throbber
Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 1 of 24
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`
`ANCORA TECHNOLOGIES, INC.,
`
`CIVIL ACTION NO. 1:20-cv-0034
`
`Ancora,
`
`v.
`
`LG ELECTRONICS INC. and LG
`ELECTRONICS U.S.A., INC.,
`
`Defendants.
`
`JURY TRIAL DEMANDED
`
`ANCORA TECHNOLOGIES, INC.,
`
`CIVIL ACTION NO. 1:20-cv-0034
`
`Ancora,
`
`
`
`v.
`
`JURY TRIAL DEMANDED
`
`SAMSUNG ELECTRONICS CO., LTD. and
`SAMSUNG ELECTRONICS AMERICA,
`INC.,
`
`Defendants.
`
`DEFENDANTS’ REPLY CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 2 of 24
`
`
`
`Table of Contents
`
`I.
`
`II.
`
`INTRODUCTION .............................................................................................................. 1
`
`ARGUMENT ...................................................................................................................... 1
`
`“using an agent to set up a verification structure in the erasable, non-
`volatile memory of the BIOS” ................................................................................ 1
`
`“set up a verification structure” .............................................................................. 4
`
`“memory of the BIOS” ........................................................................................... 8
`
`“verifying the program using at least the verification structure” .......................... 11
`
`“acting on the program according to the verification” .......................................... 12
`
`“license”/“license record” ..................................................................................... 12
`
`Order of Steps ...................................................................................................... 15
`
`“BIOS” ................................................................................................................. 15
`
`“selecting a program residing in the volatile memory” ....................................... 16
`
`“program” ............................................................................................................. 17
`
`“volatile memory” ................................................................................................. 17
`
`“first non-volatile memory area of the computer” ............................................... 18
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`F.
`
`G.
`
`H.
`
`I.
`
`J.
`
`K.
`
`L.
`
`
`
`
`
`
`
`ii
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 3 of 24
`
`
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`
`
`Cases
`
`Akamai Techs., Inc. v. Limelight Networks, Inc.,
`805 F.3d 1368 (Fed. Cir. 2015)....................................................................................13, 15, 16
`
`Ancora Techs., Inc. v. Apple, Inc.,
`744 F.3d 732 (Fed. Cir. 2014)............................................................................................12, 17
`
`Ancora Techs., Inc. v. HTC Am., Inc.,
`908 F.3d 1343 (Fed. Cir. 2018)..........................................................................................12, 13
`
`Astrazeneca LP v. Apotex, Inc.,
`633 F.3d 1042 (Fed. Cir. 2010)................................................................................................10
`
`Atmel Corp. v. Info. Storage Devices, Inc.,
`198 F.3d 1374 (Fed. Cir. 1999)..................................................................................................4
`
`Digital Retail Apps, Inc. v. H-E-B,
`LP, 2020 WL 376664 (W.D. Tex. Jan. 23, 2020) ..............................................................2, 3, 4
`
`Indacon, Inc. v. Facebook, Inc.,
`824 F.3d 1352 (Fed. Cir. 2016)..................................................................................................6
`
`Nokia Sols. & Networks US LLC v. Huawei Techs. Co.,
`2017 WL 2226413 (E.D. Tex. May 19, 2017) .........................................................................16
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005)..................................................................................................3
`
`Prowess, Inc. v. RaySearch Labs., AB,
`953 F. Supp. 2d 638 (D. Md. 2013) ...................................................................................16, 17
`
`Williamson v. Citrix Online, LLC,
`792 F.3d 1339 (Fed. Cir. 2015)..............................................................................................1, 3
`
`Zeroclick, LLC v. Apple Inc.,
`891 F.3d 1003 (Fed. Cir. 2018)..............................................................................................1, 4
`
`Statutes
`
`35 U.S.C. § 112 ............................................................................................................................1, 4
`
`iii
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 4 of 24
`
`I.
