Packet Intelligence LLC v. Netscout Systems, Inc. ( 2020 )


Menu:
  • Case: 19-2041   Document: 56     Page: 1   Filed: 07/14/2020
    United States Court of Appeals
    for the Federal Circuit
    ______________________
    PACKET INTELLIGENCE LLC,
    Plaintiff-Appellee
    v.
    NETSCOUT SYSTEMS, INC., NETSCOUT SYSTEMS
    TEXAS, LLC, FKA TEKTRONIX TEXAS, LLC DBA
    TEKTRONIX COMMUNICATIONS,
    Defendants-Appellants
    ______________________
    2019-2041
    ______________________
    Appeal from the United States District Court for the
    Eastern District of Texas in No. 2:16-cv-00230-JRG, Judge
    J. Rodney Gilstrap.
    ______________________
    Decided: July 14, 2020
    ______________________
    PAUL SKIERMONT, Skiermont Derby LLP, Dallas, TX,
    for plaintiff-appellee. Also represented by SADAF R.
    ABDULLAH, STEVEN WAYNE HARTSELL, STEVEN UDICK;
    MIEKE K. MALMBERG, Los Angeles, CA.
    ERIC KRAEUTLER, Morgan, Lewis & Bockius LLP, Phil-
    adelphia, PA, for defendants-appellants. Also represented
    by JULIE S. GOLDEMBERG; JASON D. FRANK, Boston, MA;
    KARON NICOLE FOWLER, Chicago, IL; WILLIAM R.
    PETERSON, Houston, TX; AHREN CHRISTIAN HSU-HOFFMAN,
    Case: 19-2041     Document: 56     Page: 2    Filed: 07/14/2020
    2        PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    MICHAEL JOHN LYONS, THOMAS Y. NOLAN, Palo Alto, CA;
    MICHAEL FRANCIS CARR, Milpitas, CA.
    ______________________
    Before LOURIE, REYNA, and HUGHES, Circuit Judges.
    Opinion for the court filed by Circuit Judge LOURIE.
    Opinion concurring in part and dissenting in part filed by
    Circuit Judge REYNA.
    LOURIE, Circuit Judge.
    NetScout Systems, Inc. and NetScout Systems Texas,
    LLC (“NetScout”) appeal from the judgment of the U.S.
    District Court for the Eastern District of Texas after a jury
    verdict and bench trial that (1) NetScout willfully infringed
    claims 10 and 17 of U.S. Patent 6,665,725 (“the ’725 pa-
    tent”), claims 1 and 5 of U.S. Patent 6,839,751 (“the ’751
    patent”), and claims 19 and 20 of U.S. Patent 6,954,789
    (“the ’789 patent”); (2) no asserted claim is invalid under 35
    U.S.C. §§ 101, 102(a), 102(f); (3) Packet Intelligence LLC
    (“Packet Intelligence”) is entitled to $3.5 million in dam-
    ages for pre-suit infringement; (4) Packet Intelligence is en-
    titled to post-suit damages of $2.25 million; (5) Packet
    Intelligence is entitled to $2.8 million in enhanced dam-
    ages; and (6) Packet Intelligence is entitled to an ongoing
    royalty for future infringement of 1.55%. Packet Intelli-
    gence LLC v. NetScout Sys., Inc., No. 2:16-cv-230-JRG,
    
    2018 WL 4286193
    , at *1 (E.D. Tex. Sept. 7, 2018).
    Because the district court erred in denying NetScout’s
    motion for judgment as a matter of law on pre-suit dam-
    ages, we reverse the district court’s pre-suit damages
    award and vacate the court’s enhancement of that award.
    We affirm the district court’s judgment in all other re-
    spects.
    Case: 19-2041     Document: 56     Page: 3    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.         3
    BACKGROUND
    Packet Intelligence owns the ’725, ’751, and ’789 pa-
    tents, which teach a method for monitoring packets ex-
    changed over a computer network. A stream of packets
    between two computers is called a connection flow. ’789
    patent col. 2 ll. 43–45. Monitoring connection flows cannot
    account for disjointed sequences of the same flow in a net-
    work.
    Id. col. 3
    ll. 56–59. The specifications explain that it
    is more useful to identify and classify “conversational
    flows,” defined as “the sequence of packets that are ex-
    changed in any direction as a result of an activity.”
    Id. col. 2
    ll. 45–47. Conversational flows provide application-spe-
    cific views of network traffic and can be used to generate
    helpful analytics to understand network load and usage.
    See ’751 patent col. 3 l. 2–col. 4 l. 11.
    The claims of the’725, ’751, and ’789 patents asserted
    in the district court describe apparatuses and methods for
    network monitoring. The ’789 patent recites apparatus
    claims, and claims 19 and 20 were asserted. Claim 19 of
    ’789 patent is drawn to a “packet monitor”:
    19. A packet monitor for examining packets pass-
    ing through a connection point on a computer net-
    work, each packet[] conforming to one or more
    protocols, the monitor comprising:
    (a) a packet acquisition device coupled to
    the connection point and configured to re-
    ceive packets passing through the connec-
    tion point;
    (b) an input buffer memory coupled to and
    configured to accept a packet from the
    packet acquisition device;
    (c) a parser subsystem coupled to the input
    buffer memory and including a slicer, the
    parsing subsystem configured to extract se-
    lected portions of the accepted packet and
    Case: 19-2041    Document: 56     Page: 4    Filed: 07/14/2020
    4       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    to output a parser record containing the se-
    lected portions;
    (d) a memory for storing a database com-
    prising none or more flow-entries for previ-
    ously encountered conversational flows,
    each flow-entry identified by identifying in-
    formation stored in the flow-entry;
    (e) a lookup engine coupled to the output of
    the parser subsystem and to the flow-entry
    memory and configured to lookup whether
    the particular packet whose parser record
    is output by the parser subsystem has a
    matching flow-entry, the looking up using
    at least some of the selected packet por-
    tions and determining if the packet is of an
    existing flow; and
    (f) a flow insertion engine coupled to the
    flow-entry memory and to the lookup en-
    gine and configured to create a flow-entry
    in the flow-entry database, the flow-entry
    including identifying information for fu-
    ture packets to be identified with the new
    flow-entry, the lookup engine configured
    such that if the packet is of an existing
    flow, the monitor classifies the packet as
    belonging to the found existing flow; and if
    the packet is of a new flow, the flow inser-
    tion engine stores a new flow-entry for the
    new flow in the flow-entry database, in-
    cluding identifying information for future
    packets to be identified with the new flow-
    entry,
    wherein the operation of the parser subsystem de-
    pends on one or more of the protocols to which the
    packet conforms.
    Case: 19-2041     Document: 56     Page: 5    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.         5
    ’789 patent col. 36 l. 31–col. 37 l. 2. Claim 20 of the ’789
    patent depends from claim 19 and further requires that
    “each packet passing through the connection point is ac-
    cepted by the packet buffer memory and examined by the
    monitor in real time.”
    Id. col. 3
    7 ll. 3–6.
    In contrast to the apparatus claims of the ’789 patent,
    the ’725 and ’751 patents recite method claims. The ’725
    patent claims recite a method for performing protocol-spe-
    cific operations on a packet through a connection point on
    a network, comprising receiving a packet and executing
    protocol specific operations on it, including parsing and ex-
    traction to determine whether the packet belongs to a con-
    versational flow. And the ’751 patent claims recite
    methods of analyzing a flow of packets with similar steps.
    Although the asserted claims include varied language, the
    parties treat claim 19 of the ’789 patent as representative
    of all of the asserted claims for infringement and invalidity.
    Thus, we focus on claim 19 in our analysis.
    Packet Intelligence asserted claims 19 and 20 of the
    ’789 patent, claims 10 and 17 of the ’725 patent, and claims
    1 and 5 of the ’751 patent against NetScout’s “G10” and
    “GeoBlade” products in the United States District Court for
    the Eastern District of Texas. The case was tried to a jury
    on the issues of infringement, damages, willfulness, and in-
    validity under 35 U.S.C. § 102. The jury found all claims
    willfully infringed, rejected NetScout’s invalidity defenses,
    and awarded pre-suit and post-suit damages. Following
    the jury verdict, the district court issued findings of fact
    and conclusions of law under Fed. R. Civ. P. 52 rejecting
    NetScout’s § 101 invalidity defense. The court also en-
    hanced damages in the amount of $2.8 million and, in ac-
    cordance with the jury’s verdict, awarded an ongoing
    royalty for post-verdict infringement.
    NetScout appealed, and we have jurisdiction under 28
    U.S.C. § 1295(a)(1).
    Case: 19-2041    Document: 56     Page: 6    Filed: 07/14/2020
    6       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    DISCUSSION
    In reviewing issues tried to a jury, we review the dis-
    trict court’s denial of post-trial motions for judgment as a
    matter of law and for a new trial under the law of the re-
    gional circuit—here, the Fifth Circuit. See Finjan, Inc. v.
    Secure Computing Corp., 
    626 F.3d 1197
    , 1202 (Fed. Cir.
    2010) (citing Revolution Eyewear, Inc. v. Aspex Eyewear,
    Inc., 
    563 F.3d 1358
    , 1370 (Fed. Cir. 2009)). Under Fifth
    Circuit law, we review de novo the denial of a motion for
    judgment as a matter of law, applying the same legal
    standard as the district court. Baisden v. I’m Ready Prods.,
    Inc., 
    693 F.3d 498
    , 499 (5th Cir. 2012). Judgment as a mat-
    ter of law should be granted if “a reasonable jury would not
    have a legally sufficient evidentiary basis to find for the
    party on that issue.” Fed. R. Civ. P. 50(a).
    We are “especially deferential” to a jury’s verdict, re-
    versing only for lack of substantial evidence. 
    Baisden, 693 F.3d at 498
    –99. “Substantial evidence” is “evidence of such
    quality and weight that reasonable and fair-minded men in
    the exercise of impartial judgment might reach different
    conclusions.” Threlkeld v. Total Petroleum, Inc., 
    211 F.3d 887
    , 891 (5th Cir. 2000) (quoting Gaia Techs., Inc. v. Recy-
    cled Prods. Corp., 
    175 F.3d 365
    , 374 (5th Cir. 1999)). We
    “draw all reasonable inferences in the light most favorable
    to the verdict and cannot substitute other inferences that
    we might regard as more reasonable.” EEOC v. Boh Bros.
    Constr. Co., 
    731 F.3d 444
    , 452 (5th Cir. 2013) (citing
    Westlake Petrochems., L.L.C. v. United Polychem, Inc., 
    688 F.3d 232
    , 239 (5th Cir. 2012)). “Credibility determinations,
    the weighing of the evidence, and the drawing of legitimate
    inferences from the facts are jury functions, not those of a
    judge.” Reeves v. Sanderson Plumbing Prods., Inc., 
    530 U.S. 133
    , 150–51 (2000) (quoting Anderson v. Liberty Lobby
    Inc., 
    477 U.S. 242
    , 255 (1986)).
    On appeal from a bench trial, we review a district
    court’s conclusions of law de novo and its findings of fact
    Case: 19-2041    Document: 56      Page: 7    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.        7
    for clear error. Braintree Labs., Inc. v. Novel Labs., Inc.,
    
    749 F.3d 1349
    , 1358 (Fed. Cir. 2014) (citing Brown & Wil-
    liamson Tobacco Corp. v. Philip Morris Inc., 
    229 F.3d 1120
    ,
    1123 (Fed. Cir. 2000)). “A factual finding is clearly errone-
    ous when, despite some supporting evidence, we are left
    with a definite and firm conviction that the district court
    was in error.” Alcon Research Ltd. v. Barr Labs., Inc., 
    745 F.3d 1180
    , 1186 (Fed. Cir. 2014) (citing Alza Corp. v. Mylan
    Labs., Inc., 
    464 F.3d 1286
    , 1289 (Fed. Cir. 2006)). “The
    burden of overcoming the district court’s factual findings
    is, as it should be, a heavy one.” Polaroid Corp. v. Eastman
    Kodak Co., 
    789 F.2d 1556
    , 1559 (Fed. Cir. 1986). “Where
    there are two permissible views of the evidence, the fact-
    finder’s choice between them cannot be clearly erroneous.”
    Anderson v. City of Bessemer City, 
    470 U.S. 564
    , 574 (1985)
    (citing United States v. Yellow Cab Co., 
    338 U.S. 338
    , 342
    (1949)).
    In this appeal, NetScout challenges the district court’s
    judgment on the issues of infringement, invalidity under
    § 101, invalidity under § 102, pre-suit damages, and will-
    fulness. We address each issue in turn.
    I. Infringement
    We first address NetScout’s claim that it did not in-
    fringe the asserted patents. An infringement analysis re-
    quires two steps. Clare v. Chrysler Grp. LLC, 
    819 F.3d 1323
    , 1326 (Fed. Cir. 2016). First, the court construes the
    asserted claims. Claim construction is a question of law
    that may involve underlying factual questions. Teva
    Pharm. USA, Inc. v. Sandoz, Inc., 
    574 U.S. 318
    , 332 (2015).
    Second, the court determines whether the accused product
    meets each limitation of the claim as construed, which is a
    question of fact. Wright Med. Tech., Inc. v. Osteonics Corp.,
    
    122 F.3d 1440
    , 1443 (Fed. Cir. 1997).
    NetScout’s two-step theory concerning why it is not an
    infringer relies entirely on claim 19’s memory limitation.
    First, NetScout argues that the limitation requires
    Case: 19-2041    Document: 56     Page: 8    Filed: 07/14/2020
    8       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    correlating connection flows into conversational flows. Ap-
    pellant’s Br. 36. Then, under NetScout’s understanding of
    the claim language, NetScout submits that its products
    cannot infringe because no accused products meet that lim-
    itation. In NetScout’s view, the record establishes that the
    accused products track connection flows but never join
    them together.
    Packet Intelligence responds that it presented thor-
    ough evidence supporting the jury’s infringement verdict.
    In response to NetScout’s claim construction argument,
    Packet Intelligence counters that the claims do not require
    joining flows into a single conversational flow.
    We first agree with Packet Intelligence that the claims
    do not require the joining of connection flows into conver-
    sational flows. The term “conversational flow” appears in
    claim 19’s memory limitation: “a memory for storing a da-
    tabase comprising none or more flow-entries for previously
    encountered conversational flows, each flow-entry identi-
    fied by identifying information stored in the flow entry.”
    ’789 patent col. 36 ll. 45–48. Contrary to NetScout’s argu-
    ment, however, a limitation requiring memory for storing
    flow entries for previously encountered conversational
    flows does not require the added action of correlating con-
    nection flow entries into conversational flows.
    Even if NetScout were correct that the claims require
    correlating connection flows into conversational flows,
    however, the jury’s infringement verdict is supported by
    substantial evidence. Dr. Almeroth testified that the ac-
    cused products contain a “flow state block” (“FSB”), “corre-
    sponding” to source code “Fsb.c.” J.A. 1265:1–1266:20.
    According to Dr. Almeroth, the FSB contains flow entries
    and the information in the flow record can be used to cor-
    relate or associate flow entries into conversational flows.
    J.A. 1265:1–10; 1266:25–1267:2. This testimony alone is
    substantial evidence supporting the jury’s verdict.
    Case: 19-2041    Document: 56      Page: 9    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.        9
    As further confirmation that the accused products in-
    fringe, Dr. Almeroth also provided an “example” of how
    NetScout’s products use the information in memory to cre-
    ate a “key performance index” in a NetScout white paper
    titled “Subscriber Web Page Download Time Estimation in
    Passive Monitoring Systems.”         J.A. 1267:8–1268:11.
    Dr. Almeroth testified that the feature “demonstrate[d]
    that information in the flow record is sufficient to identify
    the flow-entry and also to allow it to associate with previ-
    ously-encountered conversation flows.”
    Id. Given the
    evidence presented to the jury on claim 19’s
    memory limitation and because NetScout has challenged
    no other aspect of the jury’s infringement finding, we can-
    not conclude that the jury’s verdict lacked substantial evi-
    dence.
