TVIIM, LLC v. McAfee, Inc.
Filing
223
ORDER by Judge Haywood S. Gilliam, Jr. GRANTING in part and DENYING in part 112 Motion for Partial Summary Judgment and DENYING 120 Motion for Summary Judgment (hsglc1, COURT STAFF) (Filed on 6/28/2015)
1
2
3
UNITED STATES DISTRICT COURT
4
NORTHERN DISTRICT OF CALIFORNIA
5
6
TVIIM, LLC,
Case No. 13-cv-04545-HSG
Plaintiff,
7
v.
8
9
MCAFEE, INC.,
Defendant.
10
ORDER GRANTING IN PART AND
DENYING PLAINTIFF’S MOTION FOR
PARTIAL SUMMARY JUDGMENT,
DENYING DEFENDANT’S MOTION
FOR SUMMARY JUDGMENT, AND
CONSTRUING RELEVANT TERMS
Re: Dkt. Nos. 112, 120
United States District Court
Northern District of California
11
12
I.
INTRODUCTION
13
This is a patent infringement action brought under 35 U.S.C. § 271(a). Plaintiff TVIIM’s
14
First Amended Complaint (“FAC”) alleges that certain of Defendant McAfee’s security software
15
programs sold between 2007 and the present infringe United States Patent No. 6,889,168 (the “
16
‘168 Patent”). FAC ¶¶ 6, 11 (Dkt. No. 22). McAfee asserts counterclaims for non-infringement,
17
invalidity, and inequitable conduct. Dkt. Nos. 24, 102.
18
Presently, the parties are before the Court on two motions: (1) TVIIM’s motion for partial
19
summary judgment as to (a) McAfee’s Fifth Affirmative Defense and Third Counterclaim for
20
inequitable conduct, and (b) McAfee’s Second Affirmative Defense and Second Counterclaim for
21
invalidity (Dkt. No. 112); and (2) McAfee’s motion for summary judgment of invalidity of Claims
22
1-3, 7-9, 11-12, and 19-20 of the ‘168 Patent on anticipation grounds (Dkt. No. 120). In addition,
23
the parties raise a dispute regarding the meaning of the term “vulnerability” as used in the ‘168
24
Patent’s claims. Dkt. No. 120 at 5-6; Dkt. No. 125 at 10, 12-16.
25
Having read and considered the papers filed by the parties, and the arguments made at the
26
May 13, 2015 hearing, the Court: (1) GRANTS in part and DENIES in part TVIIM’s motion for
27
partial summary judgment, (2) DENIES McAfee’s motion for summary judgment in its entirety,
28
and (3) construes the disputed claim term as set forth below.
1
2
3
II.
CLAIM CONSTRUCTION
A.
Construction of the Term “Vulnerability” is Required
As a threshold matter, McAfee contends that the plain and ordinary meaning of the term
4
“vulnerability” should control and, as a result, the Court need not construe the term. Dkt. No. 120
5
at 5 (“No terms of the asserted claims require construction by the Court, and all should be given
6
their plain and ordinary meaning.”). While claim terms should ordinarily be given their plain and
7
ordinary meaning, “[a] determination that a claim term needs no construction or has the plain and
8
ordinary meaning may be inadequate when a term has more than one ordinary meaning or when
9
reliance on a term’s ordinary meaning does not resolve the parties’ dispute.” O2 Micro Int’l Ltd.
v. Beyond Innovation Tech. Co., 521 F.3d 1351, 1361 (Fed. Cir. 2008) (internal citations and
11
United States District Court
Northern District of California
10
quotation marks omitted). “[E]ven if a claim term has a plain and ordinary meaning, the court
12
should construe the term if construction is required to resolve a dispute about the scope of the
13
asserted claims, which is a question of law to be decided by the Court.” Takeda Pharm. Co. v.
14
Handa Pharm., LLC, No. C-11-00840 JCS, 2012 WL 1243109, at *7 (N.D. Cal. Apr. 11, 2012);
15
see also O2 Micro, 521 F.3d at 1361 (“In this case, the ‘ordinary’ meaning of a term does not
16
resolve the parties’ dispute, and claim construction requires the court to determine what claim
17
scope is appropriate in the context of the patents-in-suit.”).
18
The parties here dispute the scope of the term “vulnerability” as used in the ‘168 Patent
19
claims. Both parties purport to propose an “ordinary meaning” construction of the term. Dkt. No.
20
125 at 12; Dkt. No. 138 at 2. TVIIM argues that “vulnerability” should be construed to mean
21
“pre-existing security problem,” defined as a “mistake” or “defect” in software. Dkt. No. 125 at
22
13, 16. In its reply brief, McAfee proposed that “vulnerability” should be construed to mean “any
23
exploitable weakness in a computer system.” Dkt. No. 138 at 2-3. But at oral argument, McAfee
24
clarified that, in the alternative, it simply seeks a finding that the plain and ordinary meaning of
25
“vulnerability” as used in the claims is not limited to “pre-existing security problems.” Hr’g. Tr.
26
at 8:6-12 (“And it’s our belief that that narrowing is artificial and not supported by the intrinsic or
27
the extrinsic evidence . . . . [F]rom our perspective, it would suffice for Your Honor to reject that
28
narrowing and to hold that the plain and ordinary meaning is broader than the plaintiff suggests.
