Packet Intelligence LLC v. Netscout Systems, Inc.

Case: 19-2041 Document: 56 Page: 1 Filed: 07/14/2020 United States Court of Appeals for the Federal Circuit ______________________ PACKET INTELLIGENCE LLC, Plaintiff-Appellee v. NETSCOUT SYSTEMS, INC., NETSCOUT SYSTEMS TEXAS, LLC, FKA TEKTRONIX TEXAS, LLC DBA TEKTRONIX COMMUNICATIONS, Defendants-Appellants ______________________ 2019-2041 ______________________ Appeal from the United States District Court for the Eastern District of Texas in No. 2:16-cv-00230-JRG, Judge J. Rodney Gilstrap. ______________________ Decided: July 14, 2020 ______________________ PAUL SKIERMONT, Skiermont Derby LLP, Dallas, TX, for plaintiff-appellee. Also represented by SADAF R. ABDULLAH, STEVEN WAYNE HARTSELL, STEVEN UDICK; MIEKE K. MALMBERG, Los Angeles, CA. ERIC KRAEUTLER, Morgan, Lewis & Bockius LLP, Phil- adelphia, PA, for defendants-appellants. Also represented by JULIE S. GOLDEMBERG; JASON D. FRANK, Boston, MA; KARON NICOLE FOWLER, Chicago, IL; WILLIAM R. PETERSON, Houston, TX; AHREN CHRISTIAN HSU-HOFFMAN, Case: 19-2041 Document: 56 Page: 2 Filed: 07/14/2020 2 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. MICHAEL JOHN LYONS, THOMAS Y. NOLAN, Palo Alto, CA; MICHAEL FRANCIS CARR, Milpitas, CA. ______________________ Before LOURIE, REYNA, and HUGHES, Circuit Judges. Opinion for the court filed by Circuit Judge LOURIE. Opinion concurring in part and dissenting in part filed by Circuit Judge REYNA. LOURIE, Circuit Judge. NetScout Systems, Inc. and NetScout Systems Texas, LLC (“NetScout”) appeal from the judgment of the U.S. District Court for the Eastern District of Texas after a jury verdict and bench trial that (1) NetScout willfully infringed claims 10 and 17 of U.S. Patent 6,665,725 (“the ’725 pa- tent”), claims 1 and 5 of U.S. Patent 6,839,751 (“the ’751 patent”), and claims 19 and 20 of U.S. Patent 6,954,789 (“the ’789 patent”); (2) no asserted claim is invalid under 35 U.S.C. §§ 101, 102(a), 102(f); (3) Packet Intelligence LLC (“Packet Intelligence”) is entitled to $3.5 million in dam- ages for pre-suit infringement; (4) Packet Intelligence is en- titled to post-suit damages of $2.25 million; (5) Packet Intelligence is entitled to $2.8 million in enhanced dam- ages; and (6) Packet Intelligence is entitled to an ongoing royalty for future infringement of 1.55%. Packet Intelli- gence LLC v. NetScout Sys., Inc., No. 2:16-cv-230-JRG, 2018 WL 4286193, at *1 (E.D. Tex. Sept. 7, 2018). Because the district court erred in denying NetScout’s motion for judgment as a matter of law on pre-suit dam- ages, we reverse the district court’s pre-suit damages award and vacate the court’s enhancement of that award. We affirm the district court’s judgment in all other re- spects. Case: 19-2041 Document: 56 Page: 3 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 3 BACKGROUND Packet Intelligence owns the ’725, ’751, and ’789 pa- tents, which teach a method for monitoring packets ex- changed over a computer network. A stream of packets between two computers is called a connection flow. ’789 patent col. 2 ll. 43–45. Monitoring connection flows cannot account for disjointed sequences of the same flow in a net- work. Id. col. 3 ll. 56–59. The specifications explain that it is more useful to identify and classify “conversational flows,” defined as “the sequence of packets that are ex- changed in any direction as a result of an activity.” Id. col. 2 ll. 45–47. Conversational flows provide application-spe- cific views of network traffic and can be used to generate helpful analytics to understand network load and usage. See ’751 patent col. 3 l. 2–col. 4 l. 11. The claims of the’725, ’751, and ’789 patents asserted in the district court describe apparatuses and methods for network monitoring. The ’789 patent recites apparatus claims, and claims 19 and 20 were asserted. Claim 19 of ’789 patent is drawn to a “packet monitor”: 19. A packet monitor for examining packets pass- ing through a connection point on a computer net- work, each packet[] conforming to one or more protocols, the monitor comprising: (a) a packet acquisition device coupled to the connection point and configured to re- ceive packets passing through the connec- tion point; (b) an input buffer memory coupled to and configured to accept a packet from the packet acquisition device; (c) a parser subsystem coupled to the input buffer memory and including a slicer, the parsing subsystem configured to extract se- lected portions of the accepted packet and Case: 19-2041 Document: 56 Page: 4 Filed: 07/14/2020 4 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. to output a parser record containing the se- lected portions; (d) a memory for storing a database com- prising none or more flow-entries for previ- ously encountered conversational flows, each flow-entry identified by identifying in- formation stored in the flow-entry; (e) a lookup engine coupled to the output of the parser subsystem and to the flow-entry memory and configured to lookup whether the particular packet whose parser record is output by the parser subsystem has a matching flow-entry, the looking up using at least some of the selected packet por- tions and determining if the packet is of an existing flow; and (f) a flow insertion engine coupled to the flow-entry memory and to the lookup en- gine and configured to create a flow-entry in the flow-entry database, the flow-entry including identifying information for fu- ture packets to be identified with the new flow-entry, the lookup engine configured such that if the packet is of an existing flow, the monitor classifies the packet as belonging to the found existing flow; and if the packet is of a new flow, the flow inser- tion engine stores a new flow-entry for the new flow in the flow-entry database, in- cluding identifying information for future packets to be identified with the new flow- entry, wherein the operation of the parser subsystem de- pends on one or more of the protocols to which the packet conforms. Case: 19-2041 Document: 56 Page: 5 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 5 ’789 patent col. 36 l. 31–col. 37 l. 2. Claim 20 of the ’789 patent depends from claim 19 and further requires that “each packet passing through the connection point is ac- cepted by the packet buffer memory and examined by the monitor in real time.” Id. col. 37 ll. 3–6. In contrast to the apparatus claims of the ’789 patent, the ’725 and ’751 patents recite method claims. The ’725 patent claims recite a method for performing protocol-spe- cific operations on a packet through a connection point on a network, comprising receiving a packet and executing protocol specific operations on it, including parsing and ex- traction to determine whether the packet belongs to a con- versational flow. And the ’751 patent claims recite methods of analyzing a flow of packets with similar steps. Although the asserted claims include varied language, the parties treat claim 19 of the ’789 patent as representative of all of the asserted claims for infringement and invalidity. Thus, we focus on claim 19 in our analysis. Packet Intelligence asserted claims 19 and 20 of the ’789 patent, claims 10 and 17 of the ’725 patent, and claims 1 and 5 of the ’751 patent against NetScout’s “G10” and “GeoBlade” products in the United States District Court for the Eastern District of Texas. The case was tried to a jury on the issues of infringement, damages, willfulness, and in- validity under 35 U.S.C. § 102. The jury found all claims willfully infringed, rejected NetScout’s invalidity defenses, and awarded pre-suit and post-suit damages. Following the jury verdict, the district court issued findings of fact and conclusions of law under Fed. R. Civ. P. 52 rejecting NetScout’s § 101 invalidity defense. The court also en- hanced damages in the amount of $2.8 million and, in ac- cordance with the jury’s verdict, awarded an ongoing royalty for post-verdict infringement. NetScout appealed, and we have jurisdiction under 28 U.S.C. § 1295(a)(1). Case: 19-2041 Document: 56 Page: 6 Filed: 07/14/2020 6 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. DISCUSSION In reviewing issues tried to a jury, we review the dis- trict court’s denial of post-trial motions for judgment as a matter