    II. Patent Eligibility
    NetScout claims that the patents it is accused of in-
    fringing cover ineligible subject matter. Patent eligibility
    under § 101 “is ultimately an issue of law that we review
    de novo,” Berkheimer v. HP Inc., 
    881 F.3d 1360
    , 1365 (Fed.
    Cir. 2018) (citing Intellectual Ventures I LLC v. Capital One
    Fin. Corp., 
    850 F.3d 1332
    , 1338 (Fed. Cir. 2017)), although
    it may involve underlying fact findings,
    id. (citing Mortg.
     Grader, Inc. v. First Choice Loan Servs. Inc., 
    811 F.3d 1314
    ,
    1325 (Fed. Cir. 2016)). Under 35 U.S.C. § 101, “[w]hoever
    invents or discovers any new and useful process, machine,
    manufacture, or composition of matter, or any new and
    useful improvement thereof, may obtain a patent therefor,
    subject to the conditions and requirements of this title.” In
    evaluating eligibility, we first determine whether the
    claims at issue are directed to a patent-ineligible concept.
    Alice Corp. v. CLS Bank Int’l, 
    573 U.S. 208
    , 217 (2014) (cit-
    ing Mayo Collaborative Servs. v. Prometheus Labs., Inc.,
    
    566 U.S. 66
    , 77 (2012)). If so, we then “examine the ele-
    ments of the claim to determine whether it contains an ‘in-
    ventive concept’ sufficient to ‘transform’ the claimed
    Case: 19-2041     Document: 56      Page: 10     Filed: 07/14/2020
    10       PACKET INTELLIGENCE LLC     v. NETSCOUT SYSTEMS, INC.
    abstract idea into a patent-eligible application.”
    Id. at 221
     (quoting 
    Mayo, 566 U.S. at 72
    –73, 78).
    The parties submitted the issue of eligibility to be tried
    to the bench, and the district court issued findings of fact
    and conclusions of law under Fed. R. Civ. P. 52. Packet
    Intelligence LLC v. NetScout Sys., Inc., No. 2:16-cv-230-
    JRG (E.D. Tex. Feb. 14, 2018), ECF No. 298 (“Eligibility
    Decision”). The parties agree that claim 19 is representa-
    tive of the asserted claims, so we begin by reviewing the
    district court’s analysis for this claim.
    The district court first made a series of factual findings
    about the claimed inventions’ advantages over the prior
    art. According to the district court, to measure the amount
    or type of information being transmitted by a particular ap-
    plication or protocol, a network monitor must measure “all
    of the connection flows through which that application or
    protocol transmits packets.”
    Id. slip op.
    at 5. The court
    found that prior art monitors could not identify disjointed
    connection flows as belonging to the same conversational
    flow.
    Id. slip. op.
    at 9.
    The patents addressed this “problem” in the art by
    parsing packets to extract information that can be used to
    associate packets with single conversational flows, which
    correspond to particular applications or protocols.
    Id. slip op.
    at 6. A “parser subsystem ‘parses the packet and deter-
    mines the protocol types and associated headers for each
    protocol layer,’ ‘extracts characteristic portions (signature
    information) from the packet,’ and builds a ‘unique flow sig-
    nature’ (also called a “key”)’ based on the packet.”
    Id. slip op.
    at 7 (citing first ’789 patent col. 12 l. 19–col. 13 l.28;
    then
    id. col. 33
    l. 30–col. 34 l. 33). An “analyzer subsystem”
    then “determines whether the packet, based on this signa-
    ture or key, has a corresponding entry in the flow-entry da-
    tabase.”
    Id. (citing ’789
    patent col. 13 l. 60–col. 16 l. 52). If
    there is a corresponding entry, the flow-entry is updated,
    and additional operations may be performed to “fully
    Case: 19-2041    Document: 56      Page: 11    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.        11
    characterize” the associated conversational flow.
    Id. (citing ’789
    patent col. 14 ll. 54–61). If there is no corresponding
    entry, a new entry is created and “protocol and state iden-
    tification process 318 further determines . . . the protocols”
    and part of the state sequence the packet belongs to.
    Id. slip. op.
    at 8 (citing ’789 patent col. 14 ll. 44–53).
    According to the district court, prior art monitors could
    not identify disjointed connection flows as belonging to the
    same conversational flow, but the claimed invention could
    provide a granular, nuanced, and useful classification of
    network traffic.
    Id. slip op.
    at 10. The court found that the
    metrics made possible by the recited invention improved
    quality and performance of traffic flows.
    Id. slip. op.
    at 11.
    Specifically, the monitors had an improved ability to clas-
    sify and diagnose network congestion while providing in-
    creased network visibility to identify intrusions and
    malicious attacks.
    Id. With this
    factual background, the court applied the Al-
    ice framework. First, the court rejected NetScout’s argu-
    ment that claim 19 is directed to the collection, comparison,
    and classification of information. The court instead held
    that the claim was directed to “solving a discrete technical
    problem: relating disjointed connection flows to each
    other.”
    Id. slip. op.
    at 30. The court determined that the
    claim was directed to “specific technological solutions, such
    as identifying and refining a conversational flow so that
    different connection flows can be associated with each
    other and ultimately an underlying application or proto-
    col.”
    Id. At step
    one, the district court also rejected
    NetScout’s argument that the claims are directed to an ab-
    stract idea because they do not explain how to determine
    whether packets belong to a conversational flow. Accord-
    ing to the district court, NetScout’s argument focused on
    the claims in isolation instead of the claims as read in light
    of the specification. In the court’s view, the claims and
    specification “[t]aken together . . . teach how to identify
    that certain packets belong to the same conversational
    Case: 19-2041    Document: 56      Page: 12    Filed: 07/14/2020
    12       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    flow,” especially in light of NetScout’s expert’s testimony
    that the patents describe how one would identify and clas-
    sify different connections into a conversational flow.
    Id. slip op.
    at 32.
    Despite finding that the claims were not directed to an
    abstract idea, the court proceeded to step two of the Alice
    analysis, holding that NetScout failed to show that the
    combination of elements in the claims would have been re-
    garded as conventional, routine, or well-known by a skilled
    artisan at the time of the invention.
    In this appeal, NetScout maintains that the claims are
    directed to the abstract idea of collecting, comparing, and
    classifying packet information. NetScout submits that,
    even if the claims are directed to a technical problem—the
    need to correlate disjointed connection flows—they are not
    directed to a specific implementation of a solution of that
    problem. According to NetScout, the district court erred by
    considering the specification’s teachings of how to identify
    packets belonging to the same conversational flow.
    NetScout then argues that, at step two, the claims lack an
    inventive concept because the recited components in the
    claim are standard, off-the-shelf components, used in every
    probe.
    Packet Intelligence counters that the district court cor-
    rectly held that the claims are not directed to an unpatent-
    able abstract idea. Packet Intelligence faults NetScout for
    oversimplifying the claims and maintains that the district
    court was correct to consider the specification in its analy-
    sis. Packet Intelligence further submits that the claims are
    directed to a technical problem and, as the district court
    found, recite an unconventional technological solution, con-
    structing conversational flows that associate connection
    flows with each other and ultimately specific applications
    or protocols. Even if the claims were directed to an abstract
    idea, however, Packet Intelligence argues that NetScout
    has failed to show clear error in the district court’s fact
    Case: 19-2041    Document: 56      Page: 13    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.        13
    findings at step two that the invention’s components were
    not routine or conventional.
    We agree with Packet Intelligence that claim 19 is not
    directed to an abstract idea. In our eligibility analysis, we
    consider the claim as a whole, Diamond v. Diehr, 
    450 U.S. 175
    , 188 (1981), and read it in light of the specification,
    Data Engine Techs. LLC v. Google LLC, 
    906 F.3d 999
    , 1011
    (Fed. Cir. 2018). We have recognized that “software-based
    innovations can make ‘non-abstract improvements to com-
    puter technology’ and be deemed patent-eligible subject
    matter at step 1.” Finjan, Inc. v. Blue Coat Sys., Inc., 
    879 F.3d 1299
    , 1304 (Fed. Cir. 2018) (quoting Enfish, LLC v.
    Microsoft Corp., 
    822 F.3d 1327
    , 1335–36 (Fed. Cir. 2016)).
    And at step one, we consider whether the “focus of the
    claims is on [a] specific asserted improvement in computer
    capabilities . . . or, instead, on a process that qualifies as
    an ‘abstract idea’ for which computers are invoked merely
    as a tool.” 
    Enfish, 822 F.3d at 1335
    –36. In Enfish, for ex-
    ample, we held that a claim to a self-referential table was
    not directed to an abstract idea because the table embodies
    an improvement in the way computers operate.
    Id. In reaching
    that conclusion, we explained that the specifica-
    tion taught that the self-referential table functioned differ-
    ently from conventional databases, providing increased
    flexibility, faster search times, and smaller memory re-
    quirements.
    Id. at 1337.
          Likewise, in SRI International, Inc. v. Cisco Systems,
    Inc., 
    930 F.3d 1295
    (Fed. Cir. 2019), cert. denied, 
    140 S. Ct. 1108
    (2020) (Mem.), we held claims drawn to a method of
    hierarchical computer network monitoring to be patent-el-
    igible. The SRI claims recited a series of steps, including
    “deploying” network monitors, which detect “suspicious
    network activity based on analysis of network traffic data,”
    and generate and integrate “reports of . . . suspicious activ-
    ity.”
    Id. at 1301.
    At step one, we held that the claims were
    not directed to an abstract idea because they were “neces-
    sarily rooted in computer technology in order to solve a
    Case: 19-2041    Document: 56      Page: 14    Filed: 07/14/2020
    14       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    specific problem in the realm of computer networks.”
    Id. at 1303.
    We recognized that the claims were not using a
    computer as a tool but, instead, recited a specific technique
    for improving computer network security. In informing our
    understanding of the technology and its relationship to the
    art, we relied on statements in the specification that the
    claimed invention purported to solve weaknesses in the
    prior art by providing a framework for recognition of global
    threats to interdomain connectivity. As relevant here, the
    SRI claims recited general steps for network monitoring
    with minimal detail present in the claim limitations them-
    selves.
    Like the SRI claims, claim 19 purports to meet a chal-
    lenge unique to computer networks, identifying disjointed
    connection flows in a network environment. The claim
    solves a technological problem by identifying and refining
    a conversational flow such that different connection flows
    can be associated with each other and ultimately with an
    underlying application or protocol. The claims detail how
    this is achieved in several steps. The claimed “parser sub-
    system” extracts information from the packet. This packet
    information is checked against “flow-entry memory” by the
    claimed “lookup engine.” The flow insertion engine coupled
    to the memory and the lookup engine determines whether
    the packet matches an entry in the flow-entry database. If
    there is a match, the flow insertion engine updates the
    matching entry with data from the new packet. If there is
    no match, the engine creates a new entry.
    The asserted patents’ specifications make clear that
    the claimed invention presented a technological solution to
    a technological problem. The specifications explain that
    known network monitors were unable to identify disjointed
    connection flows to each other, and the focus of the claims
    is a specific improvement in computer technology: a more
    granular, nuanced, and useful classification of network
    traffic. See, e.g., ’751 patent col. 2 ll. 53–56; col. 3 l. 2–
    col. 4 l. 6. The specifications likewise explain how the
    Case: 19-2041    Document: 56      Page: 15     Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.         15
    elements recited in the claims refer to specific technological
    features functioning together to provide that granular, nu-
    anced, and useful classification of network traffic, rather
    than an abstract result. See, e.g., ’789 patent col. 23 l. 38—
    col. 27 l. 50 (describing the technological implementation of
    the lookup engine and flow insertion engine as used in the
    claims); see also ’725 patent col. 10 l. 3—col. 13 l. 4.
    In its argument regarding step one of the Alice analy-
    sis, NetScout argues that Two-Way Media Ltd. v. Comcast
    Cable Commc’ns, LLC, 
    874 F.3d 1329
    (Fed. Cir. 2017), lim-
    its our consideration of the specification’s concrete embod-
    iments, including Figure 2. But we need not rely on the
    specific data disclosed in Figure 2 of the specification to de-
    termine that claim 19 is not directed to an abstract idea.
    Regardless, Two-Way Media does not support NetScout’s
    view. In Two-Way Media, this court commented that at
    step two, the claim, not the specification, must include an
    inventive concept.
    Id. at 1338
    (“The main problem that
    Two-Way Media cannot overcome is that the claim—as op-
    posed to something purportedly described in the specifica-
    tion—is missing an inventive concept.”). Here, because we
    have concluded that the claims are not directed to an ab-
    stract idea, we do not reach step two. 
    SRI, 930 F.3d at 1304
     (citing 
    Enfish, 822 F.3d at 1339
    ). Because the parties treat
    claim 19 as representative of all asserted claims, we there-
    fore conclude that all asserted claims are patent-eligible.
    III. Invalidity under § 102
    At trial, NetScout presented the jury with its theory
    that the asserted patents are invalid under § 102(f) for fail-
    ure to list the RMON Working Group as inventors. Specif-
    ically, NetScout argued that the RMON Working Group
    devised the “Track Sessions” probe functionality that re-
    lates connection flows into conversational flows as claimed
    in the patents. Track Sessions allows probe software to join
    together first connections starting on well-known ports
    with second connections that are on dynamically assigned
    Case: 19-2041    Document: 56     Page: 16    Filed: 07/14/2020
    16       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    ports by remembering the port assignments. Version 4.5
    of Track Sessions was available in October 1998, before the
    June 30, 1999 priority date of the asserted patents.
    To support its inventorship theory, NetScout relied on
    testimony from its expert, Mr. Waldbusser, who main-
    tained that the Track Sessions Probe as implemented could
    correlate packets associated with an activity, even though
    those packets were exchanged via different connection
    flows with different port numbers. NetScout also points to
    testimony from a named inventor of the asserted patents,
    Mr. Dietz, who stated that he was aware of the RMON
    Working Group’s publications, including Track Sessions.
    NetScout also submits that the claims are at least antici-
    pated by the Track Sessions probe.
    Packet Intelligence contends that the jury’s rejection of
    NetScout’s § 102 challenge is supported by substantial ev-
    idence. Packet Intelligence faults Mr. Waldbusser for fail-
    ing to consider the limitations of claim 19, instead focusing
    more generally on “conversational flows,” and points to
    Dr. Almeroth’s testimony that Track Sessions counts all of
    the packets in a conversational flow as a single flow entry,
    as opposed to correlating several connection flows. Packet
    Intelligence also cites Dr. Almeroth’s testimony that Track
    Sessions fails to provide visibility into application content
    and is limited to providing network layer information.
    The district court rejected NetScout’s motion for judg-
    ment as a matter of law on its inventorship and anticipa-
    tion defenses, holding that the jury’s verdict is supported
    by substantial evidence. In support, the court cited Dr. Al-
    meroth’s testimony that Mr. Waldbusser failed to analyze
    the claim language as written and that the NetScout probe
    did not associate connection flows but, instead, replaced
    one flow with another.
    We agree with the district court that the jury’s verdict
    is supported by substantial evidence. While NetScout asks
    us to accept its interpretation of the record, the jury was
    Case: 19-2041    Document: 56     Page: 17    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.       17
    permitted to weigh Dr. Almeroth’s testimony over that of
    Mr. Waldbusser. 
    Reeves, 530 U.S. at 150
    –51. Specifically,
    Dr. Almeroth testified that Track Sessions attributes all
    packets of a protocol that starts sessions on well-known
    ports or sockets and then transfers them to dynamically
    assigned ports or sockets thereafter. In Dr. Almeroth’s
    view, this generates one flow entry, which is different from
    a conversational flow that relates different independent
    flows to each other. J.A. 1924. Dr. Almeroth further testi-
    fied that Track Sessions requires knowledge of the port
    number to determine an application identity and does not
    work unless the initial port is well known. J.A. 1925. Ac-
    cording to Dr. Almeroth, Track Sessions describes “just
    having one flow-entry that’s changed, as opposed to main-
    taining existing flow-entries, creating new flow-entries,
    and then correlating and relating those flow-entries to-
    gether to create conversational flows,” instead providing
    for “just swap[ping] out the port number and maintain[ing]
    one flow-entry.” J.A. 1940. Dr. Almeroth also disagreed
    with Mr. Waldbusser that Track Sessions had visibility
    into application data itself and faulted Mr. Waldbusser for
    combining source code from two references—Versions 4.5.0
    and 4.5.3 of Track Sessions—in his anticipation analysis.
    The jury was entitled to credit Dr. Almeroth’s testimony
    over Mr. Waldbusser’s, and, drawing all inferences in favor
    of the jury verdict and accepting the jury’s credibility de-
    terminations, the jury’s verdict on NetScout’s inventorship
    defense is supported by substantial evidence.
    Likewise, the jury was permitted to credit Dr. Alme-
    roth’s testimony that Track Sessions fails to meet claim
    19’s memory limitation, and the jury’s verdict regarding
    anticipation is also accordingly supported by substantial
    evidence.
    NetScout also appears to argue that the district court’s
    acceptance of Dr. Almeroth’s testimony regarding separate
    flow entries for a single conversational flow is a new issue
    of claim construction. But a review of the trial transcript
    Case: 19-2041     Document: 56      Page: 18    Filed: 07/14/2020
    18       PACKET INTELLIGENCE LLC    v. NETSCOUT SYSTEMS, INC.
    reveals that NetScout failed to object during the challenged
    portion of Dr. Almeroth’s testimony, including during his
    testimony regarding his understanding of what the claims
    require. Contrary to NetScout’s view, if it understood
    Dr. Almeroth to be testifying inconsistently with the dis-
    trict court’s claim construction order or testifying to mate-
    rial beyond of the scope of his report, NetScout was
    required to object at trial to preserve its arguments for
    judgment as a matter of law. And NetScout’s failure to ob-
    ject amounts to waiver of these issues. See, e.g., Hewlett-
    Packard Co. v. Mustek Sys., Inc., 
    340 F.3d 1314
    , 1321 (Fed.
    Cir. 2003) (“[W]here the parties and the district court elect
    to provide the jury only with the claim language itself, and
    do not provide an interpretation of the language in the light
    of the specification and the prosecution history, it is too late
    at the JMOL stage to argue for or adopt a new and more
    detailed interpretation of the claim language and test the
    jury verdict by that new and more detailed interpreta-
    tion”); Solvay S.A. v. Honeywell Int’l Inc., 
    742 F.3d 998
    ,
    1004 (Fed. Cir. 2014) (holding claim construction argument
    waived when party failed to request modification or clarifi-
    cation of the claim construction when the issue surfaced at
    trial). Thus, our analysis is confined to whether substan-
    tial evidence supports the jury’s verdict under the undis-
    puted claim construction at trial, 
    Hewlett-Packard, 340 F.3d at 1320
    , and we conclude that it does.
    IV. Pre-suit damages
    NetScout asserts that is not subject to pre-suit dam-
    ages because Packet Intelligence’s licensees failed to
    properly mark their patent-practicing products. Before fil-
    ing the instant suit, Packet Intelligence licensed the as-
    serted patents to Exar, Cisco, and Huawei, which were
    alleged to have produced unmarked, patent-practicing
    products. The ’789 patent is subject to the marking re-
    quirement of 35 U.S.C. § 287(a), and the availability of pre-
    suit damages for the ’789 patent hinges on whether Exar’s
    MeterFlow product was appropriately marked. If pre-suit
    Case: 19-2041    Document: 56      Page: 19    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.          19
    damages cannot be supported for the ’789 patent, Packet
    Intelligence submits that we can uphold the jury’s damages
    award based on infringement of the ’725 and ’751 patents,
    method patents that are not subject to the marking re-
    quirement.
    A. Marking
    When the district court charged the jury in this case,
    this court had not yet ruled on which party bears the bur-
    den of proving compliance with the marking statute. After
    the verdict, we held that an alleged infringer “bears an in-
    itial burden of production to articulate the products it be-
    lieves are unmarked ‘patented articles’ subject to [the
    marking requirement]” in Arctic Cat Inc. v. Bombardier
    Recreational Prods. Inc., 
    876 F.3d 1350
    , 1368 (Fed. Cir.
    2017). We held that the initial burden was a “low bar” and
    that the alleged infringer needed only to put the patentee
    on notice that certain licensees sold specific unmarked
    products that the alleged infringer believes practice the pa-
    tent.
    Id. The burden
    then fell on the patentee to prove that
    the identified products do not practice the patent-at-issue.
    Id. Here, the
    district court’s jury instruction is in tension
    with the later decision in Arctic Cat, as it appears to place
    the burden on NetScout to show that the Exar, Huawei,
    and Cisco products practice the ’789 patent:
    Any damages for infringement of the ’789 patent
    commence on the date that NetScout has both in-
    fringed and been notified of the alleged infringe-
    ment of the ’789 patent. In considering if NetScout
    has been notified of the alleged infringement,
    NetScout must first show the existence of a patented
    article. A patented article is a licensed product that
    practices one or more claims of the ’789 patent. If
    NetScout does not show the existence of a patented
    article, Packet Intelligence is permitted to collect
    Case: 19-2041     Document: 56     Page: 20    Filed: 07/14/2020
    20        PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    damages going six years before the filing of the com-
    plaint in this case for the ’789 patent.
    However, if you find that Packet Intelligence’s li-
    censed products include the claimed invention of
    the ’789 patent, you must determine whether
    Packet Intelligence required that those products be
    marked with the ’789 patent number. . . .
    Packet Intelligence has the burden of establishing
    that it substantially complied with the marking re-
    quirement. This means Packet Intelligence must
    show that it made reasonable efforts to ensure that
    its licensees who made, offered for sale, or sold
    products under the ’789 patent marked the prod-
    ucts. If you find that Packet Intelligence has not
    made reasonable efforts to ensure that its licensees
    who made, offered for sale, or sold products under
    the ’789 patent marked the products, then the par-
    ties agree that NetScout first received actual notice
    of the ’789 patent and that actual notice was on
    March 15, 2016, and any damages for the ’789 pa-
    tent can only begin on that date.
    Transcript of Jury Trial at 47:11–48:20, Packet Intelligence
    LLC v. NetScout Sys., No. 2:16-cv-230-JRG (E.D. Tex. Oct.
    13, 2017), ECF No. 252 (emphasis added). After receiving
    this instruction, the jury rejected NetScout’s marking de-
    fense, awarding Packet Intelligence $3,500,000 in damages
    to compensate for pre-suit infringement. Verdict Form,
    Packet Intelligence LLC v. NetScout Sys., Inc., No. 2:16-cv-
    230-JRG (Oct. 13, 2017), ECF No. 237.
    NetScout moved for judgment as a matter of law, argu-
    ing that Packet Intelligence failed to present any evidence
    to the jury that the Exar, Huawei, and Cisco products do
    not practice the patent or were not properly marked, but
    the district court denied NetScout’s motion. The district
    court found that the jury had a substantial evidentiary ba-
    sis to conclude that Packet Intelligence was not obligated
    Case: 19-2041    Document: 56      Page: 21     Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.         21
    to mark the MeterFlow products. Packet Intelligence LLC
    v. NetScout Sys., Inc., 
    2019 WL 2375218
    , at *5 (E.D. Tex.
    June 5, 2019). We will consider Exar’s MeterFlow product
    alone, as it is dispositive in our analysis.
    NetScout argues that Packet Intelligence is not enti-
    tled to pre-suit damages for the ’789 patent because it
    failed to prove that MeterFlow, an unmarked product, did
    not practice the ’789 patent. Specifically, NetScout faults
    the court for relying on Mr. Dietz’s testimony because he
    testified about MeterWorks, not MeterFlow, and because
    he did not testify that the MeterFlow product did not prac-
    tice the patent.
    In response to NetScout’s argument, Packet Intelli-
    gence appears to argue that NetScout bears the burden of
    establishing that the MeterFlow products practiced any
    claims of the ’789 patent because it failed to object to the
    district court’s jury instruction or seek a new trial based on
    Arctic Cat.
    As a preliminary matter, we disagree that the failure
    to object decides this matter. We are bound by the law, not
    by the jury charge, even if the charge was not objected to.
    Markman v. Westview Instruments, Inc., 
    52 F.3d 967
    , 975
    n.5 (Fed. Cir. 1995) (en banc). And NetScout’s failure to
    object to the district court’s jury instruction does not render
    the instruction law of the case for evaluating the suffi-
    ciency of the evidence. Boyle v. United Techs. Corp., 
    487 U.S. 500
    , 514 (1988) (citing City of St. Louis v. Praprotnik,
    
    485 U.S. 112
    , 120 (1988) (plurality opinion)).
    Under the standard articulated in Arctic Cat, NetScout
    bore the preliminary burden of identifying unmarked prod-
    ucts that it believed practice the ’789 patent. It is undis-
    puted that NetScout adequately identified Exar’s
    MeterFlow product. Packet Intelligence then bore the bur-
    den of proving that MeterFlow did not practice at least one
    claim of the ’789 patent. See Arctic 
    Cat, 876 F.3d at 1369
    .
    Case: 19-2041    Document: 56     Page: 22    Filed: 07/14/2020
    22       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    Packet Intelligence submits that it met its burden in
    two ways: (1) by showing that the MeterFlow product was
    mentioned in a provisional application that the ’789 patent
    claims priority from and that the inventors removed that
    reference before filing non-provisional applications, and (2)
    with testimony from Mr. Dietz, a named inventor, who
    stated that MeterWorks, a different product, did not em-
    body his invention. This evidence is, however, insufficient
    to carry Packet Intelligence’s burden of proving that the
    MeterFlow product does not practice the ’789 patent. The
    fact that the inventors chose to cease referencing Meter-
    Flow in later patent applications does not support the in-
    ference that MeterFlow does not practice the patent.
    Mr. Dietz testified that the reference to MeterFlow was re-
    moved because MeterFlow was software that “evolved,”
    and using the term would have suggested that past ver-
    sions of the software using the “marketing term” Meter-
    Flow “were the current version.”          J.A. 1122:15–24.
    Crediting Mr. Dietz’s testimony, it appears that the exclu-
    sion of MeterFlow was to prevent “confusion” about an
    evolving product, J.A. 1122:21–22, not to comment on
    whether MeterFlow practiced the ’789 patent.
    Packet Intelligence also relies on Mr. Dietz’s testimony
    that MeterWorks did not embody the invention. But
    Mr. Dietz was not qualified as an expert in this case and
    did not provide an infringement opinion regarding the Me-
    terFlow product. Mr. Dietz testified to the ultimate ques-
    tion of noninfringement about a different Exar product,
    MeterWorks. Even if Mr. Dietz had testified about the cor-
    rect product and was permitted to offer an expert opinion
    on whether MeterFlow practiced the asserted claims, his
    conclusory testimony failed to address what claim limita-
    tions were purportedly missing from the product and would
    have been insufficient to carry Packet Intelligence’s burden
    of proving that MeterFlow did not practice the ’789 patent.
    Because Packet Intelligence failed to present substan-
    tial evidence to the jury that matched the limitations in
    Case: 19-2041    Document: 56     Page: 23    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.       23
    any claim of the ’789 patent to the features of the Meter-
    Flow product, NetScout is entitled to judgment as a matter
    of law that it is not liable for pre-suit damages based on
    infringement of the ’789 patent.
    B. Method Patents
    In an attempt to preserve the jury verdict, Packet In-
    telligence argues that the pre-suit damages award can be
    supported by evidence of direct infringement of the’725 and
    ’751 patent. The district court agreed with Packet Intelli-
    gence, relying on Dr. Almeroth’s testimony that the
    NetScout products were used for testing and in the field,
    Mr. Marwaha’s testimony that NetScout technicians im-
    plement the accused products at customer sites, and
    Mr. Lindahl’s testimony that NetScout customers pay
    NetScout to use its equipment to monitor their networks
    and do analyses or troubleshooting. The court also cited
    Mr. Bergman’s testimony that these activities drive the
    sales of products and revenue to NetScout, which sup-
    ported that NetScout’s own use of the claimed methods
    drove the U.S. sales of the accused products and justified
    pre-suit damages for infringement of the method patents.
    NetScout maintains that its internal use and testing of
    allegedly infringing methods cannot support pre-suit dam-
    ages under these patents. According to NetScout, there
    was no evidence of specific instances of NetScout’s use of
    the accused products, and the district court relied on evi-
    dence that was too general regarding field use. Packet In-
    telligence counters that there was ample evidence
    presented at trial that NetScout used its own products to
    drive the sales of products and revenue to NetScout and
    that this activity contributed to the product sales that com-
    prise the royalty base.
    We disagree with Packet Intelligence. Method claims
    are “not directly infringed by the mere sale of an apparatus
    capable of performing the claimed process.” Joy Techs.,
    Inc. v. Flakt, Inc., 
    6 F.3d 770
    , 773 (Fed. Cir. 1993).
    Case: 19-2041    Document: 56      Page: 24     Filed: 07/14/2020
    24       PACKET INTELLIGENCE LLC    v. NETSCOUT SYSTEMS, INC.
    Therefore, Packet Intelligence cannot simply count sales of
    the software accused of infringing the ’789 patent as sales
    of the method claimed in the ’725 and ’751 patents. In-
    stead, Packet Intelligence was required to produce evi-
    dence that the claimed method was actually used and
    hence infringed. Packet Intelligence advanced a theory
    that NetScout’s internal testing, customer support, and
    customer training was pre-suit activity infringing the
    method patents and thus supporting damages. But there
    is no evidence supporting damages caused by or resulting
    from these pre-suit activities. Mr. Bergman, Packet Intel-
    ligence’s damages expert, applied a calculated reasonable
    royalty to revenue from NetScout’s sales of the GeoBlade
    and GeoProbe G10 products—occurring both before and af-
    ter the suit was filed. The damages base was not tailored
    to any alleged internal use of the claimed methods.
    The district court held that the jury had a sufficient ba-
    sis to find that NetScout’s internal use of the claimed meth-
    ods “drove U.S. sales of the Accused Products and justified
    an award of pre-suit damages for the ’725 and ’751 method
    patents.” Packet Intelligence LLC v. NetScout Sys., Inc.,
    
    2019 WL 2375218
    , at *7 (E.D. Tex. June 5, 2019). In con-
    cluding that the jury had a reasonable basis for its pre-suit
    damages award, the court relied on its instruction to the
    jury that it “may consider ‘the effect of selling the patented
    specialty in promoting sales of other products of the licen-
    see, the existing value of the invention to the licensee as a
    generator of sales of its non-patented items, and the extent
    of such derivative or convoyed sales.’”
    Id. But Mr.
    Berg-
    man did not present a damages theory to the jury based on
    derivative or convoyed sales. Mr. Bergman did testify that
    some non-accused NetScout products would be degraded if
    NetScout did not have access to the accused technology, but
    after taking those products into account, Mr. Bergman only
    concluded “that the reasonable royalty in this case . . .
    would be three and a half percent.” J.A. 1439–40. At no
    point did Mr. Bergman opine that non-accused products
    Case: 19-2041    Document: 56      Page: 25    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.        25
    should be included in the royalty base, and Packet Intelli-
    gence’s current damages theory is wholly unsupported by
    the record.
    Even if NetScout’s own use of the patented method
    drove sales for the GeoBlade and GeoProbe G10 products,
    that fact would only justify instances of internal use being
    counted as part of the royalty base. Packet Intelligence is
    barred from recovering damages for pre-suit sales of the
    GeoBlade and GeoProbe G10 products because it failed to
    comply with the marking requirement. It cannot circum-
    vent § 287 and include those products in its royalty base
    simply by arguing that NetScout’s infringement of related
    method claims drove sales. Because neither the record nor
    the law supports Packet Intelligence’s recovery of pre-suit
    damages for any of the asserted patents, NetScout is enti-
    tled to judgment as a matter of law on this issue.
    V. Willfulness
    Finally, NetScout appeals the willfulness judgment.
    The jury returned a verdict finding that NetScout’s in-
    fringement was willful. NetScout moved for judgment as a
    matter of law on willfulness, but the district court denied
    its motion. NetScout maintains that its infringement was
    not willful, challenging the jury’s evaluation of the facts.
    Specifically, NetScout contests that its executives’ lack of
    knowledge regarding the patents and continued infringing
    activity after this suit was filed cannot support willfulness.
    Packet Intelligence responds that the jury’s willfulness
    verdict was supported by substantial evidence and should
    be accorded deference.
    We agree with Packet Intelligence. At trial, NetScout’s
    corporate representative, Mr. Kenedi, admitted that he did
    not read the patents but still testified that he believed
    Mr. Dietz lied and stole the claimed inventions. NetScout’s
    CEO, Mr. Singhal, testified that he could not recall ever re-
    viewing the asserted patents and confirmed that, even
    though NetScout was phasing out the accused products, he
    Case: 19-2041     Document: 56    Page: 26    Filed: 07/14/2020
    26       PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    would sell one to a customer if the product was demanded.
    The jury was permitted to credit this evidence and to draw
    the inference that NetScout willfully infringed Packet In-
    telligence’s patent rights. In reviewing a motion for judg-
    ment as a matter of law, we draw all reasonable inferences
    most favorable to the verdict, and, under this standard of
    review, we conclude that the jury’s willfulness verdict is
    supported by substantial evidence.
    CONCLUSION
    We have considered the parties’ remaining arguments
    but find them unpersuasive. Accordingly, the judgment of
    the district court is affirmed as to infringement, validity,
    and willfulness. The district court’s award of pre-suit dam-
    ages is reversed, and any enhancement thereof is vacated.
    AFFIRMED-IN-PART, REVERSED-IN-PART,
    VACATED-IN-PART, AND REMANDED
    COSTS
    No costs.
    Case: 19-2041     Document: 56      Page: 27     Filed: 07/14/2020
    United States Court of Appeals
    for the Federal Circuit
    ______________________
    PACKET INTELLIGENCE LLC,
    Plaintiff-Appellee
    v.
    NETSCOUT SYSTEMS, INC., NETSCOUT SYSTEMS
    TEXAS, LLC, FKA TEKTRONIX TEXAS, LLC DBA
    TEKTRONIX COMMUNICATIONS,
    Defendants-Appellants
    ______________________
    2019-2041
    ______________________
    Appeal from the United States District Court for the
    Eastern District of Texas in No. 2:16-cv-00230-JRG, Judge
    J. Rodney Gilstrap.
    ______________________
    REYNA, Circuit Judge, concurring-in-part, dissenting-in-
    part.
    I join the majority’s reasoning and conclusions as to all
    issues except the patentability of the asserted claims under
    § 101. In my view, the claims are directed to the abstract
    idea of identifying data packets as belonging to “conversa-
    tional flows” rather than discrete “connection flows.” While
    the claimed implementations of this idea may ultimately
    contain inventive concepts that save the claims, it was
    clear error for the district court to base its finding of inven-
    tiveness on the abstract idea itself and its attendant bene-
    fits. Accordingly, I would vacate the district court’s
    Case: 19-2041    Document: 56      Page: 28    Filed: 07/14/2020
    2        PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    judgment of patent eligibility and remand for the court to
    make factual findings as to whether the components and
    operations actually recited in each claim amount to more
    than what was merely routine and conventional in the art.
    I
    In assessing the subject matter eligibility of patent
    claims under § 101, we first begin at Step 1 of Alice by de-
    termining whether the claims at issue are “directed to” a
    patent-ineligible concept. Alice Corp. Pty. v. CLS Bank
    Int’l, 
    573 U.S. 208
    , 218 (2014). To do so, we look to “the fo-
    cus of the claimed advance over the prior art” to determine
    if the character of the claim as a whole, considered in light
    of the specification, is directed to excluded subject mat-
    ter. Trading Techs. Int’l, Inc. v. IBG LLC, 
    921 F.3d 1378
    ,
    1384 (Fed. Cir. 2019); see also Intellectual Ventures I LLC
    v. Capital One Fin. Corp., 
    850 F.3d 1332
    , 1338 (Fed. Cir.
    2017) (quoting Affinity Labs of Tex., LLC v. DIRECTV,
    LLC, 
    838 F.3d 1253
    , 1257 (Fed. Cir. 2016)); Enfish, LLC v.
    Microsoft Corp., 
    822 F.3d 1327
    , 1335 (Fed. Cir. 2016).
    Here, claim 19 of U.S. Patent No. 6,954,789 (the “’789
    patent”), which the parties treat as representative of the
    asserted claims, recites a “packet monitor for examining
    packets” with various components. The components are
    configured to extract information from passing packets;
    store “flow-entries for previously encountered conversa-
    tional flows,” each “identified by identifying information”;
    compare information extracted from each passing packet to
    flow-entries in the flow-entry memory; and either classify
    the packet as belonging to an existing flow if there is a
    match, or create a new flow-entry if there is not.
    The specification makes clear that “[w]hat distin-
    guishes this invention from prior art network monitors is
    that it has the ability to recognize disjointed flows as be-
    longing to the same conversational flow.” ’789 patent, col.
    3 ll. 56–59. That term, “conversational flow,” is one coined
    by the inventors to describe “the sequence of packets that
    Case: 19-2041    Document: 56      Page: 29    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.         3
    are exchanged in any direction as a result of any activity.”
    Id. at col.
    2 ll. 45–47. The specification contrasts this type
    of flow with the “connection flows” that were tracked by
    prior art monitors, which merely represented “all packets
    involved with a single connection.”
    Id. at col.
    2 ll. 42–50.
    In other words, the asserted advance over the prior art is
    the classification of data packets according to the flow of
    data associated with given activities rather than poten-
    tially disjointed exchanges transmitted over individual
    connections.
    The majority characterizes this as a “technological so-
    lution to a technological problem” in the form of a “more
    granular, nuanced, and useful classification of network
    traffic.” Slip Op. 14. On that basis, the majority concludes
    that the asserted claims are not directed to an abstract idea
    at Alice Step 1. But if the technological problem at issue
    was that prior art monitors could not recognize packets
    from multiple connections as belonging to the same conver-
    sational flow, then the “solution” of classifying network
    traffic according to conversational flows rather than con-
    nection flows is conceptual, not technological, in the ab-
    sence of specific means by which that classification is
    achieved.
    Here, claim 19 recites computer components that per-
    form the operations of extracting, storing, and comparing
    unspecified “identifying information” in order to “classify”
    data packets by flow. Other than the bare statement that
    the flow entries stored in the database are “for previously
    encountered conversational flows,” the claimed operations
    describe only a general method of sorting data packets ac-
    cording to any flow, not a specific means of sorting packets
    by conversational flow. Crucially, the claim does not recite
    how the individual packets are actually “identified” as be-
    longing to a conversational flow beyond the functional re-
    quirement that “identifying information” is used. ’789
    patent, col. 36 l. 31—col. 37 l. 2. Yet, the specification ex-
    plains that to implement the invention, the information
    Case: 19-2041     Document: 56      Page: 30     Filed: 07/14/2020
    4        PACKET INTELLIGENCE LLC     v. NETSCOUT SYSTEMS, INC.
    necessary for identifying a conversational flow must be
    “adaptively determined” through an iterative process in
    which increasingly specific “signatures” are generated
    through analysis of patterns in the sequence of passing
    packets.
    Id. at col.
    4 ll. 10–13; col. 10 l. 16—col. 11 l. 34. In
    the preferred embodiment, the pattern analysis process is
    governed by a “parsing-pattern-structures and extraction-
    operations database” compiled from “protocol description
    language files” that describe “patterns and states of all pro-
    tocols that [c]an occur at any layer, including . . . what
    information to extract for the purpose of identifying a flow,
    and ultimately, applications and services.” See
    id. at col.
     11 l. 66—col. 12 l. 62. None of these processes or compo-
    nents are recited in claim 19, and the claim elements have
    not been construed as limited to the structures and pro-
    cesses disclosed in the embodiments.
    Standing alone, the components and operations actu-
    ally recited in the claims do not provide “the specificity re-
    quired to transform a claim from one claiming only a result
    to one claiming a way of achieving it.” SAP Am., Inc. v.
    InvestPic, LLC, 
    898 F.3d 1161
    , 1167 (Fed. Cir. 2018); see
    also McRO, Inc. v. Bandai Namco Games Am. Inc., 
    837 F.3d 1299
    , 1314 (Fed. Cir. 2016) (explaining that courts
    must “look to whether the claims in these patents focus on
    a specific means or method that improves the relevant
    technology or are instead directed to a result or effect that
    itself is the abstract idea and merely invoke generic pro-
    cesses and machinery”). In the absence of specific techno-
    logical means for achieving the desired results, we have
    described the mere collection, analysis, and display of in-
    formation as falling within the realm of abstract ideas. See
    Elec. Power Grp., LLC v. Alstom S.A., 
    830 F.3d 1350
    , 1354
    (Fed. Cir. 2016); see also Two-Way Media Ltd. v. Comcast
    Cable Commc’ns, LLC, 
    874 F.3d 1329
    , 1337 (Fed. Cir. 2017)
    (finding a claim directed to an abstract idea when it “re-
    quires the functional results of ‘converting,’ ‘routing,’ ‘con-
    trolling,’ ‘monitoring,’ and ‘accumulating records,’ but does
    Case: 19-2041    Document: 56      Page: 31    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.         5
    not sufficiently describe how to achieve these results in a
    non-abstract way”).
    The absence of a concrete technological solution in
    claim 19 distinguishes it from the claims at issue in SRI.
    See SRI Int’l, Inc. v. Cisco Sys., Inc., 
    930 F.3d 1295
    , 1300
    (Fed. Cir. 2019). There, the patents addressed the problem
    of detecting hackers and network intruders who simulta-
    neously attempt to access multiple computers in a network
    without triggering the alert threshold for any single secu-
    rity monitor at any given location.
    Id. The solution,
    and
    the claimed advance over the prior art, was to deploy and
    integrate reports from multiple network monitors that
    each analyze specific types of data on the network.
    Id. at 1303.
    This specific technique was expressly recited in the
    claims. See
    id. at 1301
    (reciting “deploying a plurality of
    network monitors in the enterprise network” and “detect-
    ing, by the network monitors, suspicious network activity
    based on analysis of network traffic data selected from one
    or more of the following categories [specified in the claim]”
    and “integrating the reports of suspicious activity, by one or
    more hierarchical monitors” (quoting U.S. Patent No.
    6,711,615, col. 15 ll. 2–21) (emphasis added)). The claims
    in SRI disclose how “detecting” by the claimed plurality of
    the monitors is achieved. In this case, the claims do not
    disclose how the desired result of “identif[ying]” packets as
    belonging to a conversational flow is achieved.
    In asserting that the claims are nonetheless directed to
    a specific technological solution, the district court deter-
    mined that “[t]aken together, the claims and the specifica-
    tion do teach how to identify that certain packets belong to
    the same conversational flow.” J.A. 390 (CL59) (emphasis
    added). But the relevant inquiry for § 101 purposes is not
    whether the patent as a whole teaches a concrete means for
    achieving an abstract result, but whether such a concrete
    means is claimed. While a claim must be read “in light of
    the specification” to understand what is claimed and the
    relative significance of the claimed components, see, e.g.
    Case: 19-2041    Document: 56       Page: 32   Filed: 07/14/2020
    6        PACKET INTELLIGENCE LLC    v. NETSCOUT SYSTEMS, INC.
    
    Enfish, 822 F.3d at 1335
    , a court cannot rely on unclaimed
    details in the specification as the “focus” of the claim for
    § 101 purposes. Our case law is clear that the § 101 inquiry
    must be based “on the language of the Asserted Claims
    themselves, and the specification cannot be used to import
    details from the specification if those details are not
    claimed.” ChargePoint, Inc. v. SemaConnect, Inc., 
    920 F.3d 759
    , 769–70 (Fed. Cir. 2019) (citing Synopsys, Inc. v. Men-
    tor Graphics Corp., 
    839 F.3d 1138
    , 1149 (Fed. Cir. 2016)).
    Indeed, this focus on the claimed subject matter distin-
    guishes the § 101 inquiry from the enablement and written
    description inquiries under § 112, which focus on the spec-
    ification as a whole. Contrary to the majority’s suggestion,
    Slip Op. 15, this principle is not limited solely to the Alice
    Step 2 inquiry. See Am. Axle & Mfg., Inc. v. Neapco Hold-
    ings LLC, 
    939 F.3d 1355
    , 1363 (Fed. Cir. 2019) (“We have
    repeatedly held that features that are not claimed are ir-
    relevant as to step 1 or step 2 of the Mayo/Alice analysis.”).
    Indeed, it would be an anomalous result if we were not per-
    mitted to look to unclaimed details at Alice Step 2 in deter-
    mining whether an asserted claim recites an inventive
    concept, but could use the same details as the “focus” of the
    claim at Alice Step 1 to avoid reaching Step 2.
    For these reasons, I believe the asserted claims fail at
    Alice Step 1 and must be examined at Alice Step 2.
    II
    The majority’s opinion does not reach Step 2 of the Al-
    ice framework because it concludes that the claims are not
    directed to an abstract idea at Step 1. Because I conclude
    that the asserted claims are directed to an abstract idea at
    Step 1, and the district court’s analysis at Step 2 was
    flawed, I would vacate and remand for the district court to
    conduct the appropriate analysis as set forth below.
    At Alice Step 2, the court must examine the elements
    of each claim, both individually and as an ordered combi-
    nation, to determine whether it contains an “inventive
    Case: 19-2041    Document: 56     Page: 33    Filed: 07/14/2020
    PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.        7
    concept,” beyond what was “well-understood,” “routine,”
    and “conventional,” that transforms the nature of the claim
    into a patent eligible application. 
    Alice, 573 U.S. at 217
    ,
    225. The issue of “[w]hether something is well-understood,
    routine, and conventional to a skilled artisan at the time of
    the patent is a factual determination.” Berkheimer v. HP
    Inc., 
    881 F.3d 1360
    , 1369 (Fed. Cir. 2018).
    Here, the district court concluded that NetScout failed
    to show that the combination of elements recited in the as-
    serted claims would have been regarded as conventional,
    routine, or well-known by skilled artisans in the relevant
    field. J.A. 391–392. However, the district court expressly
    found that “network monitors that could recognize various
    packets as belonging to the same connection flow were
    well-known in the prior art.” J.A. 367 (FF28). The only
    things identified by the district court as distinguishing the
    claimed monitors from these well-known prior art monitors
    was the ability to identify disjoined connection flows as be-
    longing to the same conversational flow and the attendant
    benefits of that concept. See J.A. 367–368 (FF28–31); J.A.
    392 (CL 67–68). 1 These distinctions are based on nothing
    more than the abstract idea itself, and thus cannot serve
    as inventive concepts supporting patentability at Alice
    Step 2. See BSG Tech LLC v. Buyseasons, Inc., 
    899 F.3d 1281
    , 1291 (Fed. Cir. 2018) (concluding that an alleged in-
    novation of the claim that “simply restates what we have
    1   While the district court found that “the inventions
    recited by the Asserted Claims, in contrast to the prior art,
    make this more granular classification possible,” this find-
    ing referenced functions and features that are not recited
    in the majority of the asserted claims, including claim 19.
    See J.A. 368–369 (FF 32) (citing to portions of the patents
    discussing “maintaining statistical measures in the flow-
    entries related to a conversational flow” and collecting “im-
    portant performance metrics”).
    Case: 19-2041    Document: 56      Page: 34    Filed: 07/14/2020
    8        PACKET INTELLIGENCE LLC   v. NETSCOUT SYSTEMS, INC.
    already determined is an abstract idea” cannot serve as an
    inventive concept at Alice Step 2).
    Accordingly, the district court’s analysis at Alice Step 2
    was clearly erroneous, and remand is required for the court
    to conduct the proper analysis in the first instance. On re-
    mand, the salient factual inquiry should be whether the
    components and operations recited in each claim contain
    anything inventive beyond the abstract concept of classify-
    ing by conversational flow. For example, if the words “con-
    versational flows” were omitted from each asserted claim,
    and replaced with the prior art term, “connection flow,”
    would the ordered combination of recited claim elements
    amount to something more than the generic and routine
    aspects of examining and classifying network traffic? That
    inquiry must be conducted at the level of specificity pre-
    sented by each claim.
    For these reasons, I concur-in-part and dissent-in-part
    from the majority opinion.