Secure Axcess L.L.C. v. HP Enterprise Services, LLC
Filing
107
MEMORANDUM OPINION AND ORDER. The Court ADOPTS the claim constructions as set forth in this Order. Signed by Magistrate Judge K. Nicole Mitchell on 11/07/16. (mll, )
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
TYLER DIVISION
SECURE AXCESS LLC,
Plaintiff,
v.
HP ENTERPRISE SERVICES, LLC,
Defendant.
§
§
§
§
§
§
§
§
§
§
§
CASE NO. 6:15-CV-208-RWS-KNM
MEMORANDUM OPINION AND ORDER
This Memorandum Opinion construes the disputed claim terms in United States Patent
Nos. 6,172,990 (“the ’990 Patent”) and 6,108,713 (“the ’713 Patent”), asserted in this suit by
Plaintiff Secure Axcess LLC. On July 21, 2016, the parties presented oral arguments on the
disputed claim terms at a Markman hearing. Based on the analysis stated herein, the court
resolves the parties’ claim construction disputes and ADOPTS the constructions set forth below.
BACKGROUND
Plaintiff Secure Axcess LLC (“Secure Axcess”) alleges that HP Enterprise Services,
LLC’s (“HP”) network switches and controllers infringe the two asserted patents. The patentsin-suit generally relate to programmable network components.
APPLICABLE LAW
Claim Construction
“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention
to which the patentee is entitled the right to exclude.’” Phillips v. AWH Corp., 415 F.3d 1303,
1312 (Fed. Cir. 2005) (en banc) (quoting Innova/Pure Water Inc. v. Safari Water Filtration Sys.,
1
Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). The Court examines a patent’s intrinsic evidence to
define the patented invention’s scope. Id. at 1313–1314; Bell Atl. Network Servs., Inc. v. Covad
Commc’ns Group, Inc., 262 F.3d 1258, 1267 (Fed. Cir. 2001). Intrinsic evidence includes the
claims, the rest of the specification, and the prosecution history. Phillips, 415 F.3d at 1312–13;
Bell Atl. Network Servs., 262 F.3d at 1267. The Court gives claim terms their ordinary and
customary meaning as understood by one of ordinary skill in the art at the time of the invention.
Phillips, 415 F.3d at 1312–13; Alloc, Inc. v. Int’l Trade Comm’n, 342 F.3d 1361, 1368 (Fed. Cir.
2003).
Claim language guides the Court’s construction of claim terms. Phillips, 415 F.3d at
1314. “[T]he context in which a term is used in the asserted claim can be highly instructive.” Id.
Other claims, asserted and un-asserted, can provide additional instruction because “terms are
normally used consistently throughout the patent.” Id. Differences among claims, such as
additional limitations in dependent claims, can provide further guidance. Id.
“[C]laims ‘must be read in view of the specification, of which they are a part.’” Id.
(quoting Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995), aff’d, 517
U.S. 370, 116 S.Ct. 1384, 134 Led.2d 577 (1996)). “[T]he specification ‘is always highly
relevant to the claim construction analysis. Usually, it is dispositive; it is the single best guide to
the meaning of a disputed term.’” Id. (quoting Vitronics Corp. v. Conceptronic, Inc., 90 F.3d
1576, 1582 (Fed. Cir. 1996)); see also Teleflex, Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1325
(Fed. Cir. 2002).
In the specification, a patentee may define his own terms, give a claim term a different
meaning than the term would otherwise possess, or disclaim or disavow the claim scope.
Phillips, 415 F.3d at 1316. Although the Court generally presumes that terms possess their
2
ordinary meaning, this presumption can be overcome by statements of clear disclaimer. See
SciMed Life Sys., Inc. v. Advanced Cardiovascular Sys., Inc., 242 F.3d 1337, 1343-44 (Fed. Cir.
2001). This presumption does not arise when the patentee acts as his own lexicographer. See
Irdeto Access, Inc. v. EchoStar Satellite Corp., 383 F.3d 1295, 1301 (Fed. Cir. 2004).
The specification may also resolve ambiguous claim terms “where the ordinary and
accustomed meaning of the words used in the claims lack sufficient clarity to permit the scope of
the claim to be ascertained from the words alone.” Teleflex, Inc., 299 F.3d at 1325. For
example, “[a] claim interpretation that excludes a preferred embodiment from the scope of the
claim ‘is rarely, if ever, correct.” Globetrotter Software, Inc. v. Elam Computer Group Inc., 362
F.3d 1367, 1381 (Fed. Cir. 2004) (quoting Vitronics Corp., 90 F.3d at 1583). But, “[a]lthough
the specification may aid the court in interpreting the meaning of disputed language in the
claims, particular embodiments and examples appearing in the specification will not generally be
read into the claims.” Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560, 1571 (Fed. Cir.
1988); see also Phillips, 415 F.3d at 1323.
The prosecution history is another tool to supply the proper context for claim
construction because a patentee may define a term during prosecution of the patent. Home
Diagnostics Inc. v. LifeScan, Inc., 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
specification, a patent applicant may define a term in prosecuting a patent”).
The well-
established doctrine of prosecution disclaimer “preclud[es] patentees from recapturing through
claim interpretation specific meanings disclaimed during prosecution.” Omega Eng’g Inc. v.
Raytek Corp., 334 F.3d 1314, 1323 (Fed. Cir. 2003).
The prosecution history must show that the patentee clearly and unambiguously
disclaimed or disavowed the proposed interpretation during prosecution to obtain claim
3
allowance. Middleton Inc. v. 3M Co., 311 F.3d 1384, 1388 (Fed. Cir. 2002); see also Springs
Window Fashions LP v. Novo Indus., L.P., 323 F.3d 989, 994 (Fed. Cir. 2003) (“The disclaimer .
. . must be effected with ‘reasonable clarity and deliberateness.’”) (citations omitted). “Indeed,
by distinguishing the claimed invention over the prior art, an applicant is indicating what the
claims do not cover.” Spectrum Int’l v. Sterilite Corp., 164 F.3d 1372, 1378–79 (Fed. Cir. 1988)
(quotation omitted).
“As a basic principle of claim interpretation, prosecution disclaimer
promotes the public notice function of the intrinsic evidence and protects the public’s reliance on
definitive statements made during prosecution.” Omega Eng’g, Inc., 334 F.3d at 1324.
Although “less significant than the intrinsic record in determining the legally operative
meaning of claim language,” the Court may rely on extrinsic evidence to “shed useful light on
the relevant art.” Phillips, 415 F.3d at 1317 (quotation omitted). Technical dictionaries and
treatises may help a court understand the underlying technology and the manner in which one
skilled in the art might use claim terms, but such sources may also provide overly broad
definitions or may not be indicative of how the term is used in the patent. Id. at 1318. Similarly,
expert testimony may aid the Court in determining the particular meaning of a term in the
pertinent field, but “conclusory, unsupported assertions by experts as to the definition of a claim
term are not useful.” Id. Generally, extrinsic evidence is “less reliable than the patent and its
prosecution history in determining how to read claim terms.” Id.
ANALYSIS
I.
Agreed Terms
The parties have submitted the following agreements (Doc. No. 85, Ex. A):
Term
Agreed Construction
“a network layer” (’990 Patent)
“a layer responsible for routing data
between nodes in a network, and for
4
initiating, maintaining and terminating a
communication link between users
connected to the nodes”
“a transport layer” (’990 Patent)
“a layer responsible for performing data
transfers within a particular level of service
quality”
“a presentation layer” (’990 Patent)
“a layer responsible for translating, converting,
compressing and decompressing
data being transmitted across a medium”
“an application layer” (’990 Patent)
“a layer that provides users with suitable
interfaces for accessing and connecting
to a network”
In light of the parties’ agreements on the proper construction of these terms, the Court
hereby ADOPTS these constructions.
II.
Disputed Terms in the ʼ990 Patent1
The ’990 Patent, titled “Media Access Control Micro-RISC Stream Processor and
Method for Implementing the Same,” was filed on November 12, 1997, and issued on January 9,
2001. The Abstract states:
Disclosed are methods and apparatus for processing packet data received from a
physical layer. The processing is performed in-line while streaming packets to an
upper layer. The method includes loading an instruction set for custom
programming the processing of packet data received from the physical layer.
Determining a type of packet data received from the physical layer. Identifying a
first word location in the packet data based on the contents of the instruction set.
Examining the packet data received from the physical layer at the first identified
word location. The method further includes storing an element indicative of
information contained in the first identified word location into a data structure,
and appending the data structure to the packet data before the packet is streamed
to the upper layer. The methods and apparatus also have direct applicability to
reducing a CPU’s work load during transmissions of data over a network.
1
HP originally requested leave to file a Motion for Summary Judgment of Indefiniteness as to the terms “data part”
and “packet parts data structure.” Doc. No. 88. The Court granted this request. Doc. No. 93. However, HP did not
file a Motion for Summary Judgment and did not brief the indefiniteness issues.
5
a.
“performed…in line” (Claim 13)
Plaintiff’s Proposed Construction
Plain and ordinary meaning.
No construction necessary.
Defendant’s Proposed Construction
“performed…on-the-fly at line rate without
slowing down data transfer rates”
The phrase “performed . . . in-line” appears in the preamble of claims 1 and 13.2
“Whether a preamble should be treated as a claim limitation is determined on the facts of each
case in light of the claim as a whole and the invention described in the patent.” Storage Tech.
Corp. v. Cisco Sys., Inc., 329 F.3d 823, 832 (Fed. Cir. 2003). The preamble is limiting in claims
1 and 13 because the specification emphasizes that processing “in-line while streaming packets
to an upper layer” is a key benefit of the invention. See, e.g., ’990 Patent at 11:21-26 (“It is
important to realize that packet data processing occurring in micro-RISC stream processor 114b
rapidly generates the user defined data structures in an in-line manner (i.e., without slowing
down data transfer rates) to advantageously append the defined data structures to the packets
being streamed to upper layers.”); id. at 6:21-25 (“Also disclosed are methods for user
programmable in-line processing (e.g., parsing) of receive and transmit packet data while
performing high speed streaming of packet data in or out of the media access control layer.”)
(emphasis added).
The prosecution history similarly supports the conclusion that the preamble is limiting. In
distinguishing a prior art reference (Frantz), the patentee argued that “Frantz fails to teach or
suggest performing such processing while packets are being streamed through the processor.”
Doc. No. 94, Ex. A at 3 (emphasis in original). The reference to “such processing” was the
recited limitation of “performed in-line while packet data is being streamed through the
2
The term “in-line” also appears in the body of claim 13.
6
processor.” Similarly, in distinguishing a different prior art reference (Marshall), the patentee
explained that “Marshall fails to teach or suggest performing such processing while packets are
being streamed to the physical media.” Doc. No. 94, Ex. B at 3 (emphasis in original). Again,
the reference to “such processing” was the recited limitation of “performed in-line while packet
data is being streamed to the physical media.”
Here, the reference to “such processing while packets are being streamed” shows the
patentee’s reliance on the preamble element to distinguish the invention over the prior art. See
Storage Tech, 329 F.3d at 835 (finding the preamble limiting because the applicants relied upon
the preamble element in distinguishing the invention over the prior art).
The crux of the parties’ remaining dispute is whether the term “in-line” requires two
limitations which HP seeks to impose: (1) processing on-the-fly at line rate; and (2) processing
without slowing down data transfer rates. The portion of the specification that HP cites to for
support of the “on-the-fly at line rate” limitation does not include the disputed term “in-line.”
See Id. at 4:59-63. Likewise, that portion of the specification is not a clear and unambiguous
statement defining the term “in-line,” because it refers to two processors: a “micro-risc
processor” and a “host CPU.” Id. at 4:49-63. Furthermore, “on-the-fly at line rate” is another
technical term that will not add clarity. Thus, HP’s “on-the-fly at line rate” limitation is rejected.
However, HP’s “without slowing down data transfer rates” limitation finds support in the
specification. The specification explicitly states “in an in-line manner (i.e. without slowing down
data transfer rates).” Id. at 11:23–24 (emphasis added). The Federal Circuit has found that
“i.e.” defines the meaning of a term. Abbot Labs v. Novopharm Ltd., 323 F.3d 1324, 1330 (Fed.
Cir. 2003); see also Tidel Engineering L.P. v. Fire King Intern., Inc., 613 F. Supp. 2d 823, 829
(E.D. Tex. Jan. 6, 2009).
Furthermore, in describing the problems with the prior art, the
7
specification states “[b]y way of example, when Ethernet network speeds are accelerated to
gigabit levels, the host CPU will generally be required to spend more time processing packet data
and less time performing other CPU processing tasks. As a result, the host CPU will tend to
experience many more processing interrupts which may hamper packet transmission and
receiving operations.” ‘990 Patent at 3:16-21.
The specification further states that “there is a need for methods and apparatuses for
media access control layer processing that is well suited to increase transmit and receive packet
processing rates while reducing a host CPU’s processing burden.”
Id. at 3:55-58.
The
specification also repeatedly states that the CPU is no longer required to “laboriously”
scan/analyze each packet, which results in fewer CPU interrupts. Id. at 16:2-11; 20:19-24;
20:40-43; 21:21-29; 21:1-10.
Similarly, the specification states that “[t]he methods and
apparatus also have direct applicability to reducing a CPU’s work load during transmissions of
data over a network.” Id. at Abstract. Given the identified problems of CPU interrupts and CPU
processing burden, a person of ordinary skill in the art would understand “performed…in-line” to
mean “performed . . . without slowing down data transfer rates.”
Secure Axcess argues that no construction is necessary and that the plain and ordinary
meaning “simply denoted a piece-by-piece analysis, such as parsing.” Doc. No. 92 at 5; ʼ990
Patent at 6:21-25. The specification does not use the phrase “piece-by-piece,” and the phrase
does not add clarity. Moreover, the specification states that the micro-RISC processor can
perform more than “parsing.” ʼ990 Patent at 7:63-67 (“Once network flow managing FIFO Tx
controller 110 performs any requested processing based on received control information, microRISC stream processor 114a is suited to performs various user programmable packet
processing, parsing, filtering and encapsulation operations.”) (emphasis added). Because the
8
“in-line” feature was described as an important advantage over the prior art, the plain and
ordinary meaning will likely not resolve the dispute. Furthermore, “in-line” is a coined phrase in
this context and does not have a general meaning, further supporting that construction is
necessary.
Therefore, the Court construes the term “performed…in-line” to mean “performed . . .
without slowing down data transfer rates.”
b. “an instruction set for custom programming” / “instruction set” (Claims
1, 2, and 5)
Plaintiff’s Proposed Construction
Plain and ordinary meaning.
No construction necessary.
Defendant’s Proposed Construction
“a completely customizable and
configurable user defined software
parameters [for]”
The crux of the parties’ dispute is whether the term “instruction set” is limited to “a
completely customizable and configurable user defined software parameters.” HP believes the
term is so limited, while Secure Axcess opposes this limitation. Doc. No. 92 at 7; Doc. No. 94 at
9. Secure Axcess contends that “an instruction set is simply a set of machine instructions that a
processor recognizes and can execute.” Doc. No. 92 at 7 (citing Declaration of Christian Hurt
(“Hurt Decl.”), Ex. A (1997 Microsoft Press Computer Dictionary 3d.), at 254; id. at Ex. B (1997
Novell’s Dictionary of Networking), at 279).
This dictionary definition provides a starting point for the construction of “instruction
set.” However, if the processor can execute the instructions, then the processor necessarily
recognizes the instructions as well, thus making it redundant to include the term “recognizes” in
the construction. Indeed, the Novell’s Dictionary of Networking defines “instruction set” as “[a]
set of machine language instructions that a processor executes.” Doc. No. 92 at 7 (citing
Declaration of Christian Hurt (“Hurt Decl.”), Ex. B (1997 Novell’s Dictionary of Networking),
9
at 279). Therefore, the starting definition for this term is a “set of machine instructions that a
processor can execute.” The issue is whether further limitations should be imposed.
HP seeks to impose two limitations on this term: (1) that it is “completely customizable
and configurable” and (2) that it is “user defined.” Secure Axcess argues that the claims do not
require these limitations, but rather merely require the instruction set to perform an operation:
“custom programming the processing of packet data.”
Doc. No. 92 at 7.
Secure Axcess
contends that HP’s limitations only relate to features of embodiments of the invention, not to
statements that define the invention. Doc. No. 92 at 8.
As to the first limitation, the claims do not require the instruction set to include
“completely customizable and configurable” software parameters.
HP has not pointed to
evidence supporting this language. Indeed, during the claim construction hearing, HP agreed to
drop this limitation from its proposed construction.
As to the second limitation, the claims do require the instruction set to be “user defined.”
The specification repeatedly states that the instruction set is user defined or user programmed.
For example, the specification states that “the user may configure a software instruction set
designating the type of parsing to be performed on in-coming packet data, as well as the type of
data structure to build and append to respective packets through the use of a graphical user
interface (GUI).” ’990 Patent at 11:13–17 (emphasis added). Referring to Figure 3A, the
specification states that “because a user is able to program the type of processing to be
performed in micro-RISC stream processor 114b, the user is preferably directed to define a
software instruction set identifying the type of data structure to build, as well as the content of
the data structures.
10
To achieve this, the user preferably implements a graphical user interface (GUI) 300 that
provides a list of choices for ease of programming.” Id. at 12:34–40 (emphasis added).3 Thus,
the term “instruction set” must be “user defined” when read in the context of the specification.
Secure Axcess’s argument opposing this limitation is divorced from the specification because it
removes the user from defining the instruction.
Bell Commc’ns Research, Inc. v. Vitalink
Commc’ns Corp., 55 F.3d 615, 621 (Fed. Cir. 1995) (“[I]t is legal error to construe a claim by
considering it in isolation. A claim must be read in view of the specification of which it is a
part”).
Therefore, the Court construes the term “an instruction set for custom programming” /
“instruction set” to mean “user defined set of machine instructions that a processor can
execute.”
c.
“data structure” (Claims 1, 3, 5, 6, 13, 15, and 19)
Plaintiff’s Proposed Construction
Plain and ordinary meaning.
No construction necessary.
Defendant’s Proposed Construction
“a plurality of fully configurable user
defined fields”
The parties dispute whether the term “data structure” is limited to “a plurality of fully
configurable user defined fields.” Secure Axcess argues that the plain and ordinary meaning of a
“data structure” is simply a way of organizing data in a computer. Doc. No. 92 at 12 (citing Hurt
Decl., Exh. A, at 133 (1997 Microsoft Press Computer Dictionary 3d.)). HP believes the term
3
Additionally, referring to Figure 4A, the specification states that “[t]he method begins at a step 402 where a user
defined software instruction set is loaded into micro-RISC stream processor 114b for programming the processing
performed on packet data being received from SUPERMAC controller Rx 120.” Id. at 16:15-17 (emphasis added);
see also id. at 15:50-53 (“However, if the user wants to modify the processing set in the software instruction set
input through GUI 300 of FIG. 3A, the received packets will be processed in accordance with those new
parameters.”) (emphasis added); id. at 15:57-59 (“Accordingly, micro-RISC stream processor 114b will operate on
different packets in accordance with the specific microcode programmed by the user.”); id. at 18:17-21 (“After the
user programs in the type of data structure format and the desired positions of interest for the received packets in
step 420, the method will proceed to a step 422 where the desired instruction set programmed by the user is
compiled to create compiled microcode.”).
11
should be limited when viewed in light of the specification. Doc. No. 94 at 14.
Secure Axcess is correct that claim 6 indicates that “data structures” may include “pointer
data structures,” “flag data structures,” and “field data structures,” among others. Doc. No. 92 at
9. Secure Axcess is also correct that the claims do not literally limit the data structures to “a
plurality of . . . fields,” because claim 18 recites a “flag data structure,” which may be a single bit
(i.e., one field). ’990 Patent at 27:4-6. Thus, HP’s construction should be rejected because it
requires a “plurality of fully configurable user defined fields,” while the intrinsic evidence
merely requires at least one field.
In describing a “field data structure” embodiment, the specification states that “the field
data structure constructed for a packet F may be any number of user defined bit field
combinations.” ’990 Patent at 20:60-62. The language HP points to is in the context of the
“field data structure” or multi-bit fields disclosed in Figure 7A and 7B. This is just one type of
“data structure” disclosed in the specification. Moreover, the words “fully configurable” do not
appear in the intrinsic evidence. Thus, HP has not shown adequate support for these limitations.
However, the “field” in the term “data structure” must be user defined. Secure Axcess
concedes that the specification discloses customizable and user-defined data structures, but
argues that it does so only in connection with embodiments and is thus insufficient to limit the
term “data structure” to that one type of data structure. Doc. No. 92 at 10. As with the term
“instruction set,” previously discussed, this argument is divorced from the specification because
it removes the requirement of a “user defined” data structure. Bell Commc’ns Research, Inc., 55
F.3d at 621. The specification repeatedly states that the data structure is user defined or user
programmed. For example, in describing a “pointer data structure” the specification states “[a]s
shown in FIG. 5A, a user may program a data structure for a packet A to include a pointer to the
12
start of an IP header, a pointer to the start of a TCP header, a pointer to the start of an SMTP
header, a pointer to the start of an application header and a data portion.” ’990 Patent at 19:6267 (emphasis added).
Likewise, in describing a “hashed data segment” the specification states that “[i]n still
another example, FIG. 5D shows a data structure for a packet D that may be programmed to
include only hashed data.” Id. at 20:11-13 (emphasis added).4 The specification also states that
“[o]ne particular advantage of the present invention is that host CPU interrupts are minimized
because each transferred packet is pre-processed by a micro-rise processor that is programmed to
build and appended custom data structures to each transferred packet.” Id. at 4:49-53 (emphasis
added). The specification further states that “[a]gain, by having the data structure composed of
a plurality of user defined fields, the host CPU is freed from having to scan and search the entire
packet to locate the desired information, which may be distributed throughout the packet.” Id. at
21:2-6 (emphasis added).
Therefore, the Court construes the term “data structure” to mean “at least one user
defined field.”
d. “packet data segment data structure” (Claim 6)
Plaintiff’s Proposed Construction
Plain and ordinary meaning.
No construction necessary.
Defendant’s Proposed Construction
“a portion of packet data stored as a
plurality of fully configurable user defined
fields”
4
Additionally, in describing a “flag data structure”, the specification states “FIG. 6A shows a data structure for a
packet F which has been programmed by a user to include a plurality of flags in accordance with one embodiment
of the present invention.” Id. at 20:25-27 (emphasis added). Likewise, in describing a “field data structure” the
specification states “FIGS. 7 A and 7B show yet another type of data structure that may be defined by the user in
accordance with one embodiment of the present invention. In this example, the data structure may include a
plurality of bits grouped into multi-bit fields as shown in FIG. 7A.” Id. at 20:50-54 (emphasis added). Finally, the
specification states “[a]s shown, packet 802 is streamed out of micro-RISC stream processor 114b, including an
appended index 804 which represents the user defined data structure having either pointers, data, hash data, or a
combination thereof.” Id. at 21:37-41 (emphasis added).
13
The only dispute is the construction of the “data structure” portion of this term. The
arguments pertaining to the construction of “data structure” have already been addressed in the
preceding section, and the parties agree that “data structure” should have the same meaning in
this phrase. Doc. No. 92 at 12; Doc. No. 94 at 17. Thus, the Court will not separately construe
“data structure” in this term. The parties also agree that the “packet data segment” portion of the
term should be construed as “a portion of packet data stored as a data structure.” Doc. No. 92 at
12; Doc. No. 94 at 17.
Therefore, the Court construes the term “packet data segment data structure” to mean
“a portion of packet data stored as a data structure.”
e.
“hashed data segment data structure” (Claim 6)
Plaintiff’s Proposed Construction
Plain and ordinary meaning.
No construction necessary.
Defendant’s Proposed Construction
“a portion of compressed packet data
stored as a plurality of fully configurable
user defined fields”
This disputed term also includes the term “data structure,” which has been construed
above. The parties offer no new arguments for the construction of the “data structure” portion of
this term, and they agree that “data structure” should have the same meaning in this phrase. Doc.
No. 92 at 12; Doc. No. 94 at 17. The remaining dispute is whether “hashed data” is limited to “a
portion of compressed packet data.” Both parties agree that compressed data is stored in the
“hashed data segment data structure,” but HP argues that the compressed data is limited to packet
data. Doc. No. 94 at 17-18. Secure Axcess argues that the claims do not necessarily limit
compressed data to packet data, as opposed to including other types of data. Doc. No. 92 at 12.
Secure Axcess argues that the claims recite both a “hashed data segment data structure”
14
(claim 6) and a “hashed packet parts data structure” (claim 17). Id. at 12-13. Because of this
difference, Secure Axcess concludes that the “hashed data segment data structure” is not limited
to one that stores packet data.
Id. at 13.
HP does not substantively address this claim
differentiation argument. The claims indicate that the “hashed data segment data structure” is
not limited to one that stores “packet” data. Tandon Corp. v. U.S. Int’l Trade Comm’n, 831 F.2d
1017, 1023 (Fed. Cir. 1987) (“There is presumed to be a difference in meaning and scope when
different words or phrases are used in separate claims”).
The specification also discloses both compressed data and compressed packet data as
constituting hashed data. See, e.g., ’990 Patent at 11:30-36 (“This is because the user defined
data structure may be programmed to store pointers to portions within the packet data that may
be of interest to upper layer protocols, or portions of data (hashed or compressed data) that may
be quickly read and processed without having to spend CPU bandwidth to scan and process the
entire packet.”) (emphasis added); id. at 14:33-40 (“In another example, if the user desires to
construct a data structure that includes hashed data (i.e., compressed packet data . . . . ”)
(emphasis added); id. at 17:62-67 (“As described above, in a preferred embodiment, the user will
preferably program in the desired type of data structure which may be, for example, a pointer
data structure, a data structure having portions of packet data, a data structure having hashed
data (i.e., compressed), or a combination thereof.”) (emphasis added); id. at 20:11-15 (“In still
another example, FIG. 5D shows a data structure for a packet D that may be programmed to
include only hashed data. As is well known in the art, hashed data refers to compression
data…”) (emphasis added).
Here, the claims and the specification disclose both compressed data and compressed
packet data as constituting hashed data. Thus, hashed data should not be limited to compressed
15
“packet” data.
Therefore, the Court construes the term “hashed data segment data structure” to mean
“a portion of compressed data stored as a data structure.”
III.
Disputed Terms in the ʼ713 Patent
The ’713 Patent, titled “Media Access Control Architectures and Network Management
Systems,” was filed on April 24, 1997, and issued on August 22, 2000. The Abstract states:
Disclosed is a media access controller for transferring data along a computer
network. The media access controller includes a transmit media access controller
that is configured to process out-going packet data received from an upper layer
for transmission to a physical layer. A receive media access controller that is
configured to process in-coming packet data received from the physical layer for
transmission to the upper layer. A transmit multi-packet queue FIFO for receiving
the out-going packet data from the upper layer before being passed to the transmit
media access controller. A receive multi-packet queue FIFO for receiving the incoming packet data that is received by the receive media access controller. The
media access controller further including a media access controller manager
interfacing with the transmit and receive media access controllers. The media
access controller manager being responsible for managing the flow of packet data
through the transmit and receive mum packet queue FIFOs.
a. “a parallel event processor” (Claims 2, 3, 4, 24, and 25)
Plaintiff’s Proposed Construction
Plain and ordinary meaning.
Not construction necessary.
Alternatively, “a processor capable of
processing parallel events”
Defendant’s Proposed Construction
“a processor containing at least a packet
buffer, command and status registers,
statistical counters, programmable
counters, and a micro-RISC processor”
The dispute is whether the recited “parallel event processor” requires all of the circuit
elements depicted in the parallel event processor disclosed in Figure 2. Secure Axcess argues
that the plain and ordinary meaning of “a parallel event processor” is “a processor capable of
processing parallel events.” Doc. No. 92 at 13. Secure Axcess contends that HP’s construction
seeks to improperly limit the claims to an embodiment. Id. at 15. HP argues that the ’713 Patent
16
provides only one disclosure for the components of the parallel event processor, and therefore
the claims should be limited to that one embodiment. Doc. No. 94 at 20-21; ’713 Patent at
12:20–43.
The independent claims do not recite the circuit components included in HP’s
construction. Instead, a number of these circuit elements are recited as separate limitations in
dependent claims. See e.g., ’713 Patent at dependent claim 3 (reciting “a packet buffer”);
dependent claim 8 (reciting “statistical counters”); dependent claim 4 (reciting “programmable
counters”); dependent claim 6 (reciting “a micro-RISC processor”). Moreover, Figure 2 (and its
description) does not contain the definitional language required to limit the claimed parallel
event processor, as HP contends. Instead, the specification indicates that those components are
an exemplary embodiment. ’713 Patent at 5:65-67 (“FIG. 2 is an architectural diagram of a flow
based media access controller (MAC) in accordance with one embodiment of the present
invention.”).
The Federal Circuit has “expressly rejected the contention that if a patent describes only a
single embodiment, the claims of the patent must be construed as being limited to that
embodiment.” Info-Hold, Inc. v. Applied Media Techs. Corp., 783 F.3d 1262, 1267 (Fed. Cir.
2015) (quoting Liebel-Flarsherim Co. v. Medrad, Inc., 358 F.3d 898, 906 (Fed. Cir. 2004)
(citations and quotations omitted)); TomTom, Inc. v. Adolph, 790 F.3d 1315, 1328 (Fed. Cir.
2015) (“[T]his court has repeatedly cautioned against importing limitations from an embodiment
into the claims.”) (collecting cases).
Moreover, the specification does not require all of the proposed circuit elements to be
included in the embodiment illustrated in Figure 2. ’713 Patent at 10:66-11:2 (stating that the
micro-RISC processor is only “preferably contained within a parallel event processor (PEP)
17
124”) (emphasis added). The recited “parallel event processor” may include the circuit elements
included in Defendant’s construction, but does not necessarily need to require them.
Therefore, the Court construes the term “a parallel event processor” to mean “a
processor that may include a packet buffer, command and status registers, statistical
counters, programmable counters, and a micro-RISC processor.”
b. “internal stream processor” (Claim 5)
Plaintiff’s Proposed Construction
Plain and ordinary meaning.
No construction necessary.
Defendant’s Proposed Construction
“internal micro-RISC stream processor
operating in an in-line manner for
modifying data stream characteristics”
Alternatively, “a processor capable of
processing packet data transferred between
a controller and a multi-queue device”
There are two disputes as to this term: whether the recited “internal stream processor” (1)
is limited to a “micro-RISC” processor; and (2) must operate in “an in-line manner.” The
intrinsic evidence does not limit the “internal stream processor” to a “micro-RISC” processor.
Claim 5 does not require a micro-RISC-based processor, and the specification does not disclaim
non-RISC-based systems or define the claims as limited to RISC-based systems. The patentee
knew how to claim a RISC-based system, but declined to do so in claim 55. More importantly,
during prosecution, the patentee explicitly stated that “some of the claim terms have been
broadened” by replacing the term “micro-RISC stream processor” with the term “stream
processor.” Doc No. 94, Ex. 4 at 7 (Response to Non-Final Rejection, at 6). Thus, the “internal
stream processor” is not limited to a “micro-RISC” processor.
The “internal stream processor” must operate in an “in-line” manner, however, “in-line”
5
Compare claim 5 (reciting a “first internal stream processor” with no RISC-based components) with claim 6 (claim
a “first internal micro-RISC stream processor” that interacts with another RISC-based processor).
18
must be construed to clarify the term for the jury. The ’713 Patent expands on the meaning of
“in-line” by providing examples and discussing the deficiencies in the prior art.
The
specification states that “there is a need for methods and apparatuses for media access control
(MAC) layer processing that will allow for in-line packet-by packet processing of data
information and control information to modify a packet’s characteristics while it is being
processed for transmission or reception.”
’713 Patent at 4:44–49 (emphasis added).
The
specification further states that “[b]roadly speaking, the present invention fills these needs by
providing methods and apparatuses for a high speed media access controller used to process
packet data and control information in an in-line packet-by packet manner.” Id. at 4:56–59
(emphasis added).
The specification also states that “[a]n invention is described for a high speed Ethernet
media access control layer integrated circuit core and method for processing packet data in an inline packet-by-packet manner that allows simultaneous processing of data information and
associated control signals.” Id. at 7:38-42 (emphasis added). Thus, “in-line packet-by-packet”
means simultaneous or parallel processing of data information and associated control signals.
The specification emphasizes “the advantages associated with processing control and data
in parallel, it is useful to realize that while data is being processed, control information may be
received to modify data processing without having to wait for data to be completely processed.”
Id. at 17:54-58. These descriptions inform the scope of the claims because they describe the
entirety of the invention as allowing simultaneous or parallel processing of data information and
associated control signals. See Verizon Servs. Corp. v. Vonage Holdings Corp., 503 F.3d 1295,
1308 (Fed. Cir. 2007) (“When a patent thus describes the features of the ‘present invention’ as a
whole, this description limits the scope of the invention”). Likewise, the patentee emphasized
19
the word “while” to avoid prior art. Doc. No. 94, Ex. 4 at 9) (“Wakeman fails to teach or suggest
transmit and receive media access controllers whose processing is alterable by control
information received while processing.”) (emphasis in original).
Secure Axcess’s alternative construction does not provide any additional clarity because
it is redundant in light of the existing claim language. See ’713 Patent at claim 5 (“a first
internal stream processor for processing packet data being transferred between the transmit
multi-queue device and the transmit media access controller, the first internal stream processor
also being configured to process packet data being transferred between the receive media access
controller and the receive multi-queue device”) (emphasis added).
Therefore, the Court construes the term “internal stream processor” to mean “a
processor capable of allowing simultaneous or parallel processing of data information and
associated control signals.”
c. “transmit multi-packet queue device for device receiving” / “receive
multi-packet queue device for receiving” (Claims 2 and 5)
“transmit multi-packet
queue device for
receiving”
Plaintiff’s Proposed
Construction
Plain and ordinary
meaning.
No construction necessary
Defendant’s Proposed
Construction
“transmit device capable of
receiving, storing, and
transmitting on a first in,
first out basis”
“receive multi-packet
queue device for
receiving”
Plain and ordinary
meaning.
No construction necessary
“receive device capable of
receiving, storing, and
transmitting on a first in,
first out basis”
Term
The parties dispute whether the recited “multi-packet queue devices” are limited to ones
that operate on “a first in, first out basis.” HP argues that “first in, first out” is the only sequence
of operation described in the specification. Doc. No. 94 at 27. Secure Axcess counters that
nothing in the claim language requires processing to be on a first-in, first out basis, but rather it
20
merely “requires the device to provide a multi-packet queue, however that queue is processed,
and perform the claimed operation.” Doc. No. 92 at 19. Secure Axcess argues that HP is
improperly attempting to limit the term to the preferred embodiment. Id.
The parties do not appear to dispute that it is widely understood that FIFO means first in,
first out. Doc. No. 94 at 26. HP argues that its construction only requires the “transmit multipacket queue device” to be capable of receiving, storing, and transmitting on a first in, first out
basis. Id. at 27. According to HP, their construction does not limit the device from performing
other operations, including those highlighted by Secure Axcess. Id.
Secure Axcess points to at least three teachings in the specification that demonstrate that
processing is not required to be performed on a first-in, first-out basis. First, Secure Axcess
contends that specification “details that the FIFO Tx can be programmed to prioritize the
different types of data being transferred across the network, such as audio, video, or graphics.”
Doc. No. 92 at 19 (citing ’713 Patent at 8:55-57). In that instance, Secure Axcess explains that
the FIFO Tx does not simply receive, store, and transmit packets on a first in, first out basis, but
instead indicates that some packets take priority over others.
Id. Second, Secure Axcess
contends that the specification teaches that “the device can skip over or hold particular packets.”
Id. (citing ’713 Patent at 8:57-62). That processing is also not on a first in, first out basis,
because skipping or holding packets can change the order. Third, the specification teaches that
“the ability to modify the processing parameters of packets buffered in the FIFO Tx is a
‘powerful feature.’” Id. (citing ’713 Patent at 9:24–38). Thus, the recited “multi-packet queue
devices” are not limited to ones that operate on “a first in, first out basis.”
Additionally, during prosecution the patentee amended the claims and stated that “some
of the claim terms have been broadened. Specifically, the phrase ‘multi-queue device’ has been
21
substituted for ‘FIFO device’. . . .” Doc. No. 97 at 10 (citing Doc. No. 94, Ex. 3 at 7 (Response
to Non-Final Rejection, at 6)). This is further evidence that the “multi-packet queue devices” are
not limited to ones that operate on “a first in, first out basis.”
Therefore, the Court construes “transmit multi-packet queue device for device
receiving” / “receive multi-packet queue device for receiving” to have its plain and ordinary
meaning.
CONCLUSION
For the foregoing reasons, the Court hereby ADOPTS the above claim constructions for
the patents-in-suit. For ease of reference, the Court’s claim interpretations are set forth in a table
in Appendix A.
So ORDERED and SIGNED this 7th day of November, 2016.
22
APPENDIX A
Terms, Phrases, or Clauses
ʼ990 “performed…in-line”
Court’s Construction
“performed . . . without slowing down data
transfer rates”
ʼ990 “an instruction set for custom
programming” / “instruction set”
“user defined set of machine instructions that
a processor can execute”
ʼ990 “data structure”
“at least one user defined field”
ʼ990 “packet data segment data structure”
“a portion of packet data stored as a data
structure
ʼ990 “hashed data segment data structure”
“a portion of compressed data stored as a data
structure”
ʼ713 “a parallel event processor”
“a processor that may include a packet buffer,
command and status registers, statistical
counters, programmable counters, and a
micro-RISC processor”
ʼ713 “internal stream processor”
“a
processor
capable
of
allowing
simultaneous or parallel processing of data
information and associated control signals”
ʼ713 “transmit multi-packet queue device for
device receiving” / “receive multi-packet
queue device for receiving”
Plain and ordinary meaning
23
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?