CUPP Cybersecurity LLC et al v. Trend Micro, Inc. et al

Filing 151

CLAIM CONSTRUCTION MEMORANDUM OPINION AND ORDER: The parties are ORDERED not to refer, directly or indirectly, to each other's claim construction positions in the presence of the jury. Likewise, the parties are ORDERED to refrain from mentioning any portion of this opinion, other than the actual definitions adopted by the Court, in the presence of the jury. Any reference to claim construction proceedings is limited to informing the jury of the definitions adopted by the Court. (Ordered by Chief Judge Barbara M. G. Lynn on 12/10/2021) (mla)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION CUPP CYBERSECURITY, LLC, and CUPP COMPUTING AS, § § § § § § § § § § § § § Plaintiffs, v. TREND MICRO, INC., TREND MICRO AMERICA, INC., and TREND MICRO INCORPORATED, Defendants. Civil Action No. 3:18-cv-1251-M (Consolidated with Civil Action No. 3:20-cv-03206-M) CLAIM CONSTRUCTION MEMORANDUM OPINION AND ORDER This Order addresses the claim construction disputes presented by Plaintiffs CUPP Cybersecurity, LLC, and CUPP Computing AS, and Defendants Trend Micro, Inc., Trend Micro America, Inc., and Trend Micro Incorporated, in CUPP Cybersecurity LLC v. Trend Micro Inc., Case No. 3:20-cv-03206-M. 1 The parties submitted opening and responsive claim construction briefs, and on November 8, 2021, the Court held a claim construction hearing. Having considered the arguments and evidence presented by the parties, the Court issues this Order. I. BACKGROUND Plaintiffs CUPP Cybersecurity, LLC and CUPP Computing AS (together, “CUPP”) are security providers for mobile devices, and have “a robust portfolio of inventions related to, inter alia, mobile devices and removable media, and has invested millions in pioneering new forms of security for these devices. CUPP’s inventions cover software and hardware based solutions to 1 On November 1, 2021, CUPP Cybersecurity LLC v. Trend Micro Inc., Case No. 3:18-cv-01251-M (“CUPP1”) was consolidated with CUPP Cybersecurity LLC v. Trend Micro Inc., Case No. 3:20-cv-03206-M (“CUPP2”). This Order addresses claim construction disputes presented in CUPP2 prior to consolidation. The Court has already issued a separate order discussing the claim construction disputes presented in CUPP1. See ECF No. 150. 1 problems in mobile device management, network security, DMZ security, and endpoint security.” Am. Compl. (CUPP2 ECF No. 41 2) ¶ 8. Defendants Trend Micro, Inc., Trend Micro America, Inc., and Trend Micro Incorporated (together, “Trend Micro”) make a number of products falling into several categories: user protection products (e.g., Smart Protection Complete Suit), network defense products (e.g., Advance Threat Protection and Intrusion Protection), hybrid cloud security products (e.g., Deep Security), worry-free products (e.g., Worry-Free Standard), mobile security technology products (e.g., Dr. Safety), control manager technology, XGen security technology, smart protection network technology, and XDR and managed XDR technology. Id. ¶¶ 43–54. CUPP alleges that Trend Micro’s products infringe nine of CUPP’s patents: U.S. Patent No. 10,417,400 (the “’400 patent”); U.S. Patent No. 10,089,462 (the “’462 patent”); U.S. Patent No. 10,417,421 (the “’421 patent”); U.S. Patent No. 10,621,344 (the “’344 patent”); U.S. Patent No. 10,291,656 (the “’656 patent”); U.S. Patent No. 10,666,688 (the “’688 patent”); U.S. Patent No. 10,162,975 (the “’975 patent”); U.S. Patent No. 10,496,834 (the “’834 patent”); U.S. Patent No. 10,951,632 (the “’632 patent”). The parties identify one agreed construction and four disputed terms for the Court’s resolution. The patents containing disputed terms are discussed below. a. The ’688 and ’656 patents. Both the ’688 and ’656 patents are titled “Systems and methods for providing network security using a secure digital device.” The ’688 patent is a continuation of the ’656 patent and shares the same specification. The parties agree that the ’688 patent is representative of the ’656 patent for purposes of claim construction. 2 Citations to “CUPP2 ECF” refer to the docket in CUPP Cybersecurity LLC v. Trend Micro Inc., Case No. 3:20-cv03206-M. 2 Trend Micro describes the ’688 patent as broadly disclosing “a mechanism for intercepting network traffic, analyzing the data in the network traffic to determine if the data is malicious, and allowing the network traffic to proceed on its original course if the data is determined not to be malicious.” Resp. (CUPP2 ECF No. 66) at 7. Specifically, the ’688 and ’656 patents describe a security system that can intercept network traffic of a host device, a traffic virtualization module to generate a virtual file containing the intercepted network traffic, and modules for enforcing security policies on the network traffic. Br. (CUPP2 ECF No. 62) at 7. The parties dispute two claim terms appearing in the ’688 and ’656 patents, both of which appear in claim 1 of the ’688 patent, which claims: 1. A secure digital security system comprising: a data store; a file management module configured to receive a transfer file from a host device over a virtual file interface configured to assist in transferring data at file transfer speeds between the host device and the secure digital security system, the transfer file possibly containing a data store command or a virtual file containing network traffic intercepted at the host device, the transfer file including header information indicating whether the transfer file includes the data store command or the virtual file containing the network traffic, the network traffic including one of incoming network traffic to the host device or outgoing network traffic from the host device, the data store command including a particular command to retrieve or store data in the data store; a controller configured to manage the data store command by retrieving or storing the data in the data store; a security policy management module configured to evaluate the network traffic in the virtual file for compliance with a security policy; a traffic access determination module configured to generate a security indication whether to allow or to deny the network traffic in accordance with the evaluation; and a module configured to provide to the host device over the virtual file interface the security indication whether to allow or to deny the network traffic. ’688 patent, cl.1. 