`
`INTRODUCTION
`
`
`
`In its responsive brief, Ancora continues to advocate for positions that are in tension with
`
`the ’941 Patent’s specification, the applicants’ statements to the USPTO, and the positions taken
`
`by Ancora in related litigations and appeals. Notably, Ancora now relies on a confidential Beeble
`
`White Paper from 2001, nearly three years after the patent was filed. Besides not being relevant to
`
`a skilled artisan’s understanding at the time of the alleged invention, the Paper only undermines
`
`Ancora’s positions and underscores that Defendants’ constructions are correct.
`
`II. ARGUMENT
`A.
`
`“using an agent to set up a verification structure in the erasable, non-volatile
`memory of the BIOS”
`
`Relying primarily on Zeroclick, LLC v. Apple Inc., 891 F.3d 1003 (Fed. Cir. 2018),
`
`Ancora’s argument is premised on the idea that if the term “agent” is found to be software, the
`
`limitation is no longer subject to 35 U.S.C. § 112, ¶ 6. Ancora’s argument is flawed in multiple
`
`respects. First, as Defendants’ expert has opined, the term “agent” can connote software, hardware,
`
`or a combination of hardware and software. Second, even if the term “agent” denotes software,
`
`contrary to Ancora’s position, courts have not found that software alone categorically connotes
`
`sufficient structure, particularly post-Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1351 (Fed.
`
`Cir. 2015). (See Dkt. 45 at 7-8, n. 4.) Finally, even if the term “agent” connotes software, it cannot
`
`indicate structure at the pertinent time because, as Ancora expressly admits, the claimed “agent”
`
`was alleged to be novel and could not exist prior to the filing of the ’941 Patent. Unlike Zeroclick,
`
`the claimed invention is not merely an update of an existing program that can signify structure.
`
`The term “agent” is a nonce term and is not limited to software: Ancora’s argument is
`
`premised on the assertion that the term “agent” connotes software, as opposed to hardware or a
`
`combination of hardware and software. As explained by Defendants’ expert, a skilled artisan
`
`
`
`1
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 5 of 24
`
`
`
`would not arrive at such a conclusion. (Dkt. 45-1 at ¶¶ 54-55.) The Examiner did not, as Ancora
`
`argues, state that “he understood ‘agent’ to be synonymous with a software ‘program.’” (Dkt. 50
`
`at 3.) The Examiner merely identified certain programs as potential “agents.” (Dkt. 44-5 at
`
`ANCORA_426-428.)
`
`Ancora’s argument that Dr. Zadok’s research papers undermine his position that an “agent”
`
`can be software or hardware is unavailing. (See Dkt. 50 at 6.) As Ancora acknowledges, Dr.
`
`Zadok’s papers refer to “agent-daemons” and The Interposition Agents Toolkit. Both “daemon”
`
`and “toolkit” have a well-known meaning in the art and both identify a specific type of software
`
`to persons of skill. Zadok Supp. Decl. at ¶¶ 5-6. Thus, Dr. Zadok’s reliance on modifiers before
`
`the term “agent” that point to specific software simply underscores his opinion that the term
`
`“agent” alone can connote software or hardware. See id.at ¶¶ 5-8.1
`
`In contrast, the term “agent” does not include any modifier in the claims of the ’941 Patent
`
`and Ancora does not dispute that the term “agent” is ascribed different functions across claims 1
`
`and 18. (Dkt. 50 at 8.) Ancora argues that “simpler claims require simpler disclosures,” suggesting
`
`that the “agent” in claim 1 is somehow not a nonce word because it performs less tasks than in
`
`claim 18. Id. But Ancora’s argument misses the point; by ascribing different roles to the “agent”
`
`across the claims, the patent uses “agent” as a black box for generic hardware/software, confirming
`
`its status as a nonce word.
