throbber
Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 1 of 21 Page ID #:1660
`
`UNITED STATES DISTRICT COURT
`CENTRAL DISTRICT OF CALIFORNIA
`
`CIVIL MINUTES - GENERAL
`SACV 19-2192-GW-ADSx
`Ancora Technologies, Inc v. TCT Mobile (US), Inc., et al.
`
`Case No.
`Title
`
`Date November 12, 2020
`
`Present: The Honorable GEORGE H. WU, UNITED STATES DISTRICT JUDGE
`Javier Gonzalez
`Terri A. Hourigan
`Tape No.
`Deputy Clerk
`Court Reporter / Recorder
`Attorneys Present for Plaintiffs:
`Attorneys Present for Defendants:
`Marc Lorelli
`Kyle R. Canavera
`John P. Rondini
`John P. Schnurer
`PROCEEDINGS:
`TELEPHONIC MARKMAN HEARING
`
`The Court’s Final Ruling on Claim Construction (Markman) Hearing is circulated and attached hereto.
`Court and counsel confer. For reasons stated on the record, the hearing is continued to November 19,
`2020 at 8:30 a.m. The parties are to meet and confer, and attempt to resolve this matter. A joint status
`report is to be filed by noon on November 17, 2020.
`
`CV-90 (06/04)
`
`CIVIL MINUTES - GENERAL
`
`Page 1 of 1
`
`Initials of Preparer
`
`JG
`
`:
`
`06
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 2 of 21 Page ID #:1661
`
`Ancora Techs., Inc. v. TCT Mobile (US) Inc. et al.; Case No. 8:19-cv-02192-GW-(ASx) (Lead Case);
`Case No. 2:20-cv-01252-GW-(ASx) (Consolidated Case)
`Final Ruling on Claim Construction (Markman) Hearing
`
`I.
`
`Introduction
`Plaintiff Ancora Techs., Inc. (“Plaintiff” or “Ancora”) filed suit against TCL Corp., TCL
`Commc’n Ltd., TCL Commc’n Holdings Ltd., and TCL Commc’n Tech. Holdings Ltd. on August
`27, 2019, alleging infringement of U.S. Patent No. 6,411,941 (“the ’941 Patent”). Ancora Techs.,
`Inc. v. TCL Corp. et al., Case No. 2:20-cv-01252-GW-(ASx) (“Consolidated Case”), Docket No.
`1; see also Docket No. 12 (Consolidated Case Amended Complaint).
`On November 12, 2019, TCT Mobile (US) Inc. and Huizhou TCL Mobile Commc’n Co.,
`Ltd., separately filed suit against Plaintiff, seeking declaratory judgement of non-infringement of
`the ’941 Patent.
` TCT Mobile (US) Inc. et al. v. Ancora Techs., Inc., Case No.
`8:19-cv-02192-GW-(ASx) (“Lead Case”), Docket No. 1. The two actions have been consolidated
`so that Plaintiff now accuses TCT Mobile (US) Inc., Huizhou TCL Mobile Commc’n Co., Ltd.,
`Shenzhen TCL Creative Cloud Tech. Co., Ltd., TCL Corp., TCL Commc’n Ltd., TCL Commc’n
`Holdings Ltd., and TCL Commc’n Tech. Holdings Ltd., TCT Mobile (US) Holdings Inc., TCT
`Mobile, Inc., TCT Mobile Int’l Ltd. (collectively, “Defendant” or “TCL”) of infringing the
`’941 Patent. Docket No. 29; see also Docket No. 23 (stipulation to realign parties); Docket No. 24
`(First Amended Complaint); Docket No. 44 (Second Amended Complaint).1
`Now pending are some of the parties’ claim construction disputes. The parties have
`submitted a Joint Claim Construction and Prehearing Statement. See Docket No. 49. The parties
`have also filed various claim construction briefs and supporting documents:
` Plaintiff Ancora’s Opening Claim Construction Brief (Docket No. 52); Defendant
`TCL’s Opening Claim Construction Brief (Docket No. 53)
` Plaintiff Ancora’s Responsive Claim Construction Brief (Docket No. 54); Defendant
`TCL’s Responsive Claim Construction Brief (Docket No. 55)
`The Court construes the disputed terms as stated herein.
`Background
`For purposes of the parties’ claim construction disputes, the parties request construction of
`
`II.
`
`1 Citations are to the Lead Case unless otherwise noted.