3 b. The ’975 and ’834 patents. Both the ’975 and ’834 patents are titled “Secure computing system.” The ’834 patent is a continuation of the ’975 patent, and shares the same specification. The parties agree that the ’975 patent is representative of the ’834 patent for purposes of claim construction. The parties dispute one term in the ’975 and ’834 patents. The ’975 patent is directed towards a computer system with multiple security levels, based, in part, on three independent “security aspects”: confidentiality, integrity, and availability. ’975 patent, at 1:62–65. The computer system described by the ’975 patent has multiple security levels, comprising high-power and low-power processing devices, and an interface unit comprising functions for moving classified information between the devices according to formal rules governing the security aspects of confidentiality and/or integrity. Id. at 6:29–39. Claim 1 of the ’975 patent recites: 1. A system comprising: a virtual machine engine for generating one or more virtual machines, each virtual machine being generated having a virtual machine confidentiality level and a virtual machine integrity level, the virtual machine confidentiality level being selected from at least a higher confidentiality level and a lower confidentiality level, the virtual machine integrity level being selected from at least a higher integrity level and a lower integrity level, a first virtual machine with the higher confidentiality level requiring a stronger confidentiality process than a second virtual machine with the lower confidentiality level, a third virtual machine with the higher integrity level requiring a stronger integrity process than a fourth virtual machine with the lower integrity level; a first program; a second program; a first datastore or data set associated with a first data confidentiality level and a first data integrity level; a second datastore or data set associated with a second data confidentiality level and a second data integrity level; 4 at least one hardware processor configured to: receive a request to use the first program; execute a particular virtual machine with a particular virtual machine confidentiality level and a particular virtual machine integrity level; use a particular confidentiality process and a particular integrity process before or while operating the first program by the particular virtual machine, the particular confidentiality process being associated with the particular virtual machine confidentiality level, the particular integrity process being associated with the particular virtual machine integrity level; allow the first program to read the first data set or from the first datastore, only if the first data confidentiality level is equal to or lower than the particular virtual machine confidentiality level, and only if the first data integrity level is equal to or higher than the particular virtual machine integrity level; and allow the first program to write to the first datastore or data set, only if the first data confidentiality level is equal to or higher than the particular virtual machine confidentiality level, and only if the first data integrity level is equal to or lower than the particular virtual machine integrity level. ’975 patent, cl.1. c. The ’400 patent. The ’400 patent is titled “Systems and methods for providing real time security and access monitoring of a removable media device.” The “400 patent describes systems and methods to provide data and device security in connection with a removable media device coupled to a media device. The abstract of the ’400 patent states: In various embodiments, a method comprises detecting a removable media device coupled to a digital device, authenticating a password to access the removable media device, injecting redirection code into the digital device, intercepting, with the redirection code, a request for data, determining to allow the request for data based on a security policy, and providing the data based on the determination. The method may further comprise selecting the security policy from a plurality of security policies based, at least in part, on the password and/or filtering the content of the requested data. Filtering the content may comprise scanning the data for malware. Filtering the content may also comprise scanning the data for confidential information. 5 ’400 patent, Abstract. The parties dispute the meaning of one claim term in claim 9 of the ’400 patent, which reads: 9. A system comprising: an operating system of a digital device configured to detect a removable media device being coupled to an external device port of the digital device; one or more processors; memory coupled to the one or more processors, the memory storing instructions to instruct the one or more processors to implement: a login module configured to cause, after detecting the removable media device being coupled to the external device port of the digital device, at least a portion of redirection code to be generated on the digital device, the redirection code including an interceptor, a data security policy, and a data security process, the interceptor configured to intercept a first function call to the operating system of the digital device before the first function call is executed by the operating system, the first function call including a request of the operating system to retrieve data from or write data to the removable media device, the first function call being initiated by a particular user or a particular application, the data security process configured to perform a set of one or more second function calls in response to intercepting the first function call, the set of one or more second function calls not including the first function call, the data security policy configured to evaluate data on the removable security