`
`Courts have not found that software alone categorically connotes sufficient structure:
`
`Interpreting “agent” as a nonce word is consistent with the Court’s recent decision in Digital Retail
`
`Apps, Inc. v. H-E-B, LP, 2020 WL 376664, at *5 (W.D. Tex. Jan. 23, 2020). Ancora argues that
`
`
`1 Notably, Ancora neglects to identify a paper where Dr. Zadok expressly mentions “software
`agents,” which underscores that “software” must precede “agent” in order to clarify that the
`“agent” at issue is a software implementation. See id. at ¶ 7.
`
`2
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 6 of 24
`
`
`
`the term “agent” should be found to connote sufficient structure because the Court noted in Digital
`
`Retail Apps that “software can serve as a corresponding structure.” (Dkt. 50 at 7.) Ancora
`
`misinterprets the Court’s decision and conflates the two steps of the Williamson analysis. The
`
`Court did not find that software generally connotes sufficient structure to avoid means-plus-
`
`function claiming. Rather, the Court noted that software can serve as a “corresponding” structure
`
`as part of the second prong of the means-plus-function analysis, i.e., after a term is found to be a
`
`nonce word. Digital Retail Apps, 2020 WL 376644, at *6. Post-Williamson, many courts have
`
`found terms like “software” do not to indicate sufficient structure. (See Dkt. 45 at 7-8, n. 4.)
`
`The claimed agent was alleged to be novel and not known to skilled artisan at the time
`
`of the alleged invention: Ancora’s responsive brief all but admits that the term “agent,” as used in
`
`the ’941 Patent, would not have connoted sufficient structure to a skilled artisan at the time of the
`
`alleged invention. To provide a description of an embodiment of the invention to the USPTO, the
`
`only evidence the applicants were able to muster was a confidential White Paper (the “Beeble
`
`White Paper” or the “Paper”) from 2001 authored by one of the inventors. (Dkt. 50 at 5.) Given
`
`that the Beeble White Paper was from nearly three years after the ’941 Patent was filed, it should
`
`not be considered when analyzing how a skilled artisan would have interpreted the term “agent”
`
`at the time the ’941 Patent was filed. See Phillips v. AWH Corp., 415 F.3d 1303, 1313 (Fed. Cir.
`
`2005) (“[T]he ordinary and customary meaning of a claim term is the meaning that the term would
`
`have to a person of ordinary skill in the art in question at the time of the invention.”).2
`
`Nonetheless, the Beeble White Paper demonstrates that, even as of September 2001, the
`
`“agent” was still being developed. As Ancora acknowledges, the paper explained that “‘[i]n order
`
`for a user to access the BIOS EEPROM[,] proprietary software’ needed to be developed.” (Dkt.
`
`
`2 Additionally, there is no evidence that inventors were persons of ordinary skill in the relevant
`time frame, as opposed to persons of extraordinary skill.
`
`3
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 7 of 24
`
`
`
`50 at 5.) The Paper demonstrates that the claimed “agent” stands in stark contrast to the claimed
`
`invention examined in Zeroclick. Unlike the “existing” programs in Zeroclick, the Beeble White
`
`Paper states that the Beeble system was “proprietary,” (Dkt. 50-2 at 3)3, “not commercially
`
`available,” id. at 4, “next generation software licensing technology,” id. at 9. Similarly, to
`
`overcome a § 101 challenge by HTC, Ancora previously emphasized that, while “HTC attempts
`
`to justify consideration of only a small portion of claim 1 arguing that the ‘using an agent’
`
`limitation merely uses software,” “such ‘software’ did not exist on generic computers.” Ex. 32
`
`(Ancora Reply Brief in HTC CAFC) at 6. A skilled artisan at the time of the alleged invention,
`
`nearly three years before the Beeble White Paper, would not have understood the term “agent” to
`
`provide sufficient structure, given this context, but would have understood it to be a nonce word.
