Trustees of Columbia Univ. v. Symantec Corporation , 811 F.3d 1359 ( 2016 )


Menu:
  •   United States Court of Appeals
    for the Federal Circuit
    ______________________
    THE TRUSTEES OF COLUMBIA UNIVERSITY IN
    THE CITY OF NEW YORK,
    Plaintiff-Appellant
    v.
    SYMANTEC CORPORATION,
    Defendant-Appellee
    ______________________
    2015-1146
    ______________________
    Appeal from the United States District Court for the
    Eastern District of Virginia in No. 3:13-cv-00808-JRS,
    Senior Judge James R. Spencer.
    ______________________
    Decided: February 2, 2016
    ______________________
    DAVID ISAAC GINDLER, Irell & Manella LLP, Los
    Angeles, CA, argued for plaintiff-appellant. Also repre-
    sented by RICHARD BIRNHOLZ, JOSEPH M. LIPNER, JASON
    SHEASBY, GAVIN SNYDER; AARON MARTIN PANNER, Law
    Office of Aaron M. Panner, PLLC, Washington, DC.
    DAVID A. NELSON, Quinn Emanuel Urquhart & Sulli-
    van, LLP, Chicago, IL, argued for defendant-appellee.
    Also represented by NATHAN HAMSTRA; RICHARD WOLTER
    2    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    ERWINE, ALEXANDER RUDIS, New York, NY; ADAM
    CONRAD, King & Spalding LLP, Charlotte, NC; DARYL
    JOSEFFER, Washington, DC.
    ______________________
    Before PROST, Chief Judge, DYK, and HUGHES, Circuit
    Judges.
    DYK, Circuit Judge
    The Trustees of Columbia University (“Columbia”)
    appeal from a claim construction order and subsequent
    partial final judgment of non-infringement and invalidity
    with respect to claims of six patents that it owns: 
    U.S. Patent No. 7,487,544
     (“the ’544 patent”), 
    U.S. Patent No. 7,979,907
     (“the ’907 patent”), 
    U.S. Patent No. 7,448,084
    (“the ’084 patent”), 
    U.S. Patent No. 7,913,306
     (“the ’306
    patent”), 
    U.S. Patent No. 8,074,115
     (“the ’115 patent”),
    and 
    U.S. Patent No. 8,601,322
     (“the ’322 patent”).
    We find that the district court correctly construed the
    term “byte sequence feature” in connection with the ’544
    and ’907 patents and the term “probabilistic model of
    normal computer system usage” in connection with the
    ’084 and ’306 patents. Accordingly, we affirm the district
    court’s judgment of non-infringement with respect to the
    ’544 patent, the ’907 patent, the ’084 patent, and the ’306
    patent. We also affirm the judgment of the district court
    finding claims 1 and 16 of the ’544 patent indefinite.
    However, we find that the district court incorrectly
    construed the term “anomalous” in the ’115 and ’322
    patent claims by requiring the model of normal computer
    usage be built only with “typical, attack free data.” Be-
    cause we reverse the district court’s claim construction
    with respect to the ’115 and ’322 patents, we remand for
    further proceedings with respect to the asserted claims of
    those patents.
    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION     3
    BACKGROUND
    All of the six patents at issue on this appeal involve
    applying data analytics techniques to computer security
    to detect and block malware. The patents can be grouped
    into three families. The ’544 and ’907 patents share the
    same specification and relate to detecting malicious email
    attachments. The ’084 and ’306 patents share the same
    specification, and relate to a method for detecting intru-
    sions in the operation of a computer system. The ’115 and
    the ’322 patents also share a specification and relate to
    detecting anomalous program executions.
    In December of 2013, Columbia sued Symantec, alleg-
    ing infringement of claims of these six patents by various
    Symantec products. In January of 2014, Symantec an-
    swered the complaint, asserting, among other things, the
    affirmative defenses of non-infringement, invalidity, and
    unenforceability of the asserted patents. After briefing
    and a hearing, the district court issued a claim construc-
    tion order on October 7, 2014, and later issued an order
    clarifying certain constructions.
    Based on the district court’s claim constructions, the
    parties filed a joint motion for entry of final judgment on
    all infringement claims. Specifically, the parties agreed
    to a judgment of non-infringement on all asserted claims
    and a finding of invalidity for indefiniteness of claims 1
    and 16 of the ’544 patent. Columbia reserved the right to
    appeal the district court’s claim constructions. Pursuant
    to the stipulation, the court entered partial final judg-
    ment under Rule 54(b) of the Federal Rules of Civil Pro-
    cedure, and Columbia now appeals. 1 We have jurisdiction
    pursuant to 
    28 U.S.C. § 1295
    (a)(1).
    1   Other claims, including state-law claims, remain
    pending in the district court.
    4     TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    DISCUSSION
    Claim construction is ultimately a question of law
    that this court reviews de novo. Teva Pharm. USA, Inc. v.
    Sandoz, Inc., 
    135 S. Ct. 831
    , 839 (2015). The construction
    of claim terms based on the claim language, the specifica-
    tion, and the prosecution history are legal determinations.
    
