.S. Patent No. 8,850,517, Dkt. 256-7 (the “‘517 Patent”)
`
`U.S. Patent No. 8,955,038, Dkt. 256-8 (the “‘038 Patent”)
`
`U.S. Patent No. 8,990,948, Dkt. 256-9 (the “‘948 Patent”)
`
`U.S. Patent No. 9,071,518, Dkt. 256-10 (the “‘518 Patent”)
`
`U.S. Patent No. 9,092,616, Dkt. 256-11 (the “‘616 Patent”)
`
`U.S. Patent No. 9,118,634, Dkt. 256-12 (the “‘634 Patent”)
`
`U.S. Patent No. 9,608,997, Dkt. 256-13 (the “‘997 Patent”)
`
`U.S. Patent No. 9,628,453, Dkt. 256-14 (the “‘453 Patent”)
`
`U.S. Patent No. 9,860,251, Dkt. 256-15 (the “‘251 Patent”)
`
`U.S. Patent No. 9,923,918, Dkt. 256-16 (the “‘918 Patent”)
`
`Declaration of Dr. Eric Cole Regarding Claim Construction, Dkt. 256-17 (“Cole
`Decl.)
`
`Declaration of John R. Black Jr. Regarding Claim Construction, Dkt. 256-18
`(“Black Decl.)
`
`Declaration of Dr. Aviel D. Rubin with Regard to Certain Claim Terms of U.S.
`Patent Nos. 8,990,948, 9,092,616 and 9,071,518, Dkt. 256-25 (“Rubin Decl.”)
`Excerpt from Dictionary of Computer and Internet Terms (Vol. 1) (2016), DEFS-
`TAASERA-PA_0037286 - TAASERA-PA_0037290.
`Excerpt from Attestation and Trusted Computing (2006), TAASERA-
`PA_0037276 - TAASERA-PA_0037285.
`Excerpt from ‘616 Patent File History, Response to Office Action (April 14, 2014)
`(TAASERA-0001570-1586).
`Excerpt from Computer Graphics Dictionary (2002), DEFS-TAASERA-
`PA_0037298 - TAASERA-PA_0037300.
`
`
`1The exhibit numbers identified herein are to the existing exhibit numbers used within Taasera
`Licensing LLC’s Opening Claim Construction Brief (Dkt. 256) (Exs. A-R, Q-1 to Q-6, R-1 to R-
`3) and to new exhibit numbers used herein Defendants’ Responsive Claim Construction Brief.
`
`
`
`vi
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 7
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 8 of 60 PageID #: 4377
`
`
`
`
`
`
`
`
`
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`Excerpt from Concise Oxford English Dictionary, 12th Ed. (2011), DEFS-
`TAASERA-PA_0037301 - TAASERA-PA_0037303.
`Excerpt from ‘518 Patent File History, May 19, 2014 Response to Office Action.
`
`Excerpt from ‘518 Patent File History, Feb. 9, 2015 Response to Office Action.
`
`Excerpt from Merriam-Webster Online Dictionary, 2010 (available at
`https://web.archive.org/web/20101206084256/http:/www.merriam-
`webster.com/dictionary/initiate).
`Excerpt from ‘419 Patent File History, Appellant’s Brief In Response to Office
`Action, TAASERA-0002998 – TAASERA-0003014.
`Excerpt from ‘419 Patent File History, Amendment and Reply to Office Action
`Dated September 12, 2006, TAASERA-0002947 – TAASERA-0002958.
`
`vii
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 8
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 9 of 60 PageID #: 4378
`
`
`
`
`
`
`
`
`Pursuant to P.R. 4-5(b) and the Court’s Seventh Amended Docket Control Order (Dkt.
`
`257), Defendants hereby submit their Responsive Claim Construction Brief.2
`
`Level of Ordinary Skill in the Art
`
`Defendants submit that Plaintiff’s definition of a POSITA is overly broad in that it
`
`identifies experience in the general field of “computer programming for communication systems”
`
`as sufficient, without requiring specific experience in computer/cyber security (Br. 2; Black Decl.
