CUPP COMPUTING AS v. TREND MICRO INC. ( 2022 )


Menu:
  • Case: 20-2262    Document: 77    Page: 1   Filed: 11/16/2022
    United States Court of Appeals
    for the Federal Circuit
    ______________________
    CUPP COMPUTING AS,
    Appellant
    v.
    TREND MICRO INC.,
    Appellee
    KATHERINE K. VIDAL, UNDER SECRETARY OF
    COMMERCE FOR INTELLECTUAL PROPERTY
    AND DIRECTOR OF THE UNITED STATES PA-
    TENT AND TRADEMARK OFFICE,
    Intervenor
    ______________________
    2020-2262, 2020-2263, 2020-2264
    ______________________
    Appeals from the United States Patent and Trademark
    Office, Patent Trial and Appeal Board in Nos. IPR2019-
    00764, IPR2019-00765, IPR2019-00767.
    ______________________
    Decided: November 16, 2022
    ______________________
    PAUL J. ANDRE, Kramer Levin Naftalis & Frankel LLP,
    Redwood Shores, CA, argued for appellant. Also repre-
    sented by JAMES R. HANNAH; CRISTINA MARTINEZ, JEF-
    FREY PRICE, New York, NY.
    ROBERT BUERGI, DLA Piper LLP (US), East Palo Alto,
    Case: 20-2262    Document: 77     Page: 2     Filed: 11/16/2022
    2                     CUPP COMPUTING AS   v. TREND MICRO INC.
    CA, argued for appellee. Also represented by MARK D.
    FOWLER; STANLEY JOSEPH PANIKOWSKI, III, San Diego, CA.
    MICHAEL S. FORMAN, Office of the Solicitor, United
    States Patent and Trademark Office, Alexandria, VA, ar-
    gued for intervenor. Also represented by SARAH E. CRAVEN,
    THOMAS W. KRAUSE, FARHEENA YASMEEN RASHEED.
    ______________________
    Before DYK, TARANTO, and STARK, Circuit Judges.
    Dyk, Circuit Judge.
    CUPP Computing AS (“CUPP”) appeals three inter
    partes review (“IPR”) decisions of the Patent Trial and Ap-
    peal Board (“Board”) concluding that petitioner Trend Mi-
    cro Inc. had shown challenged claims in CUPP’s U.S.
    Patents Nos. 8,631,488 (“’488 patent”), 9,106,683 (“’683 pa-
    tent”), and 9,843,595 (“’595 patent”) unpatentable as obvi-
    ous over two prior art references: 
    U.S. Patent No. 7,818,803
    (“Gordon”) and U.S. Patent App. Pub. No. 2010/0218012 A1
    (“Joseph”). We affirm.
    BACKGROUND
    The three patents at issue, which share a common
    name and priority date, address the problem of malicious
    attacks aimed at mobile devices. See J.A. 362, 400, 438.
    They generally concern systems and methods for waking a
    mobile device from a power-saving mode and then perform-
    ing security operations on the device, “such as scanning a
    storage medium for malware, or updating security applica-
    tions.” J.A. 53.
    There are two issues on appeal. First, an issue of claim
    construction that applies to each of the three patents. And
    second, an issue unique to the ’595 patent: whether sub-
    stantial evidence supports the Board’s finding that either
    Joseph or Gordon renders obvious a claimed “security
    Case: 20-2262      Document: 77      Page: 3     Filed: 11/16/2022
    CUPP COMPUTING AS    v. TREND MICRO INC.                        3
    agent” on a mobile device, which “perform[s] security ser-
    vices.” ’595 patent, col. 31, ll. 38–40 & col. 32, ll. 41–43.
    The contested claim construction involves the limita-
    tion concerning a “security system processor,” which ap-
    pears in every independent claim in the patents. See ’488
    patent, col. 30, ll. 37–40 & col. 31, ll. 10–13 & col. 32, ll. 18–
    20; see also ’595 patent, col. 31, ll. 25–26 & col. 32, ll. 44–
    46; ’683 patent, col. 30, ll. 37–40 & col. 31, ll. 5–7 & col. 32,
    ll. 15–18. Claim 10 of the ’488 patent is illustrative:
    10. A mobile security system, comprising:
    a mobile security system processor;
    a connection mechanism for connecting to a
    data port of a mobile device and for communi-
    cating with the mobile device;
    security instructions; and
    a security engine configured to:
    detect using the mobile security system
    processor a wake event;
    provide a wake signal to the mobile device,
    the mobile device having a mobile device
    processor different than the mobile secu-
    rity system processor, the wake signal be-
    ing in response to the wake event and
    adapted to wake at least a portion of the
    mobile device from a power management
    mode; and
    after providing the wake signal to the mo-
    bile device, executing the security instruc-
    tions using the mobile security system
    processor to manage security services con-
    figured to protect the mobile device.
    Case: 20-2262     Document: 77      Page: 4    Filed: 11/16/2022
    4                     CUPP COMPUTING AS   v. TREND MICRO INC.
    ’488 patent, col. 31, ll. 1–19 (security system processor lim-
    itation emphasized); see also ’595 patent, col. 31, ll. 14–51;
    ’683 patent, col. 30, ll. 35–46.1
    In March 2019, Trend Micro petitioned the Board for
    inter partes review of several claims in the ’488, ’683, and
    ’595 patents, arguing that the claims were unpatentable as
    obvious. As relevant here, Trend Micro relied on Gordon
    and Joseph individually to show that all challenged claims
    would have been obvious, including the claims’ security
    system processor limitation. CUPP responded that the se-
    curity system processor limitation required that the secu-
    rity system processor be “remote” from the mobile device
    processor, and that neither Gordon nor Joseph disclosed
    this limitation because both taught a security processor
    bundled within a mobile device. CUPP further contended
    that the ’595 patent claims’ “security agent” located on the
    mobile device, which “perform[s] security services,” was not
    disclosed in the prior art. ’595 patent, col. 31, ll. 14–51 &
    col. 32, ll. 29–63.
    The Board instituted review and, in three final written
    decisions, found all the challenged claims obvious over the
    prior art. “[C]onstruing the claim[s] in accordance with
    the[ir] ordinary and customary meaning . . . as understood
    by one of ordinary skill in the art,” 
    37 C.F.R. § 42.100
    (b),
    the Board held that the challenged claims did not require
    that the security system processor be remote from the mo-
    bile device processor. The Board was also persuaded that
    the ’595 patent’s “security agent” element was obvious over
    either Gordon or Joseph. CUPP appealed.
    1     The ’595 patent omits the word “mobile” as a mod-
    ifier to “security system processor.” ’595 patent, col. 31, ll.
    25–26 & col. 32, ll. 44–46. This omission has no signifi-
    cance for present purposes. We generally refer to this com-
    ponent as the security system processor.
    Case: 20-2262     Document: 77      Page: 5     Filed: 11/16/2022
    CUPP COMPUTING AS   v. TREND MICRO INC.                       5
    Following the Supreme Court’s decision in United
    States v. Arthrex, Inc., 
    141 S. Ct. 1970
     (2021), we remanded
    the case to give CUPP an opportunity to request rehearing
    of the final written decisions from the Director of the
    United States Patent and Trademark Office, while retain-
    ing jurisdiction over the appeal. CUPP took that oppor-
    tunity, and the Acting Director denied the requests. CUPP
    renewed its appeal. We have jurisdiction under 
    28 U.S.C. § 1295
    (a)(4)(A).
    DISCUSSION
    “A patent may not be obtained . . . if the differences be-
    tween the subject matter sought to be patented and the
    prior art are such that the subject matter as a whole would
    have been obvious at the time the invention was made to a
    person having ordinary skill in the art . . . .” 
    35 U.S.C. § 103
    (a) (2008). 2 “In reviewing the Board’s determination
    on the question of obviousness, we review the Board’s legal
    conclusions de novo and its factual findings for substantial
    evidence.” Becton, Dickinson & Co. v. Baxter Corp. Eng-
    lewood, 
    998 F.3d 1337
    , 1339 (Fed. Cir. 2021) (internal quo-
    tation marks, citation, and alterations omitted).
    In IPR proceedings the Board now applies the Phillips
    claim construction standard governing federal courts. See
    
    37 C.F.R. § 42.100
    (b); Phillips v. AWH Corp., 
    415 F.3d 1303
    (Fed. Cir. 2005) (en banc); Polaris Innovations Ltd. v.
    Brent, 
    48 F.4th 1365
    , 1372 n.3 (Fed. Cir. 2022).
    2    Though Congress amended § 103 in the Leahy-
    Smith America Invents Act (“AIA”), 
    Pub. L. No. 112-29, sec. 3
    (c), § 103, 
    125 Stat. 284
    , 287 (2011), all claims at issue
    here have an effective filing date before March 16, 2013,
    and so are evaluated under the pre-AIA version of § 103.
    See Becton, Dickinson & Co. v. Baxter Corp. Englewood,
    
    998 F.3d 1337
    , 1339 n.2 (Fed. Cir. 2021).
    Case: 20-2262     Document: 77      Page: 6     Filed: 11/16/2022
    6                     CUPP COMPUTING AS    v. TREND MICRO INC.
    I
    We begin with the security system processor limita-
    tion. 3 CUPP argues that the claims require that the secu-
    rity system processor be separate and remote from the
    mobile device. It relies on the language of the claims, the
    specification, and disclaimers made during the original ex-
    amination and IPR proceedings.
    A
    The security system processor limitation requires that
    “the mobile device hav[e] a mobile device processor differ-
    ent than the mobile security system processor.” ’488 pa-
    tent, col. 31, ll. 10–12; see also ’683 patent, col. 31, ll. 6–8
    (same); ’595 patent, col. 31, ll. 25–26 (“a security system
    processor being different than the mobile device proces-
    sor”).
    As the Board properly concluded, the fact that the se-
    curity system processor is “different” than the mobile de-
    vice processor does not suggest that the two processors are
    remote from one another. In ordinary usage, “different”
    simply means “dissimilar,” see J.A. 12 (quoting general-
    purpose dictionaries), and CUPP has given us no reason to
    apply a more specialized meaning to the word here. See
    also Webster’s Third New International Dictionary 630
    (2002) (defining “different” to mean “partly or totally una-
    like in nature, form, or quality . . . having at least one prop-
    erty not possessed by another”); Phillips, 415 F.3d at 1314
    (when “the ordinary meaning of claim language as under-
    stood by a person of skill in the art may be readily apparent
    3   Because the Board’s reasoning was identical in this
    respect in all three final written decisions, and CUPP does
    not suggest the existence of material differences among
    those decisions, we here cite only to the final written deci-
    sion concerning the ’488 patent, Trend Micro Inc. v. CUPP
    Computing AS, IPR2019-00764 (P.T.A.B. Aug. 25, 2020).
    Case: 20-2262      Document: 77      Page: 7     Filed: 11/16/2022
    CUPP COMPUTING AS    v. TREND MICRO INC.                        7
    even to lay judges . . . general purpose dictionaries may be
    helpful”). A feature need not be remote from another fea-
    ture to be “different.” So two processors may be different
    from one another and yet both be embedded in a single de-
    vice.
    The specification explicitly recognizes as much. In one
    “preferred embodiment[]” of the invention, ’488 patent, col.
    30, ll. 9–10, “the mobile security system . . . may be incor-
    porated within the mobile device.” Id., col. 8, ll. 16–17 (em-
    phasis added); see also ’595 patent, col. 30, ll. 55–56 & col.
    8, ll. 38–39 (same); ’683 patent, col. 30, ll. 9–10 & col. 8, ll.
    17–18 (same). We require “highly persuasive” evidence to
    read claims as excluding a preferred embodiment of the in-
    vention. Vitronics Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1583–84 (Fed. Cir. 1996). Indeed, “a claim interpre-
    tation that excludes a preferred embodiment from the
    scope of the claim is rarely, if ever, correct.” Accent Pack-
    aging, Inc. v. Leggett & Platt, Inc., 
    707 F.3d 1318
    , 1326
    (Fed. Cir. 2013) (citation omitted). As we have said, “[t]he
    only meaning that matters in claim construction is the
    meaning in the context of the patent.” Trustees of Colum-
    bia Univ. v. Symantec Corp., 
    811 F.3d 1359
    , 1363 (Fed. Cir.
    2016). Here, the specification strongly suggests that “dif-
    ferent” does not mean “remote,” and nothing in the claims
    requires otherwise.
    CUPP responds that, because at least independent
    claims in the ’488 and ’595 patents require the security sys-
    tem to send a wake signal “to” the mobile device, and “com-
    municate with” the mobile device, the system (and its
    processor) must be remote from the mobile device proces-
    sor. ’595 patent, col. 31, ll. 14–51; ’488 patent, col. 31, ll. 2–
    15 (teaching that the security system can “communicat[e]
    with the mobile device”). That conclusion is reinforced,
    CUPP says, because in some claims the security system
    communicates “with the mobile device” via a “data port.”
    ’488 patent, col. 31, ll. 2–5; see also ’683 patent, col. 31, ll.
    3–5 (same); ’595 patent, col. 31, ll. 16–18 (disclosing that
    Case: 20-2262    Document: 77     Page: 8    Filed: 11/16/2022
    8                    CUPP COMPUTING AS   v. TREND MICRO INC.
    the security system’s “communication interface [is] config-
    ured to communicate with a mobile device”). CUPP relies
    in addition on language in the ’595 patent that there be a
    “communication interface” as suggesting that the mobile
    device must be in communication with an external device.
    ’595 patent, col. 31, ll. 16–18.
    We are not persuaded. The Board properly construed
    the security system processor limitation in line with the
    specification. Just as a person can send an email to him-
    or herself, and an employee can communicate with the en-
    tity that employs that person, a unit of a mobile device can
    send a signal “to,” or “communicate with,” the device of
    which it is a part. Nor does the fact that some claims men-
    tion a “data port” suggest otherwise. The dependent claims
    in the ’595 patent teach that the security system’s “commu-
    nication interface” can communicate with the mobile device
    via “an external port” or “an internal port.” ’595 patent,
    col. 31, ll. 55–60. And extrinsic evidence does not overcome
    the intrinsic evidence. To the contrary, the record includes
    extrinsic evidence further supporting the conclusion that a
    person of skill in the art around the time of the patents’
    effective filing date would read “port” to include internal
    ports. J.A. 2183, 2184, 2193, 2214. The claims’ reference
    to the security system’s communication with the mobile de-
    vice thus does not exclude communication via an internal
    port.
    Case: 20-2262    Document: 77      Page: 9   Filed: 11/16/2022
    CUPP COMPUTING AS   v. TREND MICRO INC.                   9
    B
    1
    CUPP argues that, because it disclaimed a non-remote
    security system processor during the initial examination of
    one of the patents at issue, the Board’s construction is er-
    roneous. The Board properly rejected that argument.
    During prosecution of the ’683 patent, the Patent Office
    examiner found all claims in the application obvious in
    light of the prior art, relying on U.S. Patent App. Pub. No.
    2010/0195833 Al (“Priestley”) to show that the security sys-
    tem processor limitation was disclosed in the prior art. The
    examiner found that Priestley taught a mobile security sys-
    tem, called a Trusted Platform Module (“TPM”), different
    than a mobile device processor. According to the examiner,
    the TPM in Priestley is usually “implemented as an addi-
    tional stand-alone chip attached to a PC motherboard” and
    “may be implemented in hardware or software.” Trend Mi-
    cro Inc. v. CUPP Computing AS, IPR2019-00764, Ex. 2001
    at 127. As such, the “use of separate security processors
    would be an obvious interchangeable variation of the un-
    derlying hardware.” 
    Id.
     CUPP’s response to the examiner
    could be read to say, inter alia, that if the TPM “were im-
    plemented as a stand-alone chip attached to a PC mother-
    board,” it would be “part of the motherboard of the mobile
    devices” rather than being a separate processor. J.A. 3578.
    The TPM would therefore not constitute “a mobile security
    system processor different from a mobile system proces-
    sor.” 
    Id.
     The examiner allowed the claims.
    “The doctrine of prosecution disclaimer precludes pa-
    tentees from recapturing through claim interpretation spe-
    cific meanings disclaimed during prosecution.” Mass. Inst.
    of Tech. v. Shire Pharms., Inc., 
    839 F.3d 1111
    , 1119 (Fed.
    Cir. 2016) (ellipsis, alterations, and citation omitted).
    However, a patentee will only be bound to a “disavowal
    [that was] both clear and unmistakable.” 
    Id.
     (citation omit-
    ted). Thus, where “the alleged disavowal is ambiguous, or
    Case: 20-2262    Document: 77     Page: 10    Filed: 11/16/2022
    10                   CUPP COMPUTING AS   v. TREND MICRO INC.
    even amenable to multiple reasonable interpretations, we
    have declined to find prosecution disclaimer.” Avid Tech.,
    Inc. v. Harmonic, Inc., 
    812 F.3d 1040
    , 1045 (Fed. Cir. 2016)
    (internal quotation marks and citation omitted).
    CUPP’s purported disclaimer did not unmistakably re-
    nounce security system processors embedded in a mobile
    device. CUPP asserted that, because the TPM could be
    part of the mobile device’s motherboard, Priestley did not
    disclose a security system processor different than a mobile
    device processor. Under one plausible reading, CUPP’s
    point was that Priestley failed to teach different processors
    because the TPM lacks a distinct processor. Under this in-
    terpretation, if the TPM were “a stand-alone chip attached
    to a . . . motherboard,” it would rely on the motherboard’s
    processor, and not have its own different processor. J.A.
    3578. CUPP’s comment to the examiner is therefore con-
    sistent with it retaining claims to security system proces-
    sors embedded in a mobile device with a separate
    processor. As the Board properly held, this reading is a
    “reasonable interpretation[]” that defeats CUPP’s asser-
    tion of prosecutorial disclaimer. Avid Tech., Inc., 812 F.3d
    at 1045 (citation omitted); see also J.A. 20–22.
    2
    CUPP finally contends that the Board erred by reject-
    ing CUPP’s disclaimer in the IPRs themselves, disavowing
    a security system processor embedded in a mobile device.
    For support, CUPP cites our decision in Aylus Networks,
    Inc. v. Apple Inc., 
    856 F.3d 1353
     (Fed. Cir. 2017), for the
    proposition that patentee disclaimers during IPRs effec-
    tively narrow claim scope. The Board concluded that it
    could ignore this disavowal in construing the claims. We
    agree.
    Aylus is of no help to CUPP. Aylus says only that a
    patentee’s disclaimer during an IPR can bind the patentee
    to a narrower claim interpretation in a subsequent pro-
    ceeding, in that case a district court infringement
    Case: 20-2262    Document: 77      Page: 11     Filed: 11/16/2022
    CUPP COMPUTING AS   v. TREND MICRO INC.                     11
    proceeding. See Aylus, 856 F.3d at 1355, 1361. The rule in
    Aylus “ensure[s] that claims are not argued” by the pa-
    tentee “one way in order to maintain [the claims’] patenta-
    bility and in a different way against accused infringers.”
    Id. at 1360. The case says nothing about whether a pa-
    tentee’s disavowal is binding in the very proceeding in
    which it is made.
    We now make precedential the straightforward conclu-
    sion we drew in an earlier nonprecedential opinion: “[T]he
    Board is not required to accept a patent owner’s arguments
    as disclaimer when deciding the merits of those argu-
    ments.” VirnetX Inc. v. Mangrove Partners Master Fund,
    Ltd., 778 F. App’x 897, 910 (Fed. Cir. 2019). A rule permit-
    ting a patentee to tailor its claims in an IPR through argu-
    ment alone would substantially undermine the IPR
    process. Congress designed inter partes review to “giv[e]
    the Patent Office significant power to revisit and revise
    earlier patent grants,” thus “protect[ing] the public’s para-
    mount interest in seeing that patent monopolies are kept
    within their legitimate scope.” Cuozzo Speed Techs., LLC
    v. Lee, 
    579 U.S. 261
    , 272, 279–80 (2016) (internal quotation
    marks, citation, ellipses, and alterations omitted). If pa-
    tentees could shapeshift their claims through argument in
    an IPR, they would frustrate the Patent Office’s power to
    “revisit” the claims it granted, and require focus on claims
    the patentee now wishes it had secured. See also Oil States
    Energy Servs., LLC v. Greene’s Energy Grp., LLC, 
    138 S. Ct. 1365
    , 1373 (2018) (emphasis altered) (“[T]he decision to
    grant a patent is a matter involving . . . the grant of a pub-
    lic franchise. Inter partes review is simply a reconsidera-
    tion of that grant.”).
    To be clear, a disclaimer in an IPR proceeding is bind-
    ing in later proceedings, whether before the PTO or in
    court. See Aylus, 856 F.3d at 1361. We hold only that a
    disclaimer is not binding on the PTO in the very IPR pro-
    ceeding in which it is made, just as a disclaimer in a district
    court proceeding would not bind the district court in that
    Case: 20-2262    Document: 77      Page: 12    Filed: 11/16/2022
    12                    CUPP COMPUTING AS   v. TREND MICRO INC.
    proceeding. This follows from the adjudicatory nature of
    IPR proceedings as contrasted with initial examination.
    See SAS Inst., Inc. v. Iancu, 
    138 S. Ct. 1348
    , 1353 (2018)
    (contrasting the “inquisitorial process between patent
    owner and examiner [in] the initial Patent Office examina-
    tion” from the IPR process, which “looks a good deal more
    like civil litigation”).
    Moreover, Congress created a specialized process for
    patentees to amend their claims in an IPR. CUPP’s pro-
    posed rule would render that process unnecessary because
    the same outcome could be achieved by disclaimer. See 
    35 U.S.C. § 316
    (d).
    Nullifying Congress’s amendment process would be
    particularly perverse because Congress protected the pub-
    lic in ways that CUPP’s disclaimer rule would not. Con-
    gress gave accused infringers “intervening rights”
    protection for substantively amended claims, ensuring that
    such claims have only prospective effect. See 
    id.
     §§ 318(c),
    252. CUPP nowhere suggests that such intervening rights
    protections apply to claims effectively modified by dis-
    claimer. See Marine Polymer Techs., Inc. v. HemCon, Inc.,
    
    672 F.3d 1350
    , 1362–63 (Fed. Cir. 2012) (en banc). Allow-
    ing patentees to modify their claims by disclaimer would
    thus effectively allow retrospective amendment in the IPR
    process. And because IPR petitioners can challenge exist-
    ing claims only for non-compliance with §§ 102 or 103 of
    the Patent Act, see 
    35 U.S.C. § 311
    (b), under CUPP’s pro-
    posal a patentee could modify a claim free of scrutiny for
    compliance with other patentability requirements, such as
    § 101. The amendment process carries no such risk. See
    Uniloc 2017 LLC v. Hulu, LLC, 
    966 F.3d 1295
    , 1303–04
    (Fed. Cir. 2020) (the Board “is permitted to review and
    deny proposed substitute claims during IPR proceedings
    for patent ineligibility pursuant to § 101”). In brief, if pa-
    tent owners could freely modify their claims by argument
    in an IPR, they could avoid the public-protecting amend-
    ment process that Congress prescribed. That cannot be.
    Case: 20-2262     Document: 77       Page: 13    Filed: 11/16/2022
    CUPP COMPUTING AS    v. TREND MICRO INC.                      13
    Disclaimers in an IPR proceeding are not binding in the
    proceeding in which they are made.
    II
    CUPP contends that the Board lacked substantial evi-
    dence to find the challenged claims in the ’595 patent obvi-
    ous. We disagree.
    Unlike the ’488 or ’683 patents, the ’595 patent claims
    a “security agent” on the mobile device. ’595 patent, col.
    31, ll. 38–40 & col. 32, ll. 41–43. The security agent can
    “receive [a] wake signal” from the security system proces-
    sor and then “perform security services.” Id. at col. 31, ll.
    34–40. The parties refer to this limitation as the “security
    agent limitation.” Before the Board, CUPP argued that the
    security agent limitation was not obvious because neither
    Gordon nor Joseph disclosed a corresponding component.
    The Board held that CUPP had not made this argument in
    its papers, and so had waived, i.e., forfeited it. And it found
    that, in any event, the limitation was obvious over either
    piece of prior art.
    Because the Board’s merits finding as to Gordon was
    supported by substantial evidence, we need not decide
    whether its forfeiture determination was an abuse of dis-
    cretion, nor consider CUPP’s argument regarding Joseph.
    The Board found that Gordon disclosed components
    corresponding to the ’595 patent’s security agent and secu-
    rity system processor. Gordon describes a “host agent” on
    a mobile device that can undertake tasks such as “ini-
    tiat[ing] a data delete process, a program update or an en-
    cryption key change.” Gordon, col. 15, ll. 52–53, J.A. 1915.
    The host agent can act “in coordination with” another unit
    known as the “security module” which contains a “firmware
    agent.” Id. at col. 3, ll. 36–64, J.A. 1909; see also id. at Fig.
    1, J.A. 1903. In one embodiment, the firmware agent can
    “wake-up the host so that a data protection measure can be
    invoked.” Id. at col. 4, ll. 61–64, J.A. 1909. The Board
    Case: 20-2262    Document: 77      Page: 14    Filed: 11/16/2022
    14                    CUPP COMPUTING AS   v. TREND MICRO INC.
    concluded that Gordon disclosed a security system proces-
    sor (the processor running the firmware agent) that can
    wake up a security agent (the host agent) to perform secu-
    rity services, rendering the security agent limitation obvi-
    ous.
    That conclusion was supported by substantial evi-
    dence. As the Board found, Gordon’s host agent performs
    security services. The host agent can be instructed to “ini-
    tiate a data delete process, a program update or an encryp-
    tion key change.” Gordon, col. 15, ll. 52–53, J.A. 1915.
    Trend Micro’s expert confirmed that several of these proce-
    dures are security services. See Jakobsson Declaration
    ¶ 152, J.A. 5748–49. And like the security agent in the ’595
    patent, the host agent appears to perform such services af-
    ter receiving a wake-up call from another entity. See Gor-
    don, col. 4, ll. 61–64, J.A. 1909 (“[T]he firmware agent [can]
    wake-up the host so that a data protection measure can be
    invoked.”).
    CUPP also argues that the Board’s conclusion in the
    ’595 final written decision conflicts with its decisions re-
    garding the ’488 and ’683 patents. The Board adequately
    explained why its findings are consistent. In the ’488 and
    ’683 patents, the security system processor “manage[s]” se-
    curity services. ’488 patent, col. 30, ll. 34–47 (emphasis
    added); ’683 patent, col. 31, ll. 2–15 (same). The Board
    found that Gordon’s security module and its firmware
    agent taught this function. See J.A. 41–44, 139–141. In
    the ’488 and ’683 patents, the feature that performs secu-
    rity services is not identified. See ’488 patent, col. 30, ll.
    34–47; ’683 patent, col. 31, ll. 2–15. In the ’595 patent, the
    security agent “perform[s]” security services. ’595 patent,
    col. 31, ll. 38–39 (emphasis added). So too, the Board
    found, does the host agent in Gordon. See J.A. 90–91.
    There is no contradiction between saying that elements in
    Gordon (the security module and its firmware agent) man-
    age security services and another element (the host agent)
    performs them.
    Case: 20-2262    Document: 77     Page: 15   Filed: 11/16/2022
    CUPP COMPUTING AS   v. TREND MICRO INC.                  15
    CONCLUSION
    The Board properly construed the challenged claims,
    and its decisions were supported by substantial evidence.
    We affirm. 4
    AFFIRMED
    4   In its briefing, CUPP argues that the Acting Direc-
    tor’s denial of the company’s rehearing requests was inva-
    lid because he assertedly was not a principal officer under
    the Constitution. Our decision in Arthrex, Inc. v. Smith &
    Nephew, Inc., 
    35 F.4th 1328
    , 1335–40 (Fed. Cir. 2022), fore-
    closes this argument, as CUPP conceded at oral argument.
    See Oral Arg. at 11:47–12:00.