    Id.
     However, claim construction may involve subsidiary
    issues of fact based on the extrinsic record, which this
    court reviews for clear error. See 
    id.
     at 837–38.
    Claim construction requires a determination as to
    how a person of ordinary skill in the art would under-
    stand a claim term “in the context of the entire patent,
    including the specification.” Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1313 (Fed. Cir. 2005) (en banc). We begin a
    claim construction analysis by considering the language of
    the claims themselves. 
    Id. at 1314
    . However, “claims must
    be read in view of the specification, of which they are a
    part.” 
    Id. at 1315
     (quoting Markman v. Westview Instru-
    ments, Inc., 
    52 F.3d 967
    , 978 (1995) (en banc) (quotation
    marks omitted). The specification is the “single best guide
    to the meaning of a disputed term,” Vitronics Corp. v.
    Conceptronic, Inc., 
    90 F.3d 1576
    , 1582 (Fed. Cir. 1996),
    and “is, thus, the primary basis for construing the
    claims.” Phillips, 415 F.3d at 1315 (citation and quotation
    marks omitted). A court should also consider the patent's
    prosecution history, Id. at 1317, and may rely on diction-
    ary definitions, “so long as the dictionary definition does
    not contradict any definition found in or ascertained by a
    reading of the patent documents.” Id. at 1321–22 (cita-
    tion and internal quotation marks omitted).
    Columbia argues that the district court here erred in
    departing from the plain meaning of “byte sequence
    feature” in the ’544 and the ’907 patents and “probabilistic
    model of normal computer system usage” in the ’084 the
    ’306 patents. It argues that “there is a heavy presump-
    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION      5
    tion that claim terms carry their accustomed meaning in
    the relevant community at the relevant time” which can
    only be “overcome in only two circumstances: the patentee
    has expressly defined a term or has expressly disavowed
    the full scope of the claim.” Appellant’s Br. 26 (emphasis
    added) (citation and quotation marks omitted). For this
    proposition, it cites to several recent cases including
    Thorner v. Sony Computer Entertainment America LLC,
    
    669 F.3d 1362
     (Fed. Cir. 2012), a case where we stated
    that “[i]t is not enough for a patentee to simply disclose a
    single embodiment or use a word in the same manner in
    all embodiments, the patentee must clearly express an
    intent to redefine the term” and that “the standard for
    disavowal of claim scope is similarly exacting.” 
    Id. at 1365
    .
    Our case law does not require explicit redefinition or
    disavowal. See, e.g., Aventis Pharma S.A. v. Hospira, Inc.,
    
    675 F.3d 1324
    , 1330 (Fed. Cir. 2012) (“This clear expres-
    sion need not be in haec verba but may be inferred from
    clear limiting descriptions of the invention in the specifi-
    cation or prosecution history.”). Indeed, our en banc
    Phillips opinion rejected this very approach. In Phillips,
    we rejected a line of cases following Texas Digital Sys-
    tems, Inc. v. Telegenix, Inc., where we held that “terms
    used in the claims bear a ‘heavy presumption’ that they
    . . . have the ordinary meaning that would be attributed to
    those words by persons skilled in the relevant art [and,]
    unless compelled otherwise, a court will give a claim term
    the full range of its ordinary meaning.” 
    308 F.3d 1193
    ,
    1202 (Fed. Cir. 2002). Specifically, Phillips rejected an
    approach “in which the specification should be consulted
    only after a determination is made, whether based on a
    dictionary, treatise, or other source, as to the ordinary
    meaning or meanings of the claim term in dispute.” 415
    F.3d at 1320. As Phillips carefully explained, such an
    approach “improperly restricts the role of the specification
    6     TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    in claim construction” to determining “whether the pre-
    sumption in favor of the dictionary definition of the claim
    term has been overcome by an explicit definition of the
    term different from its ordinary meaning, or whether the
    inventor has disavowed or disclaimed scope of coverage.”
    Id. (citations and quotation marks omitted). “[T]he speci-
    fication is always highly relevant to the claim construc-
    tion analysis” and is, in fact “the single best guide to the
    meaning of a disputed term.”          Id. (emphasis added)
    (citation and quotation marks omitted).
    Phillips makes clear that “[t]he claims . . . do not
    stand alone. Rather they are part of a fully integrated
    written instrument, consisting principally of a specifica-
    tion that concludes with the claims.” 415 F.3d at 1315
    (internal quotation marks and citations omitted). The
    only meaning that matters in claim construction is the
    meaning in the context of the patent. See id. at 1316
    (citing and quoting Netword, LLC v. Centraal Corp., 
    242 F.3d 1347
    , 1352 (Fed. Cir. 2001) (“The claims are directed
    to the invention that is described in the specification; they
    do not have meaning removed from the context from
    which they arose.”)).
    Thus, we reject Columbia’s argument that the pre-
    sumption of plain and ordinary meaning “can be overcome
    in only two circumstances: [when] the patentee has ex-
    pressly defined a term or has expressly disavowed the full
    scope of the claim in the specification and the prosecution
    history.” Appellant’s Br. at 26 (emphasis added). As our
    en banc opinion in Phillips made clear, “a claim term may
    be clearly redefined without an explicit statement of
    redefinition” and “[e]ven when guidance is not provided in
    explicit definitional format, the specification may define
    claim terms by implication such that the meaning may be
    found in or ascertained by a reading of the patent docu-
    ments.” 415 F.3d at 1320–21 (citing and quoting Bell Atl.
    Network Servs., Inc. v. Covad Commc’ns Group, Inc., 262
    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION      
    7 F.3d 1258
    , 1268 (Fed. Cir. 2001), and Irdeto Access, Inc. v.
    Echostar Satellite Corp., 
    383 F.3d 1295
    , 1300 (Fed. Cir.
    2004)). 2
    We have previously followed this approach, for exam-
    ple, holding that the claim term “electrochemical sensor”
    excluded cables and wires based on critical language in
    the claims and specification, despite there having been no
    explicit disclaimer of cables or wires. See In re Abbott
    Diabetes Care Inc., 
    696 F.3d 1142
    , 1149–50 (Fed. Cir.
    2012); see also AIA Eng'g Ltd. v. Magotteaux Int'l S/A,
    
    657 F.3d 1264
    , 1278 (Fed. Cir. 2011) (where “the specifi-
    cation reveals a special meaning for a term that differs
    from the meaning it might otherwise possess, that special
    meaning governs”); Comput. Docking Station Corp. v.
    Dell, Inc., 
    519 F.3d 1366
    , 1374 (Fed. Cir. 2008) (“Occa-
    sionally specification explanations may lead one of ordi-
    nary skill to interpret a claim term more narrowly than
    its plain meaning suggests.”); Astrazeneca AB v. Mut.
    Pharm. Co., 
    384 F.3d 1333
    , 1339 (Fed. Cir. 2004) (The
    patentee “seems to suggest that lexicography requires a
    statement in the form ‘I define _____ to mean _____,’ but
    such rigid formalism is not required.”).
    We have also found that a patent applicant need not
    expressly state “my invention does not include X” to
    2    Absent implied or explicit lexicography or disa-
    vowal, we have recognized that the specification plays a
    more limited role where claim language has so “plain a
    meaning on an issue” that it “leav[es] no genuine uncer-
    tainties on interpretive questions relevant to the case.”
    Straight Path IP Group, Inc. v. Sipnet EU S.R.O., 
    806 F.3d 1356
    , 1361 (Fed. Cir. 2015) (stating that “redefini-
    tion or disavowal is required where claim language is
    plain, lacking a range of possible ordinary meanings in
    context”).
    8     TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    indicate his exclusion of X from the scope of his patent
    because “the patentee’s choice of preferred embodiments
    can shed light on the intended scope of the claims.”
    Astrazeneca, 
    384 F.3d at 1340
    ; see also On Demand Mach.
    Corp. v. Ingram Indus., Inc., 
    442 F.3d 1331
    , 1340 (Fed.
    Cir. 2006) (“[W]hen the scope of the invention is clearly
    stated in the specification, and is described as the ad-
    vantage and distinction of the invention, it is not neces-
    sary to disavow explicitly a different scope.”); Edwards
    Lifesciences LLC v. Cook Inc., 
    582 F.3d 1322
    , 1333 (Fed.
    Cir. 2009) (finding disavowal implicitly); Boss Control,
    Inc. v. Bombardier Inc., 
    410 F.3d 1372
    , 1377 (Fed. Cir.
    2005) (same).
    I
    Columbia challenges the district court’s construction
    of “byte sequence feature” as used in claims 1–3, 6, 16–17,
    28, 34, and 43 of the ’544 patent and claims 1–4, and 10 of
    the ’907 patent. The various claims of both the ’544 and
    ’907 patents cover systems and methods for detecting
    malicious executable attachments at an email processing
    application of a computer system using data mining
    techniques. As described in the specification, a computer
    model is “taught” to distinguish between a malicious file
    and a non-malicious file by inputting various known
    malicious and benign files and instructing the computer
    to examine various aspects, or “byte sequence features,”
    common to these files. The model can then be used to
    analyze new, unknown programs to see whether they
    contain byte sequence features that would indicate a
    program is malicious.
    Claim 1 of the ’544 patent is representative and reads:
    A method for classifying an executable attach-
    ment in an email received at an email processing
    application of a computer system comprising:
    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION     9
    a) filtering said executable attachment
    from said email
    b) extracting a byte sequence feature from
    said executable attachment; and
    c) classifying said executable attachment
    by comparing said byte sequence feature of
    said executable attachment with a classi-
    fication rule set derived from byte se-
    quence features of a set of executables
    having a predetermined class in a set of
    classes to determine the probability
    whether said executable attachment is
    malicious, wherein extracting said byte se-
    quence features from said executable at-
    tachment comprises creating a byte string
    representative of resources referenced by
    said executable attachment.
    ’544 patent, col. 19 ll. 11–26 (emphasis added). The dis-
    trict court construed “byte sequence feature” to mean a
    “[f]eature that is a representation of machine code in-
    structions of the executable.” J.A. 9.
    Columbia takes issue with the district court’s limiting
    the construction to only “machine code instructions.”
    Machine code instructions are the parts of a program that
    instruct a computer’s processor to perform certain actions.
    A program, or “executable,” contains machine code in-
    structions, but also contains other information such as
    “resource information,” which contains data that is used
    by the executable but that does not provide specific in-
    structions. Columbia argues that the term “byte sequence
    feature” is an umbrella term for the properties or attrib-
    utes of sequences of bytes that are extracted from any
    part of an executable, including not only machine code
    instructions but also other information. It contends that
    this construction is apparent from a simple examination
    10    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    of the plain meaning of the claim language and that
    nothing in the specification limits the broad plain mean-
    ing of the claim language. A byte sequence, it argues, is a
    sequence of bytes according to the plain meaning of these
    “familiar words.” Thus, a “byte sequence feature” must be
    an attribute of a sequence of any bytes, not just machine
    code instructions. The district court, it urges, erred in
    relying on the specification to limit the ordinary meaning.
    However, as discussed above and as Phillips teaches,
    “the specification is always highly relevant” and “is often
    the best guide to the meaning of a disputed term.” Phil-
    lips, 415 F.3d at 1315 (emphasis added). In this case, the
    district court’s construction is well supported by the
    specification. Twice in the specification, the patentee
    states that the “byte sequence feature” is useful and
    informative “because it represents the machine code in an
    executable.” ’544 patent, col. 6 ll. 12–14; ’907 patent, col.
    6 ll. 18–20; ’544 patent col. 13 ll. 25–26; ’907 patent, col.
    13 ll. 32–33. These are not simply descriptions of the
    preferred embodiment but are statements defining “byte
    sequence feature.” Further, the provisional application
    similarly defined byte sequence feature, stating that
    “[t]he byte sequence feature is the most informative
    because it represents the machine code in an executable
    instead of resource information” which is not made of
    machine code instructions. J.A. 850 (emphasis added); see
    Advanced Display Sys., Inc. v. Kent State Univ., 
    212 F.3d 1272
    , 1282 (Fed. Cir. 2000) (provisional applications
    incorporated by reference are “effectively part of the”
    specification as though it was “explicitly contained there-
    in.”)
    So too if “byte sequence feature” were construed to in-
    clude information other than machine code instructions,
    the term “byte sequence feature” would have the same
    TRUSTEES OF COLUMBIA UNIV.     v. SYMANTEC CORPORATION         11
    scope as the general term “feature.” 3 The specification
    makes it clear that a “byte sequence feature” is just one
    type of “feature” used for developing and later applying
    the model. The specification states that “a feature is a
    property or attribute of data (such as ‘byte sequence
    feature’),” ’544 patent, col. 5 ll. 63–64; ’907 patent, col. 6 ll.
    1–2, and also states that “[f]eatures . . . are defined as
    properties extracted from each example program in the
    data set, e.g., byte sequences.” ’544 patent, col. 5 ll. 58–
    60; ’907 patent, col. 5 ll. 63–65. The specification de-
    scribes other embodiments as “additional methods of
    feature extraction,” ’544 patent, col. 6 l. 23; ’907 patent,
    col. 6 l. 29, and not another approach to byte sequence
    feature extraction. The provisional application, similarly,
    shows that “byte sequence feature” extraction is just one
    type of “feature extraction” and not a general term.
    Columbia points to language in the specification that
    states that, in another embodiment, “extracting the byte
    sequence features from the executable attachment may
    comprise creating a byte string representative of re-
    sources referenced by said executable attachment,” ’544
    patent, col. 3 ll. 37–40. Resource information is not made
    up of machine code instructions and thus, it argues, “byte
    sequence feature” cannot be so limited. This single sen-
    tence in the specification cannot overcome the overwhelm-
    ing evidence in other parts of the specification and the
    provisional application (described above) demonstrating
    that the intended definition of this term does not include
    information other than machine code instructions. The
    patentee cannot rely on its own use of inconsistent and
    3   The district court construed “feature” to mean “a
    property or attribute of data which may take on a set of
    values.” J.A. 9. Columbia does not challenge this con-
    struction on appeal.
    12    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    confusing language in the specification to support a broad
    claim construction which is otherwise foreclosed.
    As we have previously found, the “construction that
    stays true to the claim language and most naturally
    aligns with the patent’s description of the invention will
    be, in the end, the correct construction.” Renishaw PLC v.
    Marposs Societa’ per Azioni, 
    158 F.3d 1243
    , 1250 (Fed.
    Cir. 2003). The district court’s construction of “byte
    sequence feature” is correct.
    The parties stipulated to a judgment of non-
    infringement of all claims of these two patents based on
    the district court’s claim construction because, as Colum-
    bia concedes, none of the accused products analyzes an
    attachment’s machine code instructions. Instead, when
    Symantec’s programs analyze the contents of a file, they
    analyze the attached file’s “header,” which contains
    information regarding the organization of the file but does
    not contain any executable code. Because we have found
    the district court’s construction to be correct, we now
    affirm that judgment.
    The parties also stipulated to a judgment of indefi-
    niteness as to claims 1 and 16 of the ’544 patent. As
    previously discussed, executable files contain machine
    code instructions and other information, like resource
    information. Claims 1 and 16 conflate a “byte sequence
    feature,” which is a feature extracted from machine code
    instructions, with the extraction of “resource infor-
    mation,” which is not a machine code instruction. Specifi-
    cally, the claims describe the step of extracting machine
    code instructions from something that does not have
    machine code instructions. See, e.g., ’544 patent, col. 19 ll.
    23–25 (“extracting said byte sequence features from said
    executable attachment comprises creating a byte string
    representative of resources.”) (emphasis added).         The
    claims are nonsensical in the way a claim to extracting
    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION      13
    orange juice from apples would be, and are thus indefi-
    nite. See Allen Eng’g Corp. v. Bartell Indus., 
    299 F.3d 1336
    , 1349 (Fed. Cir. 2002). Columbia conceded at oral
    argument that it does not argue that claims 1 and 16 of
    the ’544 patent are not indefinite under the district court’s
    claim construction. Because we have affirmed the district
    court’s claim construction, we also affirm the district
    court’s judgment that claims 1 and 16 of the ’544 patent
    are indefinite.
    II
    Columbia next challenges the district court’s con-
    struction of “probabilistic model of normal computer
    system usage,” as used in claims 1, 9, and 14 the ’084
    patent and claims 1 and 7 of the ’306 patent. The Mi-
    crosoft Windows operating system contains a registry,
    which is a library of common low-level settings for the
    operating system and for other applications. When pro-
    grams are executed, they may read from or change the
    information in this database. The theory underlying the
    invention in Columbia’s patents is that malicious pro-
    grams access the registry in different ways than normal
    programs do. Thus, as for email attachments in the ’544
    and ’907 patents, a computer model is “taught” to distin-
    guish between accesses to the registry which indicate a
    malicious program and normal accesses to the registry.
    The model then can be used to detect malicious accesses
    to the database and identify malicious programs.
    The claims of these two patents cover systems and
    methods for detecting intrusions in a computer system by
    monitoring operating system registry accesses. Claim 1 of
    the ’084 patent is representative and reads:
    A method for detecting intrusions in the operation
    of a computer system comprising:
    14    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    (a) gathering features from records of
    normal processes that access the operating
    system registry;
    (b) generating a probabilistic model of
    normal computer system usage based on
    the features and determining the likeli-
    hood of observing an event that was not
    observed during the gathering of features
    from the records of normal processes; and
    (c) analyzing features from a record of a
    process that accesses the operating system
    registry to detect deviations from normal
    computer system usage to determine
    whether the access to the operating sys-
    tem registry is an anomaly.
    ’084 patent, col. 22 ll. 21–34 (emphasis added). The
    district court, in its original claim construction order,
    construed the term to mean a “model of typical attack-free
    computer system usage that employs probability.” J.A.
    10. The district court furthered construed the term
    “normal computer system usage” to mean “typical attack-
    free computer system usage,” relying on the specification.
    
    Id.
     After Columbia moved for clarification of the district
    court’s construction of this term, the district court clari-
    fied that the model described in the ’084 and ’306 patents
    must be generated with “only attack-free data.” J.A. 12.
    Again, contrary to Phillips, Columbia argues that the
    district court erred in departing from the plain and ordi-
    nary meaning and instead relied on the specification to
    erroneously import a negative limitation from the specifi-
    cation despite no “clear and unmistakable” disclaimer of
    the claim scope.
    The district court was correct in finding that, accord-
    ing to the patentee’s own words in the specification, the
    “probabilistic model of normal computer system usage” is
    TRUSTEES OF COLUMBIA UNIV.    v. SYMANTEC CORPORATION         15
    built using only attack-free data. According to the specifi-
    cation, the model is built by “[g]athering features from the
    records of normal processes that access the Windows
    registry.” ’084 patent, col. 3 ll. 31–33 (emphasis added);
    ’306 patent, col. 3 ll. 32–33. The invention then takes
    these features (which were gathered from normal pro-
    cesses) and builds “a probabilistic model of normal com-
    puter system usage based on records of a plurality of
    processes that access the Windows registry and that are
    indicative of normal computer system usage, e.g., free of
    attacks.” ’084 patent, col. 4 ll. 3–6 (emphasis added); ’306
    patent, col. 4 ll. 4–8. The specification consistently de-
    scribes an implementation where the inventors ran ordi-
    nary programs to “generate normal data for building an
    accurate and complete training model.” ’084 patent, col.
    14 ll. 55–59; ’306 patent, col. 14 ll. 55–59; see also 
    id.
     col. 8
    ll. 12–14 (“statistics of the values of these features over
    normal data are used to create the probabilistic model of
    normal registry behavior”); 
    id.
     col. 10 ll. 33–35 (probabil-
    ity “estimated over the normal data”); 
    id.
     col 11 ll. 17–18
    (“From the normal data . . .”). Nothing in the specification
    describes any embodiment which uses attack data to build
    the model. 4 The provisional patent application, incorpo-
    rated by reference into the specification, similarly de-
    scribes creating the model using only normal data. See
    J.A. 925 (“Statistics . . . over normal data are used to
    create the model of normal registry behavior.”)
    The prosecution history also confirms this conclusion.
    To distinguish some prior art, the patentee said that the
    4   Columbia’s references to the specification where
    attack data is used all relate to testing and setting the
    threshold for determining whether something is an attack
    rather than creating the model. See ’084 patent, col. 15 ll.
    44–51.
    16    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    prior art did not suggest “a technique for predicting
    events which were not observed during training.” J.A.
    5805. In other words, what distinguished the invention
    from the prior art is that it could predict whether a regis-
    try access was malicious from a model that was built
    using only normal data. If the model were built on attack
    data and then subsequently used to predict attacks, it
    would not be “predicting events which were not observed
    during training.”
    Columbia points to an academic paper referenced in
    the specification and written by one of the inventors
    wherein a model for detecting network intrusions was
    built using both attack and attack-free data as support for
    its construction. However, this reference describes a
    different invention and is not relevant for construing the
    claims of these patents. In addition, Columbia points to
    two patent applications incorporated into the specification
    describing databases used to store information to build
    models that have passing references to attack data’s being
    stored in the database. These fleeting references cannot
    overcome the overwhelming evidence in the specification
    and the prosecution history, especially given the specifica-
    tion did not “even refer with any detailed particularity” to
    the passages Columbia now argues support its construc-
    tion. See SkinMedica, Inc. v. Histogen Inc., 
    727 F.3d 1187
    , 1207 (Fed. Cir. 2013). The district court’s conclu-
    sion that the model of the ’084 and ’306 patents must be
    built with only attack-free normal data is correct.
    Based on the district court’s claim construction, the
    parties stipulated to a judgment of non-infringement of
    these two patents by the accused Symantec products.
    Columbia concedes that none of the Symantec products
    builds a model based on clean, attack-free data. Rather,
    these products use known good and bad files to classify
    new unknown files. We therefore affirm the stipulated
    judgment of non-infringement of these two patents.
    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION    17
    III
    Lastly, Columbia argues that the district court incor-
    rectly construed the term “anomalous” as used in claims
    1, 4–5, 11, 14–15, 21–22, 25–26, 32, 35–36, and 42 of the
    ’115 and claims 1–4, 9–13, 18–21, and 26–27 of the ’322
    patent. The claims of these two patents cover media,
    systems, and methods for detecting and classifying anom-
    alous program executions. As is described in the specifi-
    cation, computer programs may anomalously “terminate
    due to any number of threats, program errors, software
    faults, attacks, or any other suitable software failure.”
    ’115 patent col. 1 ll. 23–25. Thus, a program crash may be
    the result of a malicious attack or it simply may be the
    result of a bug in the software. This invention “teaches” a
    computer model to tell the difference between the two,
    and then uses that model to predict whether anomalous
    program executions are the result of a malicious attack.
    Claim 1 of the ‘115 patent is representative and reads:
    A method for detecting anomalous program execu-
    tions, comprising:
    executing at least a part of a program in
    an emulator;
    comparing a function call made in the em-
    ulator to a model of function calls for the
    at least a part of the program;
    identifying the function call as anomalous
    based on the comparison; and
    upon identifying the anomalous function
    call, notifying an application community
    that includes a plurality of computers of
    the anomalous function call.
    ’115 patent, col. 20 ll. 37–46 (emphasis added). The dis-
    trict   court     construed    “anomalous”    to   mean
    18    TRUSTEES OF COLUMBIA UNIV.    v. SYMANTEC CORPORATION
    “[d]eviation/deviating from a model of typical, attack-free
    computer system usage.” J.A. 10. After Columbia moved
    for clarification, the district court, relying on its construc-
    tion of “normal computer usage” in the various claims of
    ’084 and ’306 patents, as described above, found that the
    model in ’115 and ’322 patents also only uses attack-free
    data. J.A. 11–12.
    At the outset, we note that there is no reason why the
    construction of claim terms in the ’115 and ’322 patents
    should be the same as the ’084 and ’306 patents, contrary
    to the views expressed by the district court and the par-
    ties. We have previously held that where multiple pa-
    tents “derive from the same parent application and share
    many common terms, we must interpret the claims con-
    sistently across all asserted patents.” NTP, Inc. v. Re-
    search in Motion, Ltd., 
    418 F.3d 1282
    , 1293 (Fed. Cir.
    2005); see also Microsoft Corp. v. Multi-Tech Sys., Inc.,
    
    357 F.3d 1340
    , 1349–50 (Fed. Cir. 2004) (finding that
    statements by the patentee in prosecution of sibling
    patent were a “representation of its own understanding of
    the inventions disclosed” in all sibling patents, despite the
    statement being made after the issuance of the patent in
    which the term being analyzed was used).           But here,
    none of those considerations is present. These four pa-
    tents comprise two separate families, and these two
    families of patents claim two different inventions, list only
    one inventor in common, were filed years apart, and do
    not result from the same patent application. See Abbot
    Labs. V. Dey, L.P., 
    287 F.3d 1097
    , 1104–05 (Fed. Cir.
    2002).
    Further, the language of the two terms being con-
    strued—“anomalous” in claims of the ’115 and ’322 pa-
    tents and “probabilistic model of normal computer system
    usage” in claims of the ’084 and ’306 patents—is not the
    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION      19
    same, or even similar. 5 Thus, even if they were part of
    the same family, there would be no reason to construe the
    terms similarly. See Ventana Med. Sys., Inc. v. Biogenex
    Labs., Inc., 
    473 F.3d 1173
    , 1182 (Fed. Cir. 2006) (“[T]he
    doctrine of prosecution disclaimer generally does not
    apply when the claim term in the descendant patent uses
    different language.”); ResQNet.com, Inc. v. Lansa, Inc.,
    
    346 F.3d 1374
    , 1383 (Fed. Cir. 2003) (“Although a parent
    patent's prosecution history may inform the claim con-
    struction of its descendant, the [parent] patent's prosecu-
    tion history is irrelevant to the meaning of this limitation
    because the two patents do not share the same claim
    language.”). We see no reason to construe the term
    “anomalous” in the ’115 and ’322 patents consistently
    with the term “probabilistic model of normal computer
    system usage” in the ’084 and ’306 patents.
    The claims themselves show that the model can be
    built with both attack-free and attack data. Claim 7 of
    the ’115 patent, which depends on claim 1, claims “[t]he
    method of claim 1, wherein the model reflects normal
    activity of the at least a part of the program.” ’115 patent,
    col. 20 ll. 61–62. Claim 8 of the ’115 patent claims “[t]he
    method of claim 1, wherein the model reflects attacks
    against the at least a part of the program.” 
    Id.
     at ll. 63–
    64. Claims 6 and 7 of the ’322 patent, similarly depend on
    independent claim 1 and also refer to model building
    using normal data and attack data, respectively. See ’322
    patent, col. 20 ll. 64–67. As we have previously held,
    “each claim in a patent is presumptively different in
    scope.” RF Del., Inc. v. Pac. Keystone Techs., Inc., 
    326 F.3d 1255
    , 1263 (Fed. Cir. 2003). Thus, in a situation
    5  The specifications of the ’084 and ’306 patents use
    the word anomalous, but only in describing the detection
    phase not the model building phase.
    20    TRUSTEES OF COLUMBIA UNIV.   v. SYMANTEC CORPORATION
    where dependent claims have no meaningful difference
    other than an added limitation, the independent claim is
    not restricted by the added limitation in the dependent
    claim. Phillips, 415 F.3d at 1314-15; Acumed LLC v.
    Stryker Corp., 
    483 F.3d 800
    , 806 (Fed. Cir. 2007). In such
    situations, construing the independent claim to exclude
    material covered by the dependent claim would be incon-
    sistent. Andersen Corp. v. Fiber Composites, LLC, 
    474 F.3d 1361
    , 1369–70 (Fed. Cir. 2007). Thus, because the
    dependent claims in the ’115 and ’322 patents are pre-
    sumed to be narrower than the independent claims on
    which they depend, “anomalous” cannot be read to limit
    the type of data used to model to only attack-free data in
    the independent claims in the absence of other evidence
    rebutting the presumption.
    The prosecution histories of the ’115 and ’322 patents
    also support Columbia’s assertion that the model here can
    be built with attack-free and attack data. The provisional
    application describes using “approximately 300,000
    records of which approximately 2,000 are labeled attacks”
    to build the model. J.A. 3649–50. In addition, it states
    that the data used to build a model “can conceivably
    include . . . malicious programs” and “harmful data.” J.A.
    3752; J.A. 3739. No similar statements appear in the
    provisional application or prosecution histories for the
    ’084 and ’306 patents. Thus we conclude that the district
    court erred in limiting the term “anomalous” to mean that
    the model here must be built only using attack-free data.
    Again based on the district court’s claim construction,
    the parties stipulated to non-infringement of these two
    patents by the accused Symantec products. Because we
    reverse the district court’s construction of “anomalous,”
    we vacate the stipulated judgment of non-infringement as
    to all claims of the ’115 and the ’322 patents and remand
    for further proceedings consistent with this opinion.
    TRUSTEES OF COLUMBIA UNIV.    v. SYMANTEC CORPORATION      21
    CONCLUSION
    In summary, we affirm stipulated judgment of non-
    infringement of the asserted claims of the ’544 patent, the
    ’907 patent, the ’084 patent, and the ’306 patent. In
    addition, we affirm the district court’s finding of invalidity
    of claims 1 and 16 of the ’544 patent. However, we re-
    verse the stipulated judgment of non-infringement of the
    asserted claims of the ’115 and ’322 patents because it
    was based on an incorrect claim construction, and remand
    for further proceedings consistent with this opinion.
    AFFIRMED-IN-PART, REVERSED-IN-PART,
    REMANDED-IN-PART
    COSTS
    Costs to neither party
    

Document Info

Docket Number: 15-1146

Citation Numbers: 811 F.3d 1359

Filed Date: 2/2/2016

Precedential Status: Precedential

Modified Date: 1/12/2023

Authorities (20)

boss-control-inc-and-1217537-ontario-limited-partnership-v-bombardier , 410 F.3d 1372 ( 2005 )

Acumed LLC v. Stryker Corporation , 483 F.3d 800 ( 2007 )

Andersen Corp. v. Fiber Composites, LLC , 474 F.3d 1361 ( 2007 )

Ntp, Inc. v. Research in Motion, Ltd. , 418 F.3d 1282 ( 2005 )

Computer Docking Station Corp. v. Dell, Inc. , 519 F.3d 1366 ( 2008 )

Allen Engineering Corporation v. Bartell Industries, Inc. ... , 299 F.3d 1336 ( 2002 )

Netword, LLC v. Centraal Corporation , 242 F.3d 1347 ( 2001 )

resqnet.com, Inc. v. Lansa, Inc. , 346 F.3d 1374 ( 2003 )

Astrazeneca Ab, Aktiebolaget Hassle, Kbi-E, Inc., Kbi, Inc.,... , 384 F.3d 1333 ( 2004 )

Vitronics Corporation v. Conceptronic, Inc. , 90 F.3d 1576 ( 1996 )

Ventana Medical Systems, Inc. v. Biogenex Laboratories, Inc. , 473 F.3d 1173 ( 2006 )

Microsoft Corporation v. Multi-Tech Systems, Inc., Multi-... , 357 F.3d 1340 ( 2004 )

Edwards Lifesciences LLC v. Cook Inc. , 582 F.3d 1322 ( 2009 )

Herbert Markman and Positek, Inc. v. Westview Instruments, ... , 52 F.3d 967 ( 1995 )

Aia Engineering Ltd. v. Magotteaux Intern. S/A , 657 F.3d 1264 ( 2011 )

irdeto-access-inc-formerly-known-as-tvcom-international-inc-v , 383 F.3d 1295 ( 2004 )

On Demand MacHine Corporation, Plaintiff-Cross v. Ingram ... , 442 F.3d 1331 ( 2006 )

Rf Delaware, Inc. v. Pacific Keystone Technologies, Inc., ... , 326 F.3d 1255 ( 2003 )

Texas Digital Systems, Inc. v. Telegenix, Inc. , 308 F.3d 1193 ( 2002 )

Abbott Laboratories and Mitsubishi-Tokyo Pharmaceuticals, ... , 287 F.3d 1097 ( 2002 )

View All Authorities »