throbber

`ANCORA TECHNOLOGIES, INC.,
`
`Plaintiff,
`
`
`
`LG ELECTRONICS INC. and LG
`ELECTRONICS U.S.A., INC.,
`
`Defendants.
`
`
`v.
`
`
`
`CIVIL ACTION NO. 1:20-CV-0034
`
`
`JURY TRIAL DEMANDED
`
`
`
`
`CIVIL ACTION NO. 1:20-CV-0034
`
`
`JURY TRIAL DEMANDED
`
`
`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 1 of 37
`
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`
`ANCORA TECHNOLOGIES, INC.,
`
`Plaintiff,
`
`
`
`SAMSUNG ELECTRONICS CO., LTD., and
`SAMSUNG ELECTRONICS AMERICA,
`INC.,
`
`v.
`
`
`Defendants.
`
`
`
`
`
`PLAINTIFF’S OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 2 of 37
`
`
`
`
`TABLE OF CONTENTS
`Introduction ..........................................................................................................................1
`
`Background ..........................................................................................................................1
`
`Agreed Terms .......................................................................................................................3
`
`Disputed Terms ....................................................................................................................3
`
`I.
`
`II.
`
`III.
`
`IV.
`
`1.
`
`“license” / “license record” ......................................................................................4
`
`i. The Court Does Not Need to Construe the Term "License" ..............................4
`ii. The Court Should Adopt Plaintiff’s “License Record” Construction ................7
`“volatile memory” ....................................................................................................8
`
`“BIOS” .....................................................................................................................9
`
`i. Defendants’ “Stored in ROM” Limitation Conflicts with the Patent ..............10
`ii. There Is No Support in the Patent for an “Automatically” Limitation ............11
`“non-volatile memory of the BIOS” ......................................................................11
`
`“program” ..............................................................................................................15
`
`“selecting a program residing in the volatile memory” .........................................15
`
`“using an agent to set up a verification structure in the erasable, non-
`volatile memory of the BIOS” ..............................................................................17
`
`i. “Agent” Means “a Software Program or Routine ............................................18
`ii. “It Is Understood That “Software” Is Structure ..............................................19
`“set up a verification structure” .............................................................................21
`
`“verifying the program using at least the verification structure” ..........................22
`
`i. The Patentee Added the Term “Agent” to the Claims to Identify When an
`OS-Level Program or Application Was Required ...........................................23
`ii. At Most, the Patentee Contemplated the Combined Use of BIOS and an
`OS-Level Program or Application (and Other Utilities) ..................................25
`“acting on the program according to the verification” ...........................................26
`
`The Order of the Claim 1 Steps .............................................................................27
`
`“first non-volatile memory area of the computer” .................................................29
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`10.
`
`11.
`
`12.
`
`i
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 3 of 37
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`
`
`
`
`Cases
`
`Aloft Media, LLC v. Adobe Sys., Inc.,
`570 F. Supp. 2d 887 (E.D. Tex. 2008) .....................................................................................20
`
`Altiris, Inc. v. Symantec Corp.,
`318 F.3d 1363 (Fed. Cir. 2003)................................................................................................28
`
`Ancora Techs., Inc. v. Apple Inc.,
`2012 WL 6738761 (N.D. Cal. Dec. 31, 2012) ................................................................. passim
`
`Ancora Techs., Inc. v. Apple, Inc.,
`744 F.3d 732 (Fed. Cir. 2014).......................................................................................... passim
`
`Ancora Techs., Inc. v. HTC Am., Inc.,
`908 F.3d 1343 (Fed. Cir. 2018)..........................................................................................1, 2, 6
`
`Apex Inc. v. Raritan Computer, Inc.,
`325 F.3d 1364 (Fed. Cir. 2003)................................................................................................20
`
`Broadcom Corp. v. Emulex Corp.,
`732 F.3d 1325 (Fed. Cir. 2013)....................................................................................10, 21, 30
`
`Chef Am., Inc. v. Lamb Weston, Inc.,
`358 F.3d 1371 (Fed. Cir. 2004)................................................................................................15
`
`Collaborative Agreements, LLC v. Adobe Sys. Inc.,
`2015 WL 2250391 (W.D. Tex. May 12, 2015) .......................................................................19