`
`The corresponding structure is disclosed at 6:18-28: Ancora cannot rely on the Beeble
`
`White Paper to augment the corresponding structure that “set[s] up a verification structure in the
`
`erasable, non-volatile memory of the BIOS.” Notably, neither the Beeble White Paper nor its
`
`details were incorporated into the specification, directly or by reference.4 Rather, the
`
`corresponding structure for “set[ting] up a verification structure in the erasable, non-volatile
`
`memory of the BIOS” is set forth at 6:18-28 of the ’941 Patent. (See Dkt. 45 at 10-11.) Defendants
`
`have addressed Ancora’s “alternative disclosures” in their responsive brief. (Dkt. 49 at 7.)
`
`B.
`
`“set up a verification structure”
`
`Ancora attempts to trivialize the disclosure in the specification and the applicants’
`
`statements in the prosecution history by characterizing them as exemplary and non-limiting. But
`
`
`3 Unless otherwise noted, any emphasis in this brief has been added.
`4 This raises questions as to whether the specification meets the enablement, written description,
`and best mode requirements of 35 U.S.C. § 112. Even if the Beeble White Paper had been
`incorporated by reference into the specification, the structure required by 35 U.S.C. § 112, ¶ 6
`cannot be supplied by the contents of a non-patent material cited in the specification. See Atmel
`Corp. v. Info. Storage Devices, Inc., 198 F.3d 1374, 1382 (Fed. Cir. 1999).
`
`4
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 8 of 24
`
`
`
`the intrinsic evidence consistently requires that the “verification structure” is set up by encrypting
`
`a license record using a pseudo-unique key for each computer.
`
`The specification and claims support Defendants’ construction: As Ancora
`
`acknowledges, (Dkt. 50 at 10), the “Summary of the Invention” notes that “[t]he present invention
`
`relates to a method of restricting software operation within a license limitation,” and explains that
`
`“[t]his method strongly relies on the use of a key and of a record, which have been written into
`
`the non-volatile memory of a computer.” ’941 Patent at 1:39-43. Thus, the patent is clear that “the
`
`present invention” “strongly relies” on the use of “a key” unique to a “computer” for encryption.
`
`Ancora argues that the Fig. 2 embodiment of the ’941 Patent dictates otherwise, because
`
`“the specification expressly permits the ‘setting up’ step to be satisfied by actions other than
`
`‘encrypting a license record using a pseudo-unique key,’ including ‘establishing or certifying the
`
`existence of a pseudo unique key in the first non-volatile memory area.’” (Dkt. 50 at 10.) Ancora
`
`mischaracterizes the specification. The specification states that step 18 of setting up the
`
`verification structures includes the sub-steps of “establishing or certifying the existence of a
`
`pseudo-unique key . . . and establishing at least one license-record location,” i.e., both sub-steps
`
`are required. ’941 Patent at 6:18-22. The ’941 Patent is explicit that “[e]stablishing a license-record
`
`includes the steps of . . . forming a license-record by encrypting of the contents used to form a
`
`license-record with other predetermined data contents, using the key.” Id. at 6:23-26. Accordingly,
`
`setting up the verification structure requires identifying a pseudo-unique key and using the pseudo-
`
`unique key to create an encrypted license record for the computer.
`
`Contrary to Ancora’s position, (Dkt. 50 at 11), the claims do not require a different result.
`
`Defendants’ construction does not render the language of claim 8, “forming a license-record by
`
`encrypting of the contents used to form a license-record with other predetermined data contents,
`
`5
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 9 of 24
`
`
`
`using the key,” superfluous. The doctrine of claim differentiation only requires that there be some
`
`difference between the claims. Indacon, Inc. v. Facebook, Inc., 824 F.3d 1352, 1358 (Fed. Cir.
