United States Court of Appeals for the Federal Circuit
2007-1201, -1239
SYMANTEC CORPORATION,
Plaintiff/Counterclaim Defendant-
Appellant,
and
HILGRAEVE, INCORPORATED,
Plaintiff/Counterclaim Defendant,
v.
COMPUTER ASSOCIATES INTERNATIONAL, INC.,
Defendant/Counterclaimant-
Cross Appellant,
and
RICHARD B. LEVIN,
Counterclaimant-Cross Appellant.
David A. Nelson, Latham & Watkins LLP, of Chicago, Illinois, argued for
plaintiff/counterclaim defendant-appellant. With him on the brief was Mark A. Flagel, of
Los Angeles, California. On the brief were Daniel A. Boehnen, George I. Lee, and
Jeffrey A. Steck, McDonnell Boehnen Hulbert & Berghoff LLP, of Chicago, Illinois. Of
counsel on the brief was Joseph Fitzgerald, Symantec Corp., of Cupertino, California.
Michael A. Nicodema, Greenberg Traurig LLP, of New York, New York, argued
for defendant/counterclaimant-cross appellant. With him on the brief was Gaston
Kroub.
Gerry J. Elman, Elman Technology Law, P.C, of Swarthmore, Pennsylvania, for
counterclaimant-cross-appellant.
Appealed from: United States District Court for the Eastern District of Michigan
Chief Judge Bernard A. Friedman
United States Court of Appeals for the Federal Circuit
2007-1201, -1239
SYMANTEC CORPORATION,
Plaintiff/Counterclaim
Defendant-Appellant,
and
HILGRAEVE, INCORPORATED,
Plaintiff/Counterclaim Defendant,
v.
COMPUTER ASSOCIATES INTERNATIONAL, INC.,
Defendant/Counterclaimant-
Cross Appellant,
and
RICHARD B. LEVIN,
Counterclaimant-Cross Appellant.
Appeals from the United States District Court for the Eastern District of Michigan in case
no. 02-CV-73740, Chief Judge Bernard A. Friedman.
___________________________
DECIDED: April 11, 2008
___________________________
Before GAJARSA, LINN, and DYK, Circuit Judges.
DYK, Circuit Judge.
In this patent infringement suit, appellant Symantec Corporation (“Symantec”)
appeals from the district court’s grant of summary judgment of non-infringement of
claims 1-20 of the asserted patent, U.S. Patent No. 5,319,776 (“the ’776 patent”).
Symantec Corp. v. Computer Assocs. Int’l, Inc., No. 02-CV-73740-DT (E.D. Mich. Aug.
31, 2006) (reports and recommendations of magistrate judge). 1 Computer Associates
International, Inc. (“CA”), the accused infringer, cross-appeals from the district court’s
grant of summary judgment on: (1) the defense of laches; (2) inequitable conduct; (3)
invalidity over the prior art; and (4) inventorship. Id. Richard B. Levin (“Levin”) cross-
appeals from the district court’s grant of summary judgment that he was not a co-
inventor of the ‘776 patent. Id.
Because we find that the district court erred in its construction of the claim terms
“a method of screening data as it is being transferred,” “destination storage medium,”
“computer,” and “computer system,” we vacate and remand as to non-infringement and
invalidity. We dismiss CA’s cross-appeal as to laches as improper, but we treat laches
as an alternative ground for affirming the judgment. We affirm the district court’s
decision on laches, inequitable conduct, and inventorship.
BACKGROUND
The ’776 patent is here for the third time. The patent is directed to the “In Transit
Detection of Computer Virus with Safeguard,” and is described in detail in our earlier
opinions. See Hilgraeve Corp. v. McAfee Assocs., Inc., 224 F.3d 1349, 1350-52 (Fed.
Cir. 2000) (“Hilgraeve I”); Hilgraeve Corp. v. Symantec Corp., 265 F.3d 1336, 1338-41
1
The citations are to the reports and recommendations of the magistrate
judge. The district court adopted these reports and recommendations in their entirety
by order. Symantec, No. 02-CV-73740-DT (E.D. Mich. Jan. 23, 2007) (order accepting
and adopting magistrate judge’s reports and recommendations).
2007-1201, -1239 2
(Fed. Cir. 2001) (“Hilgraeve II”). Briefly, the ’776 patent discloses a method of scanning
for and detecting computer viruses embedded in data files that are downloaded or
copied from a remote server (e.g., via the internet) onto a computer. Critically, the
claimed virus-scan operates before the downloaded or copied data files are accessible
to the computer’s operating system, thereby allowing the software to block access to
those files early enough to prevent the embedded viruses from spreading and infecting
the computer. The ’776 patent includes claims 1-20, of which claim 1 and claim 18 are
independent. Claim 1 is representative:
1. In a system for transferring digital data for storage in a computer
storage medium, a method of screening the data as it is being transferred
and automatically inhibiting the storage of screened data containing at
least one predefined sequence, comprising the steps of:
causing a quantity of digital data resident on a source storage medium to
be transferred to a computer system having a destination storage medium;
receiving and screening the transferred digital data prior to storage on the
destination storage medium to determine if at least one of a plurality of
predefined sequences are present in the digital data received; and
in response to said screening step:
(a) automatically causing the screened digital data to be stored on
said destination storage medium if none of the plurality of
predefined sequences are present, and
(b) automatically inhibiting the screened digital data from being
stored on said destination storage medium if at least one
predefined sequence is resent.
’776 patent, col.17 ll.9-29 (emphases added).
In the ’776 patent’s two prior appearances before this court, the central issue was
whether the accused virus-scanning products scanned incoming data files prior to
storage. In Hilgraeve I, Hilgraeve, the original assignee of the ’776 patent, brought a
2007-1201, -1239 3
patent infringement suit against McAfee Associates (“McAfee”) for its VirusScan
product. 224 F.3d at 1350. The district court granted summary judgment of non-
infringement to McAfee, and Hilgraeve appealed. Id. In that appeal, the parties did not
dispute the construction of the claim term “storage,” which the district court had
construed as occurring “when the incoming digital data is sufficiently present on the
destination storage medium, and accessible by the operating system or other programs,
so that any viruses contained in the data can spread and infect the computer system.”
Id. at 1351.
In Hilgraeve II, Hilgraeve asserted the same ’776 patent in a separately filed
action against Symantec. 265 F.3d at 1338. The district court granted summary
judgment of non-infringement to Symantec, and Hilgraeve appealed. Id. On appeal,
Hilgraeve challenged the district court’s construction of the term “storage,” which
differed from the construction in Hilgraeve I because it did not include the “accessible by
the operating system or other programs” language. Id. at 1341. Symantec argued that
the term should be construed to occur “when the data become physically present (i.e.,
magnetically recorded) on the storage medium.” Id. We rejected Symantec’s
construction and adopted Hilgraeve’s construction (which was identical to the district
court’s construction in Hilgraeve I) of “storage,” holding that “storage” occurred “when
the incoming digital data [are] sufficiently present on the destination storage medium
and accessible by the operating system or other programs so that any viruses contained
in the data can spread and infect the computer system.” Id. at 1342.
Subsequent to our decision in Hilgraeve II, Symantec settled its dispute with
Hilgraeve, and, as part of that settlement, purchased Hilgraeve’s interest in the ‘776
2007-1201, -1239 4
patent. Hilgraeve had previously filed a new infringement action against CA, alleging
infringement of claims 1-20 of the ’776 patent. The district court then substituted
Symantec as the plaintiff.
CA, the accused infringer here, develops and sells a number of antivirus software
products. The accused products are: (1) the eTrust EZ and eTrust products (collectively
“the EAV products”), which employ both an incoming and outgoing scan mode; (2) the
ARCserve product, which is designed to restore data from a backup media where the
data had previously been archived; and (3) the Gateway products, which operate as a
proxy between a user’s personal computer and an unattended gateway computer.
CA’s initial pleadings denied infringement and asserted affirmative defenses and
counterclaims for invalidity and non-infringement. Subsequently, CA amended its
pleadings to add affirmative defenses (including a defense of laches) and counterclaims
for unenforceability of the ’776 patent due to inequitable conduct, and for invalidity of the
’776 patent under 35 U.S.C. § 256 for failing to name alleged co-inventor Levin. The
district court also granted Levin’s motion to intervene as a party and assert a claim for
co-inventorship of the ’776 patent.
As discussed below, the district court construed the terms “a method of
screening the data as it is being transferred,” “computer system,” and “destination
storage medium”—the critical claim terms on appeal—in an order dated March 16,
2005. Based on its constructions of those terms, it granted summary judgment to CA of
non-infringement on the EAV products and the ARCserve product. Although it did not
grant summary judgment on the Gateway products, the parties stipulated to non-
infringement of the Gateway products under the district court’s claim construction. The
2007-1201, -1239 5
district court also granted summary judgment to Symantec on invalidity, holding that the
’776 patent was not anticipated or obvious in view of several prior art references.
Finally, in separate orders, the district court granted summary judgment to Symantec
on: CA’s affirmative defense of laches; CA’s claim that the ’776 patent was
unenforceable based on inequitable conduct; and CA and Levin’s claim that Levin was a
joint inventor of the ’776 patent. Symantec timely appealed; CA and Levin timely cross-
appealed. We have jurisdiction pursuant to 28 U.S.C. § 1295(a)(1), except as to CA’s
improper cross-appeal on the issue of laches.
DISCUSSION
We review summary judgment decisions without deference, reapplying the
standard used by the district court. Innogenetics, N.V. v. Abbott Labs., 512 F.3d 1363,
1378 (Fed. Cir. 2008). “Under that standard, summary judgment must be granted
when, drawing all reasonable inferences in favor of the non-movant, there is no genuine
issue as to any material fact and no reasonable jury could return a verdict for the non-
movant.” Id.
I
A
Symantec’s primary challenge is to the district court’s determination that the term
“a method of screening the data as it is being transferred,” appearing in the preambles
to the claims, was a claim limitation, and its construction of that phrase to mean “a
method of screening the data while it is being moved or copied and before the data is
stored to the computer storage medium.” J.A. at 15. These determinations bear
2007-1201, -1239 6
directly on the infringement analysis of each of the accused CA products. The dispute
centers on whether the claims cover methods that do not screen data until after that
data is written to a storage medium but do conduct screening “prior to storage,” i.e.,
before the data is accessible to the operating system or to other computer programs.
Under the district court’s construction, antivirus programs that screen data at any
time after that data is written to the storage medium (e.g., the computer’s hard drive),
but before it becomes accessible to the operating system or to other computer
programs, fall outside the scope of the “as it is being transferred” limitation, even if
screening is completed entirely before the data becomes accessible. This construction,
Symantec argues, is in direct conflict with our earlier decision in Hilgraeve II, where we
construed the term “storage” to occur “when the incoming digital data is sufficiently
present on the destination storage medium and accessible by the operating system or
other programs so that any viruses contained in the data can spread and infect the
computer system.” 265 F.3d at 1342. That construction of the term “storage,”
Symantec argues, would have no meaning if the claim term “a method of screening data
as it is being transferred” were construed to mean that the virus scanning must occur
entirely before any data is written to the storage medium.
On appeal, CA does not dispute the binding effect of our earlier construction of
the term “storage” in Hilgraeve II. Instead, CA contends that our earlier panel decision
did not address the claim term “a method of screening data as it is being transferred,”
appearing in the preamble, now at issue. That term, it argues, is a separate claim
limitation that was added independently to overcome prior art virus-detection methods.
2007-1201, -1239 7
Claim construction is a question of law that we review without deference. Cybor
Corp. v. FAS Techs., Inc., 138 F.3d 1448, 1456 (Fed. Cir. 1998) (en banc).
Because the disputed term appears in the preamble to claim 1, we must first
determine whether it is in fact a separate limitation. In general, a preamble is construed
as a limitation “if it recites essential structure or steps, or if it is ‘necessary to give life,
meaning, and vitality’ to the claim.” Catalina Mktg. Int’l, Inc. v. Coolsavings.com, Inc.,
289 F.3d 801, 808 (Fed. Cir. 2002) (quoting Pitney Bowes, Inc. v. Hewlett-Packard Co.,
182 F.3d 1298, 1305 (Fed. Cir. 1999)). A preamble is not limiting, however, “’where a
patentee defines a structurally complete invention in the claim body and uses the
preamble only to state a purpose or intended use for the invention.’” Id. (quoting Rowe
v. Dror, 112 F.3d 473, 478 (Fed. Cir. 1997)). In Catalina, we identified several
guideposts to aid in determining whether a preamble should be given limiting weight.
For example, “clear reliance on the preamble during prosecution to distinguish the
claimed invention from the prior art transforms the preamble into a claim limitation
because such reliance indicates use of the preamble to define, in part, the claimed
invention.” Id. Absent clear reliance on the preamble in the prosecution history, or in
situations where it is necessary to provide antecedent basis for the body of the claim,
the preamble “generally is not limiting.” Id. at 809. Thus, in general, the purpose of a
claim preamble is to give context for what is being described in the body of the claim; if
it is reasonably susceptible to being construed to be merely duplicative of the limitations
in the body of the claim (and was not clearly added to overcome a rejection), we do not
construe it to be a separate limitation.
2007-1201, -1239 8
Here, the only basis for the district court’s departure from the general rule was
the notion that the “as it is being transferred” language was added separately from the
“prior to storage” limitation to overcome the prior art. However, the district court erred in
its description of the prosecution history. The prosecution history is clear that both
terms were added concurrently to overcome the same prior art. The “as it is being
transferred” language did not have its own independent significance. The prosecution
history fails to demonstrate “clear reliance on the preamble during prosecution to
distinguish the claimed invention from the prior art.” See id. at 808. 2
CA argues alternatively that the district court’s construction was nonetheless
correct because the “as it is being transferred” term and the “prior to storage” term
cannot have the same meaning—they must each be given a distinct construction.
Although CA is correct that when construing terms in the body of a claim, the general
assumption is that different terms have different meanings, Applied Medical Resources
Corp. v. United States Surgical Corp., 448 F.3d 1324, 1333 n.3 (Fed. Cir. 2006), the
same generally is not true for terms in the preamble. The use of different language in
the preamble than in the body of the claims does not suggest that the preamble
imposes a limitation. Rather it is assumed that the preamble language is duplicative of
the language found in the body of the claims or merely provides context for the claims,
2
CA also argues that the “prior to storage” requirement was already in the
claim before amendment because the claim referred to “inhibiting the digital data of said
transmission from being stored on said destination storage medium if at least one
predefined sequence is present.” J.A. at 7439. Even if the original claim language could
be construed to include the “prior to storage” limitation, the applicant chose not to rely
on that language, and added additional specific “prior to storage” language to overcome
the prior art. Under these circumstances, we must assume that the additional language
had significance in distinguishing the prior art.
2007-1201, -1239 9
absent any indication to the contrary in the claims, the specification or the prosecution
history. Here, there is nothing in the claims, the specification or the prosecution history
that suggests that the preamble language “as it is being transferred” has any different
meaning than “prior to storage.” 3
Indeed, if the term “as it is being transferred” is to be read consistently with our
prior construction of the term “storage,” the claim term “as it is being transferred” can
only mean that virus scanning occurs “prior to storage.” 4 Any other construction of that
term would vitiate the meaning that we previously gave to the term “storage” in
Hilgraeve I and Hilgraeve II. See Kimberly-Clark Corp. v. Fort Howard Paper Co., 772
F.2d 860, 863 (Fed. Cir. 1985) (“[S]tatements in opinions of this court must be read
harmoniously with prior precedent, not in isolation.”). There would simply be no reason
to construe “storage” to mean that scanning can occur after it is written to the computer
but before it is accessible to other programs if the term “as it is being transferred”
requires scanning to occur completely before any data is written to the computer.
We conclude that the term “as it is being transferred” simply means “prior to
storage.” Given our previous construction of the term “storage” in Hilgraeve II, the term
“as it is being transferred” must mean “before the incoming digital data is sufficiently
3
CA relies on expert testimony that the preamble and the body of the claim
should be interpreted as requiring separate limitations. That testimony does not,
however, identify an accepted meaning in the field. To the extent that the testimony
merely gives the expert’s opinion as to claim construction, we attribute it no weight. See
Sinorgchem Co., Shandong v. Int’l Trade Comm'n, 511 F.3d 1132, 1137 n.3 (Fed. Cir.
2007).
4
This appears to have been our assumption in Hilgraeve I, where we
stated: “The claimed invention scans a body of data during its transfer, i.e., before
storage of the data with potential viruses on the destination storage medium.” 224 F.3d
at 1350.
2007-1201, -1239 10
present on the destination storage medium and accessible by the operating system or
other programs so that any viruses contained in the data can spread and infect the
computer system.” 5 Under these circumstances, the language in the preamble does not
impose a separate claim limitation.
B
Symantec also challenges the district court’s construction of the terms
“computer” and “computer system.” The district court construed these terms to mean a
“personal computer or workstation.” In doing so, the district court rejected Symantec’s
proposed construction that “computer system” meant “any combination of hardware,
software, documentation, and manual procedures that are combined to perform a
specific function.” J.A. at 16. Based on the district court’s claim construction, the
parties stipulated that the Gateway products do not infringe the asserted claims.
The dispute here centers on whether the term “computer system” is properly
limited to a single computer, or whether it covers a network of multiple computers. The
district court explained that its construction limited the term “computer system” to a
single personal computer or workstation. The district court premised its construction on
the preferred embodiment’s use of a single computer, which as the court noted,
“constitutes the complete description of the computer system.” The district court also
relied on expert testimony that the term “computer system,” as used in the specification,
referred to a single computer.
5
Although implicit in the requirement that the screening is performed on
“incoming digital data,” we note that the claims do not cover methods of screening data
for viruses before that data has left the source storage medium.
2007-1201, -1239 11
On appeal, Symantec contends that the district court improperly limited the
claims to cover only the preferred embodiment. The specification does not limit the
invention to the preferred embodiment, and the ordinary meaning of the term “computer
system,” according to Symantec, includes both a single computer and a system of
multiple, interconnected computers.
We agree with Symantec that the district court’s construction of the terms
“computer” and “computer system” unduly limits the scope of the claims to a single
personal computer. The claims “must be read in view of the specification, of which they
are a part.” Phillips v. AWH Corp., 415 F.3d 1303, 1315 (Fed. Cir. 2005) (en banc). In
Phillips, we characterized the specification as “the single best guide to the meaning of a
disputed term.” Id. We find nothing in the specification that would limit the meaning of
the term “computer” or “computer system” to a single computer. The terms are not
expressly defined in the specification, and there is nothing in the specification that
suggests that it adopted a special definition of those terms. 6 Moreover, the expert
testimony that the district court cites does not support the district court’s construction.
That testimony simply recites how each expert would construe the term “computer
system” based on his own reading of the specification. Such expert testimony, which
does not identify the “accepted meaning in the field” to one skilled in the art, is
unhelpful. Sinorgchem, 511 F.3d at 1137 n.3 (according little or no weight to expert
testimony about the meaning of specification terms where the expert failed to present
6
Although the preferred embodiment utilizes a single computer, this is not a
case where the specification consistently refers to the invention as involving a single
computer. See Ormco Corp. v. Align Tech., Inc., 498 F.3d 1307, 1313 (Fed. Cir. 2007).
2007-1201, -1239 12
evidence of the generally accepted meaning of those terms to persons of ordinary skill
in the art).
Because the specification does not reveal any special definition for the terms
“computer” or “computer system,” we must construe those terms according to their
ordinary meaning. In Phillips, we explained that “the words of a claim ‘are generally
given their ordinary and customary meaning.’” 415 F.3d at 1312. We clarified that the
relevant meaning is “the meaning that the term would have to a person of ordinary skill
in the art in question at the time of the invention.” Id. at 1313. Dictionaries are “among
the many tools that can assist the court in determining the meaning of particular
terminology to those of skill in the art of the invention.” Id. at 1318. Here, it is clear that
the ordinary meaning of the terms “computer” or “computer system” as understood by a
person of ordinary skill in the art at the time of the invention is not limited to a single
computer or workstation. The Dictionary of Computing at that time defined the term
“system,” in relevant part, as:
Anything we choose to regard (a) as an entity and (b) as comprising a set
of related components. In computing the word is widely used with many
shades of meaning. Most commonly, however, it may refer to a related
set of hardware units, or programs, or both. The hardware contents of a
computer room may be spoken of as “the system,” and so may a range of
manufacturer’s equipment[.]
Dictionary of Computing 375 (2d ed. 1986). By contrast, the same dictionary defined
the term “stand-alone” as “[d]enoting a computer system or subsystem that is capable of
operation without being connected to any other computer system or subsystem.” Id. at
360. In other words, a stand alone computer is only one type of computer or computer
system. We therefore conclude that the ordinary meaning of the terms “computer” and
“computer system” to one of ordinary skill in the art in 1990 was not limited to a single,
2007-1201, -1239 13
stand-alone computer or workstation and that the district court erred by unduly limiting
its construction of those terms.
Because we find that the terms “computer” and “computer system” are not limited
to a single computer, we must vacate and remand to the district court on the issue of
infringement of CA’s Gateway products. Given our construction of these terms, on
remand, the district court should determine whether the combination of computers used
in the Gateway system performs all the claimed method steps.
C
Symantec also contends that the district court erred in construing the term
“destination storage medium” to mean “a computer storage medium that is the target of
the transfer of data as a result of the causing step.” This construction, when read
together with the district court’s construction of the terms “computer” and “computer
system,” which we rejected above, effectively limited the term “destination storage
medium” to encompass only a storage system residing within a stand-alone computer,
such as a computer’s hard drive. Such a limitation had the effect of excluding from the
claim’s scope any peripheral devices, such as floppy drives or thumb drives.
The district court reasoned that construing “destination storage medium” to
include peripheral devices would be inconsistent with its construction of the term
“computer system,” since such a construction would “permit the invention to operate
outside of the computer system.” J.A. at 18. Under the correct construction of
“computer system,” there is no reason that “destination storage medium” must be
limited to a computer hard drive. Under our construction of “destination storage
medium,” peripheral devices, such as floppy drives and thumb drives, are properly
2007-1201, -1239 14
within the scope of that term. In addition, we note that the inclusion of peripheral
devices within the scope of the term “destination storage medium” is consistent with the
broad construction we gave that term in Hilgraeve II: “‘storage medium’ refers to any
storage medium of the computer system, if the data, when stored on the medium, are
accessible to the operating system or other programs, such that viruses in the data can
spread and infect the computer system.” 265 F.3d at 1342 n.1.
II
Next, Symantec argues that the district court improperly granted summary
judgment of non-infringement on the EAV products based on a finding that CA does not
induce infringement of the ‘776 patent. The district court held that the EAV products
failed to meet both the “as it is being transferred” claim limitation and the “causing a
quantity of digital data resident on a source storage medium to be transferred” claim
limitation. As we have already found that the former was based on an erroneous claim
construction, we now need only address the latter claim limitation.
Before the district court, there was no dispute that the EAV products do not
“cause[] a quantity of digital data resident on a source storage medium to be
transferred,” as required by claim 1. Instead, as the district court found, the EAV
products work in conjunction with a downloading or copying program, such as an
internet browser. The EAV products perform the anti-virus scanning; the downloading
program performs the downloading. Symantec argued that CA induces its customers to
infringe the ‘776 patent by promoting its EAV products to be used in an infringing
manner in conjunction with a downloading program. The district court rejected this
2007-1201, -1239 15
argument. It held that Symantec could not establish active inducement because it did
not show that any third party directly infringed the ‘776 patent using the EAV products.
35 U.S.C. § 271(b) provides that “[w]hoever actively induces infringement of a
patent shall be liable as an infringer.” “In order to succeed on a claim of inducement,
the patentee must show, first that there has been direct infringement,” and “second, that
the alleged infringer knowingly induced infringement and possessed specific intent to
encourage another's infringement.” MEMC Elec. Materials, Inc. v. Mitsubishi Materials
Silicon Corp., 420 F.3d 1369, 1378 (Fed. Cir. 2005) (quoting Minn. Mining & Mfg. Co. v.
Chemque, Inc., 303 F.3d 1294, 1304-05 (Fed. Cir. 2002)). We recently clarified en
banc that the specific intent necessary to induce infringement “requires more than just
intent to cause the acts that produce direct infringement. . . . [T]he inducer must have an
affirmative intent to cause direct infringement.” DSU Med. Corp. v. JMS Co., 471 F.3d
1293, 1306 (Fed. Cir. 2006) relevant section (en banc). Thus, “inducement requires
evidence of culpable conduct, directed to encouraging another's infringement, not
merely that the inducer had knowledge of the direct infringer's activities.” Id.
On appeal, Symantec asserts that it produced ample evidence to establish that
the EAV products have no utility apart from screening downloaded or copied data files.
That is, the EAV products operate only when a user downloads or copies a file onto his
computer, and the downloading or copying must happen via a downloading or copying
software program. In particular, Symantec points out that the EAV product manual
establishes that CA promotes its use of the EAV product in combination with a
downloading program in an infringing manner. The manual states that “[t]he Realtime
Monitor scans programs on a workstation or server each time a file is executed,
2007-1201, -1239 16
accessed, or opened.” J.A. at 6213. In its discussion of the internet, the manual states
that “[t]he newest source of infections is the Internet. . . . This feature works with
browsers from Netscape and Microsoft.” Id. at 6214. In response, CA maintains that
Symantec has not shown any evidence of direct infringement because it has not shown
that any CA customer actually performs all of the claimed method steps. Absent such a
showing, CA contends that the district court properly granted summary judgment.
We find that there are genuine issues of material fact as to whether CA induced
its customers to infringe the ‘776 patent. We agree with Symantec that CA encouraged
customers to engage in direct infringement by using the EAV products in conjunction
with a downloading program. This is not a case where the customers may be using the
product in either an infringing way or a non-infringing way; CA’s customers can only use
the EAV products in an infringing way. Under these circumstances, Symantec has
produced sufficient circumstantial evidence of direct infringement to create a genuine
issue of material fact, even though Symantec has not produced evidence that any
particular customer has directly infringed the ‘776 patent. Direct evidence of
infringement, as opposed to circumstantial evidence, is not necessary. See
Chiuminatta Concrete Concepts, Inc. v. Cardinal Indus., Inc., 145 F.3d 1303, 1312 (Fed.
Cir. 1998) (finding that Cardinal's advertisements conceded the ability of the accused
device to practice the claimed method, and encouraged such use); Moleculon Research
Corp. v. CBS, Inc., 793 F.2d 1261, 1272 (Fed. Cir. 1986) (rejecting the argument that
“proof of inducing infringement or direct infringement requires direct, as opposed to
circumstantial evidence”).
2007-1201, -1239 17
We therefore vacate and remand the district court’s summary judgment finding of
non-infringement with respect to the EAV products. 7 On remand, the district court
should consider whether the specific intent requirement set forth in DSU, which was
decided after the grant of summary judgment in this case, was met.
III
On cross-appeal, CA challenges the district court’s summary judgment finding
that the doctrine of laches does not bar Symantec’s recovery for CA’s alleged patent
infringement prior to the filing of suit. At the outset, we dismiss CA’s laches claim as an
improper cross-appeal. “A party may cross-appeal if adversely affected by the
appealed judgment in some particular which it seeks to have modified.” TypeRight
Keyboard Corp. v. Microsoft Corp., 374 F.3d 1151, 1156 (Fed. Cir. 2004) (internal
quotation marks omitted). A cross-appeal may only be filed “when a party seeks to
enlarge its own rights under the judgment or to lessen the rights of its adversary under
the judgment.” Bailey v. Dart Container Corp., 292 F.3d 1360, 1362 (Fed. Cir. 2002).
Thus, a properly filed cross-appeal requires that, upon acceptance of appellee’s
argument, our determination would result in a reversal or modification of the judgment
rather than an affirmance. See id. Here, the district court granted summary judgment
of non-infringement on CA’s EAV products. CA argues on appeal that the doctrine of
laches precludes Symantec from recovering damages on those products for any period
before the filing of suit. Thus, even if we were to agree with CA that laches precludes
Symantec’s recovery over the EAV products, our determination would have no effect on
7
We note that the district court appeared to confuse the test for inducement
with the test for the doctrine of equivalents. The two concepts are not related.
2007-1201, -1239 18
the district court’s judgment. We therefore dismiss as improperly filed CA’s laches
cross-appeal. 8
However, we may consider CA’s laches arguments as an alternative ground for
sustaining the judgment of non-infringement. TypeRight Keyboard, 374 F.3d at 1160
(“Even though we lack jurisdiction over the cross-appeal, [the appellee] may still defend
the judgment on other grounds.”). We find that the district court did not err in dismissing
CA’s laches defense on summary judgment.
A defendant, in order to invoke the defense of laches, must prove: “(1) [that] the
plaintiff delayed filing suit for an unreasonable and inexcusable length of time from the
time the plaintiff knew or reasonably should have known of its claim against the
defendant, and (2) [that] the delay operated to the prejudice or injury of the defendant.”
A.C. Aukerman Co. v. R.L. Chaides Constr. Co., 960 F.2d 1020, 1032 (Fed. Cir. 1992)
(en banc). A presumption of laches arises “upon proof that the patentee delayed filing
suit for more than six years after actual or constructive knowledge of the defendant’s
alleged infringing activity.” Id. at 1035-36. We review a district court's determination on
the issue of laches for an abuse of discretion. Id. at 1039.
The ‘776 patent issued to Hilgraeve on June 7, 1994. In June 1995, an
independent software company called Cheyenne Software began marketing a real-time
antivirus software product called Inoculan. Hilgraeve sent a warning letter to Cheyenne
dated October 5, 1996, regarding possible infringement. On November 6, 1996, CA
8
CA’s other cross-appeals, directed to inequitable conduct, invalidity over
the prior art, and inventorship, are proper because they would expand the scope of the
judgment. In TypeRight Keyboard, we explained that “where the appellee urges
invalidity as a new ground on which to support a judgment of non-infringement . . . a
2007-1201, -1239 19
acquired Cheyenne Software, and thereafter allegedly “re-branded” the Inoculan
product into one of its eTrust antivirus products. Hilgraeve filed the present suit against
CA on September 18, 2002, and, as discussed above, Symantec later acquired
Hilgraeve’s interest in the ‘776 patent and was substituted as the plaintiff in the present
suit.
Before the district court, CA argued that Symantec should be charged with the
period of delay attributable to Hilgraeve when it stepped in as the plaintiff in the present
suit. CA asserted that Cheyenne’s open and notorious marketing of Inoculan in June
1995 established Hilgraeve’s constructive knowledge of Cheyenne’s infringing use, and
that, regardless, the October 5, 1996, warning letter established Hilgraeve’s actual
knowledge of Cheyenne’s infringing use. Finally, CA argued that by establishing
Hilgraeve’s knowledge of Cheyenne’s alleged infringement, it was also establishing
Hilgraeve’s knowledge with respect to the accused CA products at issue here, since CA
“re-branded” the Inoculan product into one of its own.
The district court held that Hilgraeve’s alleged knowledge of Inoculan, either
constructive or actual, was insufficient as a matter of law to establish Hilgraeve’s
knowledge of the alleged infringing CA products. In doing so, it did not reach the
question of whether Symantec should be charged with Hilgraeve’s knowledge. Rather,
it concluded that CA had failed to show evidence establishing that Inoculan was the
same or similar to the products in suit. We agree that laches would only apply if the
products were the same or similar, see Watkins v. Northwestern Ohio Tractor Pullers
Association, Inc., 630 F.2d 1155, 1164 (6th Cir. 1980), and that CA has presented
cross-appeal is necessary since a judgment of invalidity is broader than a judgment of
2007-1201, -1239 20
insufficient evidence that Inoculan is the same or similar to any of the products in suit. 9
On appeal, CA does not point to any such evidence but contends that Symantec’s
October 5, 1996, warning letter to CA, urging that it had committed willful infringement,
must be interpreted as an admission that Inoculan was a precursor to one of the CA
products at issue here. We cannot agree. Willful infringement requires an objective
showing that the alleged actions constituted infringement of a valid patent, “determined
by the record developed in the infringement proceeding.” In re Seagate Tech., LLC,
497 F.3d 1360, 1371 (Fed. Cir. 2007). An allegation of willful infringement does not
assume any similarity between Inoculan and the products in suit. We therefore find that
the district court did not err in granting summary judgment to Symantec on CA’s laches
defense.
IV
Levin (and CA) asserts that he is an omitted co-inventor of the ‘776 patent. 10 To
show co-inventorship, Levin is required to prove his contribution to the conception of the
claims by clear and convincing evidence. See Ethicon, Inc. v. U.S. Surgical Corp., 135
F.3d 1456, 1461 (Fed. Cir. 1998). An alleged co-inventor’s testimony, standing alone,
cannot rise to the level of clear and convincing evidence; he must supply evidence to
corroborate his testimony. Id. In Gemstar-TV Guide International, Inc. v. International
Trade Commission, 383 F.3d 1352 (Fed. Cir. 2004), we explained that “[w]hether the
non-infringement.” 374 F.3d at 1157 n.4.
9
Relying on an expert’s affidavit, CA asserts that the latest products at
issue here utilize the same “antivirus engine technology” as that used in the original
Inoculan product. This is hardly the same as demonstrating that the earlier product
embodied the same claimed features as the accused product.
10
Levin licensed any interest he may have in the ’776 patent to CA.
2007-1201, -1239 21
co-inventor's testimony has been sufficiently corroborated is evaluated under a ‘rule of
reason analysis,’ which requires that an ‘evaluation of all pertinent evidence must be
made so that a sound determination of the credibility of the inventor's story may be
reached.’” Id. at 1382 (quoting Price v. Symsek, 988 F.2d 1187, 1195 (Fed. Cir. 1993)).
Corroborating evidence may be in the form of “records made contemporaneously with
the inventive process,” “[c]ircumstantial evidence of an independent nature,” or “oral
testimony from someone other than the alleged inventor.” Id.
Before the district court, Levin submitted a declaration stating that he gave
Matthew H. Gray (“Gray”), one of the named inventors of the ‘776 patent, the idea for
the in-transit virus scan method in a February 12, 1990, telephone call. To corroborate
his declaration, Levin submitted Gray’s day planner, which reflected Gray’s notes
confirming that the disputed telephone call took place. Levin points out that Gray
testified that the day planner entry that reflected his conversation with Levin was
“relat[ed] to the ’776 patent.” J.A. at 10,064. In addition, Levin relied on the lack of
evidence showing Gray’s conception of the in-transit virus scan invention, which he
argued further corroborated his own testimony.
The district court found that the day planner entry was insufficient as
corroborating evidence. That entry, according to the district court, “at most shows only
that [Levin and Gray] discussed the then-current state of the art”; it “fail[ed] to explicitly
identify [Levin’s] contribution.” J.A. at 87-88. We agree with the district court that, at
most, the day planner entry establishes that Gray and Levin spoke about the then-
current state of anti-virus programs; it does not establish that Levin contributed to the
idea. That entry, listing an “IBM SCAN program,” a “Computer Virus Handbook,” “Jim
2007-1201, -1239 22
McAffey’s Virus Scan,” and “Levin’s Checkup Antivirus System,” J.A. at 1841, suggests
only that Gray simply called Levin to discuss the state of the prior art.
The district court also found that any evidence tending to call into question Gray’s
contribution to the invention was irrelevant to the question of whether Levin made any
contribution. Again, we agree with the district court that the evidence regarding Gray’s
contribution was not relevant to the question of Levin’s contribution. This is particularly
so because Gray was not the sole inventor here; even though he may have lacked
technical expertise, there is no suggestion that his co-inventors also lacked any
technical expertise. This case is thus distinguishable from Ethicon, where we held that
a sole inventor’s lack of technical expertise corroborated another’s claim of co-
inventorship. 135 F.3d at 1464-65.
Levin’s declaration itself is insufficient because it lacks corroboration. We
therefore affirm the district court’s conclusion that Levin has failed to establish a
genuine issue of material fact that he was a co-inventor of the ’776 patent.
V
CA appeals the district court’s summary judgment determination that Hilgraeve
did not commit inequitable conduct before the Patent Office in procuring the ’776 patent.
CA alleges that Hilgraeve made three separate false and material misrepresentations to
the Patent Office: (1) Gray’s April 18, 1990, declaration that he was an inventor of the
’776 patent; (2) Gray’s August 12, 1990, declaration to overcome prior art; and (3) co-
inventor Donald Wakelin’s April 18, 1990, declaration that he understood the claims of
the patent application.
2007-1201, -1239 23
Patent applicants “have a duty to prosecute patent applications in the Patent
Office with candor, good faith, and honesty.” Honeywell Int’l Inc. v. Universal Avionics
Sys. Corp., 488 F.3d 982, 999 (Fed. Cir. 2007). A breach of this duty constitutes
inequitable conduct and renders the entire patent unenforceable. Id. In order to
establish inequitable conduct, the party challenging the patent is required to establish by
clear and convincing evidence that the patent applicant “(1) either made an affirmative
misrepresentation of material fact, failed to disclose material information, or submitted
false material information, and (2) intended to deceive the U.S. Patent and Trademark
Office.” Cargill, Inc. v. Canbra Foods, Ltd., 476 F.3d 1359, 1363 (Fed. Cir. 2007).
“Once threshold findings of materiality and intent are established, the trial court must
weigh them to determine whether the equities warrant a conclusion that inequitable
conduct occurred.” Purdue Pharma L.P. v. Endo Pharmaceuticals Inc., 438 F.3d 1123,
1128 (Fed. Cir. 2006).
Information is material when “a reasonable examiner would consider it important
in deciding whether to allow the application to issue as a patent.” eSpeed, Inc. v.
BrokerTec USA, L.L.C., 480 F.3d 1129, 1136 (Fed. Cir. 2007) (quoting A.B. Dick Co. v.
Burroughs Corp., 798 F.2d 1392, 1397 (Fed. Cir. 1986)). Moreover, we have found that
“[f]alse statements are more likely material when embodied in declarations or affidavits
submitted to the PTO.” Id.
CA’s first inequitable conduct claim arises out of the April 18, 1990, declaration
that Gray signed and submitted with the patent application that led to the ‘776 patent. In
the declaration, Gray submitted that he was “an original, first and joint inventor . . . of
the subject matter which is claimed and for which a patent is sought.” J.A. at 1828-30.
2007-1201, -1239 24
CA asserts that Gray’s declaration was a false statement because the idea for the in
transit virus-detection method was Levin’s. Even if Levin somehow contributed to the
invention (which, as noted above, has not been established), that fact alone would not
establish that Gray did not also contribute to the invention. CA also relies on Gray’s
inability at trial to identify with specificity the contribution that he made to the invention.
We agree with the district court that Gray’s inability to identify with precision his
contribution, nearly fourteen years later, does not show anything more than that Gray
simply could not recall, particularly since Gray and a co-inventor, John Hile, both
testified in general terms that Gray came up with the idea. 11 Finally, CA contends that
Gray’s lack of technical expertise establishes that Gray was not an inventor. We
disagree. Gray was not the sole inventor of the claimed method. Indeed, Gray worked
with the other inventors who did have technical expertise to design the invention. For
these reasons, we find that the district court did not err in granting summary judgment
that CA has failed to present a genuine issue of material fact that Gray was not the
inventor.
CA’s second inequitable conduct claim arises from an August 12, 1992,
declaration submitted by Gray to the PTO in response to an office action. Gray’s
declaration was submitted together with a number of prior art references. In the
declaration, Gray described the state of the prior art with specific reference to the
attached publications and identified the “significant advantages over the existing virus
11
CA appears to argue that Gray testified that the notes in the day planner
described the invention, and that, since the notes summarized the Levin telephone call,
the idea must have originated with Levin. Gray’s testimony, however, was that the day
planner entry was evidence of the date of conception, and not of the idea itself.
2007-1201, -1239 25
scanning, detecting and eliminating software” that his invention achieved. J.A. at 3866.
In paragraph 1 of the declaration, Gray stated that he “ha[d] practiced in the field of
computer software and, more particularly, in the area of computer communications
software for 10 years . . . [and that a]s a consequence, [Gray had] become intimately
familiar with the state of the art as it relates to computer viruses, computer virus
detection, and computer virus prevention.” Id. at 3863. CA claims that this declaration
was false and misleading, because Gray was a marketing person, not a software
person with technical expertise.
CA does not assert that the substance of the declaration itself was either false or
misleading. The sole argument is that Gray’s description of his own qualifications is
misleading. The district court found that Gray’s lack of technical expertise alone was
insufficient to establish that his declaration was a misrepresentation. We agree. There
is nothing in the record that indicates that Gray was not “intimately familiar with the state
of the art,” and the mere fact that he was not a technical person does nothing to refute
that. 12
CA also relies on paragraph 4 of that declaration, where Gray stated that he “set
out to develop an algorithm which would determine whether a file was infected with a
virus during [a] transfer and to stop the transfer before the virus was copied into the
system.” Id. at 3864. CA asserts that this claim was also false and misleading, since
12
When questioned as to whether “[s]itting here today, [Gray had] any
knowledge concerning the state of the art in connection with computer software design
and development,” Gray stated: “I don’t believe there’s any point in time when I would
have been so bold as to claim I had knowledge of the state of the art of anything.” J.A.
at 9993. We do not read that statement as contradicting the statement he made in the
declaration concerning his earlier knowledge of virus screening technology, but rather to
relate to his lack of knowledge of computer software design and development generally.
2007-1201, -1239 26
Gray later testified that he did not develop the mathematical algorithm, but rather that
one of the co-inventors, Donald Wakelin, developed the algorithm. Gray’s assertion that
he “set out to develop an algorithm” is not the same as asserting that he actually
developed the algorithm himself. Again, we see no basis for a misrepresentation claim.
We conclude that CA has not established a genuine question of material fact that Gray’s
August 12, 1992, declaration was false or misleading.
CA’s final inequitable conduct claim arises from Wakelin’s April 18, 1990,
declaration submitted with the original application, where he stated that he had
“reviewed and underst[ood] the contents of the . . . specification, including the
claims . . . .” Id. at 1828. That declaration, according to CA, was false and misleading
because Wakelin allegedly did not understand the claims of the patent. Instead,
Wakelin testified that he only understood the claims in general terms, that “the
statements in claim one are so vague as to be practically unintelligible,” id. at 10006,
and that he didn’t “really understand what these claims are saying.” Id. at 10007. The
district court found that, even if Wakelin did not fully understand the claims of the patent,
that alone was not sufficient to establish a threshold level of materiality. We agree. As
the district court stated, “Wakelin’s failure to fully understand the language of the claim
contents should not be confused for failure to understand the meaning of the claims,
which would likely be considered material by a ‘reasonable examiner.’” Id. at 124.
VI
Finally, we must address CA’s counterclaims for invalidity. Our constructions of
the terms “computer,” “computer system,” and “destination storage medium” require us
to vacate and remand the district court’s summary judgment finding that the Photonix
2007-1201, -1239 27
and the Mac prior art references did not render the claims invalid. This is because the
same construction governs for validity determinations as for infringement
determinations. Yoon Ja Kim v. ConAgra Foods, Inc., 465 F.3d 1312, 1324 (Fed. Cir.
2006). Here, the district court distinguished the ’776 patent claims over Photonix and
the Mac prior art based on the conclusion that both of these antivirus programs ran on
an Apple II GS computer, which itself only used peripheral devices (i.e., a floppy drive)
because it did not include a hard drive. 13 The district court also concluded, with respect
to the invalidity of the claims based on the Mac prior art, that “the Macintosh programs
do not store the actual screened digital data after screening, but only a reference to the
screened data,” and therefore did not meet the claim limitation “automatically store the
transferred digital data.” J.A. at 184-85. The district court’s decision in this respect is
somewhat unclear as are the parties’ briefs on this point. The district court’s holding
may well be intertwined with its holding that the Apple II GS computer, on which the
Mac programs operated, did not have a destination storage medium. Under the
circumstances, we decline to address the issue at this time. Hopefully the nature of the
district court’s decision will be clarified on remand.
CONCLUSION
We hold that the district court erred in its construction of the claim terms “a
method of screening data as it is being transferred,” “destination storage medium,”
“computer,” and “computer system.” We therefore vacate and remand as to non-
infringement and invalidity. We affirm the district court’s decision on laches, inequitable
conduct, and inventorship.
13
The district court appeared not to address claims 18-20, and on remand
2007-1201, -1239 28
The judgment of the district court is AFFIRMED-IN-PART and VACATED-IN-
PART and REMANDED.
No costs.
should treat them separately.
2007-1201, -1239 29