`
`1 
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 3 of 21 Page ID #:1662
`
`seven terms in the asserted claims of the ’941 Patent, titled “Method of Restricting Software
`Operation Within a License Limitation.” The ’941 Patent issued on June 25, 2002. The ’941
`Patent relates to “a method and system of identifying and restricting an unauthorized software
`program's operation.” ’941 Patent at 1:6-8.
`Claim 1 of the ’941 Patent recites:
`1. A method of restricting software operation within a license for use with a
`computer including an erasable, non-volatile memory area of a BIOS of the
`computer, and a volatile memory area; the method comprising the steps of:
`selecting a program residing in the volatile memory,
`using an agent to set up a verification structure in the erasable, non-volatile
`memory of the BIOS, the verification structure accommodating data
`that includes at least one license record,
`verifying the program using at least the verification structure from the
`erasable non-volatile memory of the BIOS, and
`acting on the program according to the verification.
`’941 Patent, Claim 1.
`III.
`Legal Standard
`Claim construction is an interpretive issue “exclusively within the province of the court.”
`Markman v. Westview Instruments, Inc., 517 U.S. 370, 372 (1996). It is “a question of law in the
`way that we treat document construction as a question of law,” with subsidiary fact-finding
`reviewed for clear error to Fed. R. Civ. P. 52(a)(6). Teva Pharms. USA, Inc. v. Sandoz, Inc.,
`135 S. Ct. 831, 837-40 (2015). The claim language itself is the best guide to the meaning of a
`claim term. See Vederi, LLC v. Google, Inc., 744 F.3d 1376, 1382 (Fed. Cir. 2014). This is because
`the claims define the scope of the claimed invention. Phillips v. AWH Corp., 415 F.3d 1303, 1312
`(Fed. Cir. 2005). But a “person of ordinary skill in the art is deemed to read the claim term not
`only in the context of the particular claim in which the disputed term appears, but in the context of
`the entire patent.” Id. at 1313. Thus, claims “must be read in view of the specification,” which is
`“always highly relevant to the claim construction analysis.” Phillips, 415 F.3d at 1315 (internal
`quotations omitted).
`Although claims are read in light of the specification, limitations from the specification
`must not be imported into the claims. Abbott Labs. v. Sandoz, Inc., 566 F.3d 1282, 1288
`(Fed. Cir. 2009). “[T]he line between construing terms and importing limitations can be discerned
`with reasonable certainty and predictability if the court’s focus remains on understanding how a
`person of ordinary skill in the art would understand the claim terms.” Phillips, 415 F.3d at 1323.
`
`2 
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 4 of 21 Page ID #:1663
`
`The prosecution history may lack the clarity of the specification, but it is “another
`established source of intrinsic evidence.” Vederi, 744 F.3d at 1382. “Like the specification, the
`prosecution history provides evidence of how the PTO and the inventor understood the patent.”
`Phillips, 415 F.3d at 1317 (citations omitted). “Furthermore, like the specification, the prosecution
`history was created by the patentee in attempting to explain and obtain the patent.” Id. “Yet
`because the prosecution history represents an ongoing negotiation between the PTO and the
`applicant, rather than the final product of that negotiation, it often lacks the clarity of the
`specification and thus is less useful for claim construction purposes.” Id.
`Claim construction usually involves resolving disputes about the “ordinary and customary
`meaning” that the words of the claim would have had “to a person of ordinary skill in the art in
`question at the time of the invention.” Phillips, 415 F.3d at 1312-13 (internal quotations and
`citations omitted). But in some cases, claim terms will not be given their ordinary meaning because
`the specification defines the term to mean something else. “[A] claim term may be clearly
`redefined without an explicit statement of redefinition,” so long as a person of skill in the art can
`ascertain the definition by a reading of the patent documents. Id. at 1320; see also Trustees of
`Columbia Univ. in City of New York v. Symantec Corp., 811 F.3d 1359, 1364 (Fed. Cir. 2016).