device for malware, and the data security policy configured to determine whether to allow the first function call based at least on results of the data security process. ’400 patent, cl. 9. II. LEGAL PRINCIPLES A. General Principles of Claim Construction The construction of disputed claims is a question of law for the court. Markman v. Westview Instruments, Inc., 52 F.3d 967, 971–72 (Fed. Cir. 1995), aff’d, 517 U.S. 370 (1996). “Ultimately, the interpretation to be given a term can only be determined and confirmed with a full understanding of what the inventors actually invented and intended to envelop with the 6 claim.” Phillips v. AWH Corp., 415 F.3d 1303, 1316 (Fed. Cir. 2005) (en banc) (citation omitted). Accordingly, a proper construction “stays true to the claim language and most naturally aligns with the patent’s description of the invention.” Id. (citation omitted). “It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to which the patentee is entitled the right to exclude.’” Phillips, 415 F.3d at 1312 (quoting Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). Courts first “look to the words of the claims themselves . . . to define the scope of the patented invention.” Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996) (citation omitted). The claim terms are “generally given their ordinary and customary meaning,” but “a patentee may choose to be his own lexicographer and use terms in a manner other than their ordinary meaning, as long as the special definition of the term is clearly stated in the patent specification or file history.” Id. (citation omitted). The “ordinary and customary meaning” of the terms in a claim is “the meaning that the term[s] would have to a person of ordinary skill in the art in question at the time of the invention.” Phillips, 415 F.3d at 1313. When the meaning of a term to a person of ordinary skill in the art is not apparent, a court is required to consult other sources, including “the words of the claims themselves, the remainder of the specification, the prosecution history, extrinsic evidence concerning relevant scientific principles, the meaning of technical terms, and the state of the art.” Id. (citation omitted). A court must consider the context in which the term is used in an asserted claim or related claims in the patent, being mindful that “the person of ordinary skill in the art is deemed to read the claim term not only in the context of the particular claim in which the disputed term appears, but in the context of the entire patent, including the specification.” Id. The specification is “always highly relevant to the claim construction analysis” and is “the single best guide to the meaning of a 7 disputed term.” Id. at 1315 (quoting Vitronics, 90 F.3d at 1582). For example, should the specification reveal that a claim term has been given a special definition by the patentee that is different from the ordinary meaning of the term, the inventor’s lexicography is controlling. Id. at 1316. Furthermore, if the specification reveals an intentional disclaimer or disavowal of claim scope by the patentee, the claim scope dictated by the specification is controlling. Id. Finally, in construing claims, a court may consult extrinsic evidence, including “expert and inventor testimony, dictionaries, and learned treatises.” Phillips, 415 F.3d at 1317 (citing Markman, 52 F.3d at 980). Technical dictionaries may assist a court in “‘better understand[ing] the underlying technology’ and the way in which one of skill in the art might use the claim terms.” Id. at 1318 (quoting Vitronics, 90 F.3d at 1584 n.6). Expert testimony may also be helpful to “provide background on the technology at issue, to explain how an invention works, to ensure that the court’s understanding of the technical aspects of the patent is consistent with that of a person of skill in the art, or to establish that a particular term in the patent or the prior art has a particular meaning in the pertinent field.” Id. (citation omitted). Although extrinsic evidence may “shed useful light on the relevant art,” it is considered “less significant than the intrinsic record.” Id. at 1317 (quoting C.R. Bard, Inc. v. U.S. Surgical Corp., 388 F.3d 858, 862 (Fed. Cir. 2004)). More simply, “extrinsic evidence may be useful to the court, but it is unlikely to result in a reliable interpretation of patent claim scope unless considered in the context of the intrinsic evidence.” Id. at 1319. Accordingly, “a court should discount any expert testimony ‘that is clearly at odds with the claim construction mandated by the claims themselves, the written description, and the prosecution history, in other words, with the written record of the patent.’” Id. at 1318 (quoting Key Pharms. v. Hercon Labs. Corp., 161 F.3d 709, 716 (Fed. Cir. 1998)). 8 III. AGREED CONSTRUCTION The parties have agreed to the following construction set forth in their Joint Claim Construction Chart (CUPP2, ECF No. 68): Term “power management mode” • ’632 patent, claims 1, 16 IV. Agreed Construction A mode where the mobile device conserves power CONSTRUCTION OF DISPUTED TERMS A. “file transfer speeds” Disputed Term “file transfer speeds” • ’688 patent, claims 1, 6 • ’656 patent, claims 1, 10 CUPP’s Proposed Construction Plain and ordinary meaning. Trend Micro’s Proposed Construction Indefinite The Parties’ Positions CUPP argues that “file transfer speeds” should be construed according to its plain and ordinary meaning, because a POSITA would know, based on the specification and prosecution history, that this term means “the speed a file is transferred.” Reply (ECF No. 69) at 5. According to CUPP, the speed a file is transferred would depend on the particular device at issue. CUPP further argues that in the context of the specification, this term means “the speed that does not cause errors or timeouts in the underlying computer system.” Id. at 6. For support, CUPP points to the declaration and deposition testimony of its expert, Dr. Goodrich, as well as a dictionary definition defining “file transfer” as “[t]he process of moving or transmitting a file from one location to another, as between two programs or over a network.” CUPP App. Vols. I, II (ECF Nos. 63, 64) at Pltf. App. 137, 156, 315. Trend Micro argues that the term “file transfer speeds” as it appears in the claims of the ’688 and ’656 patents is indefinite, because the claims, specifications, and file histories do not 9 inform a POSITA about the scope of the invention with reasonable certainty. Trend Micro notes that both sides’ experts agree that “file transfer speed” is not a term of art, and that the only guidance regarding the meaning of “file transfer speeds” is from the following passage of the specification: Portable electronic devices, such as Android® smartphones and tablet devices, often use secure digital (SD) devices, e.g., SD cards, to store and retrieve files and other data. Secure digital devices typically do not support network traffic for host devices, or at best only support network traffic at transfer speeds that are unreasonably slow (e.g., 100’s kb/s), especially compared to the file transfer speeds of these secure storage devices (e.g., 10’s MB/s). ’688 patent, at 4:2–6 (emphasis added). Based on this passage, Trend Micro states a POSITA would only know that “10’s MB/s” would qualify as a file transfer speed, but “100’s kb/s” would not. Without additional data points or information, the specification does not provide reasonable certainty about the bounds of the claim—i.e., what would qualify as “file transfer speeds” capable of satisfying the claim. Trend Micro further argues that to adopt CUPP’s proposal would effectively read out the requirement in the claims that the files in question be transferred at “file transfer speeds.” According to Trend Micro, CUPP’s proposed construction renders this limitation meaningless, because it would permit any speed at which a file is transferred to qualify as a “file transfer speed,” making the claim language superfluous. Analysis The issue presented is whether, based on the specification and prosecution history, claims 1 and 6 of the ’688 patent, and claims 1 and 10 of the ’656 patent are indefinite because the term “file transfer speeds” used in those claims fails to inform a POSITA about the scope of the claimed invention with reasonable certainty. The Court concludes that the term “file transfer speeds” is indefinite. 10 Title 35, § 112(b) of the United States Code requires that a patent specification shall “conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.” The Supreme Court has held this definiteness provision “to require that a patent’s claims, viewed in light of the specification and prosecution history, inform those skilled in the art about the scope of the invention with reasonable certainty.” Nautilus, Inc. v. Biosig Instruments, Inc., 572 U.S. 898, 910 (2014). “The claims, when read in light of the specification and the prosecution history, must provide objective boundaries for those of skill in the art.” Interval Licensing LLC v. AOL, Inc., 766 F.3d 1364, 1371 (Fed. Cir. 2014). If a claim does not satisfy these requirements, it is invalid as indefinite under § 112. Nautilus, 572 U.S. at 901. “[I]ndefiniteness is a question of law and in effect part of claim construction.” ePlus, Inc. v. Lawson Software, Inc., 700 F.3d 509, 517 (Fed. Cir. 2012). Claim 1 of the ’688 patent, which the parties agree is representative for purposes of claim construction, describes a secure digital security system comprising, in part, “a file management module configured to receive a transfer file from a host device over a virtual file interface configured to assist in transferring data at file transfer speeds between the host device and the secure digital security system.” ’688 patent, cl.1. Thus, the claim describes an interface that assists with data being transferred between the host device and the secure digital security system not at any speed, but specifically “at file transfer speeds.” Omitting this phrase would give the claim a broader meaning, and accordingly, the “at file transfer speeds” language is a narrowing limitation. See Bicon, Inc. v. Straumann Co., 441 F.3d 945, 950 (Fed. Cir. 2006) (“[C]laims are interpreted with an eye toward giving effect to all terms in the claim.”). 11 CUPP first contends that “file transfer speeds” means the speed at which a file is transferred, and at oral argument, contended that, for a given device, any speed at which a file is transferred would satisfy the limitation. However, construing “file transfer speeds” simply to mean the speed at which any given file is transferred would render that language purely descriptive, as opposed to limiting; in effect, the claim term would amount to nothing more than an observation that files should be transferred at the speed at which they are transferred. As interpreted by CUPP, this language is effectively meaningless; indeed, during oral argument, when pressed by the Court as to what limitation would be removed if the words “at file transfer speeds” were omitted from the claim under its proposed construction, CUPP had no response. Having drafted the claim to include this language, CUPP cannot now argue that “at file transfer speeds” is merely descriptive; to do would render the scope of the patent ambiguous, “leaving examiners and the public to guess about which claim language the drafter deems necessary to his claimed invention and which language is merely superfluous, nonlimiting elaboration.” Bicon, 441 F.3d at 950. CUPP’s alternative proposal—that “file transfer speed” refers to the speed that does not cause errors or timeouts in the underlying computer system—fares no better. Nothing in the specification references timeouts or errors, the parties’ experts agree that “file transfer speed” is not a term of art, and CUPP points to no dictionary or treatise to support its proposal. Instead, the only evidence in the record supporting this interpretation is deposition testimony from CUPP’s expert, Dr. Goodrich, which the Court concludes is not specific or certain enough to suggest a POSITA would reach the same conclusion regarding the meaning of “file transfer speeds” in the patents. See Pltf. App. 137 (“Q: Okay. So what is the plain and ordinary meaning 12 of file transfer speed. A: . . . I would say, just sitting here today, it’s the speed at which a file can be transferred without there being an errors or timeouts in the system.” (emphasis added)). Having concluded that “file transfer speeds” must mean something beyond merely the speed at which files are transferred, and that CUPP’s alternative proposal lacks support, the Court looks to the specification. Apart from the claims, the only references to “file transfer speeds,” “speed,” or “speeds” in the patents is a single passage in the specification, quoted previously, that distinguishes between “unreasonably slow” transfer speeds in the hundreds of kilobits per second range, and file transfer speeds of secure digital devices in the tens of megabytes per second range. See ’688 patent, at 4:2–6. The specification next states that, “[a]ccordingly, various embodiments . . . capitalize on the rapid file transfer capabilities of secure digital devices to scan and evaluate network traffic for compliance with security policies.” Id. at 4:7–10. Based on this disclosure, a POSITA would understand that speeds of “10’s MB/s” qualify as a “file transfer speed” as that term is used in the claim. Beyond that, the specification provides no clear guidance as to its bounds. Speeds of “100’s kb/s” are distinguished from “file transfer speeds” as being unreasonably slow; Dr. Goodrich, CUPP’s expert, agreed that a POSITA would realize that “going at that alternative slow speed, that’s not a file transfer speed.” Pltf. App. 137. However, the distinction between “slow,” “unreasonably slow,” and “file transfer speeds” is undefined, and made further unclear by the fact that the sole data points provided in the specification—100 kb/s and 10 MB/s—are described as being merely exemplary. In sum, the specification does not provide sufficient guidance of the meaning of transferring data “at file transfer speeds” to give notice to the public of the boundaries between infringing and innocent activity. 13 Accordingly, the Court concludes that the specifications of the ’688 and ’656 patents do not inform a POSITA about the scope of “file transfer speeds” with reasonable certainty. Trend Micro has proven that claims 1 and 6 of the ’688 patent, and claims 1 and 10 of the ’656 patent are each indefinite under § 112. B. “virtual file” Disputed Term “virtual file” • ’688 patent, claims 1, 6 • ’656 patent, claims 1, 10 CUPP’s Proposed Construction Plain and ordinary meaning Trend Micro’s Proposed Construction Indefinite The dispute regarding the term “virtual file” in the ’688 and ’656 patents is whether, based on the specification and prosecution history, claims 1 and 6 of the ’688 patent, and claims 1 and 10 of the ’656 patent are indefinite because the term “virtual file” fails to inform a POSITA about the scope of the claimed invention with reasonable certainty. CUPP argues that “virtual file” should be construed according to its plain and ordinary meaning, whereas Trend Micro responds that it is indefinite under § 112. However, the Court has already concluded that these claims are each indefinite under § 112 for including the term “file transfer speeds,” and accordingly, does not reach the parties’ dispute as to whether these claims are indefinite for including the term “virtual file.” 14 C. “a login module configured to case . . . at least a portion of redirection code to be generated on the digital device” Disputed Term “a login module configured to cause, after detecting the removable media device being coupled to the external device port of the digital device, at least a portion of redirection code to be generated on the digital device” • ’400 patent, claim 9 CUPP’s Proposed Construction Plain and ordinary meaning Trend Micro’s Proposed Construction § 112 ¶ 6 (pre-AIA) Function: Configured to cause, after detecting the removable media device being coupled to the external device port of the digital device, at least a portion of the redirection code to be generated on the digital device. Structure: None disclosed/indefinite The parties dispute whether the “a login module . . .” term in claim 9 of the ’400 patent is a means-plus-function claim element. A means-plus-function claim element triggers 35 U.S.C. § 112 ¶ 6 (pre-AIA) / § 112(f) (AIA), 3 which allows an applicant to express a claim limitation “as a means or step for performing a specified function without the recital of structure, material, or acts in support thereof,” and provides that “such claim[s] shall be construed to cover the corresponding structure, material, or acts described in the specification and equivalents thereof.” 35 U.S.C. § 112 ¶ 6; see also Ergo Licensing, LLC v. CareFusion 303, Inc., 673 F.3d 1361, 1363 (Fed. Cir. 2012). In other words, a means-plus-function claim element allows the patentee to use a generic means to express a claim limitation, but the specification must disclose the corresponding structure. Ergo Licensing, LLC, 673 F.3d at 1363 (quoting Biomedino, LLC v. Waters Techs. Corp., 490 F.3d 946, 948 (Fed. Cir. 2007)). Thus, construction of a means-plus- 3 The ’400 patent claims priority to Application No. 12/622,386, which was filed on November 19, 2009. Accordingly, because the priority date of the ’400 patent predates the March 16, 2013, effective date of the AIA, the ’400 patent is subject to the pre-AIA § 112 ¶ 6. 15 function limitation consists of two steps: (1) identifying the claimed function, and (2) determining what, if any, structure in the specification corresponds with that function. Cardiac Pacemakers, Inc. v. St. Jude Med., Inc., 296 F.3d 1106, 1113 (Fed. Cir. 2002). The court must construe the function to include only those limitations in the claim language. Id. “It is improper to narrow the scope of the function beyond claim language” or to broaden the scope by disregarding limitations in the claims themselves. Id. (indicating further that “[o]rdinary principles of claim construction govern interpretation of the claim language used to describe the function”). The Parties’ Positions CUPP argues that the “a login module . . .” limitation is not a means-plus-function term because the claim language describes the operation of the login module sufficiently such that the structure is in the claim itself. In addition, CUPP points to statements made by the examiner during prosecution indicating that the structure of the login module is software. Trend Micro argues that the “a login module . . .” term in claim 9 of the ’400 patent should be construed as a means-plus-function limitation, and that it does not disclose sufficient structure and is therefore indefinite. Trend Micro points to the claim’s use of the word “module,” which the Federal Circuit has recognized is a “well-known nonce word that can operate as a substitute for ‘means,’” and the fact that “login module” has no established meaning in the industry. See Resp. at 29 (quoting Rain Computing, Inc. v. Samsung Elecs. Am., Inc., 989 F.3d 1002, 1006 (Fed. Cir. 2021)). Trend Micro contends that the “a login module . . .” limitation discloses two functions—“detecting the removable media device being coupled to the external device port of the digital device” and, after detection, a “generating” function, namely causing at “least a portion of redirection code to be generated on the digital device”—and that 16 because neither the claim nor the specification provide the associated structure for performing those functions, the claim is indefinite. Analysis The parties’ first dispute is whether the “a login module . . .” claim term is a means-plusfunction limitation subject to § 112 ¶ 6. The Court concludes that it is not. The claim does not use the word “means.” The Federal Circuit has held that avoidance of the word “means” creates a rebuttable presumption that § 112 ¶ 6 does not apply. See Zeroclick, LLC v. Apple Inc., 891 F.3d 1003, 1007 (Fed. Cir. 2018). To overcome that presumption, Trend Micro must demonstrate by a preponderance of the evidence that the claim term fails to recite sufficiently definite structure or recites function without reciting structure for performing that function. See id.; Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1348 (Fed. Cir. 2015) (en banc). “[T]he mere fact that the disputed limitations incorporate functional language does not automatically convert the words into means for performing such functions.” Zeroclick, 891 F.3d at 1008. Instead, the inquiry “depends on whether persons skilled in the art would understand the claim language to refer to structure, assessed in light of the presumption that flows from the drafter’s choice not to employ the word ‘means.’” Samsung Elecs., Am., Inc. v. Prisua Eng’g Corp., 948 F.3d 1342, 1354 (Fed. Cir. 2020). “That determination must be made under the traditional claim construction principles, on an element-by-element basis, and in light of evidence intrinsic and extrinsic to the asserted patents.” Zeroclick, 891 F.3d at 1007. Here, the limitation at issue does not use the word “means,” but rather “module”; § 112 ¶ 6 presumptively does not apply unless Trend Micro establishes that the claim term fails to 17 describe sufficiently definite structure. 4 See id. Claim 9 recites a system comprising an operating system of a digital device configured to detect a removable media device being coupled to the digital device, one or more processors, and memory coupled to said processor(s) storing instructions to instruct the processor(s) to implement “a login module . . . ,” the term at issue here. CUPP maintains that the structure of the login module is software, pointing to a statement by the patent examiner during prosecution, recognizing that “the processor implements the login module” and “[a]s such the examiner has interpreted the structure [of the] module[] to be software.” 5 Pltf. App. 190. Similarly, the declaration of Trend Micro’s expert, Dr. Jakobsson, states that “around 2008, a POSITA might have assumed that a ‘login module’ refers to software that requires a username and/or password to allow access to a device or software.” Trend Micro App. (ECF No. 67) at Def. App. 63. Dr. Jakobsson goes on to challenge that assumption in the context of claim 9 of the ’400 patent, 6 but seemingly concedes that a POSITA would understand “login module,” as it is used in the context of the claim, to refer to software. CUPP’s expert, Dr. Goodrich, likewise states in his declaration that a POSITA would understand “module” to refer 4 The Court notes that several of the cases holding that “module” was used a nonce word, and a substitute for “means,” did so based on the patentee’s express acknowledgment that, as used in the claim, “module” was a nonce word or had no commonly understood meaning and was not known by a POSITA to connote a particular structure. See Rain Computing, Inc. v. Samsung Elecs. Am., Inc., 989 F.3d 1002, 1006 (Fed. Cir. 2021); Williamson, 792 F.3d at 1350–51. CUPP makes no such concession here, and accordingly, the fact that the Federal Circuit has previously recognized “module” as a nonce word similar to means is not dispositive. 5 The examiner initially rejected the claim under § 112 ¶ 6 “because it uses . . . a generic placeholder ‘module’ coupled with functional language “login . . .” without reciting sufficient structure to achieve the function” and “the generic placeholder is not preceded by a structural modifier.” Pltf. App. 362. The claim was subsequently amended to add the limitations “one or more processors” and “memory coupled to the one or more processors, the memory storing instructions to instruct the processor to implement:” a login module. See U.S. Patent Application Serial No. 14/337,101, Docket No. 18EL-202029, Amendment and Response to Non-Final Office Action, at cl.11 (Dec. 1, 2015). 6 Specifically, Dr. Jakobsson states that the claimed function of the “login module” does not require verification of a user’s identity or password, and thus “[a]n assumption that the ‘login module’ verifies a username and/or password therefore would be incorrect.” Def. App. 64. However, Dr. Jakobsson does not contend that a POSITA’s assumption that the login module refers to software is incorrect. 18 to “a collection of commands or statements in a computer program to be executed by a processor with . . . predefine[d] routines and instructions.” Pltf. App. 317. Trend Micro argues that, even if the login module is software, the claim still lacks sufficient structure because the term is “untethered to any structure in the specification and followed by purely functional claim language.” Resp. at 33. Admittedly, in claim 9, “a login module . . .” is followed by language denoting some function; it describes how the module is configured to cause, “after detecting the removable media device being coupled to the external device port of the digital device, at least a portion of redirection code to be generated on the digital device.” ’400 patent, cl.9. However, the inclusion of functional language does not alone transform the claim into a means-plus-function limitation. See Zeroclick, 891 F.3d at 1008. Moreover, when construing the limitation in context, the Court disagrees that the language is untethered to any structure. For instance, Trend Micro argues that the login module performs the function of “detecting” the coupling of the removable media device to the external device port of the digital device; however, the claim makes clear that the operating system on the digital device is capable of performing that exact function. 7 Similarly, the claim specifies the structure and capabilities of the redirection code generated by the login module, namely that the redirection code includes an interceptor, a data security policy, and a data security process, and that the interceptor is configured to intercept function calls to the operating system of the digital device and perform other function calls in response, in accordance with the specific language of the 7 In addition, unlike other claims in the ’400 patent which specify that the login module is not located on the digital device, where the operating system is located, there is no such limitation in claim 9. Compare ’400 patent, cl.1 (“the removable media device having a login module”), id. cl.17 (“the removable media device having a login module”), with id. cl.9. 19 claim. 8 See ’400 patent, cl.9. Put differently, the claim provides the algorithm—i.e., structure— of the redirection code. 9 Moreover, the Court concludes that, reading “login module” in the context of the specification, there is sufficient structure such that the presumption against § 112 ¶ 6 is not rebutted. For instance, the specification describes various means by which the login module generates redirection code: The login module 1920 detects when the removable media device 1904 is coupled with the digital device 1902 and executes instructions to generate the redirection module 1910. In some embodiments, the login module 1920 requires that the user provides a password and/or a user name prior to the generation of the redirection module 1910. The login module 1920 may then execute a set up program to generate the redirection module 1910 on the digital device 1902. In one example, when the removable media device 1904 is coupled to the digital device 1902, the digital device 1902 may see the removable media device 1904 as a CD. The login module 1920 may provide an extended login executable file (e.g., EXT-login. Exe 1922) which may be auto-run by the digital device 1902 which generates the redirection module 1910. ’400 patent, at 22:31–45. Accordingly, the Court concludes that Trend Micro has not established that claim 9 fails to describe sufficiently definite structure for the challenged “a login module . . .” limitation, and therefore § 112 ¶ 6 does not apply. The parties raise no other claim construction dispute related 8 Specifically, claim 9 specifies that the interceptor is configured to “to intercept a first function call to the operating system of the digital device before the first function call is executed by the operating system, the first function call including a request of the operating system to retrieve data from or write data to the removable media device, the first function call being initiated by a particular user or a particular application, the data security process configured to perform a set of one or more second function calls in response to intercepting the first function call, the set of one or more second function calls not including the first function call, the data security policy configured to evaluate data on the removable security device for malware, and the data security policy configured to determine whether to allow the first function call based at least on results of the data security process.” ’400 patent, cl.9. 9 The Court notes that computer-implemented claims do not necessarily need to provide an algorithm in the claims to avoid the application of § 112 ¶ 6. See, e.g., Mad Dogg Athletics, Inc. v. Peloton Interactive, Inc., No. 2:20-CV00382-JRG, 2021 WL 3200994, at *15 (E.D. Tex. July 28, 2021) (“[T]he claims themselves do not necessarily need to provide an algorithm for a computer-directed claim term to avoid the ambit” of § 112 ¶ 6 (citing Apple Inc. v. Motorola, Inc., 757 F.3d 1286, 1298 (Fed. Cir. 2014)). 20 to this limitation, and accordingly, the Court construes ““a login module . . .” according to its plain and ordinary meaning. D. “integrity level” Disputed Term “integrity level” • ’975 patent, claims 1, 13 • ’834 patent, claims 1, 15 CUPP’s Proposed Construction Plain and ordinary meaning. Trend Micro’s Proposed Construction A value, separate from the confidentiality level, that indicates reliability The Parties’ Position CUPP argues that “integrity level” should be construed according to its plain and ordinary meaning, namely a measure of the trustworthiness or reliability of information. According to CUPP, because the patent recites both an “integrity level” and a “confidentiality level,” a POSITA would already understand that the two concepts are distinct. CUPP argues that including the word “separate” in the construction would read out an embodiment of the invention described in the specification, citing the following passage in which security aspects are expressed as a related pair: As noted above, different aspects of security, e.g. confidentiality, integrity and availability, are independent of each other. Thus, if there are two levels of integrity, e.g. {low, high} and two levels of confidentiality, e.g. {public, restricted} there could be four different virtual machines running {low, public}, {low, restricted}, {high, public} and {high, restricted} respectively. ’975 patent, at 12:50–56; see Br. at 22–23. In addition, based on testimony from its expert, Dr. Goodrich, CUPP contends that Trend Micro’s proposed construction is incorrect because security aspects, while being distinct, may still be related. CUPP further contends that Trend Micro’s inclusion of the word “value” in its proposed construction unnecessarily adds confusion. 21 Trend Micro responds that while the parties agree that “integrity” levels indicate reliability, the parties disagree as to whether the recited integrity level must be separate from the confidentiality level recited in the claims. Trend Micro points to the ’975 patent’s description of the confidentiality, integrity, and availability security aspects, and in particular the observation that “[i]t should also be understood that all aspects of security herein are independent of each other.” ’975 patent, 1:67–2:4. Trend Micro also points to a disclaimer in the specification of prior art security models that combined integrity and confidentiality, noting that such an approach is “a confusion of terms” and, in contrast, “[i]n this disclosure, integrity and confidentiality are regarded as completely independent of each other.” Id. at 2:49–55. Accordingly, because the claims and specification consistently treat the integrity level and confidentiality level separately, Trend Micro contends that the Court should construe the integrity level to be separate—i.e., a separate and distinct value—from the confidentiality level. Analysis The issue in dispute is whether the “confidentiality level” and “integrity level” are separate. The Court concludes that they are. The specification makes abundantly clear that integrity and confidentiality describe different concepts and are “completely independent” of each other; the specification describes how “information may be more or less reliable regardless of its level of confidentiality, and that a computer process may be assigned clearance along a confidentiality axis regardless of its assigned clearance along an integrity axis.” Id. at 2:52–60. In addition, the integrity and confidentiality levels are treated as separate and independent by the claims. For example, claim 1 of the ’975 patent describes an engine for generating virtual machines, each with a virtual machine confidentiality level and integrity level, the confidentiality level “being selected from at 22 least a higher confidentiality level and a lower confidentiality level,” and the integrity level “being selected from at least a higher integrity level and a lower integrity level.” Id. at cl.1. It is clear from these disclosures that the confidentiality and integrity levels are assigned separately and independently—i.e., selection of a particular confidentiality level has no effect on the selection of the integrity level. Moreover, there is no support in either the specification or the claims to suggest that the confidentiality and integrity levels are not represented separately within the system. Instead, the security aspects are referred to as separate values; for example, the specification describes an embodiment with two levels of integrity (“{low, high}”) and two levels of confidentiality (“{public, restricted}”), which results in four potential combinations, {low, public}, {low, restricted}, {high, public}, {high, restricted}. Id. at 12:50–56. CUPP points to nothing to suggest that a single level—for example, {low}—could represent both the confidentiality level and the integrity level, while maintaining the requisite independence articulated by the patent. In addition, CUPP’s concern that the fact that confidentiality and integrity can be described as paired variables means they are not separate from each other is unsupported; on the contrary, the specification makes clear that these different security aspects can be presented as pairs but remain independent. See id. In sum, the Court agrees with Trend Micro that based on the claims and the specification of the ’975 and’834 patents, the “integrity level” is separate from the confidentiality level and indicates reliability. However, the Court declines to introduce unnecessary ambiguity by using the word “value” in its construction, and accordingly construes “integrity level” to mean “a security aspect, separate from the confidentiality level, that indicates reliability.” 23 V. CONCLUSION The Court adopts the constructions set forth above, as summarized in the following table. The Court further finds that claims 1 and 6 of the ’688 patent, and claims 1 and 10 of the ’656 patent are each indefinite under § 112 because of the inclusion of the term “file transfer speeds.” The parties are ORDERED not to refer, directly or indirectly, to each other’s claim construction positions in the presence of the jury. Likewise, the parties are ORDERED to refrain from mentioning any portion of this opinion, other than the actual definitions adopted by the Court, in the presence of the jury. Any reference to claim construction proceedings is limited to informing the jury of the definitions adopted by the Court. Term “power management mode” • ’632 patent, claims 1, 16 “a login module configured to cause, after detecting the removable media device being coupled to the external device port of the digital device, at least a portion of redirection code to be generated on the digital device” • ’400 patent, claim 9 “integrity level” • ’975 patent, claims 1, 13 • ’834 patent, claims 1, 15 Construction A mode where the mobile device conserves power Plain and ordinary meaning A security aspect, separate from the confidentiality level, that indicates reliability SO ORDERED. December 10, 2021. BARBARA M. G. LYNN CHIEF JUDGE 24

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?