DocketNumber: 2007-1201
Filed Date: 4/11/2008
Status: Precedential
Modified Date: 10/15/2015
United States Court of Appeals for the Federal Circuit 2007-1201, -1239 SYMANTEC CORPORATION, Plaintiff/Counterclaim Defendant- Appellant, and HILGRAEVE, INCORPORATED, Plaintiff/Counterclaim Defendant, v. COMPUTER ASSOCIATES INTERNATIONAL, INC., Defendant/Counterclaimant- Cross Appellant, and RICHARD B. LEVIN, Counterclaimant-Cross Appellant. David A. Nelson, Latham & Watkins LLP, of Chicago, Illinois, argued for plaintiff/counterclaim defendant-appellant. With him on the brief was Mark A. Flagel, of Los Angeles, California. On the brief were Daniel A. Boehnen, George I. Lee, and Jeffrey A. Steck, McDonnell Boehnen Hulbert & Berghoff LLP, of Chicago, Illinois. Of counsel on the brief was Joseph Fitzgerald, Symantec Corp., of Cupertino, California. Michael A. Nicodema, Greenberg Traurig LLP, of New York, New York, argued for defendant/counterclaimant-cross appellant. With him on the brief was Gaston Kroub. Gerry J. Elman, Elman Technology Law, P.C, of Swarthmore, Pennsylvania, for counterclaimant-cross-appellant. Appealed from: United States District Court for the Eastern District of Michigan Chief Judge Bernard A. Friedman United States Court of Appeals for the Federal Circuit 2007-1201, -1239 SYMANTEC CORPORATION, Plaintiff/Counterclaim Defendant-Appellant, and HILGRAEVE, INCORPORATED, Plaintiff/Counterclaim Defendant, v. COMPUTER ASSOCIATES INTERNATIONAL, INC., Defendant/Counterclaimant- Cross Appellant, and RICHARD B. LEVIN, Counterclaimant-Cross Appellant. Appeals from the United States District Court for the Eastern District of Michigan in case no. 02-CV-73740, Chief Judge Bernard A. Friedman. ___________________________ DECIDED: April 11, 2008 ___________________________ Before GAJARSA, LINN, and DYK, Circuit Judges. DYK, Circuit Judge. In this patent infringement suit, appellant Symantec Corporation (“Symantec”) appeals from the district court’s grant of summary judgment of non-infringement of claims 1-20 of the asserted patent,U.S. Patent No. 5,319,776
(“the ’776 patent”). Symantec Corp. v. Computer Assocs. Int’l, Inc., No. 02-CV-73740-DT (E.D. Mich. Aug. 31, 2006) (reports and recommendations of magistrate judge). 1 Computer Associates International, Inc. (“CA”), the accused infringer, cross-appeals from the district court’s grant of summary judgment on: (1) the defense of laches; (2) inequitable conduct; (3) invalidity over the prior art; and (4) inventorship.Id.
Richard B. Levin (“Levin”) cross- appeals from the district court’s grant of summary judgment that he was not a co- inventor of the ‘776 patent.Id.
Because we find that the district court erred in its construction of the claim terms “a method of screening data as it is being transferred,” “destination storage medium,” “computer,” and “computer system,” we vacate and remand as to non-infringement and invalidity. We dismiss CA’s cross-appeal as to laches as improper, but we treat laches as an alternative ground for affirming the judgment. We affirm the district court’s decision on laches, inequitable conduct, and inventorship. BACKGROUND The ’776 patent is here for the third time. The patent is directed to the “In Transit Detection of Computer Virus with Safeguard,” and is described in detail in our earlier opinions. See Hilgraeve Corp. v. McAfee Assocs., Inc.,224 F.3d 1349
, 1350-52 (Fed. Cir. 2000) (“Hilgraeve I”); Hilgraeve Corp. v. Symantec Corp.,265 F.3d 1336
, 1338-41 1 The citations are to the reports and recommendations of the magistrate judge. The district court adopted these reports and recommendations in their entirety by order. Symantec, No. 02-CV-73740-DT (E.D. Mich. Jan. 23, 2007) (order accepting and adopting magistrate judge’s reports and recommendations). 2007-1201, -1239 2 (Fed. Cir. 2001) (“Hilgraeve II”). Briefly, the ’776 patent discloses a method of scanning for and detecting computer viruses embedded in data files that are downloaded or copied from a remote server (e.g., via the internet) onto a computer. Critically, the claimed virus-scan operates before the downloaded or copied data files are accessible to the computer’s operating system, thereby allowing the software to block access to those files early enough to prevent the embedded viruses from spreading and infecting the computer. The ’776 patent includes claims 1-20, of which claim 1 and claim 18 are independent. Claim 1 is representative: 1. In a system for transferring digital data for storage in a computer storage medium, a method of screening the data as it is being transferred and automatically inhibiting the storage of screened data containing at least one predefined sequence, comprising the steps of: causing a quantity of digital data resident on a source storage medium to be transferred to a computer system having a destination storage medium; receiving and screening the transferred digital data prior to storage on the destination storage medium to determine if at least one of a plurality of predefined sequences are present in the digital data received; and in response to said screening step: (a) automatically causing the screened digital data to be stored on said destination storage medium if none of the plurality of predefined sequences are present, and (b) automatically inhibiting the screened digital data from being stored on said destination storage medium if at least one predefined sequence is resent. ’776 patent, col.17 ll.9-29 (emphases added). In the ’776 patent’s two prior appearances before this court, the central issue was whether the accused virus-scanning products scanned incoming data files prior to storage. In Hilgraeve I, Hilgraeve, the original assignee of the ’776 patent, brought a 2007-1201, -1239 3 patent infringement suit against McAfee Associates (“McAfee”) for its VirusScan product.224 F.3d at 1350
. The district court granted summary judgment of non- infringement to McAfee, and Hilgraeve appealed.Id.