`Where the patent itself does not make clear the meaning of a claim term, courts may look
`to “those sources available to the public that show what a person of skill in the art would have
`understood disputed claim language to mean,” including the prosecution history and “extrinsic
`evidence concerning relevant scientific principles, the meaning of technical terms, and the state of
`the art.” Phillips, 415 F.3d at 1314 (internal quotations omitted). Sometimes, the use of “technical
`words or phrases not commonly understood” may give rise to a factual dispute, the determination
`of which will precede the ultimate legal question of the significance of the facts to the construction
`“in the context of the specific patent claim under review.” Teva, 135 S. Ct. at 841, 849. “In some
`cases, the ordinary meaning of claim language as understood by a person of skill in the art may be
`readily apparent even to lay judges, and claim construction in such cases involves little more than
`the application of the widely accepted meaning of commonly understood words.” Phillips,
`415 F.3d at 1314. “In such circumstances, general purpose dictionaries may be helpful.” Id.
`IV.
`Discussion
`A. Agreed Claim Terms
`The parties have agreed to constructions for the following claim terms (see Docket
`
`3 
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 5 of 21 Page ID #:1664
`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 5 of 21 Page ID #:1664
`
`No. 49):
`
`Asserted Claim s
`
`“non-volatile memory area of
`the BIOS”
`
`“BIOS”
`
`
`
`
`
`Parties’ . _reed Claim Construction
`“memory area of BIOS whose
`data is maintained when the
`
`power is removed”
`
`An acronym for Basic
`Input/Output System. It is the
`set of essential startup
`operations that run when a
`computer is turned on, which
`test hardware, starts the
`operating system, and support
`the transfer of data among
`hardware devices
`
`B. Disputed Claim Terms
`
`1. “volatile memog” (Claim 1!
`
`“memory area whose data is not maintained
`or becomes inaccessible when the power is
`
`“memory whose data is not maintained when the
`power is removed”
`
`Plaintiff’s Pro nosed Construction
`
`Defendant’s Pro . osed Construction
`
`removed”
`
`The parties agree that “Volatile memory” is “memory whose data is not maintained when
`
`the power is removed.” Docket Nos. 52 at 7; 53 at 21. The only dispute is whether “volatile
`
`memory” also includes “memory whose data becomes inaccessible afier the power is removed.”
`
`As Defendant highlights, Plaintiff has accepted Defendant’s proposed construction on two
`
`separate occasions.
`
`See Ancora Techs.,
`
`Inc.
`
`v. Apple Inc., No.
`
`ll-cv—06357—YGR,
`
`2012 WL 6738761, at *4 (ND. Cal. Dec. 31, 2012) (“Apple 1”); Docket No. 53-10 at 1 (dated
`
`July 29, 2019). Plaintiff now seeks to broaden this construction based on the Federal Circuit’s
`
`decision inAncora v. Apple, Inc, 744 F.3d 732 (Fed. Cir. 2014) (“Apple II”).
`
`In Apple II, the Federal Circuit affirmed the lower court’s holding that the term ‘fiiolatile
`
`memory” was not indefinite despite the ’94] Patent specification stating that a hard disk is “volatile
`
`memory.” Id. at 737-39; see also ’94] Patent at 1:21; 3:9; 4:53. The Circuit acknowledged that a
`
`hard disk is not normally considered a “volatile memory,” i.e. “a hard disk maintains data when
`
`the power is removed.” Id. at 738. But the Circuit also agreed that “it is well known that a
`
`computer’s hard disk is routinely used as ‘Virtual’ memory to provide temporary storage when
`
`4
`
`|PR2021-00581 - ANCORA EX2024
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 6 of 21 Page ID #:1665
`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 6 of 21 Page ID #:1665
`
`there is insufficient RAM to complete an operation, in which case (it is undisputed) the data
`
`become inaccessible through the usual means once power is removed (even if the data can still be
`
`found on the hard disk by more sophisticated means).” Id. (internal citations omitted). Based on
`
`this, the Federal Circuit agreed that the term ‘filolatile memory” was not indefinite.
`
`Plaintiff argues that the term “volatile memory” should also include “memory whose data
`
`becomes inaccessible after the power is removed” due to the above language. Defendant does not
`
`seem to dispute that the Federal Circuit’s decision provided an exception to its construction, but
`
`instead argues that Plaintist construction is incomplete. See Docket Nos. 53 at 22-23; 55 at 21.
`
`The Western District of Texas’s construction of this term is instructive. Having considered
`
`similar arguments, that court construed the term “volatile memory” to mean “memory whose data
`
`is not maintained when the power is removed,” but with one exception. See Docket No. 52-4 at 2.
`
`In a footnote “not for the jury,” the court added: “For the comer case where the hard disk drive is
`
`used as virtual RAM, the data is not accessible by normal means after the power is removed.” Id.
`
`This strikes the correct balance.