of law and for a new trial under the law of the re- gional circuit—here, the Fifth Circuit. See Finjan, Inc. v. Secure Computing Corp., 626 F.3d 1197, 1202 (Fed. Cir. 2010) (citing Revolution Eyewear, Inc. v. Aspex Eyewear, Inc., 563 F.3d 1358, 1370 (Fed. Cir. 2009)). Under Fifth Circuit law, we review de novo the denial of a motion for judgment as a matter of law, applying the same legal standard as the district court. Baisden v. I’m Ready Prods., Inc., 693 F.3d 498, 499 (5th Cir. 2012). Judgment as a mat- ter of law should be granted if “a reasonable jury would not have a legally sufficient evidentiary basis to find for the party on that issue.” Fed. R. Civ. P. 50(a). We are “especially deferential” to a jury’s verdict, re- versing only for lack of substantial evidence. Baisden, 693 F.3d at 498–99. “Substantial evidence” is “evidence of such quality and weight that reasonable and fair-minded men in the exercise of impartial judgment might reach different conclusions.” Threlkeld v. Total Petroleum, Inc., 211 F.3d 887, 891 (5th Cir. 2000) (quoting Gaia Techs., Inc. v. Recy- cled Prods. Corp., 175 F.3d 365, 374 (5th Cir. 1999)). We “draw all reasonable inferences in the light most favorable to the verdict and cannot substitute other inferences that we might regard as more reasonable.” EEOC v. Boh Bros. Constr. Co., 731 F.3d 444, 452 (5th Cir. 2013) (citing Westlake Petrochems., L.L.C. v. United Polychem, Inc., 688 F.3d 232, 239 (5th Cir. 2012)). “Credibility determinations, the weighing of the evidence, and the drawing of legitimate inferences from the facts are jury functions, not those of a judge.” Reeves v. Sanderson Plumbing Prods., Inc., 530 U.S. 133, 150–51 (2000) (quoting Anderson v. Liberty Lobby Inc., 477 U.S. 242, 255 (1986)). On appeal from a bench trial, we review a district court’s conclusions of law de novo and its findings of fact Case: 19-2041 Document: 56 Page: 7 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 7 for clear error. Braintree Labs., Inc. v. Novel Labs., Inc., 749 F.3d 1349, 1358 (Fed. Cir. 2014) (citing Brown & Wil- liamson Tobacco Corp. v. Philip Morris Inc., 229 F.3d 1120, 1123 (Fed. Cir. 2000)). “A factual finding is clearly errone- ous when, despite some supporting evidence, we are left with a definite and firm conviction that the district court was in error.” Alcon Research Ltd. v. Barr Labs., Inc., 745 F.3d 1180, 1186 (Fed. Cir. 2014) (citing Alza Corp. v. Mylan Labs., Inc., 464 F.3d 1286, 1289 (Fed. Cir. 2006)). “The burden of overcoming the district court’s factual findings is, as it should be, a heavy one.” Polaroid Corp. v. Eastman Kodak Co., 789 F.2d 1556, 1559 (Fed. Cir. 1986). “Where there are two permissible views of the evidence, the fact- finder’s choice between them cannot be clearly erroneous.” Anderson v. City of Bessemer City, 470 U.S. 564, 574 (1985) (citing United States v. Yellow Cab Co., 338 U.S. 338, 342 (1949)). In this appeal, NetScout challenges the district court’s judgment on the issues of infringement, invalidity under § 101, invalidity under § 102, pre-suit damages, and will- fulness. We address each issue in turn. I. Infringement We first address NetScout’s claim that it did not in- fringe the asserted patents. An infringement analysis re- quires two steps. Clare v. Chrysler Grp. LLC, 819 F.3d 1323, 1326 (Fed. Cir. 2016). First, the court construes the asserted claims. Claim construction is a question of law that may involve underlying factual questions. Teva Pharm. USA, Inc. v. Sandoz, Inc., 574 U.S. 318, 332 (2015). Second, the court determines whether the accused product meets each limitation of the claim as construed, which is a question of fact. Wright Med. Tech., Inc. v. Osteonics Corp., 122 F.3d 1440, 1443 (Fed. Cir. 1997). NetScout’s two-step theory concerning why it is not an infringer relies entirely on claim 19’s memory limitation. First, NetScout argues that the limitation requires Case: 19-2041 Document: 56 Page: 8 Filed: 07/14/2020 8 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. correlating connection flows into conversational flows. Ap- pellant’s Br. 36. Then, under NetScout’s understanding of the claim language, NetScout submits that its products cannot infringe because no accused products meet that lim- itation. In NetScout’s view, the record establishes that the accused products track connection flows but never join them together. Packet Intelligence responds that it presented thor- ough evidence supporting the jury’s infringement verdict. In response to NetScout’s claim construction argument, Packet Intelligence counters that the claims do not require joining flows into a single conversational flow. We first agree with Packet Intelligence that the claims do not require the joining of connection flows into conver- sational flows. The term “conversational flow” appears in claim 19’s memory limitation: “a memory for storing a da- tabase comprising none or more flow-entries for previously encountered conversational flows, each flow-entry identi- fied by identifying information stored in the flow entry.” ’789 patent col. 36 ll. 45–48. Contrary to NetScout’s argu- ment, however, a limitation requiring memory for storing flow entries for previously encountered conversational flows does not require the added action of correlating con- nection flow entries into conversational flows. Even if NetScout were correct that the claims require correlating connection flows into conversational flows, however, the jury’s infringement verdict is supported by substantial evidence. Dr. Almeroth testified that the ac- cused products contain a “flow state block” (“FSB”), “corre- sponding” to source code “Fsb.c.” J.A. 1265:1–1266:20. According to Dr. Almeroth, the FSB contains flow entries and the information in the flow record can be used to cor- relate or associate flow entries into conversational flows. J.A. 1265:1–10; 1266:25–1267:2. This testimony alone is substantial evidence supporting the jury’s verdict. Case: 19-2041 Document: 56 Page: 9 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 9 As further confirmation that the accused products in- fringe, Dr. Almeroth also provided an “example” of how NetScout’s products use the information in memory to cre- ate a “key performance index” in a NetScout white paper titled “Subscriber Web Page Download Time Estimation in Passive Monitoring Systems.” J.A. 1267:8–1268:11. Dr. Almeroth testified that the feature “demonstrate[d] that information in the flow record is sufficient to identify the flow-entry and also to allow it to associate with previ- ously-encountered conversation flows.” Id. Given the evidence presented to the jury on claim 19’s memory limitation and because NetScout has challenged no other aspect of the jury’s infringement finding, we can- not conclude that the jury’s verdict lacked substantial evi- dence. II. Patent Eligibility NetScout claims that the patents it is accused of in- fringing cover ineligible subject matter. Patent eligibility under § 101 “is ultimately an issue of law that we review de novo,” Berkheimer v. HP Inc., 881 F.3d 1360, 1365 (Fed. Cir. 2018) (citing Intellectual Ventures I LLC v. Capital One Fin. Corp., 850 F.3d 1332, 1338 (Fed. Cir. 2017)), although it may involve underlying fact findings, id. (citing Mortg. Grader, Inc. v. First Choice Loan Servs. Inc., 811 F.3d 1314, 1325 (Fed. Cir. 2016)). Under 35 U.S.C. § 101, “[w]hoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.” In evaluating eligibility, we first determine whether the claims at issue are directed to a patent-ineligible concept. Alice Corp. v. CLS Bank Int’l, 573 U.S. 208, 217 (2014) (cit- ing Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 77 (2012)). If so, we then “examine the ele- ments of the claim to determine whether it contains an ‘in- ventive concept’ sufficient to ‘transform’ the claimed Case: 19-2041 Document: 56 Page: 10 Filed: 07/14/2020 10 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. abstract idea into a patent-eligible application.” Id. at 221 (quoting Mayo, 566 U.S. at 72–73, 78). The parties submitted the issue of eligibility to be tried to the bench, and the district court issued findings of fact and conclusions of law under Fed. R. Civ. P. 52. Packet Intelligence LLC v. NetScout