`
`Creo Prod., Inc. v. Presstek, Inc.,
`305 F.3d 1337 (Fed. Cir. 2002)................................................................................................21
`
`DePuy Spine, Inc. v. Medtronic Sofamor Danek, Inc.,
`469 F.3d 1005 (Fed. Cir. 2006)................................................................................................18
`
`E-Pass Techs., Inc. v. 3Com Corp.,
`343 F.3d 1364 (Fed. Cir. 2003)..................................................................................................5
`
`Elbex Video, Ltd. v. Sensormatic Elecs. Corp.,
`508 F.3d 1366 (Fed. Cir. 2007)................................................................................................23
`
`Eolas Techs., Inc. v. Adobe Sys. Inc.,
`810 F. Supp. 2d 795, 810 (E.D. Tex. 2011) .............................................................................20
`
`ii
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 4 of 37
`
`
`
`Facebook, Inc. v. Pragmatus AV, LLC,
`582 F. App’x 864 (Fed. Cir. 2014) ..........................................................................................12
`
`Harris Corp. v. IXYS Corp.,
`114 F.3d 1149 (Fed. Cir. 1997)................................................................................................22
`
`HTC Corp. v. Ancora Techs. Inc.,
`2017 WL 6032605 (Patent Tr. & App. Bd. Dec. 1, 2017) ...................................................6, 19
`
`i4i Ltd. P’ship v. Microsoft Corp.,
`598 F.3d 831 (Fed. Cir. 2010)..................................................................................................23
`
`K–2 Corp. v. Salomon S.A.,
`191 F.3d 1356 (Fed. Cir. 1999)................................................................................................15
`
`Kaneka Corp. v. Xiamen Kingdomway Grp. Co.,
`790 F.3d 1298 (Fed. Cir. 2015)..........................................................................................28, 29
`
`Kinetic Concepts, Inc. v. Wake Forest Univ. Health Scis.,
`2013 WL 6164592 (W.D. Tex. Nov. 25, 2013) .......................................................9, 10, 15, 22
`
`Linear Tech. Corp. v. ITC,
`566 F.3d 1049 (Fed. Cir. 2009)................................................................................................13
`
`Nokia Sols. & Networks US LLC v. Huawei Techs. Co.,
`2017 WL 2226413 (E.D. Tex. May 19, 2017) ...................................................................15, 16
`
`Omega Eng’g, Inc, v. Raytek Corp.,
`334 F.3d 1314 (Fed. Cir. 2003)................................................................................................13
`
`Prowess, Inc. v. RaySearch Labs., AB,
`953 F. Supp. 2d 638 (D. Md. 2013) .........................................................................................16
`
`Purdue Pharma L.P. v. Endo Pharmaceuticals Inc.,
`438 F.3d 1123 (Fed. Cir. 2006)................................................................................................14
`
`RLIS, Inc. v. Allscripts Healthcare Solutions, Inc.,
`2013 WL 3772472 (S.D. Tex. July 16, 2013) ..........................................................................20
`
`Salazar v. Procter & Gamble Co.,
`414 F.3d 1342 (Fed. Cir. 2005)..........................................................................................11, 24
`
`SecurityProfiling, LLC v. Trend Micro Am., Inc.,
`2018 WL 4585279 (N.D. Tex. Sept. 25, 2018) ..................................................................18, 20
`
`Solvay S.A. v. Honeywell Int’l Inc.,
`742 F.3d 998 (Fed. Cir. 2014)..................................................................................................28
`
`iii
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 5 of 37
`
`
`
`TecSec, Inc. v. Int’l Bus. Machs. Corp.,
`731 F.3d 1336 (Fed. Cir. 2013)................................................................................................23
`
`TomTom, Inc. v. Adolph,
`790 F.3d 1315 (Fed. Cir. 2015)..............................................................................................4, 5
`
`In re Varma,
`816 F.3d 1352 (Fed. Cir. 2016)................................................................................................29
`
`Verizon Calif. Inc. v. Ronald A. Katz Tech. Licensing, P.A.,
`326 F. Supp. 2d 1060 (C.D. Cal. 2003) ...................................................................................20
`
`WhitServe LLC v. GoDaddy.com, Inc.,
`2014 WL 5668335 (D. Conn. Nov. 4, 2014) ...........................................................................20
`
`Williamson v. Citrix Online, LLC,
`792 F.3d 1339 (Fed. Cir. 2015) (en banc) ...............................................................................18
`
`Zeroclick, LLC v. Apple Inc.,
`891 F.3d 1003 (Fed. Cir. 2018)..........................................................................................18, 20
`
`Statutes
`
`35 U.S.C. § 101 ................................................................................................................................1
`
`35 U.S.C. § 112 ¶ 6 ......................................................................................................17, 18, 19, 20
`
`iv
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 6 of 37
`
`
`
`I.