`
`2016) (“[W]e have declined to apply the doctrine of claim differentiation where, as here, the claims
`
`are not otherwise identical in scope.”). Defendants’ construction requires creating a license record
`
`in claim 1 that contains information from or about the license. Claim 8 adds the limitation that the
`
`license record is combined “with other predetermined data contents.”5 And even if Defendants’
`
`construction did render all or a portion of claim 8 superfluous, claim differentiation is not a hard
`
`and fast rule of construction and cannot be used to broaden claims beyond their correct scope as
`
`set forth in the specification and the prosecution history. (See Dkt. 49 at 9.)6
`
`The prosecution history supports Defendants’ construction: Here, the applicants were
`
`clear during prosecution regarding the scope of their invention. The applicants overcame a
`
`rejection based on the Ginter reference by arguing that the present invention sets up the verification
`
`structure by using a pseudo-unique key to encrypt a license record. (See Dkt. 45 at 11-13; Dkt. 49
`
`at 7-9.) Ancora argues that the applicants did not distinguish claim 1 over Ginter based on a lack
`
`of disclosure in Ginter about encrypting a license record using a key because the Examiner did not
`
`reject claim 1 on that ground. (Dkt. 50 at 12.) But Ancora cannot be correct because that rejection,
`
`dated December 20, 2000, rejected claim 1 based on Ginter alone. (Dkt. 45-5 at 2.) And, as part of
`
`its May 23, 2001 response, the applicants not only distinguished Ginter on the ground that it did
`
`not disclose encrypting a license record using a key, but also amended claim 1 to make clear that
`
`“the first non volatile memory accommodates data that includes [the] unique key.” Ex. 33 at
`
`
`5 Use of “the” key in claim 8 means that the key must find antecedent basis. Claim 6 does not refer
`to any key. Thus, “the key” in claim 8 must be present in claim 1.
`6 Ancora does not allege an inconsistency between the language of claim 7 and Defendants’
`construction. The requirement that the agent “form[] a structure by encrypting a license record
`using a pseudo-unique key for each computer” originates from the proper construction of claim 1,
`upon which claim 7 depends.
`
`6
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 10 of 24
`
`
`
`ANCORA_347. The amendment highlights what the applicants thought differentiated their alleged
`
`invention from Ginter’s, i.e., using a key unique to each computer to encrypt the license record.
`
`Ancora tries to paint the applicants’ statements during prosecution as “equivocal.” (Dkt.
`
`50 at 13.) They were not. The fact that the applicants noted that “[i]n a preferred embodiemt [sic],
`
`a key resides in a first non-volatile part of a computer’s memory,” (Dkt. 45-6 at 5), does not weigh
`
`against Defendants’ construction. The applicants were not, as Ancora suggests, articulating that “a
`
`key” is used only in a preferred embodiment, but rather that, in a preferred embodiment, the key
`
`is stored in a particular location, i.e., the a first non-volatile part of a computer’s memory.
`
`Nor were the applicants’ limiting remarks directed to a particular embodiment, as Ancora
`
`suggests. (Dkt. 50 at 12.) The fact that the applicants highlighted independent claim 20 as an
`
`example in their response, (Dkt. 50 at 13), is of no import, as the applicants were simultaneously
`
`trying to overcome the Examiner’s rejection of claim 1.
`
`Rather, the applicants consistently described the “present invention” and “present method”
`
`as encrypting a license record using a pseudo-unique key for each computer. (See Dkt. 45-6 at 8)
`
`(“In the present invention, a unique key is stored in the first non-volatile memory of the
`
`computer.”); Id. (“In the present method, the verification structure is formed by using a unique key
`
`for each computer and license record information in the software.”); Id. at 9 (“In contrast to Ginter
`
`et al., the present invention provides a system and method . . . that overcomes the problems with
`
`the stationary object in Ginter et al.”). The Beeble White Paper also confirms that the inventors
`
`were relying upon the same technique in the Beeble system. See Zadok Supp. Decl. at ¶ 11.