Sys., Inc., No. 2:16-cv-230- JRG (E.D. Tex. Feb. 14, 2018), ECF No. 298 (“Eligibility Decision”). The parties agree that claim 19 is representa- tive of the asserted claims, so we begin by reviewing the district court’s analysis for this claim. The district court first made a series of factual findings about the claimed inventions’ advantages over the prior art. According to the district court, to measure the amount or type of information being transmitted by a particular ap- plication or protocol, a network monitor must measure “all of the connection flows through which that application or protocol transmits packets.” Id. slip op. at 5. The court found that prior art monitors could not identify disjointed connection flows as belonging to the same conversational flow. Id. slip. op. at 9. The patents addressed this “problem” in the art by parsing packets to extract information that can be used to associate packets with single conversational flows, which correspond to particular applications or protocols. Id. slip op. at 6. A “parser subsystem ‘parses the packet and deter- mines the protocol types and associated headers for each protocol layer,’ ‘extracts characteristic portions (signature information) from the packet,’ and builds a ‘unique flow sig- nature’ (also called a “key”)’ based on the packet.” Id. slip op. at 7 (citing first ’789 patent col. 12 l. 19–col. 13 l.28; then id. col. 33 l. 30–col. 34 l. 33). An “analyzer subsystem” then “determines whether the packet, based on this signa- ture or key, has a corresponding entry in the flow-entry da- tabase.” Id. (citing ’789 patent col. 13 l. 60–col. 16 l. 52). If there is a corresponding entry, the flow-entry is updated, and additional operations may be performed to “fully Case: 19-2041 Document: 56 Page: 11 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 11 characterize” the associated conversational flow. Id. (citing ’789 patent col. 14 ll. 54–61). If there is no corresponding entry, a new entry is created and “protocol and state iden- tification process 318 further determines . . . the protocols” and part of the state sequence the packet belongs to. Id. slip. op. at 8 (citing ’789 patent col. 14 ll. 44–53). According to the district court, prior art monitors could not identify disjointed connection flows as belonging to the same conversational flow, but the claimed invention could provide a granular, nuanced, and useful classification of network traffic. Id. slip op. at 10. The court found that the metrics made possible by the recited invention improved quality and performance of traffic flows. Id. slip. op. at 11. Specifically, the monitors had an improved ability to clas- sify and diagnose network congestion while providing in- creased network visibility to identify intrusions and malicious attacks. Id. With this factual background, the court applied the Al- ice framework. First, the court rejected NetScout’s argu- ment that claim 19 is directed to the collection, comparison, and classification of information. The court instead held that the claim was directed to “solving a discrete technical problem: relating disjointed connection flows to each other.” Id. slip. op. at 30. The court determined that the claim was directed to “specific technological solutions, such as identifying and refining a conversational flow so that different connection flows can be associated with each other and ultimately an underlying application or proto- col.” Id. At step one, the district court also rejected NetScout’s argument that the claims are directed to an ab- stract idea because they do not explain how to determine whether packets belong to a conversational flow. Accord- ing to the district court, NetScout’s argument focused on the claims in isolation instead of the claims as read in light of the specification. In the court’s view, the claims and specification “[t]aken together . . . teach how to identify that certain packets belong to the same conversational Case: 19-2041 Document: 56 Page: 12 Filed: 07/14/2020 12 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. flow,” especially in light of NetScout’s expert’s testimony that the patents describe how one would identify and clas- sify different connections into a conversational flow. Id. slip op. at 32. Despite finding that the claims were not directed to an abstract idea, the court proceeded to step two of the Alice analysis, holding that NetScout failed to show that the combination of elements in the claims would have been re- garded as conventional, routine, or well-known by a skilled artisan at the time of the invention. In this appeal, NetScout maintains that the claims are directed to the abstract idea of collecting, comparing, and classifying packet information. NetScout submits that, even if the claims are directed to a technical problem—the need to correlate disjointed connection flows—they are not directed to a specific implementation of a solution of that problem. According to NetScout, the district court erred by considering the specification’s teachings of how to identify packets belonging to the same conversational flow. NetScout then argues that, at step two, the claims lack an inventive concept because the recited components in the claim are standard, off-the-shelf components, used in every probe. Packet Intelligence counters that the district court cor- rectly held that the claims are not directed to an unpatent- able abstract idea. Packet Intelligence faults NetScout for oversimplifying the claims and maintains that the district court was correct to consider the specification in its analy- sis. Packet Intelligence further submits that the claims are directed to a technical problem and, as the district court found, recite an unconventional technological solution, con- structing conversational flows that associate connection flows with each other and ultimately specific applications or protocols. Even if the claims were directed to an abstract idea, however, Packet Intelligence argues that NetScout has failed to show clear error in the district court’s fact Case: 19-2041 Document: 56 Page: 13 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 13 findings at step two that the invention’s components were not routine or conventional. We agree with Packet Intelligence that claim 19 is not directed to an abstract idea. In our eligibility analysis, we consider the claim as a whole, Diamond v. Diehr, 450 U.S. 175, 188 (1981), and read it in light of the specification, Data Engine Techs. LLC v. Google LLC, 906 F.3d 999, 1011 (Fed. Cir. 2018). We have recognized that “software-based innovations can make ‘non-abstract improvements to com- puter technology’ and be deemed patent-eligible subject matter at step 1.” Finjan, Inc. v. Blue Coat Sys., Inc., 879 F.3d 1299, 1304 (Fed. Cir. 2018) (quoting Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335–36 (Fed. Cir. 2016)). And at step one, we consider whether the “focus of the claims is on [a] specific asserted improvement in computer capabilities . . . or, instead, on a process that qualifies as an ‘abstract idea’ for which computers are invoked merely as a tool.” Enfish, 822 F.3d at 1335–36. In Enfish, for ex- ample, we held that a claim to a self-referential table was not directed to an abstract idea because the table embodies an improvement in the way computers operate. Id. In reaching that conclusion, we explained that the specifica- tion taught that the self-referential table functioned differ- ently from conventional databases, providing increased flexibility, faster search times, and smaller memory re- quirements. Id. at 1337. Likewise, in SRI International, Inc. v. Cisco Systems, Inc., 930 F.3d 1295 (Fed. Cir. 2019), cert. denied, 140 S. Ct. 1108 (2020) (Mem.), we held claims drawn to a method of hierarchical computer network monitoring to be patent-el- igible. The SRI claims recited a series of steps, including “deploying” network monitors, which detect “suspicious network activity based on analysis of network traffic data,” and generate and integrate “reports of . . . suspicious activ- ity.” Id. at 1301. At step one, we held that the claims were not directed to an abstract idea because they were “neces- sarily rooted in computer technology in order to solve a Case: 19-2041 Document: 56 Page: 14 Filed: 07/14/2020 14 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. specific problem in the realm of computer networks.” Id. at 1303. We recognized that the claims were not using a computer as a tool but, instead, recited a specific technique for improving computer network security. In informing our understanding of the technology and its relationship to the art, we relied on statements in the specification that the claimed invention purported to solve weaknesses in the prior art by providing a framework for recognition of global threats to interdomain connectivity. As relevant here, the SRI claims recited general steps for network monitoring with minimal detail present in the claim limitations them- selves. Like the SRI claims, claim 19 purports to meet a chal- lenge unique to computer networks, identifying disjointed connection flows in a network environment. The claim solves a technological problem by identifying and refining a conversational flow such that different connection flows can be associated with each other and ultimately with an underlying application or protocol. The claims detail how this is achieved in several steps. The claimed “parser sub- system” extracts information from the packet. This packet information is checked against “flow-entry memory” by the claimed “lookup engine.” The flow insertion engine coupled to the memory and the lookup engine determines whether the packet matches an entry in the flow-entry database. If there is a match, the flow insertion engine updates the matching entry with data from the new packet. If there is no match, the engine creates a new entry. The asserted patents’ specifications make clear that the claimed invention presented a technological solution to a technological problem. The specifications explain that known network monitors were unable to identify disjointed connection flows to each other, and the focus of the claims is a specific improvement in computer technology: a more granular, nuanced, and useful classification of network traffic. See, e.g., ’751 patent col. 2 ll. 53–56; col. 3 l. 2– col. 4 l. 6. The specifications likewise explain how the Case: 19-2041 Document: 56 Page: 15 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 15 elements recited in the claims refer to specific technological features functioning together to provide that granular, nu- anced, and useful classification of network traffic, rather than an abstract result. See, e.g., ’789 patent col. 23 l. 38— col. 27 l. 50 (describing the technological implementation of the lookup engine and flow insertion engine as used in the claims); see also ’725 patent col. 10 l. 3—col. 13 l. 4. In its argument regarding step one of the Alice analy- sis, NetScout argues that Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC, 874 F.3d 1329 (Fed. Cir. 2017), lim- its our consideration of the specification’s concrete embod- iments, including Figure 2. But we need not rely on the specific data disclosed in Figure 2 of the specification to de- termine that claim 19 is not directed to an abstract idea. Regardless, Two-Way Media does not support NetScout’s view. In Two-Way Media, this court commented that at step two, the claim, not the specification, must include an inventive concept. Id. at 1338 (“The main problem that Two-Way Media cannot overcome is that the claim—as op- posed to something purportedly described in the specifica- tion—is missing an inventive concept.”). Here, because we have concluded that the claims are not directed to an ab- stract idea, we do not reach step two. SRI, 930 F.3d at 1304 (citing Enfish, 822 F.3d at 1339). Because the parties treat claim 19 as representative of all asserted claims, we there- fore conclude that all asserted claims are patent-eligible. III. Invalidity under § 102 At trial, NetScout presented the jury with its theory that the asserted patents are invalid under § 102(f) for fail- ure to list the RMON Working Group as inventors. Specif- ically, NetScout argued that the RMON Working Group devised the “Track Sessions” probe functionality that re- lates connection flows into conversational flows as claimed in the patents. Track Sessions allows probe software to join together first connections starting on well-known ports with second connections that are on dynamically assigned Case: 19-2041 Document: 56 Page: 16 Filed: 07/14/2020 16 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. ports by remembering the port assignments. Version 4.5 of Track Sessions was available in October 1998, before the June 30, 1999 priority date of the asserted patents. To support its inventorship theory, NetScout relied on testimony from its expert, Mr. Waldbusser, who main- tained that the Track Sessions Probe as implemented could correlate packets associated with an activity, even though those packets were exchanged via different connection flows with different port numbers. NetScout also points to testimony from a named inventor of the asserted patents, Mr. Dietz, who stated that he was aware of the RMON Working Group’s publications, including Track Sessions. NetScout also submits that the claims are at least antici- pated by the Track Sessions probe. Packet Intelligence contends that the jury’s rejection of NetScout’s § 102 challenge is supported by substantial ev- idence. Packet Intelligence faults Mr. Waldbusser for fail- ing to consider the limitations of claim 19, instead focusing more generally on “conversational flows,” and points to Dr. Almeroth’s testimony that Track Sessions counts all of the packets in a conversational flow as a single flow entry, as opposed to correlating several connection flows. Packet Intelligence also cites Dr. Almeroth’s testimony that Track Sessions fails to provide visibility into application content and is limited to providing network layer information. The district court rejected NetScout’s motion for judg- ment as a matter of law on its inventorship and anticipa- tion defenses, holding that the jury’s verdict is supported by substantial evidence. In support, the court cited Dr. Al- meroth’s testimony that Mr. Waldbusser failed to analyze the claim language as written and that the NetScout probe did not associate connection flows but, instead, replaced one flow with another. We agree with the district court that the jury’s verdict is supported by substantial evidence. While NetScout asks us to accept its interpretation of the record, the jury was Case: 19-2041 Document: 56 Page: 17 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 17 permitted to weigh Dr. Almeroth’s testimony over that of Mr. Waldbusser. Reeves, 530 U.S. at 150–51. Specifically, Dr. Almeroth testified that Track Sessions attributes all packets of a protocol that starts sessions on well-known ports or sockets and then transfers them to dynamically assigned ports or sockets thereafter. In Dr. Almeroth’s view, this generates one flow entry, which is different from a conversational flow that relates different independent flows to each other. J.A. 1924. Dr. Almeroth further testi- fied that Track Sessions requires knowledge of the port number to determine an application identity and does not work unless the initial port is well known. J.A. 1925. Ac- cording to Dr. Almeroth, Track Sessions describes “just having one flow-entry that’s changed, as opposed to main- taining existing flow-entries, creating new flow-entries, and then correlating and relating those flow-entries to- gether to create conversational flows,” instead providing for “just swap[ping] out the port number and maintain[ing] one flow-entry.” J.A. 1940. Dr. Almeroth also disagreed with Mr. Waldbusser that Track Sessions had visibility into application data itself and faulted Mr. Waldbusser for combining source code from two references—Versions 4.5.0 and 4.5.3 of Track Sessions—in his anticipation analysis. The jury was entitled to credit Dr. Almeroth’s testimony over Mr. Waldbusser’s, and, drawing all inferences in favor of the jury verdict and accepting the jury’s credibility de- terminations, the jury’s verdict on NetScout’s inventorship defense is supported by substantial evidence. Likewise, the jury was permitted to credit Dr. Alme- roth’s testimony that Track Sessions fails to meet claim 19’s memory limitation, and the jury’s verdict regarding anticipation is also accordingly supported by substantial evidence. NetScout also appears to argue that the district court’s acceptance of Dr. Almeroth’s testimony regarding separate flow entries for a single conversational flow is a new issue of claim construction. But a review of the trial transcript Case: 19-2041 Document: 56 Page: 18 Filed: 07/14/2020 18 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. reveals that NetScout failed to object during the challenged portion of Dr. Almeroth’s testimony, including during his testimony regarding his understanding of what the claims require. Contrary to NetScout’s view, if it understood Dr. Almeroth to be testifying inconsistently with the dis- trict court’s claim construction order or testifying to mate- rial beyond of the scope of his report, NetScout was required to object at trial to preserve its arguments for judgment as a matter of law. And NetScout’s failure to ob- ject amounts to waiver of these issues. See, e.g., Hewlett- Packard Co. v. Mustek Sys., Inc., 340 F.3d 1314, 1321 (Fed. Cir. 2003) (“[W]here the parties and the district court elect to provide the jury only with the claim language itself, and do not provide an interpretation of the language in the light of the specification and the prosecution history, it is too late at the JMOL stage to argue for or adopt a new and more detailed interpretation of the claim language and test the jury verdict by that new and more detailed interpreta- tion”); Solvay S.A. v. Honeywell Int’l Inc., 742 F.3d 998, 1004 (Fed. Cir. 2014) (holding claim construction argument waived when party failed to request modification or clarifi- cation of the claim construction when the issue surfaced at trial). Thus, our analysis is confined to whether substan- tial evidence supports the jury’s verdict under the undis- puted claim construction at trial, Hewlett-Packard, 340 F.3d at 1320, and we conclude that it does. IV. Pre-suit damages NetScout asserts that is not subject to pre-suit dam- ages because Packet Intelligence’s licensees failed to properly mark their patent-practicing products. Before fil- ing the instant suit, Packet Intelligence licensed the as- serted patents to Exar, Cisco, and Huawei, which were alleged to have produced unmarked, patent-practicing products. The ’789 patent is subject to the marking re- quirement of 35 U.S.C. § 287(a), and the availability of pre- suit damages for the ’789 patent hinges on whether Exar’s MeterFlow product was appropriately marked. If pre-suit Case: 19-2041 Document: 56 Page: 19 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 19 damages cannot be supported for the ’789 patent, Packet Intelligence submits that we can uphold the jury’s damages award based on infringement of the ’725 and ’751 patents, method patents that are not subject to the marking re- quirement. A. Marking When the district court charged the jury in this case, this court had not yet ruled on which party bears the bur- den of proving compliance with the marking statute. After the verdict, we held that an alleged infringer “bears an in- itial burden of production to articulate the products it be- lieves are unmarked ‘patented articles’ subject to [the marking requirement]” in Arctic Cat Inc. v. Bombardier Recreational Prods. Inc., 876 F.3d 1350, 1368 (Fed. Cir. 2017). We held that the initial burden was a “low bar” and that the alleged infringer needed only to put the patentee on notice that certain licensees sold specific unmarked products that the alleged infringer believes practice the pa- tent. Id. The burden then fell on the patentee to prove that the identified products do not practice the patent-at-issue. Id. Here, the district court’s jury instruction is in tension with the later decision in Arctic Cat, as it appears to place the burden on NetScout to show that the Exar, Huawei, and Cisco products practice the ’789 patent: Any damages for infringement of the ’789 patent commence on the date that NetScout has both in- fringed and been notified of the alleged infringe- ment of the ’789 patent. In considering if NetScout has been notified of the alleged infringement, NetScout must first show the existence of a patented article. A patented article is a licensed product that practices one or more claims of the ’789 patent. If NetScout does not show the existence of a patented article, Packet Intelligence is permitted to collect Case: 19-2041 Document: 56 Page: 20 Filed: 07/14/2020 20 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. damages going six years before the filing of the com- plaint in this case for the ’789 patent. However, if you find that Packet Intelligence’s li- censed products include the claimed invention of the ’789 patent, you must determine whether Packet Intelligence required that those products be marked with the ’789 patent number. . . . Packet Intelligence has the burden of establishing that it substantially complied with the marking re- quirement. This means Packet Intelligence must show that it made reasonable efforts to ensure that its licensees who made, offered for sale, or sold products under the ’789 patent marked the prod- ucts. If you find that Packet Intelligence has not made reasonable efforts to ensure that its licensees who made, offered for sale, or sold products under the ’789 patent marked the products, then the par- ties agree that NetScout first received actual notice of the ’789 patent and that actual notice was on March 15, 2016, and any damages for the ’789 pa- tent can only begin on that date. Transcript of Jury Trial at 47:11–48:20, Packet Intelligence LLC v. NetScout Sys., No. 2:16-cv-230-JRG (E.D. Tex. Oct. 13, 2017), ECF No. 252 (emphasis added). After receiving this instruction, the jury rejected NetScout’s marking de- fense, awarding Packet Intelligence $3,500,000 in damages to compensate for pre-suit infringement. Verdict Form, Packet Intelligence LLC v. NetScout Sys., Inc., No. 2:16-cv- 230-JRG (Oct. 13, 2017), ECF No. 237. NetScout moved for judgment as a matter of law, argu- ing that Packet Intelligence failed to present any evidence to the jury that the Exar, Huawei, and Cisco products do not practice the patent or were not properly marked, but the district court denied NetScout’s motion. The district court found that the jury had a substantial evidentiary ba- sis to conclude that Packet Intelligence was not obligated Case: 19-2041 Document: 56 Page: 21 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 21 to mark the MeterFlow products. Packet Intelligence LLC v. NetScout Sys., Inc., 2019 WL 2375218, at *5 (E.D. Tex. June 5, 2019). We will consider Exar’s MeterFlow product alone, as it is dispositive in our analysis. NetScout argues that Packet Intelligence is not enti- tled to pre-suit damages for the ’789 patent because it failed to prove that MeterFlow, an unmarked product, did not practice the ’789 patent. Specifically, NetScout faults the court for relying on Mr. Dietz’s testimony because he testified about MeterWorks, not MeterFlow, and because he did not testify that the MeterFlow product did not prac- tice the patent. In response to NetScout’s argument, Packet Intelli- gence appears to argue that NetScout bears the burden of establishing that the MeterFlow products practiced any claims of the ’789 patent because it failed to object to the district court’s jury instruction or seek a new trial based on Arctic Cat. As a preliminary matter, we disagree that the failure to object decides this matter. We are bound by the law, not by the jury charge, even if the charge was not objected to. Markman v. Westview Instruments, Inc., 52 F.3d 967, 975 n.5 (Fed. Cir. 1995) (en banc). And NetScout’s failure to object to the district court’s jury instruction does not render the instruction law of the case for evaluating the suffi- ciency of the evidence. Boyle v. United Techs. Corp., 487 U.S. 500, 514 (1988) (citing City of St. Louis v. Praprotnik, 485 U.S. 112, 120 (1988) (plurality opinion)). Under the standard articulated in Arctic Cat, NetScout bore the preliminary burden of identifying unmarked prod- ucts that it believed practice the ’789 patent. It is undis- puted that NetScout adequately identified Exar’s MeterFlow product. Packet Intelligence then bore the bur- den of proving that MeterFlow did not practice at least one claim of the ’789 patent. See Arctic Cat, 876 F.3d at 1369. Case: 19-2041 Document: 56 Page: 22 Filed: 07/14/2020 22 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. Packet Intelligence submits that it met its burden in two ways: (1) by showing that the MeterFlow product was mentioned in a provisional application that the ’789 patent claims priority from and that the inventors removed that reference before filing non-provisional applications, and (2) with testimony from Mr. Dietz, a named inventor, who stated that MeterWorks, a different product, did not em- body his invention. This evidence is, however, insufficient to carry Packet Intelligence’s burden of proving that the MeterFlow product does not practice the ’789 patent. The fact that the inventors chose to cease referencing Meter- Flow in later patent applications does not support the in- ference that MeterFlow does not practice the patent. Mr. Dietz testified that the reference to MeterFlow was re- moved because MeterFlow was software that “evolved,” and using the term would have suggested that past ver- sions of the software using the “marketing term” Meter- Flow “were the current version.” J.A. 1122:15–24. Crediting Mr. Dietz’s testimony, it appears that the exclu- sion of MeterFlow was to prevent “confusion” about an evolving product, J.A. 1122:21–22, not to comment on whether MeterFlow practiced the ’789 patent. Packet Intelligence also relies on Mr. Dietz’s testimony that MeterWorks did not embody the invention. But Mr. Dietz was not qualified as an expert in this case and did not provide an infringement opinion regarding the Me- terFlow product. Mr. Dietz testified to the ultimate ques- tion of noninfringement about a different Exar product, MeterWorks. Even if Mr. Dietz had testified about the cor- rect product and was permitted to offer an expert opinion on whether MeterFlow practiced the asserted claims, his conclusory testimony failed to address what claim limita- tions were purportedly missing from the product and would have been insufficient to carry Packet Intelligence’s burden of proving that MeterFlow did not practice the ’789 patent. Because Packet Intelligence failed to present substan- tial evidence to the jury that matched the limitations in Case: 19-2041 Document: 56 Page: 23 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 23 any claim of the ’789 patent to the features of the Meter- Flow product, NetScout is entitled to judgment as a matter of law that it is not liable for pre-suit damages based on infringement of the ’789 patent. B. Method Patents In an attempt to preserve the jury verdict, Packet In- telligence argues that the pre-suit damages award can be supported by evidence of direct infringement of the’725 and ’751 patent. The district court agreed with Packet Intelli- gence, relying on Dr. Almeroth’s testimony that the NetScout products were used for testing and in the field, Mr. Marwaha’s testimony that NetScout technicians im- plement the accused products at customer sites, and Mr. Lindahl’s testimony that NetScout customers pay NetScout to use its equipment to monitor their networks and do analyses or troubleshooting. The court also cited Mr. Bergman’s testimony that these activities drive the sales of products and revenue to NetScout, which sup- ported that NetScout’s own use of the claimed methods drove the U.S. sales of the accused products and justified pre-suit damages for infringement of the method patents. NetScout maintains that its internal use and testing of allegedly infringing methods cannot support pre-suit dam- ages under these patents. According to NetScout, there was no evidence of specific instances of NetScout’s use of the accused products, and the district court relied on evi- dence that was too general regarding field use. Packet In- telligence counters that there was ample evidence presented at trial that NetScout used its own products to drive the sales of products and revenue to NetScout and that this activity contributed to the product sales that com- prise the royalty base. We disagree with Packet Intelligence. Method claims are “not directly infringed by the mere sale of an apparatus capable of performing the claimed process.” Joy Techs., Inc. v. Flakt, Inc., 6 F.3d 770, 773 (Fed. Cir. 1993). Case: 19-2041 Document: 56 Page: 24 Filed: 07/14/2020 24 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. Therefore, Packet Intelligence cannot simply count sales of the software accused of infringing the ’789 patent as sales of the method claimed in the ’725 and ’751 patents. In- stead, Packet Intelligence was required to produce evi- dence that the claimed method was actually used and hence infringed. Packet Intelligence advanced a theory that NetScout’s internal testing, customer support, and customer training was pre-suit activity infringing the method patents and thus supporting damages. But there is no evidence supporting damages caused by or resulting from these pre-suit activities. Mr. Bergman, Packet Intel- ligence’s damages expert, applied a calculated reasonable royalty to revenue from NetScout’s sales of the GeoBlade and GeoProbe G10 products—occurring both before and af- ter the suit was filed. The damages base was not tailored to any alleged internal use of the claimed methods. The district court held that the jury had a sufficient ba- sis to find that NetScout’s internal use of the claimed meth- ods “drove U.S. sales of the Accused Products and justified an award of pre-suit damages for the ’725 and ’751 method patents.” Packet Intelligence LLC v. NetScout Sys., Inc., 2019 WL 2375218, at *7 (E.D. Tex. June 5, 2019). In con- cluding that the jury had a reasonable basis for its pre-suit damages award, the court relied on its instruction to the jury that it “may consider ‘the effect of selling the patented specialty in promoting sales of other products of the licen- see, the existing value of the invention to the licensee as a generator of sales of its non-patented items, and the extent of such derivative or convoyed sales.’” Id. But Mr. Berg- man did not present a damages theory to the jury based on derivative or convoyed sales. Mr. Bergman did testify that some non-accused NetScout products would be degraded if NetScout did not have access to the accused technology, but after taking those products into account, Mr. Bergman only concluded “that the reasonable royalty in this case . . . would be three and a half percent.” J.A. 1439–40. At no point did Mr. Bergman opine that non-accused products Case: 19-2041 Document: 56 Page: 25 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 25 should be included in the royalty base, and Packet Intelli- gence’s current damages theory is wholly unsupported by the record. Even if NetScout’s own use of the patented method drove sales for the GeoBlade and GeoProbe G10 products, that fact would only justify instances of internal use being counted as part of the royalty base. Packet Intelligence is barred from recovering damages for pre-suit sales of the GeoBlade and GeoProbe G10 products because it failed to comply with the marking requirement. It cannot circum- vent § 287 and include those products in its royalty base simply by arguing that NetScout’s infringement of related method claims drove sales. Because neither the record nor the law supports Packet Intelligence’s recovery of pre-suit damages for any of the asserted patents, NetScout is enti- tled to judgment as a matter of law on this issue. V. Willfulness Finally, NetScout appeals the willfulness judgment. The jury returned a verdict finding that NetScout’s in- fringement was willful. NetScout moved for judgment as a matter of law on willfulness, but the district court denied its motion. NetScout maintains that its infringement was not willful, challenging the jury’s evaluation of the facts. Specifically, NetScout contests that its executives’ lack of knowledge regarding the patents and continued infringing activity after this suit was filed cannot support willfulness. Packet Intelligence responds that the jury’s willfulness verdict was supported by substantial evidence and should be accorded deference. We agree with Packet Intelligence. At trial, NetScout’s corporate representative, Mr. Kenedi, admitted that he did not read the patents but still testified that he believed Mr. Dietz lied and stole the claimed inventions. NetScout’s CEO, Mr. Singhal, testified that he could not recall ever re- viewing the asserted patents and confirmed that, even though NetScout was phasing out the accused products, he Case: 19-2041 Document: 56 Page: 26 Filed: 07/14/2020 26 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. would sell one to a customer if the product was demanded. The jury was permitted to credit this evidence and to draw the inference that NetScout willfully infringed Packet In- telligence’s patent rights. In reviewing a motion for judg- ment as a matter of law, we draw all reasonable inferences most favorable to the verdict, and, under this standard of review, we conclude that the jury’s willfulness verdict is supported by substantial evidence. CONCLUSION We have considered the parties’ remaining arguments but find them unpersuasive. Accordingly, the judgment of the district court is affirmed as to infringement, validity, and willfulness. The district court’s award of pre-suit dam- ages is reversed, and any enhancement thereof is vacated. AFFIRMED-IN-PART, REVERSED-IN-PART, VACATED-IN-PART, AND REMANDED COSTS No costs. Case: 19-2041 Document: 56 Page: 27 Filed: 07/14/2020 United States Court of Appeals for the Federal Circuit ______________________ PACKET INTELLIGENCE LLC, Plaintiff-Appellee v. NETSCOUT SYSTEMS, INC., NETSCOUT SYSTEMS TEXAS, LLC, FKA TEKTRONIX TEXAS, LLC DBA TEKTRONIX COMMUNICATIONS, Defendants-Appellants ______________________ 2019-2041 ______________________ Appeal from the United States District Court for the Eastern District of Texas in No. 2:16-cv-00230-JRG, Judge J. Rodney Gilstrap. ______________________ REYNA, Circuit Judge, concurring-in-part, dissenting-in- part. I join the majority’s reasoning and conclusions as to all issues except the patentability of the asserted claims under § 101. In my view, the claims are directed to the abstract idea of identifying data packets as belonging to “conversa- tional flows” rather than discrete “connection flows.” While the claimed implementations of this idea may ultimately contain inventive concepts that save the claims, it was clear error for the district court to base its finding of inven- tiveness on the abstract idea itself and its attendant bene- fits. Accordingly, I would vacate the district court’s Case: 19-2041 Document: 56 Page: 28 Filed: 07/14/2020 2 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. judgment of patent eligibility and remand for the court to make factual findings as to whether the components and operations actually recited in each claim amount to more than what was merely routine and conventional in the art. I In assessing the subject matter eligibility of patent claims under § 101, we first begin at Step 1 of Alice by de- termining whether the claims at issue are “directed to” a patent-ineligible concept. Alice Corp. Pty. v. CLS Bank Int’l, 573 U.S. 208, 218 (2014). To do so, we look to “the fo- cus of the claimed advance over the prior art” to determine if the character of the claim as a whole, considered in light of the specification, is directed to excluded subject mat- ter. Trading Techs. Int’l, Inc. v. IBG LLC, 921 F.3d 1378, 1384 (Fed. Cir. 2019); see also Intellectual Ventures I LLC v. Capital One Fin. Corp., 850 F.3d 1332, 1338 (Fed. Cir. 2017) (quoting Affinity Labs of Tex., LLC v. DIRECTV, LLC, 838 F.3d 1253, 1257 (Fed. Cir. 2016)); Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335 (Fed. Cir. 2016). Here, claim 19 of U.S. Patent No. 6,954,789 (the “’789 patent”), which the parties treat as representative of the asserted claims, recites a “packet monitor for examining packets” with various components. The components are configured to extract information from passing packets; store “flow-entries for previously encountered conversa- tional flows,” each “identified by identifying information”; compare information extracted from each passing packet to flow-entries in the flow-entry memory; and either classify the packet as belonging to an existing flow if there is a match, or create a new flow-entry if there is not. The specification makes clear that “[w]hat distin- guishes this invention from prior art network monitors is that it has the ability to recognize disjointed flows as be- longing to the same conversational flow.” ’789 patent, col. 3 ll. 56–59. That term, “conversational flow,” is one coined by the inventors to describe “the sequence of packets that Case: 19-2041 Document: 56 Page: 29 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 3 are exchanged in any direction as a result of any activity.” Id. at col. 2 ll. 45–47. The specification contrasts this type of flow with the “connection flows” that were tracked by prior art monitors, which merely represented “all packets involved with a single connection.” Id. at col. 2 ll. 42–50. In other words, the asserted advance over the prior art is the classification of data packets according to the flow of data associated with given activities rather than poten- tially disjointed exchanges transmitted over individual connections. The majority characterizes this as a “technological so- lution to a technological problem” in the form of a “more granular, nuanced, and useful classification of network traffic.” Slip Op. 14. On that basis, the majority concludes that the asserted claims are not directed to an abstract idea at Alice Step 1. But if the technological problem at issue was that prior art monitors could not recognize packets from multiple connections as belonging to the same conver- sational flow, then the “solution” of classifying network traffic according to conversational flows rather than con- nection flows is conceptual, not technological, in the ab- sence of specific means by which that classification is achieved. Here, claim 19 recites computer components that per- form the operations of extracting, storing, and comparing unspecified “identifying information” in order to “classify” data packets by flow. Other than the bare statement that the flow entries stored in the database are “for previously encountered conversational flows,” the claimed operations describe only a general method of sorting data packets ac- cording to any flow, not a specific means of sorting packets by conversational flow. Crucially, the claim does not recite how the individual packets are actually “identified” as be- longing to a conversational flow beyond the functional re- quirement that “identifying information” is used. ’789 patent, col. 36 l. 31—col. 37 l. 2. Yet, the specification ex- plains that to implement the invention, the information Case: 19-2041 Document: 56 Page: 30 Filed: 07/14/2020 4 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. necessary for identifying a conversational flow must be “adaptively determined” through an iterative process in which increasingly specific “signatures” are generated through analysis of patterns in the sequence of passing packets. Id. at col. 4 ll. 10–13; col. 10 l. 16—col. 11 l. 34. In the preferred embodiment, the pattern analysis process is governed by a “parsing-pattern-structures and extraction- operations database” compiled from “protocol description language files” that describe “patterns and states of all pro- tocols that [c]an occur at any layer, including . . . what information to extract for the purpose of identifying a flow, and ultimately, applications and services.” See id. at col. 11 l. 66—col. 12 l. 62. None of these processes or compo- nents are recited in claim 19, and the claim elements have not been construed as limited to the structures and pro- cesses disclosed in the embodiments. Standing alone, the components and operations actu- ally recited in the claims do not provide “the specificity re- quired to transform a claim from one claiming only a result to one claiming a way of achieving it.” SAP Am., Inc. v. InvestPic, LLC, 898 F.3d 1161, 1167 (Fed. Cir. 2018); see also McRO, Inc. v. Bandai Namco Games Am. Inc., 837 F.3d 1299, 1314 (Fed. Cir. 2016) (explaining that courts must “look to whether the claims in these patents focus on a specific means or method that improves the relevant technology or are instead directed to a result or effect that itself is the abstract idea and merely invoke generic pro- cesses and machinery”). In the absence of specific techno- logical means for achieving the desired results, we have described the mere collection, analysis, and display of in- formation as falling within the realm of abstract ideas. See Elec. Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1354 (Fed. Cir. 2016); see also Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC, 874 F.3d 1329, 1337 (Fed. Cir. 2017) (finding a claim directed to an abstract idea when it “re- quires the functional results of ‘converting,’ ‘routing,’ ‘con- trolling,’ ‘monitoring,’ and ‘accumulating records,’ but does Case: 19-2041 Document: 56 Page: 31 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 5 not sufficiently describe how to achieve these results in a non-abstract way”). The absence of a concrete technological solution in claim 19 distinguishes it from the claims at issue in SRI. See SRI Int’l, Inc. v. Cisco Sys., Inc., 930 F.3d 1295, 1300 (Fed. Cir. 2019). There, the patents addressed the problem of detecting hackers and network intruders who simulta- neously attempt to access multiple computers in a network without triggering the alert threshold for any single secu- rity monitor at any given location. Id. The solution, and the claimed advance over the prior art, was to deploy and integrate reports from multiple network monitors that each analyze specific types of data on the network. Id. at 1303. This specific technique was expressly recited in the claims. See id. at 1301 (reciting “deploying a plurality of network monitors in the enterprise network” and “detect- ing, by the network monitors, suspicious network activity based on analysis of network traffic data selected from one or more of the following categories [specified in the claim]” and “integrating the reports of suspicious activity, by one or more hierarchical monitors” (quoting U.S. Patent No. 6,711,615, col. 15 ll. 2–21) (emphasis added)). The claims in SRI disclose how “detecting” by the claimed plurality of the monitors is achieved. In this case, the claims do not disclose how the desired result of “identif[ying]” packets as belonging to a conversational flow is achieved. In asserting that the claims are nonetheless directed to a specific technological solution, the district court deter- mined that “[t]aken together, the claims and the specifica- tion do teach how to identify that certain packets belong to the same conversational flow.” J.A. 390 (CL59) (emphasis added). But the relevant inquiry for § 101 purposes is not whether the patent as a whole teaches a concrete means for achieving an abstract result, but whether such a concrete means is claimed. While a claim must be read “in light of the specification” to understand what is claimed and the relative significance of the claimed components, see, e.g. Case: 19-2041 Document: 56 Page: 32 Filed: 07/14/2020 6 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. Enfish, 822 F.3d at 1335, a court cannot rely on unclaimed details in the specification as the “focus” of the claim for § 101 purposes. Our case law is clear that the § 101 inquiry must be based “on the language of the Asserted Claims themselves, and the specification cannot be used to import details from the specification if those details are not claimed.” ChargePoint, Inc. v. SemaConnect, Inc., 920 F.3d 759, 769–70 (Fed. Cir. 2019) (citing Synopsys, Inc. v. Men- tor Graphics Corp., 839 F.3d 1138, 1149 (Fed. Cir. 2016)). Indeed, this focus on the claimed subject matter distin- guishes the § 101 inquiry from the enablement and written description inquiries under § 112, which focus on the spec- ification as a whole. Contrary to the majority’s suggestion, Slip Op. 15, this principle is not limited solely to the Alice Step 2 inquiry. See Am. Axle & Mfg., Inc. v. Neapco Hold- ings LLC, 939 F.3d 1355, 1363 (Fed. Cir. 2019) (“We have repeatedly held that features that are not claimed are ir- relevant as to step 1 or step 2 of the Mayo/Alice analysis.”). Indeed, it would be an anomalous result if we were not per- mitted to look to unclaimed details at Alice Step 2 in deter- mining whether an asserted claim recites an inventive concept, but could use the same details as the “focus” of the claim at Alice Step 1 to avoid reaching Step 2. For these reasons, I believe the asserted claims fail at Alice Step 1 and must be examined at Alice Step 2. II The majority’s opinion does not reach Step 2 of the Al- ice framework because it concludes that the claims are not directed to an abstract idea at Step 1. Because I conclude that the asserted claims are directed to an abstract idea at Step 1, and the district court’s analysis at Step 2 was flawed, I would vacate and remand for the district court to conduct the appropriate analysis as set forth below. At Alice Step 2, the court must examine the elements of each claim, both individually and as an ordered combi- nation, to determine whether it contains an “inventive Case: 19-2041 Document: 56 Page: 33 Filed: 07/14/2020 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. 7 concept,” beyond what was “well-understood,” “routine,” and “conventional,” that transforms the nature of the claim into a patent eligible application. Alice, 573 U.S. at 217, 225. The issue of “[w]hether something is well-understood, routine, and conventional to a skilled artisan at the time of the patent is a factual determination.” Berkheimer v. HP Inc., 881 F.3d 1360, 1369 (Fed. Cir. 2018). Here, the district court concluded that NetScout failed to show that the combination of elements recited in the as- serted claims would have been regarded as conventional, routine, or well-known by skilled artisans in the relevant field. J.A. 391–392. However, the district court expressly found that “network monitors that could recognize various packets as belonging to the same connection flow were well-known in the prior art.” J.A. 367 (FF28). The only things identified by the district court as distinguishing the claimed monitors from these well-known prior art monitors was the ability to identify disjoined connection flows as be- longing to the same conversational flow and the attendant benefits of that concept. See J.A. 367–368 (FF28–31); J.A. 392 (CL 67–68). 1 These distinctions are based on nothing more than the abstract idea itself, and thus cannot serve as inventive concepts supporting patentability at Alice Step 2. See BSG Tech LLC v. Buyseasons, Inc., 899 F.3d 1281, 1291 (Fed. Cir. 2018) (concluding that an alleged in- novation of the claim that “simply restates what we have 1 While the district court found that “the inventions recited by the Asserted Claims, in contrast to the prior art, make this more granular classification possible,” this find- ing referenced functions and features that are not recited in the majority of the asserted claims, including claim 19. See J.A. 368–369 (FF 32) (citing to portions of the patents discussing “maintaining statistical measures in the flow- entries related to a conversational flow” and collecting “im- portant performance metrics”). Case: 19-2041 Document: 56 Page: 34 Filed: 07/14/2020 8 PACKET INTELLIGENCE LLC v. NETSCOUT SYSTEMS, INC. already determined is an abstract idea” cannot serve as an inventive concept at Alice Step 2). Accordingly, the district court’s analysis at Alice Step 2 was clearly erroneous, and remand is required for the court to conduct the proper analysis in the first instance. On re- mand, the salient factual inquiry should be whether the components and operations recited in each claim contain anything inventive beyond the abstract concept of classify- ing by conversational flow. For example, if the words “con- versational flows” were omitted from each asserted claim, and replaced with the prior art term, “connection flow,” would the ordered combination of recited claim elements amount to something more than the generic and routine aspects of examining and classifying network traffic? That inquiry must be conducted at the level of specificity pre- sented by each claim. For these reasons, I concur-in-part and dissent-in-part from the majority opinion.