In that appeal, the parties did not dispute the construction of the claim term “storage,” which the district court had construed as occurring “when the incoming digital data is sufficiently present on the destination storage medium, and accessible by the operating system or other programs, so that any viruses contained in the data can spread and infect the computer system.”Id. at 1351
. In Hilgraeve II, Hilgraeve asserted the same ’776 patent in a separately filed action against Symantec. 265 F.3d at 1338. The district court granted summary judgment of non-infringement to Symantec, and Hilgraeve appealed. Id. On appeal, Hilgraeve challenged the district court’s construction of the term “storage,” which differed from the construction in Hilgraeve I because it did not include the “accessible by the operating system or other programs” language. Id. at 1341. Symantec argued that the term should be construed to occur “when the data become physically present (i.e., magnetically recorded) on the storage medium.” Id. We rejected Symantec’s construction and adopted Hilgraeve’s construction (which was identical to the district court’s construction in Hilgraeve I) of “storage,” holding that “storage” occurred “when the incoming digital data [are] sufficiently present on the destination storage medium and accessible by the operating system or other programs so that any viruses contained in the data can spread and infect the computer system.” Id. at 1342. Subsequent to our decision in Hilgraeve II, Symantec settled its dispute with Hilgraeve, and, as part of that settlement, purchased Hilgraeve’s interest in the ‘776 2007-1201, -1239 4 patent. Hilgraeve had previously filed a new infringement action against CA, alleging infringement of claims 1-20 of the ’776 patent. The district court then substituted Symantec as the plaintiff. CA, the accused infringer here, develops and sells a number of antivirus software products. The accused products are: (1) the eTrust EZ and eTrust products (collectively “the EAV products”), which employ both an incoming and outgoing scan mode; (2) the ARCserve product, which is designed to restore data from a backup media where the data had previously been archived; and (3) the Gateway products, which operate as a proxy between a user’s personal computer and an unattended gateway computer. CA’s initial pleadings denied infringement and asserted affirmative defenses and counterclaims for invalidity and non-infringement. Subsequently, CA amended its pleadings to add affirmative defenses (including a defense of laches) and counterclaims for unenforceability of the ’776 patent due to inequitable conduct, and for invalidity of the ’776 patent under35 U.S.C. § 256
for failing to name alleged co-inventor Levin. The district court also granted Levin’s motion to intervene as a party and assert a claim for co-inventorship of the ’776 patent. As discussed below, the district court construed the terms “a method of screening the data as it is being transferred,” “computer system,” and “destination storage medium”—the critical claim terms on appeal—in an order dated March 16, 2005. Based on its constructions of those terms, it granted summary judgment to CA of non-infringement on the EAV products and the ARCserve product. Although it did not grant summary judgment on the Gateway products, the parties stipulated to non- infringement of the Gateway products under the district court’s claim construction. The 2007-1201, -1239 5 district court also granted summary judgment to Symantec on invalidity, holding that the ’776 patent was not anticipated or obvious in view of several prior art references. Finally, in separate orders, the district court granted summary judgment to Symantec on: CA’s affirmative defense of laches; CA’s claim that the ’776 patent was unenforceable based on inequitable conduct; and CA and Levin’s claim that Levin was a joint inventor of the ’776 patent. Symantec timely appealed; CA and Levin timely cross- appealed. We have jurisdiction pursuant to28 U.S.C. § 1295
(a)(1), except as to CA’s improper cross-appeal on the issue of laches. DISCUSSION We review summary judgment decisions without deference, reapplying the standard used by the district court. Innogenetics, N.V. v. Abbott Labs.,512 F.3d 1363
, 1378 (Fed. Cir. 2008). “Under that standard, summary judgment must be granted when, drawing all reasonable inferences in favor of the non-movant, there is no genuine issue as to any material fact and no reasonable jury could return a verdict for the non- movant.”Id.
I A Symantec’s primary challenge is to the district court’s determination that the term “a method of screening the data as it is being transferred,” appearing in the preambles to the claims, was a claim limitation, and its construction of that phrase to mean “a method of screening the data while it is being moved or copied and before the data is stored to the computer storage medium.” J.A. at 15. These determinations bear 2007-1201, -1239 6 directly on the infringement analysis of each of the accused CA products. The dispute centers on whether the claims cover methods that do not screen data until after that data is written to a storage medium but do conduct screening “prior to storage,” i.e., before the data is accessible to the operating system or to other computer programs. Under the district court’s construction, antivirus programs that screen data at any time after that data is written to the storage medium (e.g., the computer’s hard drive), but before it becomes accessible to the operating system or to other computer programs, fall outside the scope of the “as it is being transferred” limitation, even if screening is completed entirely before the data becomes accessible. This construction, Symantec argues, is in direct conflict with our earlier decision in Hilgraeve II, where we construed the term “storage” to occur “when the incoming digital data is sufficiently present on the destination storage medium and accessible by the operating system or other programs so that any viruses contained in the data can spread and infect the computer system.” 265 F.3d at 1342. That construction of the term “storage,” Symantec argues, would have no meaning if the claim term “a method of screening data as it is being transferred” were construed to mean that the virus scanning must occur entirely before any data is written to the storage medium. On appeal, CA does not dispute the binding effect of our earlier construction of the term “storage” in Hilgraeve II. Instead, CA contends that our earlier panel decision did not address the claim term “a method of screening data as it is being transferred,” appearing in the preamble, now at issue. That term, it argues, is a separate claim limitation that was added independently to overcome prior art virus-detection methods. 2007-1201, -1239 7 Claim construction is a question of law that we review without deference. Cybor Corp. v. FAS Techs., Inc.,138 F.3d 1448
, 1456 (Fed. Cir. 1998) (en banc). Because the disputed term appears in the preamble to claim 1, we must first determine whether it is in fact a separate limitation. In general, a preamble is construed as a limitation “if it recites essential structure or steps, or if it is ‘necessary to give life, meaning, and vitality’ to the claim.” Catalina Mktg. Int’l, Inc. v. Coolsavings.com, Inc.,289 F.3d 801
, 808 (Fed. Cir. 2002) (quoting Pitney Bowes, Inc. v. Hewlett-Packard Co.,182 F.3d 1298
, 1305 (Fed. Cir. 1999)). A preamble is not limiting, however, “’where a patentee defines a structurally complete invention in the claim body and uses the preamble only to state a purpose or intended use for the invention.’”Id.