`
`Accordingly, this Court construes the term ‘firolatile memory” to mean “memory whose
`
`data is not maintained when the power is removed,” with the exception that ‘Where the hard disk
`
`drive is used as virtual RAM, the data is not accessible by normal means after the power is
`
`removed.”
`
`2. “selecting a program residing in the volatile memog” (Claim 11
`
`Plaintiff’s Pro I osed Construction
`
`Defendant’s Pro n osed Construction Plain and ordinary meaning
`
`“accessing a program to be verified in the volatile
`memo ”
`
`The parties’ dispute is unclear. Plaintiff spends its briefs arguing that replacing the word
`
`“selecting” with “accessing” adds ambiguity and reads out embodiments. See Docket Nos. 52 at
`
`8—11; 54 at 16. Defendant states in its responsive brief, however, that the significance of its
`
`construction is not in the difference between the words “selecting” and “accessing,” but that “the
`
`program is present in the volatile memory — by accessing, selecting, or otherwise in the “selecting
`
`.
`
`. .” step - prior to being verified in the “Verifying .
`
`. .” step.” See Docket No. 54 at 19.2 Because
`
`2 To the extent that Defendant argues that the “selecting” step must come before the ‘firerifying” step. the Court notes
`that the Western District of Texas has found that the “selecting” step may be performed at any time. See Docket No.
`52-5 at 7-10. 37. Given that the parties do not appear to dispute the order of the steps. however. the Court does not
`decide this issue.
`
`|PR2021-00581 - ANCORA EX2024
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 7 of 21 Page ID #:1666
`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 7 of 21 Page ID #:1666
`
`the parties’ dispute is unclear, the Court declines to construe this term.
`
`3. “set 11 a verification structure” Claim 1
`
`Plaintiffs Pro nosed Construction
`
`Defendant’s Pro n osed Construction
`
`the com-uter”
`
`Plain and ordinary meaning
`
`“store information encrypted with a key unique to
`
`Claim 1 recites “using an agent to set up a verification structure in the erasable, non-
`
`volatile memory of the BIOS, the verification structure accommodating data that includes at
`
`least one license recor ,” and ‘filerifying the program using at least the verification structure from
`
`the erasable non-volatile memory of the BIOS.” ’94] Patent, Claim 1 (emphasis added). The
`
`parties dispute whether setting up this verification structure requires encrypting information with
`
`a key unique to the computer.
`
`Specifically, Defendant claims that
`
`the specification and
`
`prosecution history show a clear disavowal of claim scope. See Docket No. 53 at 15.
`
`Starting with the specification, Defendants argues that the “Summary of the Invention”
`
`states that the invention requires the use of a key, which states:
`
`The present invention relates to a method of restricting software operation
`within a license limitation. This method strongly relies on the use ofa key
`and ofa record, which have been written into the non—volatile memory of a
`
`computer.
`
`’94] Patent, 1:38—43 (emphasis added); see also Docket No. 53 at 15. “When a patent thus
`
`describes the features of the ‘present invention’ as a whole, this description limits the scope of the
`
`invention.” Regents of Univ. ofMinnesota v. AGA Med. Corp, 717 F.3d 929, 936 (Fed. Cir. 2013).
`
`This description of the present invention matches the language recited in Claim 1, which states
`
`that “the verification structure accommodate[es] data that includes at least one license record.”
`
`’94] Patent, Claim 1. Further, the specification states that “[t]hepresent invention also relates to
`
`a non-volatile memory media used as a BIOS of a computer, for restricting software operation
`
`within a license limitation, wherein a pseudo—unique key is established.” ’94] Patent at 4:55-58
`
`(emphasis added). But that is where the description of the present invention ends.
`
`The specification does not support Defendant’s construction. As both parties acknowledge,
`
`the rest of the specification describes “non-limiting example[s]” or “operations performed
`
`according to one embodiment of the invention.” See Docket No. 54 at 10; see also Docket No. 52
`
`at 15 (“While most of the ’941 Patent disclosure is phrased in the language of ‘non-limiting
`
`examples’ and ‘embodiments,’ the [Summary of the Invention] is not”). Defendant argues that
`
`|PR2021-00581 - ANCORA EX2024
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 8 of 21 Page ID #:1667
`
`these examples are limiting as they provide “context for the characterization of the invention as a
`whole,” and because “the specification never discloses any embodiment where the license record
`in the verification structure is not encrypted using the unique key.” See Docket No. 53 at 15-16.