`
`¶ 42; Rubin Decl. ¶ 31), but this distinction has no bearing on the instant disputes.
`
`U.S. Patent No. 6,842,796
`
`The ’796 Patent discloses techniques for exploiting readily identifiable phrases, known as
`
`“regular expressions,” to identify and extract data. The patent uses a phone call as an example,
`
`where a “caller is likely to identify himself in one of just a few ways,” e.g., “Hi John, it’s Bob.”
`
`Ex. A, 2:3-10. When the “Hi <recipient-name>, it’s <caller-name>” structure is known, the system
`
`can identify the expression, extract information (e.g., recipient-name and caller-name), and act
`
`upon it. Id., 2:17-21. According to the patent, this approach is beneficial because existing computer
`
`programming languages “have built in support for regular expressions.” Id., 2:22-27.
`
`1. “regular expression”/”regularly identifiable expression” (’796 Patent, 1, 12, 23-25)3
`
`Defendants’ Proposal
`Plaintiff’s Proposal
`Plain and ordinary meaning of “regular expression”
`matchable pattern
`The phrase “regular expression” consists of commonly understood terms,4 whose meaning
`
`
`2 The claim constructions, arguments and evidence proffered herein are provided by Defendants
`in one document in view of the fact that the cases are joined in Multi-District-Litigation Case
`No. 2:22-md-03042-JRG. Each term, proposed construction, and supporting argument and
`evidence represents the P.R. 4-5(b) Claim Construction Brief for at least one Defendant.
`
`3 The term “regular expression” only appears in claims 24-25, but the parties agree that both
`terms should be afforded the same meaning across all claims.
`
`4 Indeed, the patent itself makes clear that regular expressions were well-known in the art. Id.,
`3:2-5 (incorporating by reference Aho et al., “Compilers: Principles, Techniques, and Tools,”
`
`1
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 9
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 10 of 60 PageID #: 4379
`
`
`
`
`
`
`
`
`can be readily ascertainable by the jury. Absent lexicography or clear disavowal, claims are to be
`
`afforded their plain and ordinary meaning to one of ordinary skill. Phillips v. AWH Corp., 415
`
`F.3d 1303, 1313, (Fed. Cir. 2005) (en banc). Such is the case here.
`
`Plaintiff’s arguments do not withstand scrutiny. First, Plaintiff takes contradictory
`
`positions. On the one hand it maintains that these terms have “no plain or established meaning to
`
`one of ordinary skill in the art” (Br., 2), but in the next paragraph claims that “[t]hese phrases are
`
`terms of art in the software field” (Id., 3). Which one is it—are they terms of art, or do they have
`
`no established meaning? Regardless, Plaintiff offers no support for its position that the phrases
`
`are terms of art, much less identify their meaning.
`
`Plaintiff next turns to the patent, but its arguments are unavailing. Plaintiff tacitly admits
`
`that its construction is redundant. Plaintiff claims that the ‘796 Patent’s independent claims
`
`explicitly describe that regularly identifiable expressions ‘represent a pattern that is matchable.’”
`
`(Br. 3).5 If the claims “explicitly describe” that the expressions represent a pattern that is
`
`matchable, then Plaintiff’s proposed construction renders other claim terms superfluous. For
`
`example, inserting Plaintiff’s construction into claim 1 yields: a “[matchable pattern] represents a
`
`pattern that is matchable.” Such a construction “makes no contribution to the claim.” Intel Corp.
`
`v. Qualcomm Inc., 21 F.4th 784, 792 (Fed. Cir. 2021) (rejecting proposed construction because
`
`“courts [should] avoid a reading that renders some words altogether redundant.”).