`
`INTRODUCTION
`
`This case concerns a single patent: U.S. Patent No. 6,411,941. See Ex. 1. The ’941 Patent has
`
`a lengthy history. It was invented in the late 1990s by Ancora’s president, Mr. Miki Mullor and a
`
`colleague and was described by the Patent and Trademark Office during prosecution as proceeding
`
`against the conventional wisdom in the art to do something “the closest prior art, singly or
`
`collectively,” never contemplated: “using an agent to set up a verification structure in the erasable,
`
`non-volatile memory of the BIOS.” Ex. 2 (Examiner’s Reasons for Allowance) at ANCORA_451.
`
`Moreover, since it issued, the patent has been examined repeatedly. Its claims have been
`
`construed by multiple courts, including the Federal Circuit. Ancora Techs., Inc. v. Apple Inc., 2012
`
`WL 6738761 (N.D. Cal. Dec. 31, 2012) (“Apple I”); Ancora Techs., Inc. v. Apple, Inc., 744 F.3d 732
`
`(Fed. Cir. 2014) (“Apple II”). And its validity has been confirmed repeatedly, including most
`
`recently by the Federal Circuit in Ancora Techs., Inc. v. HTC Am., Inc. (“HTC”), which held that the
`
`asserted claims satisfied 35 U.S.C. § 101 as a matter of law. 908 F.3d 1343 (Fed. Cir. 2018).
`
`In asserting infringement in this matter, Ancora has relied on the entirety of these courts’
`
`guidance. In fact, with limited exceptions, Ancora simply asks this Court to adopt constructions
`
`already reached by prior courts. In contrast, Defendants seek to avoid infringement by offering a raft
`
`of new constructions—constructions that conflict not just with the claims and specification, but the
`
`prior holdings and constructions already provided by prior courts.
`
`II.
`
`BACKGROUND
`
`The ’941 Patent relates to a specific technique for “identifying and restricting of an
`
`unauthorized software program’s operation.” ’941 Patent at 1:6-8.
`
`Specifically, before the ’941 Patent, there were two basic (and sub-optimal) methods of
`
`verifying and restricting the operation of a program. One involved “software-based methods” that
`
`“require[d] writing a license signature on the computer’s hard drive.” HTC, 908 F.3d at 1344. A key
`
`1
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 7 of 37
`
`
`
`“flaw in those methods,” however, “is that such a signature can be changed by hackers without
`
`damaging other aspects of computer functionality.” Id. (citing ’941 Patent at 1:19-26). Hardware-
`
`based methods also existed, but “require[d] inserting a dongle into a computer port to authenticate
`
`the software authorization.” Id. (citing ’941 Patent at 1:27-32). As a result, those “methods are
`
`costly, inconvenient, and not suitable for software sold and downloaded over the internet.” Id.
`
`The ’941 Patent improved over these prior art techniques by “using the memory space
`
`associated with the computer’s basic input/output system (BIOS),[1] rather than other memory space,
`
`to store appropriately encrypted license information to be used in the verification process.” Apple II,
`
`744 F.3d at 733 (citing ’941 Patent at 1:46-2:5, 4:45-48, and 5:19-24). Such BIOS memory space
`
`was and “is typically used for storing programs that assist in the start-up of a computer.” HTC, 908
`
`F.3d at 1345. Prior to the ’941 invention, however, it was not contemplated that operating system
`
`(“OS”) level programs could interact with the BIOS at all—much less “us[e] an agent to setup a
`
`verification structure in the erasable non-volatile memory area of the BIOS.”2 Ex. 2 (Reasons for
`
`Allowance) at ANCORA_451; HTC, 908 F.3d at 1348-49 (stating that “[t]he claimed method here
`
`specifically identifies how that functionality improvement is effectuated in an assertedly unexpected
`
`way: a structure containing a license record is stored in a particular, modifiable, non-volatile portion
`
`of the computer’s BIOS, and the structure in that memory location is used for verification”).