`But as Plaintiff notes, claim terms should not be limited just because the specification discloses a
`single embodiment. See Docket No. 54 at 10 (citing Phillips, 415 F.3d at 1323).
`Further, Claim 1 recites that the “verification structure” is set up “in the erasable, non-
`volatile memory of the BIOS.” ’941 Patent, Claim 1. Claim 7 recites that the “set[ting] up a
`verification structure” step of Claim 1 includes establishing (or certifying the existence of) “a
`pseudo-unique key in a first non-volatile memory area of the computer; and establishing at least
`one license-record location in the first nonvolatile memory area or in the erasable, non-volatile
`memory area of the BIOS.” ’941 Patent, Claim 7. Similarly, the specification states that setting
`up the verification structure only requires establishing (or certifying the existence of) a key and at
`least one license-record location in the non-volatile memory:
`Setting up (18) the verification structure includes the steps of: establishing or
`certifying the existence of a pseudo-unique key in the first non-volatile memory
`area; and establishing at least one license-record location in the first or the second
`nonvolatile memory area.
`’941 Patent at 6:18-22. These references to the “set[ting] up a verification structure” step without
`mentioning encryption suggest that encryption is not required.3
`Defendant asserts that the description of the “[s]etting up (18) the verification structure” in
`the specification is followed by an explanation that the “establishing a license-record” step
`includes “forming a license-record by encrypting of the contents used to form a license-record …
`using the key.” See Docket No. 55 at 12-13 (citing ’941 Patent at 6:23-26). The specification
`states that the “establishing a license-record” step further includes “establishing the encrypted
`license-record in one of the at least one established license-record locations.” ’941 Patent at
`6:26-28 (emphasis added). As Defendant admits, however, “the cited passage describes sub-steps
`that can be included in the step of ‘[s]etting up (18) the verification structure.’” See Docket 55 at
`
`3 The specification also discloses that the “license record may be held in either encrypted or explicit form.” See Docket
`No. 52 at 11 (citing ’941 Patent at 1:55). As Defendant points out, however, the next paragraph shows that this excerpt
`describes the state of the license-record before the verification structure is set in the BIOS. See Docket No. 55 at 13-
`14 (citing ’941 Patent at 1:59-62 (“Now, there commences an initial license establishment procedure, where a
`verification structure is set in the BIOS so as to indicate that the specified program is licensed to run on the specified
`computer.”)). But later the specification states that “[a]ny component [of a license-record] may, if desired, be
`encrypted.” ’941 Patent at 5:39.
`
`7 
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 9 of 21 Page ID #:1668
`
`12. Claim 8 already includes both of these-sub-steps. See ’941 Patent, Claim 8. Defendant has
`not shown that the “set[ting] up a verification structure” step of Claim 1 requires storing encrypted
`information.
`The prosecution history does not support Defendant’s construction either. The applicant’s
`arguments during prosecution suggest that setting up a verification structure requires the use of a
`key. The applicant stated that “the client system ID of Misra, is similar to the pseudo-unique key
`recited in claims 1 and 20.’” See Docket No. 52-3 at ANCC000151 (emphasis in original). As
`Defendant argues, then-pending Claim 1 did not explicitly recite a “pseudo-unique key,”
`suggesting that the term “verification structure” includes a pseudo-unique key. See Docket No. 53
`at 16-17; Docket No. 52-3 at ANCC000130. Further, the applicant argued that “[i]n the present
`method, the verification structure is formed by using a unique key for each computer and license
`record information in the software.” Docket No. 52-3 at ANCC000095. Although these statements
`may not amount to an “explicit disclaimer of subject matter sufficient to vary the scope of the
`claim,” they are still helpful in determining the ordinary meaning of the term “verification
`structure” within the relevant art. See Novartis Pharm., Corp. v. Eon Labs Mfg. Inc.,
`363 F.3d 1306, 1311 (Fed. Cir. 2004).4
`Applicant’s remarks on encryption, however, are ambiguous at best. The applicant argued
`that “[t]he license ID of Misra is similar to the verification structure and license information recited
`in claims 1 and 20, respectively.” Docket No. 52-3 at ANCC000151 (emphasis in original).