`
`Plaintiff’s reliance on the specification is equally flawed. It points to an excerpt in column
`
`three, but the full passage is illuminating:
`
`In accordance with an illustrative embodiment of the invention, the term “regular
`expression” is taken to mean any form of pattern that is matchable in the flex, lex,
`
`Addison-Wesley, 1985).
`
`
`
`5 All emphases in this brief were added unless otherwise noted.
`
`
`
`2
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 10
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 11 of 60 PageID #: 4380
`
`
`
`
`
`
`
`
`or perl programming languages, although the invention is not limited thereto.
`
`Ex. A, 3:22-26. If the Court were to find that this passage constitutes lexicography, then the entire
`
`“definition” must be adopted—including the references to specific programming languages. But
`
`of course, by its very language, this passage is not definitional.
`
`Finally, Plaintiff recites exemplary embodiments provided by the specification. (Br. 3). To
`
`the extent Plaintiff is attempting to read preferred embodiments into the claims, that is improper.
`
`Teleflex, Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1327 (Fed. Cir. 2002).
`
`These terms should be afforded their ordinary meaning. The Court should reject Plaintiff’s
`
`attempt to improperly limit their scope and create redundancies.
`
`U.S. Patent No. 7,673,137
`
`The ’137 Patent discloses systems and methods for managing the security of a computer
`
`network. In particular, the patent discloses a “protector system” that functions through a “two-step
`
`process” to ensure a program is safe. In the first step, the protector system determines if a program
`
`is “valid.” In the second step, the system decides whether to monitor the program based on whether
`
`it was validated. If the program was validated, “it can be run without further monitoring or
`
`interruptions for the user.” If the program was not validated, it will be monitored because it is not
`
`known whether the program is considered safe to execute. Ex. B, 3:28-35, 51-54. This two-step
`
`process is consistently described within the specification. Id., 4:6-11, 4:50-65, 9:4-11, 10:56-61.
`
`2. “if the new program is validated, permitting the new program to continue
`loading and to execute in connection with the computing device” (’137 Patent, 6,
`13, 14, 24)
`
`Plaintiff’s Proposal
`
`Plain and ordinary
`meaning
`
`Defendants’ Proposal
`If the new program is [validated (claims 6, 13); the same as the
`allowed program (claims 14, 24)], then it is not monitored while it
`[loads and executes in connection with the computing device
`(claims 6, 13); executes on the computing device (claims 14, 24)]
`The dispute for this term is whether a validated program is monitored. Consistent with the
`
`
`
`3
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 11
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 12 of 60 PageID #: 4381
`
`
`
`
`
`
`
`
`’137 Patent’s goal of providing “an effective and efficient method for implementing security while
`
`minimizing the burdens and interruptions for the user” (Ex. B, 10:49-54), if a program is validated,
`
`it is not monitored. Plaintiff‘s expert recognizes this. Ex. P ¶ 53 (“one of the benefits of the claimed
`
`invention is performing a validation step … to minimize unnecessary monitoring...”).
`
`Indeed, the intrinsic record uniformly describes that programs are monitored if they are not
`
`validated. The specification states that “the present invention employs a two-step process to
`
`validate software programs and monitor non-validated software programs. . . . In the first phase
`
`of the process, the protector system validates authorized programs to ensure that they have not
`
`been corrupted before running them. For programs that cannot be validated, the protector
`
`system can monitor the programs as they execute during the second phase.” Ex. B, 4:53-65;
`
`see also id., cls. 6, 13, 14, 24; id., 3:32-41 (“If the program is not validated, it can be monitored at
`
`the kernel level of the operating system during the second phase....”); 6:64-67, 9:7-11, 9:38-41.
`
`By contrast, validated programs are not monitored, and do not need to be. Id., 4:54-65,
`
`cls. 6, 13, 14, 24; id., 3:28-32 (“If the program is validated, it can be run without further
`
`monitoring or interruptions for the user.”). This is common sense in view of the ‘137 Patent’s
`
`purpose: a program known to be valid does not need to be monitored, thus saving resources. Id.,
`
`10:54-59 (“By validating certain programs during the pre-execution process, the protector system
`
`minimizes the amount of work that must be done in monitoring and controlling programs during
`
`the execution phase.”); 4:4-11; 8:63-9:7. Plaintiff’s expert admits that the component described in
`
`the specification for monitoring executing programs is for non-validated programs. Ex. P at ¶ 53;
`
`see also Ex. B, 7:26-30 (discussing execution module). Plaintiff cannot have it both ways.
`
`Defendants’ proposal is further supported by the claim language, which is structured in an
`
`alternative if/then format such that whether monitoring happens depends on whether the program
`
`
`
`4
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 12
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 13 of 60 PageID #: 4382
`
`
`
`
`
`
`
`
`was validated (e.g., “if the new program is validated, permitting the new program to continue
`
`loading;” “if the new program is not validated, monitoring the new program while it loads”).
`
`Plaintiff points to a single passage in the specification that refers to “little… additional
`
`security monitoring” to claim that “a program may still be monitored (either minimally or not at
`
`all) as it continues loading and executes” (Br. 5), but Plaintiff fails to explain what the phrase
`
`“little… additional security monitoring” means or where the line is between “little… additional”
`
`and simply security monitoring.6 Given that “little... additional security monitoring” requires a
`
`determination of degree to understand whether a system might fall within the scope of the claims
`
`at issue, a construction is needed. Liberty Ammunition, Inc. v. United States, 835 F.3d 1388, 1395-
`
`96 (Fed. Cir. 2016). The intrinsic evidence only describes not requiring monitoring of validated
`
`programs, which is consistent with Defendants’ proposal and with the goals of the ’137 Patent.
`
`3. “an execution module coupled to the detection module and operable for
`monitoring, at the operating system kernel of the computing device, the program
`in response to the trigger intercepted by the detection module” (’137 Patent, Cl. 1)
`
`Defendants’ Proposal
`Plaintiff’s Proposal
`Means-plus-function
`112 ¶ 6
`
`
`Function: monitoring, at the operating system kernel of
`Function: monitoring, at the
`the computing device, the program in response to the
`operating system kernel of the
`trigger intercepted by the detection module
`computing device, the program in
`
`response to the trigger intercepted by
`Algorithm: not disclosed; therefore, claim is indefinite
`the detection module
`
`
`Alternatively: If the program was not validated, then
`Structure: software algorithm that
`monitor the non-validated program in response to
`performs the steps of FIG. 6
`triggers while the program is executing
`
`The parties agree that this term should be subject to 112(6) and the associated function.
`
`
`6 At most, Taasera’s argument would indicate that “little . . . security monitoring” can be used on
`a program after it has been validated, not that unlimited monitoring is used. That understanding
`would introduce a term of degree that renders the claim indefinite. Berkheimer v. HP Inc., 881
`F.3d 1360, 1364 (Fed. Cir. 2018)
`
`
`
`5
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 13
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 14 of 60 PageID #: 4383
`
`
`
`
`
`
`
`
`However, the ’137 Patent does not disclose an algorithm corresponding to that function and, as a
`
`result, the claim is indefinite. The patent does not describe how the execution module monitors a
`
`non-validated program in response to the trigger intercepted by the detection module.7 Nor does
`
`the patent describe an algorithm for monitoring validated programs. Indeed, Plaintiff relies on
`
`Figure 6 that is titled “Non-Validated Execution Process.” If Plaintiff’s position for term 2––that
`
`the ’137 Patent allows monitoring of validated programs––were adopted, then this failure to
`
`disclose an algorithm for monitoring valid programs would be another ground of indefiniteness.