`
`As the Federal Circuit explained, using the BIOS in this unexpected manner “improves
`
`computer security, . . . because successfully hacking BIOS memory (i.e., altering it without
`
`rendering the computer inoperable) is much harder than hacking the memory used by the prior art to
`
`store license-verification information.” HTC, 908 F.3d at 1345.
`
`
`1 The BIOS “is the set of essential startup operations that run when a computer is turned on, which
`tests hardware, starts the operating system, and supports the transfer of data among hardware
`devices.” Apple I, 2012 WL 6738761, at *7.
`
`2
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 8 of 37
`
`
`
`III. AGREED TERMS
`
`Term
`“a computer including an erasable, non-volatile
`memory area of a BIOS of the computer, and a
`volatile memory area” (Claim 1 Preamble)
`“non-volatile memory” (Claims 1, 3, 7, 9, 12,
`16)
`“the verification” (Claim 1)
`
`“using the key” (Claim 8)
`
`IV. DISPUTED TERMS
`
`Agreed Construction
`The parties agree that this portion of the
`preamble is limiting.
`
`“memory whose data is maintained when the
`power is removed”
`“verifying the program using at least the
`verification structure from the erasable
`nonvolatile memory of the BIOS”
`“using a pseudo-unique key”
`
`In this matter, Ancora has asserted that Defendants infringed Claims 1-3, 6-14, and 16 of the
`
`’941 Patent. From these claims, 13 terms and phrases have been identified for construction.
`
`For the Court’s convenience, Ancora addresses these 13 terms and phrases in the order in
`
`which they first appear in the asserted claims. Further, because the majority of these terms and
`
`phrases first appear in Claim 1, Ancora includes that claim in full below—underlining the disputed
`
`phrases and double-underlining/bolding the disputed terms:
`
`1. A method of restricting software operation within a license for use with a
`computer including an erasable, non-volatile memory area of a BIOS of the
`computer, and a volatile memory area; the method comprising the steps of:
`selecting a program residing in the volatile memory;
`using an agent to set up a verification structure in the erasable, non-
`volatile memory of the BIOS, the verification structure accommodating
`data that includes at least one license record,
`verifying the program using at least the verification structure from the
`erasable non-volatile memory of the BIOS, and
`acting on the program according to the verification.
`
`2 All emphases in this brief have been added unless otherwise specified.
`
`
`
`3
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 9 of 37
`
`
`
`1. “license” (Claim 1 - Preamble) / “license record” (Claims 1, 3, 6, 8-9, 14, 16)
`
`Term
`“license”
`
`“license
`record”
`
`
`Ancora’s Construction
`The portion of the preamble reciting
`“A method of restricting software
`operation within a license…” is non-
`limiting, and the term “license” thus
`does not need to be construed.
`“license record” means “a record
`associated with a licensed program
`with information for verifying that
`licensed program”
`
`Defendants’ Construction
`The preamble of the claim is limiting, and
`“license” means “a legal contract between a
`software provider and a user that specifies
`the rights of the user to use, distribute or
`resell the software”
`“license record” means “data indicating
`that a program is licensed”
`
`
`
`
`The terms “license” and “license record” appear in different places in the claims. “License”
`
`appears only in the preamble of Claim 1. “License record” appears in the body of Claim 1 and in
`
`various dependent claims. Because Defendants contend that “license” and “license record” have
`
`different meanings, Ancora addresses these terms separately below.
`
`i) The Court Does Not Need to Construe the Term “License.”
`
`
`
`As noted, the term “license” appears only in the preamble to Claim 1. As such, it does not
`
`need to be construed unless the portion of the preamble in which it appears is limiting. It is not.
`
`A preamble is generally understood to be non-limiting. Thus, to show that “license” should
`
`be construed, Defendants must show that the portion of the preamble in which it resides “recites
`
`essential structure or steps, or if it is ‘necessary to give life, meaning, and vitality’ to the claim.”
`
`TomTom, Inc. v. Adolph, 790 F.3d 1315, 1323 (Fed. Cir. 2015) (citation omitted).