`According to Defendant, Misra discloses cryptographically signing the license ID with “a signing
`key,” showing that setting up the verification structure requires encryption. See Docket No. 53 at
`17 (citing Docket No. 53-9 at 10:60-67). But this is not included in the applicant’s remarks. At
`most, the applicant argued that the license ID “may be a digital certificate.” Docket No. 52-3 at
`ANCC000151. This is not enough to limit the term “set[ting] up a verification structure.”
`Finally, “set[ting] up a verification structure” does not require a key “unique to the
`computer.” As stated throughout, the key may be “pseudo-unique,” which the specification states
`“may relate to a random bit string (or to an assigned bit string) of sufficient length such that: there
`is an acceptably low probability of a successful unauthorized transfer of licensed software between
`
`4 Plaintiff’s argument that the prosecution history describes embodiments without using a key is unpersuasive. See
`Docket No. 54 at 12 (citing Docket No. 52-3 at ANCC000092). Applicant’s statement that “[i]n a preferred
`embodiment, a key resides in a first non-volatile part of a computer’s memory,” describes one possible location for
`the key, not that the key is optional.
`
`8 
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 10 of 21 Page ID #:1669
`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 10 of 21 Page ID #:1669
`
`two computers, where the first volatile memories of these two computers have the same key.”
`
`’94] Patent at 4: 13—18. Thus, the key may be “pseudo—unique” rather than “unique.”
`
`Accordingly, the Court does not construe this term at this time.
`
`4. “license recor ” Clairnl
`
`Plaintiff’s Pro nosed Construction
`
`Defendant’ Pro » osed Construction
`
`nro u am”
`
`“a record from a licensed program with
`information for verifying that licensed
`
`“information indicating a right to use the
`program”
`
`The parties dispute whether a license record requires “information indicating a right to use
`
`the program” or just information for verifying the program. Plaintiff argues that two other courts
`
`have already adopted Plaintiff’s construction or a substantially similar one. See Docket No. 52 at
`
`13. The Court agrees with those courts.
`
`The specification shows that a license-record is any information from a licensed program
`
`used by the verification structure to verify the program. The specification states that a
`
`license-record “consists of author name, program name and number of licensed users (for
`
`network),” and is associated with “each application program that is to be licensed to run on the
`
`specified computer.” ’94] Patent at 1:53—57. The license record may be formed from fields or
`
`contents of the licensed program. See id. at 5:46—51; 627-10. The specification provides the
`
`following examples of contents used to form the license—record: “terms,
`
`identifications,
`
`specifications, or limitations related to the manufacturer of a software product, the distributor of a
`
`software product, the purchaser of a software product, a licensor, a licensee, items of computer
`
`hardware or components thereof, or to other terms and conditions related to the aforesaid.” Id. at
`
`6211-17. Further, “the license record is not necessarily bound to continuous fields,” and the
`
`license-record contents may be “centralized or decentralized” or “embedded in various locations
`
`in the application.” Id. at 5:35-39; 6:11. Thus, the information itself does not need to indicate
`
`anything so long as it is capable of being used to verify the program.
`
`Figure l and its description confirm that the license-record is the information from the
`
`program used to verify the program. Describing Figure 1, the specification states that “[t]he second
`
`non-volatile memory includes a license-record—area (9) e.g. which contains at least one encrypted
`
`license-record (e.g. three records 10—12),” while “[t]he volatile memory accommodates a license
`
`program (16) having license record fields (13-15) appended thereto.” ’94] Patent at 5:26-30. The
`
`license-record fields shown in Figure l are found at various locations in the license program. See
`
`9
`
`|PR2021-00581 - ANCORA EX2024
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 11 of 21 Page ID #:1670
`
`id., Fig. 1 (reproduced below). The specification provides the following examples of the
`license-record fields: “Application names (e.g. Lotus 123), Vendor name (Lotus inc.), and number
`of licensed copies (1 for stand alone usage, >1 for number of licensed users for a network
`application).” Id. at 5:30-34. The description and figure show that the license-record is comprised
`of assorted information from the program without necessarily indicating a right to use the program.
