Symantec Corporation v. Acronis, Inc. et al

Filing 168

CORRECTED ORDER CONSTRUING TERMS OF UNITED STATES PATENT NOS. 7,024,527, 7,366,859, 7,454,592, 7,680,957, 7,831,789, 7,941,459 AND 7,996,708 re 115 Brief filed by Symantec Corporation, 117 Brief filed by Acronis International GmbH. Signed by Judge Jon S. Tigar on December 13, 2013. (wsn, COURT STAFF) (Filed on 12/15/2013)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 SYMANTEC CORPORATION, 7 Case No. 12-cv-05331-JST Plaintiff, 8 v. 9 ACRONIS, INC., et al., 10 Defendants. 11 CORRECTED ORDER CONSTRUING TERMS OF UNITED STATES PATENT NOS. 7,024,527, 7,366,859, 7,454,592, 7,680,957, 7,831,789, 7,941,459 AND 7,996,708 United States District Court Northern District of California Re: ECF Nos. 115 & 117. 12 On November 5, 2013, after providing a tentative construction order to the parties, the 13 Court held a hearing for the purpose of construing disputed terms in the claims of United States 14 Patent Nos. 7,024,527, 7,366,859, 7,454,592, 7,680,957, 7,831,789, 7,941,459 and 7,996,708. 15 Now, after consideration of the arguments and evidence presented by the parties, and the relevant 16 portions of the record, the Court construes the terms as set forth below.1 17 I. BACKGROUND 18 A. 19 Procedural History Plaintiff-Counterclaim Defendant Symantec Corporation (“Symantec”) filed this complaint 20 for patent infringement in October 2012, accusing Defendants-Counterclaimants Acronis, Inc., 21 22 23 24 25 Acronis International GMBH and OOO Acronis (collectively, “Acronis”) of infringing Symantec’s U.S. Patents Nos. U.S. Patents Nos. 7,941,459 (“the ‘459 Patent”), 7,024,527 (“the ‘527 Patent”), 7,454,592 (“the ‘592 Patent”), 7,680,957 (“the ‘957 patent”), and 7,996,708 (“the ‘708 patent”). Complaint for Patent Infringement ¶ 1, ECF No. 1. Acronis International GmbH has counterclaimed to accuse Symantec of infringing its U.S. Patents Nos. 7,366,859 (“the ‘859 26 27 1 28 The Court issued a claim construction order on November 23, 2013, and then issued this corrected version to correct a typographical error identified by the parties. See ECF Nos. 167-68. 1 Patent”) and 7,831,789 (“the ‘789 Patent”) (collectively, “the Acronis Patents”). Amended 2 Counterclaims ¶ 1, ECF No. 56. 3 The parties identified nine terms whose construction is “likely to be most significant to 4 resolving the parties’ dispute,” pursuant to Patent Local Rule 4-2(b). Patent L.R. 4-3 Joint Claim 5 Construction and Prehearing Statement 8:7-18, ECF No. 113. As a matter of case management 6 and pretrial procedure, it is well established that district courts have the authority only to construe 7 those terms they deem likely to lead to a dispositive outcome at any one claim construction 8 hearing. See, e.g., Microstrategy Inc. v. Bus. Objects Americas, 410 F. Supp. 2d 348, 355 (D. Del. 9 2006) aff’d, 238 F. App’x 605 (Fed. Cir. 2007) (construing only two claims of the several the parties had submitted for construction). The Federal Circuit even permits district courts to limit 11 United States District Court Northern District of California 10 the claims parties assert in any given action, provided that a patentee is not permanently deprived 12 of the opportunity to later re-assert claims that present unique issues as to liability or damages. 13 See In re Katz Interactive Call Processing Patent Litigation, 639 F.3d 1303, 1310 (Fed. Cir. 2011); 14 Stamps.com, Inc. v. Endicia, Inc., 437 Fed. Appx. 897, 902-03 (Fed. Cir. 2011) (unpublished). 15 The Court proceeds to construe only the nine terms identified in the parties’ joint claim 16 construction statement, since the parties believe construction of such terms those most significant 17 to resolving the parties’ dispute. The Court will revisit the other disputed claim terms only if these 18 constructions do not lead to a dispositive outcome, and even then, the Court may require the 19 parties to demonstrate that the claims with unconstrued terms pose unique issues of liability or 20 damages, and that it is necessary to avoid submitting the dispute over their scope to a jury. See 21 Katz, 639 F.3d at 1312-13. 22 B. Legal Standard 23 The construction of terms found in patent claims is a question of law to be determined by 24 the Court. Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc), 25 aff'd, 517 U.S. 370 (1996). “[T]he interpretation to be given a term can only be determined and 26 confirmed with a full understanding of what the inventors actually invented and intended to 27 envelop with the claim.” Phillips v. AWH Corp., 415 F.3d 1303, 1316 (Fed. Cir. 2005) (quoting 28 Renishaw PLC v. Marposs Societa' per Azioni, 158 F.3d 1243, 1250 (Fed. Cir. 1998)). 2 1 Consequently, courts construe claims in the manner that “most naturally aligns with the patent's 2 description of the invention.” Id. 3 The first step in claim construction is to look to the language of the claims themselves. “It 4 is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to which the 5 patentee is entitled the right to exclude.’” Phillips, 415 F.3d at 1312 (quoting Innova/Pure Water, 6 Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). A disputed claim 7 term should be construed in light of its “ordinary and customary meaning,” which is “the meaning 8 that the term would have to a person of ordinary skill in the art in question at the time of the 9 invention, i.e., as of the effective filing date of the patent application.” Phillips, 415 F.3d at 1312. In some cases, the ordinary meaning of a disputed term to a person of skill in the art is readily 11 United States District Court Northern District of California 10 apparent, and claim construction involves “little more than the application of the widely accepted 12 meaning of commonly understood words.” Id., at 1314. Claim construction may deviate from the 13 ordinary and customary meaning of a disputed term only if (1) a patentee sets out a definition and 14 acts as his own lexicographer, or (2) the patentee disavows the full scope of a claim term either in 15 the specification or during prosecution. Thorner v. Sony Computer Entm’t Am. LLC, 669 F.3d 16 1362, 1365 (Fed. Cir. 2012). Ordinary and customary meaning is not the same as a dictionary definition. “Properly 17 18 viewed, the ‘ordinary meaning’ of a claim term is its meaning to the ordinary artisan after reading 19 the entire patent. Yet heavy reliance on the dictionary divorced from the intrinsic evidence risks 20 transforming the meaning of the claim term to the artisan into the meaning of the term in the 21 abstract, out of its particular context, which is the specification.” Id. at 1321. Typically, the 22 specification “is the single best guide to the meaning of a disputed term.” Vitronics Corp. v. 23 Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996). It is therefore “entirely appropriate for a 24 court, when conducting claim construction, to rely heavily on the written description for guidance 25 as to the meaning of claims.” Phillips, 415 F.3d at 1315. However, while the specification may 26 describe a preferred embodiment, the claims are not necessarily limited only to that embodiment. 27 Id. 28 Finally, courts may consider extrinsic evidence in construing claims, such as “expert and 3 1 inventor testimony, dictionaries, and learned treatises.” Markman, 52 F.3d at 980. Expert 2 testimony may be useful to “provide background on the technology at issue, to explain how an 3 invention works, to ensure that the court's understanding of the technical aspects of the patent is 4 consistent with that of a person of skill in the art, or to establish that a particular term in the patent 5 or the prior art has a particular meaning in the pertinent field.” Phillips, 415 F.3d at 1318. 6 However, extrinsic evidence is “less reliable than the patent and its prosecution history in 7 determining how to read claim terms.” Id. If intrinsic evidence mandates the definition of a term 8 that is at odds with extrinsic evidence, courts must defer to the definition supplied by the former. 9 Id. C. 11 United States District Court Northern District of California 10 Since this is an action “relating to patents,” the Court has jurisdiction pursuant to U.S.C. § 12 1338(a). 13 III. Jurisdiction ANALYSIS 14 A. Patent Numbers 7,366,859 and 7,831,789 (The Acronis Patents) 15 Acronis asserts claims in two U.S. Patents: Nos. 7,366,859 (the “’859 Patent” and 16 7,831,789 (the “’789 Patent”), the latter of which is a continuation-in-part of the former. The 17 patents related to a method and/or system for fast incremental backup of a data storage device. 18 The parties have identified three disputed terms in these patents as most significant to resolving 19 the parties’ dispute. 1. 20 Patent) 21 22 23 24 25 “Bitmap” (claims 1 & 20 of the ‘859 Patent and claim 28 of the ‘789 Bitmap Acronis’s Proposed Construction Symantec’s Proposed Construction An array with elements represented by one or more bits of information. Disputed Claim Term An array with elements having one of two possible states. 26 The parties agree that a “bitmap” is an array of elements, and that the patented technology 27 employs a bitmap to determine which information needs to be backed up. But the parties dispute 28 whether the term “bitmap,” as it is used in the patents, describes an array in which the units of 4 1 which have only two possible states. Symantec argues that the limitation it proposes in its 2 construction is appropriate because claims and specifications in the Patent refer to the bitmap’s 3 elements as either being marked for backup or as not being marked for backup. 4 The specifications indicate that the bitmap’s elements represent that a unit is either marked 5 or unmarked for backup. ‘789 Patent, 8:56-58 & ‘859 Patent, 7:26-27. But in the ‘859 Patent’s 6 embodiment, the bitmap’s elements are disclosed to have a broader scope: “for example, this can 7 be a bitmap of data blocks that are subject to archiving, or a bitmap of used data blocks of the hard 8 disk drive (i.e., blocks of the hard disk drive that contain useful data, rather than ‘empty’ blocks, 9 or free blocks).” 3:21-24. While the embodiment goes on to describe a bitmap that signals only whether or not certain logical structures correspond, 3:28-23, the embodiment nowhere clearly 11 United States District Court Northern District of California 10 indicates that the bitmap in the invention only contains elements that represent only two states. 12 Given the lack of clear intrinsic evidence indicating that the term “bitmap” is limited in the 13 Acronis Patents to being an array that displays one or two states, the extrinsic evidence here is 14 dispositive. “Courts may rely on dictionary definitions when construing claim terms, so long as 15 the dictionary definition does not contradict any definition found in or ascertained by a reading of 16 the patent documents.” 3M Innovative Properties v. Tredegar Corp., 725 F.3d 1315, 1321 (Fed. 17 Cir. 2013); cf. Phillips, 415 F.3d at 1321 (dictionary definition risky when divorced from intrinsic 18 evidence of term within the context of the specification). Acronis submits, and Symantec does not 19 dispute, that dictionary definitions refer to bitmaps as representing “a set of bits,” or a “collection 20 of bits.” See Authoritative Dictionary of IEEE Standards Terms at 104; Microsoft Computer 21 Dictionary at 61. An ordinary artisan skilled in the art would not understand ‘bitmap’ to be 22 limited to arrays whose elements have only one of two states. 23 24 25 The Court adopts Acronis’s proposed construction. 2. “Descriptors” (Claims 1 and 20 of the ‘859 Patent, Claim 28 of the ‘789 Patent) 26 Disputed Claim Term 27 Acronis’s Proposed Construction 28 5 Symantec’s Proposed Construction 1 2 3 4 5 6 7 “Descriptors of Logical Storage Units” (Claim 1 of the ‘859 Patent”) Plain and ordinary meaning Metadata corresponding to the logical storage units “Descriptors Corresponding to the Logical Storage Units” (Claim 20 of the ‘859 Patent) Plain and ordinary meaning Metadata corresponding to the logical storage units “Descriptors of the Files” (Claim 28 of the ‘789 Patent) Plain and ordinary meaning Metadata corresponding to the files The inventions in the Acronis Patents use the “descriptors” as part of the process 8 determining what information has already been backed up. The parties dispute whether the 9 descriptors in the Acronis Patents are comprised only of metadata. 10 The Court will consider a party’s argument that a term should be interpreted in accord with United States District Court Northern District of California 11 its plain and ordinary meaning, and needs no further construction. However, the Court cannot 12 simply decline to construe even an ordinary term if by doing so it fails to resolve the parties’ 13 “actual dispute regarding the proper scope of these claims.” O2 Micro Int’l Ltd. v. Beyond 14 Innovation Tech. Co., Ltd., 521 F.3d 1351, 1360 (Fed. Cir. 2008) (citing Markman, 52 F.3d at 15 976)). Therefore, whenever the Court agrees with a party that a term needs no further 16 construction, the Court is holding as a matter of law that the limitations proposed by the other 17 party do not inhere in the term, and that party will not be permitted to represent to a jury that such 18 a limitation exits. The corollary is that when the Court rejects a “plain and ordinary meaning” 19 construction, it is not necessarily stating that the term is unusually technical, but is concluding that 20 the competing construction more properly depicts the claim scope, which the Court must construe 21 as a matter of law. 22 Nothing in the Acronis Patents specifically limits the descriptors to metadata, and the 23 specification seems to explicitly recognize that they are not so limited: “[t]he descriptors can be, 24 e.g., MFT entries, hash function values, timestamps, checksums, and file metadata.” ‘859 Patent, 25 3:17-19. However, Symantec argues that the patentee disclaimed any broader scope of the term 26 during the prosecution of the ‘859 Patent. Specifically, on December 10, 2007, the applicant 27 proposed to amend the claims to add the words “hash function values of” before the word “the 28 descriptors” in Claims 1(d) and 21(d) of the ‘859 Patent. Amendment and Reply Under 37 C.F.R. 6 1 § 1.111 at 3, 6, Exh. C to Declaration of Eric E. Wall, ECF No. 119-4. The applicant described 2 these amendments to the Patent Office as responding to the Patent Office’s rejection of the claims 3 based on prior art in “Cane,” U.S. Patent No. 5,765,173. The applicant wrote: 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 13 14 15 The independent claims now recite that the hashing is done of the descriptors, i.e., of the metadata associated with data stored on the disk (in the blogs, or in the files). This is clearly different than what is described in Cane (or what is known in the art with regards to using hash functions to determine identity of two data files or data blocks). Cane discusses the use of hashes in column 4, lines 1-6 (as well as simpler mathematical constructs, such as checksums or cyclic redundancy checks, which, for purposes of this discussion, can be viewed as relatively simple hash functions, and all of them belong to a class of mathematical transformations known as “one way functions”). In Cane et al., (and, as is known conventionally), the data of the file itself is hashed (or alternatively, the data of the block itself). The hashes can then be compared, to check for identity. In the present claims, it is not the data that is hashed, but the descriptors - in other words, the metadata. This is clearly different than what is disclosed in Cane. Reconsideration is therefore respectfully requested based on this patentable distinction. Id. at 9 (emphases added). The Court recognizes that “for prosecution disclaimer to attach, our precedent requires that 16 the alleged disavowing actions or statements made during prosecution be both clear and 17 unmistakable.” TecSec, Inc. v. Int’l Bus. Machines Corp., ___ F.3d ___, No. 2012-1415, 2013 18 WL 5452049, at *8 (Fed. Cir. Oct. 2, 2013) (quoting Omega Eng’g, Inc. v. Raytek Corp., 334 F.3d 19 1314, 1325-26 (Fed.Cir.2003)). Here, that bar has been met. The prosecution history reflects a 20 clear and unmistakable disavowal of the claim scope Acronis now urges this Court to adopt. The 21 Court does not agree with Acronis that the “patentee did not argue that the term ‘descriptors’ as 22 used in the patent was narrow or distinguished from prior art descriptors.” Acronis Resp. Br. 23 9:11-13. The amendments were described as doing exactly that. “Metadata” is not used as mere 24 “example”; the applicant specifically distinguished the invention from prior art by stating that the 25 the patented process hashed metadata as opposed to data. The fact that “[t]he list of specific 26 descriptors was not at issue” is a non sequitur. Id. 9:13. What was at issue was the process 27 claimed in Claims 1 and 20, and the issue was resolved in favor of a limiting amendment that 28 excluded the hashing of non-metadata. “[T]he prosecution history may be given substantial 7 1 weight in construing a term where that term was added by amendment.” Bd. of Regents of the 2 Univ. of Texas Sys. v. BENQ Am. Corp., 533 F.3d 1362, 1369 (Fed. Cir. 2008). 3 Not all aspects of the Patents reflect the thrust of the December 2007 amendment. The 4 applicant did not remove or amend the portion of the specification that still states that “[t]he 5 descriptors can be, e.g., MFT entries, hash function values, timestamps, checksums, and file 6 metadata.” ‘859 Patent, 3:17-19. But “an invention is construed not only in the light of the 7 claims, but also with reference to the file wrapper or prosecution history in the Patent Office.” 8 Phillips, 415 F.3d at 1317 (quoting Graham v. John Deere Co., 383 U.S. 1, 33 (1966). Moreover, 9 the structure of the claim terms makes clear that the list described at 3:17-19 cannot be a list of all information that actually comprises the descriptors. For example, the descriptors cannot 11 United States District Court Northern District of California 10 themselves be “hash function values” or else Claims 1 and 20 would be redundantly written. 12 Claim 1(d) would, on that reading, recite a method for “comparing hash function values of the 13 [hash function values] of already archived logical storage units.” 14 15 16 The Court adopts Symantec’s proposed constructions. 3. “Hash Function Values” (claims 1 & 20 of the ‘859 Patent) / “Control Sum Values” (claim 28 of the ‘789 Patent) 17 Disputed Claim Term 18 19 20 Acronis’ Proposed Construction “Hash Function Values” (claims 1 and 20 of the ‘789 Patent) Value generated by a hash function Shorter values of a fixed length that represent the original string and are generated form a hash function algorithim “Control Sum Values” (claim 28 of the ‘789 Patent) Plain and ordinary meaning A shorter value of a fixed length that represents the original string and are generated from a hash function algorithm 21 22 23 24 25 Symantec’s Proposed Construction Symantec draws its definition of “hash function value” from the ‘859 Patent specification. 26 4:48-53. In context, however, that portion of the specification does not clearly indicate that the 27 patentee was setting out a special definition and acting as his or her own lexicographer. Thorner, 28 669 F.3d 1365. The passage is part of a larger, more general description of how hashing works. 8 1 ‘859 Patent, 4:42-58. 2 The parties dispute whether hash function values are always shorter than the “original 3 string.” The specification does state that “content is converted into a short bit string—a hash 4 value,” (‘859 Patent), and also states that one of the advantages of the hash value comparison is 5 that “the value of the hash of the data is much less in size than the data itself.” 4:51-53, 5:23-27. 6 But it also goes on to say ’859 patent specification states that a hash function is a “usually shorter 7 value of a fixed length.” 4:49-50 (emphasis added). Adopting Symantec’s proposed construction 8 would therefore impose a limitation that the specification does not clearly encompass. 9 Symantec makes a similar argument that “control sum value” is similarly limited to representing only shorter values, which the Court rejects for similar reasons. Symantec also 11 United States District Court Northern District of California 10 argues that during prosecution the patentee stated that “control sum value” was coterminous with 12 “hash function value.” Since the Court does not agree with Symantec’s construction of “hash 13 function value,” however, this does not affect the construction. 14 The Court adopts Acronis’s proposed constructions. 15 B. 16 Symantec asserts eleven claims in the ‘459 Patent, which relates to the conversion of data 17 from different storage formats. The parties agree that two terms in the Patent are most significant 18 to resolving the dispute. U.S. Patent No. 7,941,459 “Archival Format” (Claims 1 and 3) 19 1. 20 Disputed Claim Term 21 22 23 24 “Archival format” (Claims 1 and 3) Symantec’s Proposed Construction Non-single instance self-contained format for long-term storage using specialized software Acronis’s Proposed Construction (Conceded.) Acronis initially proposed a competing construction of this term, but now states that 25 “Acronis does not necessarily agree with Symantec’s construction, but . . . is willing to agree to 26 Symantec’s construction since the dispute does not matter to infringement or invalidity and 27 streamlines the issues the Court is required to resolve.” Acronis Responsive Claim Construction 28 Brief 24:20-23, ECF No. 25. The Court understands Acronis’s position, but notes that “archival 9 1 format” was identified by both parties as among the nine terms most significant to a dispositive 2 outcome in this case. In any case, the Court agrees with Symantec that the specification contrasts “archival 3 4 format” from single-instance storage, and makes clear that the archival format is self-contained. 5 ‘459 Patent, at 1:58-2:16. The extrinsic evidence additionally makes clear that one skilled in the 6 art would understand an “archival format” to use specialized software, which is consistent with the 7 intrinsic record. See Wiley Elec. & Elecs. Eng’g Dictionary, John Wiley and Sons, Inc., p. 35 8 (2004); McGraw Hill Dictionary of Scientific and Technical Terms, 6th Ed., p. 132 (2003). The Court adopts Symantec’s proposed construction. 9 2. 10 United States District Court Northern District of California 11 Disputed Claim Term Symantec’s Proposed Construction “Catalog” (Claims 1 and 3) software that accesses a data structure and that requests, receives, and reassembles data stored in a singleinstance data storage pool 12 13 14 “Catalog” ‘459 (Claims 1 and 3) 15 16 Acronis’s Proposed Construction An array identifying data objects and pointing to the location of those data objects and software that accesses the array and that requests, receives, and reassembles the identified data objects 17 The parties agree that the Patent adopts a specialized definition of this term but disagree 18 19 20 21 22 23 24 25 26 27 28 about whether that definition its. Initially, the parties appeared to dispute whether the catalog was merely passive or whether it performed the proactive functions of accessing, and of requesting, receiving and reassembling data. Now, after Acronis has proposed the underlined amendment to its initial construction, it appears that the parties’ dispute is over (1) whether the catalog includes a structure that contains information about the data objects and their location, and (2) whether the catalog also contains, in addition to that structure, software that accesses that structure.2 2 Acronis proposed the underlined amendment to its construction in response to Symantec’s opening brief. And then, at oral argument, in response to this Court’s tentative construction, Acronis proposed yet another new construction that Symantec had not previously seen, which removed the term “array” and the requirement that the catalog “point” to the location of data objects. The Court would ordinarily grant Symantec an opportunity to respond to this new construction, but finds it unnecessary to do here since it will adopt Symantec’s construction as superior to any iteration of Acronis’s constructions. 10 Acronis’s proposed construction may describe the way the catalog functions in Figure 3, 1 2 which depicts the preferred embodiment. But Acronis has not demonstrated that the claims are 3 necessarily limited to the embodiment. See Thorner, 669 F.3d at 1366 (it is “not enough that the 4 only embodiments, or all of the embodiments, contain a particular limitation”). The Court recognizes that, when a patent adopts an idiosyncratic definition, the fact that 5 6 the specification “consistently uses the term” in a particular manner is strong evidence of its 7 meaning. Netcraft Corp. v. eBay, Inc., 549 F.3d 1394, 1399 (Fed. Cir. 2008); see also Hologic, 8 Inc. v. SenoRx, Inc., 639 F.3d 1329, 1338 (Fed. Cir. 2011) (deferring to what the specification 9 “specifically and exclusively shows,” “because that is clearly what the inventors . . . conceived 10 United States District Court Northern District of California 11 of”). Despite this, Acronis’s argument is weakened by the fact that the specification takes 12 several affirmative steps to clarify the limited nature of the specification, rendering it somewhat 13 unlikely that the patentee implicitly understood the term to be limited to the way it was used in the 14 embodiments. For example, the specification discloses specifically that drawings are “not 15 intended to limit the invention to the particular form disclosed.” 3:23-25. 16 While the specific embodiments may use the term in the way that Acronis suggests, the 17 way the specification is written indicates that the inventor conceived of alternate understandings of 18 the term’s scope, and that the term itself is not necessarily limited to the embodiments. For 19 example, the specification states that “Catalog 275 may identify the location of data objects,” not 20 that it must, or that it is inherent in the concept of the “catalog” that it necessarily does. 5:60 21 (emphasis added). When the specification states that “the catalog includes a plurality of entries, 22 each entry identifying a data object and including an associate set of data object attributes,” it is 23 within a passage that is describing “one embodiment.” 2:37, 40-43. This language is explicitly 24 nonexhaustive, and indicates that the term “catalog” is not necessarily limited as Acronis suggests, 25 even if the disclosed embodiments use it only in the manner it describes. In other words, the 26 patent does not “consistently use” the term the way it is used in Acronis’s construction. Cf. 27 Netcraft, 549 F.3d at 1399. It is far from clear that Acronis’s language is “what the inventors . . . 28 conceived of when they used the term “catalog.” Hologic, 639 F.3d at 1338. 11 1 In contrast to Acronis’s construction, Symantec’s proposed construction encompasses the 2 functions performed in the claim language in a straightforward manner. 8:33-50, 9:43-45. The 3 Court adopts Symantec’s proposed construction. 4 C. U.S. Patent No. 7,454,592 5 Symantec asserts claims 17-25 of the ‘592 Patent, which also relates to single-instance 6 storage, and is directed to methods for identifying and appropriately storing duplicate data. The 7 parties have identified the term “lookup table,” in claim 17, as significant to resolving the dispute. 8 9 10 United States District Court Northern District of California 11 12 13 Disputed Claim Term “Lookup table” (Claim 17) Symantec’s Proposed Construction a table that associates different types of data and permits one type of data to be located by reference to the other Acronis’s Proposed Construction a table that associates different types of data and identifies one type of data by reference to another The parties’ differences are not obvious from the face of their competing constructions, but 14 through those constructions the parties seek to encompass very different claim scopes. 15 In Acronis’s original construction, it proposed that the table “uses” one type of data to 16 locate another. Symantec argued, and the Court agrees, that this word implied that the lookup 17 table itself performs an active function. In Acronis’s brief, and at the hearing, Acronis clarified 18 that it does not argue that the lookup table is active. What Acronis argues is that the lookup table 19 itself contains the two types of data it associates, and a user does not need to refer to any other 20 extrinsic sources to make that association. To that end, Acronis has proposed the construction 21 above, which eliminates the word “use,” and is intended to capture the concept that the lookup 22 table indexes data as a table does in a reference book: one type of data in one column, 23 corresponding data in the adjoining column, with both pieces of data provided directly to the user 24 and their association evident on the face of the page. 25 To discourage positional bargaining with the Court, and to avoid giving one party more 26 27 “bites at the apple” than the other, the Court does not ordinarily permit parties to propose new constructions in response to a tentative order. In this case, however, Acronis’s new construction, 28 12 1 beyond conceding to Symantec’s criticism of the word “uses,” does not change the nature of the 2 parties’ dispute. At the hearing, as in its briefs, Symantec has made clear that it disputes whether 3 the claimed lookup table is limited to being the sort of feature described above. The new 4 construction is merely another iteration of the parties’ original dispute, and Symantec is not 5 prejudiced by Acronis’ new proposal. 6 Figures 4 and 5 of the Patent disclose a lookup table that functions in essentially the 7 manner that Acronis suggests. In the first column, one type of data appears (either a logical 8 address or a hash value) and it is is aligned with corresponding data (either a hash value or a 9 physical address) in the next column. A user would use the tables disclosed in the specification by looking at the data in one column, and identifying the data in the adjoining column. The written 11 United States District Court Northern District of California 10 description also reflects this arrangement. Symantec suggests that a feature could qualify as a “lookup table” without presenting 12 13 associated sets of data directly to the user. Symantec proposes that a lookup table need only 14 “permit” data to be located with reference to each other. By that construction, the Court 15 understands Symantec to argue that a feature could qualify as a “lookup table” even if it does not 16 align sets of data in an immediately accessible way, but instead merely contains within it the data 17 that could permit a user to do its own locating. It also seems to endorse a claim scope that would 18 encompass a feature that associates sets of data only by sending a user through a multiple-step 19 process or by accessing extrinsic sources of information. The specification, which is “the single best guide to the meaning of a disputed term,” 20 21 Vitronics, 90 F.3d at 1582, does not reflect this claim scope. To resolve the parties’ dispute over 22 claim scope, the Court adopts Acronis’s proposed construction. 23 D. U.S. Patent No. 7,024,527 24 Symantec asserts claims 20, 21 and 24 of the ‘527 Patent, which discloses a system for 25 restoring data while applications are running and accessing data. The parties dispute two terms in 26 the patent, and agree that both are among the nine most significant to resolving the parties’ 27 dispute. 28 /// 13 1 /// 2 /// 1. 3 “Application” (Claims 20 & 24) 4 Disputed Claim Term 5 6 7 “Application” (Claims 20 & 24) Symantec’s Proposed Construction Plain and ordinary meaning Acronis’s Proposed Construction A program running on top of operating software 8 The Court appreciates Symantec’s argument that “Acronis’s construction does not clarify 9 the meaning of ‘application.’” Symantec Opening Br. 5:1-2. But, as discussed infra, the Court 11 United States District Court Northern District of California 10 must construe even everyday terms where necessary to resolve the parties’ dispute over claim 12 scope, O2 Micro, 521 F.3d at 1360, and the term here is in some sense technical. The parties’ dispute is whether the “application” is limited to being one that is running on 13 14 top of operating software.3 15 The Court does not necessarily agree with Symantec that Acronis’s construction is 16 inconsistent with the specification. Symantec claims that the “specification describes applications, 17 including ‘restore application[s],’ which may run in a pre-boot environment.” Symantec Opening 18 Br. 5:8-9 (citing ‘527 Patent, 1:52-54; 4:14-26), but those portions of the specification do not seem 19 to include any reference to whether or not the applications run in a pre-boot environment. Nonetheless, the intrinsic record does not reflect the limitation Acronis proposes. Acronis 20 21 states that “when the claim refers to ‘an application,’ it is referring to a program the user is 22 running, like a word processor or an email client, which needs access to part of the backup data,” 23 and that “[t]hese types of programs run on top of operating system software.” Acronis Resp. Br. 24 3 25 26 27 28 Acronis amended its original construction in its response brief to no longer specify that the program must be a “user-space” program. And then, at oral argument, in response to this Court’s tentative construction, Acronis proposed yet another new construction that Symantec had not previously seen: “a program running above an operating system, distinct from the file server, and which may include driver software.” As discussed supra, the Court would ordinarily grant Symantec an opportunity to respond to this new construction, but finds it unnecessary to do so here since it will adopt Symantec’s construction. 14 1 7:11-14. But it fails to point to portions of the intrinsic record that demonstrate that this is the 2 case. At oral argument, Acronis’s counsel could point to no portion of the intrinsic record that 3 reflects this limitation, and instead argued that the limitation inheres in the term itself. Whatever 4 the extrinsic evidence would suggest about the normal use of this term, this suggests that there is 5 no evidence that the Patent itself uses the term in the way that Acronis suggests. And both parties 6 have submitted competing extrinsic evidence about the way the term “application,” outside of the 7 context of the patent, would be understood by a person of ordinary skill in the art. The Court 8 cannot conclude on the basis of this that Acronis’s proposed construction is required, especially 9 where the intrinsic evidence fails to support the construction.4 The intrinsic record fails to reflect the limitation Acronis proposes. The Court adopts 10 United States District Court Northern District of California 11 Symantec’s proposed construction. 2. 12 “File Server” (Claims 20 & 24) 13 14 Disputed Claim Term Symantec’s Proposed Construction Acronis’s Proposed Construction 15 16 File server 17 Computing system that handles requests for files In a client-server networked environment, a computer system that manages access to files by one or more client computer systems The parties dispute two limitations proposed by Acronis: whether the claimed “file server” 18 19 (1) must exist within a client-server networked environment, and (2) whether it must manage 20 access from “one or more client computer systems.”5 The specification states that “embodiments may also be implemented in non-networked 21 22 storage environments.” ‘527 Patent 4:11-13. But the fact that the embodiments as a whole may 23 24 25 26 27 28 4 Acronis also argued at the hearing that the Court should clarify that the claimed “file server” cannot qualify as an “application,” since, for example, claim 20 refers to the filer server “directing” the “restore application.” 12:53. The Court agrees that that is a logical conclusion, and does not understand Symantec to dispute it. But even so, that does not demonstrate that Acronis’s construction is correct or that the parties have a dispute over claim scope that the Court must resolve as a matter of law. 5 The parties’ constructions also differ in that one refers to the file server “hand[ling] request for files,” and the other refers to the file server as “manag[ing] access to the files,” but from the briefs and from the hearing it does not appear that the parties believe this distinction to be important. 15 1 be implemented in a non-networked environment does not mean that the “file server” must. And 2 the specification indicates that it does not. Figure 1 shows the file server connected to a 3 “network.” 2:65-67, Fig. 1. The specification also distinguishes the “file server” from a “file 4 system” on a specific computer. 4:14-26. Unlike the “application” term construed supra, Acronis 5 has pointed to significant evidence in the intrinsic evidence suggesting that its construction is 6 correct. The fact that the embodiments are consistent with a proposed construction does not prove 8 that the construction is correct. But given the strong suggestion of the embodiments, the extrinsic 9 record here is dispositive. Acronis submits, and Symantec does not dispute, that a “file server” is 10 commonly defined to operate on a network. Authoritative Dictionary of IEEE Standard Terms, at 11 United States District Court Northern District of California 7 433. A person of ordinary skill in the art, reviewing the intrinsic record, would conclude that the 12 claimed file server operates in a client-server networked environment. 13 However, Acronis has not justified its proposed limitation that the file server manage 14 access to files “by one or more client computer systems.” Acronis argues that that concept is 15 implicit in the concept of a network, but it does not provide any intrinsic (or even extrinsic) 16 evidence that reflects this specific limitation. In fact, in Figure 1, no client computers are 17 disclosed. That may be because Figure 1 is only showing the backup aspects of the network, 18 without showing the client computers being backed up, but regardless, the intrinsic record does 19 not compel Acronis’s construction. 20 Moreover, the syntax of the construction is unclear because of the ambiguous use of the 21 preposition “by.” The construction could be read to suggest that the computer system manages 22 access to the files of one or more client computer systems, but it also could be read to suggest that 23 the computer system manages access to files through the use of one or more client computer 24 systems. This is an unacceptable level of ambiguity for a lay jury to apply. 25 The Court adopts a construction the reflects one but not both of Acronis’s proposed 26 limitations: “In a client-server networked environment, a computer system that manages access to 27 files.” 28 E. U.S. Patent No. 7,996,708 16 Finally, Symantec asserts claims 1, 7-13 and 16 of the ‘708 Patent, which claims 1 2 inventions that facilitate the restoration of a backup created on one system to another system. The 3 parties have identified one term in Claim 1 as most significant to resolving the parties’ dispute. Symantec’s Proposed Construction 4 Disputed Claim Term 5 6 7 generating computer executable restoration instructions (Claim 1) Plain and ordinary meaning Acronis’s Proposed Construction the claimed software writes executable code that guides the restoration process 8 Symantec again argues that Acronis has proposed to construe a term that needs no 9 construction, but the Court must resolve the parties’ dispute over whether the claim’s scope is 10 limited to situations in which the claimed software, as oppose to a human, writes the code that 11 United States District Court Northern District of California guides the restoration process. 12 Acronis points out that various parts of the specification describe a process in which the 13 software module, not a human programmer, generates the code that guides restoration. See, e.g., 14 15 11:1-17. But the specification also states that the module “may utilize . . . user input . . . to generate code for restoring.” 11:1-3. As applied by a jury, Acronis’s construction would 16 apparently rule out this aspect of the disclosed embodiment, and so it is very unlikely be correct. 17 Moreover, the construction is circular and potentially confusing. By using the unclear term 18 “claimed software” within the construction itself, the construction does not function as a 19 clarification of the disputed term. 20 The Court adopts Symantec’s proposed construction. 21 IV. CONCLUSION 22 For the foregoing reasons, the Court construes the disputed claim language as follows: 23 24 Claim Term 25 ‘859 Patent 26 1 Construction 27 Bitmap An array with elements represented by one or more bits of information. 28 17 1 1 Descriptors of the Logical Storage Units Metadata corresponding to the logical storage units 1 Hash Function Values Value generated by a hash function 20 Bitmap An array with elements represented by one or more bits of information. 20 Descriptors Corresponding to the Logical Storage Units Metadata corresponding to the logical storage units 20 Hash Function Values Value generated by a hash function 2 3 4 5 6 7 8 9 10 United States District Court Northern District of California 11 12 ‘789 Patent 1 Bitmap An array with elements represented by one or more bits of information. 20 Bitmap An array with elements represented by one or more bits of information. 28 Descriptors of the Files Metadata corresponding to the files 28 Control Sum Values Plain and ordinary meaning 13 14 15 16 17 18 19 ‘459 Patent 20 1 Archival Format Non-single instance self-contained format for long-term storage using specialized software 1 Catalog Software that accesses a data structure and that requests, receives, and reassembles data stored in a single-instance data storage pool 3 Archival Format Non-single instance self-contained format for long-term storage using specialized software 3 Catalog Software that accesses a data structure and that requests, receives, and reassembles data stored in a single-instance data storage pool 21 22 23 24 25 26 27 ‘592 Patent 28 18 1 17 Lookup table A table that associates different types of data and identifies one type of data by reference to another 2 3 4 5 6 7 ‘527 Patent 20 Application Plain and ordinary meaning 20 File Server In a client-server networked environment, a computer system that manages access to files 24 Application Plain and ordinary meaning 24 File Server In a client-server networked environment, a computer system that manages access to files 8 9 10 United States District Court Northern District of California 11 12 ‘708 Patent 1 generating computer executable restoration instructions Plain and ordinary meaning 13 14 15 16 17 IT IS SO ORDERED. Dated: December 13, 2013 ______________________________________ JON S. TIGAR United States District Judge 18 19 20 21 22 23 24 25 26 27 28 19

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?