Fortinet, Inc. v. SRI International, Inc.
Filing
92
CLAIMS CONSTRUCTION ORDER. Signed by Judge JEFFREY S. WHITE on 10/22/13. (jjoS, COURT STAFF) (Filed on 10/22/2013)
1
2
3
4
5
IN THE UNITED STATES DISTRICT COURT
6
FOR THE NORTHERN DISTRICT OF CALIFORNIA
7
8
FORTINET, INC.,
9
Plaintiff,
United States District Court
For the Northern District of California
10
11
v.
CLAIM CONSTRUCTION ORDER
SRI INTERNATIONAL, INC.,
12
Defendant.
/
13
14
17
18
No. C 12-03231 JSW
CHECK POINT SOFTWARE
TECHNOLOGIES, INC.,
15
16
No. C 12-02540 JSW
Plaintiff,
v.
SRI INTERNATIONAL, INC.,
Defendant.
/
19
20
The Court has been presented with a technology tutorial and briefing leading up to a hearing
21
pursuant to Markman v. Westview Instruments, Inc., 517 U.S. 370 (1996). This Order construes ten
22
claim terms selected by the parties, which appear in the two patents at issue in this case: United States
23
Patent No. 6,711,615 (“the ‘615 Patent”) called “Network Surveillance,” and United States Patent No.
24
6,484,203 (“the ‘203 Patent”) called “Hierarchical Event Monitoring and Analysis.”
25
BACKGROUND
26
Fortinet, Inc. (“Fortinet”) and Check Point Software Technologies, Inc. (“Check Point”)
27
(collectively, “the Plaintiffs”) seek declaratory judgments of invalidity as to both the ‘615 and the ‘203
28
Patents. The Court shall address additional facts as necessary in the remainder of this Order.
1
2
3
ANALYSIS
A.
Legal Standard.
“It is a bedrock principle of patent law that the claims of a patent define the invention to
which the patentee is entitled the right to exclude.” Innova/Pure Water, Inc. v. Safari Water
5
Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004). The interpretation of the scope and
6
meaning of disputed terms in patent claims is a question of law and exclusively within the province
7
of a court to decide. Markman, 517 U.S. at 372. The inquiry into the meaning of the claim terms is
8
“an objective one.” Innova/Pure Water, 381 F.3d at 1116. As a result, when a court construes
9
disputed terms, it “looks to those sources available to the public that show what a person of skill in
10
United States District Court
For the Northern District of California
4
the art would have understood the disputed claim language to mean.” Id. In most cases, a court’s
11
analysis will focus on three sources: the claims, the specification, and the prosecution history.
12
Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc), aff’d, 517
13
U.S. 370 (1996). However, on occasion, it is appropriate to rely on extrinsic evidence regarding the
14
relevant scientific principles, the meaning of technical terms, and the state of the art at the time at
15
the time the patent issued. Id. at 979-81.
16
The starting point of the claim construction analysis is an examination of the specific
17
claim language. A court’s “claim construction analysis must begin and remain centered on the
18
claim language itself, for that is the language that the patentee has chosen to particularly point out
19
and distinctly claim the subject matter which the patentee regards as his invention.” Innova/Pure
20
Water, 381 F.3d at 1116 (internal quotations and citations omitted). Indeed, in the absence of an
21
express intent to impart a novel meaning to a term, an inventor’s chosen language is given its
22
ordinary meaning. York Prods., Inc. v. Cent. Tractor Farm & Family Ctr., 99 F.3d 1568, 1572
23
(Fed. Cir. 1996). Thus, “[c]laim language generally carries the ordinary meaning of the words in
24
their normal usage in the field of the invention.” Invitrogen Corp. v. Biocrest Mfg., L.P., 327 F.3d
25
1364, 1367 (Fed. Cir. 2003); see also Renishaw v. Marposs Societa’ per Azioni, 158 F.3d 1243,
26
1248 (Fed. Cir. 1998) (recognizing that “the claims define the scope of the right to exclude; the
27
claim construction inquiry, therefore, begins and ends in all cases with the actual words of the
28
claim”). A court’s final construction, therefore, must accord with the words chosen by the patentee
2
1
to mete out the boundaries of the claimed invention.
The court should also look to intrinsic evidence, including the written description, the
3
drawings, and the prosecution history, if included in the record, to provide context and clarification
4
regarding the intended meaning of the claim terms. Teleflex, Inc. v. Ficosa N. Am. Corp., 299 F.3d
5
1313, 1324-25 (Fed. Cir. 2002). The claims do not stand alone. Rather, “they are part of ‘a fully
6
integrated written instrument.’” Phillips v. AWH Corp., 415 F.3d 1303, 1315 (Fed. Cir. 2005) (en
7
banc) (quoting Markman, 52 F.3d at 978). The specification “may act as a sort of dictionary, which
8
explains the invention and may define terms used in the claims.” Markman, 52 F.3d at 979. The
9
specification also can indicate whether the patentee intended to limit the scope of a claim, despite
10
United States District Court
For the Northern District of California
2
the use of seemingly broad claim language. SciMed Life Sys., Inc. v. Advanced Cardiovascular
11
Sys., Inc., 242 F.3d 1337, 1341 (Fed. Cir. 2001) (recognizing that when the specification “makes
12
clear that the invention does not include a particular feature, that feature is deemed to be outside the
13
reach of the claims of the patent, even though the language of the claims, read without reference to
14
the specification, might be considered broad enough to encompass the feature in question”).
15
Intent to limit the claims can be demonstrated in a number of ways. For example, if the
16
patentee “acted as his own lexicographer,” and clearly and precisely “set forth a definition of the
17
disputed claim term in either the specification or prosecution history,” a court will defer to that
18
definition. CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366 (Fed. Cir. 2002). In order
19
to so limit the claims, “the patent applicant [must] set out the different meaning in the specification
20
in a manner sufficient to give one of ordinary skill in the art notice of the change from ordinary
21
meaning.” Innova/Pure Water, 381 F.3d at 1117. In addition, a court will adopt an alternative
22
meaning of a term “if the intrinsic evidence shows that the patentee distinguished that term from
23
prior art on the basis of a particular embodiment, expressly disclaimed subject matter, or described
24
a particular embodiment as important to the invention.” CCS Fitness, 288 F.3d at 1367. For
25
example the presumption of ordinary meaning will give way where the “inventor has disavowed or
26
disclaimed scope of coverage, by using words or expressions of manifest exclusion or restriction,
27
representing clear disavowal of claim scope.” Gemstar-TV Guide Int’l, Inc. v. ITC, 383 F.3d 1352,
28
1364 (Fed. Cir. 2004). Likewise, the specification may be used to resolve ambiguity “where the
3
1
ordinary and accustomed meaning of the words used in the claims lack sufficient clarity to permit
2
the scope of the claim to be ascertained from the words alone.” Teleflex, 299 F.3d at 1325.
3
However, limitations from the specification (such as from the preferred embodiment) may
4
not be read into the claims, absent the inventor’s express intention to the contrary. Id. at 1326; see
5
also CCS Fitness, 288 F.3d at 1366 (“[A] patentee need not ‘describe in the specification every
6
conceivable and possible future embodiment of his invention.’”) (quoting Rexnord Corp. v. Laitram
7
Corp., 274 F.3d 1336, 1344 (Fed. Cir. 2001)). To protect against this result, a court’s focus should
8
remain on understanding how a person of ordinary skill in the art would understand the claim
9
terms. Phillips, 415 F.3d at 1323.
United States District Court
For the Northern District of California
10
If the analysis of the intrinsic evidence fails to resolve any ambiguity in the claim language,
11
a court then may turn to extrinsic evidence, such as expert declarations and testimony from the
12
inventors. Intel Corp. v. VIA Techs., Inc., 319 F.3d 1357, 1367 (Fed. Cir. 2003) (“When an
13
analysis of intrinsic evidence resolves any ambiguity in a disputed claim term, it is improper to rely
14
on extrinsic evidence to contradict the meaning so ascertained.”) (emphasis in original). When
15
considering extrinsic evidence, a court should take care not to use it to vary or contradict the claim
16
terms. Rather, extrinsic evidence is relied upon more appropriately to assist in determining the
17
meaning or scope of technical terms in the claims. Vitronics Corp. v. Conceptronic, Inc., 90 F.3d
18
1576, 1583-84 (Fed. Cir. 1996).
19
Dictionaries also may play a role in the determination of the ordinary and customary
20
meaning of a claim term. In Phillips, the Federal Circuit reiterated that “[d]ictionaries or
21
comparable sources are often useful to assist in understanding the commonly understood meanings
22
of words . . . .” Phillips, 415 F.3d at 1322. The Phillips court, however, also admonished that
23
district courts should be careful not to allow dictionary definitions to supplant the inventor’s
24
understanding of the claimed subject matter. “The main problem with elevating the dictionary to . .
25
. prominence is that it focuses the inquiry on the abstract meaning of the words rather than on the
26
meaning of claim terms within in the context of the patent.” Id. at 1321. Accordingly, dictionaries
27
necessarily must play a role subordinate to the intrinsic evidence.
28
In addition, a court has the discretion to rely upon prior art, whether or not cited in the
4
1
specification or the file history, but only when the meaning of the disputed terms cannot be
2
ascertained from a careful reading of the public record. Vitronics, 90 F.3d at 1584. Referring to
3
prior art may make it unnecessary to rely upon expert testimony, because prior art may be
4
indicative of what those skilled in the art generally understood certain terms to mean. Id.
5
B.
Claim Construction.
6
1.
7
The term “network monitors appears in Claims 1, 4, 6, 13, 16, and 18 of the ‘615 Patent, and
“Network monitors”/“the monitors”
8
Claims 1, 4, 6, 12, 15, and 17 of the ‘203 Patent. The term “the monitors” appears in Claim 1 of
9
both the ‘615 and the ‘203 Patents. The parties agree that “the monitors” refers to “network
United States District Court
For the Northern District of California
10
11
monitors.”
Defendant SRI International, Inc. (“SRI”) argues that the term “network monitors” must be
12
construed to mean “software and/or hardware that can collect, analyze and/or respond to data.”
13
(Parties’ Final Joint Claim Construction Statement (“Statement”) at App. A.). The Plaintiffs, on the
14
other hand, argue that the term must be construed to mean “software and/or hardware that can detect
15
suspicious activity by analyzing network traffic data.” (Id.) During oral argument in the Markman
16
proceeding, Check Point proposed a compromise whereby the Court would accept SRI’s
17
construction but replace the second “and/or” with “and” and “data” with “network traffic data.”
18
The key dispute between the parties is whether all “network monitors” must be capable of
19
detecting suspicious activity through the analysis of network traffic data. SRI argues that the
20
construction the Plaintiffs advance would improperly require hierarchical monitors to include this
21
capability. The patents-in-suit require a hierarchical system of network monitors to perform a
22
variety of tasks related to network security. As part of the hierarchy, low level monitors may detect
23
suspicious activity, and then report the results to domain or enterprise monitors that may receive and
24
integrate those reports. See, e.g., ‘203 Patent at 2:56-65. The Plaintiffs’ proposed construction
25
therefore improperly limits “network monitors” to a single type of activity, thereby excluding
26
domain and enterprise monitors from the definition. SRI’s patents describe several levels of
27
network monitors, performing a range of tasks. See, e.g., ‘203 Patent at 3:12-4:04. The Court finds
28
that it would be improper to limit the definition of “network monitors” in the manner the Plaintiffs
5
1
2
3
propose.
Accordingly, the Court construes the term “network monitors” to mean: “software and/or
hardware that can collect, analyze and/or respond to data.”
4
2.
5
The term “suspicious network activity” appears in Claims 1 and 13 of the ‘615 Patent, and
6
7
“Suspicious network activity”
Claims 1 and 12 of the ‘203 Patent.
SRI argues that the term “suspicious network activity” must be construed to mean “activity
8
that indicates a known or possible malicious attack on the network.” (Statement at App. A.) The
9
Plaintiffs, on the other hand, argue that the term must be construed to mean “network traffic with
United States District Court
For the Northern District of California
10
11
attributes of a suspected, but unconfirmed, intrusion.” (Id.)
The key areas of dispute between the parties are: (1) whether “suspicious network activity”
12
can encompass known attacks; and (2) whether “network activity” is synonymous with “network
13
traffic.” The Patents’ specifications draw a distinction between suspicious and malicious activity.
14
See ‘203 Patent at 7:11-13. As part of the analysis of such activity, the monitors create both
15
suspicion reports and intrusion reports. Id. at 7:37-48. A person of ordinary skill in the art, reading
16
the claim language in light of the context of the Patents as a whole, would understand that the
17
patentee intended “suspicious” and “malicious” to have distinct meanings. See Rambus Inc. v.
18
Hynix Semiconductor Inc., 569 F. Supp. 2d 946, 968 (N.D. Cal. 2008) (quoting Phillips, 415 F.3d at
19
1312-13); see also ‘203 Patent at 7:11-13 (“Signature engine 24 can also examine the data portion of
20
packets in search of a variety of transactions that indicate suspicious, if not malicious, intentions by
21
an external client.”). “Malicious” activity is activity known to present a threat, therefore
22
“suspicious” activity should be construed to refer to unconfirmed threats.
23
However, the Court is convinced by SRI’s contentions at oral argument that “network
24
activity” is not synonymous with “network traffic.” Network activity includes network traffic, but
25
can also include “pings” and failed logon attempts. See ‘203 Patent at 7:6-10. That is, “network
26
activity” can also include activity undertaken by a foreign user, not simply traffic that actually
27
enters the network. Thus, network activity encompasses network traffic, but also has a broader
28
application.
6
1
2
Accordingly, the Court construes “suspicious network activity” to mean: “network activity
with attributes of a suspected, but unconfirmed, intrusion.”
3
3.
4
The term “automatically receiving and integrating” appears in Claim 1 of both the ‘615 and
5
6
“Automatically receiving and integrating”
the ‘203 Patents.
SRI argues that the term “automatically receiving and integrating” must be construed to
7
mean “without user intervention, receiving reports of suspicious activity and combining those
8
reports into a different end product; i.e., something more than simply collecting and reiterating
9
data.” (Statement at App. A.) The Plaintiffs, on the other hand, argue that the term must be
United States District Court
For the Northern District of California
10
construed to mean “without user intervention, receiving reports of suspicious activity and combining
11
those reports into a different end product (i.e., something more than simply collecting and reiterating
12
data) for purposes of detecting a suspected attack or threat.” (Id.)
13
The key dispute between the parties is whether detecting a suspected attack or threat is the
14
sole purpose of “automatically receiving and integrating.” At oral argument in the Markman
15
hearing, Fortinet suggested adding the words “at least” to further define the purpose of
16
“automatically receiving and integrating.” This proposed addition does not solve the problem
17
because “at least” still limits the purpose of “automatically receiving and integrating” solely to
18
detecting a suspected attack or threat.
19
However, “claims must be read in view of the specification, of which they are a part.”
20
Phillips, 415 F.3d at 1315 (citation and internal quotation marks omitted). The very purpose of the
21
patents-in-suit is to detect network intrusions. Therefore, it is reasonable to include reference to the
22
purpose of the invention when construing a disputed claim term. See id.
23
Accordingly, the Court construes the term “automatically receiving and integrating” to mean:
24
“without user intervention, receiving reports of suspicious activity and combining those reports into
25
a different end product (i.e., something more than simply collecting and reiterating data) including
26
for purposes of detecting a suspected attack or threat.”
27
4.
28
The term [hierarchical monitors] “adapted to automatically receive and integrate” appears in
[hierarchical monitors] “adapted to automatically receive and integrate”
7
1
Claim 13 of the ‘615 Patent and Claim 12 of the ‘203 Patent.
2
SRI argues that the term [hierarchical monitors] “adapted to automatically receive and
3
integrate” must be construed to mean “capable of receiving reports of suspicious activity and,
4
without user intervention, combining those reports into a different end product; i.e., something more
5
than simply collecting and reiterating data.” (Statement at App. A.) The Plaintiffs, on the other
6
hand, argue that the term “adapted to” does not be construed, and the remainder of the term must be
7
construed to mean “without user intervention, receiving reports of suspicious activity and combining
8
those reports into a different end product (i.e., something more than simply collecting and reiterating
9
data) for purposes of detecting a suspected attack or threat.” (Id.)
United States District Court
For the Northern District of California
10
The key dispute between the parties is whether “adapted to” should be construed as
11
synonymous with “capable of.” In common parlance,“adapted to” is most commonly defined more
12
narrowly than “capable of.” See, e.g., Aspex Eyewear, Inc. v. Marchon Eyewear, Inc., 672 F.3d
13
1335, 1349 (Fed. Cir. 2012); Brocade Commc’ns Sys., Inc. v. A10 Networks, Inc., No. C 10-3428
14
PSG, 2013 WL 831528, at *10-11 (N.D. Cal. Jan. 10, 2013). When determining what meaning the
15
patentee here assigned to “adapted to,” the Court must look at the patent as a whole. See Aspex
16
Eyewear, 672 F.3d at 1349. Here, the patentee chose to describe the claimed invention using past or
17
present tense language. See ‘615 Patent at Claim 13 (claiming “a plurality of network monitors
18
deployed . . . the hierarchical monitors adapted to automatically receive and integrate”); ‘203 Patent
19
at Claim 12 (same). The language the patentee chose does not reflect mere capability, but instead,
20
the claimed invention does not exist until the network monitors have been deployed and are adapted
21
to automatically receive and integrate. Thus, within the context of these Patents, “adapted to”
22
should be construed more narrowly than “capable of.” See Aspex Eyewear, 672 F.3d at 1349.
23
Accordingly, the Court construes the term [hierarchical monitors] “adapted to automatically
24
receive and integrate” to mean: “without user intervention, receiving reports of suspicious activity
25
and combining those reports into a different end product (i.e., something more than simply
26
collecting and reiterating data) including for purposes of detecting a suspected attack or threat.”
27
//
28
//
8
1
5.
2
network traffic data”
3
4
“Detecting, by the network monitors, suspicious activity based on analysis of
The term “detecting, by the network monitors, suspicious activity based on analysis of
network traffic data” appears in Claim 1 of both the ‘615 and ‘203 Patents.
5
SRI argues that the term “detecting, by the network monitors, suspicious activity based on
6
analysis of network traffic data” must be construed to mean “detecting based on an analysis of data
7
derived from or describing network packets and excluding analysis that is limited solely to host
8
operating system audit logs.” (Statement at App. A.) The Plaintiffs, on the other hand, argue that
9
the term must be construed to mean “detecting, by the network monitors, suspicious network
United States District Court
For the Northern District of California
10
activity based on direct examination of network packets.” (Id.)
11
The key dispute between the parties is whether “detecting” requires direct examination of
12
data. When the patents-in-suit underwent reexamination, SRI asserted repeatedly that “analysis of
13
network traffic data” requires direct examination of network packets. (See, e.g., Declaration of
14
Stefani E. Shanberg in Support of Plaintiff Check Point Software Technologies, Inc.’s Responsive
15
Claim Construction Brief (“Shanberg Decl.”) Ex. I at 7; Ex. J at 5.) “[P]rosecution history can be
16
invaluable for demonstrating the inventor's understanding of the claims and checking ‘whether the
17
inventor limited the invention in the course of prosecution, making the claim scope narrower than it
18
would otherwise be.’” Rambus, 569 F. Supp. 2d at 969 (quoting Phillips, 415 F.3d at 1317.). SRI’s
19
prosecution history unambiguously demonstrates that it intended to limit analysis of network traffic
20
data to direct examination of network packets. (See, e.g., Shanberg Decl. Ex. I at 7, 13; Ex. J at 5, 7,
21
11.)
22
Accordingly, the Court construes “detecting, by the network monitors, suspicious activity
23
based on analysis of network traffic data” to mean: “detecting, by the network monitors, suspicious
24
network activity based on direct examination of network packets.”
25
26
27
28
6.
“Said plurality of network monitors detecting suspicious network activity based
on analysis of network traffic data”
The term “said plurality of network monitors detecting suspicious network activity based on
analysis of network traffic data” appears in Claim 13 of the ‘615 Patent and Claim 12 of the ‘203
9
1
2
Patent.
SRI argues that the term “said plurality of network monitors detecting suspicious network
3
activity based on analysis of network traffic data” must be construed to mean “capable of detecting
4
based on an analysis of data derived from or describing network packets and excluding analysis that
5
is limited solely to host operating system audit logs.” (Statement at App. A.) The Plaintiffs, on the
6
other hand, argue that the term must be construed to mean “said plurality of network monitors
7
detecting suspicious network activity based on direct examination of network packets.” (Id.)
8
9
The key disputes between the parties are the same as those discussed in Claim terms 4 and 5;
that is, whether the network monitors must be actively detecting suspicious network activity, or
United States District Court
For the Northern District of California
10
merely capable of performing that function, and whether “detecting” requires direct examination.
11
For the same reasons discussed supra, the Court is persuaded that the claimed invention requires
12
active detecting – not merely the capability to detect – and that such detecting requires direct
13
examination of network packets.
14
Accordingly, the Court construes the term “said plurality of network monitors detecting
15
suspicious network activity based on analysis of network traffic data” to mean: “said plurality of
16
network monitors detecting suspicious network activity based on direct examination of network
17
packets.”
18
7.
19
The terms “network monitors deployed”/“network monitors are deployed” appears in Claims
20
21
“Network monitors deployed”/“network monitors are deployed”
13 and 18 of the ‘615 Patent, and Claims 12 and 17 of the ‘203 Patent.
SRI argues that the terms “network monitors deployed”/“network monitors are deployed”
22
must be construed to mean “network monitors that can be configured and/or installed.” (Statement
23
at App. A.) The Plaintiffs, on the other hand, note that the parties agree that “deploying a plurality
24
of network monitors” means “configuring and/or installing two or more network monitors,” and that
25
“software is configured and hardware is installed.” (Id.) The Plaintiffs contend that this claim term
26
does not require additional construction, but argue that if the Court construes the term, it must be
27
construed to mean “network monitors that are configured and/or installed” and that “software is
28
configured and hardware is installed.” (Id.)
10
1
2
3
The key dispute between the parties is the same issue regarding active language discussed
supra in Claim terms 4 and 6.
Accordingly, the Court construes the terms “network monitors deployed”/“network monitors
4
are deployed” to mean: “network monitors that are configured and/or installed” and “software is
5
configured and hardware is installed.”
6
8.
7
The term “correlating intrusion reports reflecting underlying commonalities” appears in
8
9
“Correlating intrusion reports reflecting underlying commonalities”
Claim 2 of both the ‘615 and the ‘203 Patents.
SRI argues that the term “correlating intrusion reports reflecting underlying commonalities”
United States District Court
For the Northern District of California
10
must be construed to mean “combining the reports to reflect underlying commonalities.” (Statement
11
at App. A.) Check Point agrees with SRI’s proposed construction. (Id. at 2 n.1.) Fortinet, on the
12
other hand, argues that the term either needs no construction, or in the alternative, it must be
13
construed to mean “combining intrusion reports with underlying commonalities to identify more
14
global threats.” (Id. at App. A.) At oral argument in the Markman hearing, Fortinet suggested the
15
alternative construction “combining intrusion reports with underlying commonalities at least to
16
identify threats.”
17
The key dispute between SRI and Fortinet is whether the sole purpose of combining the
18
reports is to identify more global threats to the network. This is essentially the same dispute
19
discussed supra in Claim term 3.
20
Accordingly, the Court construes the term “correlating intrusion reports reflecting underlying
21
commonalities” to mean: “combining the reports to reflect underlying commonalities, including to
22
identify threats.”
23
9.
24
The term “correlating intrusion reports reflecting underlying commonalities” appears in
25
26
“Correlating intrusion reports reflecting underlying commonalities”
Claim 14 of the ‘615 Patent, and Claim 13 of the ‘203 Patent.
SRI argues that the term “correlating intrusion reports reflecting underlying commonalities”
27
in the context of these Claims must be construed to mean “capable of combining the reports to
28
reflect underlying commonalities.” (Statement at App. A.) The Plaintiffs do not believe this term
11
1
needs additional construction but argue that it must be construed consistently with Claim term 8,
2
above. (Id.)
3
The key dispute between the parties is whether integration requires hierarchical monitors to
4
be correlating reports or whether it merely requires that they possess the capability to correlate
5
reports; that is, this is essentially the same issue regarding active language discussed supra in Claim
6
terms 4, 6, and 7. Moreover, the Court is persuaded by the Plaintiffs’ argument that this Claim term,
7
which is identical to Claim term 8, should be construed consistently with Claim term 8.
8
9
Accordingly, the Court construes the term “correlating intrusion reports reflecting underlying
commonalities” to mean: “combining the reports to reflect underlying commonalities, including to
United States District Court
For the Northern District of California
10
identify threats.”
11
10.
12
The term “network traffic data” appears in Claims 1 and 13 of the ‘615 Patent, and Claims 1
13
14
“Network traffic data”
and 12 of the ‘203 Patent.
SRI does not believe that this term requires construction. (Statement at App. A.) However,
15
should the Court construe the term, SRI argues that the term “network traffic data” must be
16
construed to mean “data derived from or describing network packets.” (Id.) The Plaintiffs, on the
17
other hand, argue that the term must be construed to mean “network traffic data” is comprised of
18
“network packets.” (Id.)
19
The key dispute between the parties is whether network traffic data can be equated with
20
network packets. During reexamination SRI stated that “[a]ccording to its plain meaning, the phrase
21
‘network traffic data’ refers to data obtained from network traffic, i.e., network packets.” (Shanberg
22
Decl. Ex. J at 5.) The Court is persuaded that, at the time of reexamination, SRI understood
23
“network traffic data” to be comprised of network packets. See Phillips, 415 F.3d at 1317; Rambus,
24
569 F. Supp. 2d at 969.
25
26
27
28
Accordingly, the Court construes the term “network traffic data” to mean: “network traffic
data” is comprised of “network packets.”
CONCLUSION
Based on the analysis set forth above, the Court adopts the foregoing constructions of the
12
1
disputed terms. The parties are ordered to submit a further joint case management report pursuant to
2
Patent Standing Order ¶ 13 by no later than November 8, 2013.
3
IT IS SO ORDERED.
4
5
Dated: October 22, 2013
JEFFREY S. WHITE
UNITED STATES DISTRICT JUDGE
6
7
8
9
United States District Court
For the Northern District of California
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
13
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?