`
`In undertaking this analysis, two points are key. First, “a preamble is not limiting ‘where a
`
`patentee defines a structurally complete invention in the claim body and uses the preamble only to
`
`state a purpose or intended use for the invention.’” Id. (same). Second, the fact that a portion of the
`
`preamble is limiting does not require that the entire preamble to be limiting—particularly if the
`
`remaining portion “is language stating a purpose or intended use.” Id. at 1323-24.
`
`4
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 10 of 37
`
`
`
`TomTom controls here. As stated above, the parties agree that the portion of the preamble of
`
`Claim 1 underlined below is limiting:
`
`1. A method of restricting software operation within a license for use with a
`computer including an erasable, non-volatile memory area of a BIOS of the
`computer, and a volatile memory area; the method comprising . . . :
`
`Unlike the underlined text, however, the portion of the preamble that includes the “license” term
`
`does not provide an antecedent basis for any later term. Nor does it “recite[] essential structure.” Id.
`
`at 1323. Rather, like the preamble at issue in TomTom, it “employs the standard pattern of such [non-
`
`limiting] language: the words ‘a method for a purpose or intended use comprising,’ followed by the
`
`body of the claim, in which the claim limitations describing the invention are recited.” Id.
`
`In fact, the Claim 1 preamble is nearly identical to the one at issue in TomTom, which recited
`
`“[a] method for generating and updating data for use in a destination tracking system of at least one
`
`mobile unit comprising . . . .” Id. at 1322. The Claim 1 preamble similarly starts by stating an
`
`intended use (“A method of restricting software operation within a license for use with [a
`
`computer]”) before reciting structure included in the body of the claim (“a computer including an
`
`erasable, non-volatile memory area of a BIOS of the computer, and a volatile memory area”).
`
`Like the preamble in TomTom, the portion of the Claim 1 preamble describing an intended
`
`use thus is non-limiting. See id.; E-Pass Techs., Inc. v. 3Com Corp., 343 F.3d 1364, 1370 (Fed. Cir.
`
`2003) (“An invention may possess a number of advantages or purposes, and there is no requirement
`
`that every claim directed to that invention be limited to encompass all of them.”). Indeed, the fact
`
`that “license” never appears alone in the body of the claim reinforces that the first part of the
`
`preamble “does not provide an antecedent basis for any of the claims” and thus is non-limiting. Id.
`
`Nevertheless, if the Court does construe the term, it should reject Defendants’ construction.
`
`First, nothing in the intrinsic record supports it. The specification never references the words
`
`“contract,” “agreement,” “right,” “software license,” and “sell/sale.” And limiting the term to a
`
`5
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 11 of 37
`
`
`
`“legal contract between a software provider and a user that specifies the rights of the user to use,
`
`distribute or resell the software” is inconsistent with the understanding that the invention was
`
`intended not only to combat the “proliferation of illegally copied software,” but also to safeguard
`
`against “attack[s] at the hands of skilled system’s programmers (e.g. ‘hackers’).” ’941 Patent at 1:21-
`
`24. Defendants’ construction also is inconsistent with the PTAB’s express finding (later echoed by
`
`the Federal Circuit in HTC) that the invention is not directed to a business method, but instead
`
`“solves a technical problem using a technical solution.” HTC Corp. v. Ancora Techs. Inc., 2017 WL
`
`6032605, at *1 (Patent Tr. & App. Bd. Dec. 1, 2017); accord HTC, 908 F.3d at 1348-49.
`
`Instead, a person of ordinary skill in the art (“POSITA”) would understand “license” to refer
`
`simply to “authorization or verification to run.” As the Federal Circuit recognized, “[t]he patent
`
`describes and claims methods of limiting a computer’s running of software not authorized for that
`
`computer to run.” HTC, 908 F.3d at 1344.
`
`The specification supports this understanding. It states that the “invention relates to a method
`
`and system of identifying and restricting an unauthorized software program’s operation.” ’941 Patent
`
`at 1:6-8. It also describes how, in an embodiment, “there commences an initial license establishment
`
`procedure, where a verification structure is set in the BIOS so as to indicate that the specified
`
`program is licensed to run on the specified computer.” Id. at 1:59-62. The ’941 Patent thus describes
`
`how “the process of verifying a license” can include comparing encrypted records such that:
`
`In the case of match, the program is verified to run on the computer. If on the
`other hand the sought encrypted data record is not found . . . , this means that
`the program under question is not properly licensed and appropriate
`application define action is invoked (e.g. informing to the user on the
`unlicensed status, halting the operation of the program under question etc.).