`
`Finally, Ancora’s description of the language of the February 5, 2002 Response as
`
`“inartfully” referring to the patentee’s simultaneous amendment of Claim 16 is made of whole
`
`cloth. (Dkt. 50 at 13.) The applicants’ argument did not refer to claim 16, but rather stated that the
`
`7
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 11 of 24
`
`
`
`identification information of Ewertz “corresponds to the pseudo-unique key stored in the first non-
`
`erasable, non-volatile memory as recited in claims 1 and 20.” (Dkt 45-10 at 4 (emphasis
`
`modified).) Ancora provides nothing to support its re-writing of otherwise clear file history.
`
`C.
`
`“memory of the BIOS”
`
`A key aspect of the purported invention is that it relies upon the “memory of the BIOS” in
`
`a computer to store license data because the BIOS memory is more difficult to access and less
`
`susceptible to tampering than any other memory in the computer. ’941 Patent at 3:4-17. The
`
`applicants clarified during prosecution that BIOS memory was harder to access because it was not
`
`recognized by the operating system as a storage device and lacked a file system. (See Dkt. 45 at
`
`14-16.) Ancora now wants to discount those statements by portraying them as merely describing
`
`shortcomings of prior art and not pertinent to the invention. (Dkt. 50 at 14-16.) Though the
`
`statements by the applicants may have described the shortcomings of the BIOS modules available
`
`at the time of the invention, the applicants adopted those BIOS modules in their invention without
`
`any modification and burdened with those shortcomings. (See Dkt. 46 at 11-12.) Thus, the claims
`
`are circumscribed by those limitations of the BIOS module.
`
`The Beeble White Paper should not play any role in construing the claim. But the Paper is
`
`informative because it confirms that the applicants were indeed employing BIOS modules in their
`
`alleged invention that mirror Defendants’ proposed construction:
`
`No support by OS: The Beeble White Paper confirms that operating systems at the time of
`
`the invention—and even years later—did not support accessing BIOS modules. The Paper states
`
`that “[u]nlike disk drives, access to BIOS is limited and not supported in operating systems” and
`
`that proprietary software to access the BIOS EEPROM needed to developed as of 2001. (Dkt. 50-
`
`2 at 4.) The Paper further asserts that “Beeble accesses . . . BIOS EEPROM through direct memory
`
`read and write operations” and denigrates “[o]ther software licensing systems, which rely on
`
`8
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 12 of 24
`
`
`
`standard OS IO support to access the licensing information.” (Dkt. 50-2 at 4.) In short, the Beeble
`
`system did not rely upon “standard OS IO support” to access BIOS memory because operating
`
`systems did not support BIOS memory. See Zadok Supp. Decl. at ¶¶ 12-16.
`
`No file system: The Beeble White Paper confirms that the BIOS modules used in the Beeble
`
`system at the time did not have a file system under the generally accepted understanding of the
`
`term. The paper mentions access to “Beeble licenses in EEPROM . . . is achieved by a ‘Beeble
`
`File System’ component.” (Dkt. 50-2 at 7.) Use of quotes around the phrase “Beeble File System”
`
`itself implies that it is not a file system. The remainder of the section confirms that the term “Beeble
`
`File System” is a misnomer because it lacks the functionality present in file systems that were
`
`generally available when the ’941 Patent was filed. See Zadok Supp. Decl. at ¶¶ 17-18.
`
`Use of BIOS EEPROM: The Paper confirms the applicants relied exclusively on BIOS
`
`memory, and not any other memory, to store license data: “Access to the BIOS EEPROM (where
`
`BXL licenses are stored) is not trivial, requires thought and effort.” (Dkt. 50-2 at 4.) Using other
`
`memory, such as a hard disk, that was trivial to access would eviscerate the benefit of the alleged
`
`invention.7 The Paper contradicts Ancora’s current assertion that the claims encompass any
`
`memory that is somehow “associated” with BIOS.8 See Zadok Supp. Decl. at ¶ 13.