(quoting Rowe v. Dror,112 F.3d 473
, 478 (Fed. Cir. 1997)). In Catalina, we identified several guideposts to aid in determining whether a preamble should be given limiting weight. For example, “clear reliance on the preamble during prosecution to distinguish the claimed invention from the prior art transforms the preamble into a claim limitation because such reliance indicates use of the preamble to define, in part, the claimed invention.”Id.
Absent clear reliance on the preamble in the prosecution history, or in situations where it is necessary to provide antecedent basis for the body of the claim, the preamble “generally is not limiting.” Id. at 809. Thus, in general, the purpose of a claim preamble is to give context for what is being described in the body of the claim; if it is reasonably susceptible to being construed to be merely duplicative of the limitations in the body of the claim (and was not clearly added to overcome a rejection), we do not construe it to be a separate limitation. 2007-1201, -1239 8 Here, the only basis for the district court’s departure from the general rule was the notion that the “as it is being transferred” language was added separately from the “prior to storage” limitation to overcome the prior art. However, the district court erred in its description of the prosecution history. The prosecution history is clear that both terms were added concurrently to overcome the same prior art. The “as it is being transferred” language did not have its own independent significance. The prosecution history fails to demonstrate “clear reliance on the preamble during prosecution to distinguish the claimed invention from the prior art.” See id. at 808. 2 CA argues alternatively that the district court’s construction was nonetheless correct because the “as it is being transferred” term and the “prior to storage” term cannot have the same meaning—they must each be given a distinct construction. Although CA is correct that when construing terms in the body of a claim, the general assumption is that different terms have different meanings, Applied Medical Resources Corp. v. United States Surgical Corp.,448 F.3d 1324
, 1333 n.3 (Fed. Cir. 2006), the same generally is not true for terms in the preamble. The use of different language in the preamble than in the body of the claims does not suggest that the preamble imposes a limitation. Rather it is assumed that the preamble language is duplicative of the language found in the body of the claims or merely provides context for the claims, 2 CA also argues that the “prior to storage” requirement was already in the claim before amendment because the claim referred to “inhibiting the digital data of said transmission from being stored on said destination storage medium if at least one predefined sequence is present.” J.A. at 7439. Even if the original claim language could be construed to include the “prior to storage” limitation, the applicant chose not to rely on that language, and added additional specific “prior to storage” language to overcome the prior art. Under these circumstances, we must assume that the additional language had significance in distinguishing the prior art. 2007-1201, -1239 9 absent any indication to the contrary in the claims, the specification or the prosecution history. Here, there is nothing in the claims, the specification or the prosecution history that suggests that the preamble language “as it is being transferred” has any different meaning than “prior to storage.” 3 Indeed, if the term “as it is being transferred” is to be read consistently with our prior construction of the term “storage,” the claim term “as it is being transferred” can only mean that virus scanning occurs “prior to storage.” 4 Any other construction of that term would vitiate the meaning that we previously gave to the term “storage” in Hilgraeve I and Hilgraeve II. See Kimberly-Clark Corp. v. Fort Howard Paper Co.,772 F.2d 860
, 863 (Fed. Cir. 1985) (“[S]tatements in opinions of this court must be read harmoniously with prior precedent, not in isolation.”). There would simply be no reason to construe “storage” to mean that scanning can occur after it is written to the computer but before it is accessible to other programs if the term “as it is being transferred” requires scanning to occur completely before any data is written to the computer. We conclude that the term “as it is being transferred” simply means “prior to storage.” Given our previous construction of the term “storage” in Hilgraeve II, the term “as it is being transferred” must mean “before the incoming digital data is sufficiently 3 CA relies on expert testimony that the preamble and the body of the claim should be interpreted as requiring separate limitations. That testimony does not, however, identify an accepted meaning in the field. To the extent that the testimony merely gives the expert’s opinion as to claim construction, we attribute it no weight. See Sinorgchem Co., Shandong v. Int’l Trade Comm'n,511 F.3d 1132
, 1137 n.3 (Fed. Cir. 2007). 4 This appears to have been our assumption in Hilgraeve I, where we stated: “The claimed invention scans a body of data during its transfer, i.e., before storage of the data with potential viruses on the destination storage medium.”224 F.3d at 1350
. 2007-1201, -1239 10 present on the destination storage medium and accessible by the operating system or other programs so that any viruses contained in the data can spread and infect the computer system.” 5 Under these circumstances, the language in the preamble does not impose a separate claim limitation. B Symantec also challenges the district court’s construction of the terms “computer” and “computer system.” The district court construed these terms to mean a “personal computer or workstation.” In doing so, the district court rejected Symantec’s proposed construction that “computer system” meant “any combination of hardware, software, documentation, and manual procedures that are combined to perform a specific function.” J.A. at 16. Based on the district court’s claim construction, the parties stipulated that the Gateway products do not infringe the asserted claims. The dispute here centers on whether the term “computer system” is properly limited to a single computer, or whether it covers a network of multiple computers. The district court explained that its construction limited the term “computer system” to a single personal computer or workstation. The district court premised its construction on the preferred embodiment’s use of a single computer, which as the court noted, “constitutes the complete description of the computer system.” The district court also relied on expert testimony that the term “computer system,” as used in the specification, referred to a single computer. 5 Although implicit in the requirement that the screening is performed on “incoming digital data,” we note that the claims do not cover methods of screening data for viruses before that data has left the source storage medium. 2007-1201, -1239 11 On appeal, Symantec contends that the district court improperly limited the claims to cover only the preferred embodiment. The specification does not limit the invention to the preferred embodiment, and the ordinary meaning of the term “computer system,” according to Symantec, includes both a single computer and a system of multiple, interconnected computers. We agree with Symantec that the district court’s construction of the terms “computer” and “computer system” unduly limits the scope of the claims to a single personal computer. The claims “must be read in view of the specification, of which they are a part.” Phillips v. AWH Corp.,415 F.3d 1303
, 1315 (Fed. Cir. 2005) (en banc). In Phillips, we characterized the specification as “the single best guide to the meaning of a disputed term.”Id.
We find nothing in the specification that would limit the meaning of the term “computer” or “computer system” to a single computer. The terms are not expressly defined in the specification, and there is nothing in the specification that suggests that it adopted a special definition of those terms. 6 Moreover, the expert testimony that the district court cites does not support the district court’s construction. That testimony simply recites how each expert would construe the term “computer system” based on his own reading of the specification. Such expert testimony, which does not identify the “accepted meaning in the field” to one skilled in the art, is unhelpful. Sinorgchem,511 F.3d at
1137 n.3 (according little or no weight to expert testimony about the meaning of specification terms where the expert failed to present 6 Although the preferred embodiment utilizes a single computer, this is not a case where the specification consistently refers to the invention as involving a single computer. See Ormco Corp. v. Align Tech., Inc.,498 F.3d 1307
, 1313 (Fed. Cir. 2007). 2007-1201, -1239 12 evidence of the generally accepted meaning of those terms to persons of ordinary skill in the art). Because the specification does not reveal any special definition for the terms “computer” or “computer system,” we must construe those terms according to their ordinary meaning. In Phillips, we explained that “the words of a claim ‘are generally given their ordinary and customary meaning.’” 415 F.3d at 1312. We clarified that the relevant meaning is “the meaning that the term would have to a person of ordinary skill in the art in question at the time of the invention.” Id. at 1313. Dictionaries are “among the many tools that can assist the court in determining the meaning of particular terminology to those of skill in the art of the invention.” Id. at 1318. Here, it is clear that the ordinary meaning of the terms “computer” or “computer system” as understood by a person of ordinary skill in the art at the time of the invention is not limited to a single computer or workstation. The Dictionary of Computing at that time defined the term “system,” in relevant part, as: Anything we choose to regard (a) as an entity and (b) as comprising a set of related components. In computing the word is widely used with many shades of meaning. Most commonly, however, it may refer to a related set of hardware units, or programs, or both. The hardware contents of a computer room may be spoken of as “the system,” and so may a range of manufacturer’s equipment[.] Dictionary of Computing 375 (2d ed. 1986). By contrast, the same dictionary defined the term “stand-alone” as “[d]enoting a computer system or subsystem that is capable of operation without being connected to any other computer system or subsystem.” Id. at 360. In other words, a stand alone computer is only one type of computer or computer system. We therefore conclude that the ordinary meaning of the terms “computer” and “computer system” to one of ordinary skill in the art in 1990 was not limited to a single, 2007-1201, -1239 13 stand-alone computer or workstation and that the district court erred by unduly limiting its construction of those terms. Because we find that the terms “computer” and “computer system” are not limited to a single computer, we must vacate and remand to the district court on the issue of infringement of CA’s Gateway products. Given our construction of these terms, on remand, the district court should determine whether the combination of computers used in the Gateway system performs all the claimed method steps. C Symantec also contends that the district court erred in construing the term “destination storage medium” to mean “a computer storage medium that is the target of the transfer of data as a result of the causing step.” This construction, when read together with the district court’s construction of the terms “computer” and “computer system,” which we rejected above, effectively limited the term “destination storage medium” to encompass only a storage system residing within a stand-alone computer, such as a computer’s hard drive. Such a limitation had the effect of excluding from the claim’s scope any peripheral devices, such as floppy drives or thumb drives. The district court reasoned that construing “destination storage medium” to include peripheral devices would be inconsistent with its construction of the term “computer system,” since such a construction would “permit the invention to operate outside of the computer system.” J.A. at 18. Under the correct construction of “computer system,” there is no reason that “destination storage medium” must be limited to a computer hard drive. Under our construction of “destination storage medium,” peripheral devices, such as floppy drives and thumb drives, are properly 2007-1201, -1239 14 within the scope of that term. In addition, we note that the inclusion of peripheral devices within the scope of the term “destination storage medium” is consistent with the broad construction we gave that term in Hilgraeve II: “‘storage medium’ refers to any storage medium of the computer system, if the data, when stored on the medium, are accessible to the operating system or other programs, such that viruses in the data can spread and infect the computer system.” 265 F.3d at 1342 n.1. II Next, Symantec argues that the district court improperly granted summary judgment of non-infringement on the EAV products based on a finding that CA does not induce infringement of the ‘776 patent. The district court held that the EAV products failed to meet both the “as it is being transferred” claim limitation and the “causing a quantity of digital data resident on a source storage medium to be transferred” claim limitation. As we have already found that the former was based on an erroneous claim construction, we now need only address the latter claim limitation. Before the district court, there was no dispute that the EAV products do not “cause[] a quantity of digital data resident on a source storage medium to be transferred,” as required by claim 1. Instead, as the district court found, the EAV products work in conjunction with a downloading or copying program, such as an internet browser. The EAV products perform the anti-virus scanning; the downloading program performs the downloading. Symantec argued that CA induces its customers to infringe the ‘776 patent by promoting its EAV products to be used in an infringing manner in conjunction with a downloading program. The district court rejected this 2007-1201, -1239 15 argument. It held that Symantec could not establish active inducement because it did not show that any third party directly infringed the ‘776 patent using the EAV products.35 U.S.C. § 271
(b) provides that “[w]hoever actively induces infringement of a patent shall be liable as an infringer.” “In order to succeed on a claim of inducement, the patentee must show, first that there has been direct infringement,” and “second, that the alleged infringer knowingly induced infringement and possessed specific intent to encourage another's infringement.” MEMC Elec. Materials, Inc. v. Mitsubishi Materials Silicon Corp.,420 F.3d 1369
, 1378 (Fed. Cir. 2005) (quoting Minn. Mining & Mfg. Co. v. Chemque, Inc.,303 F.3d 1294
, 1304-05 (Fed. Cir. 2002)). We recently clarified en banc that the specific intent necessary to induce infringement “requires more than just intent to cause the acts that produce direct infringement. . . . [T]he inducer must have an affirmative intent to cause direct infringement.” DSU Med. Corp. v. JMS Co.,471 F.3d 1293
, 1306 (Fed. Cir. 2006) relevant section (en banc). Thus, “inducement requires evidence of culpable conduct, directed to encouraging another's infringement, not merely that the inducer had knowledge of the direct infringer's activities.”Id.
On appeal, Symantec asserts that it produced ample evidence to establish that the EAV products have no utility apart from screening downloaded or copied data files. That is, the EAV products operate only when a user downloads or copies a file onto his computer, and the downloading or copying must happen via a downloading or copying software program. In particular, Symantec points out that the EAV product manual establishes that CA promotes its use of the EAV product in combination with a downloading program in an infringing manner. The manual states that “[t]he Realtime Monitor scans programs on a workstation or server each time a file is executed, 2007-1201, -1239 16 accessed, or opened.” J.A. at 6213. In its discussion of the internet, the manual states that “[t]he newest source of infections is the Internet. . . . This feature works with browsers from Netscape and Microsoft.” Id. at 6214. In response, CA maintains that Symantec has not shown any evidence of direct infringement because it has not shown that any CA customer actually performs all of the claimed method steps. Absent such a showing, CA contends that the district court properly granted summary judgment. We find that there are genuine issues of material fact as to whether CA induced its customers to infringe the ‘776 patent. We agree with Symantec that CA encouraged customers to engage in direct infringement by using the EAV products in conjunction with a downloading program. This is not a case where the customers may be using the product in either an infringing way or a non-infringing way; CA’s customers can only use the EAV products in an infringing way. Under these circumstances, Symantec has produced sufficient circumstantial evidence of direct infringement to create a genuine issue of material fact, even though Symantec has not produced evidence that any particular customer has directly infringed the ‘776 patent. Direct evidence of infringement, as opposed to circumstantial evidence, is not necessary. See Chiuminatta Concrete Concepts, Inc. v. Cardinal Indus., Inc.,145 F.3d 1303
, 1312 (Fed. Cir. 1998) (finding that Cardinal's advertisements conceded the ability of the accused device to practice the claimed method, and encouraged such use); Moleculon Research Corp. v. CBS, Inc.,793 F.2d 1261
, 1272 (Fed. Cir. 1986) (rejecting the argument that “proof of inducing infringement or direct infringement requires direct, as opposed to circumstantial evidence”). 2007-1201, -1239 17 We therefore vacate and remand the district court’s summary judgment finding of non-infringement with respect to the EAV products. 7 On remand, the district court should consider whether the specific intent requirement set forth in DSU, which was decided after the grant of summary judgment in this case, was met. III On cross-appeal, CA challenges the district court’s summary judgment finding that the doctrine of laches does not bar Symantec’s recovery for CA’s alleged patent infringement prior to the filing of suit. At the outset, we dismiss CA’s laches claim as an improper cross-appeal. “A party may cross-appeal if adversely affected by the appealed judgment in some particular which it seeks to have modified.” TypeRight Keyboard Corp. v. Microsoft Corp.,374 F.3d 1151
, 1156 (Fed. Cir. 2004) (internal quotation marks omitted). A cross-appeal may only be filed “when a party seeks to enlarge its own rights under the judgment or to lessen the rights of its adversary under the judgment.” Bailey v. Dart Container Corp.,292 F.3d 1360
, 1362 (Fed. Cir. 2002). Thus, a properly filed cross-appeal requires that, upon acceptance of appellee’s argument, our determination would result in a reversal or modification of the judgment rather than an affirmance. Seeid.
Here, the district court granted summary judgment of non-infringement on CA’s EAV products. CA argues on appeal that the doctrine of laches precludes Symantec from recovering damages on those products for any period before the filing of suit. Thus, even if we were to agree with CA that laches precludes Symantec’s recovery over the EAV products, our determination would have no effect on 7 We note that the district court appeared to confuse the test for inducement with the test for the doctrine of equivalents. The two concepts are not related. 2007-1201, -1239 18 the district court’s judgment. We therefore dismiss as improperly filed CA’s laches cross-appeal. 8 However, we may consider CA’s laches arguments as an alternative ground for sustaining the judgment of non-infringement. TypeRight Keyboard,374 F.3d at 1160
(“Even though we lack jurisdiction over the cross-appeal, [the appellee] may still defend the judgment on other grounds.”). We find that the district court did not err in dismissing CA’s laches defense on summary judgment. A defendant, in order to invoke the defense of laches, must prove: “(1) [that] the plaintiff delayed filing suit for an unreasonable and inexcusable length of time from the time the plaintiff knew or reasonably should have known of its claim against the defendant, and (2) [that] the delay operated to the prejudice or injury of the defendant.” A.C. Aukerman Co. v. R.L. Chaides Constr. Co.,960 F.2d 1020
, 1032 (Fed. Cir. 1992) (en banc). A presumption of laches arises “upon proof that the patentee delayed filing suit for more than six years after actual or constructive knowledge of the defendant’s alleged infringing activity.”Id. at 1035-36
. We review a district court's determination on the issue of laches for an abuse of discretion.Id. at 1039
. The ‘776 patent issued to Hilgraeve on June 7, 1994. In June 1995, an independent software company called Cheyenne Software began marketing a real-time antivirus software product called Inoculan. Hilgraeve sent a warning letter to Cheyenne dated October 5, 1996, regarding possible infringement. On November 6, 1996, CA 8 CA’s other cross-appeals, directed to inequitable conduct, invalidity over the prior art, and inventorship, are proper because they would expand the scope of the judgment. In TypeRight Keyboard, we explained that “where the appellee urges invalidity as a new ground on which to support a judgment of non-infringement . . . a 2007-1201, -1239 19 acquired Cheyenne Software, and thereafter allegedly “re-branded” the Inoculan product into one of its eTrust antivirus products. Hilgraeve filed the present suit against CA on September 18, 2002, and, as discussed above, Symantec later acquired Hilgraeve’s interest in the ‘776 patent and was substituted as the plaintiff in the present suit. Before the district court, CA argued that Symantec should be charged with the period of delay attributable to Hilgraeve when it stepped in as the plaintiff in the present suit. CA asserted that Cheyenne’s open and notorious marketing of Inoculan in June 1995 established Hilgraeve’s constructive knowledge of Cheyenne’s infringing use, and that, regardless, the October 5, 1996, warning letter established Hilgraeve’s actual knowledge of Cheyenne’s infringing use. Finally, CA argued that by establishing Hilgraeve’s knowledge of Cheyenne’s alleged infringement, it was also establishing Hilgraeve’s knowledge with respect to the accused CA products at issue here, since CA “re-branded” the Inoculan product into one of its own. The district court held that Hilgraeve’s alleged knowledge of Inoculan, either constructive or actual, was insufficient as a matter of law to establish Hilgraeve’s knowledge of the alleged infringing CA products. In doing so, it did not reach the question of whether Symantec should be charged with Hilgraeve’s knowledge. Rather, it concluded that CA had failed to show evidence establishing that Inoculan was the same or similar to the products in suit. We agree that laches would only apply if the products were the same or similar, see Watkins v. Northwestern Ohio Tractor Pullers Association, Inc.,630 F.2d 1155
, 1164 (6th Cir. 1980), and that CA has presented cross-appeal is necessary since a judgment of invalidity is broader than a judgment of 2007-1201, -1239 20 insufficient evidence that Inoculan is the same or similar to any of the products in suit. 9 On appeal, CA does not point to any such evidence but contends that Symantec’s October 5, 1996, warning letter to CA, urging that it had committed willful infringement, must be interpreted as an admission that Inoculan was a precursor to one of the CA products at issue here. We cannot agree. Willful infringement requires an objective showing that the alleged actions constituted infringement of a valid patent, “determined by the record developed in the infringement proceeding.” In re Seagate Tech., LLC,497 F.3d 1360
, 1371 (Fed. Cir. 2007). An allegation of willful infringement does not assume any similarity between Inoculan and the products in suit. We therefore find that the district court did not err in granting summary judgment to Symantec on CA’s laches defense. IV Levin (and CA) asserts that he is an omitted co-inventor of the ‘776 patent. 10 To show co-inventorship, Levin is required to prove his contribution to the conception of the claims by clear and convincing evidence. See Ethicon, Inc. v. U.S. Surgical Corp.,135 F.3d 1456
, 1461 (Fed. Cir. 1998). An alleged co-inventor’s testimony, standing alone, cannot rise to the level of clear and convincing evidence; he must supply evidence to corroborate his testimony.Id.
In Gemstar-TV Guide International, Inc. v. International Trade Commission,383 F.3d 1352
(Fed. Cir. 2004), we explained that “[w]hether the non-infringement.”374 F.3d at
1157 n.4. 9 Relying on an expert’s affidavit, CA asserts that the latest products at issue here utilize the same “antivirus engine technology” as that used in the original Inoculan product. This is hardly the same as demonstrating that the earlier product embodied the same claimed features as the accused product. 10 Levin licensed any interest he may have in the ’776 patent to CA. 2007-1201, -1239 21 co-inventor's testimony has been sufficiently corroborated is evaluated under a ‘rule of reason analysis,’ which requires that an ‘evaluation of all pertinent evidence must be made so that a sound determination of the credibility of the inventor's story may be reached.’” Id. at 1382 (quoting Price v. Symsek,988 F.2d 1187
, 1195 (Fed. Cir. 1993)). Corroborating evidence may be in the form of “records made contemporaneously with the inventive process,” “[c]ircumstantial evidence of an independent nature,” or “oral testimony from someone other than the alleged inventor.”Id.
Before the district court, Levin submitted a declaration stating that he gave Matthew H. Gray (“Gray”), one of the named inventors of the ‘776 patent, the idea for the in-transit virus scan method in a February 12, 1990, telephone call. To corroborate his declaration, Levin submitted Gray’s day planner, which reflected Gray’s notes confirming that the disputed telephone call took place. Levin points out that Gray testified that the day planner entry that reflected his conversation with Levin was “relat[ed] to the ’776 patent.” J.A. at 10,064. In addition, Levin relied on the lack of evidence showing Gray’s conception of the in-transit virus scan invention, which he argued further corroborated his own testimony. The district court found that the day planner entry was insufficient as corroborating evidence. That entry, according to the district court, “at most shows only that [Levin and Gray] discussed the then-current state of the art”; it “fail[ed] to explicitly identify [Levin’s] contribution.” J.A. at 87-88. We agree with the district court that, at most, the day planner entry establishes that Gray and Levin spoke about the then- current state of anti-virus programs; it does not establish that Levin contributed to the idea. That entry, listing an “IBM SCAN program,” a “Computer Virus Handbook,” “Jim 2007-1201, -1239 22 McAffey’s Virus Scan,” and “Levin’s Checkup Antivirus System,” J.A. at 1841, suggests only that Gray simply called Levin to discuss the state of the prior art. The district court also found that any evidence tending to call into question Gray’s contribution to the invention was irrelevant to the question of whether Levin made any contribution. Again, we agree with the district court that the evidence regarding Gray’s contribution was not relevant to the question of Levin’s contribution. This is particularly so because Gray was not the sole inventor here; even though he may have lacked technical expertise, there is no suggestion that his co-inventors also lacked any technical expertise. This case is thus distinguishable from Ethicon, where we held that a sole inventor’s lack of technical expertise corroborated another’s claim of co- inventorship.135 F.3d at 1464-65
. Levin’s declaration itself is insufficient because it lacks corroboration. We therefore affirm the district court’s conclusion that Levin has failed to establish a genuine issue of material fact that he was a co-inventor of the ’776 patent. V CA appeals the district court’s summary judgment determination that Hilgraeve did not commit inequitable conduct before the Patent Office in procuring the ’776 patent. CA alleges that Hilgraeve made three separate false and material misrepresentations to the Patent Office: (1) Gray’s April 18, 1990, declaration that he was an inventor of the ’776 patent; (2) Gray’s August 12, 1990, declaration to overcome prior art; and (3) co- inventor Donald Wakelin’s April 18, 1990, declaration that he understood the claims of the patent application. 2007-1201, -1239 23 Patent applicants “have a duty to prosecute patent applications in the Patent Office with candor, good faith, and honesty.” Honeywell Int’l Inc. v. Universal Avionics Sys. Corp.,488 F.3d 982
, 999 (Fed. Cir. 2007). A breach of this duty constitutes inequitable conduct and renders the entire patent unenforceable.Id.
In order to establish inequitable conduct, the party challenging the patent is required to establish by clear and convincing evidence that the patent applicant “(1) either made an affirmative misrepresentation of material fact, failed to disclose material information, or submitted false material information, and (2) intended to deceive the U.S. Patent and Trademark Office.” Cargill, Inc. v. Canbra Foods, Ltd.,476 F.3d 1359
, 1363 (Fed. Cir. 2007). “Once threshold findings of materiality and intent are established, the trial court must weigh them to determine whether the equities warrant a conclusion that inequitable conduct occurred.” Purdue Pharma L.P. v. Endo Pharmaceuticals Inc.,438 F.3d 1123
, 1128 (Fed. Cir. 2006). Information is material when “a reasonable examiner would consider it important in deciding whether to allow the application to issue as a patent.” eSpeed, Inc. v. BrokerTec USA, L.L.C.,480 F.3d 1129
, 1136 (Fed. Cir. 2007) (quoting A.B. Dick Co. v. Burroughs Corp.,798 F.2d 1392
, 1397 (Fed. Cir. 1986)). Moreover, we have found that “[f]alse statements are more likely material when embodied in declarations or affidavits submitted to the PTO.”Id.
CA’s first inequitable conduct claim arises out of the April 18, 1990, declaration that Gray signed and submitted with the patent application that led to the ‘776 patent. In the declaration, Gray submitted that he was “an original, first and joint inventor . . . of the subject matter which is claimed and for which a patent is sought.” J.A. at 1828-30. 2007-1201, -1239 24 CA asserts that Gray’s declaration was a false statement because the idea for the in transit virus-detection method was Levin’s. Even if Levin somehow contributed to the invention (which, as noted above, has not been established), that fact alone would not establish that Gray did not also contribute to the invention. CA also relies on Gray’s inability at trial to identify with specificity the contribution that he made to the invention. We agree with the district court that Gray’s inability to identify with precision his contribution, nearly fourteen years later, does not show anything more than that Gray simply could not recall, particularly since Gray and a co-inventor, John Hile, both testified in general terms that Gray came up with the idea. 11 Finally, CA contends that Gray’s lack of technical expertise establishes that Gray was not an inventor. We disagree. Gray was not the sole inventor of the claimed method. Indeed, Gray worked with the other inventors who did have technical expertise to design the invention. For these reasons, we find that the district court did not err in granting summary judgment that CA has failed to present a genuine issue of material fact that Gray was not the inventor. CA’s second inequitable conduct claim arises from an August 12, 1992, declaration submitted by Gray to the PTO in response to an office action. Gray’s declaration was submitted together with a number of prior art references. In the declaration, Gray described the state of the prior art with specific reference to the attached publications and identified the “significant advantages over the existing virus 11 CA appears to argue that Gray testified that the notes in the day planner described the invention, and that, since the notes summarized the Levin telephone call, the idea must have originated with Levin. Gray’s testimony, however, was that the day planner entry was evidence of the date of conception, and not of the idea itself. 2007-1201, -1239 25 scanning, detecting and eliminating software” that his invention achieved. J.A. at 3866. In paragraph 1 of the declaration, Gray stated that he “ha[d] practiced in the field of computer software and, more particularly, in the area of computer communications software for 10 years . . . [and that a]s a consequence, [Gray had] become intimately familiar with the state of the art as it relates to computer viruses, computer virus detection, and computer virus prevention.” Id. at 3863. CA claims that this declaration was false and misleading, because Gray was a marketing person, not a software person with technical expertise. CA does not assert that the substance of the declaration itself was either false or misleading. The sole argument is that Gray’s description of his own qualifications is misleading. The district court found that Gray’s lack of technical expertise alone was insufficient to establish that his declaration was a misrepresentation. We agree. There is nothing in the record that indicates that Gray was not “intimately familiar with the state of the art,” and the mere fact that he was not a technical person does nothing to refute that. 12 CA also relies on paragraph 4 of that declaration, where Gray stated that he “set out to develop an algorithm which would determine whether a file was infected with a virus during [a] transfer and to stop the transfer before the virus was copied into the system.” Id. at 3864. CA asserts that this claim was also false and misleading, since 12 When questioned as to whether “[s]itting here today, [Gray had] any knowledge concerning the state of the art in connection with computer software design and development,” Gray stated: “I don’t believe there’s any point in time when I would have been so bold as to claim I had knowledge of the state of the art of anything.” J.A. at 9993. We do not read that statement as contradicting the statement he made in the declaration concerning his earlier knowledge of virus screening technology, but rather to relate to his lack of knowledge of computer software design and development generally. 2007-1201, -1239 26 Gray later testified that he did not develop the mathematical algorithm, but rather that one of the co-inventors, Donald Wakelin, developed the algorithm. Gray’s assertion that he “set out to develop an algorithm” is not the same as asserting that he actually developed the algorithm himself. Again, we see no basis for a misrepresentation claim. We conclude that CA has not established a genuine question of material fact that Gray’s August 12, 1992, declaration was false or misleading. CA’s final inequitable conduct claim arises from Wakelin’s April 18, 1990, declaration submitted with the original application, where he stated that he had “reviewed and underst[ood] the contents of the . . . specification, including the claims . . . .” Id. at 1828. That declaration, according to CA, was false and misleading because Wakelin allegedly did not understand the claims of the patent. Instead, Wakelin testified that he only understood the claims in general terms, that “the statements in claim one are so vague as to be practically unintelligible,” id. at 10006, and that he didn’t “really understand what these claims are saying.” Id. at 10007. The district court found that, even if Wakelin did not fully understand the claims of the patent, that alone was not sufficient to establish a threshold level of materiality. We agree. As the district court stated, “Wakelin’s failure to fully understand the language of the claim contents should not be confused for failure to understand the meaning of the claims, which would likely be considered material by a ‘reasonable examiner.’” Id. at 124. VI Finally, we must address CA’s counterclaims for invalidity. Our constructions of the terms “computer,” “computer system,” and “destination storage medium” require us to vacate and remand the district court’s summary judgment finding that the Photonix 2007-1201, -1239 27 and the Mac prior art references did not render the claims invalid. This is because the same construction governs for validity determinations as for infringement determinations. Yoon Ja Kim v. ConAgra Foods, Inc.,465 F.3d 1312
, 1324 (Fed. Cir. 2006). Here, the district court distinguished the ’776 patent claims over Photonix and the Mac prior art based on the conclusion that both of these antivirus programs ran on an Apple II GS computer, which itself only used peripheral devices (i.e., a floppy drive) because it did not include a hard drive. 13 The district court also concluded, with respect to the invalidity of the claims based on the Mac prior art, that “the Macintosh programs do not store the actual screened digital data after screening, but only a reference to the screened data,” and therefore did not meet the claim limitation “automatically store the transferred digital data.” J.A. at 184-85. The district court’s decision in this respect is somewhat unclear as are the parties’ briefs on this point. The district court’s holding may well be intertwined with its holding that the Apple II GS computer, on which the Mac programs operated, did not have a destination storage medium. Under the circumstances, we decline to address the issue at this time. Hopefully the nature of the district court’s decision will be clarified on remand. CONCLUSION We hold that the district court erred in its construction of the claim terms “a method of screening data as it is being transferred,” “destination storage medium,” “computer,” and “computer system.” We therefore vacate and remand as to non- infringement and invalidity. We affirm the district court’s decision on laches, inequitable conduct, and inventorship. 13 The district court appeared not to address claims 18-20, and on remand 2007-1201, -1239 28 The judgment of the district court is AFFIRMED-IN-PART and VACATED-IN- PART and REMANDED. No costs. should treat them separately. 2007-1201, -1239 29
chiuminatta-concrete-concepts-inc-edward-chiuminatta-and-alan-r , 145 F.3d 1303 ( 1998 )
purdue-pharma-lp-the-purdue-frederick-company-the-pf-laboratories , 438 F.3d 1123 ( 2006 )
Hilgraeve Corporation v. McAfee Associates, Inc. (Now Known ... , 224 F.3d 1349 ( 2000 )
eSpeed, Inc. v. Brokertec USA, L.L.C. , 480 F.3d 1129 ( 2007 )
Typeright Keyboard Corporation v. Microsoft Corporation, ... , 374 F.3d 1151 ( 2004 )
A.B. Dick Company, Appellant/cross-Appellee v. Burroughs ... , 798 F.2d 1392 ( 1986 )
Ethicon, Inc. And Inbae Yoon, M.D. v. United States ... , 135 F.3d 1456 ( 1998 )
Honeywell International Inc. v. Universal Avionics Systems ... , 488 F.3d 982 ( 2007 )
Moleculon Research Corporation v. Cbs, Inc. , 793 F.2d 1261 ( 1986 )
Applied Medical Resources Corp. v. United States Surgical ... , 448 F.3d 1324 ( 2006 )
Innogenetics, N v. v. Abbott Laboratories , 512 F.3d 1363 ( 2008 )
Gemstar-Tv Guide International, Inc. And Starsight Telecast,... , 383 F.3d 1352 ( 2004 )
john-a-bailey-v-dart-container-corporation-of-michigan-dart-container , 292 F.3d 1360 ( 2002 )
Richard C. Price v. Dale R. Symsek , 988 F.2d 1187 ( 1993 )
Kimberly-Clark Corporation v. Fort Howard Paper Company , 772 F.2d 860 ( 1985 )
Pitney Bowes, Inc. v. Hewlett-Packard Company, Defendant-... , 182 F.3d 1298 ( 1999 )
Stanton J. Rowe v. Michael Dror and Paul Trescony , 112 F.3d 473 ( 1997 )
Billy K. Watkins v. Northwestern Ohio Tractor Pullers ... , 630 F.2d 1155 ( 1980 )
Minnesota Mining and Manufacturing Company v. Chemque, Inc. ... , 303 F.3d 1294 ( 2002 )
Cargill, Inc. v. Canbra Foods, Ltd. , 476 F.3d 1359 ( 2007 )