Tviim, LLC v. McAfee, Inc.

Court: Court of Appeals for the Federal Circuit
Date filed: 2017-03-21
Citations: 851 F.3d 1356
Copy Citations
Click to Find Citing Cases
Combined Opinion
  United States Court of Appeals
      for the Federal Circuit
                ______________________

                     TVIIM, LLC,
                   Plaintiff-Appellant

                           v.

                   MCAFEE, INC.,
                  Defendant-Appellee
                ______________________

                      2016-1562
                ______________________

   Appeal from the United States District Court for the
Northern District of California in No. 3:13-cv-04545-HSG,
Judge Haywood S. Gilliam Jr.
                 ______________________

                Decided: March 21, 2017
                ______________________

   JOHN J. SHAEFFER, Fox Rothschild, LLP, Los Angeles,
CA, argued for plaintiff-appellant. Also represented by
JEFFREY H. GRANT; WILLIAM A. RUDY, Denver, CO.

    JOSEPH J. MUELLER, Wilmer Cutler Pickering Hale
and Dorr LLP, Boston, MA, argued for defendant-
appellee. Also represented by RICHARD WELLS O’NEILL,
SARAH B. PETTY; NINA S. TALLON, MICHAEL WOLIN, Wash-
ington, DC.
                ______________________
2                                  TVIIM, LLC   v. MCAFEE, INC.



     Before PROST, Chief Judge, CLEVENGER and REYNA,
                    Circuit Judges.
REYNA, Circuit Judge.
     TVIIM, LLC (“TVIIM”) sued McAfee, Inc. (“McAfee”)
in the United States District Court for the Northern
District of California for infringement of U.S. Patent No.
6,889,168 (“’168 patent”). A jury determined that McAfee
did not infringe the ’168 patent and that the ’168 patent
was invalid. After the jury verdict, TVIIM filed motions
for judgment as a matter of law (“JMOL”) and for a new
trial. The district court denied both motions, and TVIIM
filed this appeal challenging the jury verdict and the
district court’s denial of its post-verdict motions. We
affirm because substantial evidence supports the jury’s
findings of non-infringement and invalidity under a
uniform construction of the relevant claim terms, and the
district court did not abuse its discretion in denying a new
trial.
                        BACKGROUND
                    1. The ’168 Patent
     The ’168 patent is entitled “Method and Apparatus for
Assessing the Security of a Computer.” It describes “a
security system which identifies security vulnerabilities
and discrepancies for a computing system.” ’168 patent,
col. 1, ll. 65–67. The ’168 patent both identifies potential
security threats to a computer and, under certain condi-
tions, recommends action to a user to stop the threat.
    Four claims of the ’168 patent are relevant to this ap-
peal. Independent claim 1 recites:
    A security system for a computer apparatus,
      wherein said computer apparatus includes a
      processor and system memory, said security
      system comprising:
TVIIM, LLC   v. MCAFEE, INC.                               3



    at least one security module which under direc-
      tion from the processor accesses and analyzes
      selected portions of the computer apparatus to
      identify vulnerabilities;
    at least one utility module which under the direc-
       tion from the processor, performs various utility
       functions with regards to the computer appa-
       ratus in response to the identified vulnerabili-
       ties; and
    a security system memory which contains security
       information for performing the analysis of the
       computer apparatus.
’168 patent, col. 10, l. 65 to col. 11, l. 10 (disputed terms
emphasized).
    Dependent claim 7 recites:
    The security system of claim 1 wherein the securi-
      ty modules include at least one of . . . an integ-
      rity checking module which analyzes files in the
      system memory to identify system vulnerabili-
      ties;
    a network checking module which analyzes the
      computer apparatus to identify vulnerabilities
      created as a result of the computer apparatus
      connecting with a data network; and
    a password checking module which analyzes
      passwords for users of the computer apparatus
      to identify vulnerabilities.
Id. col. 11, ll. 25–46 (disputed term emphasized).
    Dependent claim 9 recites: “The security system of
claim 7 wherein the system memory comprises a list of
known vulnerabilities which may be employed by the
integrity checking module.” Id. col. 11, ll. 62–64.
4                                  TVIIM, LLC   v. MCAFEE, INC.



    Finally, independent claim 11 recites:
    A method of providing a security assessment for a
      computer system which includes a system
      memory, comprising the steps of:
    providing a security subsystem in the computer
      system such that functionality of the security
      subsystem is directed through a processor for
      the computer system, wherein the security per-
      forms steps comprising:
    identifying a configuration of the system;
    accessing the system memory and performing at
      least one procedure to provide a security as-
      sessment for at least one aspect of the computer
      system;
    as a result of any vulnerabilities discovered in the
      assessment, identifying corrective measures to
      be taken with regards to the computer system;
    reporting the discovered vulnerability and the
      identified corrective measures; and
    upon receiving an appropriate command, initiat-
      ing the corrective measures.
Id. col. 12, ll. 1–18 (disputed terms emphasized).
                        2. McAfee
     McAfee developed “Program Updates” for Microsoft
Windows users to protect software programs against new
security threats. Program Updates detects and installs
updates for numerous non-Windows programs such as
Apple iTunes and Adobe Acrobat. To do so, it scans a
user’s computer to determine whether any of the non-
Windows programs are installed. If it detects such a
program, Program Updates makes two determinations:
(1) whether the National Vulnerability Database (“NVD”)
lists any vulnerabilities in the currently installed version
TVIIM, LLC   v. MCAFEE, INC.                             5



of that program; and (2) whether an update is available.
If an update is available, Program Updates will install the
update.
    Prior to installing an update, Program Updates does
not provide users with a detailed report of security
threats; rather, it tells the user whether an update is
“Critical” or merely “Recommended.” J.A. 2044–46, 3338.
If an update is available, Program Updates will install the
available update whether or not the NVD lists any known
vulnerabilities. By contrast, if no software update is
available, Program Updates will not take action even if it
detects a vulnerability. Without an available update,
Program Updates will not provide users with any infor-
mation about a detected vulnerability. J.A. 2047–48. To
summarize, the presence of a known vulnerability is
irrelevant to whether Program Updates installs an up-
date.
                          3. Prior Art
    At trial, McAfee argued that two prior art references
anticipated the ’168 patent and, in the alternative, that
their combination would have rendered the ’168 patent
obvious.
    The first reference, HostGUARD, is a software pro-
gram developed by several named inventors of the ’168
patent. HostGUARD first detects computer security
threats and then reports them to the user. J.A. 1090,
3796–97. These detailed reports include file names and
locations, the particular nature of the vulnerability, and
steps the user can take to combat the threat. Host-
GUARD requires the user to decide whether to take
corrective action. Thus, the user (not HostGUARD itself)
takes any desired corrective action. J.A. 3796.
    The second reference, System Security Scanner (“S3”),
is a “security assessment tool” that “evaluates system
vulnerabilities from the inside.” J.A. 3799. S3 allows a
6                                  TVIIM, LLC   v. MCAFEE, INC.



user to select which specific vulnerabilities to assess and
then provides a “detailed description” of detected vulnera-
bilities to the user. J.A. 3816, 3801, 3836. For example, it
offers a “long description” report that identifies “bugs”
that create exploitable weaknesses in the system. J.A.
2610–11; see also J.A. 2293 (testimony that S3 provides
users with reports on “specific vulnerabilities found on
specific computers”). S3 does not fix vulnerabilities itself;
rather, it requires a user to open a new window and take
corrective action.
               4. District Court Proceedings
    TVIIM sued McAfee in 2013, alleging that Program
Updates infringed the ’168 patent. McAfee counter-
claimed for declarations of non-infringement, invalidity,
and inequitable conduct.
    McAfee moved for summary judgment that Host-
GUARD anticipated the asserted claims of the ’168 pa-
tent. In its motion, McAfee argued that all claim terms
should be given their plain and ordinary meaning. In its
opposition, TVIIM asked the district court to construe
only one term: “vulnerability.” The district court denied
McAfee’s motion on anticipation because material issues
of fact remained for trial. The district court also ruled
that “vulnerability” should “have its plain and ordinary
meaning and is not limited in scope to ‘pre-existing’
security problems or vulnerabilities.” J.A. 567. The court
then asked for supplemental briefing on the plain and
ordinary meaning of “vulnerability.” The parties agreed
that a “vulnerability” is an “exploitable weakness in a
computer system.” J.A. 633. The court adopted that
construction and asked if it needed to construe any other
terms. Both parties said no further construction was
necessary.
    The case went to trial, and the jury returned a verdict
that: (1) McAfee did not infringe the ’168 patent; (2) the
’168 patent was invalid; and (3) TVIIM did not obtain the
TVIIM, LLC   v. MCAFEE, INC.                              7



’168 patent through inequitable conduct. The jury’s
general verdict of invalidity did not distinguish between
obviousness and anticipation. The inequitable conduct
issue is not subject to this appeal.
    TVIIM filed motions for JMOL and a new trial, argu-
ing that the jury had rendered an inconsistent verdict.
According to TVIIM, the jury could not have arrived at
both a non-infringement and invalidity determination
using a single construction of three claim terms: “as a
result of/in response to”; “various utility functions”; and
“reporting the discovered vulnerabilities.” TVIIM con-
cedes that it did not seek construction of any of these
terms before or during trial. Opening Br. at 70.
    The district court denied TVIIM’s motions. It found
that the jury’s verdict was not inconsistent because sub-
stantial evidence supported both a non-infringement and
invalidity verdict under a single construction of all three
claim terms. J.A. 6–8.
   TVIIM timely appeals. We have jurisdiction under 28
U.S.C. § 1295(a)(1).
                      STANDARD OF REVIEW
    We review denials of motions for JMOL and motions
for new trial under the law of the regional circuit—here,
the Ninth Circuit.         InTouch Techs., Inc. v. VGO
Commc’ns, Inc., 751 F.3d 1327, 1338 (Fed. Cir. 2014). The
Ninth Circuit reviews denials of JMOL de novo. Harper
v. City of Los Angeles, 533 F.3d 1010, 1021 (9th Cir. 2008).
In the Ninth Circuit, the district court grants JMOL when
“the evidence, construed in the light most favorable to the
nonmoving party, permits only one reasonable conclusion,
and that conclusion is contrary to the jury’s verdict.” Id.
(quotation marks and citation omitted). A district court
must uphold a jury’s verdict “if it is supported by substan-
tial evidence, which is evidence adequate to support the
jury’s conclusion, even if it is also possible to draw a
8                                  TVIIM, LLC   v. MCAFEE, INC.



contrary conclusion.” Id. (quotation marks and citation
omitted). Substantial evidence is “such relevant evidence
as a reasonable mind might accept as adequate to support
a conclusion.” Theme Promotions, Inc. v. News Am. Mktg.
FSI, 546 F.3d 991, 1000 (9th Cir. 2008) (quotation marks
and citation omitted). Whether a claim is anticipated is a
question of fact, MPHJ Tech. Invs., LLC v. Ricoh Ams.
Corp., 847 F.3d 1363, 1378 (Fed. Cir. 2017), as is the
question of infringement, Applied Med. Res. Corp. v. U.S.
Surgical Corp., 448 F.3d 1324, 1332 (Fed. Cir. 2006).
    The Ninth Circuit reviews the denial of a motion for
new trial for abuse of discretion. Incalza v. Fendi N. Am.,
Inc., 479 F.3d 1005, 1013 (9th Cir. 2007). It reverses the
denial only if the record lacks any evidence supporting the
verdict or if the district court makes a mistake of law.
Molski v. M.J. Cable, Inc., 481 F.3d 724, 729 (9th Cir.
2007).
                       DISCUSSION
           1. Non-Infringement And Invalidity
    Claim terms must be construed the same way for the
purpose of determining invalidity and infringement.
Amgen Inc. v. Hoechst Marion Roussel, Inc., 314 F.3d
1313, 1330 (Fed. Cir. 2003). A district court’s determina-
tion that a claim term has a “‘plain and ordinary meaning’
may be inadequate when [the claim] term has more than
one ‘ordinary meaning.’” O2 Micro Int’l Ltd. v. Beyond
Innovation Tech. Co., 521 F.3d 1351, 1361 (Fed. Cir.
2008).
    We first address TVIIM’s argument that the jury ren-
dered an inconsistent verdict of infringement and invalid-
ity because the claim terms “as a result of/in response to,”
“various utility functions,” and “reporting the discovered
vulnerabilities” have more than one ordinary meaning.
We note that TVIIM did not seek construction of any of
the three terms at trial. It never presented multiple
TVIIM, LLC   v. MCAFEE, INC.                               9



ordinary meanings of the three terms or showed that they
are open to varying interpretations. We are not persuad-
ed that any of the three terms has multiple ordinary
meanings, and we discern no error in the district court
submitting them to the jury without specific instruction.
TVIIM argues that it is not seeking a new claim construc-
tion of any terms on appeal. To be sure, it has waived any
new construction. “[A] party may not introduce new claim
construction arguments on appeal or alter the scope of the
claim construction positions it took below. Moreover,
litigants waive their right to present new claim construc-
tion disputes if they are raised for the first time after
trial.” Conoco, Inc. v. Energy & Envtl. Int’l, L.C., 460 F.3d
1349, 1358–59 (Fed. Cir. 2006) (citations omitted). Thus,
TVIIM “cannot be allowed to create a new claim construc-
tion dispute following the close of the jury trial.” Broad-
com Corp. v. Qualcomm Inc., 543 F.3d 683, 694 (Fed. Cir.
2008).
    We next address whether substantial evidence sup-
ports the jury’s verdict of non-infringement based on
using the same construction it used for its invalidity
verdict. See Harper, 533 F.3d at 1021. We conclude that
the jury verdict is supported by substantial evidence.
              A. “As A Result Of/In Response To”
    There was no dispute at trial that the term “as a re-
sult of/in response to” requires a causal relationship
between corrective action and the discovered vulnerabil-
ity. McAfee’s expert Dr. Rubin testified that Program
Updates installs software updates regardless of whether a
vulnerability exists and that the only requirement for
update installation is the availability of an update. J.A.
2444 (“The only determining factor whether Program
Updates will update software is if there’s an update
available.”). In other words, the presence of a vulnerabil-
ity is irrelevant to whether Program Updates installs a
software update. As a result, with Program Updates
10                                TVIIM, LLC   v. MCAFEE, INC.



there is no causal relationship between corrective action
and the discovered vulnerability. We find Dr. Rubin’s
testimony on this point to be substantial evidence sup-
porting the jury’s non-infringement verdict.
     We also find that substantial evidence supports the
jury verdict of invalidity based on anticipation. Dr. Rubin
testified that the prior art anticipated the ’168 patent by
initiating corrective action in response to a detected
vulnerability. See, e.g., J.A. 2476 (explaining how Host-
GUARD discloses the “as a result of any vulnerabilities”
limitation of claim 11); J.A. 2494 (concluding that S3
anticipates claim 1). TVIIM insists that the jury failed to
distinguish “all” vulnerabilities from “potential” vulnera-
bilities. But TVIIM failed to clarify its position during
claim construction. Moreover, the jury was free to credit
Dr. Rubin’s testimony that HostGUARD and S3 antici-
pate claims 1 and 11, even in the face of opposing argu-
ments from TVIIM. We thus find Dr. Rubin’s testimony
to be substantial evidence supporting the jury’s invalidity
determination.
             B. “Various Utility Functions”
     TVIIM and McAfee presented competing expert tes-
timony on infringement. TVIIM’s expert Dr. Garuba
testified that Program Updates satisfies the “various
utility functions” term by performing four functions:
identifying the threat, accessing the update, downloading
the update, and installing the update. J.A. 2123–24.
McAfee’s expert Dr. Rubin disagreed and testified that
Program Updates performs only one function—
downloading software updates via multiple steps. J.A.
2445 (“[T]he only thing that [Program Updates] does is it
updates the programs.”); see also J.A. 2454–55. Given the
conflicting expert testimony, we find that a reasonable
mind might accept Dr. Rubin’s testimony over
Dr. Garuba’s. Thus, substantial evidence supports the
jury’s verdict of non-infringement. See Versata Software,
TVIIM, LLC   v. MCAFEE, INC.                                11



Inc. v. SAP Am., Inc., 717 F.3d 1255, 1263 (Fed. Cir. 2013)
(affirming jury award as supported by substantial evi-
dence despite competing expert testimony).
    Dr. Rubin’s testimony also supports the jury’s invalid-
ity verdict for anticipation. He explained how S3 per-
forms “different utility functions.” J.A. 2493. TVIIM
expert Eric Knight also testified that HostGUARD “cor-
rected, at a minimum, ownership and permission,” i.e.,
different functions. J.A. 2620. Thus, the testimony that
the prior art and ’168 patent both perform multiple func-
tions constitutes substantial evidence in support of the
jury’s verdict of invalidity.
     Given the testimony at trial, we find that a uniform
construction of “various utility functions” would allow the
jury to arrive at verdicts of non-infringement and invalid-
ity, as both are supported by substantial evidence.
      C. “Reporting The Discovered Vulnerabilities”
     At trial, TVIIM argued that Program Updates in-
fringes “reporting the discovered vulnerabilities” by
providing a “risk rating” to users prior to installation, i.e.,
whether a particular update is “critical” or simply “rec-
ommended.” When pressed about what vulnerability
information is provided to users by Program Updates,
TVIIM’s expert Dr. Yu responded, “[n]othing more than
just a risk rating.” J.A. 2046. In other words, although
Program Updates reports the risk level to the user, it does
not report any specific information on vulnerabilities.
Dr. Rubin testified that such a risk rating does not consti-
tute “reporting the discovered vulnerabilities,” because
Program Updates does not report “something like a
[Common Vulnerabilities and Exposures] number or a
specific description of the vulnerability.” J.A. 2455.
Program Updates will not report any detected vulnerabil-
ity to a user if no update is available. We find this testi-
mony to be substantial evidence supporting the jury’s
non-infringement verdict.
12                                 TVIIM, LLC   v. MCAFEE, INC.



    Regarding invalidity for anticipation, the record
demonstrates that unlike Program Updates, HostGUARD
and S3 provide users with specific reports on detected
vulnerabilities. See, e.g., J.A. 2478 (Dr. Rubin) (“So here
we see the actual vulnerability is described” [in S3]); J.A.
3796 (HostGUARD brochure describing “reports [that] are
written in plain English and are formatted to effectively
communicate the results of the security assessment”); J.A.
3841–78 (examples of “Vulnerability Descriptions” in S3). 1
Program Updates, by contrast, does not provide any
detailed vulnerability descriptions. J.A. 2002, 2046, 2455.
Given this evidence presented, we find that the jury
verdict of invalidity is supported by substantial evidence.
    As with the other two terms, TVIIM has not persuad-
ed us that a jury could not arrive at a non-infringement
and invalidity verdict based on a single construction of
“reporting the discovered vulnerabilities.” Because sub-
stantial evidence supports the jury’s verdicts, the district
court did not abuse its discretion by denying TVIIM’s
motion for a new trial.
         2. Any Potential Error In Claim Construction
                        Was Harmless
     On appeal, TVIIM concedes that substantial evidence
supports the jury’s finding for either non-infringement or
invalidity but argues it does not support both. Opening
Br. at 73 (“[A]ny single ordinary meaning construction
could support either infringement or invalidity.”) (empha-
sis omitted); see also J.A. 2638 (TVIIM’s counsel stating at



     1  TVIIM asserts that the jury and district court im-
properly construed “vulnerabilities” to include “discrepan-
cies.” But the district court specifically found that “the
intrinsic evidence does not clearly exclude ‘discrepancies’
from the scope of the claim term ‘vulnerability.’” J.A. 634.
TVIIM did not appeal that construction.
TVIIM, LLC   v. MCAFEE, INC.                              13



trial, “I think there’s questions of fact with respect to
infringement.”).
    Thus, by TVIIM’s own admission, the jury’s invalidity
determination could be proper under “any single ordinary
meaning construction.” Opening Br. 73. This concession
is determinative, because even if we were to find an
inconsistent verdict, substantial evidence under “any”
construction supports the jury’s verdict of invalidity.
Consequently, any potential error by the jury regarding
non-infringement was harmless. Cf. Senju Pharm. Co.
v. Lupin Ltd., 780 F.3d 1337, 1353 (Fed. Cir. 2015) (af-
firming the district court’s invalidity finding and therefore
not reaching non-infringement arguments); MobileMedia
Ideas LLC v. Apple Inc., 780 F.3d 1159, 1173 (Fed. Cir.
2015) (holding that because the patent was invalid, the
court “need not reach Apple’s argument that its accused
iPhones do not infringe”).
                          CONCLUSION
    The jury’s findings of non-infringement and invalidity
under a single construction of all three disputed claim
terms are supported by substantial evidence. Even if
error occurred in the jury’s verdict of infringement, we
agree with McAfee that substantial evidence supports the
jury’s invalidity finding. This renders any error harm-
less. In light of these findings, we hold that the district
court’s denial of TVIIM’s motion for JMOL is supported by
substantial evidence, and that the district court did not
abuse its discretion in denying TVIIM’s motion for a new
trial. We therefore affirm.
                          AFFIRMED
                               COSTS
    No costs.