`
`Defendant has not shown that the plain and ordinary meaning of a license-record to one of
`ordinary skill in the art when viewed in light of the specification is limited to information indicating
`a “right to use.” The specification states consistently that the program is licensed “to run” and
`suggests that the terms “licensed” and “verified” are synonymous. See ’941 Patent at 1:54-55
`(“each application program that is to be licensed to run on the specified computer”); 1:61-62 (“the
`specified program is licensed to run on the specified computer”); 2:20 (“the program is verified to
`run on the computer”); 2:28 (“attempt to run a program at an unlicensed site”); 2:30 (“verified to
`run”); 2:36 (“Suppose now that a hacker attempts to run…”). Defendant also relies on the
`applicant’s remarks about the “license ID” of the prior art made during prosecution of the
`’941 Patent. See Docket No. 53 at 19. The applicant stated that the license ID “may be a digital
`certificate indicating the right to use” and “is similar to the verification structure and license
`
`10 
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 12 of 21 Page ID #:1671
`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 12 of 21 Page ID #:1671
`
`information.” See Docket No. 52-3 at ANC000151 (emphasis added). These statements do not
`
`change the scope of the term “license—record” when read in light of the specification.
`
`Defendant’s issues with Plaintiff's construction are also unfounded. Defendant’s argument
`
`that Plaintiff 5 construction is dissociated from the plain meaning of the term “license” is based on
`
`Defendant’s overly narrow construction ofthe term “license.” See Docket No. 53 at 20. Defendant
`
`also complains that Plaintiff’5 construction does not provide what the licensed program is verified
`
`to do. See Docket No. 55 at 18. A person of ordinary skill in the art would be able to understand
`
`the verification process from reading the specification, though.
`
`Finally, Defendant argued at
`
`the hearing that
`
`there is a distinction between the
`
`license-record in the erasable, non—volatile memory and the license-record in the volatile memory.
`
`See, e.g. , Docket No. 61 at 5:16-72. Specifically, Defendant argued that the license record recited
`
`in Claim 1 is stored in the erasable, non—volatile memory of the BIOS, which includes different
`
`information than the license record stored in the volatile memory. See id. at 7:7-923. But as
`
`Defendant admitted, the ’94] Patent discloses that a program is verified when the contents of the
`
`two license records match. See id. at 9:15-23 (explaining that the way verification “is done is by
`
`pulling up the record
`
`and doing a comparison, and saying no, I don’t see this,
`
`you are not
`
`authorized .. . or there is a match, and that indicates that you are licensed to operate this program”).
`
`For instance, the ’94] Patent describes as an example a situation where a hacker attempts
`
`to run a specified program in a second computer. ’94] Patent at 2: 10-59. The verification structure
`
`first establishes a license record encrypted with a first computer’s identification code (kl) that was
`
`stored in the first computer’s erasable, non-volatile memory, i.e. (LR)k1.
`
`Id. The verification
`
`structure then compares that encrypted license record with the license record encrypted with a
`
`second identification code (k2) generated from the volatile memory, i.e. (LR)k2. Id. As shown in
`
`this example, the license record (LR) is identical; only the identification code is different. Thus,
`
`according to this example, the license record itself does not indicate a right to use a program, but
`
`rather has information used to verify the program in combination with the identification code.
`
`Accordingly, the Court construes the term “license—record” to mean “a record from a
`
`licensed program with information for verifying that licensed program.”
`
`5. “memo of the BIOS” Claim]
`
`Defendant’s Pro I osed Construction Plain and ordin meanin-
`
`Plaintiff’s Pro . osed Construction
`
`“a memo
`
`that:
`
`i stores the BIOS;
`
`ii
`
`is not
`
`11
`
`|PR2021-00581 - ANCORA EX2024
`
`IPR2021-00581 - ANCORA EX2024
`
`

`

`Case 8:19-cv-02192-GW-AS Document 66 Filed 11/12/20 Page 13 of 21 Page ID #:1672
`
`recognized by an operating system as a storage
`device; and (iii) does not have a file system”
`Defendant asks that the term “memory of the BIOS” be limited based on the doctrine of
`prosecution disclaimer. See Docket No. 53 at 10. The Court finds that prosecution disclaimer
`does not apply.
`Defendant relies on arguments the applicant made during the prosecution of the ’941 Patent
`to overcome a rejection under 35 U.S.C. § 103 in light of two prior art references, i.e. Misra and
`Ewertz. See Docket No. 54 at 12-13. Produced below is the relevant part of the file history:
`Moreover, the present invention proceeds against conventional wisdom in the art.
`Using BIOS to store application data such as that stored in Misra’s local cache for
`licenses is not obvious. The BIOS area is not considered a storage area for
`computer applications. An ordinary skilled artisan would not consider the BIOS a
`storage medium to preserve application data for at least two reasons.
`First, OS does not support this functionality and is not recognized as a hardware
`device like other peripherals. Every

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket