Symantec Corporation v. Acronis, Inc. et al
Filing
168
CORRECTED ORDER CONSTRUING TERMS OF UNITED STATES PATENT NOS. 7,024,527, 7,366,859, 7,454,592, 7,680,957, 7,831,789, 7,941,459 AND 7,996,708 re 115 Brief filed by Symantec Corporation, 117 Brief filed by Acronis International GmbH. Signed by Judge Jon S. Tigar on December 13, 2013. (wsn, COURT STAFF) (Filed on 12/15/2013)
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
SYMANTEC CORPORATION,
7
Case No. 12-cv-05331-JST
Plaintiff,
8
v.
9
ACRONIS, INC., et al.,
10
Defendants.
11
CORRECTED ORDER CONSTRUING
TERMS OF UNITED STATES PATENT
NOS. 7,024,527, 7,366,859, 7,454,592,
7,680,957, 7,831,789, 7,941,459 AND
7,996,708
United States District Court
Northern District of California
Re: ECF Nos. 115 & 117.
12
On November 5, 2013, after providing a tentative construction order to the parties, the
13
Court held a hearing for the purpose of construing disputed terms in the claims of United States
14
Patent Nos. 7,024,527, 7,366,859, 7,454,592, 7,680,957, 7,831,789, 7,941,459 and 7,996,708.
15
Now, after consideration of the arguments and evidence presented by the parties, and the relevant
16
portions of the record, the Court construes the terms as set forth below.1
17
I.
BACKGROUND
18
A.
19
Procedural History
Plaintiff-Counterclaim Defendant Symantec Corporation (“Symantec”) filed this complaint
20
for patent infringement in October 2012, accusing Defendants-Counterclaimants Acronis, Inc.,
21
22
23
24
25
Acronis International GMBH and OOO Acronis (collectively, “Acronis”) of infringing
Symantec’s U.S. Patents Nos. U.S. Patents Nos. 7,941,459 (“the ‘459 Patent”), 7,024,527 (“the
‘527 Patent”), 7,454,592 (“the ‘592 Patent”), 7,680,957 (“the ‘957 patent”), and 7,996,708 (“the
‘708 patent”). Complaint for Patent Infringement ¶ 1, ECF No. 1. Acronis International GmbH
has counterclaimed to accuse Symantec of infringing its U.S. Patents Nos. 7,366,859 (“the ‘859
26
27
1
28
The Court issued a claim construction order on November 23, 2013, and then issued this
corrected version to correct a typographical error identified by the parties. See ECF Nos. 167-68.
1
Patent”) and 7,831,789 (“the ‘789 Patent”) (collectively, “the Acronis Patents”). Amended
2
Counterclaims ¶ 1, ECF No. 56.
3
The parties identified nine terms whose construction is “likely to be most significant to
4
resolving the parties’ dispute,” pursuant to Patent Local Rule 4-2(b). Patent L.R. 4-3 Joint Claim
5
Construction and Prehearing Statement 8:7-18, ECF No. 113. As a matter of case management
6
and pretrial procedure, it is well established that district courts have the authority only to construe
7
those terms they deem likely to lead to a dispositive outcome at any one claim construction
8
hearing. See, e.g., Microstrategy Inc. v. Bus. Objects Americas, 410 F. Supp. 2d 348, 355 (D. Del.
9
2006) aff’d, 238 F. App’x 605 (Fed. Cir. 2007) (construing only two claims of the several the
parties had submitted for construction). The Federal Circuit even permits district courts to limit
11
United States District Court
Northern District of California
10
the claims parties assert in any given action, provided that a patentee is not permanently deprived
12
of the opportunity to later re-assert claims that present unique issues as to liability or damages.
13
See In re Katz Interactive Call Processing Patent Litigation, 639 F.3d 1303, 1310 (Fed. Cir. 2011);
14
Stamps.com, Inc. v. Endicia, Inc., 437 Fed. Appx. 897, 902-03 (Fed. Cir. 2011) (unpublished).
15
The Court proceeds to construe only the nine terms identified in the parties’ joint claim
16
construction statement, since the parties believe construction of such terms those most significant
17
to resolving the parties’ dispute. The Court will revisit the other disputed claim terms only if these
18
constructions do not lead to a dispositive outcome, and even then, the Court may require the
19
parties to demonstrate that the claims with unconstrued terms pose unique issues of liability or
20
damages, and that it is necessary to avoid submitting the dispute over their scope to a jury. See
21
Katz, 639 F.3d at 1312-13.
22
B.
Legal Standard
23
The construction of terms found in patent claims is a question of law to be determined by
24
the Court. Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc),
25
aff'd, 517 U.S. 370 (1996). “[T]he interpretation to be given a term can only be determined and
26
confirmed with a full understanding of what the inventors actually invented and intended to
27
envelop with the claim.” Phillips v. AWH Corp., 415 F.3d 1303, 1316 (Fed. Cir. 2005) (quoting
28
Renishaw PLC v. Marposs Societa' per Azioni, 158 F.3d 1243, 1250 (Fed. Cir. 1998)).
2
1
Consequently, courts construe claims in the manner that “most naturally aligns with the patent's
2
description of the invention.” Id.
3
The first step in claim construction is to look to the language of the claims themselves. “It
4
is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to which the
5
patentee is entitled the right to exclude.’” Phillips, 415 F.3d at 1312 (quoting Innova/Pure Water,
6
Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). A disputed claim
7
term should be construed in light of its “ordinary and customary meaning,” which is “the meaning
8
that the term would have to a person of ordinary skill in the art in question at the time of the
9
invention, i.e., as of the effective filing date of the patent application.” Phillips, 415 F.3d at 1312.
In some cases, the ordinary meaning of a disputed term to a person of skill in the art is readily
11
United States District Court
Northern District of California
10
apparent, and claim construction involves “little more than the application of the widely accepted
12
meaning of commonly understood words.” Id., at 1314. Claim construction may deviate from the
13
ordinary and customary meaning of a disputed term only if (1) a patentee sets out a definition and
14
acts as his own lexicographer, or (2) the patentee disavows the full scope of a claim term either in
15
the specification or during prosecution. Thorner v. Sony Computer Entm’t Am. LLC, 669 F.3d
16
1362, 1365 (Fed. Cir. 2012).
Ordinary and customary meaning is not the same as a dictionary definition. “Properly
17
18
viewed, the ‘ordinary meaning’ of a claim term is its meaning to the ordinary artisan after reading
19
the entire patent. Yet heavy reliance on the dictionary divorced from the intrinsic evidence risks
20
transforming the meaning of the claim term to the artisan into the meaning of the term in the
21
abstract, out of its particular context, which is the specification.” Id. at 1321. Typically, the
22
specification “is the single best guide to the meaning of a disputed term.” Vitronics Corp. v.
23
Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996). It is therefore “entirely appropriate for a
24
court, when conducting claim construction, to rely heavily on the written description for guidance
25
as to the meaning of claims.” Phillips, 415 F.3d at 1315. However, while the specification may
26
describe a preferred embodiment, the claims are not necessarily limited only to that embodiment.
27
Id.
28
Finally, courts may consider extrinsic evidence in construing claims, such as “expert and
3
1
inventor testimony, dictionaries, and learned treatises.” Markman, 52 F.3d at 980. Expert
2
testimony may be useful to “provide background on the technology at issue, to explain how an
3
invention works, to ensure that the court's understanding of the technical aspects of the patent is
4
consistent with that of a person of skill in the art, or to establish that a particular term in the patent
5
or the prior art has a particular meaning in the pertinent field.” Phillips, 415 F.3d at 1318.
6
However, extrinsic evidence is “less reliable than the patent and its prosecution history in
7
determining how to read claim terms.” Id. If intrinsic evidence mandates the definition of a term
8
that is at odds with extrinsic evidence, courts must defer to the definition supplied by the former.
9
Id.
C.
11
United States District Court
Northern District of California
10
Since this is an action “relating to patents,” the Court has jurisdiction pursuant to U.S.C. §
12
1338(a).
13
III.
Jurisdiction
ANALYSIS
14
A.
Patent Numbers 7,366,859 and 7,831,789 (The Acronis Patents)
15
Acronis asserts claims in two U.S. Patents: Nos. 7,366,859 (the “’859 Patent” and
16
7,831,789 (the “’789 Patent”), the latter of which is a continuation-in-part of the former. The
17
patents related to a method and/or system for fast incremental backup of a data storage device.
18
The parties have identified three disputed terms in these patents as most significant to resolving
19
the parties’ dispute.
1.
20
Patent)
21
22
23
24
25
“Bitmap” (claims 1 & 20 of the ‘859 Patent and claim 28 of the ‘789
Bitmap
Acronis’s
Proposed Construction
Symantec’s
Proposed Construction
An array with elements represented
by one or more bits of information.
Disputed
Claim Term
An array with elements having one of two
possible states.
26
The parties agree that a “bitmap” is an array of elements, and that the patented technology
27
employs a bitmap to determine which information needs to be backed up. But the parties dispute
28
whether the term “bitmap,” as it is used in the patents, describes an array in which the units of
4
1
which have only two possible states. Symantec argues that the limitation it proposes in its
2
construction is appropriate because claims and specifications in the Patent refer to the bitmap’s
3
elements as either being marked for backup or as not being marked for backup.
4
The specifications indicate that the bitmap’s elements represent that a unit is either marked
5
or unmarked for backup. ‘789 Patent, 8:56-58 & ‘859 Patent, 7:26-27. But in the ‘859 Patent’s
6
embodiment, the bitmap’s elements are disclosed to have a broader scope: “for example, this can
7
be a bitmap of data blocks that are subject to archiving, or a bitmap of used data blocks of the hard
8
disk drive (i.e., blocks of the hard disk drive that contain useful data, rather than ‘empty’ blocks,
9
or free blocks).” 3:21-24. While the embodiment goes on to describe a bitmap that signals only
whether or not certain logical structures correspond, 3:28-23, the embodiment nowhere clearly
11
United States District Court
Northern District of California
10
indicates that the bitmap in the invention only contains elements that represent only two states.
12
Given the lack of clear intrinsic evidence indicating that the term “bitmap” is limited in the
13
Acronis Patents to being an array that displays one or two states, the extrinsic evidence here is
14
dispositive. “Courts may rely on dictionary definitions when construing claim terms, so long as
15
the dictionary definition does not contradict any definition found in or ascertained by a reading of
16
the patent documents.” 3M Innovative Properties v. Tredegar Corp., 725 F.3d 1315, 1321 (Fed.
17
Cir. 2013); cf. Phillips, 415 F.3d at 1321 (dictionary definition risky when divorced from intrinsic
18
evidence of term within the context of the specification). Acronis submits, and Symantec does not
19
dispute, that dictionary definitions refer to bitmaps as representing “a set of bits,” or a “collection
20
of bits.” See Authoritative Dictionary of IEEE Standards Terms at 104; Microsoft Computer
21
Dictionary at 61. An ordinary artisan skilled in the art would not understand ‘bitmap’ to be
22
limited to arrays whose elements have only one of two states.
23
24
25
The Court adopts Acronis’s proposed construction.
2.
“Descriptors” (Claims 1 and 20 of the ‘859 Patent, Claim 28 of the ‘789
Patent)
26
Disputed Claim Term
27
Acronis’s
Proposed
Construction
28
5
Symantec’s
Proposed Construction
1
2
3
4
5
6
7
“Descriptors of Logical Storage
Units” (Claim 1 of the ‘859
Patent”)
Plain and ordinary
meaning
Metadata corresponding to the
logical storage units
“Descriptors Corresponding to the
Logical Storage Units” (Claim 20
of the ‘859 Patent)
Plain and ordinary
meaning
Metadata corresponding to the
logical storage units
“Descriptors of the Files” (Claim
28 of the ‘789 Patent)
Plain and ordinary
meaning
Metadata corresponding to the
files
The inventions in the Acronis Patents use the “descriptors” as part of the process
8
determining what information has already been backed up. The parties dispute whether the
9
descriptors in the Acronis Patents are comprised only of metadata.
10
The Court will consider a party’s argument that a term should be interpreted in accord with
United States District Court
Northern District of California
11
its plain and ordinary meaning, and needs no further construction. However, the Court cannot
12
simply decline to construe even an ordinary term if by doing so it fails to resolve the parties’
13
“actual dispute regarding the proper scope of these claims.” O2 Micro Int’l Ltd. v. Beyond
14
Innovation Tech. Co., Ltd., 521 F.3d 1351, 1360 (Fed. Cir. 2008) (citing Markman, 52 F.3d at
15
976)). Therefore, whenever the Court agrees with a party that a term needs no further
16
construction, the Court is holding as a matter of law that the limitations proposed by the other
17
party do not inhere in the term, and that party will not be permitted to represent to a jury that such
18
a limitation exits. The corollary is that when the Court rejects a “plain and ordinary meaning”
19
construction, it is not necessarily stating that the term is unusually technical, but is concluding that
20
the competing construction more properly depicts the claim scope, which the Court must construe
21
as a matter of law.
22
Nothing in the Acronis Patents specifically limits the descriptors to metadata, and the
23
specification seems to explicitly recognize that they are not so limited: “[t]he descriptors can be,
24
e.g., MFT entries, hash function values, timestamps, checksums, and file metadata.” ‘859 Patent,
25
3:17-19. However, Symantec argues that the patentee disclaimed any broader scope of the term
26
during the prosecution of the ‘859 Patent. Specifically, on December 10, 2007, the applicant
27
proposed to amend the claims to add the words “hash function values of” before the word “the
28
descriptors” in Claims 1(d) and 21(d) of the ‘859 Patent. Amendment and Reply Under 37 C.F.R.
6
1
§ 1.111 at 3, 6, Exh. C to Declaration of Eric E. Wall, ECF No. 119-4. The applicant described
2
these amendments to the Patent Office as responding to the Patent Office’s rejection of the claims
3
based on prior art in “Cane,” U.S. Patent No. 5,765,173. The applicant wrote:
4
5
6
7
8
9
10
United States District Court
Northern District of California
11
12
13
14
15
The independent claims now recite that the hashing is done of the
descriptors, i.e., of the metadata associated with data stored on the
disk (in the blogs, or in the files). This is clearly different than what
is described in Cane (or what is known in the art with regards to
using hash functions to determine identity of two data files or data
blocks). Cane discusses the use of hashes in column 4, lines 1-6 (as
well as simpler mathematical constructs, such as checksums or
cyclic redundancy checks, which, for purposes of this discussion,
can be viewed as relatively simple hash functions, and all of them
belong to a class of mathematical transformations known as “one
way functions”). In Cane et al., (and, as is known conventionally),
the data of the file itself is hashed (or alternatively, the data of the
block itself). The hashes can then be compared, to check for
identity.
In the present claims, it is not the data that is hashed, but the
descriptors - in other words, the metadata. This is clearly different
than what is disclosed in Cane. Reconsideration is therefore
respectfully requested based on this patentable distinction.
Id. at 9 (emphases added).
The Court recognizes that “for prosecution disclaimer to attach, our precedent requires that
16
the alleged disavowing actions or statements made during prosecution be both clear and
17
unmistakable.” TecSec, Inc. v. Int’l Bus. Machines Corp., ___ F.3d ___, No. 2012-1415, 2013
18
WL 5452049, at *8 (Fed. Cir. Oct. 2, 2013) (quoting Omega Eng’g, Inc. v. Raytek Corp., 334 F.3d
19
1314, 1325-26 (Fed.Cir.2003)). Here, that bar has been met. The prosecution history reflects a
20
clear and unmistakable disavowal of the claim scope Acronis now urges this Court to adopt. The
21
Court does not agree with Acronis that the “patentee did not argue that the term ‘descriptors’ as
22
used in the patent was narrow or distinguished from prior art descriptors.” Acronis Resp. Br.
23
9:11-13. The amendments were described as doing exactly that. “Metadata” is not used as mere
24
“example”; the applicant specifically distinguished the invention from prior art by stating that the
25
the patented process hashed metadata as opposed to data. The fact that “[t]he list of specific
26
descriptors was not at issue” is a non sequitur. Id. 9:13. What was at issue was the process
27
claimed in Claims 1 and 20, and the issue was resolved in favor of a limiting amendment that
28
excluded the hashing of non-metadata. “[T]he prosecution history may be given substantial
7
1
weight in construing a term where that term was added by amendment.” Bd. of Regents of the
2
Univ. of Texas Sys. v. BENQ Am. Corp., 533 F.3d 1362, 1369 (Fed. Cir. 2008).
3
Not all aspects of the Patents reflect the thrust of the December 2007 amendment. The
4
applicant did not remove or amend the portion of the specification that still states that “[t]he
5
descriptors can be, e.g., MFT entries, hash function values, timestamps, checksums, and file
6
metadata.” ‘859 Patent, 3:17-19. But “an invention is construed not only in the light of the
7
claims, but also with reference to the file wrapper or prosecution history in the Patent Office.”
8
Phillips, 415 F.3d at 1317 (quoting Graham v. John Deere Co., 383 U.S. 1, 33 (1966). Moreover,
9
the structure of the claim terms makes clear that the list described at 3:17-19 cannot be a list of all
information that actually comprises the descriptors. For example, the descriptors cannot
11
United States District Court
Northern District of California
10
themselves be “hash function values” or else Claims 1 and 20 would be redundantly written.
12
Claim 1(d) would, on that reading, recite a method for “comparing hash function values of the
13
[hash function values] of already archived logical storage units.”
14
15
16
The Court adopts Symantec’s proposed constructions.
3.
“Hash Function Values” (claims 1 & 20 of the ‘859 Patent) /
“Control Sum Values” (claim 28 of the ‘789 Patent)
17
Disputed Claim Term
18
19
20
Acronis’
Proposed
Construction
“Hash Function Values” (claims 1
and 20 of the ‘789 Patent)
Value generated by a
hash function
Shorter values of a fixed length
that represent the original string
and are generated form a hash
function algorithim
“Control Sum Values” (claim 28
of the ‘789 Patent)
Plain and ordinary
meaning
A shorter value of a fixed length
that represents the original string
and are generated from a
hash function algorithm
21
22
23
24
25
Symantec’s
Proposed Construction
Symantec draws its definition of “hash function value” from the ‘859 Patent specification.
26
4:48-53. In context, however, that portion of the specification does not clearly indicate that the
27
patentee was setting out a special definition and acting as his or her own lexicographer. Thorner,
28
669 F.3d 1365. The passage is part of a larger, more general description of how hashing works.
8
1
‘859 Patent, 4:42-58.
2
The parties dispute whether hash function values are always shorter than the “original
3
string.” The specification does state that “content is converted into a short bit string—a hash
4
value,” (‘859 Patent), and also states that one of the advantages of the hash value comparison is
5
that “the value of the hash of the data is much less in size than the data itself.” 4:51-53, 5:23-27.
6
But it also goes on to say ’859 patent specification states that a hash function is a “usually shorter
7
value of a fixed length.” 4:49-50 (emphasis added). Adopting Symantec’s proposed construction
8
would therefore impose a limitation that the specification does not clearly encompass.
9
Symantec makes a similar argument that “control sum value” is similarly limited to
representing only shorter values, which the Court rejects for similar reasons. Symantec also
11
United States District Court
Northern District of California
10
argues that during prosecution the patentee stated that “control sum value” was coterminous with
12
“hash function value.” Since the Court does not agree with Symantec’s construction of “hash
13
function value,” however, this does not affect the construction.
14
The Court adopts Acronis’s proposed constructions.
15
B.
16
Symantec asserts eleven claims in the ‘459 Patent, which relates to the conversion of data
17
from different storage formats. The parties agree that two terms in the Patent are most significant
18
to resolving the dispute.
U.S. Patent No. 7,941,459
“Archival Format” (Claims 1 and 3)
19
1.
20
Disputed Claim Term
21
22
23
24
“Archival format” (Claims 1
and 3)
Symantec’s Proposed
Construction
Non-single instance self-contained
format for long-term storage using
specialized software
Acronis’s Proposed
Construction
(Conceded.)
Acronis initially proposed a competing construction of this term, but now states that
25
“Acronis does not necessarily agree with Symantec’s construction, but . . . is willing to agree to
26
Symantec’s construction since the dispute does not matter to infringement or invalidity and
27
streamlines the issues the Court is required to resolve.” Acronis Responsive Claim Construction
28
Brief 24:20-23, ECF No. 25. The Court understands Acronis’s position, but notes that “archival
9
1
format” was identified by both parties as among the nine terms most significant to a dispositive
2
outcome in this case.
In any case, the Court agrees with Symantec that the specification contrasts “archival
3
4
format” from single-instance storage, and makes clear that the archival format is self-contained.
5
‘459 Patent, at 1:58-2:16. The extrinsic evidence additionally makes clear that one skilled in the
6
art would understand an “archival format” to use specialized software, which is consistent with the
7
intrinsic record. See Wiley Elec. & Elecs. Eng’g Dictionary, John Wiley and Sons, Inc., p. 35
8
(2004); McGraw Hill Dictionary of Scientific and Technical Terms, 6th Ed., p. 132 (2003).
The Court adopts Symantec’s proposed construction.
9
2.
10
United States District Court
Northern District of California
11
Disputed Claim
Term
Symantec’s Proposed Construction
“Catalog” (Claims 1
and 3)
software that accesses a data structure
and that requests, receives, and
reassembles data stored in a singleinstance data storage pool
12
13
14
“Catalog” ‘459 (Claims 1 and 3)
15
16
Acronis’s Proposed
Construction
An array identifying data objects
and pointing to the location of
those data objects and software
that accesses the array and that
requests, receives, and
reassembles the identified data
objects
17
The parties agree that the Patent adopts a specialized definition of this term but disagree
18
19
20
21
22
23
24
25
26
27
28
about whether that definition its. Initially, the parties appeared to dispute whether the catalog was
merely passive or whether it performed the proactive functions of accessing, and of requesting,
receiving and reassembling data. Now, after Acronis has proposed the underlined amendment to
its initial construction, it appears that the parties’ dispute is over (1) whether the catalog includes a
structure that contains information about the data objects and their location, and (2) whether the
catalog also contains, in addition to that structure, software that accesses that structure.2
2
Acronis proposed the underlined amendment to its construction in response to Symantec’s
opening brief. And then, at oral argument, in response to this Court’s tentative construction,
Acronis proposed yet another new construction that Symantec had not previously seen, which
removed the term “array” and the requirement that the catalog “point” to the location of data
objects. The Court would ordinarily grant Symantec an opportunity to respond to this new
construction, but finds it unnecessary to do here since it will adopt Symantec’s construction as
superior to any iteration of Acronis’s constructions.
10
Acronis’s proposed construction may describe the way the catalog functions in Figure 3,
1
2
which depicts the preferred embodiment. But Acronis has not demonstrated that the claims are
3
necessarily limited to the embodiment. See Thorner, 669 F.3d at 1366 (it is “not enough that the
4
only embodiments, or all of the embodiments, contain a particular limitation”).
The Court recognizes that, when a patent adopts an idiosyncratic definition, the fact that
5
6
the specification “consistently uses the term” in a particular manner is strong evidence of its
7
meaning. Netcraft Corp. v. eBay, Inc., 549 F.3d 1394, 1399 (Fed. Cir. 2008); see also Hologic,
8
Inc. v. SenoRx, Inc., 639 F.3d 1329, 1338 (Fed. Cir. 2011) (deferring to what the specification
9
“specifically and exclusively shows,” “because that is clearly what the inventors . . . conceived
10
United States District Court
Northern District of California
11
of”).
Despite this, Acronis’s argument is weakened by the fact that the specification takes
12
several affirmative steps to clarify the limited nature of the specification, rendering it somewhat
13
unlikely that the patentee implicitly understood the term to be limited to the way it was used in the
14
embodiments. For example, the specification discloses specifically that drawings are “not
15
intended to limit the invention to the particular form disclosed.” 3:23-25.
16
While the specific embodiments may use the term in the way that Acronis suggests, the
17
way the specification is written indicates that the inventor conceived of alternate understandings of
18
the term’s scope, and that the term itself is not necessarily limited to the embodiments. For
19
example, the specification states that “Catalog 275 may identify the location of data objects,” not
20
that it must, or that it is inherent in the concept of the “catalog” that it necessarily does. 5:60
21
(emphasis added). When the specification states that “the catalog includes a plurality of entries,
22
each entry identifying a data object and including an associate set of data object attributes,” it is
23
within a passage that is describing “one embodiment.” 2:37, 40-43. This language is explicitly
24
nonexhaustive, and indicates that the term “catalog” is not necessarily limited as Acronis suggests,
25
even if the disclosed embodiments use it only in the manner it describes. In other words, the
26
patent does not “consistently use” the term the way it is used in Acronis’s construction. Cf.
27
Netcraft, 549 F.3d at 1399. It is far from clear that Acronis’s language is “what the inventors . . .
28
conceived of when they used the term “catalog.” Hologic, 639 F.3d at 1338.
11
1
In contrast to Acronis’s construction, Symantec’s proposed construction encompasses the
2
functions performed in the claim language in a straightforward manner. 8:33-50, 9:43-45. The
3
Court adopts Symantec’s proposed construction.
4
C.
U.S. Patent No. 7,454,592
5
Symantec asserts claims 17-25 of the ‘592 Patent, which also relates to single-instance
6
storage, and is directed to methods for identifying and appropriately storing duplicate data. The
7
parties have identified the term “lookup table,” in claim 17, as significant to resolving the dispute.
8
9
10
United States District Court
Northern District of California
11
12
13
Disputed Claim
Term
“Lookup table”
(Claim 17)
Symantec’s Proposed Construction
a table that associates different types
of data and permits one type of data to
be located by reference to the other
Acronis’s Proposed
Construction
a table that associates different
types of data and identifies one
type of data by reference to
another
The parties’ differences are not obvious from the face of their competing constructions, but
14
through those constructions the parties seek to encompass very different claim scopes.
15
In Acronis’s original construction, it proposed that the table “uses” one type of data to
16
locate another. Symantec argued, and the Court agrees, that this word implied that the lookup
17
table itself performs an active function. In Acronis’s brief, and at the hearing, Acronis clarified
18
that it does not argue that the lookup table is active. What Acronis argues is that the lookup table
19
itself contains the two types of data it associates, and a user does not need to refer to any other
20
extrinsic sources to make that association. To that end, Acronis has proposed the construction
21
above, which eliminates the word “use,” and is intended to capture the concept that the lookup
22
table indexes data as a table does in a reference book: one type of data in one column,
23
corresponding data in the adjoining column, with both pieces of data provided directly to the user
24
and their association evident on the face of the page.
25
To discourage positional bargaining with the Court, and to avoid giving one party more
26
27
“bites at the apple” than the other, the Court does not ordinarily permit parties to propose new
constructions in response to a tentative order. In this case, however, Acronis’s new construction,
28
12
1
beyond conceding to Symantec’s criticism of the word “uses,” does not change the nature of the
2
parties’ dispute. At the hearing, as in its briefs, Symantec has made clear that it disputes whether
3
the claimed lookup table is limited to being the sort of feature described above. The new
4
construction is merely another iteration of the parties’ original dispute, and Symantec is not
5
prejudiced by Acronis’ new proposal.
6
Figures 4 and 5 of the Patent disclose a lookup table that functions in essentially the
7
manner that Acronis suggests. In the first column, one type of data appears (either a logical
8
address or a hash value) and it is is aligned with corresponding data (either a hash value or a
9
physical address) in the next column. A user would use the tables disclosed in the specification by
looking at the data in one column, and identifying the data in the adjoining column. The written
11
United States District Court
Northern District of California
10
description also reflects this arrangement.
Symantec suggests that a feature could qualify as a “lookup table” without presenting
12
13
associated sets of data directly to the user. Symantec proposes that a lookup table need only
14
“permit” data to be located with reference to each other. By that construction, the Court
15
understands Symantec to argue that a feature could qualify as a “lookup table” even if it does not
16
align sets of data in an immediately accessible way, but instead merely contains within it the data
17
that could permit a user to do its own locating. It also seems to endorse a claim scope that would
18
encompass a feature that associates sets of data only by sending a user through a multiple-step
19
process or by accessing extrinsic sources of information.
The specification, which is “the single best guide to the meaning of a disputed term,”
20
21
Vitronics, 90 F.3d at 1582, does not reflect this claim scope. To resolve the parties’ dispute over
22
claim scope, the Court adopts Acronis’s proposed construction.
23
D.
U.S. Patent No. 7,024,527
24
Symantec asserts claims 20, 21 and 24 of the ‘527 Patent, which discloses a system for
25
restoring data while applications are running and accessing data. The parties dispute two terms in
26
the patent, and agree that both are among the nine most significant to resolving the parties’
27
dispute.
28
///
13
1
///
2
///
1.
3
“Application” (Claims 20 & 24)
4
Disputed Claim
Term
5
6
7
“Application”
(Claims 20 & 24)
Symantec’s Proposed Construction
Plain and ordinary meaning
Acronis’s Proposed
Construction
A program running on top of
operating software
8
The Court appreciates Symantec’s argument that “Acronis’s construction does not clarify
9
the meaning of ‘application.’” Symantec Opening Br. 5:1-2. But, as discussed infra, the Court
11
United States District Court
Northern District of California
10
must construe even everyday terms where necessary to resolve the parties’ dispute over claim
12
scope, O2 Micro, 521 F.3d at 1360, and the term here is in some sense technical.
The parties’ dispute is whether the “application” is limited to being one that is running on
13
14
top of operating software.3
15
The Court does not necessarily agree with Symantec that Acronis’s construction is
16
inconsistent with the specification. Symantec claims that the “specification describes applications,
17
including ‘restore application[s],’ which may run in a pre-boot environment.” Symantec Opening
18
Br. 5:8-9 (citing ‘527 Patent, 1:52-54; 4:14-26), but those portions of the specification do not seem
19
to include any reference to whether or not the applications run in a pre-boot environment.
Nonetheless, the intrinsic record does not reflect the limitation Acronis proposes. Acronis
20
21
states that “when the claim refers to ‘an application,’ it is referring to a program the user is
22
running, like a word processor or an email client, which needs access to part of the backup data,”
23
and that “[t]hese types of programs run on top of operating system software.” Acronis Resp. Br.
24
3
25
26
27
28
Acronis amended its original construction in its response brief to no longer specify that the
program must be a “user-space” program. And then, at oral argument, in response to this Court’s
tentative construction, Acronis proposed yet another new construction that Symantec had not
previously seen: “a program running above an operating system, distinct from the file server, and
which may include driver software.” As discussed supra, the Court would ordinarily grant
Symantec an opportunity to respond to this new construction, but finds it unnecessary to do so
here since it will adopt Symantec’s construction.
14
1
7:11-14. But it fails to point to portions of the intrinsic record that demonstrate that this is the
2
case. At oral argument, Acronis’s counsel could point to no portion of the intrinsic record that
3
reflects this limitation, and instead argued that the limitation inheres in the term itself. Whatever
4
the extrinsic evidence would suggest about the normal use of this term, this suggests that there is
5
no evidence that the Patent itself uses the term in the way that Acronis suggests. And both parties
6
have submitted competing extrinsic evidence about the way the term “application,” outside of the
7
context of the patent, would be understood by a person of ordinary skill in the art. The Court
8
cannot conclude on the basis of this that Acronis’s proposed construction is required, especially
9
where the intrinsic evidence fails to support the construction.4
The intrinsic record fails to reflect the limitation Acronis proposes. The Court adopts
10
United States District Court
Northern District of California
11
Symantec’s proposed construction.
2.
12
“File Server” (Claims 20 & 24)
13
14
Disputed
Claim Term
Symantec’s Proposed
Construction
Acronis’s Proposed Construction
15
16
File server
17
Computing system that
handles requests for files
In a client-server networked environment, a
computer system that manages access to files by one
or more client computer systems
The parties dispute two limitations proposed by Acronis: whether the claimed “file server”
18
19
(1) must exist within a client-server networked environment, and (2) whether it must manage
20
access from “one or more client computer systems.”5
The specification states that “embodiments may also be implemented in non-networked
21
22
storage environments.” ‘527 Patent 4:11-13. But the fact that the embodiments as a whole may
23
24
25
26
27
28
4
Acronis also argued at the hearing that the Court should clarify that the claimed “file server”
cannot qualify as an “application,” since, for example, claim 20 refers to the filer server
“directing” the “restore application.” 12:53. The Court agrees that that is a logical conclusion,
and does not understand Symantec to dispute it. But even so, that does not demonstrate that
Acronis’s construction is correct or that the parties have a dispute over claim scope that the Court
must resolve as a matter of law.
5
The parties’ constructions also differ in that one refers to the file server “hand[ling] request for
files,” and the other refers to the file server as “manag[ing] access to the files,” but from the briefs
and from the hearing it does not appear that the parties believe this distinction to be important.
15
1
be implemented in a non-networked environment does not mean that the “file server” must. And
2
the specification indicates that it does not. Figure 1 shows the file server connected to a
3
“network.” 2:65-67, Fig. 1. The specification also distinguishes the “file server” from a “file
4
system” on a specific computer. 4:14-26. Unlike the “application” term construed supra, Acronis
5
has pointed to significant evidence in the intrinsic evidence suggesting that its construction is
6
correct.
The fact that the embodiments are consistent with a proposed construction does not prove
8
that the construction is correct. But given the strong suggestion of the embodiments, the extrinsic
9
record here is dispositive. Acronis submits, and Symantec does not dispute, that a “file server” is
10
commonly defined to operate on a network. Authoritative Dictionary of IEEE Standard Terms, at
11
United States District Court
Northern District of California
7
433. A person of ordinary skill in the art, reviewing the intrinsic record, would conclude that the
12
claimed file server operates in a client-server networked environment.
13
However, Acronis has not justified its proposed limitation that the file server manage
14
access to files “by one or more client computer systems.” Acronis argues that that concept is
15
implicit in the concept of a network, but it does not provide any intrinsic (or even extrinsic)
16
evidence that reflects this specific limitation. In fact, in Figure 1, no client computers are
17
disclosed. That may be because Figure 1 is only showing the backup aspects of the network,
18
without showing the client computers being backed up, but regardless, the intrinsic record does
19
not compel Acronis’s construction.
20
Moreover, the syntax of the construction is unclear because of the ambiguous use of the
21
preposition “by.” The construction could be read to suggest that the computer system manages
22
access to the files of one or more client computer systems, but it also could be read to suggest that
23
the computer system manages access to files through the use of one or more client computer
24
systems. This is an unacceptable level of ambiguity for a lay jury to apply.
25
The Court adopts a construction the reflects one but not both of Acronis’s proposed
26
limitations: “In a client-server networked environment, a computer system that manages access to
27
files.”
28
E.
U.S. Patent No. 7,996,708
16
Finally, Symantec asserts claims 1, 7-13 and 16 of the ‘708 Patent, which claims
1
2
inventions that facilitate the restoration of a backup created on one system to another system. The
3
parties have identified one term in Claim 1 as most significant to resolving the parties’ dispute.
Symantec’s
Proposed
Construction
4
Disputed Claim Term
5
6
7
generating computer executable
restoration instructions (Claim 1)
Plain and
ordinary
meaning
Acronis’s Proposed Construction
the claimed software writes executable
code that guides the restoration process
8
Symantec again argues that Acronis has proposed to construe a term that needs no
9
construction, but the Court must resolve the parties’ dispute over whether the claim’s scope is
10
limited to situations in which the claimed software, as oppose to a human, writes the code that
11
United States District Court
Northern District of California
guides the restoration process.
12
Acronis points out that various parts of the specification describe a process in which the
13
software module, not a human programmer, generates the code that guides restoration. See, e.g.,
14
15
11:1-17. But the specification also states that the module “may utilize . . . user input . . . to
generate code for restoring.” 11:1-3. As applied by a jury, Acronis’s construction would
16
apparently rule out this aspect of the disclosed embodiment, and so it is very unlikely be correct.
17
Moreover, the construction is circular and potentially confusing. By using the unclear term
18
“claimed software” within the construction itself, the construction does not function as a
19
clarification of the disputed term.
20
The Court adopts Symantec’s proposed construction.
21
IV.
CONCLUSION
22
For the foregoing reasons, the Court construes the disputed claim language as follows:
23
24
Claim
Term
25
‘859 Patent
26
1
Construction
27
Bitmap
An array with elements represented by one or more bits of
information.
28
17
1
1
Descriptors of the
Logical Storage
Units
Metadata corresponding to the logical storage units
1
Hash Function
Values
Value generated by a hash function
20
Bitmap
An array with elements represented by one or more bits of
information.
20
Descriptors
Corresponding to
the Logical
Storage Units
Metadata corresponding to the logical storage units
20
Hash Function
Values
Value generated by a hash function
2
3
4
5
6
7
8
9
10
United States District Court
Northern District of California
11
12
‘789 Patent
1
Bitmap
An array with elements represented by one or more bits of
information.
20
Bitmap
An array with elements represented by one or more bits of
information.
28
Descriptors of the
Files
Metadata corresponding to the files
28
Control Sum
Values
Plain and ordinary meaning
13
14
15
16
17
18
19
‘459 Patent
20
1
Archival Format
Non-single instance self-contained format for long-term storage
using specialized software
1
Catalog
Software that accesses a data structure and that requests, receives,
and reassembles data stored in a single-instance data storage pool
3
Archival Format
Non-single instance self-contained format for long-term storage
using specialized software
3
Catalog
Software that accesses a data structure and that requests, receives,
and reassembles data stored in a single-instance data storage pool
21
22
23
24
25
26
27
‘592 Patent
28
18
1
17
Lookup table
A table that associates different types of data and identifies one type
of data by reference to another
2
3
4
5
6
7
‘527 Patent
20
Application
Plain and ordinary meaning
20
File Server
In a client-server networked environment, a computer system that
manages access to files
24
Application
Plain and ordinary meaning
24
File Server
In a client-server networked environment, a computer system that
manages access to files
8
9
10
United States District Court
Northern District of California
11
12
‘708 Patent
1
generating
computer
executable
restoration
instructions
Plain and ordinary meaning
13
14
15
16
17
IT IS SO ORDERED.
Dated: December 13, 2013
______________________________________
JON S. TIGAR
United States District Judge
18
19
20
21
22
23
24
25
26
27
28
19
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?