`
`Plaintiff argues the steps of Fig. 6 provide the necessary software algorithm, but the entirety
`
`of Fig. 6 is not linked to the function, which requires monitoring by the execution module. Indeed,
`
`Plaintiff recognizes the execution module’s function is distinct from that of the pre-execution
`
`module. Br. 6. The claim language distinguishes the functions of the validation module and the
`
`detection module from the execution module, as well. Ex. B, Cl. 1. Thus, steps that are clearly
`
`linked to any non-execution modules cannot be part of an algorithm implementing the claimed
`
`function. As described, only steps 640 and 645, and possibly step 630, are linked to any monitoring
`
`functionality of the execution module. See id., 9:43-10:15.
`
`Even assuming steps 630, 640, and 645 of Fig. 6 pertain to the execution module
`
`monitoring the non-validated program, those blocks are just black boxes. For example, Plaintiff
`
`points to no disclosed algorithm for how the “management module executes necessary precautions
`
`and remedial actions” in Fig. 6 or in the accompanying description (id., 9:63-66) nor how the “new
`
`executable continues to load and execute” (id., 10:1-9). As to step 645, in and of itself it does not
`
`disclose an algorithm; to the extent any steps are disclosed, they are in Fig. 7, which Plaintiff does
`
`
`7 The parties appear to agree that monitoring of a program in response to the trigger intercepted
`by the detection module applies only to non-validated programs. Br. 6-7.
`
`
`
`6
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 14
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 15 of 60 PageID #: 4384
`
`
`
`
`
`
`
`
`not contend is part of the relevant algorithm. Id., 10:9-15. Regardless, an “algorithm” that requires
`
`and relies on “black boxes” is not sufficient to disclose an algorithm for 112(6) purposes. See
`
`Blackboard, Inc. v. Desire2Learn, Inc., 574 F.3d 1371, 1383-85 (Fed. Cir. 2009).
`
`If the Court disagrees that this term is subject to 112(6), it should be construed: “if the
`
`program was not validated, then monitor the non-validated program in response to triggers while
`
`the program is executing, and if the program was validated, then do not monitor the program” for
`
`the reasons discussed in the previous term.
`
`U.S. Patent No. 8,127,356
`
`4. “network administration traffic” (’356 Patent Cls. 1, 2, 9, 10, 13, 14, 17, 18)
`“[third/fourth] program instructions to determine if the packet is network
`administration traffic” (’356 Patent Cls. 1, 9, 10, 13, 17)
`
`Term
`“network administration
`traffic”
`
`Plaintiff’s Proposal
`
`Defendants’ Proposal
`
`Plain and ordinary meaning.
`
`Indefinite.
`
`“[third/fourth] program
`instructions to determine if
`the packet is network
`administration traffic”
`
`Subject to 112(6).
`Subject to 112 ¶ 6.
`Structure: indefinite.
`Structure: Software algorithm
`Function: determine if the
`that performs the steps of FIG. 7.
`packet is network
`Function: determine if the packet
`administration traffic.
`is network administration traffic.
`Both parties agree the term “[third/fourth] program instructions to determine if the packet
`
`is network administration traffic” is subject to § 112 ¶ 6, and that the function of the term is
`
`“determine if the packet is network administration traffic.”
`
`A.
`
`The ’356 Patent does not disclose “adequate” structure for the claimed
`function.
`
`Because the “program instructions…” term is subject to § 112 ¶ 6, “the patentee must
`
`disclose adequate corresponding structure to perform all of the claimed functions.” Williamson v.
`
`Citrix Online, LLC, 792 F.3d 1339, 1351–52 (Fed. Cir. 2015). “Even if the specification discloses
`
`corresponding structure, the disclosure must be of ‘adequate’ corresponding structure to achieve
`
`the claimed function.” Id. at 1352.
`
`
`
`7
`
`IPR2024-00027
`CrowdStrike Exhibit 1010 Page 15
`
`

`

`Case 2:22-md-03042-JRG Document 259 Filed 08/18/23 Page 16 of 60 PageID #: 4385
`
`
`
`
`
`
`
`
`The ’356 Patent expressly teaches that “Examples of network administration traffic are
`
`secure shell (‘SSH’) traffic to remotely

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket