British Telecommunications plc et al v. Fortinet, Inc.

Filing 141

REPORT AND RECOMMENDATIONS on CLAIM CONSTRUCTION. Please note that when filing Objections pursuant to Federal Rule of Civil Procedure 72(b)(2), briefing consists solely of the Objections (no longer than ten (10) pages) and the Response to the Objections (no longer than ten (10) pages). No further briefing shall be permitted with respect to objections without leave of the Court. Objections to R&R due by 4/29/2021. Signed by Chief Magistrate Judge Mary Pat Thynge on 4/15/2021. (Taylor, Daniel)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE BRITISH TELECOMMUNICATIONS PLC, and BT AMERICAS, INC., Plaintiffs, C. A. No. 18-1018-CFC-MPT V. FORTINET, INC., Defendant. REPORT AND RECOMMENDATION I. INTRODUCTION On July 10, 2018, British Telecommunications pie and BT Americas,lnc. (collectively, "BT") brought this action against defendant Fortinet, Inc. ("Fortinet") alleging infringement of U.S. Patent Nos. 7,159,237 ("the '237 Patent"); 7,895,641 ("the '641 Patent") ; 7,774,845 ("the '845 Patent"); 7,693,971 ("the '971 Patent"); and 7,370 ,358 ("the '358 Patent") .1 On July 24, 2020, the parties filed a Joint Claim Construction Chart,2 a Joint Claim Construction Brief on November 2, 2020, and November 13, 2020 an Amended Joint Claim Construction Chart ("Amended JCCC").3 The court held a Markman hearing on November 18, 2020. 4 The court recommends that the District Court adopt the constructions as set forth below. II. THE PATENTS-IN-SUIT The '237 and '641 patents, titled "Method and System for Dynamic Network 1 2 3 4 0.1. 1. 0.1. 87. 0 .1. 117. See Minute Entry for Markman Hearing, Nov. 18, 2019. Intrusion Monitoring, Detection and Response," are related and share a common written description. 5 The Abstract of those patents recites: A probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or evidence of unauthorized intrusions or attacks. The probe filters and analyzes the collected data to identify potentially security-related events happening on the network. Identified events are transmitted to a human analyst for problem resolution. The analyst has access to a variety of databases (including security intelligence databases containing information about known vulnerabilities of particular network products and characteristics of various hacker tools, and problem resolution databases containing information relevant to possible approaches or solutions) to aid in problem resolution . The analyst may follow a predetermined escalation procedure in the event he or she is unable to resolve the problem without assistance from others. Various customer personnel can be alerted in a variety of ways depending on the nature of the problem and the status of its resolution. Feedback from problem resolution efforts can be used to update the knowledge base available to analysts for future attacks and to update the filtering and analysis capabilities of the probe and other systems. 6 The '845 patent, titled "Computer Security System," is described in its Abstract as: A computer security system for use in a network environment comprising at least a plurality of user computers arranged to communicate over a network, the system comprising a warning message exchange system operable to allow the communication from the user computers of warning messages relating to suspect data identified as a possible security threat; a message counting system operable to maintain a count for every particular piece or set of suspect data based on the number of warning messages communicated relating thereto ; and network security means operable to act against any particular piece or set of suspect data for which the count maintained therefor exceeds at least one threshold value. 7 5 D.I. 117 at 2 n.1, 4, n.2. The court will cite to the '237 patent's written description when discussing terms appearing in both the '237 and '641 patents. For terms only appearing in the '641 patent, its written description is cited. 6 '237 patent, Abstract. 7 '845 patent, Abstract. 2 The '971 patent, titled "Distributed Policy Based System Management with Local Management Agents Responsible for Obtaining and Storing Policies Thereat," is described by its Abstract as: A computer network is managed by policies . This allows selections to be made from a range of control options and optionally to be based on locally available system information. Policy-based management is distributed across the system and is handled locally by management agents allowing control of a sub-network. As a result of a distributed policy-based management system is provided which allows additional flexibility of control. 8 The '358 patent, titled "Agent-Based Intrusion Detection System ," is described by its Abstract as: A computer security system uses a plurality of co-operating software agents to protect a network against attack. Individual agents at each node the network co-operatively act to detect attacks and to share attack signatures and solutions via a message exchange mechanism. A global internal measurement of the overall health of the group of agents may be used as an indicator of a possible attack. In larger networks, the agents may be formed a plurality of separate autonomous groups, with a common group identity being automatically maintained by the message passing mechanism. Individual groups may be located by a system designer in separate cells or domains within the network, so that if one cell becomes compromised the rest of the network is not affected .9 Ill. LEGAL STANDARDS "It is a bedrock principle of patent law that the claims of a patent define the invention to which the patentee is entitled the right to exclude ."10 '"[T]here is no magic formula or catechism for conducting claim construction .' Instead , the court is free to attach the appropriate weight to appropriate sources 'in light of the statutes and policies 8 '971 patent, Abstract. '358 patent, Abstract. 10 Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed . Cir. 2005) (en bane) . 9 3 that inform patent law."' 11 Construing the claims in a patent is a question of law. 12 "The words of a claim are generally given their ordinary and customary meaning as understood by a person of ordinary skill in the art [("POSITA")] when read in the context of the specification and prosecution history." 13 "[T]he ordinary and customary meaning of a claim term is the meaning that the term would have to a [POSITA] in the art in question at the time of the invention, i.e., as of the effective filing date of the patent application." 14 A POSITA "is deemed to read the claim term not only in the context of the particular claim in which the disputed term appears, but in the context of the entire patent, including the specification." 15 "[T]he specification is always highly relevant to the claim construction analysis. Usually, it is dispositive; it is the single best guide to the meaning of a disputed term." 16 11 SoftView LLC v. Apple Inc., C.A. No. 10-389 (CONSOLIDATED) , 2013 WL 4758195, at *1 (D. Del. Sept. 4, 2013) (quoting Phillips, 415 F.3d at 1324). 12 Markman v. Westview Instruments, Inc., 52 F.3d 967, 977-78 (Fed. Cir. 1995), affd, 517 U.S. 370, 388-90 (1996) . 13 Thomer v. Sony Computer Entm't Am. LLC, 669 F.3d 1362, 1365 (Fed. Cir. 2012) (citing Phillips, 415 F.3d at 1313); see also Phillips, 415 F.3d at 1313 ("We have made clear ... that the ordinary and customary meaning of a claim term is the meaning that the term would have to a person of ordinary skill in the art in question at the time of the invention, i.e., as of the effective filing date of the patent application." (citing lnnova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1116 (Fed. Cir. 2004)). 14 Phillips, 415 F.3d at 1313. 1s Id. 16 Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed . Cir. 1996). This court has previously observed: Section 112(b) of Title 35 provides that "[t]he specification shall conclude with one or more claims[.]" This language makes clear that the specification includes the claims asserted in the patent, and the Federal Circuit has so held. See Markman, 52 F.3d at 979 ("Claims must be read in view of the specification, of which they are part"). The Federal Circuit and other courts, however, have also used "specification" on occasion to 4 "There are only two exceptions to this general rule: 1) when a patentee sets out a definition and acts as his own lexicographer, or 2) when the patentee disavows the full scope of a claim term either in the specification or during prosecution." 17 "To act as its own lexicographer, a patentee must 'clearly set forth a definition of the disputed claim term ' other than its plain and ordinary meaning." 18 "It is not enough for a patentee to simply disclose a single embodiment or use a word in the same manner in all embodiments , the patentee must 'clearly express an intent' to redefine the term. "19 Disavowal must also be clearly expressed. 20 "Where the specification makes clear that the invention does not include a particular feature , that feature is deemed to be outside the reach of the claims of the patent, even though the language of the claims, read without reference to the specification , might be considered broad enough to encompass the feature in question." SciMed Life Sys. , Inc. v. Advanced Cardiovascular Sys., Inc., 242 F.3d 1337, 1341 (Fed . Cir. 2001) . "The patentee may demonstrate intent to deviate from the ordinary and accustomed meaning of a claim term by including in the specification refer to the written description of the patent as distinct from the claims. See, e.g. , id. ("To ascertain the meaning of claims, we consider three sources: The claims , the specification , and the prosecution history."). /PC Sys., Inc. v. C/oud9 Techs. LLC, C.A. No. 16-443-CFC, 2018 WL 5342654 , at *1 n.1 (D. Del. Oct. 29, 2018) . As did the court in /PC Sys., this Report and Recommendation will refer to the portion of the specification that is not the claims as "the written description" to avoid confusion. 17 Thomer, 669 F.3d at 1365 (citing Vitronics , 90 F.3d at 1580). 18 Id. (quoting CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366 (Fed. Cir. 2002)) . 19 /d. (quoting Helmsderferv. Bobrick Washroom Equip. , Inc. , 527 F.3d 1379, 1381 (Fed. Cir. 2008)). 20 See Omega Eng'g, Inc. v. Raytek Corp., 334 F.3d 1314, 1325-26 (Fed. Cir. 2003) ("[F]or prosecution disclaimer to attach , our precedent requires that the alleged disavowing actions or statements made during prosecution be both clear and unmistakable. "). 5 expressions of manifest exclusion or restriction, representing a clear disavowal of claim scope." Teleflex, Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1325 (Fed . Cir. 2002) .21 The court cautioned , however, "[i]t is ... not enough that the only embodiments, or all of the embodiments contain a particular limitation. We do not read limitations from the specification into claims; we do not redefine words . Only the patentee can do that. To constitute disclaimer, there must be a clear and unmistakable disclaimer."22 Additionally, "a 'patentee's statements during reexamination[, including during an IPR proceeding ,] can be considered during claim construction , in keeping with the doctrine of prosecution disclaimer."'23 In contrast, a petitioner's statements during IPR are not afforded similar weight. 24 Finally, the court may consider extrinsic evidence, which "consists of all evidence external to the patent and prosecution history, including expert and inventor testimony, dictionaries, and learned treatises." 25 "Extrinsic evidence is to be used for the court's understanding of the patent, not for the purpose of varying or contradicting the terms of 21 Id. at 1366. Id. at 1366-67. 23 Aylus Networks, Inc. v. Apple Inc., 856 F.3d 1353, 1360, 1361 (Fed . Cir. 2017) (quoting Krippelz v. Ford Motor Co. , 667 F.3d 1261 , 1266 (Fed. Cir. 2012)); see also Seachange Int'/, Inc. v. C-COR, Inc. , 413 F.3d 1361 , 1372-73 (Fed. Cir. 2005) ("Where an applicant argues that a claim possesses a feature that the prior art does not possess in order to overcome a prior art rejection , the argument may serve to narrow the scope of otherwise broad claim language.") (citations omitted) ; Omega Eng'g, 334 at 1324 ("As a basic principle of claim interpretation , prosecution disclaimer promotes the public notice function of the intrinsic evidence and protects the public's reliance on definitive statements made during prosecution."). 24 See Iris Corp. Berhad v. United States, 147 Fed. Cl. 160, 166 n.3 (Fed . Cl. 2020) (rejecting patentee's argument that petitioner's IPR statements constitute intrinsic evidence, and instead finding petitioner's statements to be extrinsic evidence unpersuasive for claim construction). 25 Phillips, 415 F.3d at 1317. 22 6 the claims."26 "The construction that stays true to the claim language and most naturally aligns with the patent's description of the invention will be, in the end, the correct construction. " IV. AGREED-UPON CONSTRUCTIONS The parties agree on the construction of the following terms: 27 Claim Term Agreed Construction a. "each agent corresponding with other agents in its respective group but not with agents in other groups, a message-exchange system including the exchange of group specific tags" each agent corresponding with other agents in its respective group but not with agents in other groups, via a message-exchange system including the exchange of group specific tags '358 patent claim 26 maintaining and tracking groupwide measures of agent status or behavior; b. "maintaining and tracking groupwide measures of agent status or behavior comparing actual behavior patterns of the measure for a given group with known normal behavior patterns" comparing actual behavior patterns of the measure for a given group with known normal behavior patterns '358 patent claim 26 plain meaning c. "multi-stage analysis" '237 patent claims 2, 6, 22 , 23, 27 , 31 '641 Patent Claims 2, 6 26 27 Markman, 52 F.3d at 981 . D.I. 119; D.I. 119-1. 7 d. "post-filtering residue, wherein the status data that undergoes negative and positive filtering, but is neither discarded by such negative filtering nor selected by such positive filtering postfiltering residue is data neither discarded nor selected by filtering" / "post-filtering residue, wherein the post-filtering residue is neither discarded nor selected by the filtering" '237 patent claims 1, 18, 26 '641 Patent Claims 1, 18 software programs that can make determinations to act e. "agents" '971 Patent Claims 12, 17-19 '358 Patent Claims 26, 35, 50 plain meaning f. "group specific tags" '358 Patent Claim 26, 50 The court recommends accepting the parties' agreed-upon constructions for purposes of this litigation. V. DISPUTED TERMS NOT CONSTRUED Fortinet contends five disputed terms are indefinite.28 Recognizing Judge Connelly's practice to address indefiniteness outside the claim construction process, the parties agreed not to brief indefiniteness arguments. 29 28 See 0.1. 87 at 8 ("filtering"), 13 ("cross-probe correlation"), 21 ("substantially equal to or greater than"), 31 ("each of the policies are locally stored"), 33 ("normal behavior patters"/ "expected behavior patterns"). 29 Id. at 8 n.6 (citing HIP, Inc. v. Hormel Foods Corp., C.A. No. 18-615-CFC, 2019 WL 2579266 (D. Del. June 24, 2019)) . 8 VI. COURT'S CONSTRUCTION OF DISPUTED CLAIM TERMS 30 Disputed Terms Appearing in Both the '237 Patent and '641 Patent Disputed terms "status data," "dynamically," and "probe" appear in the both the '237 and '641 patents. 1. "status data" ('237 patent, claims 1, 2, 6, 10, 14, 16, 18, 22-27 , 31 , 35 , 41 ; '641 patent, claims 1, 2, 6, 10, 14, 16) a. BT's proposed construction : "data extracted from or generated about the traffic or system processing it that is informative as to the status of the network and its components" b. Fortinet's proposed construction : "data extracted from or generated about the traffic or system processing the data that reflects the conditions of the network and its components at a given time" c. Court's construction: "data extracted from or generated about the traffic or system processing it that is informative as to the status of the network and its components" The parties dispute whether "at a given time" should be part of the definition of "status data," and whether "status data" "reflects the condition of the network," language suggested by Fortinet. 31 BT argues "at given time" excludes the preferred embodiment and improperly narrows the term because the written description allows, but does not require , consideration of time. 32 It points to Table 6 of the '237 patent as providing "Attacker IP" and "Sentry IP" as examples of "status data" that would be excluded by "at a given time" 30 Each proposed construction is taken from the Amended JCCC. See D.I. 119- 1. 31 32 Markman Tr. at 21 :17-22. D.I. 117 at 2-3 ; Markman Tr. at 44 :5-45 :5. 9 because each has no temporal element. 33 Next, it contends defining "status data" to "reflect[] the condition of the network," erroneously takes a retrospective view of the condition of the network affer something has happened that affected the condition of the network.34 That definition should be rejected because the written description and claims purportedly focus on identification of potential security issues that can be addressed before the condition of the network is affected .35 Conversely, Fortinet maintains its proposed construction is supported by the intrinsic record and BT's proposed construction should be rejected for impermissibly broadening claim scope .36 In support of "at a given time ," Fortinet's brief suggests a distinction between a precise moment in time and a period of time : "a sentry message may communicate information regarding status over a period of time, but the status data itself relays a monitored component's status at a given time." 37 At Markman , Fortinet clarified that "at a given time" does not imply a dispute as to whether the timing is retrospective , prospective, or present tense ; rather, it reflects Fortinet's position that "status data" has a temporal connotation. 38 Fortinet revealed the parties' disagreement on this point is BT's position that certain purported examples of "status data" in Table 6 , specifically IP 33 D.I. 117 at 2-3. As discussed below, the only reference to Table 6 in the written description explains: "TABLE 6 of Appendix C suggests other information that might be included in such a [sentry] message." '237 patent at 8:66-9:1 . 34 Markman Tr. at 21 :22-22:1 . 35 Id. at 22 : 1-6. 36 D.I. 117 at 3. 37 Id. at 8 (emphasis in original). All emphases added unless otherwise specified, as here . 38 See Markman Tr. at 36:99-18. 10 addresses, do not have a temporal connotation. 39 Fortinet asserts BT made representations during IPR disclaiming an IP address, and like data, as being "status data. "40 Thus, the parties' dispute over "at a given time" is whether the intrinsic evidence requires "status data" to have a temporal connotation. A dispute over whether "status data" "reflects the conditions of the network and its components" remains as well. BT asserts "status data" is not restricted to identifying events that have happened because "status data" can also be used to identify potential events. "Status data" is recited in the following limitations of representative claim 1 of the '237 patent: 1 . A method of operating a probe as part of a security monitoring system for a computer network, comprising: a) collecting status data from at least one monitored component of said network; b) analyzing status data to identify potentially security-related events represented in the status data[.]41 Those limitations are similarly described in the Abstract and Summary of the Invention: A probe attached to a customer's network collects status data and other audit information from monitored components of the network, looking for footprints or evidence of unauthorized intrusions or attacks. The probe filters and analyzes the collected data to identify potentially security-related events happening on the network.42 39 40 41 42 Id. at 40:16-23; see also id. at 45:14-46:9. 0.1. 117 at 6. '237 patent, claim 1. Id., Abstract. 11 The present invention offers methods and systems for dynamic network intrusion monitoring, detection and response . . . . [which] ... may be used to deploy and provide a managed security monitoring service . .. that monitors a customer's network activity using a probe or "sentry" system, collects status data from monitored components, filters or otherwise analyzes the collected data for activity possibly implicating security concems[.]"43 The written description also states "[p]robe/sentry system 2000, which can be implemented in software or hardware or a combination of software and hardware, monitors sensors attached to customer network 1000 for evidence of potential securityrelated events happening on network 1000,"44 and the "probe/sentry system 2000 can monitor an collect information from any network component ... that can be configured to send or provide to it status data concerning the status of the network 1000 and its components. "45 No temporal connotation is explicitly stated in the claims, the above-quoted citations, or elsewhere in the written description. Fortinet argues, however, that BT's IPR statements preclude construing "status data" to include data, including IP addresses, which have no temporal connotation . There, BT stated: Although status data is not limited to what is shown in Table 6, its breadth is not unlimited. Status data tells something about the condition of the system and carries meaning. Data carried in traffic may certainly be status data. Petitioner, however, appears to imply that all traffic data is status data, which is not accurate. By way of example, unstructured ASCII data, as discussed in Warshaw, is not status data ... (because it] does not convey a meaning that is informative as to the status of the operation of the network or its components. Therefore, the claim term '"status data" is correctly 43 44 45 Id. at 1:47-55. Id. at 4:48-52. Id. at 4:58-63. 12 interpreted to exclude unstructured ASCII data or other data fragments that do not have an independent substantive meaning that actually bears on status. "46 BT argues the italicized language does not exclude IP addresses because an IP address can have a an independent substantive meaning that actually bears on status. For instance , whether an IP address had been seen many times before without incident or, conversely, has it been previously associated with malicious traffic. 47 The IPR declaration of BT's expert, Dr. Wenke Lee, states Table 6 exemplifies status data that might be included in a sentry message and a gateway message derived therefrom .48 Dr. Lee also explained he and Fortinet's expert, Dr. Reddy, agreed the fields in Table 6 contain status data , but that he disagreed with Dr. Reddy that all traffic data, including unstructured ASCII data , is "status data," because "unstructured ASCII data does not convey a meaning which is informative as to the status of the operation of the network or its components. "49 Based on the evidence presented , the court finds BT did not unambiguously disclaim IP addresses as "status data." Absent disclaimer, Fortinet also insists the intrinsic record supports its position . Fortinet contends Table 6 is not an exemplary list of "status data ," but a list of fields that 46 D.I. 90-1 , Ex. W (BT Preliminary Response) at JA-0001959-60. D.I. 117 at 9. Fortinet agrees the answer in response to such question would be status data, but argues an address standing alone would not. Markman Tr. 41 : 1242: 1. As discussed below, the court finds items listed in Table 6, including an IP address, are examples of "status data." 48 D.I. 90-1, Ex. X (Lee Deel.) at 1J 54 . 49 Id. , Ex. X (Lee Deel.) at 1J 55-56. Although Fortinet's IPR statements are not intrinsic evidence, see Iris Corp. Berhard v. United States, 147 Fed . Cl. 160, 166 n.3 (Fed . Cl. 2020) , the court notes Fortinet argued to the PTAB that: "The '237 patent includes 'IP address of the device that invoked this attack' as an example of status data. FT-1001 21 :61-62 (Table 6)." D.I. 90-1 , Ex. U ('237 Patent IPR Petition) at JA0001827. 47 13 may be included in "sentry messages"-as distinct from "status data"-which are generated by the communications and resource coordinator 2060 (part of probe/sentry system 2000) and sent to a secure operations center ("SOC") to inform the SOC of potential security events. 50 The court agrees that sentry messages are distinct from "status data," but disagrees that Table 6 is not an exemplary list of "status data." The written description provides "an exemplary embodiment of the probe/sentry system" wherein data is collected, collated, and then "filtered by positive filtering subsystem 2030, which selects possibly interesting information and forwards it to communications and resource coordinator 2060." 51 "Communications and resource coordinator 2060 creates sentry messages out of the interesting status data and forwards those messages on to gateway system 4000[.]"52 "[E]ach sentry message has a sentry identification number . .. as well as a message identification number (identifying the type of problem). (TABLE 6 . .. suggests other [possibly interesting] 50 0 .1. 117 at 7 (citing '237 patent at 8:60-9:6). Fortinet also relies on extrinsic evidence as support. Because the patent does not explicitly define "status data," Fortinet contends it is appropriate to consult a nontechnical dictionary which merely defines the single word "status" as meaning: "1 : the condition of a person or thing in the eyes of the law[;] 2a: position or rank in relation to others .. . b: relative rank in a hierarchy of prestige .. .[; and] 3: state of affairs[.]" See id. at 5 (citing 0.1. 118-1, Ex. 2. (Merriam-Webster's Collegiate Diet. , 10th Ed. (1999)) at JA-0003088) . In its surreply, Fortinet offered another nontechnical dictionary defining "status," in connection with social media or a patient's health as referring to "a particular time. " Id. at 11 n.7 (citing one definition of "status" found in the online Cambridge Dictionary at https://dictionary.cambridge.org/us/dictionary/english/status). The court finds those dictionaries are not helpful in the construction of "status data." 51 '237 patent at 8:35-50. The filtering process also includes a negative filtering subsystem which discards uninteresting information and sends "residue" data that is neither discarded as uninteresting, or selected out as interesting, to an anomaly engine for further analysis. Id. at 8:50-57. 52 Id. at 8:60-62. 14 information that might be included in such a [sentry] message)." 53 The "other information" listed in Table 6, including an IP address, is "status data" that might be included in a sentry message. For instance, an IP address known to be associated with malicious traffic. 54 The court therefore determines "status data" may include an IP address. Because the parties agree an IP address does not have a temporal connotation , and is described as among the possibly interesting status data included in a sentry message, the court determines there is no requirement that "status data" has a temporal connotation. Thus, Fortinet's proposal to construe the term to include "at a given time" is rejected . The court also determines it is not required that "status data" "reflects the conditions of the network and its components." "Status data" is not restricted to data having a temporal connotation and can be used not only to identify events that have already occurred affecting network conditions, but also potential events. The patent repeatedly speaks to those "potential ," or "possible," events .55 Extrinsic evidence also aids the court's understanding of the proper construction 53 Id. at 8:63-9: 1. See, e.g. , id. at 9:22-27 ("Network response subsystem 2070 can .. . process and execute requests . .. to not allow a certain IP address to access the customer's network[.]"). 55 See, e.g. , id. , claim 1, Abstract, 1:47-55, 4:48-52 , 4:48-63 . The court's determination is not undermined by BT's IPR response that "[s]tatus data tells us something about the condition of the system and carries meaning," 0.1. 90-1, Ex. Wat JA-0001959, or its brief stating "[e]ach field within Table 6 identified by BT is a selfsufficient example of status data because each (individually, as well as collectively) informs as to the condition of the system and/or traffic within it." 0.1. 117 at 8 (footnote omitted). Neither statement is a clear disavowal, or argument, that requires adopting Fortinet's proposed construction . 54 15 of "status data." The United States Patent & Trademark Office Glossary defines "status data" as "data that represent conditions of data, digital data processing systems, computers, peripherals, memory, etc," 56 i.e., not only the "conditions of the network." The glossary applies to Class 709, which is identified as applicable to the '237 patent on its face. 57 This broad definition encompasses conditions of data, including an IP address filtered out before it could change the condition of the network, is not limited to conditions of the network, and says nothing suggesting a temporal connotation. Thus, the court recommends construing "status data" to mean: "data extracted from or generated about the traffic or system processing it that is informative as to the status of the network and its components." 2. "dynamically" ('237 patent, claims 1, 2, 6, 10, 14, 16, 18, 22-27, 31, 35, 39, 41; '641 patent, claims 1, 2, 6, 10, 14, 16) a. BT's proposed construction: "during actual operation, rather than offline" b. Fortinet's proposed construction: "during actual operation" c. Court's construction: "during actual operation, rather than offline" This term appears in element "e)" of representative claim 1 of the '237 patent: A system for operating a probe as part of a security monitoring system for a computer network, the system comprising ... e) dynamically modifying an analysis capability of said probe during operation thereof based on said received feedback 58 The only difference between the parties' proposed constructions is whether the 56 D.I. 118-1, Ex. 1 (Classification Definitions, Class 709, Electrical Computers And Digital Processing Systems: Multicomputer Data Transferring , Section 1-Class Definition) at JA-0003053. 57 See '237 patent at (52) U.S. Cl., (58) Field of Classification Search. 58 '237 patent, claim 1. 16 proper construction includes "rather than offline." The parties identify the same two passages from the written description in support of their respective constructions: [T]he service may be customized, either dynamically or offline, to accommodate network-specific needs and to reflect feedback received about the demonstrated efficacy of a real world response to an actual event. 59 The software and filters of probe/sentry system 2000 , in a preferred embodiment, may be adaptive or, alternatively, may be manually updated offline or dynamically (that is, during actual operation). 60 The claim language and written description support the parties' proposed constructions of "dynamically" as meaning "during actual operation ," as well as BT's inclusion of "rather than offline" in its definition. Each written-description citation refers to customization (or manual updating) as alternatively occurring offline or dynamically. The claim language specifies dynamic modification occurs during the operation of the probe. The probe, however, does not operate when the system is offline or in idle mode. The written description elucidates the analysis capability of the probe can be manually updated offline, or "dynamically" updated "during actual operation" without having to take the system offline. 61 Therefore, the court recommends construing "dynamically" to mean "during actual operation , rather than offline." 59 Id. at 2:23-26. Id. at 5:27-29. 61 Fortinet's argument that BT's IPR responses to an anticipation rejection based on prior art disclosing "dynamically modifying an analysis capability of the probe during operation thereof based on the received feedback," D.I. 117 at 13-14 (citing D.I. 90-1 , Ex. Wat JA-1935-36 (BT IPR Response), is not persuasive. During the IPR, there was no unambiguous disavowal concerning the term "dynamically" as its definition was not at issue, and the patentee distinguished other aspects of the reference. See D.I. 89 , Ex. Q at JA-1549. 60 17 3. "probe" ('237 patent, claims 1, 6, 10, 14, 18, 22-26, 31, 35, 39; '641 patent, claims 1, 6, 10, 14) a. BT's proposed construction: "a probe is a system that collects data from one or more network components to which it is attached, filters or otherwise analyzes the data that has been collected, transmits noteworthy information, and receives feedback in order to update its capabilities of analysis" b. Fortinet's proposed construction: "a discrete software or hardware component that performs an initial scan and analysis of traffic of at least one network component to which it is attached" Alternatively, Fortinet proposes the following modification of BT's construction: "a probe is a discrete component that collects data from one or more network components to which it is attached, filters or otherwise analyzes the data that has been collected, transmits noteworthy information, and receives feedback in order to update its capabilities of analysis" c. Court's construction: "a probe is a discrete component that collects data from one or more network components to which it is attached, filters or otherwise analyzes the data that has been collected, transmits noteworthy information, and receives feedback in order to update its capabilities of analysis" Representative claim 1 of the '237 patent recites: 1. A method of operating a probe as part of a security monitoring system for a computer network, comprising: a) collecting status data ... ; b) analyzing status data .. . , wherein the analysis includes filtering .. . ' c) transmitting information . .. about said identified events to an analyst associated with said security monitoring system; d) receiving feedback at the probe .. . ; and e) dynamically modifying an analysis capability of said probe .. .. 62 62 '237 patent, claim 1. 18 Claim 18 of the '237 patent recites: A security monitoring system for a computer network comprising: (1) a plurality of sensors .. . ; (2) at least one secure operations center ... ; and (3) at least one probe [configured to perform the same collecting, analyzing, transmitting, receiving, and modifying steps recited in claim 1]. 63 Claim 26 of the '237 patent recites "A computer-readable medium whose contents contain a computer system to operate a probe as part of a security monitoring system for a computer network, by performing [he same collecting, analyzing, transmitting, receiving, and modifying steps recited in claim 1]."64 Independent claim 1 of the '641 patent similarly recites "[A] system for operating a probe as part of a security monitoring system for a computer network[.]"65 The parties' constructions each track the language of representative claim 1 specifying the probe collects, filters, transmits, and receives certain information. Fortinet's alternative proposal is identical to BT's proposed construction with the exception of changing "a probe is a system" to "a probe is a discrete component." Thus, the parties' dispute is whether "probe" should be construed as a distinct component, as Fortinet submits, or whether a "probe" is itself a system of multiple components which could in turn consist of multiple probe systems, as BT proposes. BT argues Fortinet's position is refuted by Figure 2 of the '237 patent, described 63 64 65 '237 patent, claim 18. Id., claim 26 . '641 patent, claim 1. 19 as "a system overview of an exemplary embodiment of a probe/sentry system[,]" and illustrating labeled-subsystems that perform the functions of a probe/sentry system. 66 It also asserts the claims define a "probe" as comprised of the subsystems in Figure 2. 67 For instance, claims 1 and claim 18 of the '237 patent each recite a probe performing , or configured, for five steps, i.e., collect, analyze , transmit, receive, and modify. BT reasons a "probe" is necessarily a system because it contains all the subsystems for the five steps.68 The court disagrees. The claims recite a "security monitoring system" of which a "probe" is "a part," not that a "probe" is itself a system . Claim 18, "[a] security monitoring system . . . comprising ," specifically recites "at least one probe," i.e., a singular unit. 69 Moreover, as Fortinet correctly described at Markman , mere recitation of five enumerated functions attributed to the probe does require the probe itself to be more than a singular unit. For instance, a cell phone or printer can perform multiple functions but each are nevertheless a single, discrete, unit. 70 A consecutive pair of sentences in the written description demonstrates the patentee's use of "probe" by itself as a noun when the word refers to a discrete components, versus an adjective when used in reference to a broader system , i.e. , "probe/sentry system." 66 0.1. 117 at 20 (quoting '237 patent at 3:62-64 and citing Figure 2). Id. at 21. 6a Id. 69 Of course, this also means there can be more than one discrete "probe" in a security monitoring system. It does not, however, indicate each "probe" is itself a system , much less a probe system potentially having multiple other probe systems. 70 Markman Tr. at 50:6-21 (describing a smartphone's ability to call, surf the web , and download data, or a printer not only printing but copying , faxing , scanning , etc.). 67 20 There should therefore be one process per probe/sentry, although each gateway might be associated with a few hundred or more probe/sentries. There should also be a port 468 connection to the probe/sentry system communications and resource coordinator. 71 The written description also refers to the unit that collects data as a discrete "sensor." 72 The court agrees with Fortinet that these intrinsic descriptions demonstrate a probe (or a sensor) in the singular form refers a discrete component attached to the monitored network. 73 Consequently, the court determines a "probe" is a discrete component of a system, not itself a system, and recommends construing "probe" to mean: "a probe is a discrete component that collects data from one or more network components to which it is attached, filters or otherwise analyzes the data that has been collected, transmits noteworthy information, and receives feedback in order to update its capabilities of analysis." Disputed Terms Appearing in the '641 Patent Disputed terms "information received," "customer information," and "problem ticket" only appear in '641 patent claim 18, and claim 19 by dependency. 4. "information received about an identified potentially security-related event occurring on the network, wherein the potentially security-related event is identified by filtering followed by an 71 '237 patent at 6:31-35. Id. at 8:41-42 ("Data collected by sensors 1010, 1020, 1030 and 1040 (note that four sensors are shown ... ) are collated by sensor data collator 2010."); see also id. at 4:48-51 (describing, in part, probe/sentry system of Figure 1 that "monitors sensors attached to customer network"). Claim 18 also recites a "plurality of sensors" as an separate element of the claimed "security monitoring system." This further supports the proposition that a "probe," and "sentry," are discrete units of a "probe/sentry system." 73 D. I. 117 at 18 n. 11 . 72 21 analysis of post-filtering residue" ('641 patent, claim 18) a. BT's proposed construction: "The words of the claim term, as written , without the additional language." b. Fortinet's proposed construction: "information received from a probe about an identified potentially security-related event occurring on the network, wherein the potentially security-related event is identified at the probe by filtering status data followed by an analysis of post-filtering residue" c. Court's construction: "information received from a probe about an identified potentially security-related event occurring on the network, wherein the potentially security-related event is identified at the probe by filtering status data followed by an analysis of post-filtering residue" The "information received " term appears in claim 18: A method of operating a secure operations center as part of a security monitoring system for a customer computer network, comprising : creating an event record for information received about an identified potentially security-related event occurring on the network, wherein the potentially security-related event is identified by filtering followed by an analysis of post-filtering residue , wherein the post-filtering residue is neither discarded nor selected by the filtering Fortinet's inclusion of "from a probe" and "at the probe" into the language of the "information received" term is the sole dispute. BT's contends Fortinet's construction is an improper attempt to rewrite the claim , and also violates the doctrine of claim differentiation . As reflected by its preamble, BT states claim 18 is directed to "[a] method of operating a secure operations center" 74 It contends the only colorable connection to a probe is the "wherein" clause that specifies "the potentially security-related event is 74 0 .1. 117 at 30 (quoting '641 patent, claim 18). 22 identified by filtering followed by an analysis of post-filtering residue, wherein the post filtering residue, is neither discarded nor selected by filtering." 75 That wherein clause purportedly specifies how, not where, the security event is identified. 76 Claim 10, however, specifies that the SOC "receive[s] data from the probe" which BT argues would be meaningless if the disputed term also inherently required that information received at the SOC must come from the probe. 77 Fortinet maintains BT's claim differentiation argument is flawed, and that BT's representations regarding claim 18 in its '641 patent IPR responses demonstrate a clear disavowal of any construction that omits "probe" as the information source .78 The court agrees with Fortinet's proposed construction. BT's claim differentiation argument is not persuasive. There is no dependent relationship between claim 18, where the disputed term appears, and claim 10, which depends from claim 1. The disfavor expressed by the Federal Circuit in Intellectual Ventures I involved limitations of dependent claims with respect to an associated independent claim. 79 Moreover, "claim differentiation is 'not a hard and fast rule and will be overcome by a contrary construction dictated by the written description or prosecution history."'80 75 Id. (quoting '641 patent, claim 18). Id. 77 Id. at 30-31 (citing Intellectual Ventures I LLC v. T-Mobi/e USE, Inc., 902 F.3d 1372, 1378 (Fed. Cir. 2018) ("Any construction of claim 1 that ... would render these dependent claims meaningless ... is disfavored."). 78 Id. at 32-33. 79 See Intellectual Ventures I, 902 F.3d at 1378. 80 Marine Polymer Techs. , Inc. v. Hemeon, Inc., 672 F.3d 1350 (Fed. Cir. 2012) (quoting Seachange Int'/, Inc. v. C-COR, Inc., 413 F.3d 1361, 1369 (Fed. Cir. 2005)). 1s 23 The intrinsic record also supports Fortinet's position. The Abstract describes "[a] probe attached to a customer's network collects status data and other audit information . . . . The probe filters and analyzes the collected data to identify potentially securityrelated events happening on the network[.]"8 1 Fortinet asserts the language of claim 18, purportedly parroting the Abstract, undermines BT's argument that the invention is agnostic regarding whether any of the claimed functionality relates to a probe. 82 The court notes that although the Abstract generally describes the invention , it does not necessarily dictate the construction of a particular term in a particular claim . More important to the court's construction is BT's IPR response in its successful opposition to Fortinet's challenges to certain claims of the '641 patent. Although BT argues a probe should not be included in the court's construction , in briefing, it acknowledged a colorable connection to a probe in the disputed term . BT's IPR response indicates that connection exists. Distinguishing prior art Hill , BT stated: [T]he claims require an analysis of residue at the probe at the post-filtering stage, prior to transmission of information to the SOC for a further analysis. Hill fails to disclose any initial analysis at a probe of anything that can be called "residue" to decide what would be sent to the SOC. 83 That statement generally refers to all claims of the '641 patent, but BT made similar statements specifically referencing claim 18. [C]laim 18 expressly contemplates transmission of information about 81 '641 patent, Abstract. 0 .1. 117 at 32 (citing Phillips, 415 F.3d at 1315 ("[C]laims 'must be read in view of the specification , of which they are a part."' (citation omitted)) . 83 0.1. 89-5 , Ex. Q (BT IPR Preliminary Response) at JA-0001559 (underlining in original supplied by BT). 82 24 identified events from the probe to the SOC for a second level of analysis. This is reflected in the language reciting "information received about an identified potentially security-related event."84 BT provided additional specificity by focusing on the "creating" step of claim 18 which contains the "information received" term, and compares the step to a particular limitation of claim 1 which describes "[a] system for operating a probe as part of a security monitoring system[.]" 1. The Limitations Present in Every Claim Directed to Analysis of Residue Status Data at the Probe to Identify Potential Events Are Missing From Petitioner's Asserted References ***** In this fashion , element b of independent claim 1 and the "creating" step of claim 18 require the same thing. After filtering , residue status data, which was neither discarded nor selected (for example, by positive and negative filtering , as recited in dependent claims 4 and 5) , is analyzed , at the probe, to identify a potentially security-related event. The potentially security-related event is identified at the probe in order to focus and limit the subsequent transmission of information to the SOC to those identified events. Id. at ffll 21 , 35. The relevant language in this regard is expressed in element c of claim 1 and , as shown above , in the "creating" step of claim 18 (reciting "information received about an identified potentially security-related event") .85 In briefing , BT's argues claim 18, "[a] method of operating a secure operations center," is directed to the operation of the SOC depicted on the right side of Figure 1 and is not directed to the operation of the probe depicted to the left. 86 It also contends addition of a structural limitation , a probe, to method claim 18 is improper.87 It did not 84 Id., Ex. Q at JA-0001534 (underlining in original supplied by BT). Id. , Ex. Q at JA-0001573, JA-0001575-76 (bold-numbered heading in original). 86 D.I. 117 at 30. 87 Id. at 34 (citing National Oilwell Varco, L.P. v. Auto-Ori/, Inc. , C.A. No. 5:09/cv/85 , 2011 WL 3648532 , at *21 (E.D. Tex. Aug. 16, 2011)). 85 25 meaningful respond to Fortinet's arguments based on BT's IPR responses. Neither BT's argument concerning Figure 1, and related written description, nor its citation to National Oilwell take into account the impact of its IPR statements, which the court finds determinative. 88 Notwithstanding BT's arguments at Markman that its IPR responses show it distinguished the prior art based on a lack of two levels of analysis, and not based on what happened at the probe, 89 the court finds BT's statements clearly require construction of the "information received" term to include "probe" as proposed by Fortinet. BT repeatedly referred the PTAB to claim 18, specifically pointing to the "creating" step of the claim in the context of a probe, and explaining claim 1, element b, and the "creating" step "require the same thing," i.e. "analyz[ing], at the probe, to identify a potentially security-related event." Thus, the court recommends the "information received" term be construed to mean: "information received from a probe about an identified potentially security-related event occurring on the network, wherein the potentially security-related event is identified at the probe by filtering status data followed by an analysis of post-filtering residue." 88 The court notes the refusal of the National Oilwell court to read a structural limitation in to a method claim did not involve arguments for that inclusion based on disclaimer or disavowal during an IPR. See National Oilwell, 2011 WL 3648532, at *2122. 89 See Markman Tr. at 115:6-116:12 (citing D.I. 89-5, Ex. Q at JA-0001573) ("Petitioner's[, Fortinet,] fundamental problem is that the claims of the '641 Patent contemplate two levels of analysis."). 26 5. "customer information" ('641 patent, claim 18) a. BT's proposed construction: "information about a customer" b. Fortinet's proposed construction: "information identifying the specific customer who runs the network" c. Court's construction: "information about a customer" BT argues Fortinet impermissibly narrows "customer information" to "the specific customer who runs the network" despite the written description providing several different examples of customer-specific information in Tables 3 (entitled "SOC: Company"); 4 (entitled "SOC: Contacts"); 7 (entitled "SOC: Install"), and 9 (entitled "SOC: Person"). 90 Examples include information relating to a person at the customer (such as "Contacts Unique ID" in Table 4), contact information for the customer (such as "Time Zone" in Table 3), and information relating to a possible infected device at the customer (e.g., "Tag Number" in Table 7) . BT contends Fortinet's proposed construction erroneously elevates certain types of disclosed customer information, i.e., fields in the cited tables that actually identify a customer, to a definitional level, while excluding all other customer information critical to problem resolution, e.g., "memo" fields which contain "Pertinent Notes" but do not necessarily identify a specific customer. 91 BT also notes the patent's caution: "given their access to sensitive customer information, security analysts would preferably pass background checks and 90 D. I. 117 at 35 (citing '641 patent at 10:22-28 ("Appendix C provides more detail on information that might be included in the client information database 6022 (see TABLES 3, 4, 7, and 9[.]"). 91 Id. (citing Nel/corPuritan Bennett, Inc. v. Masimo Corp., 402 F.3d 1364, 1369 (Fed. Cir. 2005) ("[W]e decline to give that term a definition that would exclude the preferred embodiments from inclusion within the language of the claims.")). 27 be bonded to provide extra assurance for customers of the MSM service." 92 BT argues that caution is both inconsistent with Fortinet's proposal because "customer information" merely identifying a specific customer would not warrant bonding a security analyst, and excludes other information about a customer, such as passwords referenced in Table 7, access to which could require background checks and/or bonds. 93 Fortinet argues the cited tables each includes specific company information, as per its proposed construction , to which BT reiterated that each also include information about a customer that may not specifically identify a customer. 94 The court finds Fortinet's arguments with respect to the referenced tables unconvincing. Fortinet also argues BT's IPR responses show a clear disavowal of claim scope warranting acceptance of its construction. 95 At IPR, BT stated "[t]he location identifiers of Hill only identify which node is under attack and contain no information about who runs the nodes." 96 At Markman , BT noted that quotation is followed by the statement: "Moreover, as described in Hill , the nodes are part of one integrated system, presumably operated by one outfit. ... Consequently, neither of Petitioner's asserted references show the customer-specific steps of claim 18 for operating the SOC."97 According to BT, it was explaining that the system of Hill was one system of one entity; there were no customers and , therefore , the location identifier in Hill was distinguished 92 93 94 95 96 97 Id. at 36 (quoting '641 patent at 2:47-50) . Id.; Markman Tr. at 119-2-19; BT Markman Presentation Slide 39 . Markman Tr. at 122:15-123:5; 123:8-17. D.I. 117 at 36, 37. D.I. 89-5 , Ex. Q at JA-0001582. Id. , Ex. Q at JA-0001582. 28 on the lack of customers in that system, not on distinctions as to different types of customer information .98 The court finds BT's IPR statements do not show a clear and unambiguous disclaimer. Thus, it recommends construing "customer information" to mean: "information about a customer."99 6. "problem ticket" ('641 patent, claims 18, 19) a. BT's proposed construction: "a consolidation of the event record , correlated customer information and symptom record, and linked problem resolution assistance information" b. Fortinet's proposed construction: "a ticket representing potentially security-related happenings on the customer's network, based on analysis of residue status data, and incorporating customer information as well as security intelligence and problem resolution information specific to the customer" c. Court's construction: "a consolidation of the event record, correlated customer information and symptom record, and linked problem resolution assistance information" Problem ticket appears in the following element of claim 18: consolidating the event record, correlated customer information and symptom record, and linked problem resolution assistance information into a problem ticket The term also appears in claim 19: 19. The method of claim 18, further comprising: correlating the event record with a pre-existing event record stored 98 Markman Tr. at 119:20-120:22. In briefing, Fortinet notes that during its original prosecution the '641, the applicant purportedly acquiesced to the Examiner's view that in the prior art "the customer information is the internet protocol address for the customer site." 0.1. 118Ex. 3 (4/27/2010 Final Rejection) at JA-3096. The court also finds no clear disavowal as a result of that statement by the Examiner. 99 29 on an event database within the secure operations center; and linking the event record to an open problem ticket associated with the pre-existing event record. 100 The construction proposed by Fortinet is a recitation of BT's statement distinguishing the Hill reference during an IPR that: '"problem tickets' represent potentially security-related happenings on the customer's network, based on analysis of residue status data, and incorporate customer information as well as security intelligence and problem resolution information specific to the customer."101 Two sentences prior to that statement, BT states "the 'problem ticket' ... is generated from consolidating 'the event record, correlated customer information and symptom record, and linked problem resolution assistance information" as claimed."' 102 Also, Fortinet's proposal to include "analysis of residue status data" is contradicted by BT's argument to the PTAB that the mapping of "the attack record of Hill" as "correspond[ing] to the 'event record' [limitation of claim 18]" fails because "Hill [does not] disclose or suggest analysis of post-filtering residue status data[, thus, Hill does not] disclose or suggest the claimed 'event record."' 103 BT also states Hill is "silent as to using customer information, which is required by each ... step[]" of claim 18. 104 "Using" customer information does equate to "incorporating" customer information as Fortinet's proposed construction requires. Therefore, the court finds BT's IPR statements are neither an explicit definition of "problem ticket" nor an unambiguous 100 101 102 103 104 '641 patent, claim 19. D.I. 117 at 39 (quoting D.I. 89-5, Ex. Q a JA-0001583). D.I. 89-5, Ex. Q a JA-0001583. Id., Ex. Q a JA-0001581-82. Id., Ex. Q a JA-0001582. 30 disclaimer of claim scope. The claim language itself provides the definition of a "problem ticket" and BT's that language. The written description supports that construction. Gateway messages are collected and formatted "into 'problem tickets' (each of which represents a discrete security-related event or incident of possible intrusive activity happening on a customer's network)[.]"1° 5 This language describes what a problem ticket "represents," it is not an explicit definition of the term as Forti net asserts,106 and does not specify what the claimed "problem ticket" term is. The written description identifies the particular information to be consolidated in a "problem ticket. " Event records may then be linked with other event records stored in problem/event database 6021 and with information from a variety of databases (including customer information from client information database 6022 and problem resolution information from problem/event resolution database 6023) to form "problem tickets," which are then opened and displayed on security analyst consoles 6010 to security analysts for handling.107 In addition to the IPR record not supporting Fortinet's proposal , the inclusion of "incorporate" improperly narrows the term by potentially implying all information must actually be copied into a single record . The claim uses the word "consolidate," and "consolidation " is used in the "Description" of "Problem Ticket (1 0)" as "[a] consolidation of information regarding a specific set of happenings that may indicate an attack, such information including gateway messages, company information and security intelligence information."108 Fortinet's proposal also omits the "problem resolution assistance 105 106 107 108 '641 patent at 3:45-49. See 0.1. 117 at 39. '641 patent at 10: 15-23. Id. , at Table 1; id. at 19:43-47. 31 information" phrase recited in the claim. Thus, the court rejects Fortinet's proposed construction and recommends adopting BT's proposed construction of "problem ticket" to mean: "a consolidation of the event record, correlated customer information and symptom record, and linked problem resolution assistance information." 7. "a group of user computers"/ "group" ('845 patent, claims 1, 3, 9, 19, 20, 21 , 23) a. BT's proposed construction : "the user computers that the network architecture allows to communicate directly or through a server to which the user computers are connected" b. Fortinet's proposed construction: "a set of user computers classed together by a logical configuration defined by network architecture that provides organization to the communications among the members of the group" c. Court's construction: "the user computers that the network architecture allows to communicate directly or through a server to which the user computers are connected" The patent provides for "a computer security system for use in a network environment comprising at least a first group of user computers arranged to communicate over a network[.]" 109 The written descriptions provides examples of two preferred embodiments that support BT's proposed construction wherein the communication among the group members can be direct, "[i]n a preferred embodiment, the computer security system further comprises a network server arranged to receive each warning message communicated from the user computers[,]"1 10 or indirect, "[t]he second embodiment of the invention presents a pure 'peer to peer' system which does 109 11 0 '845 patent at 3:21-24. Id. at 4:49-5: 10. 32 without the server 12 of the first embodiment." 11 1 Fortinet's construction, providing that groups are "classed together by a logical configuration defined by network architecture that provides organization to the communications among the members of the group," is taken from BT's IPR responses. In the Introduction section of its Preliminary Response, BT "briefly . .. describe[d] the invention and the Petitioner's mistaken construction of the term 'group[.]"' 112 "As used throughout the '845 Patent, a 'group' is a logical configuration defined by network architecture that provides organization to the communications among the group members." 113 Under the section titled "The Disclosure of the '845 Patent," BT stated: The "group" is a logical configuration created by the network designer to provide organization to the communications among the group members and control traffic. Each member of a group can send a security related message to the others in the group (or to a group server) and can receive broadcasts sent by another member in the group (or by a group server). 114 BT argues it used the phrases "logical configuration defined by network architecture" and "provide organization to the communications among the group members" to express the same characteristics of group communication reflected in its proposed construction, and that Fortinet's inclusion of those phrases-taken out of context-are less clear and could lead to jury confusion. 11 5 The court does not agree that those phrases are taken out of context. However, the court agrees with BT that Fortinet's construction improperly excludes the central 111 112 113 114 11 5 '845 patent, 13:40-47. 0 .1. 91-1, Ex. BB (BT's Preliminary Response) at JA-0002277. Id., Ex. BB at JA-0002278. Id., Ex. BB at JA-0002294. 0 .1. 117 at 42. 33 server embodiment, where organization for communications is provided by the central server and not the group itself, and that claims 1, 3, 9, 20, 21 , and 23 expressly relate to the central server embodiment. 116 Fortinet contends BT's construction is improperly broad ,117 but "[a] patentee may claim an invention broadly and expect enforcement of the full scope of that language absent a clear disavowal or contrary definition in the specification ." 118 Fortinet does not argue there is a definition contrary to BT's proposal in the written description-indeed, the phrases Fortinet proposes do not appear therein. Nor does it argue this term implicates a clear disavowal in BT's IPR statements. It simply argues BT does not explain how Fortinet's construction is inconsistent with the central server embodiment and suggests, without citation to the record , that one way of organizing communications among group members is through a server within the network architecture.119 Here, Fortinet asserts BT's construction is improperly broad , but it is not up to BT to explain why the court must reject Fortinet's narrowing construction in the absence of a contrary definition in the specification or clear disavowal. Thus, the court recommends construing "a group of user computers" I "group" to mean : "the user computers that the network architecture allows to communicate directly or through a server to which the user computers are connected. " 116 117 118 Id. at 44. Id. at 43 . Home Diagnostics, Inc. v. LifeScan, Inc. , 381 F.3d 1352, 1357 (Fed . Cir. 2004). 119 D.I. 117 at 44-45. 34 Disputed Terms Appearing in the '845 Patent Disputed terms "a group of user computers," "suspect data," "an identifier of the piece or set of suspected data," and "act in respect of any particular piece or set of suspect data" appear in the '845 patent. 8. "suspect data" / "a suspect data, wherein the suspect data is identified by the user computer as a possible security threat by the user computer" / "a piece or set of suspect data identified by one or more of the group of user computers as a possible security threat" ('845 patent, claims 1, 3, 9, 19, 20, 21, 23) a. BT's proposed construction: "data indicating a possible security threat" b. Fortinet's proposed construction : "data identified by one or more user computers, such computer(s) having concluded without aid from centralized analysis that the data indicates a possible security threat" c. Court's construction : "data identified by one or more user computers, such computer(s) having concluded without aid from centralized analysis that the data indicates a possible security threat" There is no dispute that the "suspect data" is identified by one or more computers, or that it indicates "a possible security threat." 120 The parties also agree the term implicates two steps: (1) identification of suspect data by the user computers, and (2) confirming that data is actually malicious which uses a count feature .121 The parties' dispute concerns Fortinet's position that the "suspect data" be identified in the first step without aid from centralized analysis. 122 BT contends Fortinet misconstrues statements relating to the confirmation that 120 121 122 Id. at 47. Markman Tr. at 64:8-11, 69:1-7. 0.1. 117 at 47. 35 suspect data is a threat (i.e., the detection of malicious data), which occurs later in the claims, with the identification of suspect data. 123 It also maintains Fortinet's construction is inconsistent with the patent's express disclosure of a server generating signatures that are then sent to user computers to help them identify suspect data, i.e. , a form of centralized analysis. 124 Fortinet argues BT's position that a user computer may rely on centralized analysis in identifying suspect data disregards the central tenant of the '845 patent's purported innovation: "a distributed virus or other malicious data identification system which allows individual users or software agents running on a user's computer to identify malicious data when they receive it." 125 Fortinet also asserts BT unambiguously disclaimed the use of a central authority in identifying suspect data during IPR and prosecution .126 Fortinet also contends BT mischaracterizes the '845 patent's preferred embodiment as using centralized analysis in identifying suspect data. 127 In that embodiment, a central server generates a signature for data a user computer has already flagged as suspect, but the patent does not describe the central server itself as identifying data as suspect. The Summary of the Invention provides the following description: 123 124 Markman Tr. at 64:8-16. D.I. 117 at 47 (citing , inter alia , '845 patent at 10:33-55) ; Markman Tr. at 66:7-12 . 125 D.I. 117 at 47 (quoting '845 patent at 3:1-5 ; see also id. at 2:56-2:59 ("There is ... a need for a system which removes this centralised analysis step.")). 126 D.I. 117 at 47-48. As noted below, at Markman Fortinet stated it was not relying on a finding of disclaimer, rather the intrinsic record itself supports its construction. 127 Id. at 48 . 36 In order to address the above problems, one or more disclosed embodiments provide a collaborative computer security system wherein the responsibility for detection of malicious data such as a computer virus or email address from which spam messages have been received is removed from that of any central authority, and is instead placed in the hands of each and every user of the network. More particularly, the disclosed embodiments provide a distributed virus or other malicious data identification system which allows individual users or software agents running on a user's computer to identify malicious data when they receive it[ . ] 128 This passage describes the invention as a system where user computers are responsible for detecting malicious data, in contrast with prior art where that function involved a central authority, and particularly that individual users identify that data. The description of the first embodiment is also consistent with the identification of "suspect data' by user computers and without centralized analysis. The first embodiment provides a computer security system wherein identification of suspect data is performed by the users or suitable software agents installed and running on the user's computers at the user's computers themselves, and upon identification of a suspect piece or set of data a warning message is transmitted from the user's computer to the network server 12. At the server the number of warning messages received about a particular piece or set of data is counted, and once the count passes a first warning threshold , a warning message is broadcast to all users, the message containing a signature of the suspect data, such that an anti-virus program located at each user's computer can filter incoming data for the suspect data. 129 The first italicized section refers to the first step , identification of "suspect data" by the user computers, whereas the second italicized section refers to the server's actions related to the second step, confirming that "suspect data" is malicious using a count feature , and broadcasting a warning message to users whose computers can 128 129 '845 patent at 2:60-3:5. Id. at 7:39-51. 37 take appropriate action. The described identification by user computers is reflected in the "suspect data" claim terms at issue: "a suspect data, wherein the suspect data is identified by the user computer as a possible security threat by the user computer' I "a piece or set of suspect data identified by one or more of the group of user computers as a possible security threat." BT argues Fortinet's position is contradicted by other parts of the written description expressly showing the user computers are aided in the identification of suspect data by centralized analysis: "the server broadcasts a message over the network to all the user computers 15, the message can include the suspect data's signature as generated at step 4.3[.]"1 30 BT's argument is not persuasive. The broadcasting action is not related to whether the identification of "suspect data" by the user computers is aided by a central server. That action is also claimed as a separate element independent of the identification of "suspect data." 131 The broadcast is made after "suspect data" has been identified by user computers as a potential security threat. 132 130 Markman Tr. at 66:6-13. See, e.g. ,'845 patent, claim 10 ("a warning message generated by a user computer of the group is broadcast to every other user computer of the group"), claim 20 ("verifying whether the suspect data is a security threat; and broadcasting a group warning message to all user computers of the group regarding the suspect data when the suspect data is identified as being a security threat.) . The broadcast is made after "suspect data" has been identified as a potential security threat. 132 BT also contends the patent's discussion of prior art shows the removal of a centralized authority step referred to the confirmation that data is malicious and not the additional identification of suspect data at the user computers. For example: 131 Thus, whilst DIS may improve response times to virus infection through it's automatic filtering processes, it still relies on a central authority to analyse the suspect data and decide on appropriate action, which must 38 BT's IPR responses and prosecution statements confirm central analysis is not part of the invention's identification of "suspect data, " which is the sole issue concerning the construction of the "suspect data" terms. During IPR BT stated: However, the time from discovering a new virus to delivering its signature to protected machines took too long because an administrative authority was required to recognize the problem , identify the virus's signature, update the anti-virus database, and distribute the updated database. By the time this happened, it was often already too late. Exh. 1001 , 1 :55-66; Exh . 2001 ,99 .133 BT argues this response refers to actions taken after suspect data is confirmed to be malicious.134 The court agrees this statement does not relate to the initial identification of "suspect data" by user computers. The next IPR statement upon which Fortinet relies directly addresses that identification. The '845 Patent offers a solution through decentralized detection and action .. . . The '845 Patent has two different embodiments for accomplishing this , one in which user computers detect suspect data and send a warning message to a group server for broadcast to all users within the group , and one in which each peer can detect suspect data and broadcast the detection of suspect data to all other peers. Id. at 3:27. In both instances, user computers identify "suspect" data and generate a unique signature, such as a hash , to identify it. Id. at 8:50-62.135 BT denies this statement constitutes a disclaimer. BT states it never disputed then be communicated outwards to each user. There is therefore still a need for a system wh ich removes this centralised analysis step to speed the response . '845 patent at 2:52-58. That passage does not contradict Fortinet's position as it does not relate to the initial identification of "suspect data" by user computers . 133 D.I. 91-4, Ex. BB at JA-0002300. 134 Markman Tr. at 68:2-12. 135 D.I. 91-1 , Ex. BB at JA-0002287-88. 39 that user computers identify suspect data, but argues it does not follow that user computers have to identify suspect data entirely by themselves without any aid. 136 Be that as it may, during prosecution the applicant stated : As is apparent from the introduction and body of Applicant's specification , one characteristic of Applicant's claimed invention relates to the fact that it . does not require a centralized analysis step . This arrangement advantageously speeds up the broadcast of warning messages between distributed user computers, one or more of which has itself identified the suspect data. Simply stated , Milliken teaches the exact opposite . In particular, Milliken teaches detection of suspect data at a centralized mail server 120. 137 [l]t is precisely to avoid the requirement for such centralized detection of problems that Applicant has proposed and claimed a system where the user computers (of a given group) detect suspicious data and then exchange warning messages with each other on a distributed basis. 138 Each of Applicant's independent claims 1, 19, 20, and 27 essentially requires , inter alia , that (a) suspect data be identified by one or more of the group of user computers, and then (b) warning messages (generated at one or more such user computers) are sent to other user computers in that group (or perhaps even to a user computer in another group). This is the antithesis of the Milliken teaching that relies upon centralized mail server 120 to detect suspicious data and issue warnings, etc. 139 The court agrees with Fortinet that these statements make clear that the use of a central authority is not part of the identification of "suspect data. "140 Thus, the court recommends construing the "suspect data" claims to mean: 136 Markman Tr. at 66 :17-22. D.I. 88-4 , Ex. Hat JA-0000459 (underlining in original) . 138 Id. , Ex. Hat JA-0000460 (underlining in original) . 139 Id., Ex. Hat JA-0000461-62 (underlining in original). 140 At Markman , Fortinet retreated from its disclaimer argument presented in briefing . See Markman Tr. at 76:6-11 . The court ultimately agrees a finding of prosecution history disclaimer is not necessary for the court to agree with Fortinet's proposed construction because the intrinsic record , taken as a whole, reveals user computers identify suspect data without central aid . 137 40 "data identified by one or more user computers, such computer(s) having concluded without aid from centralized analysis that the data indicates a possible security threat." 9. "an identifier of the piece or set of suspected data" ('845 patent, claims 1, 3, 9, 19) a. BT's proposed construction: "a substantially unique descriptor for a particular piece or set of suspect data other than the data itself' b. Fortinet's proposed construction: "a repeatably generatable signature substantially unique to the piece or set of data" c. Court's construction: "a substantially unique descriptor for a particular piece or set of suspect data other than the data itself' The parties agree the "identifier" must be "substantially unique." BT construes "identifier" as a "descriptor" based on the patent's explanation that the "identifier" can be a signature, or a data signature ID, which is "an identifier of the signature which can be used as a short hand means of identifying the particular piece or set of suspect data." 141 It argues Fortinet's requirement that the "identifier" needs to be a "repeatably generatable signature," rather than a "descriptor," is inconsistent with the doctrine of claim differentiation where claim 8, which depends (indirectly) from claim 1, specifies that "the identifier is a repeatably generatable signature substantially unique to the piece or set of suspect data." 142 BT also argues written description characterization of the "identifier" as a "repeatably generatable signature" is the description of a preferred embodiment. 143 Finally, BT's asserts defining "identifier" at not being "the data itself' is 141 0.1. 117 at 51 (citing '845 patent at 4:39-48 and quoting id. at 10:35-39). Id. at 52 (quoting '845 patent, claim 8; Curtiss-Wright Flow Control Corp. v. Ve/an, Inc., 438 F.3d 1374, 1380 (Fed. Cir. 2006) ("In the most specific sense, 'claim differentiation' refers to the presumption that an independent claim should not be construed as requiring a limitation added by a dependent claim.")) . 143 Id. (citing '845 patent at 4:39-48). 142 41 consistent with the applicant's own clear disclaimer during prosecution. 144 Fortinet asserts its proposed construction is consistent with the intrinsic record's description of "an identifier" of suspect data as limited to "a repeatably generatable signature": "[t]he identifier of [suspect data] may be the actual piece of suspect data itself, or a repeatably generatable signature substantially unique to the piece or set of data ." 145 Although that description recites an alternative, i.e., "the actual piece of data itself," Fortinet contents BT's acknowledged disclaimer of that alternative requires the term to be "a repeatedly generatable signature. "146 Fortinet also asserts the '845 patent confirms an "identifier" refers to suspect data's signature, not a generic "descriptor," as BT asserts. 147 The parties agree the applicant disclaimed an "identifier" being "the data itself' during prosecution : Accordingly, in applicant's invention, the suspect data is not directly used, but instead is referred to by means of an identifier, which in one embodiment of the invention takes the form of a signature .. . amended claim 1 now includes an identity generator (and the generation of an identity is now present in method claim 19). Such feature is missing from McCormick. As noted above, McCormick handles the "suspect data" (i.e., the e-mail address) directly, so there is no need to generate an identity separate from the suspect data itself 148 The parties do not agree that disclaimer means the "identifier" is thereby limited to "a repeatably generatable signature," or whether the term may be defined as a "descriptor. " The court determines "identifier" is not limited to "a repeatably generatable 144 145 14s 141 148 Id. at 53 (citing 0 .1. 88-4, Ex. Hat JA-0000427-28). Id. (quoting '845 patent at 4:41-43). Id. Id. 0.1. 88-4 , Ex. Hat JA-0000427-28. 42 signature." Fortinet cites to several instances in the intrinsic record where and "identifier" is described in connection with a "generated" "signature." Indeed it asserts that in a// embodiments the identifier is a signature, not a more generic "descriptor." 149 For instance, the written description notes "that other forms of signature creation other than the use of hash functions may also be of use, the only requirement [is] that an identifiable unique signature is generated for any particular piece or set of suspect data input into the signature creation function at any time." 150 The written description also explains that at the message broadcasting step of the preferred embodiment, "the message can include the suspect data's signature as generated at [a previous] step" or a "new data signature ID, being simply an identifier of the signature which can be used as a short hand means of identifying the particular piece or set of suspect data[.]" 151 Fortinet contends allowing a signature to be identified by shorthand in a warning message does not supplant the requirement that a signature be generated initially,152 and reiterates BT's IPR description of the '845 patent's two embodiments where "[i]n both instances, user computers identify 'suspect data' and generate a unique signature , such as a hash , to identify it." 153 Despite the intrinsic evidence Fortinet cites, the court finds none embody 149 150 151 152 153 0.1. 117 at 54. '845 patent at 8:63-67. Id. at 10:35-40. D.I. 117 at 57. 0.1. 91-1, Ex. BB at JA-0002288. 43 manifest expressions demonstrating a clear intention to limit claim scope .154 Additionally, Fortinet's construction would read into independent claim 1 the limitation of indirectly-dependent claim 8, "the identifier is a repeatably generatable signature substantially unique to the piece or set of suspect data" in violation of the doctrine of claim differentiation. 155 Despite being raised by BT in its opening and reply briefs, Fortinet did not respond to this argument in either its answering or sur-reply briefs. The court also notes that although the parties did not present arguments on this term at the Markman hearing, slides provided by Fortinet at the hearing included a section addressed to the "identifier" term that likewise did not address BT's claim differentiation argument. The court takes this silence as acquiescence. Thus, the court recommends construing "an identifier of the piece or set of suspected data" to mean: "a substantially unique descriptor for a particular piece or set of suspect data other than the data itself." 154 See Liebel-Flarsheim Co. v. Medrad, Inc. , 358 F.3d 898, 906 (Fed . Cir. 2004) ("Even when the specification describes only a single embodiment, the claims of the patent will not be read restrictively unless the patentee has demonstrated a clear intention to limit the claim scope using 'words or expressions of manifest exclusion or restriction. "' (citation omitted)) ; Novartis Pharm. Corp. v. Actavis, Inc., No. CV 12-366-RGA-CJB, 2013 WL 6142747 , at *10 (D. Del. Nov. 21 , 2013) ("[T]he use of the te rm 'preferably' ... appears to be 'merely expressing a non-limiting preferred embodiment of a broader invention.' ... The Federal Circuit has repeatedly warned against confining the claims of a patent to specific embodiments described in the specification." ( citations omitted)). 155 See Liebel-Flarsheim, 358 F.3d at 910 ("[W]here the limitation that is sought to be 'read into' an independent claim already appears in a dependent claim, the doctrine of claim differentiation is at its strongest.") see also Curtiss-Wright Flow Control Corp. v. Ve/an, Inc. , 438 F.3d 1374, 1380 (Fed . Cir. 2006) ("In the most specific sense, 'claim differentiation' refers to the presumption that an independent claim should not be construed as requiring a limitation added by a dependent claim.")). 44 10. "act in respect of any particular piece or set of suspect data when the count maintained therefor is substantially equal to or greater than at least one threshold value" ('845 patent, claims 1, 19) a. BT's proposed construction: "the words of the claim term, as written, without the additional word 'only"' b. Fortinet's proposed construction : "act in respect of any particular piece or set of suspect data only when the count maintained therefor is substantially equal to or greater than at least one threshold value" c. Court's construction: "act in respect of any particular piece or set of suspect data only when the count maintained therefor is substantially equal to or greater than at least one threshold value" Fortinet's proposed construction adds the word "only" to its verbatim recitation of the language of the claim phrase and is based on its contention BT made an express and unequivocal disclaimer during prosecution. 156 "Explicit arguments made during prosecution to overcome prior art can lead to narrow claim interpretations because the public has a right to rely on such definitive statements made during prosecution." 157 In distinguishing claims 1 and 19 from the prior art, the applicant stated: Instead of acting (e.g., by automatically sending out kill signals in [the prior art reference]) immediately upon detection of a potential threat, no action is taken in the invention of claims 1 and 19 until a pre-specified number of sightings of the data item is recorded. Specifically, a count is taken of the number of times the data item is thought to be a malicious, and action is taken only when this number exceeds a threshold value. 158 BT argues insertion of the word "only" artificially narrows term by excluding from infringement any system that has activity beyond that specified in the remaining 156 D.I. 117 at 59. Rheox, Inc. v. Entact, Inc., 276 F.3d 1319, 1325 (Fed. Cir. 2002). 158 D.I. 88-4, Ex. H (Notice of Allowance) at JA-0000394 (first emphasis in original by applicant). 157 45 language of the claims. When a modifier is used in some claims, but not others, an applicant's differing choices should generally be respected .159 Here, BT notes when the patentee wanted to add "only" to a claim limitation , it did so. 160 It also cites the use of the word "only" in written description is used when describing certain preferred embodiments ,16 1 but other descriptions purportedly demonstrate an intent to incorporate a broader scope by omitting the word "only." 162 BT denies the above-quoted statement represents an unequivocal disavowal of scope .163 It contends that statement simply reflects the position that the claimed action only happens when a particular count is reached, "no action is taken in the invention of claims 1 and 19 until a pre-specified number of sightings of the data item is recorded ," 159 See, e.g., MAX Int 'I Converters, Inc. v. lconexLLC, No. CV 18-1412 (MN) , 2019 WL 4643788, at *6 (D. Del. Sept. 24, 2019) ("The claim . .. does not say a substantially continuous , as used in other claims or even substantially uninterrupted as used in other parts of the claim . The applicant knew how to say 'substantially' when it wanted to-it did not do so here."). 160 D.I. 117 at 58 (citing '845 patent, claim 16 ("wherein the network security system is further arranged to act against the particular piece or set of suspect data only if."), claim 23 ("broadcasting the group message with the action indicator only when.")). 161 '845 patent at 12:41-50 ("The first embodiment therefore presents a computer security system whereby computer viruses and the like can be detected by individual users, who transmit warnings to a server which then broadcasts warnings as appropriate to all users if the number of individual warnings received from individual users exceeds certain thresholds. The use of thresholding in the server instills a degree of order, in that it is only once a particular threshold level of warnings have been received that action is taken by the server and user computers against the suspect data."); 17:50-53 ("Only when the count passes the warning threshold in one of the sub-communities is the suspect data signature distributed further."). 162 '845 patent at 3:10-14 ("A record is kept either at the server or at each peer computer as to the number of warning messages communicated concerning any particular piece or set of suspect data, and then appropriate security actions such as issuing warnings to users or blocking the transmission of the suspect data can be taken once the number of warning messages communicated from users has passed a certain threshold level"). 163 D.1.117 at 61 . 46 not that no other action can happen besides that claimed action. 164 The court disagrees with BT and finds the specificity of its statement is a clear disclaimer of claim scope. BT itself emphasizes the applicant's statement that "no action is taken in the invention of claims 1 and 19 until a pre-specified number of sightings of that data item is recorded ," i.e., the claims in which the disputed term appears, but suggests a distinction between "the claimed action" and some other action, without specifying what other action or showing such distinction is shown by the intrinsic record. The applicant unequivocally stated "Specifically'' . .. action is taken only when this number exceeds a threshold value. " Thus, the court recommends construing "act in respect of any particular piece or set of suspect data when the count maintained therefor is substantially equal to or greater than at least one threshold value" to mean: "act in respect of any particular piece or set of suspect data only when the count maintained therefor is substantially equal to or greater than at least one threshold value." Disputed Terms Appearing in the '971 Patent Disputed terms "policies ," and "role" appear in the '971 patent. 11. "policies" / "policy" ('971 patent, claims 12, 17-19) a. b. Fortinet's proposed construction: plain meaning c. 164 BT's proposed construction: "rules that govern choices in behavior" I "a rule that governs a choice in behavior" Court's construction : "rules that govern choices in behavior"/ "a rule that governs a choice in behavior" D.I. 117 at 61 (emphasis in quotation added by BT). 47 Fortinet contends this term does not require construction and should be given its plain meaning. 165 BT argues the patentee acted as his own lexicographer and the court should adopt the definition provided in the patent. 166 The purported definition appears in the following passage of written description: In an automated , distributed approach to management, decision making must be made based on locally available information and according to a set of rules. These rules, which govern choices in the behaviour of the system, are termed policies. Policies allow the users of a system to specify the behavior they want to exhibit. 167 Fortinet asserts no construction is necessary because a jury understands the word "policy" and it is not used differently in the patent. 168 It contends the purported definition BT cites is not a definition of the word "policy"; it is part of a larger description of the function of a "policy. "169 As such , Fortinet maintains this description should not be the basis for the court's construction because mere use of a claim term to describe ° the invention is not a definition. 17 Fortinet also argues BT misinterprets the purportedly non-restrictive clause "rules , which govern choices in the behavior of the system , are 165 0 .1. 117 at 69 . Id. (citing Braintree Labs. , Inc. v. Novel Labs. , Inc. , 749 F.3d 1349, 1356 (Fed. Cir. 2014) ("[T]he patentee's lexicography must govern the claim construction analysis.") ; see also Voice Tech. Group, Inc. v. VMC Systems, Inc., 164 F.3d 605, 613-14 (Fed . Cir. 1999) ("When the meaning of a term as used in a patent is clear, that is the meaning that must be applied in the construction of the claim and in the infringement analysis.")) . 167 '971 patent at 3:33-37 . 168 0.1. 117 at 69. While arguing no construction is necessary, Fortinet suggests "a[n] appropriate plain meaning of 'policy' is 'a high-level overall plan embracing the general goals and acceptable procedures esp. of a governmental body."' Id. (citing 0 .1. 118-1 , Ex. 2 (Merriam-Webster's Collegiate Diet. , 10th Ed . (1999)) atJA-0003085). 16s Id. 170 Id. at 69-70 (citing Janssen Pharmaceutica, NV v. Mylan Pharm. , Inc., No. 15-cv-760 (RGA) , 2017 WL 66342, at *2-3 (D . Del. Jan. 6, 2017) (rejecting argument that a "necessary condition" of a claim term is the same as a definition)). 166 48 termed policies" and re-writes it as "rules, that govern choices in the behavior of the system, are termed policies." 171 Fortinet insists by using the non-restrictive "which" and setting off the clause by commas, the sentence does not purport to define "policy." 172 Fortinet also maintains BT's construction would confuse the jury because it could be interpreted to be at odds with the rest of the claim that specifies a policy must: (1) be "locally stored," and (2) "specify [a] a subject role identifying the components in the system which are expected to respond to a policy, and [b] an action element specifying an action to carried out." 173 The court rejects this criticism. The court does not foresee confusion arising from "rules that govern choices in behavior" also (1) being locally stored , (2) identifying the component that is going to make the choice in behaviour; and (3) specifying an action to carry out. Other than insisting the term does not need to be construed , and the nowrejected confusion argument, Fortinet does not provide intrinsic-evidence-based argument that BT's proposed definition is inappropriate. 174 Moreover, BT's proposed definition, even if not an explicit definition, arises from the patent's written description, as opposed to Fortinet's suggested plain meaning as reflected in an unrelated nontechnical dictionary. 171 Id. at 70. Id. 173 Id. (quoting '971 patent, claim 12). 174 The court notes the Janssen Pharmaceutica found the plaintiffs' proposed construction was not defined in the patent and rejected that proposal. Janssen Pharmaceutica , 2017 WL 66342, at *2. There, defendants' offered their own substantive definition which the court also rejected before arriving on its own definition derived from the written description of the patent in suit and technical dictionaries. Id. at *3. 112 49 Thus, the court recommends construing ""policies"/ "policy" to mean: "rules that govern choices in behavior"/ "a rule that governs a choice in behavior." 12. "role" ('971 patent, claims 12, 17-19) a. BT's proposed construction: "a name for a group (zero or more members) of related members" Or alternatively: "A name for a group (zero or more members) of related members. The members are related in that components that are ultimately associated with a role (per the requirement of the claims) will be managed by the same policy" b. Fortinet's proposed construction: "a name for a group (zero or more members) of network components performing a common function " c. Court's construction: "A name for a group (zero or more members) of related members. The members are related in that components that are ultimately associated with a role (per the requirement of the claims) will be managed by the same policy" Although the patent provides a definition of "role," the parties propose constructions that attempt to further clarify that definition. Independent claim 12 recites : 12. A method of managing a computer network having a plurality of network components ... , said method comprising : registering local network components at each of said agents, identifying and storing at each of said agents one or more roles associated with each component, and obtaining at each of said agents policies relevant to the stored roles of the registered components, wherein each of the policies are locally stored and specify a subject role identifying the components in the system which are expected to respond to a policy and an action element specifying an action to 50 be carried out. 175 The written description provides a definition of "role": The subject element 48 identifies those entities (e.g. components) in the system which are expected to respond to a policy. Identification of these entities is done by role. A role is a name for a group (zero or more members) of related members. This is important so that a policy can refer to entities which are not present or not known at the time of creation if they can subsequently be linked with the role .176 BT indicates it would accept the explicit definition recited in the patent 177 but states "[b]oth BT and Fortinet appear to agree ... that providing an explanation for how the 'members' are related would increase the clarity of the construction. "178 Two are two disputes with regard to that sought-for clarity: (1) whether the members can be anything, including human beings, or whether they are limited to "network components"; and (2) whether the members are related by a "common function. " With respect to the first dispute, Fortinet argues "roles" have to be network components , and there is no support in the patent for the idea that a human can hold a role.179 The patent gives examples of roles: "Every component (e.g . target 154, subject 152) has one or more role I56a,b (e.g. admin, user etc) and one address 158a,b (to locate the component) ." 18° Fortinet contends the roles identified as "admin" and "user" refer to hardware in a network, i.e., network components (e.g. , a router, switch , server, 175 176 177 178 179 180 '971 patent, claim 12. Id. at 4:38-44 . D.I. 117 at 71 , 75 ; Markman Tr. at 90:18-21 . D.I. 117 at 75. Markman Tr. at 82 :22-83:2 . '971 patent at 7:16-18 . 51 etc.) , specifically suggesting an administrator router as an example.181 The court does not agree that the intrinsic record precludes a "role" from being associated with groups of human users. Contrary to Fortinet's suggested "administrative router" as a referenced network component, the written description refers to "[t]he administrator of a router ... will have ultimate control of its configuration, including the permitted extent of control by other users" 182 and explains "[t]he management agent 70 configures and manages these routers 74. The administrator 82 (or other appropriate means) registers the routers 74 ."183 These, and other references to an administrator, each imply an administrator may be a human. 184 It follows that examples of "admin" (and "users") as "roles" in the written description may also be human. 185 181 Markman Tr. at 83:2-25. '971 patent at 4: 6-8 . 183 Id. at 8:24-26. 184 See, e.g. , id. at 1:20-24 ("Distributed systems are a well known phenomenon for large organizations. Such systems consist of a large number of heterogeneous components and the systems and their components provide significant management burdens for system administrators."); id. at 2:45-47 ("The administrator can set extra policies to define how conflict can be detected and resolved, for example for each component of the distributed system."); id. at 5:12-15 ("Policies and events 80 are received by the management agent 70 from the communications medium 78 and can arise either from system events or from actions by an administrator 82 .") ; see also id. at 7:51-54 , 9:3-5 , 9:9-12 , 9:36-40. 185 Although not raised by Fortinet at Markman , or in response to BT's Markman argument on the issue, in briefing on BT's now-abandoned construction that included "members related by behavior," Fortinet cited BT's representation during prosecution distinguishing prior art that "the policies that are mentioned elsewhere in Yates appear to relate to access by human users and perhaps specify which people can access what information" as excluding human users from a role. D.I. 117 at 76 (quoting D.I. 89-1 , Ex. I (Notice of Allowability) at JA-0000708. The prior sentence to that quotation reads: "For example, there is no teaching of the recited policies specifying an action to be carried out by the identified components." Id. , Ex. I at JA-0000708. BT maintains the statement explains the policies need to specify actions to be taken by a component, not 182 52 Relatedly, the court also finds members are not required to be network components , as Fortinet contends. Rather, members are distinct from components. The patent explains "[t]he subject element 48 identifies those entities (e.g. components) in the system which are expected to respond to a policy." 186 "Role" is defined as a "name for a group ... of related members. " 187 "Identification of these entities [e.g., components] is done by role[, i.e., a group of related members]." 188 As BT explained at Markman , the patent uses roles as a way to decide which policies should manage which groups of components but, rather than identifying these groups by components, the inventor used roles "so that a policy can refer to entities [e.g., components] which are not present or not known at the time of creation if they can subsequently be lined with the role." 189 Claim 12 also describes roles as distinct from components: "identifying and storing at each of said agents one or more roles associated with each componenf' ; "obtaining at each of said agents policies relevant to the stored roles of the registered components": "wherein ... a subject role identifying the components in the system which are expected to respond to a policy[.]" 190 Because the court rejects the premise of Fortinet's construction that equates members with network components, it also rejects Fortinet's construction that network a human, and has nothing to do with the proper construction of "role. " 0.1. 117 at 76; Markman Tr. at 93: 16-25. 186 '971 patent at 4:38-40. In briefing, Fortinet confirms components are examples of entities. See 0 .1. 117 at 73 ("[E]ntities (e .g. , components) that share a common 'respon[se] to a policy' all share the same role." (citing '971 patent at 4:3840.)). 187 '971 patent at 4:40-42. 188 Id. at 4:40. 189 Markman Tr. at 92 :4-13 ; '971 patent at 4:42-44. 190 '971 patent, claim 12. 53 components "perform[] a common function." BT's inclusion of "[t]he members are related in that components that are ultimately associated with a role (per the requirement of the claims) will be managed by the same policy" in its proposed construction is consistent with the written description and claims of the patent. Thus, the court recommends construing "role" to mean: "A name for a group (zero or more members) of related members. The members are related in that components that are ultimately associated with a role (per the requirement of the claims) will be managed by the same policy." Disputed Term Appearing in the '971 Patent The only disputed term appearing in the '357 patent is "a message-exchange system including the exchange of group specific tags." 13. "a message-exchange system including the exchange of group specific tags" ('358 patent, claim 26, 50) a. BT's proposed construction: "a system that facilitates agent communications, including the communication of group specific tags" b. Fortinet's proposed construction: "a system for hindering the spread of attacks to agents in other groups using group-specific tags" c. Court's construction: "a system for hindering the spread of attacks to agents in other groups using group-specific tags" This term appears independent method claims 26 and 50: 26. A method providing computer security among a plurality of inter-communicating computers having associated software agents, said method comprising: dividing a plurality of said agents into plural groups, each agent corresponding with other agents in its respective group but not with agents in other groups, a message-exchange system including the 54 exchange of group specific tags[ . . . .] 191 50 . A method comprising computer security for a plurality of inter-communicating software agents together forming a plurality of agent groups, each agent corresponding with other agents in its respective group but not with agents in other groups via a message-exchange system including the exchange of group specific tags, the agents cooperating to perform said method comprising : comparing at each agent actual behavior patterns of an agent's own group with stored expected behavior patterns; and each agent communicating by a message-exchange system in which, when one agent determines that a security threat does or may exist, that agent sends a warning message, including an anomaly pattern indicative of the threat, to other agents in its group. 1 92 BT contends its proposed construction , "facilitating agent communications" (i.e. , the exchange of messages) among agents, reflects the language of the claims and is 93 supported by the patent's figures and written description. 1 It asserts Fortinet's proposed construction overlooks the exchange of messages among agents , and instead focuses on "hindering the spread of attacks to agents." 194 BT argues Fortinet's proposed construction is both contrary to the intrinsic evidence and improper functional claiming. 195 BT contends "including the communication of group specific tags" is clear on its face and requires no construction. 196 Fortinet asserts statements the patentee made during prosecution regarding the 1 '358 patent, claim 26. 91 192 Id., claim 50 . 193 D.I. 117 at 84-85. 194 Id. at 85 . 195 Id. (citing Storage Tech . Corp. v. Cisco Sys. , Inc., 329 F.3d 823 , 832 (Fed . Cir. 2003) (noting that limiting "claim scope based on the purpose of the invention ... is impermissible")). 19s Id. 55 novelty of its tag system hindering attacks from spreading easily are clear disclaimers of claim scope. 197 Fortinet argues BT's functional claiming criticism is unsupported by law, and its construction properly defines the claim in the context of the written description and prosecution history.198 Fortinet also criticizes BT's suggestion that the term be viewed as two discrete parts, "message-exchange system" and "including the communication of group specific tags ," with only the first requiring construction. 199 Fortinet contends both phrases of the claim are inextricably linked and reflect one concept. 200 The entire disputed phrase is purportedly only one message-exchange aspect of the invention , and the written description describes other, distinct, messageexchange aspects of the invention.201 With respect to its disclaimer argument, Fortinet relies on the following prosecution statement by the patentee : The applicant's exemplary embodiment uses clustered sub-groups of agents based on a social tag mechanism-which is believed to be novel when applied in the relevant context as a defense mechanism. That is, if one sub-group is compromised, the attack is hindered from spreading easily to all of the agents in the other sub-groups. . . . Such feature is now found in amended independent claims 1 and 25.202 BT explains the statement distinguishes the invention's use of groups that hinder attack spread , not the tags by themselves. 203 It argues that although groups may be 197 Id. at 86. Id. at 87-88 . 199 Id. at 87. 200 Id. 201 Id. (citing '358 patent at 2:45-48, 2:52-56) . 202 0.1. 89-3 , Ex. J at JA-0001023. 203 0.1. 117 at 89. At Markman , BT stated "including the exchange of groupspecific tags just means the tags are in those messages." Markman Tr. at 96:18-20. 198 56 based on the use of a tag mechanism, this does not justify imposing Fortinet's proposed limitation into the message-exchange system. 204 The court disagrees. The applicant's statement did not distinguish his invention based solely on its use of groups. He unambiguously represented that the invention 's novelty was that it "uses clustered sub-groups of agents based on a social tag mechanism." 205 The applicant explained the novelty of the sub-groups based on tags "applied in the relevant context as a defense mechanism" in the next sentence: "That is, if one sub-group is compromised, the attack is hindered from spreading easily to all of the agents in the other sub-groups." 206 The applicant specified claims 1 and 25 were amended to reflect the described "hindering" feature . The amendment to claim 1 to include the same disputed phrase before the court is shown as follows: 1. (Currently Amended) A computer security system comprising: a plurality of inter-communicating computers including software agents f4-4-} together forming an a plurality of agent group§., the system each agent corresponding with other agents in its respective group but not with agents in other groups via a message-exchange system including the exchange of group specific tags[.] 207 The patentee's prosecution statements, and related amendments , support Fortinet's argument that the entire phrase must be construed, rather than viewed as two distinct parts with only "message-exchange system" being defined . These statements also demonstrate the inapplicability of the Storage Tech. case relied upon by BT. 204 D.I. 117 at 89. D.I. 89-:-3, Ex. J at JA-0001023. 206 Id., Ex. J at JA-0001023. 207 Id., Ex. J at JA-0001012. Claim 25 was also amended without adding the term at issue. As explained below, however, that claim applies to a different messageexchange aspect, one addressed to "an anomaly pattern indicative of the threat." See id., Ex. J at JA-1001016. 205 57 In Storage Tech. , the district court relied on the written description, prosecution history, and extrinsic evidence in the form of a declaration by the defendant's expert witness for a construction that improperly read an additional limitation into the claims. 208 The Federal Circuit stated the district court used extrinsic evidence "to limit claim scope based on the purpose of the invention, which is impermissible."209 Here, the court is considering the patentee's own prosecution statement, i.e., intrinsic evidence, and is not importing an additional , extraneous , limitation . The '358 patent's written description and claims also support Fortinet's argument that the "message-exchange system including the exchange of group specific tags" should be construed as one phrase as it is but one message-exchange aspect of the invention. In one instance, the written description also describes an aspect of the invention using "a message-exchange system in which , as messages pass between a first agent and a second agent, the ability of the first agent to recognize the second as friendly increases." 210 Unasserted claim 24 reflects this aspect reciting : "a message-exchange system in which , as messages pass between a first agent and a second agent, the ability of the first agent to recognize the second as friendly increases. "211 In another instance, "a message-exchange system in which , when one agent determines that a security threat does or may exist, that agent sends a warning message, including an anomaly pattern indicative of the threat, to other agents in the 208 209 21 0 211 Storage Tech ., 326 F.3d at 831 . Id. at 832 (citation omitted) . '358 patent at 2:45-48 . Id. , claim 24 . 58 group" 212 is described . Unasserted claim 25 reflects this same language .213 The disputed term before the court, "a message-exchange system including the exchange of group specific tags ," is described in yet another aspect of the invention as using a system with "each agent corresponding with other agents in its respective group, but not agents in other groups, by a message-exchange system including the exchange of group specific tags. "214 Finally, Fortinet argues the written description further supports inclusion of its proposed "hindering" language. As previously mentioned, inter-agent trading takes place by exchange of tag messages 18. In addition to being a simple mechanism for exchange of information between agents, the message transfers are designed to enhance the process of cohesion and agent identification within the agent group. Via the dynamic interchange of encrypted tags, the agents are able to distinguish between authorised and unauthorised agents.215 This language indicates exchange of tag messages are not simply a vehicle for transmiss ion of information. 216 The written description explains the importance of tag message exchange: Each agent sub-group then interacts only with its local group , as the neighbouring groups (or "cells'? would be culturally separate due to their unique set of encrypted identifying tags. Hence. even if an attack succeeds in penetrating one of the agent's communities and subverts the agent in that group, it would still have to penetrate the remaining cells individually. 217 "Hence ," the result of the described culturally separate agent groups due to their 212 213 214 215 216 217 Id. at 2:52-56. See id.• claim 25. Id. at2:61-64 . Id. at 6:5-12. Markman Tr. at 103:14-23. '358 patent at 6:27-33. 59 group specific tags is that "even if an attack succeeds in penetrating one of the agent's communities and subverts the agent in that group, it would still have to penetrate the remaining cells individually," i.e., the spread of attacks to agents in other groups is hindered. 218 Reading the intrinsic evidence as a whole, including the claims, written description, and prosecution history supports Fortinet's position. Thus, the court recommends construing "a message-exchange system including the exchange of group specific tags" to mean: "a system for hindering the spread of attacks to agents in other groups using group-specific tags." VII. RECOMMENDED DISPOSITION Order: The Court's Claim Construction At Wilmington, this J5_th day of April, 2021, having heard oral argument, having reviewed the papers submitted with the parties' proposed claim constructions, and having considered all of the parties' arguments (whether or not explicitly discussed herein); The court recommends the district court construe the stipulated terms, and the disputed terms, as follows: 218 Markman Tr. at 103: 1-9. 60 Claim Term Court's Construction StiRulated Terms each agent corresponding with other agents in its respective group but not with agents in other groups, via a message-exchange system including the exchange of group specific tags a. "each agent corresponding with other agents in its respective group but not with agents in other groups, a message-exchange system including the exchange of group specific tags" '358 patent claim 26 b. "maintaining and tracking groupwide measures of agent status or behavior comparing actual behavior patterns of the measure for a given group with known normal behavior patterns" maintaining and tracking groupwide measures of agent status or behavior; comparing actual behavior patterns of the measure for a given group with known normal behavior patterns '358 patent claim 26 plain meaning c. "multi-stage analysis" '237 patent claims 2, 6, 22, 23, 27, 31 '641 Patent Claims 2, 6 status data that undergoes negative and positive filtering, but is neither discarded by such negative filtering nor selected by such positive filtering d. "post-filtering residue, wherein the postfiltering residue is data neither discarded nor selected by filtering" / "post-filtering residue, wherein the post-filtering residue is neither discarded nor selected by the filtering" '237 patent claims 1, 18, 26 '641 Patent Claims 1, 18 software programs that can make determinations to act e. "agents" '971 Patent Claims 12, 17-19 '358 Patent Claims 26 , 35, 50 61 Claim Term Court's Construction plain meaning f. "group specific tags" '358 Patent Claim 26 , 50 Dis~uted Terms 1. "status data" data extracted from or generated about the traffic or system processing it that is informative as to the status of the network and its components '237 patent claims 1, 2, 6, 10, 14, 16, 18, 22-27 , 31 , 35 , 41 '641 patent claims 1, 2, 6, 10, 14, 16 2. "dynamically" during actual operation , rather than offline '237 patent claims 1, 2, 6, 10, 14, 16, 18, 22-27, 31 , 35, 39 , 41 '641 patent claims 1, 2, 6, 10, 14, 16 3. "probe" a probe is a discrete component that collects data from one or more network components to which it is attached , filters or otherwise analyzes the data that has been collected , transmits noteworthy information, and receives feedback in order to update its capabilities of analysis '237 patent claims 1, 6, 10, 14, 18, 2226 , 31 , 35 , 39; '641 patent claims 1, 6, 10, 14 4. "information received about an identified potentially security-related event occurring on the network, wherein the potentially security-related event is identified by filtering followed by an analysis of post-filtering residue" information received from a probe about an identified potentially security-related event occurring on the network, wherein the potentially security-related event is identified at the probe by filtering status data followed by an analysis of post-filtering residue '641 patent claim 18 information about a customer 5. "customer information" '641 patent cla im 18 62 Claim Term 6. "problem ticket" '641 patent claims 18, 19 7. "a group of user computers"/ "group" '845 patent claims 1, 3, 9, 19, 20 , 21, 23 8. "suspect data"/ "a suspect data, wherein the suspect data is identified by the user computer as a possible security threat by the user computer" / "a piece or set of suspect data identified by one or more of the group of user computers as a possible security threat" Court's Construction a consolidation of the event record, correlated customer information and symptom record, and linked problem resolution assistance information the user computers that the network architecture allows to communicate directly or through a server to which the user computers are connected data identified by one or more user computers, such computer(s) having concluded without aid from centralized analysis that the data indicates a possible security threat '845 Patent Claims 1, 3, 9, 19, 20, 21, and 23 9. "an identifier of the piece or set of suspected data" a substantially unique descriptor for a particular piece or set of suspect data other than the data itself '845 Patent Claims 1, 3, 9, and 19 10. "act in respect of any particular piece or set of suspect data when the count maintained therefor is substantially equal to or greater than at least one threshold value" act in respect of any particular piece or set of suspect data only when the count maintained therefor is substantially equal to or greater than at least one threshold value '845 Patent Claims 1, 19 rules that govern choices in behavior/ a rule that governs a choice in behavior 11. "policies" / "policy" '971 Patent Claims 12, 17-19 63 Court's Construction Claim Term 12. "role" '971 Patent Claims 12, 17-19 13. "a message-exchange system including the exchange of group specific tags" A name for a group (zero or more members) of related members. The members are related in that components that are ultimately associated with a role (per the requirement of the claims) will be managed by the same policy a system for hindering the spread of attacks to agents in other groups using group-specific tags '358 Patent Claim 26 , 50 Pursuant to 28 U.S.C. § 636(b)(1)(B) and (C) , FED. R. CIV. P. 72 (b), and D. DEL. LR 72 .1, any objections to this Report and Recommendation shall be filed within fourteen (14) days limited to ten (10) pages after being served with the same. Any response shall be limited to ten (10) pages and filed within fourteen (14) days thereafte r. The parties are directed to the Court's Standing Order in Non-Pro Se Matters for Objections Filed under FED. R. CIv. P. 72 dated October 9, 2013 , a copy of which is found on the Court's website (www.ded.uscourts.gov.) Isl Mary Pat Thynge CHIEF U.S. MAGISTRATE JUDGE 64

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?