1
We don’t think a formal definition is required.”). Because the parties fundamentally dispute the
2
meaning and scope of the term “vulnerability” as used in the ‘168 Patent’s claims, the Court finds
3
that some degree of claim construction is required.
4
5
B.
Claim Construction Legal Standard
Claim construction is a question of law to be determined by the Court. Markman v.
Westview Instruments, Inc., 517 U.S. 370, 391 (1996). The purpose of claim construction is to
7
“determin[e] the meaning and scope of the patent claims asserted to be infringed.” O2 Micro, 521
8
F.3d at 1360 (internal quotation marks and citations omitted). Generally, claim terms should be
9
given their ordinary and customary meaning—i.e., the meaning that the terms would have to a
10
person of ordinary skill in the art at the time of the invention. Phillips v. AWH Corp., 415 F.3d
11
United States District Court
Northern District of California
6
1303, 1312–13 (Fed. Cir. 2005). There are only two circumstances where a claim is not entitled to
12
its plain and ordinary meaning: “1) when a patentee sets out a definition and acts as his own
13
lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the
14
specification or during prosecution.” Thorner v. Sony Computer Entm’t Am. LLC, 669 F.3d 1362,
15
1365 (Fed. Cir. 2012).
16
When construing claim terms, the Federal Circuit emphasizes the importance of intrinsic
17
evidence such as the language of the claims themselves, the specification, and the prosecution
18
history. Phillips, 415 F.3d at 1312–17. The claim language can “provide substantial guidance as
19
to the meaning of particular claim terms,” both through the context in which the claim terms are
20
used and by considering other claims in the same patent. Id. at 1314. The specification is likewise
21
a crucial source of information. Although it is improper to read limitations from the specification
22
into the claims, the specification is “the single best guide to the meaning of a disputed term.” Id.
23
at 1315 (“[T]he specification is always highly relevant to the claim construction analysis. Usually,
24
it is dispositive.”) (internal quotation marks omitted); see also Merck & Co. v. Teva Pharms. USA,
25
Inc., 347 F.3d 1367, 1371 (Fed. Cir. 2003) (“[C]laims must be construed so as to be consistent
26
with the specification.”).
27
28
Despite the importance of intrinsic evidence, courts may also consider extrinsic evidence—
technical dictionaries, learned treatises, expert and inventor testimony, and the like—to help
3
1
construe the claims. Phillips, 415 F.3d at 1317-18. However, extrinsic evidence is “less
2
significant than the intrinsic record in determining the legally operative meaning of claim
3
language.” Id. at 1317 (internal quotation marks omitted).
4
5
C.
Construction of “Vulnerability”
The ‘168 Patent, titled “Method and Apparatus for Assessing the Security of a Computer
6
System,” describes a “method and apparatus for analyzing a computer system and identifying
7
security vulnerabilities, and more specifically . . . a method and apparatus for performing a series
8
of procedures which identify security vulnerabilities and discrepancies in the computer system and
9
in some cases suggesting and implementing corrective measures.” ‘168 Patent at 1:11-17. The
term vulnerability is used over 30 times in the ‘168 Patent, including in independent claims 1 and
11
United States District Court
Northern District of California
10
11, and dependent claims 7, 9, 12, and 13. For example, independent claim 1 describes a “security
12
system comprising:”
13
14
15
16
17
at least one security module which under direction from the processor
accesses and analyzes selected portions of the computer apparatus to
identify vulnerabilities; [and]
at least one utility module which under the direction from the processor,
performs various utility functions with regards to the computer
apparatus in response to the identified vulnerabilities . . . .
‘168 Patent at 10:65-11:8 (emphasis added).
18
Similarly, claim 7, which depends from claim 1, describes:
19
The security system of claim 1 wherein the security modules include at least one
of:
20
21
22
23
a configuration/system module which performs an initial analysis of the computer
system to acquire configuration information;
a directory checking module which analyzes directories and files in the system
memory to determine if security critical files have been tampered with;
24
27
a user manager module which analyzes the system memory with regards to
improper or invalid permissions given to users of the system for accessing
particular files;
an integrity checking module which analyzes files in the system memory to
identify system vulnerabilities;
28
a network checking module which analyzes the computer apparatus to identify
25
26
4
1
2
3
4
5
vulnerabilities created as a result of the computer apparatus connecting with a
data network;
a password checking module which analyzes passwords for users of the computer
apparatus to identify vulnerabilities.
Id. at 11:25-46 (emphasis added).
In support of its argument that “vulnerability” means “pre-existing security problem,”
6
TVIIM argues that “the specification expressly links ‘vulnerability’ with ‘pre-existing security
7
problems.” Dkt. No. 125 at 15. The section of the specification cited by TVIIM concerns the
8
“integrity check module.” ‘168 Patent 5:46-49 (“The integrity check module searches for pre-
9
existing security problems by cross-referencing against a vulnerability database which is stored in
10
United States District Court
Northern District of California
11
local memory.”).
In response, McAfee points out that claim 7 describes other types of security modules
12
beyond the integrity checking module that also identify “vulnerabilities,” and argues that nothing
13
in the intrinsic record suggests that the vulnerabilities identified by these other modules are limited
14
to “pre-existing” vulnerabilities. For example, the “network checking module” described in claim
15
7 “analyzes the computer apparatus to identify vulnerabilities created as a result of the computer
16
apparatus connecting with a data network.” ‘168 Patent at 11:40-43. But the section of the
17
specification discussing this module does not limit “vulnerability” to “pre-existing”
18
vulnerabilities. Id. at 5:63-6:1 (“The network check module . . . performs various analysis to
19
detect vulnerabilities which may occur due to a computer or server being connected to a network.
20
The checks which may be performed include: checking vulnerable configuration files . . . .”).
21
Similarly, the “password checking module” described in claim 7 “analyzes passwords for users of
22
the computer apparatus to identify vulnerabilities,” Id. at 11:44-46, but these “vulnerabilities,” by
23
definition, are the type that arise from the use of a computer, not from pre-existing flaws in its
24
programming.
25
The Court agrees that the intrinsic evidence is dispositive, and does not support TVIIM’s
26
proposed construction. “Claim terms are presumed to be used consistently throughout the patent.”
27
Research Plastics, Inc. v. Fed Packaging Corp., 421 F.3d 1290, 1295 (Fed. Cir. 2005). Moreover,
28
when a dependent claim describes “elements using the word ‘the’ or ‘said,’ it should be construed
1
to refer back to elements already disclosed in the independent claim.” Phase Four Indus., Inc. v.
2
Marathon Coach, Inc., No. 04-CV-04801 JW, 2006 WL 3742216, at *6 (N.D. Cal. Dec. 19,
3
2006). Here, dependent claim 7 describes “[t]he security system of claim 1 wherein the security
4
modules include at least one of” six specified types of modules. ‘168 Patent at 11:25-26
5
(emphasis added). Applying the above rule of construction, dependent claim 7 is construed to
6
refer back to the “security system” described in claim 1. That security system describes “security
7
modules” which “identify vulnerabilities.” ‘168 Patent at 10:65-67, 11:1-3. Accordingly, each of
8
the modules listed in claim 7 is a “security module,” and because the intrinsic record does not
9
limit the vulnerabilities identified by all of these modules to “pre-existing vulnerabilities,”
TVIIM’s proposed limitation is unfounded. See AK Steel Corp. v. Soliac, 344 F.3d 1234, 1242
11
United States District Court
Northern District of California
10
(Fed. Cir. 2003) (“[D]ependent claims are presumed to be of narrower scope than the independent
12
claims from which they depend.”).
13
The specification’s description of locations where “vulnerabilities” can be found further
14
undermines TVIIM’s position. The specification discusses “vulnerabilities” that can be found or
15
identified in “configurations” (‘168 Patent at 3:42-44), user accounts (Id. at 5:8-11), the access
16
privileges of files, the owner of the files, and the group of the files (Id. at 5:39-42). In particular,
17
the specification describes detection of vulnerabilities that “may occur due to a computer or server
18
being connected to a network.” Id. at 5:63-6:1. Configurations, user accounts, access privileges,
19
and vulnerabilities that “may occur” due to connection to a network all suggest that vulnerability
20
is not limited to “pre-existing” security flaws or software defects. Instead, configuration errors,
21
groups, file permissions and errors that could occur as a result of being connected to a network
22
suggest that vulnerabilities can develop over time as a computer is used. TVIIM suggests that
23
some configuration and permission errors can be pre-existing “in that they can exist by default in
24
the software or arise from the installation of the software.” Dkt. No. 126 at 14. Whether or not
25
this could be true in theory, the fact remains that the patent specification, claim terms, and file
26
history do not support the blanket limitation proposed in TVIIM’s construction.
27
Accordingly, the Court concludes that “vulnerability” should be given its plain and
28
ordinary meaning as understood by persons of ordinary skill in the art at the time of the invention.
6
1
The Court further finds that this plain and ordinary meaning is not limited only to “pre-existing
2
security problems.” See Eon CorpIP Holdings LLC v. Aruba Networks Inc, 62 F. Supp. 3d 942,
3
953 (N.D. Cal. 2014) (“If the Court agrees with a party that a term needs no construction, the
4
Court is holding as a matter of law that the limitations proposed by the other party do not inhere in
5
the term, and the parties will not be able to argue for such a limitation to a jury.”).
6
III.
7
8
9
MOTIONS FOR SUMMARY JUDGMENT
A.
Facts
1.
HostGUARD, HostCHECK, and the ‘168 Patent
Each of the motions in this case involves three separate software security programs:
“HostGUARD,” “HostCHECK,” and the invention claimed by the ‘168 Patent. It is undisputed
11
United States District Court
Northern District of California
10
that all three programs shared some of the same creators: Bruce Hartley, Eric Knight, and Kevin
12
Reynolds. Mueller Decl. Ex 5 at 33:2-6, 85:1-3, 203:9-204:19 (8/5/14 Knight Dep.), Dkt. No.
13
120-9; Mueller Decl. Ex. 7 at 13:23-25, 14:4-8 (Hartley Dep.), Dkt. No. 120-11; Mueller Decl. Ex.
14
8 at 21:5-18, 65:25-66:7 (Reynolds Dep.), Dkt. No. 120-12. It is further undisputed that each is a
15
computer security program that addresses “vulnerabilities” in some respect. The record shows that
16
HostGUARD was developed first, then HostCHECK, and finally, the invention claimed by the
17
‘168 Patent. Nonetheless, the ‘168 Patent applicants did not present any evidence regarding
18
HostGUARD to the patent examiner during the ‘168 Patent prosecution (though as shown below,
19
they did disclose HostCHECK). What the parties dispute, and what the resolution of the issues in
20
the case will turn upon, is whether the three programs address “vulnerabilities” in the same way
21
such that the ‘168 Patent is invalid for either anticipation (by HostGUARD) or inequitable conduct
22
(based on nondisclosure of HostGUARD to the PTO).
23
24
2.
‘168 Patent Prosecution History
TVIIM applied for the ‘168 Patent on April 12, 2001. ‘168 Patent. On October 28, 2003,
25
the patent examiner rejected claims 1-20 for obviousness under 35 U.S.C. § 103, making the
26
invention unpatentable over another invention called CyberCop Scanner that was created by
27
McAfee (at that time known as “Network Associates”), as described in an article published by
28
InfoWorld in February of 1999. Shaeffer Decl. Ex. 4 at 84902DOC011690-692 (“ ‘168 Patent file
7
1
history”), Dkt. Nos. 113-4 – 113-6.
In order avoid invalidity for obviousness, TVIIM first argued that the ‘168 Patent claimed
2
3
priority to an earlier provisional patent application (the ‘270 Provisional Application) which had
4
an effective date of June 15, 1998. Id. at 84902DOC011696-707. As part of TVIIM’s priority
5
argument to the PTO, it compared the elements of the ‘168 Patent to HostCHECK, which was
6
described in the ‘270 Provisional Application. Id. In essence, TVIIM argued that because
7
HostCHECK, as described in the ‘270 Provisional Application, taught the same elements as the
8
‘168 Patent claims, the ‘168 Patent was a continuation of the ‘270 Provisional Application. Id.
Despite these arguments, the patent examiner again rejected the ‘168 Patent, finding that
9
CyberCop was available for use prior to TVIIM’s newly claimed priority date, making the
11
United States District Court
Northern District of California
10
invention unpatentable for obviousness. Id. at 84902DOC11776-780 (finding that TVIIM’s
12
arguments had been “fully reviewed,” but were unpersuasive in light of CyberCop’s earlier
13
priority date).
TVIIM again requested reconsideration from the PTO. Id. at 84902DOC11785-791. This
14
15
time, instead of claiming an earlier priority date than CyberCop, TVIIM argued that CyberCop did
16
not disclose the same features as those claimed in the ‘168 Patent, and as a result, CyberCop could
17
not be considered prior art sufficient to render the ‘168 Patent “obvious” under 35 U.S.C. § 103.
18
See id. Subsequently, on December 21, 2004, the PTO ended the patent prosecution and issued a
19
notice of allowance for issuance, which ultimately resulted in the approval of the ‘168 Patent. Id.
20
at 84902DOC011794. The PTO did not explain the basis for its conclusion that the ‘168 Patent
21
application finally passed muster. Id. The ‘168 Patent issued on May 3, 2005. Id. at
22
84902DOC001428; ‘168 Patent.
23
24
25
26
27
28
B.
McAfee’s Motion for Summary Judgment for Invalidity Based on Anticipation
McAfee seeks a summary judgment of invalidity on claims 1-3, 7-9, 11-12, and 19-20 of
the ‘168 Patent, arguing anticipation by the HostGUARD materials.
1.
Legal Standard
Under the version of Section 102 applicable here, a patent is invalid for anticipation where
“the invention was patented or described in a printed publication . . . more than one year prior to
8
1
the date of the application for patent.” 35 U.S.C. § 102 (2000). 1 Anticipation under § 102 is a
2
two-step inquiry. Medichem, S.A. v. Rolabo, S.L., 353 F.3d 928, 933 (Fed. Cir. 2003). The first
3
step is claim construction, which the Court has addressed above. The second step requires a
4
comparison of the properly construed claims to the prior art. Id. A prior art reference is
5
anticipatory if it discloses the substance of each element of the claimed invention, though the
6
language need not be identical. In re Bond, 910 F.2d 831, 832–33 (Fed. Cir. 1990) (the elements
7
need not satisfy “an ipsissimis verbis test” to be expressly anticipating). For a claim to be
8
anticipated under § 102, and thus invalid, “each claim element must be disclosed, either expressly
9
or inherently, in a single prior art reference, and the claimed arrangement or combination of those
elements must also be disclosed, either expressly or inherently, in that same prior art reference.”
11
United States District Court
Northern District of California
10
Therasense, Inc. v. Becton, Dickinson & Co., 593 F.3d 1325, 1332-33 (Fed. Cir. 2010).
12
“[I]nherent anticipation requires that the missing descriptive material is necessarily present, not
13
merely probably or possibly present, in the prior art.” Trintec Indus., Inc. v. Top–U.S.A. Corp.,
14
295 F.3d 1292, 1295 (Fed. Cir. 2002) (internal quotation marks omitted). Whether prior art
15
anticipates the accused device is a question of fact. Orion IP, LLC v. Hyundai Motor Am., 605
16
F.3d 967, 974 (Fed. Cir. 2010).
Because patents are presumed valid, a party challenging the validity of a patent bears the
17
18
burden of proving invalidity by clear and convincing evidence. 35 U.S.C. § 282(a); Ericsson, Inc.
19
v. D-Link Systems, Inc., 773 F.3d 1201, 1224 (Fed. Cir. 2014). Whether a prior art reference
20
“disclose[s] each and every element of the claimed invention” is largely a fact-dependent inquiry.
21
In re Gleave, 560 F.3d 1331, 1334 (Fed. Cir. 2009). “Summary judgment is proper if no
22
reasonable jury could find that the patent is not anticipated” based on the undisputed facts.
23
Telemac Cellular Corp. v. Topp Telecom, Inc., 247 F.3d 1316, 1327 (Fed. Cir. 2001) (internal
24
citation omitted); Oney v. Ratliff, 182 F.3d 893, 895 (Fed. Cir. 1999) (“[S]ummary judgment is
25
inappropriate if a trier of fact applying the clear and convincing standard could find for either
26
1
27
28
35 U.S.C. § 102 was amended in May of 2015, but the version of the statute in effect at the time
‘168 Patent was being prosecuted applies here. See Patent Law Treaties Implementation Act of
2012, Pub. L. No. 112-211, § 203 (b) (2), 126 Stat. 1527, 1537.
9
1
party.”). Therefore, in evaluating whether McAfee is entitled to summary judgment for
2
anticipation, the Court, viewing the evidence in the light most favorable to TVIIM, must decide
3
whether any reasonable jury would have to find that every element of the ‘168 Patent was
4
disclosed by the HostGUARD materials.
5
2.
Discussion
According to McAfee, the HostCHECK materials, which TVIIM relied upon in obtaining
7
the priority date for the ‘168 Patent, describe the “same or similar” functionality as HostGUARD
8
materials. Dkt. No. 120 at 2. McAfee argues that because the HostGUARD materials disclose the
9
claim limitations of the ‘168 Patent “in precisely the same way” that the ‘168 Patent applicants
10
argued the HostCHECK materials disclose the ‘168 Patent claim limitations, the HostGUARD
11
United States District Court
Northern District of California
6
materials necessarily anticipate, and therefore invalidate, the ‘168 Patent. Id. at 1-2; see also ‘168
12
Patent File History at 84902DOC011696-1707 (Response to PTO citing HostCHECK Materials);
13
‘168 Patent File History at 84902DOC011708-732 (HostCHECK Materials). In support of this
14
contention, McAfee compares the relevant language from a HostGUARD brochure (Mueller Decl.
15
Ex. 10) and website (Mueller Decl. Ex. 9) to (1) the HostCHECK Materials that were provided to
16
the patent examiner and (2) the ‘168 Patent’s claim limitations. App’x A: Claim Chart (Dkt. No.
17
121).
18
TVIIM argues that the HostGUARD materials do not anticipate the asserted claims for five
19
reasons. See Dkt. No. 125 at 18. Because there are disputed issues of material fact as to whether
20
the HostGUARD materials constitute invalidating prior art and disclose every element of the ‘168
21
Patent, the Court denies the motion for summary judgment on that basis, and does not address
22
TVIIM’s other arguments.
23
24
25
26
a. There are Material Issues of Fact as to Whether the HostGUARD
Materials are Invalidating Prior Art
TVIIM advances two main arguments as to why the HostGUARD materials cannot be
considered invalidating prior art: (1) the materials were not sufficiently publically accessible to be
27
28
10
1
considered invalidating, and (2) the materials were not “enabled.” 2
Starting with the first argument, to be invalidating, prior art must have described the
2
3
patented invention in a printed publication that was publically accessible more than a year before
4
the patent issued. See 35 U.S.C. § 102 (2000). The determination of whether a particular printed
5
publication was “publically accessible” depends on a satisfactory factual showing that such a
6
document has been “disseminated or otherwise made available to the extent that persons interested
7
and ordinarily skilled in the subject matter or art[,] exercising reasonable diligence, can locate it.”
8
Sri International, Inc. v. Internet Security Systems, Inc., 511 F.3d 1186, 1194-95 (Fed. Cir. 2008)
9
(internal citations and quotation marks omitted) (vacating and remanding summary judgment of
invalidity based on prior art where the “court perceive[d] factual issues” regarding whether a
11
United States District Court
Northern District of California
10
particular publication was “publically accessible” which “prevente[d] entry of summary
12
judgment”).
The evidence in the record that the HostGUARD brochure was disseminated at a trade
13
14
show in 1996 is derived from deposition testimony of one of HostGUARD’s creators, Bruce
15
Hartley. Mueller Decl. Ex. 6 at 176:15-177:11, 212:20-213:10 (Hartley Dep.) (acknowledging
16
that the brochure was created for and publicly disseminated at a trade show); Ex. 10 (HostGUARD
17
Brochure); Ex. 11 (article describing HostGUARD at the “23rd Annual Computer Security
18
Conference” in Chicago from 11/10-11/12/1996). However, whether Hartley’s deposition
19
testimony and the rest of the record establish by clear and convincing evidence that the
20
HostGUARD brochure was presented at the trade show in a manner that made it “publically
21
accessible” is a disputed issue of fact that cannot be resolved at summary judgment.
22
23
24
25
26
27
2
TVIIM also argues that because the HostGUARD brochure was not disclosed in McAfee’s
original infringement contentions, it may not be relied upon as prior art under Patent Local Rule 33(a). Dkt. No. 125 at 20. The Court disagrees. The purpose of the patent local rule is to disclose
invalidity theories and provide all parties with adequate notice of the information necessary to
prepare the case. The Court finds that TVIIM has had ample notice and time to prepare its
defenses. Additionally, TVIIM does not claim any prejudice resulting from the exclusion of these
materials from the contentions.
28
11
1
Next, TVIIM claims that both the HostGUARD brochure and website were not sufficiently
2
enabled to constitute anticipating “prior art.” Dkt. No. 125 at 24 (citing Amgen Inc. v. Hoechst
3
Marion Roussel, Inc., 314 F.3d 1313, 1354 (Fed. Cir. 2003)) (“A prior art reference cannot
4
anticipate a claimed invention if the allegedly anticipatory disclosures cited as prior art are not
5
enabled.”). In order to be enabling, a prior art reference must describe “the claimed invention
6
sufficiently to enable a person of ordinary skill in the art to carry out the invention.” Impax Labs.,
7
Inc. v. Aventis Pharm. Inc., 468 F.3d 1366, 1383 (Fed. Cir. 2006). The only evidence in the
8
record bearing directly on the enablement issue is Bruce Hartley’s testimony that the HostGUARD
9
brochure is “very high level” and “does not contain much content.” Grant Decl. Ex. 14 at 178:215 (Hartley Dep.), Dkt. No. 127-16. Hartley otherwise expressed no opinion as to whether the
11
United States District Court
Northern District of California
10
HostGUARD brochure would be sufficient to allow a person of ordinary skill in the art to carry
12
out the invention. Based on the sparse evidence presented on this issue, the Court cannot conclude
13
that the descriptions in the HostGUARD materials (the brochure or the website) are enabled and
14
therefore anticipate the ‘168 patent claims as a matter of law.
15
16
17
b. There are Material Issues of Fact as to Whether the HostGUARD
Materials Sufficiently Disclose Each Element of the ‘168 Patent
TVIIM also argues that the HostGUARD materials cannot have anticipated the ‘168 Patent
18
claims because they do not take any action with respect to vulnerabilities. Whether the
19
HostGUARD materials disclose specified actions taken in response to vulnerabilities is a factual
20
question. The crux of the issue here is whether the HostGUARD materials, which describe
21
modules that identify vulnerabilities and “allow corrective measures to be taken with the tool,”
22
necessarily teach the same claims as the ‘168 Patent does. According to TVIIM, HostGUARD
23
merely identifies and reports “potential” vulnerabilities, whereas the ‘168 Patent teaches an
24
invention that takes actions in response to identified “actual” vulnerabilities. Dkt. No. 125 at 23.
25
Without the ability to act on “actual,” instead of “potential” vulnerabilities, TVIIM argues,
26
HostGUARD cannot be said to anticipate each and every element of the ‘168 Patent claims.
27
28
The great weight of the evidence in the record regarding what the inventions teach
(corrective measures focused on “actual” versus “potential” vulnerabilities, the ability to take
12
1
corrective measures as part of a utility function, and the necessity of the presence of a “utility
2
module”) comes from expert reports and deposition testimony. Credibility disputes regarding
3
deposition testimony, expert opinions and witness statements cannot be decided by the Court as a
4
matter of law at summary judgment. At the summary judgment stage, the Court “does not assess
5
credibility or weigh the evidence, but simply determines whether there is a genuine factual issue
6
for trial.” House v. Bell, 547 U.S. 518, 559-60, (2006). On this record, the Court cannot conclude
7
that any reasonable jury would have to find that the ‘168 Patent is anticipated by the HostGUARD
8
materials.
For the foregoing reasons, McAfee’s Motion for Summary Judgment of Invalidity is
9
10
United States District Court
Northern District of California
11
12
13
DENIED.
C.
TVIIM’s Motion for Partial Summary Judgment
1.
Inequitable Conduct - Legal Standard
TVIIM moves for partial summary judgment on McAfee’s Fifth Affirmative Defense and
14
Third Counterclaim, both of which allege inequitable conduct. “Inequitable conduct is an
15
equitable defense to patent infringement that, if proved, bars enforcement of a patent.”
16
Therasense, 649 F.3d at 1285. “To prevail on the defense of inequitable conduct, the accused
17
infringer must prove that the applicant misrepresented or omitted material information with the
18
specific intent to deceive the PTO” by “clear and convincing evidence.” Id. at 1287. Intent and
19
materiality are separate requirements. Hoffmann–La Roche, Inc. v. Promega Corp., 323 F.3d
20
1354, 1359 (Fed. Cir. 2003). Both intent and materiality are questions of fact. 1st Media, LLC v.
21
Elec. Arts, Inc., 694 F.3d 1367, 1372 (Fed. Cir. 2012).
22
To meet the clear and convincing evidence standard, the accused’s specific intent to
23
deceive must be “the single most reasonable inference able to be drawn from the evidence.” Star
24
Scientific Inc. v. R.J. Reynolds Tobacco Co., 537 F.3d 1357, 1366 (Fed. Cir. 2008). Because
25
evidence of direct intent is rare, intent may be inferred from indirect and circumstantial evidence.
26
Therasense, 649 F.3d at 1290. Where there are multiple reasonable inferences that may be drawn
27
from the accused’s conduct, intent to deceive cannot be found. Id.
28
To prevail on its partial motion for summary judgment, TVIIM has the burden of
13
1
establishing the absence of evidence supporting an essential element of McAfee’s case. Celotex
2
Corp. v. Catrett, 477 U.S. 317, 325 (1996); Optium Corp. v. Emcore Corp., 603 F.3d 1313, 1319–
3
20 (Fed. Cir. 2010). That is, if the Court finds that genuine issues of material facts exist regarding
4
either the materiality of the omitted information or the specific intent of the ‘168 Patent applicants,
5
summary judgment must be denied. See Ohio Willow Wood Co. v. Alps S., LLC, 735 F.3d 1333,
6
1345, 1351-1352 (Fed. Cir. 2013) (finding that summary judgment of no inequitable conduct was
7
precluded where genuine issues of material facts existed as to the but-for materiality of the
8
withheld information and the intent of the patent applicants).
9
10
2.
Discussion
McAfee alleges that TVIIM engaged in inequitable conduct in violation of 37 C.F.R. §
United States District Court
Northern District of California
11
1.56 by failing to present evidence of HostGUARD and another software program called System
12
Security Scanner (“SSS”) to the patent examiner during the prosecution of the ‘168 Patent. Dkt.
13
No. 102 ¶ 16. McAfee asserts that each of these software programs constitutes “prior art” to the
14
‘168 Patent which would have prevented the ‘168 Patent from issuing had it been presented to the
15
patent examiner.
16
TVIIM responds that neither SSS nor HostGUARD was invalidating prior art, and thus
17
both are immaterial in the inequitable conduct inquiry. TVIIM contends, as it did in its defense to
18
McAfee’s anticipation argument, that these programs merely identify vulnerabilities, but do not
19
take any action in response to identified vulnerabilities, which it claims distinguishes them from
20
the invention described in the ‘168 Patent. Dkt. 112 at 8-9. Additionally, TVIIM argues that both
21
the SSS and HostGUARD software materials were duplicative of materials that the patent
22
examiner considered such as Enterprise Security Manager (“ESM”) and Titan, both security
23
programs that detect or ‘fix’ “potential security problems.” Dkt. No. 112 at 8; Shaeffer Decl. Ex.
24
4 at 612-13, 628 (ESM and Titan materials in the ‘168 Patent file history).
25
Whether these programs constitute invalidating prior art, and whether information about
26
them would have been material to the patent examiner, are heavily-contested issues of fact in this
27
case, making their resolution on summary judgment inappropriate.
28
TVIIM’s arguments for summary judgment on the specific intent issue also fail.
14
1
Regarding SSS, TVIIM argues that McAfee cannot show the specific intent required to prove
2
inequitable conduct because McAfee has not proffered any evidence tending to show that “[the
3
‘168 Patent] inventors knew about SSS and HostGUARD . . . and deliberately withheld them from
4
the [PTO].” Dkt. No. 112 at 13. The evidence in the record paints a different picture. The record
5
supports an inference that during the prosecution of the ‘168 Patent, the applicants selectively
6
submitted documents that compared HostCHECK’s performance in scanning for vulnerabilities
7
with that of SSS. ‘168 Patent file history at 84902DOC011717, 84902DOC11719, and
8
84902DOC011720. Additionally, Bruce Hartley testified that DMW WorldWide, LLC, the
9
company that created HostCHECK and Hartley’s former employer, must have had a copy of SSS
or technical documents about it in order to produce the documents submitted to the PTO during
11
United States District Court
Northern District of California
10
the ‘270 Provisional Application process (where materials comparing HostCHECK to SSS were
12
first submitted to the PTO). Mueller Decl. Ex. 3 at 159:1-3, 159:20-160:4.
13
With respect to HostGUARD, at least three of the named inventors on the ‘168 Patent,
14
(Bruce Hartley, Eric Knight, and Kevin Reynolds) helped develop HostGUARD. Id. at 12:15-17;
15
Mueller Decl. Ex 5 at 33:2-8, 85:1-3; Ex. 8 at 21:5-18, 65:25-66:7. Though not dispositive,
16
McAfee has presented at least some evidence suggesting that the HostGUARD materials disclose
17
some of the same functions claimed in the ‘168 Patent. It strains credulity to believe that Hartley,
18
Knight, and Reynolds did not know about HostGUARD or its functionality. Given the arguable
19
similarities between HostCHECK and HostGUARD, a reasonable jury could conclude that
20
TVIIM’s failure to present the PTO with evidence of HostGUARD provided a “misleadingly
21
incomplete” description of prior art that can be considered evidence of deceptive intent to mislead
22
the PTO. Apotx Inc. v. UCB, Inc., 763 F.3d 1354, 1362 (Fed. Cir. 2012); see also Worldwide
23
Home Products, Inc. v. Bed, Bath & Beyond, Inc., No. 11CV3633-LTS-MHD, 2015 WL 568710,
24
at *10 (S.D.N.Y. Feb. 11, 2015) (“Selectively withholding material information is indicative of an
25
intent to deceive for the purposes of inequitable conduct.”).
26
Drawing all inferences in favor of McAfee, a reasonable jury could find, based on the
27
evidence in the record at this stage, that the ‘168 Patent applicants acted with specific intent to
28
deceive the PTO.
15
For all of these reasons, the Court DENIES TVIIM’s motion for summary judgment as to
1
2
McAfee’s inequitable conduct defense and counterclaim (Fifth Affirmative Defense and Third
3
Counterclaim).
4
D.
Indefiniteness
TVIIM also moves for summary judgment on McAfee’s invalidity counterclaim and
5
6
defenses pursuant to 35 U.S.C. § 112 for indefiniteness. 3 In its opposition, McAfee contends that
7
“to the extent that” claim 1 of the ‘168 Patent is an apparatus claim which requires actions to be
8
performed, claim 1 and its dependent claims (2, 3, 7, and 8) are invalid for indefiniteness. Dkt.
9
No. 129 at 16.
The definiteness requirement of 35 U.S.C. § 112 requires that “a patent claim must
11
United States District Court
Northern District of California
10
particularly point[ ] out and distinctly claim[ ] the subject matter which the inventor . . . regards as
12
the invention.” 35 U.S.C. § 112 (b). “Whether a claim satisfies the so-called definiteness
13
requirement of Section 112 [b] is a matter of law and is therefore appropriately decided at
14
summary judgment.” Apple, Inc. v. Samsung Electronics Co., 876 F. Supp. 2d 1141, 1153 (N.D.
15
Cal. 2012). Proof of indefiniteness must meet “an exacting standard.” Haemonetics Corp. v.
16
Baxter Healthcare Corp., 607 F.3d 776, 783 (Fed. Cir. 2010). “Only claims not amenable to
17
construction or insolubly ambiguous are indefinite.” Id.
A claim may be invalid for indefiniteness where it recites both an apparatus claim and a
18
19
method for using that apparatus. IPXL Holdings, L.L.C. v. Amazon.com, Inc., 430 F.3d 1377,
20
1384 (Fed. Cir. 2005); 35 U.S.C. § 112. However, “apparatus claims are not necessarily indefinite
21
for using functional language.” Microprocessor Enhancement Corp. v. Texas Instruments Inc.,
22
520 F.3d 1367, 1375 (Fed. Cir. 2008). Functional language is that which defines an apparatus “by
23
what it does rather than what it is.” Halliburton Energy Servs., Inc. v. M-I LLC, 514 F.3d 1244,
24
1255 (Fed. Cir. 2008) (holding that a claim term that discussed the ability of an invention was not
25
26
27
28
3
In its first amended answer and counterclaim to TVIIM’s first amended complaint (Dkt. No.
102), McAfee presented invalidity counterclaims under 35 U.S.C. §§ 101 and 112. McAfee has
since withdrawn those contentions with the exception of its indefiniteness claims. McAfee Reply
at 16 (Dkt. No. 129). The Court accordingly DISMISSES the remaining invalidity counterclaims.
16
1
indefinite). Language that identifies “capabilities of the claimed apparatus” when a user performs
2
a predicate act is not considered indefinite under § 112. See Apple, 876 F. Supp. 2d 1141.
3
McAfee contends that claim 1 is indefinite because in its invalidity contentions, TVIIM
4
“appear[ed] to assert that claim 1 requires the action of actually performing a utility function.”
5
Dkt. No. 129 at 17. This argument is meritless. Claim 1 describes:
6
A security system for a computer apparatus, wherein said computer apparatus
includes a processor and system memory comprising:
7
at least one security module which under direction from the processor
accesses and analyzes selected portions of the computer apparatus to identify
vulnerabilities;
8
9
10
at least one utility module which under the direction from the processor,
performs various utility functions with regards to the computer apparatus in
response to the identified vulnerabilities; and
United States District Court
Northern District of California
11
12
a security system memory which contains security information for performing
the analysis of the computer apparatus.
13
14
‘168 Patent at 10:65-11:10 (emphasis added).
15
The plain language of claim 1 makes clear that the phrase “performs various utility
16
functions” is functional language that describes what the “utility module” does. Unlike the claim
17
at issue in IXPL, nothing in claim 1 describes action by a “user.” McAfee has failed to show the
18
existence of any genuine issue of material fact with regard to this issue as required by Celotex.
19
Accordingly, TVIIM is entitled to summary judgment on McAfee’s indefiniteness claims as a
20
matter of law.
21
IV.
CONCLUSION
22
For the foregoing reasons:
23
1.
DENIED in its entirety.
24
25
26
McAfee’s Motion for Summary Judgment for Invalidity for anticipation is
2.
TVIIM’s Motion for Partial Summary Judgment is GRANTED with respect to
McAfee’s claims and defenses for indefiniteness under 35 U.S.C. § 101 and 35
27
28
17
U.S.C. § 112 (Second Affirmative Defense and Second Counterclaim). 4
1
2
3.
TVIIM’s Motion for Partial Summary Judgment is DENIED with respect to
3
McAfee’s claims and defenses for inequitable conduct (Fifth Affirmative Defense
4
and Third Counterclaim).
5
4.
6
The term “vulnerability” shall have its plain and ordinary meaning, and is not
limited in scope to “pre-existing” security problems or vulnerabilities.
7
8
9
IT IS SO ORDERED.
10
United States District Court
Northern District of California
11
Dated: June 28, 2015
______________________________________
HAYWOOD S. GILLIAM, JR.
United States District Judge
12
13
14
15
16
17
18
19
20
21
22
23
24
4
25
26
27
28
In conjunction with its motion for summary judgment, TVIIM objected to and moved the court
to strike the declaration of Aviel Rubin filed in support of McAfee’s motion for summary
judgement. (Dkt. No. 126). Because the Court did not rely on the Rubin declaration, the motion
to strike is DENIED as moot. See Ross v. Indep. Living Res. of Contra Costa Cnty., No. C0800854 TEH, 2010 WL 2898773, at *2, n.1 (N.D. Cal. July 21, 2010) (denying evidentiary
objections as moot because the court did not rely on the evidence to which the objections were
lodged).
18
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?