Sri International, Inc. v. Cisco Systems, Inc.

United States Court of Appeals for the Federal Circuit ______________________ SRI INTERNATIONAL, INC., Plaintiff-Appellee v. CISCO SYSTEMS, INC., Defendant-Appellant ______________________ 2017-2223 ______________________ Appeal from the United States District Court for the District of Delaware in No. 1:13-cv-01534-SLR-SRF, Judge Sue L. Robinson. ______________________ Decided: March 20, 2019 ______________________ FRANK SCHERKENBACH, Fish & Richardson, PC, Bos- ton, MA, argued for plaintiff-appellee. Also represented by PROSHANTO MUKHERJI; DAVID MICHAEL HOFFMAN, Austin, TX; HOWARD G. POLLACK, Redwood City, CA; FRANCIS J. ALBERT, JOHN WINSTON THORNBURGH, San Diego, CA. WILLIAM F. LEE, Wilmer Cutler Pickering Hale and Dorr LLP, Boston, MA, argued for defendant-appellant. Also represented by ANDREW J. DANFORD, LAUREN B. FLETCHER, LOUIS W. TOMPROS. ______________________ 2 SRI INT’L, INC. v. CISCO SYS., INC. Before LOURIE, O’MALLEY, and STOLL, Circuit Judges. Opinion for the court filed by Circuit Judge STOLL. Dissenting opinion filed by Circuit Judge LOURIE. STOLL, Circuit Judge. This is an appeal from a final judgment in a patent case. Cisco Systems, Inc. (“Cisco”) appeals the district court’s (1) denial of Cisco’s motion for summary judgment of patent ineligibility under § 101, (2) construction of the claim term “network traffic data,” (3) grant of summary judgment of no anticipation, and (4) denial of judgment as a matter of law of no willful infringement. Cisco also ap- peals the district court’s grant of enhanced damages, attor- neys’ fees, and ongoing royalties. We affirm the district court’s denial of summary judg- ment of ineligibility, adopt its construction of “network traffic data,” and affirm its summary judgment of no antic- ipation. We vacate and remand the district court’s denial of judgment as a matter of law of no willful infringement, and therefore vacate the district court’s enhancement of damages. We also vacate the district court’s award of at- torneys’ fees and remand for recalculation. Finally, we af- firm the district court’s award of ongoing royalties on post- verdict sales of products that were actually found to in- fringe or are not colorably different. Accordingly, we af- firm-in-part, vacate-in-part, and remand for further proceedings consistent with this opinion. BACKGROUND I While the interconnectivity of computer networks facil- itates access for authorized users, it also increases a net- work’s susceptibility to attacks from hackers, malware, and other security threats. Some of these security threats can only be detected with information from multiple sources. For instance, a hacker may try logging in to SRI INT’L, INC. v. CISCO SYS., INC. 3 several computers or monitors in a network. The number of login attempts for each computer may be below the threshold to trigger an alert, making it difficult to detect such an attack by looking at only a single monitor location in the network. In an attempt to solve this problem, SRI developed the inventions claimed in U.S. Patent Nos. 6,484,203 and 6,711,615. The ’615 patent (titled “Net- work Surveillance”) is a continuation of the ’203 patent (ti- tled “Hierarchical Event Monitoring and Analysis”). II SRI had performed considerable research and develop- ment on network intrusion detection prior to filing the pa- tents-in-suit. In fact, SRI’s Event Monitoring Enabling Responses to Anomalous Live Disturbances (“EMERALD”) project had attracted considerable attention in this field. The Department of Defense’s Defense Advanced Research Projects Agency, which helped fund EMERALD, called it a “gem in the world of cyber defense” and “a quantum leap improvement over” previous technology. J.A. 1272–73 at 272:16–17, 273:7–9. In October 1997, SRI presented a paper entitled “EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances” (“EMERALD 1997”) at the 20th National Information Sys- tems Security Conference. EMERALD 1997 is a conceptual overview of the EMERALD system. It describes in detail SRI’s early re- search in intrusion detection technology and outlines the development of next generation technology for detecting network anomalies. SRI Int’l Inc. v. Internet Sec. Sys., Inc., 647 F. Supp. 2d 323, 334 (D. Del. 2009). The parties do not dispute that EMERALD 1997 constitutes prior art under 35 U.S.C. § 102(b). EMERALD 1997 is listed as a reference on the face of the ’615 patent. 4 SRI INT’L, INC. v. CISCO SYS., INC. III The patents share a nearly identical specification and a priority date of November 9, 1998. At the summary judg- ment stage, SRI asserted claims 1–4, 14–16, and 18 of the ’615 patent and claims 1–4, 12–15, and 17 of the ’203 pa- tent. By the time of trial, SRI had narrowed the asserted claims to claims 1, 2, 12, and 13 of the ’203 patent and claims 1, 2, 13, and 14 of the ’615 patent. The jury consid- ered only this narrower set of claims. The parties identify different representative claims. Cisco proposes claim 1 of the ’203 patent, while SRI pro- poses claim 1 of the ’615 patent. The claims are substan- tially similar, as the minor differences between them are not material to any issue on appeal. As such, we adopt SRI’s proposal and use ’615 patent claim 1 as the repre- sentative claim. 1 It reads: 1. A computer-automated method of hierarchical event monitoring and analysis within an enterprise network comprising: deploying a plurality of network monitors in the enterprise network; detecting, by the network monitors, suspicious network activity based on analysis of network traffic data selected from one or more of the fol- lowing categories: {network packet data 1 The minor differences between the two claims are in the detecting clause—claim 1 of the ’615 patent allows for network traffic data selected from “one or more of” the enumerated categories, and includes two extra categories in its list: “network connection acknowledgements” and “network packets indicative of well-known network-service protocols.” Compare ’203 patent col. 14 ll. 19–35 (claim 1), with ’615 patent col. 15 ll. 2–21 (claim 1). SRI INT’L, INC. v. CISCO SYS., INC. 5 transfer commands, network packet data transfer errors, network packet data volume, network connection requests, network connec- tion denials, error codes included in a network packet, network connection acknowledge- ments, and network packets indicative of well- known network-service protocols}; generating, by the monitors, reports of said suspicious activity; and automatically receiving and integrating the re- ports of suspicious activity, by one or more hi- erarchical monitors. ’615 patent col. 15 ll. 2–21. After SRI sued Cisco for infringement of the ’615 pa- tent and the ’203 patent, Cisco unsuccessfully moved for summary judgment on several issues, including that the claims are ineligible and that the EMERALD 1997 refer- ence anticipates the claims. 2 SRI Int’l, Inc. v. Cisco Sys., 2 The patents previously survived multiple anticipa- tion challenges based on the EMERALD 1997 reference. The Patent Office considered EMERALD 1997 during the original prosecution and issued the patents over it. J.A. 32734 ¶ 47; J.A. 32814–15 ¶ 207. In addition, during the two reexaminations, the Patent Office again considered the validity of the asserted claims over EMERALD 1997 and again found the claims valid. J.A. 32734 ¶ 47. Addi- tionally, in SRI International Inc. v. Internet Security Sys- tems, Inc., a jury found the patents not anticipated by EMERALD 1997. 647 F. Supp. 2d at 350. The district court denied JMOL, concluding that the verdict was sup- ported by expert testimony that EMERALD 1997 failed to disclose the claim limitation at issue. Id. We affirmed without opinion. SRI Int’l Inc. v. Internet Sec. Sys., Inc., 401 F. App’x 530 (Fed. Cir. 2010). 6 SRI INT’L, INC. v. CISCO SYS., INC. Inc., 179 F. Supp. 3d 339 (D. Del. Apr. 11, 2016) (“Sum- mary Judgment Op.”). The district court denied Cisco’s mo- tions and instead sua sponte granted summary judgment of no anticipation in SRI’s favor. 3 Id. at 369. The court then held a jury trial on infringement, valid- ity, and willful infringement of claims 1, 2, 13, and 14 of the ’615 patent and claims 1, 2, 12, and 13 of the ’203 pa- tent, as well as damages. The jury found that Cisco intru- sion protection system (“IPS”) products, Cisco remote management services, Cisco IPS services, Sourcefire 4 IPS products, and Sourcefire professional services directly and indirectly infringed the asserted claims. The jury awarded SRI a 3.5% reasonable royalty for a total of $23,660,000 in compensatory damages. The jury also found by clear and convincing evidence that Cisco’s infringement was willful. After post-trial briefing, the district court denied Cisco’s renewed motion for JMOL of no willfulness. SRI Int’l, Inc. v. Cisco Sys., Inc., 254 F. Supp. 3d 680, 717 (D. Del. 2017) (“Post-Trial Motions Op.”). Based on the willfulness verdict, the district court determined that “some enhancement is appropriate given Cisco’s litigation conduct,” the “fact that Cisco lost on all issues during sum- mary judgment,” and “its apparent disdain for SRI and its business model.” Id. at 723. The court then doubled the 3 The parties disputed only whether EMERALD 1997 discloses detection of any of the network traffic data categories listed in claim 1 of the ’203 and ’615 patents and whether EMERALD 1997 is enabled. One of the claimed categories of network traffic is “network connection requests,” which Cisco asserts is disclosed by EMERALD 1997. 4 “Sourcefire” is a network security company that Cisco acquired in 2013. J.A. 2467–68. Cisco now markets network security products and services under the Sourcefire name. SRI INT’L, INC. v. CISCO SYS., INC. 7 damages award. It also granted SRI’s motion for attorneys’ fees, compulsory license, and prejudgment interest. Cisco appeals the district court’s claim construction and denial of summary judgment of ineligibility, 5 as well as its grant of summary judgment of no anticipation, en- hanced damages, attorneys’ fees, and ongoing royalties. We have jurisdiction under 28 U.S.C. § 1295(a)(1). DISCUSSION I We review de novo whether a claim is drawn to patent- eligible subject matter. Berkheimer v. HP Inc., 881 F.3d 1360, 1365 (Fed. Cir. 2018) (citing Intellectual Ventures I LLC v. Capital One Fin. Corp., 850 F.3d 1332, 1338 (Fed. Cir. 2017)). Section 101 defines patent-eligible sub- ject matter as “any new and useful process, machine, man- ufacture, or composition of matter, or any new and useful improvement thereof.” 35 U.S.C. § 101. Laws of nature, natural phenomena, and abstract ideas, however, are not patentable. See Mayo Collaborative Servs. v. Prometheus 5 We may review this denial of summary judgment because “a denial of a motion for summary judgment may be appealed, even after a final judgment at trial, if the mo- tion involved a purely legal question and the factual dis- putes resolved at trial do not affect the resolution of that legal question.” United Techs. Corp. v. Chromalloy Gas Turbine Corp., 189 F.3d 1338, 1344 (Fed. Cir. 1999) (citing Wolfgang v. Mid-Am. Motorsports, Inc., 111 F.3d 1515, 1521 (10th Cir. 1997); Rekhi v. Wildwood Indus., Inc., 61 F.3d 1313, 1318 (7th Cir. 1995)). Neither party con- tends that fact issues arise in the patent-eligibility analysis in this case. Therefore, we may review the purely legal question of patent eligibility. 8 SRI INT’L, INC. v. CISCO SYS., INC. Labs., Inc., 566 U.S. 66, 70–71 (2012) (citing Diamond v. Diehr, 450 U.S. 175, 185 (1981)). To determine whether a patent claims ineligible sub- ject matter, the Supreme Court has established a two-step framework. First, we must determine whether the claims at issue are directed to a patent-ineligible concept such as an abstract idea. Alice Corp. v. CLS Bank Int’l, 573 U.S. 208, 217 (2014). Second, if the claims are directed to an abstract idea, we must “consider the elements of each claim both individually and ‘as an ordered combination’ to deter- mine whether the additional elements ‘transform the na- ture of the claim’ into a patent-eligible application.” Id. (quoting Mayo, 566 U.S. at 79). To transform an abstract idea into a patent-eligible application, the claims must do “more than simply stat[e] the abstract idea while adding the words ‘apply it.’” Id. at 221 (quoting Mayo, 566 U.S. at 72 (internal alterations omitted)). We resolve the eligibility issue at Alice step one and conclude that claim 1 is not directed to an abstract idea. See Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1337 (Fed. Cir. 2016). The district court concluded that the claims are more complex than merely reciting the perfor- mance of a known business practice on the Internet and are better understood as being necessarily rooted in computer technology in order to solve a specific problem in the realm of computer networks. Summary Judgment Op., 179 F. Supp. 3d at 353–54 (citing ’203 patent col. 1 ll. 37– 40; DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1257 (Fed. Cir. 2014)). We agree. The claims are directed to using a specific technique—using a plurality of network monitors that each analyze specific types of data on the network and integrating reports from the monitors—to solve a technological problem arising in computer net- works: identifying hackers or potential intruders into the network. SRI INT’L, INC. v. CISCO SYS., INC. 9 Contrary to Cisco’s assertion, the claims are not di- rected to just analyzing data from multiple sources to de- tect suspicious activity. Instead, the claims are directed to an improvement in computer network technology. Indeed, representative claim 1 recites using network monitors to detect suspicious network activity based on analysis of net- work traffic data, generating reports of that suspicious ac- tivity, and integrating those reports using hierarchical monitors. ’615 patent col. 15 ll. 2–21. The “focus of the claims is on the specific asserted improvement in computer capabilities”—that is, providing a network defense system that monitors network traffic in real-time to automatically detect large-scale attacks. Enfish, 822 F.3d at 1335–36. The specification bolsters our conclusion that the claims are directed to a technological solution to a techno- logical problem. The specification explains that, while computer networks “offer users ease and efficiency in ex- changing information,” ’615 patent col. 1 ll. 28–29, “the very interoperability and sophisticated integration of tech- nology that make networks such valuable assets also make them vulnerable to attack, and make dependence on net- works a potential liability.” Id. at col. 1 ll. 36–39. The specification further teaches that, in conventional net- works, seemingly localized triggering events can have glob- ally disastrous effects on widely distributed systems—like the 1980 ARPAnet collapse and the 1990 AT&T collapse. See id. at col. 1 ll. 43–47. The specification explains that the claimed invention is directed to solving these weak- nesses in conventional networks and provides “a frame- work for the recognition of more global threats to interdomain connectivity, including coordinated attempts to infiltrate or destroy connectivity across an entire net- work enterprise.” Id. at col. 3 ll. 44–48. Cisco argues that the claims are directed to an abstract idea for three primary reasons. First, Cisco argues that the claims are analogous to those in Electric Power Group, LLC v. Alstom S.A., 830 F.3d 1350 (Fed. Cir. 2016), and are 10 SRI INT’L, INC. v. CISCO SYS., INC. simply directed to generic steps required to collect and an- alyze data. We disagree. The Electric Power claims were drawn to using computers as tools to solve a power grid problem, rather than improving the functionality of com- puters and computer networks themselves. Id. at 1354. We conclude that the claims are more like the patent-eligi- ble claims in DDR Holdings. In DDR, we emphasized that the claims were directed to more than an abstract idea that merely required a “computer network operating in its nor- mal, expected manner.” 773 F.3d at 1258. Here, the claims actually prevent the normal, expected operation of a con- ventional computer network. Like the claims in DDR, the claimed technology “overrides the routine and conventional sequence of events” by detecting suspicious network activ- ity, generating reports of suspicious activity, and receiving and integrating the reports using one or more hierarchical monitors. Id. Second, Cisco argues that the invention does not in- volve “an improvement to computer functionality itself.” Enfish, 822 F.3d at 1336. In Alice, the Supreme Court ad- vised that claims directed to independently abstract ideas that use computers as tools are still abstract. 573 U.S. at 222–23. However, the claims here are not directed to using a computer as a tool—that is, automating a conven- tional idea on a computer. Rather, the representative claim improves the technical functioning of the computer and computer networks by reciting a specific technique for improving computer network security. Cisco also submits that the asserted claims are so gen- eral that they encompass steps that people can “go through in their minds,” allegedly confirming that they are directed to an abstract concept. Appellant Br. 27–28 (citing Capital One, 850 F.3d at 1340; Intellectual Ventures I LLC v. Sy- mantec Corp., 838 F.3d 1307, 1318 (Fed. Cir. 2016); Cyber- Source Corp. v. Retail Decisions, Inc., 654 F.3d 1366, 1371 (Fed. Cir. 2011)). We disagree. This is not the type of hu- man activity that § 101 is meant to exclude. Indeed, we SRI INT’L, INC. v. CISCO SYS., INC. 11 tend to agree with SRI that the human mind is not equipped to detect suspicious activity by using network monitors and analyzing network packets as recited by the claims. Because we conclude that the claims are not directed to an abstract idea under step one of the Alice analysis, we need not reach step two. See Enfish, 822 F.3d at 1339. Ac- cordingly, we affirm the district court’s summary judgment that the claims are patent-eligible. II A district court’s claim construction based solely on in- trinsic evidence is a legal question that we review de novo. See Teva Pharm. USA, Inc. v. Sandoz, Inc., 135 S. Ct. 831, 841 (2015). Claim construction seeks to ascribe the “ordi- nary and customary meaning” to claim terms as a person of ordinary skill in the art would have understood them at the time of invention. Phillips v. AWH Corp., 415 F.3d 1303, 1312–14 (Fed. Cir. 2005) (en banc) (quoting Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996)). “[T]he claims themselves provide substantial guid- ance as to the meaning of particular claim terms.” Id. at 1314. In addition, “the person of ordinary skill in the art is deemed to read the claim term not only in the context of the particular claim in which the disputed term appears, but in the context of the entire patent, including the speci- fication.” Id. at 1313. The district court construed “[n]etwork traffic data” to mean “data obtained from direct examination of network packets.” SRI Int’l, Inc. v. Dell Inc., No. CV13-1534-SLR, 2015 WL 2265756, at *1–2 (D. Del. May 14, 2015). After reviewing the parties’ pleadings on summary judgment, the district court determined that its construction would benefit from clarification. The district court explained that “[t]o say that the data ‘is obtained from direct examination of network packets’ means to differentiate the original source of the data, not how or where the data is 12 SRI INT’L, INC. v. CISCO SYS., INC. analyzed. . . . The fact that the data may be stored before analysis is performed on the data does not detract from its lineage.” Summary Judgment Op., 179 F. Supp. 3d at 363. The district court explicitly rejected the opinion of Cisco’s expert, Dr. Clark, that the court’s claim construction should require that the analysis of data obtained from net- work packets take place without any further manipulation whatsoever. Id. On appeal, Cisco offers a more nuanced construction, asserting that term should instead be construed as “detect- ing suspicious network activity based on ‘direct examina- tion of network packets,’ where such ‘direct examination’ does not include merely examining data that has been ob- tained, generated, or gleaned from network packets.” Ap- pellant Br. 42. According to Cisco, based on SRI’s express prosecution disclaimer during reexamination, the claims require detecting suspicious activity based on “direct exam- ination” of network packets, not data “generated” or “gleaned” from packets. Cisco would thus construe the term to exclude a process that decodes the network packet. We conclude that Cisco’s proposed construction goes too far in limiting the amount of preprocessing encom- passed by the claim. The specification shows that prepro- cessing is a contemplated and expected part of the claimed invention. Indeed, the specification specifically mentions different forms of preprocessing network packets prior to examination, including decryption (’615 patent col. 3 ll. 61–63), parsing (id. at col. 8 ll. 10–12), and decoding (id. at col. 8 ll. 7–9). Cisco’s argument that SRI disclaimed preprocessing during reexamination of its patents is also not persuasive. To invoke argument-based estoppel, “the prosecution his- tory must evince a ‘clear and unmistakable surrender’” of this kind of preprocessing. Deering Precision Instruments v. Vector Distrib. Sys., 347 F.3d 1314, 1326 (Fed. Cir. 2003) (quoting Eagle Comtronics, Inc. v. Arrow Commc’n Labs., SRI INT’L, INC. v. CISCO SYS., INC. 13 Inc., 305 F.3d 1303, 1316 (Fed. Cir. 2002)); see also Krip- pelz v. Ford Motor Co., 667 F.3d 1261, 1267 (Fed. Cir. 2012) (applying prosecution history disclaimer from reexamina- tion proceedings). Here, SRI’s statements during reexam- ination reflect that SRI drew the line between what does and does not comprise “direct examination” by excluding information derived from network packet data (for exam- ple, network traffic measures and network traffic statis- tics). At the same time, SRI explained that “direct examination” includes the data from which the network traffic measures and network traffic statistics are derived (that is, the data in the network packets). For example, SRI explained that the specification: [D]emonstrates that the term “network traffic data” requires information obtained by direct packet examination by using the distinctly differ- ent terms “network traffic measures” and “network traffic statistics” when discussing information de- rived from network traffic observation, as com- pared to the data from which the measures and statistics are derived. Brief for the Patentee on Appeal at 7, In re Porras, Reexam No. 90/008,125 (B.P.A.I. Jan. 14, 2010) (citing ’203 patent col. 4 ll. 55–60 (discussing “network traffic statistics”) and col. 5 ll. 28–30 (discussing “network traffic measures”)). We read SRI’s statements during reexamination as simply explaining that “network traffic statistics,” such as number of packets and number of kilobytes transferred, are statistics derived from the network packet data—not the underlying data itself. SRI did not argue that the ac- tual data underlying the measures and statistics—the data in the network packets—could not be subject to direct ex- amination. Nor did SRI take the position that “direct ex- amination” must take place before any or all processing. SRI did not mention processing at all during reexamina- tion. Moreover, as the specification makes clear, the 14 SRI INT’L, INC. v. CISCO SYS., INC. system may need to decrypt, parse, or decode the data packets—all forms of preprocessing—in order to directly examine the network packet data underlying the network traffic statistics. We hold that SRI’s statements in the prosecution his- tory do not invoke a clear and unmistakable surrender of all preprocessing, including decryption, decoding, and parsing. Accordingly, we agree with the district court’s construction of “network traffic data” to mean “data ob- tained from direct examination of network packets.” III We also hold that the district court did not err in grant- ing summary judgment that the asserted claims are not an- ticipated by SRI’s own EMERALD 1997 reference. We review the district court’s summary judgment of no antici- pation under regional circuit law. See MAG Aerospace In- dus., Inc. v. B/E Aerospace, Inc., 816 F.3d 1374, 1376 (Fed. Cir. 2016). The Third Circuit reviews a grant of sum- mary judgment de novo, applying the same standard as the district court. See Gonzalez v. Sec’y of Dep’t of Homeland Sec., 678 F.3d 254, 257 (3d Cir. 2012). Summary judgment is appropriate when, drawing all justifiable inferences in the nonmovant’s favor, there exists no genuine issue of ma- terial fact and the movant is entitled to judgment as a mat- ter of law. Fed. R. Civ. P. 56(a); see also Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 255 (1986). Anticipation re- quires that a single prior art reference disclose each and every limitation of the claimed invention, either expressly or inherently. See Verdegaal Bros. v. Union Oil Co. of Cal., 814 F.2d 628, 631 (Fed. Cir. 1987). EMERALD 1997 discloses a tool for tracking malicious activity across large networks. The question before us is whether the district court erred in concluding on summary judgment that EMERALD 1997 does not disclose detection of any of the network traffic data categories listed in claim 1 of the ’203 and ’615 patents. The Patent Office SRI INT’L, INC. v. CISCO SYS., INC. 15 considered EMERALD 1997 during the original examina- tion of the ’615 patent, and the patentability of the claims over the reference was confirmed in multiple reexamina- tion and litigation proceedings. Indeed, during reexamina- tion, the Patent Office accepted SRI’s argument that the claim limitation requires detecting suspicious activity based on “direct examination” of network packets to distin- guish EMERALD 1997. J.A. 26402 (“[T]he closest prior art of record, Emerald 1997, fails to teach direct examination of packet data.”); J.A. 27101 (same). EMERALD 1997 describes detecting a DNS/NFS at- tack in “real-time.” J.A. 5004. To achieve this, EMERALD 1997 explains: The subscription list field is an important facility for gaining visibility into malicious or anomalous activity outside the immediate environment of an EMERALD monitor. The most obvious examples where relationships are important involve interde- pendencies among network services that make lo- cal policy decisions. Consider, for example, the interdependencies between access checks per- formed during network file system [“NFS”] mount- ing and the IP mapping of the DNS service. An unexpected mount monitored by the network file system service may be responded to differently if the DNS monitor informs the network file system monitor of suspicious updates to the mount re- quester’s DNS mapping. J.A. 5008. EMERALD 1997 further explains that: Above the service layer, signature engines scan the aggregate of intrusion reports from service moni- tors in an attempt to detect more global coordi- nated attack scenarios or scenarios that exploit interdependencies among network services. The DNS/NFS attack discussed [above] is one such ex- ample of an aggregate attack scenario. 16 SRI INT’L, INC. v. CISCO SYS., INC. J.A. 5010. Cisco’s expert submitted a report concluding that a per- son of ordinary skill in the art would understand from this disclosure that “monitoring specific network services, such as HTTP, FTP, network file systems, finger, Kerberos, and SNMP would require detecting and analyzing packets in- dicative of those well-known network service protocols, one of the enumerated categories in claim 1 of the ’615 patent.” J.A. 30347 (emphasis added). During deposition, however, Cisco’s expert retreated from this position, admitting that a person of ordinary skill reading EMERALD 1997 would have understood that it was not necessary to directly ex- amine the packets, although that would be “one very good way” to prevent attacks. J.A. 50040 at 159:12–21. On this record, we conclude that summary judgment was appropriate. EMERALD 1997 does not expressly dis- close directly examining network packets as required by the claims—especially not to obtain data about network connection requests. Nor does Cisco’s expert testimony cre- ate a genuine issue of fact on this issue. Rather, we agree with the district court that Cisco’s expert’s testimony is both inconsistent and “based on [] multiple layers of suppo- sition.” Summary Judgment Op., 179 F. Supp. 3d at 358. Because the evidence does not support express or inherent disclosure of direct examination of packet data, we con- clude that the district court did not err in holding that there was no genuine issue of fact regarding whether EMERALD 1997 disclosed analyzing the specific enumer- ated types of network traffic data recited in the claims. Cisco next argues that the district court erred by grant- ing summary judgment for SRI sua sponte despite SRI’s failure to move for such relief. We disagree. Under Third Circuit law, a district court may properly enter summary judgment sua sponte “so long as the losing party was on notice that she had to come forward with all of her evi- dence.” Gibson v. Mayor & Council of City of Wilmington, SRI INT’L, INC. v. CISCO SYS., INC. 17 355 F.3d 215, 222 (3d Cir. 2004) (quoting Celotex Corp. v. Catrett, 477 U.S. 317, 326 (1986)). By filing its own motion for summary judgment, Cisco was on notice that anticipa- tion was before the court, and Cisco had the opportunity to put forth its best evidence. Additionally, SRI did argue, in opposition to Cisco’s summary judgment motion, that the district court should outright reject Cisco’s assertion of in- validity. J.A. 31650 (“Cisco’s assertion of invalidity should be rejected . . . .”). Indeed, SRI expressly took the position that EMERALD 1997 “does not anticipate any claim of the ’203 or ’615 patents.” J.A. 31678. Thus, any notice require- ment was satisfied because Cisco itself indicated that the issue was ripe for summary adjudication and SRI took the position that the claims were not anticipated. Accordingly, we see no error in the sua sponte nature of the district court’s order and we affirm the summary judgment of no anticipation. IV Cisco also appeals the district court’s denial of JMOL that it did not willfully infringe the asserted patents be- cause the jury’s willfulness finding is not supported by sub- stantial evidence. We agree that the jury’s finding that Cisco willfully infringed the patents-in-suit prior to receiv- ing notice thereof is not supported by substantial evidence and therefore vacate and remand. We review decisions on motions for JMOL under the law of the regional circuit. Energy Transp. Grp. Inc. v. Wil- liam Demant Holding A/S, 697 F.3d 1342, 1350 (Fed. Cir. 2012). The Third Circuit reviews district court decisions on such motions de novo. Acumed LLC v. Adv. Surgical Servs., Inc., 561 F.3d 199, 211 (3d Cir. 2009) (citing Mon- teiro v. City of Elizabeth, 436 F.3d 397, 404 (3d Cir. 2006)). In the Third Circuit, a “court may grant a judgment as a matter of law contrary to the verdict only if ‘the record is critically deficient of the minimum quantum of evidence’ to sustain the verdict.” Id. (citing Gomez v. Allegheny Health 18 SRI INT’L, INC. v. CISCO SYS., INC. Servs., Inc., 71 F.3d 1079, 1083 (3d Cir. 1995)). The court should grant JMOL “sparingly” and “only if, viewing the evidence in the light most favorable to the nonmovant and giving it the advantage of every fair and reasonable infer- ence, there is insufficient evidence from which a jury rea- sonably could find liability.” Marra v. Phila. Hous. Auth., 497 F.3d 286, 300 (3d Cir. 2007) (quoting Moyer v. United Dominion Indus., Inc., 473 F.3d 532, 545 n.8 (3d Cir. 2007)). As the Supreme Court stated in Halo, “[t]he sort of con- duct warranting enhanced damages has been variously de- scribed in our cases as willful, wanton, malicious, bad- faith, deliberate, consciously wrongful, flagrant, or—in- deed—characteristic of a pirate.” Halo Elecs., Inc. v. Pulse Elecs., Inc., 136 S. Ct. 1923, 1932 (2016). While district courts have discretion in deciding whether or not behavior rises to that standard, such findings “are generally re- served for egregious cases of culpable behavior.” Id. In- deed, as Justice Breyer emphasized in his concurrence, it is the circumstances that transform simple “intentional or knowing” infringement into egregious, sanctionable behav- ior, and that makes all the difference. Id. at 1936 (Breyer, J., concurring). A patentee need only show by a preponder- ance of the evidence the facts that support a finding of will- ful infringement. Id. at 1934. In denying Cisco’s motion for JMOL on willfulness, the district court concluded that the jury’s willfulness determi- nation was supported by two evidentiary bases. First, the court identified evidence that “key Cisco employees did not read the patents-in-suit until their depositions.” Post-Trial Motions Op., 254 F. Supp. 3d at 717. Second, the court identified evidence that Cisco designed the products and services in an infringing manner and that Cisco instructed its customers to use the products and services in an infring- ing manner. Based on these two facts, the district court denied Cisco’s renewed motion for JMOL on willfulness, stating that “[v]iewing the record in the light most SRI INT’L, INC. v. CISCO SYS., INC. 19 favorable to SRI, substantial evidence supports the jury’s subjective willfulness verdict.” Id. On appeal, SRI identifies additional evidence that pur- portedly supports the jury’s willfulness verdict. Specifi- cally, SRI presented evidence that Cisco expressed interest in the patented technology and met with SRI’s inventor in 2000 before developing its infringing products. J.A. 1484– 86; J.A. 5027. Additionally, SRI submitted evidence that Cisco received a notice letter from SRI’s licensing consult- ant on May 8, 2012, informing Cisco of the asserted patents (a year before SRI filed the complaint). Finally, like the district court, SRI makes much of the fact that “key engi- neers” did not look at SRI’s patents until SRI took their depositions during this litigation. In particular, Cisco en- gineers Martin Roesch and James Kasper did not look at the patent until their depositions in 2015. Even accepting this evidence as true and weighing all inferences in SRI’s favor, we conclude that the record is in- sufficient to establish that Cisco’s conduct rose to the level of wanton, malicious, and bad-faith behavior required for willful infringement. First, it is undisputed that the Cisco employees who did not read the patents-in-suit until their depositions were engineers without legal training. Given Cisco’s size and resources, it was unremarkable that the engineers—as opposed to Cisco’s in-house or outside coun- sel—did not analyze the patents-in-suit themselves. The other rationale offered by the district court—that Cisco de- signed the products and services in an infringing manner and that Cisco instructed its customers to use the products and services in an infringing manner—is nothing more than proof that Cisco directly infringed and induced others to infringe the patents-in-suit. It is undisputed that Cisco did not know of SRI’s patent until May 8, 2012, when SRI sent its notice letter to Cisco. Oral Arg. at 23:46, available at http://oralarguments.cafc. uscourts.gov/default.aspx?fl=2017-2223.mp3. It is also 20 SRI INT’L, INC. v. CISCO SYS., INC. undisputed that this notice letter was sent years after Cisco independently developed the accused systems and first sold them in 2005 (Cisco) and 2007 (Sourcefire). As SRI admits, the patents had not issued when the parties met in May 2000. Indeed, the patent application for the parent ’203 patent was not even filed until several months after the parties met. Thus, Cisco could not have been aware of the patent application. While the jury heard evidence that Cisco was aware of the patents in May 2012, before filing of the lawsuit, we do not see how the record supports a willfulness finding going back to 2000. As the Supreme Court recently observed, “culpability is generally measured against the knowledge of the actor at the time of the challenged conduct.” Halo, 136 S. Ct. at 1933. Similarly, Cisco’s allegedly aggressive litigation tactics cannot support a finding of willful in- fringement going back to 2000, especially when the litiga- tion did not start until 2012. Finally, Cisco’s decision not to seek an advice-of-counsel defense is legally irrelevant under 35 U.S.C. § 298. Viewing the record in the light most favorable to SRI, the jury’s verdict of willful infringement before May 8, 2012 is not supported by substantial evidence. Given the gen- eral verdict form, we presume the jury also found that Cisco willfully infringed after May 8, 2012. When review- ing a denial of JMOL, “where there is a black box jury ver- dict, as is the case here, we presume the jury resolved underlying factual disputes in favor of the verdict winner and leave those presumed findings undisturbed if sup- ported by substantial evidence.” Arctic Cat Inc. v. Bom- bardier Recreational Prods. Inc., 876 F.3d 1350, 1358 (Fed. Cir. 2017), (citing WBIP, LLC v. Kohler Co., 829 F.3d 1317, 1326 (Fed. Cir. 2016)), cert. denied, 139 S. Ct. 143 (2018). We leave it to the district court to decide in the first instance whether the jury’s presumed finding of willful in- fringement after May 8, 2012 is supported by substantial SRI INT’L, INC. v. CISCO SYS., INC. 21 evidence. 6 In so doing, the court should bear in mind the standard for willful infringement, as well as the above analysis regarding SRI’s evidence of willfulness. Accord- ingly, we vacate and remand the district court’s denial of Cisco’s renewed motion for JMOL of no willful infringe- ment. Cisco also argues that the district court abused its dis- cretion by doubling damages. Enhanced damages under § 284 are predicated on a finding of willful infringement. Because we conclude that the jury’s finding of willfulness before 2012 was not supported by substantial evidence, we do not reach the propriety of the district court’s award of enhanced damages. Instead, we vacate the award of en- hanced damages and remand for further consideration along with willfulness. V We next turn to the district court’s award of attorneys’ fees under § 285, which we vacate and remand solely for recalculation. Under § 285, a “court in exceptional cases may award reasonable attorney fees to the prevailing party.” An “exceptional” case under § 285 is “one that stands out from others with respect to the substantive strength of a party’s litigating position (considering both 6 We recognize that, ideally, it should not fall to the district court to determine when, if ever, willful infringe- ment began through the mechanism of JMOL. Rather, the question of when willful infringement began is a fact issue that would have been best presented to the jury in a special verdict form with appropriate jury instructions. Better yet, perhaps SRI could have recognized the shortcomings in its case and presented a more limited case of willful infringe- ment from 2012 onwards. Or perhaps Cisco could have filed a motion for summary judgment of no willful infringe- ment prior to May 8, 2012. 22 SRI INT’L, INC. v. CISCO SYS., INC. the governing law and the facts of the case) or the unrea- sonable manner in which the case was litigated.” Octane Fitness, LLC v. ICON Health & Fitness, Inc., 572 U.S. 545, 554 (2014). The party seeking fees must prove that the case is exceptional by a preponderance of the evidence, and the district court makes the exceptional case determination on a case-by-case basis considering the totality of the cir- cumstances. See id. at 554, 557. We review a district court’s grant or denial of attorneys’ fees for an abuse of discretion, which is a highly deferential standard of review. Highmark Inc. v. Allcare Health Mgmt. Sys., Inc., 572 U.S. 559, 564 (2014); Bayer CropScience AG v. Dow AgroSciences LLC, 851 F.3d 1302, 1306 (Fed. Cir. 2017) (citing Mentor Graphics Corp. v. Quickturn Design Sys., Inc., 150 F.3d 1374, 1377 (Fed. Cir. 1998)). To meet the abuse-of-discretion standard, the appellant must show that the district court made “a clear error of judgment in weighing relevant factors or in basing its decision on an er- ror of law or on clearly erroneous factual findings.” Bayer, 851 F.3d at 1306 (quoting Mentor Graphics, 150 F.3d at 1377); see also Highmark, 572 U.S. at 563 n.2. We see no such error in the district court’s determina- tion that this was an exceptional case. The district court found: There can be no doubt from even a cursory review of the record that Cisco pursued litigation about as aggressively as the court has seen in its judicial ex- perience. While defending a client aggressively is understandable, if not laudable, in the case at bar, Cisco crossed the line in several regards. Post-Trial Motions Op., 254 F. Supp. 3d at 722. The district court further explained that “Cisco’s litiga- tion strategies in the case at bar created a substantial amount of work for both SRI and the court, much of which work was needlessly repetitive or irrelevant or frivolous.” SRI INT’L, INC. v. CISCO SYS., INC. 23 Id. at 723 (footnotes omitted). Indeed, the district court in- ventoried Cisco’s aggressive tactics, including maintaining nineteen invalidity theories until the eve of trial but only presenting two at trial and pursuing defenses at trial that were contrary to the court’s rulings or Cisco’s internal doc- uments. Id. at 722. The district court concluded that all of this, in addition to the fact that the jury found that Cisco’s infringement was willful, led it to exercise its discretion pursuant to § 285 to award SRI its attorneys’ fees and costs. Id. at 723. We conclude that the district court did not abuse its discretion in so finding. We thus take no issue with the district court’s award of attorneys’ fees generally (including keeping the attorneys’ billing rates without adjusting them to Delaware rates). At the same time, however, the district court erred in granting all of SRI’s fees. Section 285 permits a prevailing party to recover reasonable attorneys’ fees, but not fees for hours expended by counsel that were “excessive, redundant, or otherwise unnecessary.” Hensley v. Eckerhart, 461 U.S. 424, 434 (1983). We accordingly conclude that the district court should have reduced SRI’s total hours to eliminate clear mistakes. For example, one billing entry reads “DON’T RELEASE, CLIENT MATTER NEEDS TO BE CHANGED.” J.A. 32384. Accordingly, we remand only for removal of attorney hours clearly included by mistake and consequent recalculation of reasonable attorneys’ fees. VI We review for abuse of discretion a district court’s grant of an ongoing royalty. Whitserve, LLC v. Comput. Packages, Inc., 694 F.3d 10, 35 (Fed. Cir. 2012). Here, the district court did not abuse its discretion in awarding “a 3.5% compulsory license for all post-verdict sales.” Post- Trial Motions Op., 254 F. Supp. 3d at 724. The district court’s ongoing royalty rate equals the rate found by the jury and the base is limited to the “accused products and services.” J.A. 182. 24 SRI INT’L, INC. v. CISCO SYS., INC. On appeal, Cisco argues that the district court abused its discretion in awarding the 3.5% ongoing royalty on “all post-verdict sales” without considering Cisco’s design- arounds. According to Cisco, the court was obligated to as- sess whether Cisco’s redesigned products and services were more than colorably different from those products and ser- vices adjudicated at trial, and if not, whether those rede- signed products and services infringe. To this end, Cisco moved to supplement its post-trial briefing with declara- tions describing its redesign efforts. Cisco argues that the district court abused its discretion by denying its motion to supplement. 7 We disagree. The district court properly ex- ercised its discretion in denying Cisco’s motion to supple- ment the record regarding alleged post-verdict design- around activity. Cisco did not redesign its products until after trial, and Cisco did not file its motion to supplement until after completion of post-trial briefing. Given the stage of the proceedings and SRI’s opposition, the trial court acted within its discretion when denying Cisco’s mo- tion to supplement. To the extent the district court’s order is unclear—and we think it is not—we reconfirm that the ongoing royalty on post-verdict sales is limited to products that were 7 Finally, Cisco argues that, in the same order in which the court stated that “[t]here are no post-verdict roy- alties,” the court awarded a post-verdict royalty—an inter- nal inconsistency. J.A. 175. We do not ascribe weight to the apparent clerical error creating the inconsistency. The district court’s final judgment order is clear that “Cisco shall pay a 3.5% compulsory license on all post-verdict sales of the accused products and services.” J.A. 182. To the extent that clear statement conflicts with the single sentence in the memorandum opinion, we think the court made its intentions clear in its final judgment and we see no error by the district court. SRI INT’L, INC. v. CISCO SYS., INC. 25 actually found to infringe and products that are not colora- bly different. We discern no error in the district court’s de- termination that Cisco’s submissions were untimely. Nevertheless, we acknowledge that the district court has not yet determined whether products and services that were not accused (that is, changed after the jury verdict) are colorably different for purposes of ongoing royalty cal- culations. Such an issue could be resolved in a future pro- ceeding. CONCLUSION For the reasons above, we affirm the district court’s de- nial of summary judgment that the asserted claims are pa- tent-ineligible. We also agree with the district court’s construction of “network traffic data” and affirm the dis- trict court’s grant of summary judgment of no anticipation. We vacate and remand the district court’s denial of Cisco’s renewed motion for judgment as a matter of law that Cisco did not willfully infringe the asserted claims. Accordingly, we vacate the district court’s award of enhanced damages. We also affirm the district court’s orders granting en- hanced damages and ongoing royalties. Finally, we vacate the district court’s award of attorneys’ fees and remand for a recalculation on this issue. AFFIRMED-IN-PART, VACATED-IN-PART, AND REMANDED COSTS No costs. United States Court of Appeals for the Federal Circuit ______________________ SRI INTERNATIONAL, INC., Plaintiff-Appellee v. CISCO SYSTEMS, INC., Defendant-Appellant ______________________ 2017-2223 ______________________ Appeal from the United States District Court for the District of Delaware in No. 1:13-cv-01534-SLR-SRF, Judge Sue L. Robinson. ______________________ LOURIE, Circuit Judge, dissenting. I respectfully dissent from the majority’s decision up- holding the eligibility of the claims. In my view, they are clearly abstract. In fact, they differ very little from the claims in Electric Power Group, LLC v. Alstom S.A., 830 F.3d 1350, 1355 (Fed. Cir. 2016), where we found the claims to be abstract. The majority opinion focuses on claim 1 of U.S. Patent 6,711,615 (“the ’615 patent”), which recites: 1. A computer-automated method of hierarchical event monitoring and analysis within an enterprise network comprising: 2 SRI INT’L, INC. v. CISCO SYS., INC. deploying a plurality of network monitors in the enterprise network; detecting, by the network monitors, suspi- cious network activity based on analysis of network traffic data selected from one or more of the following categories: {network packet data transfer commands, network packet data transfer errors, network packet data volume, network connection requests, network connection denials, error codes included in a network packet, net- work connection acknowledgements, and network packets indicative of well-known network-service protocols}; generating, by the monitors, reports of said suspicious activity; and automatically receiving and integrating the reports of suspicious activity, by one or more hierarchical monitors. Similarly, the claim we reviewed in Electric Power Group recited “[a] method of detecting events on an inter- connected electric power grid in real time over a wide area and automatically analyzing the events on the intercon- nected electric power grid,” with the method comprising eight steps, including “receiving data,” “detecting and ana- lyzing events in real time,” “displaying the event analysis results and diagnoses of events,” “accumulating and updat- ing measurements,” and “deriving a composite indicator of reliability.” 830 F.3d at 1351–52. While that claim was lengthy, with eight steps, it merely described selecting information by content or source for collection, analysis, and display. Id. at 1351. In finding the claim directed to an abstract idea, we reasoned that “collecting information, including when limited to particu- lar content (which does not change its character as SRI INT’L, INC. v. CISCO SYS., INC. 3 information)” was an abstract idea. Id. at 1353. Limiting the claim to a particular technological environment— power-grid monitoring—was insufficient to transform it into a patent-eligible application of the abstract idea at its core. Id. at 1354. The claim was rooted in computer tech- nology only to the extent that the broadly-recited steps re- quired a computer. At step two, we noted that the claim did not require an “inventive set of components or meth- ods . . . that would generate new data,” and did not “invoke any assertedly inventive programming.” Id. at 1355. This case is hardly distinguishable from Electric Power Group. The claims in that case are said in the majority opinion to only be drawn to using computers as tools to solve a problem, rather than improving the functionality of computers and computer networks. The claims here recite nothing more than deploying network monitors, detecting suspicious network activity, and generating and handling reports. The detecting of the suspicious activity is based on “analysis” of traffic data, but the claims add nothing concerning specific means for doing so. The claims only recite the moving of information. The computer is used as a tool, and no improvement in com- puter technology is shown or claimed. There is no specific technique described for improving computer network secu- rity. I would find the claims directed to the abstract idea of monitoring network security and proceed to step two of Al- ice. As in Electric Power Group, however, “[n]othing in the claims, understood in light of the specification, requires an- ything other than off-the-shelf, conventional computer, network, and display technology . . . .” 830 F.3d at 1355. The claims recite “types of information and information sources,” id., but such selection of information by content or source does not provide an inventive concept. Id. The specification further makes clear that the claims only rely on generic computer components, including a computer, 4 SRI INT’L, INC. v. CISCO SYS., INC. memory, processor, and mass storage device. See ’615 pa- tent, col. 14 ll. 50–57. Indeed, the specification even deems the relevant memory bus and peripheral bus “customary components.” Id. col. 14 l. 55. Finally, the majority opinion quotes from and para- phrases language from the specification that only recites results, not means for accomplishing them. See, e.g., Ma- jority Op. at 9. The claims as written, however, do not re- cite a specific way of enabling a computer to monitor network activity. As we noted in Electric Power Group, re- sult-focused, functional claims that effectively cover any solution to an identified problem, like those at issue here, frequently run afoul of Alice. 830 F.3d at 1356. Thus, I would find the claims to be directed to an ab- stract idea at Alice step one, without an inventive concept at step two, and reverse the district court’s finding of eligi- bility. Because I would find the claims at issue to be ineli- gible, I would not reach the remaining issues in the case.