`
`Thus, when the applicants identified the shortcomings of BIOS modules to USPTO in
`
`February 2002 response, they were not merely identifying shortcomings of other prior art. Instead,
`
`
`7 To argue that “memory of the BIOS” cannot store the BIOS software, Ancora mischaracterizes
`Defendants’ positon. (Dkt. 50 at 16.) As Defendants clarified earlier, the “memory of the BIOS”
`can contain a ROM portion and an EEPROM portion. The ROM portion contains the BIOS
`software that is installed by the computer vendor during manufacturing. The “agent” can store the
`encrypted verification structure in the EEPROM. (Dkt. 49 at 30.)
`8 Ancora cites to several cases to argue that disclaimer does not apply when an applicant describes
`the features of prior art. (Dkt. 14 at 14.) Such cases are irrelevant because the applicants have
`admitted that they were using a “standard component on the motherboard” and “already-existing
`memory in which the BIOS was stored.” (Dkt. 49 at 11-12.) The Paper further affirms that.
`
`9
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 13 of 24
`
`
`
`they were referring to BIOS modules that were part of their invention and were being
`
`contemporaneously employed in the Beeble system, as described in the Beeble White Paper, dated
`
`September 2001. Thus, the applicants correctly represented to the USPTO, in contrast to Ancora’s
`
`argument now, that their invention relied upon BIOS modules that were not supported by an
`
`operating system and that lacked a file system.9
`
`Finally, Ancora creates a strawman to argue that Defendants’ construction would render
`
`the invention inoperable because it would not be possible for an “OS-level software agent” to set
`
`up a verification structure in the BIOS memory that was burdened by the shortcomings identified
`
`by the applicants during prosecution. (Dkt. 50 at 15.) Contrary to Ancora’s assertion, the Paper
`
`demonstrates that the Beeble system accessed the BIOS module using vendor-provided interfaces
`
`without ever invoking “OS-level” functionality.10 See Zadok Supp. Decl. at ¶ 19. When describing
`
`the functionality of “Kernel mode Driver,” a construct that allegedly corresponds to the claimed
`
`“agent,” the Paper states that a “driver-level implementation allows Beeble direct access to the
`
`BIOS EEPROM needed to store licenses.” (Dkt. 50-2 at 7.) Because a “driver-level
`
`implementation” does not connote OS-level operation, the BIOS modules could be accessed at the
`
`time the invention without resorting to OS-level programs. See Zadok Supp. Decl. at ¶¶ 15, 19.
`
`Ancora’s argument rests on the mistaken assumption that the “agent” must operate only at
`
`
`9 This is also consistent with the Examiner’s understanding that the “agent” provided access to the
`BIOS memory that the OS-level programs could not access. (Dkt. 45 at 17.) The Examiner did not
`characterize “agent” as an OS-level entity. Ancora blatantly edits Examiner’s statements and
`inserts “[OS-level software]” without any justification. (Dkt. 50 at 16.)
`10 Ancora’s reliance on Astrazeneca LP v. Apotex, Inc., 633 F.3d 1042 (Fed. Cir. 2010) is to no
`avail. (Dkt. 50 at 15.) The Beeble White Paper demonstrates that the alleged invention can
`operate with BIOS modules that are not seen as storage devices by the OS and lack a file system.
`Astrazeneca relied on unrebutted expert testimony from the plaintiff stating that the claimed
`invention would be inoperable under the defendant’s construction. Id. at 1053, n1. Here, Mr.
`Jestice has not offered such an opinion whereas Defendants’ expert has explained that the alleged
`invention can operate without resorting to the operating system. See Zadok Supp. Decl. at ¶ 19.