`
`Id. at 2:14-26.
`
`
`
`Because the term “license” appears only in the non-limiting preamble, it does not need to be
`
`6
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 12 of 37
`
`
`
`construed. If construed, however, it simply means “authorization or verification to run.”
`
`ii) The Court Should Adopt Plaintiff’s “License Record” Construction.
`
`Turning to the “license record” term, Ancora’s proposed construction mirrors the
`
`construction of this term in Apple I—varying only by replacing the word “from” with “associated
`
`with.” Compare 2012 WL 6738761, at *12 (construing the term to mean “a record from a licensed
`
`program with information for verifying that licensed program”), with ’941 Patent at 1:53-57 (“[E]ach
`
`application program that is to be licensed to run on the specified computer[] is associated with a
`
`license record . . . .”). In contrast, Defendants ask the Court to discard the prior construction and
`
`construe license record to mean “data indicating that a program is licensed.”
`
`Defendants’ construction is incorrect and should be rejected for at least two reasons. First,
`
`during the meet and confer process, Defendants stated that they would be willing to agree to the
`
`construction “a record associated with a program with information for verifying that the program is
`
`licensed”—demonstrating that the crux of the parties’ dispute centers on whether the license record
`
`must contain “information for verifying th[e] licensed program” or “information for verifying that a
`
`program is licensed.” And as Ancora explained to Defendants, their “is licensed” construction
`
`distorts the specification by suggesting that the program from which the license record is derived
`
`must have a specific legal or contractual status. As explained above at page 6, the specification
`
`makes clear that the ’941 Patent uses the word “licensed” to refer to authorization or verification to
`
`run—a concept that can include a program’s legal or contractual status, but is not limited to it.
`
`This understanding is squarely supported by the specification, which the Apple I court
`
`recognized teaches that “a license record ‘may include terms, identifications, specifications, or
`
`limitations related to the manufacturer of a software product, the distributor of a software product,
`
`the purchaser of a software product, a licensor, a licensee, items of computer hardware or
`
`components thereof, or to other terms and conditions related to the aforesaid.’” 2012 WL 6738761,
`
`7
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 13 of 37
`
`
`
`at *11 (quoting ’941 Patent at 6:11-17). Thus, for example, a license record could comprise only
`
`information sufficient to identify a program’s manufacturer—provided that it allows the program to
`
`be verified to run on the computer. See ’941 Patent at 5:27-33 (“The volatile memory accommodates
`
`a license program (16) having license record fields (13-15) . . . . By way of example said fields stand
`
`for Application names . . . , Vendor name . . . , and number of licensed copies . . . .”).
`
`Second, the proposed construction of “data indicating that a program is licensed” also is
`
`incorrect because it suggests that the data must reflect information about the program’s status. The
`
`specification states, however, that the licensed record simply needs to allow for verification; it does
`
`not need to indicate itself whether a program is verified or authorized to run. ’941 Patent at 2:5-10
`
`(“The actual format of the license may include a string of terms that correspond to a license
`
`registration entry (e.g. lookup table entry or entries) at a license registration bureau . . . .”).
`
`2. “volatile memory” (Claims 1, 6, 9, 11)
`
`Term
`“volatile memory”
`
`Ancora’s Construction
`“memory whose data is not
`maintained or becomes inaccessible
`when the power is removed”
`
`Defendants’ Construction
`“memory whose data is not
`maintained when the power is
`removed”
`
`
`The parties agree that volatile memory means memory whose data is not maintained when
`
`the power is removed. They disagree only as to whether the term also includes memory whose data
`
`“becomes inaccessible” after the power is removed. As the Federal Circuit already has held, it does.
`
`In Apple II, the Federal Circuit held that, “as a general matter, ‘[t]o one of ordinary skill in
`
`the art, a volatile memory is memory whose data is not maintained when the power is
`
`removed . . . .’” 744 F.3d at 737 (quoting Apple I, 2012 WL 6738761, at *4). The Federal Circuit
`
`then went on to identify an important exception to that “general” understanding—explaining that the
`
`’941 Patent’s disclosure “of a hard disk as ‘volatile’ memory” showed that the ’941 Patent
`
`contemplated that memory typically thought of as non-volatile also fell within the scope of the term
`
`8
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 14 of 37
`
`
`
`“volatile memory” to the extent such memory was being used in a volatile manner. Id. at 737-38.
`
`The Federal Circuit even identified an example of when non-volatile memory could be
`
`understood to be operating in a volatile manner, explaining:
`
`it is well known that a computer’s hard disk is routinely used as ‘virtual’
`memory to provide temporary storage when there is insufficient RAM to
`complete an operation, in which case (it is undisputed) the data become
`inaccessible through the usual means once power is removed (even if the data
`can still be found on the hard disk by more sophisticated means).
`
`Id. at 738 (internal citations omitted).
`
`Thus, unlike Defendants’ construction, Plaintiff’s construction adheres to the entirety of the
`
`Federal Circuit’s guidance and recognizes that “volatile memory” includes both (1) memory whose
`
`data is not maintained when the power is removed and (2) memory whose data becomes inaccessible
`
`when the power is removed such that it is recoverable only through “sophisticated means.” Id.; see
`
`Ex. 7 (Jestice Decl.) at ¶¶ 10-12. Accordingly, Ancora’s construction should be adopted.
`
`3. “BIOS” (Claims 1, 3, 7, 9, 12, 16)
`
`Term
`BIOS
`
`Ancora’s Construction
`“An acronym for Basic Input/ Output
`System. It is the set of essential startup
`operations that run when a computer is
`turned on, which test hardware, starts
`the operating system, and support the
`transfer of data among hardware
`devices.”
`
`Defendants’ Construction
`“An acronym for Basic Input / Output
`System. It is the set of essential startup
`operations stored in ROM that run
`automatically when a computer is turned
`on, which test hardware, starts the
`operating system, and support the transfer
`of data among hardware devices.”
`
`
`Ancora’s construction of BIOS is taken verbatim from the district court’s claim construction
`
`order in Apple I, which is entitled to deference. Kinetic Concepts, Inc. v. Wake Forest Univ. Health
`
`Scis., 2013 WL 6164592, at *3 (W.D. Tex. Nov. 25, 2013) (stating that the court “gives reasoned
`
`deference to the decisions of other district courts that have construed these claims”). Departing from
`
`that construction, Defendants seek to insert two additional limitations: (1) that BIOS be “stored in
`
`ROM” and (2) that BIOS “run automatically.” Neither of these new limitations is proper.
`
`9
`
`

`

`Case 1:20-cv-00034-ADA Document 47 Filed 04/09/20 Page 15 of 37
`
`
`
`i) Defendants’ “Stored in ROM” Limitation Conflicts with the Patent.
`
`Nothing in the specification requires that BIOS be stored entirely in a particular memory
`
`medium—let alone ROM (read only memory). To the contrary, the ’941 Patent states that, at most,
`
`the BIOS may include a “ROM section” or “ROM portion.” ’941 Patent at 1:46-48; id. at 2:12-19
`
`(referencing a “ROM portion of the BIOS”); id. at 2:29-32 (same), 2:36-39 (same), 4:59-61 (same).
`
`It also states, however, that other sections of BIOS may exist, including an E2PROM section. Id. at
`
`1:65-2:1. Further, and to be clear, ’941 Patent explains that its references to both sections are entirely
`
`exemplary and “non-limiting.” Id. at 4:49-54 (“According to one, non-limiting, preferred
`
`embodiment of the present invention, the first non-volatile memory area is a ROM section of a
`
`BIOS; the second non-volatile memory area is a E2PROM section of a BIOS; and the volatile
`
`memory is a RAM e.g. hard disk and/or internal memory of the computer.”).
`
`Nothing more is needed to reject Defendants’ ROM limitation. Broadcom Corp. v. Emulex
`
`Corp., 732 F.3d 1325, 1333 (Fed. Cir. 2013) (“[A]n interpretation which excludes a [disclosed]
`
`embodiment from the scope of the claim is rarely, if ever, correct.” (brackets in original, citation and
`
`quotation marks omitted)). Nevertheless, more exists.
`
`The ’941 Patent also describes a preferred embodiment without limiting it to including ROM
`
`or any other specifi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket