TVIIM, LLC v. McAfee, Inc.

Filing 223

ORDER by Judge Haywood S. Gilliam, Jr. GRANTING in part and DENYING in part 112 Motion for Partial Summary Judgment and DENYING 120 Motion for Summary Judgment (hsglc1, COURT STAFF) (Filed on 6/28/2015)

Download PDF
1 2 3 UNITED STATES DISTRICT COURT 4 NORTHERN DISTRICT OF CALIFORNIA 5 6 TVIIM, LLC, Case No. 13-cv-04545-HSG Plaintiff, 7 v. 8 9 MCAFEE, INC., Defendant. 10 ORDER GRANTING IN PART AND DENYING PLAINTIFF’S MOTION FOR PARTIAL SUMMARY JUDGMENT, DENYING DEFENDANT’S MOTION FOR SUMMARY JUDGMENT, AND CONSTRUING RELEVANT TERMS Re: Dkt. Nos. 112, 120 United States District Court Northern District of California 11 12 I. INTRODUCTION 13 This is a patent infringement action brought under 35 U.S.C. § 271(a). Plaintiff TVIIM’s 14 First Amended Complaint (“FAC”) alleges that certain of Defendant McAfee’s security software 15 programs sold between 2007 and the present infringe United States Patent No. 6,889,168 (the “ 16 ‘168 Patent”). FAC ¶¶ 6, 11 (Dkt. No. 22). McAfee asserts counterclaims for non-infringement, 17 invalidity, and inequitable conduct. Dkt. Nos. 24, 102. 18 Presently, the parties are before the Court on two motions: (1) TVIIM’s motion for partial 19 summary judgment as to (a) McAfee’s Fifth Affirmative Defense and Third Counterclaim for 20 inequitable conduct, and (b) McAfee’s Second Affirmative Defense and Second Counterclaim for 21 invalidity (Dkt. No. 112); and (2) McAfee’s motion for summary judgment of invalidity of Claims 22 1-3, 7-9, 11-12, and 19-20 of the ‘168 Patent on anticipation grounds (Dkt. No. 120). In addition, 23 the parties raise a dispute regarding the meaning of the term “vulnerability” as used in the ‘168 24 Patent’s claims. Dkt. No. 120 at 5-6; Dkt. No. 125 at 10, 12-16. 25 Having read and considered the papers filed by the parties, and the arguments made at the 26 May 13, 2015 hearing, the Court: (1) GRANTS in part and DENIES in part TVIIM’s motion for 27 partial summary judgment, (2) DENIES McAfee’s motion for summary judgment in its entirety, 28 and (3) construes the disputed claim term as set forth below. 1 2 3 II. CLAIM CONSTRUCTION A. Construction of the Term “Vulnerability” is Required As a threshold matter, McAfee contends that the plain and ordinary meaning of the term 4 “vulnerability” should control and, as a result, the Court need not construe the term. Dkt. No. 120 5 at 5 (“No terms of the asserted claims require construction by the Court, and all should be given 6 their plain and ordinary meaning.”). While claim terms should ordinarily be given their plain and 7 ordinary meaning, “[a] determination that a claim term needs no construction or has the plain and 8 ordinary meaning may be inadequate when a term has more than one ordinary meaning or when 9 reliance on a term’s ordinary meaning does not resolve the parties’ dispute.” O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co., 521 F.3d 1351, 1361 (Fed. Cir. 2008) (internal citations and 11 United States District Court Northern District of California 10 quotation marks omitted). “[E]ven if a claim term has a plain and ordinary meaning, the court 12 should construe the term if construction is required to resolve a dispute about the scope of the 13 asserted claims, which is a question of law to be decided by the Court.” Takeda Pharm. Co. v. 14 Handa Pharm., LLC, No. C-11-00840 JCS, 2012 WL 1243109, at *7 (N.D. Cal. Apr. 11, 2012); 15 see also O2 Micro, 521 F.3d at 1361 (“In this case, the ‘ordinary’ meaning of a term does not 16 resolve the parties’ dispute, and claim construction requires the court to determine what claim 17 scope is appropriate in the context of the patents-in-suit.”). 18 The parties here dispute the scope of the term “vulnerability” as used in the ‘168 Patent 19 claims. Both parties purport to propose an “ordinary meaning” construction of the term. Dkt. No. 20 125 at 12; Dkt. No. 138 at 2. TVIIM argues that “vulnerability” should be construed to mean 21 “pre-existing security problem,” defined as a “mistake” or “defect” in software. Dkt. No. 125 at 22 13, 16. In its reply brief, McAfee proposed that “vulnerability” should be construed to mean “any 23 exploitable weakness in a computer system.” Dkt. No. 138 at 2-3. But at oral argument, McAfee 24 clarified that, in the alternative, it simply seeks a finding that the plain and ordinary meaning of 25 “vulnerability” as used in the claims is not limited to “pre-existing security problems.” Hr’g. Tr. 26 at 8:6-12 (“And it’s our belief that that narrowing is artificial and not supported by the intrinsic or 27 the extrinsic evidence . . . . [F]rom our perspective, it would suffice for Your Honor to reject that 28 narrowing and to hold that the plain and ordinary meaning is broader than the plaintiff suggests. 1 We don’t think a formal definition is required.”). Because the parties fundamentally dispute the 2 meaning and scope of the term “vulnerability” as used in the ‘168 Patent’s claims, the Court finds 3 that some degree of claim construction is required. 4 5 B. Claim Construction Legal Standard Claim construction is a question of law to be determined by the Court. Markman v. Westview Instruments, Inc., 517 U.S. 370, 391 (1996). The purpose of claim construction is to 7 “determin[e] the meaning and scope of the patent claims asserted to be infringed.” O2 Micro, 521 8 F.3d at 1360 (internal quotation marks and citations omitted). Generally, claim terms should be 9 given their ordinary and customary meaning—i.e., the meaning that the terms would have to a 10 person of ordinary skill in the art at the time of the invention. Phillips v. AWH Corp., 415 F.3d 11 United States District Court Northern District of California 6 1303, 1312–13 (Fed. Cir. 2005). There are only two circumstances where a claim is not entitled to 12 its plain and ordinary meaning: “1) when a patentee sets out a definition and acts as his own 13 lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the 14 specification or during prosecution.” Thorner v. Sony Computer Entm’t Am. LLC, 669 F.3d 1362, 15 1365 (Fed. Cir. 2012). 16 When construing claim terms, the Federal Circuit emphasizes the importance of intrinsic 17 evidence such as the language of the claims themselves, the specification, and the prosecution 18 history. Phillips, 415 F.3d at 1312–17. The claim language can “provide substantial guidance as 19 to the meaning of particular claim terms,” both through the context in which the claim terms are 20 used and by considering other claims in the same patent. Id. at 1314. The specification is likewise 21 a crucial source of information. Although it is improper to read limitations from the specification 22 into the claims, the specification is “the single best guide to the meaning of a disputed term.” Id. 23 at 1315 (“[T]he specification is always highly relevant to the claim construction analysis. Usually, 24 it is dispositive.”) (internal quotation marks omitted); see also Merck & Co. v. Teva Pharms. USA, 25 Inc., 347 F.3d 1367, 1371 (Fed. Cir. 2003) (“[C]laims must be construed so as to be consistent 26 with the specification.”). 27 28 Despite the importance of intrinsic evidence, courts may also consider extrinsic evidence— technical dictionaries, learned treatises, expert and inventor testimony, and the like—to help 3 1 construe the claims. Phillips, 415 F.3d at 1317-18. However, extrinsic evidence is “less 2 significant than the intrinsic record in determining the legally operative meaning of claim 3 language.” Id. at 1317 (internal quotation marks omitted). 4 5 C. Construction of “Vulnerability” The ‘168 Patent, titled “Method and Apparatus for Assessing the Security of a Computer 6 System,” describes a “method and apparatus for analyzing a computer system and identifying 7 security vulnerabilities, and more specifically . . . a method and apparatus for performing a series 8 of procedures which identify security vulnerabilities and discrepancies in the computer system and 9 in some cases suggesting and implementing corrective measures.” ‘168 Patent at 1:11-17. The term vulnerability is used over 30 times in the ‘168 Patent, including in independent claims 1 and 11 United States District Court Northern District of California 10 11, and dependent claims 7, 9, 12, and 13. For example, independent claim 1 describes a “security 12 system comprising:” 13 14 15 16 17 at least one security module which under direction from the processor accesses and analyzes selected portions of the computer apparatus to identify vulnerabilities; [and] at least one utility module which under the direction from the processor, performs various utility functions with regards to the computer apparatus in response to the identified vulnerabilities . . . . ‘168 Patent at 10:65-11:8 (emphasis added). 18 Similarly, claim 7, which depends from claim 1, describes: 19 The security system of claim 1 wherein the security modules include at least one of: 20 21 22 23 a configuration/system module which performs an initial analysis of the computer system to acquire configuration information; a directory checking module which analyzes directories and files in the system memory to determine if security critical files have been tampered with; 24 27 a user manager module which analyzes the system memory with regards to improper or invalid permissions given to users of the system for accessing particular files; an integrity checking module which analyzes files in the system memory to identify system vulnerabilities; 28 a network checking module which analyzes the computer apparatus to identify 25 26 4 1 2 3 4 5 vulnerabilities created as a result of the computer apparatus connecting with a data network; a password checking module which analyzes passwords for users of the computer apparatus to identify vulnerabilities. Id. at 11:25-46 (emphasis added). In support of its argument that “vulnerability” means “pre-existing security problem,” 6 TVIIM argues that “the specification expressly links ‘vulnerability’ with ‘pre-existing security 7 problems.” Dkt. No. 125 at 15. The section of the specification cited by TVIIM concerns the 8 “integrity check module.” ‘168 Patent 5:46-49 (“The integrity check module searches for pre- 9 existing security problems by cross-referencing against a vulnerability database which is stored in 10 United States District Court Northern District of California 11 local memory.”). In response, McAfee points out that claim 7 describes other types of security modules 12 beyond the integrity checking module that also identify “vulnerabilities,” and argues that nothing 13 in the intrinsic record suggests that the vulnerabilities identified by these other modules are limited 14 to “pre-existing” vulnerabilities. For example, the “network checking module” described in claim 15 7 “analyzes the computer apparatus to identify vulnerabilities created as a result of the computer 16 apparatus connecting with a data network.” ‘168 Patent at 11:40-43. But the section of the 17 specification discussing this module does not limit “vulnerability” to “pre-existing” 18 vulnerabilities. Id. at 5:63-6:1 (“The network check module . . . performs various analysis to 19 detect vulnerabilities which may occur due to a computer or server being connected to a network. 20 The checks which may be performed include: checking vulnerable configuration files . . . .”). 21 Similarly, the “password checking module” described in claim 7 “analyzes passwords for users of 22 the computer apparatus to identify vulnerabilities,” Id. at 11:44-46, but these “vulnerabilities,” by 23 definition, are the type that arise from the use of a computer, not from pre-existing flaws in its 24 programming. 25 The Court agrees that the intrinsic evidence is dispositive, and does not support TVIIM’s 26 proposed construction. “Claim terms are presumed to be used consistently throughout the patent.” 27 Research Plastics, Inc. v. Fed Packaging Corp., 421 F.3d 1290, 1295 (Fed. Cir. 2005). Moreover, 28 when a dependent claim describes “elements using the word ‘the’ or ‘said,’ it should be construed 1 to refer back to elements already disclosed in the independent claim.” Phase Four Indus., Inc. v. 2 Marathon Coach, Inc., No. 04-CV-04801 JW, 2006 WL 3742216, at *6 (N.D. Cal. Dec. 19, 3 2006). Here, dependent claim 7 describes “[t]he security system of claim 1 wherein the security 4 modules include at least one of” six specified types of modules. ‘168 Patent at 11:25-26 5 (emphasis added). Applying the above rule of construction, dependent claim 7 is construed to 6 refer back to the “security system” described in claim 1. That security system describes “security 7 modules” which “identify vulnerabilities.” ‘168 Patent at 10:65-67, 11:1-3. Accordingly, each of 8 the modules listed in claim 7 is a “security module,” and because the intrinsic record does not 9 limit the vulnerabilities identified by all of these modules to “pre-existing vulnerabilities,” TVIIM’s proposed limitation is unfounded. See AK Steel Corp. v. Soliac, 344 F.3d 1234, 1242 11 United States District Court Northern District of California 10 (Fed. Cir. 2003) (“[D]ependent claims are presumed to be of narrower scope than the independent 12 claims from which they depend.”). 13 The specification’s description of locations where “vulnerabilities” can be found further 14 undermines TVIIM’s position. The specification discusses “vulnerabilities” that can be found or 15 identified in “configurations” (‘168 Patent at 3:42-44), user accounts (Id. at 5:8-11), the access 16 privileges of files, the owner of the files, and the group of the files (Id. at 5:39-42). In particular, 17 the specification describes detection of vulnerabilities that “may occur due to a computer or server 18 being connected to a network.” Id. at 5:63-6:1. Configurations, user accounts, access privileges, 19 and vulnerabilities that “may occur” due to connection to a network all suggest that vulnerability 20 is not limited to “pre-existing” security flaws or software defects. Instead, configuration errors, 21 groups, file permissions and errors that could occur as a result of being connected to a network 22 suggest that vulnerabilities can develop over time as a computer is used. TVIIM suggests that 23 some configuration and permission errors can be pre-existing “in that they can exist by default in 24 the software or arise from the installation of the software.” Dkt. No. 126 at 14. Whether or not 25 this could be true in theory, the fact remains that the patent specification, claim terms, and file 26 history do not support the blanket limitation proposed in TVIIM’s construction. 27 Accordingly, the Court concludes that “vulnerability” should be given its plain and 28 ordinary meaning as understood by persons of ordinary skill in the art at the time of the invention. 6 1 The Court further finds that this plain and ordinary meaning is not limited only to “pre-existing 2 security problems.” See Eon CorpIP Holdings LLC v. Aruba Networks Inc, 62 F. Supp. 3d 942, 3 953 (N.D. Cal. 2014) (“If the Court agrees with a party that a term needs no construction, the 4 Court is holding as a matter of law that the limitations proposed by the other party do not inhere in 5 the term, and the parties will not be able to argue for such a limitation to a jury.”). 6 III. 7 8 9 MOTIONS FOR SUMMARY JUDGMENT A. Facts 1. HostGUARD, HostCHECK, and the ‘168 Patent Each of the motions in this case involves three separate software security programs: “HostGUARD,” “HostCHECK,” and the invention claimed by the ‘168 Patent. It is undisputed 11 United States District Court Northern District of California 10 that all three programs shared some of the same creators: Bruce Hartley, Eric Knight, and Kevin 12 Reynolds. Mueller Decl. Ex 5 at 33:2-6, 85:1-3, 203:9-204:19 (8/5/14 Knight Dep.), Dkt. No. 13 120-9; Mueller Decl. Ex. 7 at 13:23-25, 14:4-8 (Hartley Dep.), Dkt. No. 120-11; Mueller Decl. Ex. 14 8 at 21:5-18, 65:25-66:7 (Reynolds Dep.), Dkt. No. 120-12. It is further undisputed that each is a 15 computer security program that addresses “vulnerabilities” in some respect. The record shows that 16 HostGUARD was developed first, then HostCHECK, and finally, the invention claimed by the 17 ‘168 Patent. Nonetheless, the ‘168 Patent applicants did not present any evidence regarding 18 HostGUARD to the patent examiner during the ‘168 Patent prosecution (though as shown below, 19 they did disclose HostCHECK). What the parties dispute, and what the resolution of the issues in 20 the case will turn upon, is whether the three programs address “vulnerabilities” in the same way 21 such that the ‘168 Patent is invalid for either anticipation (by HostGUARD) or inequitable conduct 22 (based on nondisclosure of HostGUARD to the PTO). 23 24 2. ‘168 Patent Prosecution History TVIIM applied for the ‘168 Patent on April 12, 2001. ‘168 Patent. On October 28, 2003, 25 the patent examiner rejected claims 1-20 for obviousness under 35 U.S.C. § 103, making the 26 invention unpatentable over another invention called CyberCop Scanner that was created by 27 McAfee (at that time known as “Network Associates”), as described in an article published by 28 InfoWorld in February of 1999. Shaeffer Decl. Ex. 4 at 84902DOC011690-692 (“ ‘168 Patent file 7 1 history”), Dkt. Nos. 113-4 – 113-6. In order avoid invalidity for obviousness, TVIIM first argued that the ‘168 Patent claimed 2 3 priority to an earlier provisional patent application (the ‘270 Provisional Application) which had 4 an effective date of June 15, 1998. Id. at 84902DOC011696-707. As part of TVIIM’s priority 5 argument to the PTO, it compared the elements of the ‘168 Patent to HostCHECK, which was 6 described in the ‘270 Provisional Application. Id. In essence, TVIIM argued that because 7 HostCHECK, as described in the ‘270 Provisional Application, taught the same elements as the 8 ‘168 Patent claims, the ‘168 Patent was a continuation of the ‘270 Provisional Application. Id. Despite these arguments, the patent examiner again rejected the ‘168 Patent, finding that 9 CyberCop was available for use prior to TVIIM’s newly claimed priority date, making the 11 United States District Court Northern District of California 10 invention unpatentable for obviousness. Id. at 84902DOC11776-780 (finding that TVIIM’s 12 arguments had been “fully reviewed,” but were unpersuasive in light of CyberCop’s earlier 13 priority date). TVIIM again requested reconsideration from the PTO. Id. at 84902DOC11785-791. This 14 15 time, instead of claiming an earlier priority date than CyberCop, TVIIM argued that CyberCop did 16 not disclose the same features as those claimed in the ‘168 Patent, and as a result, CyberCop could 17 not be considered prior art sufficient to render the ‘168 Patent “obvious” under 35 U.S.C. § 103. 18 See id. Subsequently, on December 21, 2004, the PTO ended the patent prosecution and issued a 19 notice of allowance for issuance, which ultimately resulted in the approval of the ‘168 Patent. Id. 20 at 84902DOC011794. The PTO did not explain the basis for its conclusion that the ‘168 Patent 21 application finally passed muster. Id. The ‘168 Patent issued on May 3, 2005. Id. at 22 84902DOC001428; ‘168 Patent. 23 24 25 26 27 28 B. McAfee’s Motion for Summary Judgment for Invalidity Based on Anticipation McAfee seeks a summary judgment of invalidity on claims 1-3, 7-9, 11-12, and 19-20 of the ‘168 Patent, arguing anticipation by the HostGUARD materials. 1. Legal Standard Under the version of Section 102 applicable here, a patent is invalid for anticipation where “the invention was patented or described in a printed publication . . . more than one year prior to 8 1 the date of the application for patent.” 35 U.S.C. § 102 (2000). 1 Anticipation under § 102 is a 2 two-step inquiry. Medichem, S.A. v. Rolabo, S.L., 353 F.3d 928, 933 (Fed. Cir. 2003). The first 3 step is claim construction, which the Court has addressed above. The second step requires a 4 comparison of the properly construed claims to the prior art. Id. A prior art reference is 5 anticipatory if it discloses the substance of each element of the claimed invention, though the 6 language need not be identical. In re Bond, 910 F.2d 831, 832–33 (Fed. Cir. 1990) (the elements 7 need not satisfy “an ipsissimis verbis test” to be expressly anticipating). For a claim to be 8 anticipated under § 102, and thus invalid, “each claim element must be disclosed, either expressly 9 or inherently, in a single prior art reference, and the claimed arrangement or combination of those elements must also be disclosed, either expressly or inherently, in that same prior art reference.” 11 United States District Court Northern District of California 10 Therasense, Inc. v. Becton, Dickinson & Co., 593 F.3d 1325, 1332-33 (Fed. Cir. 2010). 12 “[I]nherent anticipation requires that the missing descriptive material is necessarily present, not 13 merely probably or possibly present, in the prior art.” Trintec Indus., Inc. v. Top–U.S.A. Corp., 14 295 F.3d 1292, 1295 (Fed. Cir. 2002) (internal quotation marks omitted). Whether prior art 15 anticipates the accused device is a question of fact. Orion IP, LLC v. Hyundai Motor Am., 605 16 F.3d 967, 974 (Fed. Cir. 2010). Because patents are presumed valid, a party challenging the validity of a patent bears the 17 18 burden of proving invalidity by clear and convincing evidence. 35 U.S.C. § 282(a); Ericsson, Inc. 19 v. D-Link Systems, Inc., 773 F.3d 1201, 1224 (Fed. Cir. 2014). Whether a prior art reference 20 “disclose[s] each and every element of the claimed invention” is largely a fact-dependent inquiry. 21 In re Gleave, 560 F.3d 1331, 1334 (Fed. Cir. 2009). “Summary judgment is proper if no 22 reasonable jury could find that the patent is not anticipated” based on the undisputed facts. 23 Telemac Cellular Corp. v. Topp Telecom, Inc., 247 F.3d 1316, 1327 (Fed. Cir. 2001) (internal 24 citation omitted); Oney v. Ratliff, 182 F.3d 893, 895 (Fed. Cir. 1999) (“[S]ummary judgment is 25 inappropriate if a trier of fact applying the clear and convincing standard could find for either 26 1 27 28 35 U.S.C. § 102 was amended in May of 2015, but the version of the statute in effect at the time ‘168 Patent was being prosecuted applies here. See Patent Law Treaties Implementation Act of 2012, Pub. L. No. 112-211, § 203 (b) (2), 126 Stat. 1527, 1537. 9 1 party.”). Therefore, in evaluating whether McAfee is entitled to summary judgment for 2 anticipation, the Court, viewing the evidence in the light most favorable to TVIIM, must decide 3 whether any reasonable jury would have to find that every element of the ‘168 Patent was 4 disclosed by the HostGUARD materials. 5 2. Discussion According to McAfee, the HostCHECK materials, which TVIIM relied upon in obtaining 7 the priority date for the ‘168 Patent, describe the “same or similar” functionality as HostGUARD 8 materials. Dkt. No. 120 at 2. McAfee argues that because the HostGUARD materials disclose the 9 claim limitations of the ‘168 Patent “in precisely the same way” that the ‘168 Patent applicants 10 argued the HostCHECK materials disclose the ‘168 Patent claim limitations, the HostGUARD 11 United States District Court Northern District of California 6 materials necessarily anticipate, and therefore invalidate, the ‘168 Patent. Id. at 1-2; see also ‘168 12 Patent File History at 84902DOC011696-1707 (Response to PTO citing HostCHECK Materials); 13 ‘168 Patent File History at 84902DOC011708-732 (HostCHECK Materials). In support of this 14 contention, McAfee compares the relevant language from a HostGUARD brochure (Mueller Decl. 15 Ex. 10) and website (Mueller Decl. Ex. 9) to (1) the HostCHECK Materials that were provided to 16 the patent examiner and (2) the ‘168 Patent’s claim limitations. App’x A: Claim Chart (Dkt. No. 17 121). 18 TVIIM argues that the HostGUARD materials do not anticipate the asserted claims for five 19 reasons. See Dkt. No. 125 at 18. Because there are disputed issues of material fact as to whether 20 the HostGUARD materials constitute invalidating prior art and disclose every element of the ‘168 21 Patent, the Court denies the motion for summary judgment on that basis, and does not address 22 TVIIM’s other arguments. 23 24 25 26 a. There are Material Issues of Fact as to Whether the HostGUARD Materials are Invalidating Prior Art TVIIM advances two main arguments as to why the HostGUARD materials cannot be considered invalidating prior art: (1) the materials were not sufficiently publically accessible to be 27 28 10 1 considered invalidating, and (2) the materials were not “enabled.” 2 Starting with the first argument, to be invalidating, prior art must have described the 2 3 patented invention in a printed publication that was publically accessible more than a year before 4 the patent issued. See 35 U.S.C. § 102 (2000). The determination of whether a particular printed 5 publication was “publically accessible” depends on a satisfactory factual showing that such a 6 document has been “disseminated or otherwise made available to the extent that persons interested 7 and ordinarily skilled in the subject matter or art[,] exercising reasonable diligence, can locate it.” 8 Sri International, Inc. v. Internet Security Systems, Inc., 511 F.3d 1186, 1194-95 (Fed. Cir. 2008) 9 (internal citations and quotation marks omitted) (vacating and remanding summary judgment of invalidity based on prior art where the “court perceive[d] factual issues” regarding whether a 11 United States District Court Northern District of California 10 particular publication was “publically accessible” which “prevente[d] entry of summary 12 judgment”). The evidence in the record that the HostGUARD brochure was disseminated at a trade 13 14 show in 1996 is derived from deposition testimony of one of HostGUARD’s creators, Bruce 15 Hartley. Mueller Decl. Ex. 6 at 176:15-177:11, 212:20-213:10 (Hartley Dep.) (acknowledging 16 that the brochure was created for and publicly disseminated at a trade show); Ex. 10 (HostGUARD 17 Brochure); Ex. 11 (article describing HostGUARD at the “23rd Annual Computer Security 18 Conference” in Chicago from 11/10-11/12/1996). However, whether Hartley’s deposition 19 testimony and the rest of the record establish by clear and convincing evidence that the 20 HostGUARD brochure was presented at the trade show in a manner that made it “publically 21 accessible” is a disputed issue of fact that cannot be resolved at summary judgment. 22 23 24 25 26 27 2 TVIIM also argues that because the HostGUARD brochure was not disclosed in McAfee’s original infringement contentions, it may not be relied upon as prior art under Patent Local Rule 33(a). Dkt. No. 125 at 20. The Court disagrees. The purpose of the patent local rule is to disclose invalidity theories and provide all parties with adequate notice of the information necessary to prepare the case. The Court finds that TVIIM has had ample notice and time to prepare its defenses. Additionally, TVIIM does not claim any prejudice resulting from the exclusion of these materials from the contentions. 28 11 1 Next, TVIIM claims that both the HostGUARD brochure and website were not sufficiently 2 enabled to constitute anticipating “prior art.” Dkt. No. 125 at 24 (citing Amgen Inc. v. Hoechst 3 Marion Roussel, Inc., 314 F.3d 1313, 1354 (Fed. Cir. 2003)) (“A prior art reference cannot 4 anticipate a claimed invention if the allegedly anticipatory disclosures cited as prior art are not 5 enabled.”). In order to be enabling, a prior art reference must describe “the claimed invention 6 sufficiently to enable a person of ordinary skill in the art to carry out the invention.” Impax Labs., 7 Inc. v. Aventis Pharm. Inc., 468 F.3d 1366, 1383 (Fed. Cir. 2006). The only evidence in the 8 record bearing directly on the enablement issue is Bruce Hartley’s testimony that the HostGUARD 9 brochure is “very high level” and “does not contain much content.” Grant Decl. Ex. 14 at 178:215 (Hartley Dep.), Dkt. No. 127-16. Hartley otherwise expressed no opinion as to whether the 11 United States District Court Northern District of California 10 HostGUARD brochure would be sufficient to allow a person of ordinary skill in the art to carry 12 out the invention. Based on the sparse evidence presented on this issue, the Court cannot conclude 13 that the descriptions in the HostGUARD materials (the brochure or the website) are enabled and 14 therefore anticipate the ‘168 patent claims as a matter of law. 15 16 17 b. There are Material Issues of Fact as to Whether the HostGUARD Materials Sufficiently Disclose Each Element of the ‘168 Patent TVIIM also argues that the HostGUARD materials cannot have anticipated the ‘168 Patent 18 claims because they do not take any action with respect to vulnerabilities. Whether the 19 HostGUARD materials disclose specified actions taken in response to vulnerabilities is a factual 20 question. The crux of the issue here is whether the HostGUARD materials, which describe 21 modules that identify vulnerabilities and “allow corrective measures to be taken with the tool,” 22 necessarily teach the same claims as the ‘168 Patent does. According to TVIIM, HostGUARD 23 merely identifies and reports “potential” vulnerabilities, whereas the ‘168 Patent teaches an 24 invention that takes actions in response to identified “actual” vulnerabilities. Dkt. No. 125 at 23. 25 Without the ability to act on “actual,” instead of “potential” vulnerabilities, TVIIM argues, 26 HostGUARD cannot be said to anticipate each and every element of the ‘168 Patent claims. 27 28 The great weight of the evidence in the record regarding what the inventions teach (corrective measures focused on “actual” versus “potential” vulnerabilities, the ability to take 12 1 corrective measures as part of a utility function, and the necessity of the presence of a “utility 2 module”) comes from expert reports and deposition testimony. Credibility disputes regarding 3 deposition testimony, expert opinions and witness statements cannot be decided by the Court as a 4 matter of law at summary judgment. At the summary judgment stage, the Court “does not assess 5 credibility or weigh the evidence, but simply determines whether there is a genuine factual issue 6 for trial.” House v. Bell, 547 U.S. 518, 559-60, (2006). On this record, the Court cannot conclude 7 that any reasonable jury would have to find that the ‘168 Patent is anticipated by the HostGUARD 8 materials. For the foregoing reasons, McAfee’s Motion for Summary Judgment of Invalidity is 9 10 United States District Court Northern District of California 11 12 13 DENIED. C. TVIIM’s Motion for Partial Summary Judgment 1. Inequitable Conduct - Legal Standard TVIIM moves for partial summary judgment on McAfee’s Fifth Affirmative Defense and 14 Third Counterclaim, both of which allege inequitable conduct. “Inequitable conduct is an 15 equitable defense to patent infringement that, if proved, bars enforcement of a patent.” 16 Therasense, 649 F.3d at 1285. “To prevail on the defense of inequitable conduct, the accused 17 infringer must prove that the applicant misrepresented or omitted material information with the 18 specific intent to deceive the PTO” by “clear and convincing evidence.” Id. at 1287. Intent and 19 materiality are separate requirements. Hoffmann–La Roche, Inc. v. Promega Corp., 323 F.3d 20 1354, 1359 (Fed. Cir. 2003). Both intent and materiality are questions of fact. 1st Media, LLC v. 21 Elec. Arts, Inc., 694 F.3d 1367, 1372 (Fed. Cir. 2012). 22 To meet the clear and convincing evidence standard, the accused’s specific intent to 23 deceive must be “the single most reasonable inference able to be drawn from the evidence.” Star 24 Scientific Inc. v. R.J. Reynolds Tobacco Co., 537 F.3d 1357, 1366 (Fed. Cir. 2008). Because 25 evidence of direct intent is rare, intent may be inferred from indirect and circumstantial evidence. 26 Therasense, 649 F.3d at 1290. Where there are multiple reasonable inferences that may be drawn 27 from the accused’s conduct, intent to deceive cannot be found. Id. 28 To prevail on its partial motion for summary judgment, TVIIM has the burden of 13 1 establishing the absence of evidence supporting an essential element of McAfee’s case. Celotex 2 Corp. v. Catrett, 477 U.S. 317, 325 (1996); Optium Corp. v. Emcore Corp., 603 F.3d 1313, 1319– 3 20 (Fed. Cir. 2010). That is, if the Court finds that genuine issues of material facts exist regarding 4 either the materiality of the omitted information or the specific intent of the ‘168 Patent applicants, 5 summary judgment must be denied. See Ohio Willow Wood Co. v. Alps S., LLC, 735 F.3d 1333, 6 1345, 1351-1352 (Fed. Cir. 2013) (finding that summary judgment of no inequitable conduct was 7 precluded where genuine issues of material facts existed as to the but-for materiality of the 8 withheld information and the intent of the patent applicants). 9 10 2. Discussion McAfee alleges that TVIIM engaged in inequitable conduct in violation of 37 C.F.R. § United States District Court Northern District of California 11 1.56 by failing to present evidence of HostGUARD and another software program called System 12 Security Scanner (“SSS”) to the patent examiner during the prosecution of the ‘168 Patent. Dkt. 13 No. 102 ¶ 16. McAfee asserts that each of these software programs constitutes “prior art” to the 14 ‘168 Patent which would have prevented the ‘168 Patent from issuing had it been presented to the 15 patent examiner. 16 TVIIM responds that neither SSS nor HostGUARD was invalidating prior art, and thus 17 both are immaterial in the inequitable conduct inquiry. TVIIM contends, as it did in its defense to 18 McAfee’s anticipation argument, that these programs merely identify vulnerabilities, but do not 19 take any action in response to identified vulnerabilities, which it claims distinguishes them from 20 the invention described in the ‘168 Patent. Dkt. 112 at 8-9. Additionally, TVIIM argues that both 21 the SSS and HostGUARD software materials were duplicative of materials that the patent 22 examiner considered such as Enterprise Security Manager (“ESM”) and Titan, both security 23 programs that detect or ‘fix’ “potential security problems.” Dkt. No. 112 at 8; Shaeffer Decl. Ex. 24 4 at 612-13, 628 (ESM and Titan materials in the ‘168 Patent file history). 25 Whether these programs constitute invalidating prior art, and whether information about 26 them would have been material to the patent examiner, are heavily-contested issues of fact in this 27 case, making their resolution on summary judgment inappropriate. 28 TVIIM’s arguments for summary judgment on the specific intent issue also fail. 14 1 Regarding SSS, TVIIM argues that McAfee cannot show the specific intent required to prove 2 inequitable conduct because McAfee has not proffered any evidence tending to show that “[the 3 ‘168 Patent] inventors knew about SSS and HostGUARD . . . and deliberately withheld them from 4 the [PTO].” Dkt. No. 112 at 13. The evidence in the record paints a different picture. The record 5 supports an inference that during the prosecution of the ‘168 Patent, the applicants selectively 6 submitted documents that compared HostCHECK’s performance in scanning for vulnerabilities 7 with that of SSS. ‘168 Patent file history at 84902DOC011717, 84902DOC11719, and 8 84902DOC011720. Additionally, Bruce Hartley testified that DMW WorldWide, LLC, the 9 company that created HostCHECK and Hartley’s former employer, must have had a copy of SSS or technical documents about it in order to produce the documents submitted to the PTO during 11 United States District Court Northern District of California 10 the ‘270 Provisional Application process (where materials comparing HostCHECK to SSS were 12 first submitted to the PTO). Mueller Decl. Ex. 3 at 159:1-3, 159:20-160:4. 13 With respect to HostGUARD, at least three of the named inventors on the ‘168 Patent, 14 (Bruce Hartley, Eric Knight, and Kevin Reynolds) helped develop HostGUARD. Id. at 12:15-17; 15 Mueller Decl. Ex 5 at 33:2-8, 85:1-3; Ex. 8 at 21:5-18, 65:25-66:7. Though not dispositive, 16 McAfee has presented at least some evidence suggesting that the HostGUARD materials disclose 17 some of the same functions claimed in the ‘168 Patent. It strains credulity to believe that Hartley, 18 Knight, and Reynolds did not know about HostGUARD or its functionality. Given the arguable 19 similarities between HostCHECK and HostGUARD, a reasonable jury could conclude that 20 TVIIM’s failure to present the PTO with evidence of HostGUARD provided a “misleadingly 21 incomplete” description of prior art that can be considered evidence of deceptive intent to mislead 22 the PTO. Apotx Inc. v. UCB, Inc., 763 F.3d 1354, 1362 (Fed. Cir. 2012); see also Worldwide 23 Home Products, Inc. v. Bed, Bath & Beyond, Inc., No. 11CV3633-LTS-MHD, 2015 WL 568710, 24 at *10 (S.D.N.Y. Feb. 11, 2015) (“Selectively withholding material information is indicative of an 25 intent to deceive for the purposes of inequitable conduct.”). 26 Drawing all inferences in favor of McAfee, a reasonable jury could find, based on the 27 evidence in the record at this stage, that the ‘168 Patent applicants acted with specific intent to 28 deceive the PTO. 15 For all of these reasons, the Court DENIES TVIIM’s motion for summary judgment as to 1 2 McAfee’s inequitable conduct defense and counterclaim (Fifth Affirmative Defense and Third 3 Counterclaim). 4 D. Indefiniteness TVIIM also moves for summary judgment on McAfee’s invalidity counterclaim and 5 6 defenses pursuant to 35 U.S.C. § 112 for indefiniteness. 3 In its opposition, McAfee contends that 7 “to the extent that” claim 1 of the ‘168 Patent is an apparatus claim which requires actions to be 8 performed, claim 1 and its dependent claims (2, 3, 7, and 8) are invalid for indefiniteness. Dkt. 9 No. 129 at 16. The definiteness requirement of 35 U.S.C. § 112 requires that “a patent claim must 11 United States District Court Northern District of California 10 particularly point[ ] out and distinctly claim[ ] the subject matter which the inventor . . . regards as 12 the invention.” 35 U.S.C. § 112 (b). “Whether a claim satisfies the so-called definiteness 13 requirement of Section 112 [b] is a matter of law and is therefore appropriately decided at 14 summary judgment.” Apple, Inc. v. Samsung Electronics Co., 876 F. Supp. 2d 1141, 1153 (N.D. 15 Cal. 2012). Proof of indefiniteness must meet “an exacting standard.” Haemonetics Corp. v. 16 Baxter Healthcare Corp., 607 F.3d 776, 783 (Fed. Cir. 2010). “Only claims not amenable to 17 construction or insolubly ambiguous are indefinite.” Id. A claim may be invalid for indefiniteness where it recites both an apparatus claim and a 18 19 method for using that apparatus. IPXL Holdings, L.L.C. v. Amazon.com, Inc., 430 F.3d 1377, 20 1384 (Fed. Cir. 2005); 35 U.S.C. § 112. However, “apparatus claims are not necessarily indefinite 21 for using functional language.” Microprocessor Enhancement Corp. v. Texas Instruments Inc., 22 520 F.3d 1367, 1375 (Fed. Cir. 2008). Functional language is that which defines an apparatus “by 23 what it does rather than what it is.” Halliburton Energy Servs., Inc. v. M-I LLC, 514 F.3d 1244, 24 1255 (Fed. Cir. 2008) (holding that a claim term that discussed the ability of an invention was not 25 26 27 28 3 In its first amended answer and counterclaim to TVIIM’s first amended complaint (Dkt. No. 102), McAfee presented invalidity counterclaims under 35 U.S.C. §§ 101 and 112. McAfee has since withdrawn those contentions with the exception of its indefiniteness claims. McAfee Reply at 16 (Dkt. No. 129). The Court accordingly DISMISSES the remaining invalidity counterclaims. 16 1 indefinite). Language that identifies “capabilities of the claimed apparatus” when a user performs 2 a predicate act is not considered indefinite under § 112. See Apple, 876 F. Supp. 2d 1141. 3 McAfee contends that claim 1 is indefinite because in its invalidity contentions, TVIIM 4 “appear[ed] to assert that claim 1 requires the action of actually performing a utility function.” 5 Dkt. No. 129 at 17. This argument is meritless. Claim 1 describes: 6 A security system for a computer apparatus, wherein said computer apparatus includes a processor and system memory comprising: 7 at least one security module which under direction from the processor accesses and analyzes selected portions of the computer apparatus to identify vulnerabilities; 8 9 10 at least one utility module which under the direction from the processor, performs various utility functions with regards to the computer apparatus in response to the identified vulnerabilities; and United States District Court Northern District of California 11 12 a security system memory which contains security information for performing the analysis of the computer apparatus. 13 14 ‘168 Patent at 10:65-11:10 (emphasis added). 15 The plain language of claim 1 makes clear that the phrase “performs various utility 16 functions” is functional language that describes what the “utility module” does. Unlike the claim 17 at issue in IXPL, nothing in claim 1 describes action by a “user.” McAfee has failed to show the 18 existence of any genuine issue of material fact with regard to this issue as required by Celotex. 19 Accordingly, TVIIM is entitled to summary judgment on McAfee’s indefiniteness claims as a 20 matter of law. 21 IV. CONCLUSION 22 For the foregoing reasons: 23 1. DENIED in its entirety. 24 25 26 McAfee’s Motion for Summary Judgment for Invalidity for anticipation is 2. TVIIM’s Motion for Partial Summary Judgment is GRANTED with respect to McAfee’s claims and defenses for indefiniteness under 35 U.S.C. § 101 and 35 27 28 17 U.S.C. § 112 (Second Affirmative Defense and Second Counterclaim). 4 1 2 3. TVIIM’s Motion for Partial Summary Judgment is DENIED with respect to 3 McAfee’s claims and defenses for inequitable conduct (Fifth Affirmative Defense 4 and Third Counterclaim). 5 4. 6 The term “vulnerability” shall have its plain and ordinary meaning, and is not limited in scope to “pre-existing” security problems or vulnerabilities. 7 8 9 IT IS SO ORDERED. 10 United States District Court Northern District of California 11 Dated: June 28, 2015 ______________________________________ HAYWOOD S. GILLIAM, JR. United States District Judge 12 13 14 15 16 17 18 19 20 21 22 23 24 4 25 26 27 28 In conjunction with its motion for summary judgment, TVIIM objected to and moved the court to strike the declaration of Aviel Rubin filed in support of McAfee’s motion for summary judgement. (Dkt. No. 126). Because the Court did not rely on the Rubin declaration, the motion to strike is DENIED as moot. See Ross v. Indep. Living Res. of Contra Costa Cnty., No. C0800854 TEH, 2010 WL 2898773, at *2, n.1 (N.D. Cal. July 21, 2010) (denying evidentiary objections as moot because the court did not rely on the evidence to which the objections were lodged). 18

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?