`
`10
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 14 of 24
`
`
`
`the OS-level. The Paper demonstrates that the applicants did not consider the “agent” to be an
`
`“OS-level software,” but viewed the Beeble “agent” as a “driver-level implementation” that
`
`operates outside the traditional operating system.11 See Zadok Supp. Decl. at ¶ 15. In fact, the
`
`applicants believed that one of the benefits of using the Beeble system was that it did not rely upon
`
`standard OS IO support. (Dkt. 50-2 at 4.) Thus, Ancora’s argument that the term “agent” was
`
`added to connote exclusive “OS-level” operation contradicts how the applicants viewed their
`
`invention. Notably, Ancora does not cite to any explicit statements by the applicants to that effect.
`
`The Beeble White Paper explains why.12 See Zadok Supp. Decl. at ¶¶ 15, 19.
`
`D.
`
`“verifying the program using at least the verification structure”
`
`During prosecution, the applicants unequivocally stated that “[s]oftware license
`
`management applications, such as the one of the present invention, are operating system level
`
`programs.” (Dkt. 45-10 at 5.) Ancora argues that Defendants have taken this statement “out of
`
`context” to argue that the claimed steps of the invention operate at the OS-level. (Dkt. 50 at 17.)
`
`But Ancora previously argued to the Federal Circuit that this exact statement means precisely what
`
`Defendants say it means. (See Dkt. 49 at 15 (citing Dkt. 49-5 at 17).) And the specification
`
`confirms this understanding, noting that a “license verifier application, that is a priori running in
`
`the computer,” performs the verification of a license. ’941 Patent at 2:12-19. Ancora’s newfound
`
`
`11 Though each step of claim 1 is performed at the OS-level, the “agent” itself operates outside of
`the operating system. An OS-level application, while operating at the OS-level, can invoke the
`claimed “agent” to access BIOS memory. The “agent” performs its claimed function without
`invoking OS-level functionality. Zadok Supp. Decl. at ¶ 19. The Beeble system mirrors that.
`12 Ancora has yet to produce transcripts of Mr. Mullor’s depositions in prior litigations. Excerpts
`of Mr. Mullor’s deposition from the Apple Litigation were attached as Ex. 1007 to a petition for
`CBM review filed with the PTAB by HTC. Review of the transcript further indicates Ancora’s
`litigation positions diverge from Mr. Mullor’s prior testimony: Mr. Mullor does not recollect what
`transpired in the meeting with the Examiner, (Ex. 34 pp. 35-37); does not recollect who came up
`with idea to add agent to the claims (Id., pp. 16-17); admitted he was not the first person to invent
`BIOS (Id., pp. 19-20); and discussed how Beeble accessed BIOS memory using the DMI
`specification without mentioning use of operating system (Id., pp. 26-28).
`
`11
`
`

`

`Case 1:20-cv-00034-ADA Document 52 Filed 04/27/20 Page 15 of 24
`
`
`
`argument that “the patentee used the term ‘agent’ to mark when an OS-level program/application
`
`was required,” (Dkt. 50 at 17), has no support in the patent or the prosecution history, and instead
`
`directly contradicts Ancora’s previous arguments to the Federal Circuit. (See Dkt. 49 at 14-16.)
`
`E.
`
` “acting on the program according to the verification”
`
`Ancora improperly seeks to avoid the limitations imposed on the “acting” step by the
`
`intrinsic evidence. First, Ancora argues that the scope of the “acting” limitation is not based on
`
`whether a program is “licensed” or “not licensed.” (Dkt. 50 at 19.) But the claim language shows,
`
`and Ancora agrees, that the “acting” step relies upon “the verification” performed in the
`
`“verifying” step, (Dkt. 50 at 24, n.6), which Ancora further agrees includes “confirming whether
`
`a program is licensed.” Id. at 17. Second, Ancora argues that construing the “acting” step to mean
`
`“allowing” or “restricting” a program’s use is inconsistent with the specification, but these precise
`
`terms are employed in the specification, which (1) states that “[a]cting (20) on the program
`
`includes

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket