Virnetx, Inc. v. Cisco Systems, Inc. , 767 F.3d 1308 ( 2014 )


Menu:
  •   United States Court of Appeals
    for the Federal Circuit
    ______________________
    VIRNETX, INC.,
    Plaintiff-Appellee,
    AND
    SCIENCE APPLICATIONS INTERNATIONAL
    CORPORATION,
    Plaintiff-Appellee,
    v.
    CISCO SYSTEMS, INC.,
    Defendant,
    AND
    APPLE INC.,
    Defendant-Appellant.
    ______________________
    2013-1489
    ______________________
    Appeal from the United States District Court for the
    Eastern District of Texas in No. 10-CV-0417, Chief Judge
    Leonard Davis.
    ______________________
    Decided: September 16, 2014
    ______________________
    2                          VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    WILLIAM F. LEE, Wilmer Cutler Pickering Hale and
    Dorr, LLP, of Boston, Massachusetts, argued for defend-
    ant-appellant. With him on the brief were MARK C.
    FLEMING, LAUREN B. FLETCHER, and REBECCA BACT, of
    Boston, Massachusetts, and JONATHAN G. CEDARBAUM,
    BRITTANY BLUEITT AMADI, and LEAH LITMAN, of Washing-
    ton, DC. Of counsel on the brief was DANNY L. WILLIAMS,
    Williams, Morgan & Amerson, P.C., of Houston, Texas.
    J. MICHAEL JAKES, Finnegan, Henderson, Farabow,
    Garrett & Dunner, LLP, of Washington, DC, argued for
    plaintiffs-appellees. With him on the brief for Virnetx,
    Inc. were KARA F. STOLL and SRIKALA ATLURI, of Washing-
    ton, DC, and BENJAMIN R. SCHLESINGER, of Atlanta,
    Georgia. Of counsel on the brief were BRADLEY W.
    CALDWELL, JASON D. CASSADY, and JOHN AUSTIN CURRY,
    Caldwell, Cassady & Curry, of Dallas, Texas. On the brief
    for Science Applications International Corporation were
    DONALD URRABAZO, ARTURO PADILLA, and RONALD
    WIELKOPOLSKI, Urrabazo Law, P.C., of Los Angeles,
    California; and ANDY TINDEL, Mann, Tindel & Thompson,
    of Tyler, Texas.
    ______________________
    Before PROST, ∗ Chief Judge and CHEN, Circuit Judge. ∗∗
    PROST, Chief Judge.
    Apple Inc. appeals from a final judgment of the U.S.
    District Court for the Eastern District of Texas, in which
    a jury found that Apple infringed U.S. Patent Nos.
    6,502,135 (“’135 patent”), 7,418,504 (“’504 patent”),
    ∗
    Sharon Prost assumed the position of Chief Judge
    on May 31, 2014.
    ∗∗
    Randall R. Rader, who retired from the position of
    Circuit Judge on June 30, 2014, did not participate in this
    decision.
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                      3
    7,490,151 (“’151 patent”), and 7,921,211 (“’211 patent”).
    The jury further found that none of the infringed claims
    were invalid and awarded damages to plaintiffs-appellees
    VirnetX, Inc. and Science Applications International
    Corporation (“SAIC”) in the amount of $368,160,000.
    For the reasons that follow, we affirm the jury’s find-
    ings that none of the asserted claims are invalid and that
    many of the asserted claims of the ’135 and ’151 patents
    are infringed by Apple’s VPN On Demand product. We
    also affirm the district court’s exclusion of evidence relat-
    ing to the reexamination of the patents-in-suit. However,
    we reverse the jury’s finding that the VPN On Demand
    product infringes claim 1 of the ’151 patent under the
    doctrine of equivalents. We also reverse the district
    court’s construction of the claim term “secure communica-
    tion link” in the ’504 and ’211 patents and remand for
    further proceedings to determine whether the FaceTime
    feature infringes those patents under the correct claim
    construction. Finally, we vacate the jury’s damages
    award and remand for further proceedings consistent
    with this opinion.
    BACKGROUND
    The patents at issue claim technology for providing
    security over networks such as the Internet. The patents
    assert priority to applications filed in the 1990s, originally
    assigned to SAIC. VirnetX, a Nevada-based software
    development and licensing enterprise, acquired the pa-
    tents from SAIC in 2006.
    I. The ’504 and ’211 Patents and FaceTime
    The ’504 and ’211 patents share a common specifica-
    tion disclosing a domain name service (“DNS”) system
    that resolves domain names and facilitates establishing
    “secure communication links.” ’504 patent col. 55 ll. 49–
    50. In one embodiment, an application on the client
    computer sends a query including the domain name to a
    4                           VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    “secure domain name service,” which contains a database
    of secure domain names and corresponding secure net-
    work addresses. 
    Id. at col.
    50 ll. 54–57, col. 51 ll. 11–19,
    col. 51 ll. 29–32. This allows a user to establish a secure
    communication link between a client computer and a
    secure target network address. 
    Id. at col.
    51 ll. 34–40.
    Representative claim 1 of the ’504 patent recites:
    1. A system for providing a domain name service
    for establishing a secure communication link, the
    system comprising:
    a domain name service system configured to be
    connected to a communication network, to store a
    plurality of domain names and corresponding
    network addresses, to receive a query for a net-
    work address, and to comprise an indication that
    the domain name service system supports estab-
    lishing a secure communication link.
    
    Id. at col.
    55 ll. 49–56.
    Before the district court, VirnetX accused Apple of in-
    fringement based on its “FaceTime” feature. Specifically,
    VirnetX accused Apple’s servers that run FaceTime on
    Apple’s iPhone, iPod, iPad (collectively, “iOS devices”),
    and Mac computers of infringing claims 1, 2, 5, 16, 21,
    and 27 of the ’504 patent as well as claims 36, 37, 47, and
    51 of the ’211 patent. In operation, FaceTime allows
    secure video calling between select Apple devices. J.A.
    1443. To use FaceTime, a caller enters an intended
    recipient’s e-mail address or telephone number into the
    caller’s device (e.g., iPhone). J.A. 1451–52. An invitation
    is then sent to Apple’s FaceTime server, which forwards
    the invitation to a network address translator (“NAT”)
    which, in turn, readdresses the invitation and sends it on
    to the receiving device. J.A. 1821, 1824–25. The recipient
    may then accept or decline the call. J.A. 1453. If accept-
    ed, FaceTime servers establish a secure FaceTime call.
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                    5
    J.A. 1453. Once connected, the devices transmit au-
    dio/video data as packets across the secure communica-
    tion path without passing through the FaceTime server.
    J.A. 1820, 1825.
    II. The ’135 and ’151 Patents and VPN On Demand
    A conventional DNS resolves domain names (e.g.,
    “Yahoo.com”) into Internet Protocol (“IP”) addresses.
    See ’135 patent col. 37 ll. 22–27. A user’s web browser
    then utilizes the IP address to request a website. 
    Id. at col.
    37 ll. 24–29.
    The ’135 and ’151 patents share a common specifica-
    tion disclosing a system in which, instead of a convention-
    al DNS receiving the request, a DNS proxy intercepts it
    and determines whether the request is for a secure site.
    
    Id. at col.
    38 ll. 23–25. If the proxy determines that a
    request is for a secure site, the system automatically
    initiates a virtual private network (“VPN”) between the
    proxy and the secure site. 
    Id. at col.
    38 ll. 30–33. If the
    browser determines that the request was for a non-secure
    website, then the DNS proxy forwards the request to a
    conventional DNS for resolution. 
    Id. at col.
    38 ll. 43–47.
    Representative claim 1 of the ’135 patent recites:
    1. A method of transparently creating a virtual
    private network (VPN) between a client computer
    and a target computer, comprising the steps of:
    (1) generating from the client computer a Domain
    Name Service (DNS) request that requests an IP
    address corresponding to a domain name associat-
    ed with the target computer;
    (2) determining whether the DNS request trans-
    mitted in step (1) is requesting access to a secure
    web site; and
    6                           VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    (3) in response to determining that the DNS re-
    quest in step (2) is requesting access to a secure
    target web site, automatically initiating the VPN
    between the client computer and the target com-
    puter.
    
    Id. at col.
    47 ll. 20–32.
    Claims 1 and 13 of the ’151 patent are similar to claim
    1 of the ’135 patent except that they recite initiating an
    “encrypted channel” and creating a “secure channel,”
    respectively, instead of creating a “VPN.” ’151 patent col.
    46 ll. 55–67, col. 48 ll. 18–29.
    Before the district court, VirnetX accused Apple’s iPh-
    one, iPad, and iPod Touch of infringing claims 1, 3, 7, and
    8 of the ’135 patent and claims 1 and 13 of the ’151 patent
    because they include a feature called “VPN On Demand.”
    When a user enters a domain name into the browser of an
    iOS device, a DNS request is generated. J.A. 1393–94.
    VPN On Demand receives the request and checks a list of
    domain names for which a VPN connection should be
    established, known as a “configuration file.” J.A. 1377. If
    the entered domain name matches a domain name in the
    configuration file, VPN On Demand contacts a VPN
    server to authenticate the user and, if successful, auto-
    matically establishes a VPN between the user’s browser
    and the target computer with which the requested domain
    name is associated. J.A. 1377–78, 1396–98.
    III. Five-Day Jury Trial and Post-Trial Motions
    On August 11, 2010, VirnetX filed this infringement
    action, alleging that Apple’s FaceTime servers infringe
    certain claims of the ’504 and ’211 patents, and that
    Apple’s VPN On Demand feature infringes certain claims
    of the ’135 and ’151 patents. Apple responded that
    FaceTime and VPN On Demand do not infringe, and that
    the asserted claims were invalid as anticipated by a 1996
    publication by Takahiro Kiuchi et al. (“Kiuchi”).
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   7
    On April 25, 2012, the district court construed disput-
    ed claim terms, and a jury trial commenced on October
    31, 2012. After a five-day trial, the jury returned its
    verdict, finding all of the asserted claims valid and in-
    fringed. The jury awarded VirnetX $368,160,000 in
    reasonable royalty damages. Apple moved for judgment
    as a matter of law (“JMOL”) or, alternatively, for a new
    trial or remittitur. On February 26, 2013, the district
    court denied Apple’s motions. VirnetX, Inc. v. Apple Inc.,
    
    925 F. Supp. 2d 816
    (E.D. Tex. 2013).
    Apple now appeals the denial of its post-trial motion
    for JMOL or a new trial. This court has jurisdiction
    under 28 U.S.C. § 1295(a)(1).
    DISCUSSION
    I. Claim Construction
    On appeal, Apple argues that the district court erred
    in construing the terms “domain name” and “secure
    communication link,” both recited in the ’504 and ’211
    patents. For the reasons that follow, we affirm the con-
    struction of “domain name” and reverse the construction
    of “secure communication link.”
    Claim construction is a question of law that we review
    de novo. Lighting Ballast Control LLC v. Philips Elecs. N.
    Am. Corp., 
    744 F.3d 1272
    , 1276–77 (Fed. Cir. 2014) (en
    banc); Cybor Corp. v. FAS Techs., Inc., 
    138 F.3d 1448
    ,
    1456 (Fed. Cir. 1998) (en banc). The process of construing
    a claim term begins with the words of the claims them-
    selves. See Vitronics Corp. v. Conceptronic, Inc., 
    90 F.3d 1576
    , 1582 (Fed. Cir. 1996); Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1312–14 (Fed. Cir. 2005) (en banc). However,
    the claims “must be read in view of the specification, of
    which they are a part.” 
    Phillips, 415 F.3d at 1315
    (quot-
    ing Markman v. Westview Instruments, Inc., 
    52 F.3d 967
    ,
    979 (Fed. Cir. 1995) (en banc), aff’d 
    517 U.S. 370
    (1996)).
    Additionally, the doctrine of claim differentiation disfa-
    8                        VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    vors reading a limitation from a dependent claim into an
    independent claim. See InterDigital Commc’ns, LLC v.
    Int’l Trade Comm’n, 
    690 F.3d 1318
    , 1324 (Fed. Cir. 2012).
    Although courts are permitted to consider extrinsic evi-
    dence like expert testimony, dictionaries, and treatises,
    such evidence is generally of less significance than the
    intrinsic record. 
    Phillips, 415 F.3d at 1317
    (citing C.R.
    Bard, Inc. v. U.S. Surgical Corp., 
    388 F.3d 858
    , 862 (Fed.
    Cir. 2004)).
    A. “Domain Name”
    The district court construed “domain name” as “a
    name corresponding to an IP address.” Memorandum
    Opinion & Order at 16, VirnetX, Inc. v. Cisco Sys. Inc., No.
    6:10-cv-416 (E.D. Tex. Apr. 25, 2012), ECF No. 266
    (“Claim Construction Order”). Apple argues, as it did
    below, that the proper construction is “a hierarchical
    sequence of words in decreasing order of specificity that
    corresponds to a numerical IP address.” Apple insists
    that its construction represents the plain and ordinary
    meaning of the term, relying primarily on a technical
    dictionary definition and several examples in the specifi-
    cation (e.g., “Yahoo.com”). We disagree. Intrinsic evi-
    dence supports the district court’s construction of “domain
    name.” The specification of the ’504 and ’211 patents
    suggests the use of the invention for secure communica-
    tions between application programs like “video conferenc-
    ing, e-mail, word processing programs, telephony, and the
    like.” ’504 patent col. 21 ll. 27–29. The disclosure of such
    applications demonstrates that the inventors did not
    intend to limit “domain name” to the particular format-
    ting limitations of websites sought by Apple, i.e., a top-
    level domain, second-level domain, and host name.
    Additionally, fundamental principles of claim differ-
    entiation disfavor reading Apple’s hierarchical limitation
    into the independent claims. Dependent claims in both
    patents require that “at least one” of the domain names
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                  9
    stored by the system comprise a top-level domain name.
    See, e.g., ’504 patent col. 55 ll. 57–59 (“The system of
    claim 1, wherein at least one of the plurality of domain
    names comprises a top-level domain name.”); ’211 patent
    col. 57 ll. 47–50 (“The non-transitory machine-readable
    medium of claim 36, wherein the instructions comprise
    code for storing the plurality of domain names and corre-
    sponding network addresses including at least one top-
    level domain name.”). The specific limitation of hierar-
    chical formatting in the dependent claims strongly sug-
    gests that the independent claims contemplate domain
    names both with and without the hierarchical format
    exemplified by “Yahoo.com.” See 
    InterDigital, 690 F.3d at 1324
    (“The doctrine of claim differentiation is at its
    strongest . . . ‘where the limitation that is sought to be
    “read into” an independent claim already appears in a
    dependent claim.’” (quoting Liebel-Flarsheim Co. v.
    Medrad, Inc., 
    358 F.3d 898
    , 910 (Fed. Cir. 2004))).
    Such intrinsic evidence is not outweighed by the ex-
    trinsic evidence of one dictionary definition. This is
    particularly true here, where the dictionary definition
    seems to contemplate web addresses on the Internet,
    while the specification makes clear that the claim term in
    question is not so limited. See J.A. 6139–40. Thus, we
    affirm the district court’s construction of the term “do-
    main name” as “a name corresponding to an IP address.”
    B. “Secure Communication Link”
    The district court construed “secure communication
    link” as “a direct communication link that provides data
    security.” Claim Construction Order at 13. Apple argues
    that this term should be construed consistent with “VPN,”
    10                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    which the district court construed to require not only data
    security but also anonymity. 1
    As an initial matter, we note that there is no dispute
    that the word “secure” does not have a plain and ordinary
    meaning in this context, and so must be defined by refer-
    ence to the specification. See Oral Arg. 31:50–32:40,
    available at http://www.cafc.uscourts.gov/oral-argument-
    recordings/13-1489/all (acknowledgement by VirnetX’s
    counsel that construction of “secure” requires considera-
    tion of the specification).
    Moreover, we agree with Apple that, when read in
    light of the entire specification, the term “secure commu-
    nication link” requires anonymity. Indeed, the addition of
    anonymity is presented as one of the primary inventive
    contributions of the patent. For example, the Background
    of the Invention states that “[a] tremendous variety of
    methods have been proposed and implemented to provide
    security and anonymity for communications over the
    Internet.” ’504 patent col. 1 ll. 32–35 (emphasis added).
    It goes on to define these two concepts as counterpart
    safeguards against eavesdropping that could occur while
    two computer terminals communicate over the Internet.
    
    Id. at col.
    1 ll. 38–54. Security in this context refers to
    protection of data itself, to preserve the secrecy of its
    contents, while anonymity refers to preventing an eaves-
    dropper from discovering the identity of a participating
    terminal. 
    Id. at col.
    1 ll. 40–54.
    1 The district court construed VPN to mean “a net-
    work of computers which privately and directly communi-
    cate with each other by encrypting traffic on insecure
    paths between the computers where the communication is
    both secure and anonymous.” Claim Construction Order
    at 8.
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   11
    Having thus framed the problem, the patent (as ex-
    pected) proposes a solution. Specifically, the Summary of
    the Invention begins by explaining how the invention
    improves security by using a “two-layer encryption for-
    mat” known as the Tunneled Agile Routing Protocol, or
    TARP. 
    Id. at col.
    3 ll. 14–17. First, an “inner layer”
    secures the data itself, 
    id. at col.
    4 ll. 5–7, and then a
    second “outer layer” conceals the data’s “true destination,”
    
    id. at col.
    3 ll. 34–35. The fact that the Summary of the
    Invention gives primacy to these attributes strongly
    indicates that the invention requires more than just data
    security. See, e.g., C.R. 
    Bard, 388 F.3d at 864
    (giving
    particular weight to statements in the Summary of the
    Invention because “[s]tatements that describe the inven-
    tion as a whole, rather than statements that describe only
    preferred embodiments, are more likely to support a
    limiting definition of a claim term”).
    Consistent with this emphasis, the Detailed Descrip-
    tion states that “the message payload is embedded behind
    an inner layer of encryption” and “[e]ach TARP packet’s
    true destination is concealed behind an outer layer of
    encryption.” ’504 patent col. 9 ll. 60–61, col. 11 ll. 2–4.
    The concealment requirement appears throughout the
    specification and is implicated in every embodiment
    associated with the “two-layer encryption” or TARP VPN.
    The fact that anonymity is “repeatedly and consistently”
    used to characterize the invention strongly suggests that
    it should be read as part of the claim. See Eon-Net LP v.
    Flagstar Bancorp., 
    653 F.3d 1314
    , 1321–23 (Fed. Cir.
    2011).
    VirnetX attempts to rebut this suggestion by pointing
    to a single place in the specification where a “secure
    communication path” is referred to as providing only
    security, without anonymity. See ’504 patent col. 39 ll.
    24–35. But that disclosure relates to the “conventional
    architecture” of the prior art that suffers precisely be-
    cause it “hamper[s] anonymous communications on the
    12                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    Internet.” 
    Id. at col.
    39 ll. 24, 32–33. And indeed, the
    specification goes on to explain how the invention solves
    that very problem by setting up a VPN, which requires
    anonymity. 
    Id. at col.
    39 ll. 46–62.
    VirnetX also argues that the specification teaches that
    different users have “different needs” such that some
    users need data security while, in other cases, “it may be
    desired” to also have anonymity. Appellee’s Br. 48 (cit-
    ing ’504 patent col. 1 ll. 33–52). Thus, VirnetX insists, the
    TARP protocol (with its requirement of anonymity) is but
    one type of “secure communication link,” and does not
    limit the construction of that term. To be sure, the speci-
    fication mechanically prefaces most passages with the
    phrase “according to one aspect of the present invention.”
    See, e.g., ’504 patent col. 6 l. 36. But the Background and
    Summary of the Invention clearly identify the TARP
    protocol as a key part of the novel solution to the specific
    problem identified in the prior art. Unsurprisingly,
    therefore, VirnetX has not identified even a single embod-
    iment that provides data security but not anonymity.
    Moreover, in several instances the specification ap-
    pears to use the terms “secure communication link” and
    “VPN” interchangeably, suggesting that the inventors
    intended the disputed term to encompass the anonymity
    provided by a VPN. See Nystrom v. Trex Co., 
    424 F.3d 1136
    , 1143 (Fed. Cir. 2005) (“Different terms or phrases in
    separate claims may be construed to cover the same
    subject matter where the written description and prosecu-
    tion history indicate that such a reading of the terms or
    phrases is proper.”). For example, it states that “[w]hen
    software module 3309 is being installed or when the user
    is off-line, the user can optionally specify that all commu-
    nication links established over computer network 3302
    are secure communication links. Thus, anytime that a
    communication link is established, the link is a VPN
    link.” ’504 patent col. 52 ll. 15–19 (emphases added).
    Similarly, in the very next paragraph the specification
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                  13
    states that “a user at computer 3301 can optionally select
    a secure communication link through proxy computer
    3315. Accordingly, computer 3301 can establish a VPN
    communication link 3323 with secure server computer
    3320 through proxy computer 3315.” 
    Id. at col.
    52 ll. 25–
    29 (emphases added). In both of these instances, the
    specification equates the term “secure communication
    link” with a “VPN.” The only counter-example VirnetX
    can point to is an instance where the specification states,
    in relation to one aspect of the invention, that “[t]he
    secure communication link is a virtual private network
    communication link over the computer network.” 
    Id. at col.
    6 ll. 61–63. But equating the two terms with respect
    to one aspect of the present invention is a far cry from
    expressly divorcing those terms elsewhere, particularly in
    the absence of any embodiment or disclosure that does so.
    Thus, we reverse the district court’s claim construc-
    tion and conclude that the term “secure communication
    link” as used in the ’504 and ’211 patents requires ano-
    nymity. Accordingly, the term should be construed as “a
    direct communication link that provides data security and
    anonymity.”
    II. Infringement
    We review the denial of a motion for JMOL or a new
    trial under the law of the regional circuit. Verizon Servs.
    Corp. v. Cox Fibernet Va., Inc., 
    602 F.3d 1325
    , 1331 (Fed.
    Cir. 2010). The Fifth Circuit requires that a jury’s deter-
    mination must be upheld if it is supported by substantial
    evidence. ClearValue, Inc. v. Pearl River Polymers, Inc.,
    
    668 F.3d 1340
    , 1343 (Fed. Cir. 2012) (citing Med. Care
    Am., Inc. v. Nat’l Union Fire Ins. Co., 
    341 F.3d 415
    , 420
    (5th Cir. 2003)).
    A. ’504 and ’211 Patents
    Apple argues that there was not substantial evidence
    to support the jury’s verdict that its FaceTime servers
    14                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    infringe the asserted claims of the ’504 and ’211 patents.
    Apple insists that FaceTime does not infringe the “secure
    communication link” claim term for two reasons: first,
    because when properly construed it requires anonymity,
    which the FaceTime servers do not provide, and second,
    because they do not provide “direct” communication, as
    required by the district court’s claim construction.
    With respect to the first argument, we have now
    construed the disputed claim term so as to require ano-
    nymity. See supra at 13. However, the jury was not
    presented with the question of whether FaceTime infring-
    es the asserted claims under a construction requiring
    anonymity. Thus, we remand for further proceedings to
    determine whether Apple’s FaceTime servers provide
    anonymity.
    With respect to the second argument, Apple argues
    that FaceTime servers do not provide “direct” communica-
    tion because the communications are addressed to a NAT,
    rather than to the receiving device. Appellant’s Br. 43.
    The district court concluded that there was substantial
    evidence to support the jury’s finding that the NAT rout-
    ers used by FaceTime do not impede direct communica-
    tion, 
    VirnetX, 925 F. Supp. 2d at 831
    , and we agree. As
    the district court noted, VirnetX’s expert testified that the
    NAT routers still allow for “end-to-end communication
    between the two devices,” J.A. 1565, because they merely
    translate addresses from the public address space to the
    private address space, but do not terminate the connec-
    tion. J.A. 1465, 1536–37. Even Apple’s expert admitted
    that the connection does not stop at the NAT routers.
    J.A. 1984.
    Apple argues that this testimony cannot support a
    finding of infringement because it is inconsistent with the
    court’s claim construction that required “direct addressa-
    bility.” Appellant’s Br. 43–45. But the district court
    considered this argument and disagreed, noting that its
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   15
    claim construction expressly provided that “routers,
    firewalls, and similar servers . . . do not impede ‘direct’
    communication,” and VirnetX presented evidence that
    NATs operate like routers or firewalls. VirnetX, 925 F.
    Supp. 2d at 831.
    Thus, we do not think the district court erred in find-
    ing that there was substantial evidence on which the jury
    could have relied to reach its finding of infringement on
    this element.
    B. ’135 and ’151 Patents
    Apple also argues that there was not substantial
    evidence to support the jury’s verdict that its VPN On
    Demand product infringed the asserted claims of the ’135
    and ’151 patents for several reasons, discussed in turn
    below.
    1. “Determining Whether”
    Apple argues that its VPN On Demand feature does
    not infringe the asserted claims of the ’135 and ’151
    patents because it does not “determine whether” a re-
    quested domain name is a secure website or server.
    Instead, Apple insists that it merely determines whether
    the requested website is listed in the user-created “con-
    figuration file” and initiates a VPN connection for any
    domain name on that list, regardless of whether or not it
    is secure. In response, VirnetX argues that there was
    substantial evidence demonstrating that the VPN On
    Demand system is designed and intended to be used only
    for accessing secure private networks. We agree with
    VirnetX.
    Here, the evidence presented at trial supports the
    conclusion that Apple’s VPN On Demand product infring-
    es the asserted claim limitation in its normal configura-
    tion. In particular, VirnetX’s expert testified that Apple’s
    technical design documents and internal technical presen-
    tations relating to the VPN On Demand system (many of
    16                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    which are confidential and cannot be quoted here) make
    clear that a VPN connection should only be established
    for private web addresses. Thus, regardless of whether a
    user could misconfigure the list by entering public domain
    names, Apple’s planning documents, internal emails, and
    presentations all explained that VPN On Demand’s
    primary use is to connect users to secure sites using a
    VPN. That is all that is required. See Hilgraeve Corp. v.
    Symantec Corp., 
    265 F.3d 1336
    , 1343 (Fed. Cir. 2001).
    Moreover, this description of the VPN On Demand
    feature is consistent with how the claimed functionality is
    described in the specification. For example, in one embod-
    iment, the DNS proxy determines whether a request is for
    a secure site by checking the domain name against a table
    or list of domain names. ’135 patent col. 38 ll. 23–30. In
    other words, the proxy identifies a request for “access to a
    secure site . . . by reference to an internal table of such
    sites.” 
    Id. That is
    precisely how the VPN On Demand
    feature operates.
    We therefore conclude that the jury’s finding that the
    VPN On Demand product infringes the “determining
    whether” limitation was supported by substantial evi-
    dence.
    2. “Between”
    a. Literal Infringement of Claim 1 of the ’135 Patent and
    Claim 13 of the ’151 Patent
    Claim 1 of the ’135 patent requires creating a “VPN”
    “between” the client and a target computer. ’135 patent
    col. 47 ll. 20–22. Similarly, claim 13 of the ’151 patent
    requires creating a “secure channel” “between” the client
    and the secure server. ’151 patent col. 48 ll. 28–29. For
    both claims, the district court construed “between” to
    mean “extending from” the client to the target computer.
    Claim Construction Order at 26.
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                     17
    Apple argues that its VPN On Demand product fails
    to meet this limitation because it only secures communi-
    cations between the iPhone and the VPN server, but not
    between the VPN server and the target computer. Vir-
    netX responds that Apple’s product is intended to be used
    with private networks, which are generally configured to
    be both secure and anonymous. In other words, VirnetX
    argues that the secure channel between the VPN server
    and the target computer is provided by the target com-
    puter itself. After considering the record as a whole, we
    conclude that there was substantial evidence to support
    the jury’s verdict of infringement on this limitation.
    At trial, VirnetX presented evidence and testimony to
    the jury that “the virtual private network extend[s] from
    the client computer to the target computer . . . because it’s
    encrypted on the insecure paths, and it’s secure within
    the corporate network.” J.A. 1400–01. VirnetX’s expert
    testified that one of ordinary skill would understand that
    the path extending from the VPN server to the target
    computer, i.e., within the private network, would be
    secure and anonymous owing to protection provided by
    the private network. J.A. 1080 (“That network is secure,
    because it’s been physically secured; and it also has
    what’s called a firewall between its network and the
    public network. So it keeps the bad guys out.”); J.A. 1379
    (“If that’s a private network of the company that they’ve
    set up behind a VPN server, the company would have
    configured that to be secure.”); J.A. 1396 (“[T]hese are . . .
    private networks that are not to be accessed by others.
    They require authorization for access.”). The jury also
    heard testimony that while in some situations traffic
    could be unsecured behind the VPN server, J.A. 1997–98,
    this scenario would be “atypical.” J.A. 1992–93. For
    example, VirnetX presented evidence to the jury that
    Apple itself advertised that VPN On Demand is designed
    to connect with “private corporate networks” and “works
    with a variety of authentication methods.” J.A. 20001.
    18                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    And, more to the point, the jury heard that the “private
    corporate networks” to which VPN On Demand is intend-
    ed to connect employ security measures including VPN
    servers, VPN authentication servers, proxy servers, and
    firewalls which regulate access to private resources and
    prevent unauthorized users from breaching. J.A. 1080,
    1379, 1401.
    Apple argues that this finding of infringement neces-
    sarily rests on a series of “assumptions” about how all
    private networks operate in order to conclude that VPN
    On Demand is “typically” configured to operate in the
    manner accused of infringement. Appellant’s Br. 30–31.
    However, VirnetX’s expert relied on Apple’s own internal
    technical documentation, product specifications, and
    marketing presentations, several of which describe specif-
    ic security measures used by the private networks to
    which VPN On Demand is intended to connect. This
    evidence demonstrates not only that VPN On Demand
    may be configured to interact with private networks, but
    that this was apparently Apple’s primary objective. Apple
    would have VirnetX prove that VPN On Demand has no
    non-infringing modes of operation. But, as noted above,
    VirnetX bears no such burden. See supra at 15–16; see
    also z4 Techs., Inc. v. Microsoft Corp., 
    507 F.3d 1340
    , 1350
    (Fed. Cir. 2007) (“[I]nfringement is not avoided merely
    because a non-infringing mode of operation is possible.”).
    We cannot agree that the jury’s finding lacks substantial
    evidence because VirnetX did not specifically disprove
    that VPN On Demand can, in atypical situations, estab-
    lish a VPN with insecure networks.
    Apple also responds that this evidence is insufficient
    because VirnetX’s expert testified that VPN On Demand
    only encrypts communications between the iPhone and
    the VPN server—by implication leaving the path from the
    VPN server to the target unencrypted. Appellant’s Br. 29
    (quoting J.A. 1392). However, the district court’s con-
    struction of “VPN” does not require that traffic on a
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   19
    secure path be encrypted. Rather, the construction only
    requires encryption of traffic “on insecure paths.” Claim
    Construction Order at 8. Moreover, as indicated by
    the ’135 patent, encryption is just one possible way to
    address data security. ’135 patent col. 1 ll. 38–39 (“Data
    security is usually tackled using some form of data en-
    cryption.” (emphasis added)).      And VirnetX provided
    substantial evidence for the jury to conclude that paths
    beyond the VPN server may be rendered secure and
    anonymous by means of “physical security” present in the
    private corporate networks connected to by VPN On
    Demand. See, e.g., J.A. 1401.
    Accordingly, we conclude that the jury’s finding that
    the VPN On Demand feature creates a “VPN” or a “secure
    channel” that extends from the client to the target com-
    puter was supported by substantial evidence. We there-
    fore affirm the district court’s denial of JMOL as to claim
    1 of the ’135 patent and claim 13 of the ’151 patent.
    b. Infringement of Claim 1 of the ’151 Patent Under the
    Doctrine of Equivalents
    Claim 1 of the ’151 patent is similar to claim 13 except
    that it requires initiating an “encrypted channel”—rather
    than a “secure channel”—“between” the client and the
    secure server. ’151 patent col. 46 ll. 66–67. With respect
    to infringement, VirnetX conceded that VPN On Demand
    does not literally practice this limitation because the
    private network between the VPN server and the target is
    “not necessarily encrypted” from end to end. J.A. 1420–
    21. Rather, VirnetX asserted that VPN On Demand
    infringes under the doctrine of equivalents because the
    difference between secure communication via encryption
    and secure communication in general is insubstantial.
    J.A. 1421–24. Apple argues that VirnetX’s theory of
    equivalents is legally insufficient because it vitiates the
    “encrypted channel” element. Appellant’s Br. 32–33.
    20                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    To find infringement under the doctrine of equiva-
    lents, any differences between the claimed invention and
    the accused product must be insubstantial. See Graver
    Tank & Mfg. Co. v. Linde Air Prods. Co., 
    339 U.S. 605
    ,
    608 (1950).     Insubstantiality may be determined by
    whether the accused device performs substantially the
    same function in substantially the same way to obtain
    substantially the same result as the claim limitation.
    Crown Packaging Tech., Inc. v. Rexam Beverage Can Co.,
    
    559 F.3d 1308
    , 1312 (Fed. Cir. 2009). This is a question of
    fact. Anchor Wall Sys., Inc. v. Rockwood Retaining Walls,
    Inc., 
    340 F.3d 1298
    , 1313 (Fed. Cir. 2003). Vitiation is not
    an exception to the doctrine of equivalents. Deere & Co. v.
    Bush Hog, LLC, 
    703 F.3d 1349
    , 1356 (Fed. Cir. 2012).
    Rather, it is a legal determination that “the evidence is
    such that no reasonable jury could determine two ele-
    ments to be equivalent.” 
    Id. (citation omitted).
        After considering the record as a whole, we conclude
    that the evidence presented at trial does not support the
    jury’s finding of infringement under the doctrine of equiv-
    alents. VirnetX’s expert testified that VPN On Demand
    (a) performs substantially the same function because it
    secures the communication between the client and the
    secure server, (b) does so in substantially the same way
    by protecting data through encryption on insecure paths
    that are vulnerable to eavesdroppers, and (c) achieves
    substantially the same result of successfully protecting
    the entire communication path from potential eavesdrop-
    pers. See J.A. 1424.
    Notably, in explaining the “way” that VPN On De-
    mand secures communications, the expert did not testify
    that VPN On Demand provides encryption on the alleged-
    ly secure pathway between the VPN server and the pri-
    vate network, but only on the insecure portion of the
    pathway. Thus, his testimony effectively equates the
    “security” of the private network with the “encryption”
    provided by the VPN server. But the patent consistently
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   21
    differentiates between “security” and “encryption.” Both
    the claims and the specification of the ’151 patent make
    clear that encryption is a narrower, more specific re-
    quirement than security. For example, the specification
    states that encryption is just one possible way to address
    data security. ’151 patent col. 1 ll. 49–50 (“Data security
    is usually tackled using some form of data encryption.”
    (emphasis added)). Additionally, one of the primary
    differences between the steps performed in claim 1 of
    the ’151 patent and the steps performed in claim 13 is
    that claim 13 requires creating a “secure” channel, while
    claim 1 specifically requires that the channel be “encrypt-
    ed.”
    In light of these distinctions in the patent itself, the
    jury’s implicit finding that VPN On Demand achieves the
    result of protecting communications from eavesdropping
    in “substantially the same way” as contemplated by the
    “encrypted channel” claim limitation was not supported
    by VirnetX’s expert’s testimony. See Crown 
    Packaging, 559 F.3d at 1312
    . No reasonable jury could have deter-
    mined that the security provided by the VPN On Demand
    system—which includes encryption on the insecure paths
    but otherwise relies on the security provided by private
    networks—is equivalent to the “encrypted channel”
    required by claim 1 of the ’151 patent. The district court’s
    denial of JMOL as to that claim must therefore be re-
    versed.
    III. Invalidity
    A party challenging the validity of a patent must es-
    tablish invalidity by clear and convincing evidence. See
    Microsoft Corp. v. i4i Ltd. P’ship, 
    131 S. Ct. 2238
    , 2242
    (2011). Anticipation is a factual question that we review
    for substantial evidence. SynQor, Inc. v. Artesyn Techs.,
    Inc., 
    709 F.3d 1365
    , 1373 (Fed. Cir. 2013). A claim is
    anticipated only if each and every element is found within
    a single prior art reference, arranged as claimed. See
    22                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    NetMoneyIN, Inc. v. VeriSign, Inc., 
    545 F.3d 1359
    , 1369
    (Fed. Cir. 2008).
    Apple argues that the asserted claims are anticipated
    by the Kiuchi reference. However, we conclude that the
    jury heard substantial evidence that at least one element
    of each asserted claim was missing from that reference.
    With respect to the ’135, ’504, and ’211 patents, the jury
    heard evidence that Kiuchi’s proxy servers at least do not
    teach “direct communication” between a client and target
    computer, which is sufficient to defeat a claim of anticipa-
    tion. J.A. 2343–44. Specifically, the jury heard expert
    testimony that Kiuchi’s client-side and server-side proxies
    terminate the connection, process information, and create
    a new connection—actions that are not “direct” within the
    meaning of the asserted claims. J.A. 2334–35. VirnetX
    distinguished such proxy activities from the operation of
    NAT routers which—unlike proxy servers in the prior
    art—do not terminate the connection.
    Additionally, with respect to the ’151 patent, there
    was substantial evidence to support VirnetX’s argument
    that Kiuchi fails to disclose the requirement that the DNS
    request be “sent by a client.” ’151 patent col. 46 l. 57.
    Apple argued that the “client-side proxy” of Kiuchi meets
    the “client” limitation, but there was evidence that the
    “client” of Kiuchi is actually a web browser, a component
    that is distinguishable from the client-side proxy. See
    J.A. 2341. Thus, the district court did not err in denying
    Apple’s JMOL motion with respect to invalidity.
    IV. Exclusion of Evidence
    At trial, to prove induced infringement, VirnetX at-
    tempted to show that Apple knew or was willfully blind to
    the fact that its customers’ use of its products would
    infringe valid patent claims. In defense, Apple sought to
    inform the jury that, after learning of VirnetX’s allega-
    tions, Apple initiated reexaminations against the asserted
    patents. Apple’s requests for reexamination resulted in
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                     23
    initial rejections of the asserted claims at the United
    States Patent and Trademark Office (“PTO”). Apple
    offered these rejections as evidence of Apple’s reasonably-
    held belief that the patents were invalid. The district
    court, however, excluded this proffer, concluding that
    such non-final actions in pending reexaminations would
    be “highly prejudicial evidence that risks misleading the
    jury.” 
    VirnetX, 925 F. Supp. at 842
    .
    We apply regional circuit law to evidentiary issues.
    The Fifth Circuit reviews a district court’s exclusion of
    evidence under Federal Rule of Evidence 403 for “clear
    abuse of discretion” resulting in substantial prejudice.
    Wellogix, Inc. v. Accenture, L.L.P., 
    716 F.3d 867
    , 882 (5th
    Cir. 2013). In this case, we cannot say that the district
    court abused its discretion in excluding this evidence.
    Apple asserts that the rejections are relevant because
    they establish its good faith belief that the asserted
    claims are invalid, thereby negating the requisite intent
    for inducement. Appellant’s Br. 50 (citing Commil USA,
    LLC v. Cisco Sys., Inc., 
    720 F.3d 1361
    , 1368–69 (Fed. Cir.
    2013)). As an initial matter, we note that this court’s
    precedent has often warned of the limited value of actions
    by the PTO when used for such purposes. See, e.g.,
    Hoechst Celanese Corp. v. BP Chems. Ltd., 
    78 F.3d 1575
    ,
    1584 (Fed. Cir. 1996) (“[G]rant by the examiner of a
    request for reexamination is not probative of unpatenta-
    bility.”); Acoustical Design, Inc. v. Control Elecs. Co., 
    932 F.2d 939
    , 942 (Fed. Cir. 1991) (“[I]nitial rejection by the
    [PTO] . . . hardly justifies a good faith belief in the inva-
    lidity of the claims.”). However, in this case we need not
    decide whether our opinion in Commil justifies reliance
    on reexamination evidence to establish a good faith belief
    of invalidity. Instead, we conclude that, regardless of the
    evidence’s relevance to a fact at issue at trial, the district
    court would still not have abused its discretion in finding
    that the probative value was substantially outweighed by
    the risk of unfair prejudice to the patentee, confusion with
    24                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    invalidity (on the merits), or misleading the jury, thereby
    justifying exclusion under Federal Rule of Evidence 403.
    See, e.g., 
    SynQor, 709 F.3d at 1380
    (finding no abuse of
    discretion for excluding non-final reexamination evidence
    as being “confusing and more prejudicial than probative”);
    Callaway Golf Co. v. Acushnet Co., 
    576 F.3d 1331
    , 1342–
    43 (Fed. Cir. 2009) (finding the probative value of a co-
    pending reexamination marginal and the effect likely to
    be highly prejudicial). Thus, we affirm the district court’s
    exclusion of this evidence.
    V. Damages
    At trial, VirnetX’s damages expert, Mr. Roy Wein-
    stein, provided three reasonable royalty theories, which
    the district court admitted over Apple’s challenges under
    Daubert v. Merrell Dow Pharmaceuticals, Inc., 
    509 U.S. 579
    (1993).
    Weinstein’s first approach began with the lowest sale
    price of each model of the accused iOS devices containing
    the accused features. J.A. 1616–23. Weinstein then
    applied a 1% royalty rate to the base, derived from a
    VirnetX policy of seeking to license its patents for at least
    1–2% of the entire value of products sold and several
    allegedly comparable licenses. J.A. 1595, 1613–14. This
    theory yielded a $708 million demand, consisting of $566
    million for products including both FaceTime and VPN
    On Demand, and $142 million for those including only
    VPN On Demand. J.A. 1622–24, 1644.
    Weinstein also offered a second damages theory, re-
    garding FaceTime alone, relying on a mathematical
    theorem proved by John Nash, a mathematician who
    proved a number of results in game theory that have
    become important in economics and other fields. J.A.
    1628–29. Nash was a co-winner of the 1994 Nobel Prize
    in Economics for some of this work, though not the theo-
    rem at issue here—published as “The Bargaining Prob-
    lem” in 18 Econometrica 155–62 (Apr. 1950). Like other
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                  25
    mathematical theorems, this theorem states a number of
    premises and establishes a conclusion that follows from
    those premises. In particular, under the conditions stated
    in the premises, where two persons bargain over a matter,
    there is a “solution” to the negotiation problem satisfying
    stated conditions on a desirable result (bargain). That
    solution—in which “each bargainer get[s] the same money
    profit,” 
    id. at 162—has
    come to be called the Nash Bar-
    gaining Solution.
    Weinstein, invoking the Nash Bargaining Solution,
    testified that “the parties [would have] split between
    themselves the incremental or additional profits that are
    associated with the use of the patented technology.” J.A.
    1630. Weinstein derived the profits associated with
    FaceTime from the revenue generated by the addition of a
    “front-facing” camera on Apple’s mobile devices. Without
    examining the applicability to this case of all the precon-
    ditions for the Nash Bargaining Solution, he invoked the
    Solution as suggesting a 50/50 split of those profits, and
    then modified that result by 10%, explaining that VirnetX
    would have received only 45% of the profit because of its
    weaker bargaining position, leaving 55% for Apple. J.A.
    1633, 1709. This calculation amounted to $588 million in
    damages for infringement by FaceTime. J.A. 1633–38.
    Finally, Weinstein offered yet another theory for
    FaceTime, again relying on the Nash Bargaining Solu-
    tion. This time, he claimed that FaceTime “drove sales”
    for Apple iOS products. J.A. 1639. Weinstein extrapolat-
    ed from a customer survey to assert that 18% of all iOS
    device sales would not have occurred without the addition
    of FaceTime. J.A. 1641. From that figure, he determined
    the amount of Apple’s profits that he believed were at-
    tributable to the FaceTime feature, and apportioned 45%
    of the profits to VirnetX, consistent with his previous
    application of the Nash theory. Using this approach,
    Weinstein arrived at damages of $5.13 per unit, totaling
    $606 million in damages for FaceTime. J.A. 1643.
    26                        VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    Ultimately, the jury awarded VirnetX $368 million in
    damages. Apple now challenges each of Weinstein’s
    damages theories, as well as the district court’s jury
    instruction on damages. For the reasons stated below, we
    vacate the jury’s damages award and remand for further
    proceedings consistent with this opinion.
    A. Jury Instruction
    Upon a finding of infringement, “the court shall award
    the claimant damages adequate to compensate for the
    infringement, but in no event less than a reasonable
    royalty for the use made of the invention by the infring-
    er.” 35 U.S.C. § 284. The most common method for
    determining a reasonable royalty is the hypothetical
    negotiation approach, which “attempts to ascertain the
    royalty upon which the parties would have agreed had
    they successfully negotiated an agreement just before
    infringement began.” Lucent Techs., Inc. v. Gateway, Inc.,
    
    580 F.3d 1301
    , 1324 (Fed. Cir. 2009). A reasonable royal-
    ty may be a lump-sum payment not calculated on a per-
    unit basis, but it may also be, and often is, a running
    payment that varies with the number of infringing units.
    In that event, it generally has two prongs: a royalty base
    and a royalty rate.
    No matter what the form of the royalty, a patentee
    must take care to seek only those damages attributable to
    the infringing features. Indeed, the Supreme Court long
    ago observed that a patentee
    must in every case give evidence tending to sepa-
    rate or apportion the defendant’s profits and the
    patentee’s damages between the patented feature
    and the unpatented features, and such evidence
    must be reliable and tangible, and not conjectural
    or speculative; or he must show, by equally relia-
    ble and satisfactory evidence, that the profits and
    damages are to be calculated on the whole ma-
    chine, for the reason that the entire value of the
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                     27
    whole machine, as a marketable article, is proper-
    ly and legally attributable to the patented feature.
    Garretson v. Clark, 
    111 U.S. 120
    , 121 (1884).
    Thus, when claims are drawn to an individual compo-
    nent of a multi-component product, it is the exception, not
    the rule, that damages may be based upon the value of
    the multi-component product. LaserDynamics, Inc. v.
    Quanta Computer, Inc., 
    694 F.3d 51
    , 67–68 (Fed. Cir.
    2012). Indeed, we recently reaffirmed that “[a] patentee
    may assess damages based on the entire market value of
    the accused product only where the patented feature
    creates the basis for customer demand or substantially
    creates the value of the component parts.” Versata Soft-
    ware, Inc. v. SAP Am., Inc., 
    717 F.3d 1255
    , 1268 (Fed. Cir.
    2013) (emphasis added) (quoting 
    SynQor, 709 F.3d at 1383
    ). In the absence of such a showing, principles of
    apportionment apply.
    These strict requirements limiting the entire market
    value exception ensure that a reasonable royalty “does not
    overreach and encompass components not covered by the
    patent.” 
    LaserDynamics, 694 F.3d at 70
    ; see also Garret-
    
    son, 111 U.S. at 121
    (“[T]he patentee must show in what
    particulars his improvement has added to the usefulness
    of the machine or contrivance.”). Thus, “[i]t is not enough
    to merely show that the [patented feature] is viewed as
    valuable, important, or even essential to the use of the
    [overall product].”   
    LaserDynamics, 694 F.3d at 68
    .
    Instead, this court has consistently held that “a reasona-
    ble royalty analysis requires a court to . . . carefully tie
    proof of damages to the claimed invention’s footprint in
    the market place.” ResQNet.com, Inc. v. Lansa, Inc., 
    594 F.3d 860
    , 869 (Fed. Cir. 2010); see also Cornell Univ. v.
    Hewlett-Packard Co., 
    609 F. Supp. 2d 279
    , 285 (N.D.N.Y.
    2009) (“The entire market value rule indeed permits
    damages on technology beyond the scope of the claimed
    invention, but only upon proof that damages on the un-
    28                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    patented components or technology is necessary to fully
    compensate for infringement of the patented invention.”).
    Additionally, we have also cautioned against reliance on
    the entire market value of the accused products because it
    “cannot help but skew the damages horizon for the jury,
    regardless of the contribution of the patented component
    to this revenue.” Uniloc USA, Inc. v. Microsoft Corp., 
    632 F.3d 1292
    , 1320 (Fed. Cir. 2011).
    Apple argues that the district court misstated this law
    on the entire market value rule in its jury instruction.
    The district court instructed the jury as follows:
    In determining a royalty base, you should not use
    the value of the entire apparatus or product un-
    less either: (1) the patented feature creates the
    basis for the customers’ demand for the product,
    or the patented feature substantially creates the
    value of the other component parts of the product;
    or (2) the product in question constitutes the
    smallest saleable unit containing the patented
    feature.
    J.A. 2515–16. Apple argues that this instruction inappro-
    priately created a second exception that would allow a
    patentee to rely on the entire market value of a multi-
    component product so long as that product is the smallest
    salable unit containing the patented feature.
    We agree with Apple that the district court’s instruc-
    tion misstates our law. To be sure, we have previously
    permitted patentees to base royalties on the “smallest
    salable patent-practicing unit.” 
    LaserDynamics, 694 F.3d at 67
    . However, the instruction mistakenly suggests that
    when the smallest salable unit is used as the royalty base,
    there is necessarily no further constraint on the selection
    of the base. That is wrong. For one thing, the fundamen-
    tal concern about skewing the damages horizon—of using
    a base that misleadingly suggests an inappropriate
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                  29
    range—does not disappear simply because the smallest
    salable unit is used.
    Moreover, the smallest salable unit approach was in-
    tended to produce a royalty base much more closely tied
    to the claimed invention than the entire market value of
    the accused products. Indeed, that language first arose in
    the Cornell case, where the district court noted that,
    rather than pursuing a “royalty base claim encompassing
    a product with significant non-infringing components,”
    the patentee should have based its damages on “the
    smallest salable infringing unit with close relation to the
    claimed 
    invention.” 609 F. Supp. 2d at 287
    –88 (emphasis
    added). In other words, the requirement that a patentee
    identify damages associated with the smallest salable
    patent-practicing unit is simply a step toward meeting the
    requirement of apportionment.         Where the smallest
    salable unit is, in fact, a multi-component product con-
    taining several non-infringing features with no relation to
    the patented feature (as VirnetX claims it was here), the
    patentee must do more to estimate what portion of the
    value of that product is attributable to the patented
    technology. To hold otherwise would permit the entire
    market value exception to swallow the rule of apportion-
    ment. 2
    In reaching this conclusion, we are cognizant of the
    difficulty that patentees may face in assigning value to a
    feature that may not have ever been individually sold.
    However, we note that we have never required absolute
    precision in this task; on the contrary, it is well-
    understood that this process may involve some degree of
    2   As, indeed, it did in this case, where VirnetX ef-
    fectively relied on the entire market value of the iOS
    devices without showing that the patented features drove
    demand for those devices, simply by asserting that they
    were the smallest salable units.
    30                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    approximation and uncertainty. See generally Unisplay,
    S.A. v. Am. Elec. Sign Co., 
    69 F.3d 512
    , 517 (Fed. Cir.
    1995).
    We conclude that the district court’s jury instruction
    regarding the entire market value rule was legally erro-
    neous. Moreover, that error cannot be considered harm-
    less, as VirnetX’s expert relied on the entire value of the
    iOS devices as the “smallest salable units,” without at-
    tempting to apportion the value attributable to the VPN
    On Demand and FaceTime features. Thus, it is clear that
    the jury’s verdict was tainted by the erroneous jury in-
    struction.
    B. Weinstein’s First Approach: Royalty Base
    In addition to the erroneous jury instruction, Apple
    argues that the testimony of VirnetX’s expert on the
    proper royalty base should have been excluded because it
    relied on the entire market value of Apple’s products
    without demonstrating that the patented features drove
    the demand for those products. For similar reasons to
    those stated above, we agree.
    The admissibility of expert testimony is governed by
    the Federal Rules of Evidence and the principles laid out
    in Daubert v. Merrell Dow Pharmaceuticals, Inc., 
    509 U.S. 579
    (1993). The district court’s “gatekeeping obligation”
    applies to all types of expert testimony. Kumho Tire Co.
    v. Carmichael, 
    526 U.S. 137
    , 147 (1999). While questions
    regarding which facts are most relevant for calculating a
    reasonable royalty are properly left to the jury, a critical
    prerequisite is that the underlying methodology be sound.
    Here, it was not, and the district court should have exer-
    cised its gatekeeping authority to ensure that only theo-
    ries comporting with settled principles of apportionment
    were allowed to reach the jury.
    Under Weinstein’s first damages theory, he undisput-
    edly based his calculations on the entire cost of the iOS
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   31
    devices, ranging in value from $199 for the iPod Touch to
    $649 for the iPhone 4S. Weinstein used the base price at
    which each product was sold, excluding only charges for
    additional memory sold separately. He called this the
    smallest salable unit. However, when asked whether this
    “remove[d] features that aren’t accused in this case,”
    Weinstein answered as follows:
    To the extent that the products that we’re talking
    about here contain additional features, like addi-
    tional memory, for instance, that Apple was charg-
    ing for, by using the lowest saleable unit, I’m
    doing as much as I can to remove payments for
    those features . . . .
    J.A. 1620 (emphasis added). This testimony confirms that
    Weinstein did not even attempt to subtract any other
    unpatented elements from the base, which therefore
    included various features indisputably not claimed by
    VirnetX, e.g., touchscreen, camera, processor, speaker,
    and microphone, to name but a few. J.A. 1143–44.
    VirnetX defends Weinstein’s approach by insisting
    that “software creates the largest share of the product’s
    value” for these popular iOS products. Appellee’s Br. 60.
    But this misses the point. Whether “viewed as valuable,
    important, or even essential,” the patented feature must
    be separated. 
    LaserDynamics, 694 F.3d at 68
    . Weinstein
    made no attempt to separate software from hardware,
    much less to separate the FaceTime software from other
    valuable software components.
    Indeed, the record supports Apple’s contention that
    Weinstein could have apportioned a smaller per unit
    figure for FaceTime; namely, for the use of FaceTime on
    Mac computers he used a royalty base of $29—the cost of
    the software upgrade. J.A. 1619. And he used an even
    lower estimate to represent the patentable contributions
    to iOS devices in his application of the Nash Bargaining
    Solution, calculating incremental revenues due to
    32                        VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    FaceTime at $15 per iOS device. J.A. 1634–36. The only
    reason Weinstein gave for not using the $29 as the base
    for other iOS products was that Apple does not actually
    charge separately for FaceTime on those devices. J.A.
    1673–74. But, as explained above, a patentee’s obligation
    to apportion damages only to the patented features does
    not end with the identification of the smallest salable unit
    if that unit still contains significant unpatented features. 3
    Thus, VirnetX cannot simply hide behind Apple’s
    sales model to avoid the task of apportionment. This
    court rejects the excuse that “practical and economic
    necessity compelled [the patentee] to base its royalty on
    the price of an entire [device].” 
    LaserDynamics, 694 F.3d at 69
    . There is no “necessity-based exception to the entire
    market value rule.” 
    Id. at 70.
    On the contrary, a patent-
    ee must be reasonable (though may be approximate) when
    seeking to identify a patent-practicing unit, tangible or
    intangible, with a close relation to the patented feature.
    In the end, VirnetX should have identified a patent-
    practicing feature with a sufficiently close relation to the
    claimed functionality. The law requires patentees to
    apportion the royalty down to a reasonable estimate of the
    value of its claimed technology, or else establish that its
    patented technology drove demand for the entire product.
    VirnetX did neither. As we noted in LaserDynamics:
    Whether called “product value apportionment” or
    anything else, the fact remains that the royalty
    was expressly calculated as a percentage of the
    entire market value of a [multi-component prod-
    3  Because Apple has not challenged it, we offer no
    opinion on whether the $29 software upgrade is itself so
    closely related to the patented feature that VirnetX may
    rely on its entire value in determining the proper royalty
    base for the FaceTime feature.
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                     33
    uct] rather than a patent-practicing [component]
    alone. This, by definition, is an application of the
    entire market value rule.
    
    Id. at 68.
    In calculating the royalty base, Weinstein did
    not even try to link demand for the accused device to the
    patented feature, and failed to apportion value between
    the patented features and the vast number of non-
    patented features contained in the accused products.
    Because Weinstein did not “carefully tie proof of damages
    to the claimed invention’s footprint in the market place,”
    
    Uniloc, 632 F.3d at 1317
    (quoting 
    ResQNet, 594 F.3d at 869
    ), his testimony on the royalty base under this ap-
    proach was inadmissible and should have been excluded.
    C. Weinstein’s First Approach: Royalty Rate
    In addition to challenging Weinstein’s testimony with
    respect to the royalty base, Apple argues that his testi-
    mony with respect to the royalty rate should also have
    been excluded.
    After determining the royalty base, Weinstein applied
    a 1% royalty rate, based on six allegedly comparable
    licenses, as well as his understanding that VirnetX had a
    “policy” of licensing its patents for 1–2%. Apple argues
    that the licenses on which Weinstein relied were not
    sufficiently comparable to the license that would have
    resulted from the hypothetical negotiation. In particular,
    Apple points out that two of the licenses predated the
    patents-in-suit. Both of those agreements related to
    technology leading to the claimed invention, and one
    contained a software license in addition to a license for
    various patent applications. Apple further complains that
    three of the other licenses were entered into in 2012, a full
    three years after the date of the “hypothetical negotia-
    tion,” set in June 2009. Apple argues that at the time
    those licenses were entered into, VirnetX was in a much
    better financial position (and therefore a better bargain-
    ing position) than it was in 2009. Finally, Apple notes
    34                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    that the sixth license covered sixty-eight VirnetX patents,
    and was therefore much broader than the license to four
    patents Apple would be seeking in the hypothetical nego-
    tiation. It also equated to a 0.24% royalty rate, which is
    significantly lower than the 1–2% rate Weinstein testified
    VirnetX would accept.
    We have held that in attempting to establish a rea-
    sonable royalty, the “licenses relied on by the patentee in
    proving damages [must be] sufficiently comparable to the
    hypothetical license at issue in suit.” 
    Lucent, 580 F.3d at 1325
    . “When relying on licenses to prove a reasonable
    royalty, alleging a loose or vague comparability between
    different technologies or licenses does not suffice.” La-
    
    serDynamics, 694 F.3d at 79
    . However, we have never
    required identity of circumstances; on the contrary, we
    have long acknowledged that “any reasonable royalty
    analysis ‘necessarily involves an element of approxima-
    tion and uncertainty.’” 
    Lucent, 580 F.3d at 1325
    (quoting
    
    Unisplay, 69 F.3d at 517
    ). Thus, we have cautioned that
    “district courts performing reasonable royalty calculations
    [must] exercise vigilance when considering past licenses
    to technologies other than the patent in suit,” 
    ResQNet, 594 F.3d at 869
    , and “must account for differences in the
    technologies and economic circumstances of the contract-
    ing parties,” Finjan, Inc. v. Secure Computing Corp., 
    626 F.3d 1197
    , 1211 (Fed. Cir. 2010).
    With those principles in mind, we conclude that the
    district court here did not abuse its discretion in permit-
    ting Weinstein to rely on the six challenged licenses. To
    begin with, four of those licenses did indeed relate to the
    actual patents-in-suit, while the others were drawn to
    related technology. Moreover, all of the other differences
    that Apple complains of were presented to the jury, allow-
    ing the jury to fully evaluate the relevance of the licenses.
    See J.A. 1600, 1650, 1678–82. No more is required in
    these circumstances.
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                    35
    Our case law does not compel a contrary result. In
    ResQNet, we faulted the district court for relying on
    licenses with “no relationship to the claimed invention,”
    nor even a “discernible link to the claimed 
    technology.” 594 F.3d at 870
    . And in Lucent, we rejected reliance on
    licenses from “vastly different situation[s]” or where the
    subject matter of certain agreements was not even ascer-
    tainable from the evidence presented at 
    trial. 580 F.3d at 1327
    –28. The licenses in this case—though not immune
    from challenge—bear a closer relationship to the hypo-
    thetical negotiation that would have occurred.
    This case is therefore much more akin to the circum-
    stances in Finjan and ActiveVideo Networks, Inc. v. Veri-
    zon Communications, Inc., 
    694 F.3d 1312
    (Fed. Cir. 2012).
    In Finjan, there were several differences between the
    single license relied upon and the hypothetical negotia-
    tion, most notably that Finjan did not compete with the
    licensee as it did with the defendant in the case, and that
    the license involved a lump sum rather than a running
    
    royalty. 626 F.3d at 1212
    . Nevertheless, we affirmed the
    damages award based on that license because “[those]
    differences permitted the jury to properly discount the . . .
    license.” 
    Id. And in
    ActiveVideo, the damages expert
    relied on two agreements, one of which post-dated the
    hypothetical negotiations by two years, did not involve the
    patents-in-suit, and did not cover the technologies in the
    case, while the other agreement covered both patents and
    software 
    services. 694 F.3d at 1333
    . Nevertheless, we
    concluded that the “degree of comparability” of the license
    agreements was “[a] factual issue[] best addressed by
    cross examination and not by exclusion.” 
    Id. Similarly, here,
    though there were undoubtedly differences between
    the licenses at issue and the circumstances of the hypo-
    thetical negotiation, “[t]he jury was entitled to hear the
    expert testimony and decide for itself what to accept or
    reject.” i4i Ltd. P’ship v. Microsoft Corp., 
    598 F.3d 831
    ,
    856 (Fed. Cir. 2010), aff’d 
    131 S. Ct. 2238
    (2011).
    36                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    Thus, we do not believe the district court abused its
    discretion by permitting Weinstein’s testimony regarding
    the proper royalty rate based on these allegedly compara-
    ble licenses.
    D. Weinstein’s Second and Third Approaches:
    Nash Bargaining Solution
    Weinstein also offered two other estimates of the
    damages attributable to the FaceTime feature. Both of
    these estimates relied on the Nash Bargaining Solution.
    Weinstein began by determining “incremental or addi-
    tional profits that are associated with the use of the
    patented technology.” J.A. 1630. Weinstein used two
    different methods to estimate the incremental profits
    associated with the FaceTime feature. First, he used the
    front-facing camera as a proxy for the FaceTime feature,
    and calculated the profits that he believed were attribut-
    able to the addition of the front-facing camera to certain
    Apple products. And second, he relied on customer sur-
    veys to assert that 18% of iOS device sales would not have
    occurred but for the inclusion of FaceTime, and deter-
    mined the profits attributable to those sales.
    Having thus purported to determine those profits,
    Weinstein then testified about how the parties would split
    those incremental profits. To do this, he began with the
    assumption that each party would take 50% of the incre-
    mental profits, invoking the Nash Bargaining Solution,
    and then adjusted that split based on “the relative bar-
    gaining power of the two entities.” J.A. 1632.
    Apple challenges both steps of Weinstein’s analysis.
    First, Apple insists that Weinstein did not adequately
    isolate the incremental profits attributable to the patent-
    ed technology under either approach. And second, Apple
    argues that the invocation of a 50/50 starting point based
    on the Nash Bargaining Solution is akin to the “25 per-
    cent rule of thumb” that we rejected in Uniloc as being
    insufficiently grounded in the specific facts of the case.
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   37
    Because we agree with Apple on the second point, we need
    not reach the first.
    In recent years, numerous district courts have con-
    fronted experts’ invocations of the Nash Bargaining
    Solution as a model for reasonable royalty damages, with
    varying results. Compare Robocast, Inc. v. Microsoft
    Corp., No. 10-1055, 
    2014 WL 350062
    (D. Del. Jan. 29,
    2014) (excluding expert testimony based on Nash Bar-
    gaining Solution because it was not sufficiently tied to the
    facts of the case); Dynetix Design Solutions, Inc. v. Synop-
    sys, Inc., No. 11-5973, 
    2013 WL 4538210
    , at *4–5 (N.D.
    Cal. Aug. 22, 2013) (excluding expert testimony on royalty
    rate that began from a starting point of a 50/50 split
    because the expert’s methodology was “indistinguishable
    from 25% rule”); Oracle Am., Inc. v. Google Inc., 798 F.
    Supp. 2d 1111, 1119–21 (N.D. Cal. 2011) (excluding
    testimony based on Nash Bargaining Solution because it
    “would invite a miscarriage of justice by clothing a fifty-
    percent assumption in an impenetrable façade of mathe-
    matics”) with Mformation Techs., Inc. v. Research in
    Motion Ltd., No. 08-4990, 
    2012 WL 1142537
    , at *3 n.19
    (N.D. Cal. Mar. 29, 2012) (declining to exclude Wein-
    stein’s testimony based on Nash Bargaining Solution
    because he used it only “as a check” in addition to the
    Georgia-Pacific analysis, rather than in lieu of it); Gen-
    Probe Inc. v. Becton Dickinson & Co., No. 09-2319, 
    2012 WL 9335913
    , at *3 (S.D. Cal. Nov. 26, 2012) (permitting
    testimony based on Nash Bargaining Solution because
    calculation was sufficiently tied to the facts of the case,
    “including the competitive environment and Gen-Probe’s
    policy of exploiting its own patents”); Sanofi-Aventis
    Deutschland Gmbh v. Glenmark Pharms. Inc., USA, No.
    07-5855, 
    2011 WL 383861
    , at *12–13 (D.N.J. Feb. 3, 2011)
    (determining that expert’s testimony asserting a 50/50
    profit split was based on the specific facts of the case);
    Amakua Dev. LLC v. Warner, No. 05-3082, 
    2007 WL 2028186
    , at *20 (N.D. Ill. July 10, 2007) (permitting
    38                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    reliance on Nash because the “[d]efendants ha[d] not
    challenged the reliability of Nash’s theories, and the
    assessment of whether the theory persuasively can be
    applied in the context of this case is for the jury”).
    For the reasons that follow, we agree with the courts
    that have rejected invocations of the Nash theorem with-
    out sufficiently establishing that the premises of the
    theorem actually apply to the facts of the case at hand.
    The use here was just such an inappropriate “rule of
    thumb.”
    Previously, damages experts often relied on the “25
    percent rule of thumb” in determining a reasonable
    royalty rate in a hypothetical negotiation. That rule
    hypothesized that 25% of the value of the infringing
    product would remain with the patentee, while the re-
    maining 75% would go to the licensee. In Uniloc, howev-
    er, we held the “25 percent rule of thumb” to be
    inadmissible “because it fails to tie a reasonable royalty
    base to the facts of the case at 
    issue.” 632 F.3d at 1315
    .
    In so doing, we noted that the rule did not differentiate
    between different industries, technologies, or parties. 
    Id. at 1317.
    Rather, it assumed the same 25/75 royalty split
    regardless of the size of the patent portfolio in question or
    the value of the patented technology. 
    Id. The problem
    was that the 25% rule made too crude a generalization
    about a vastly more complicated world.
    The problem with Weinstein’s use of the Nash Bar-
    gaining Solution, though somewhat different, is related,
    and just as fatal to the soundness of the testimony. The
    Nash theorem arrives at a result that follows from a
    certain set of premises. It itself asserts nothing about
    what situations in the real world fit those premises.
    Anyone seeking to invoke the theorem as applicable to a
    particular situation must establish that fit, because the
    50/50 profit-split result is proven by the theorem only on
    those premises. Weinstein did not do so. This was an
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                   39
    essential failing in invoking the Solution. Moreover, we
    do not believe that the reliability of this methodology is
    saved by Weinstein’s attempts to account for the unique
    facts of the case in deviating from the 50/50 starting
    point. As we noted in Uniloc:
    It is of no moment that the 25 percent rule of
    thumb is offered merely as a starting point to
    which the Georgia-Pacific factors are then applied
    to bring the rate up or down. Beginning from a
    fundamentally flawed premise and adjusting it
    based on legitimate considerations specific to the
    facts of the case nevertheless results in a funda-
    mentally flawed 
    conclusion. 632 F.3d at 1317
    . Indeed, Weinstein’s thin attempts to
    explain his 10% deviation from the 50/50 baseline in this
    case demonstrates how this methodology is subject to
    abuse. His only testimony on the matter was that alt-
    hough he “considered other splits,” he ultimately deter-
    mined that a 10% deviation—resulting in a 45/55 split—
    was appropriate “to reflect the fact that Apple would have
    additional bargaining power over VirnetX back in . . .
    2009.” JA. 1708–09. Such conclusory assertions cannot
    form the basis of a jury’s verdict. See Gen. Elec. Co. v.
    Joiner, 
    522 U.S. 136
    , 146 (1997) (noting that where an
    expert considers relevant material but fails to provide an
    opinion explaining how that material leads to his conclu-
    sion, “[a] court may conclude that there is simply too
    great an analytical gap between the data and the opinion
    proffered”).
    More importantly, even if an expert could identify all
    of the factors that would cause negotiating parties to
    deviate from the 50/50 baseline in a particular case, the
    use of this methodology would nevertheless run the
    significant risk of inappropriately skewing the jury’s
    verdict. This same concern underlies our rule that a
    patentee may not balance out an unreasonably high
    40                       VIRNETX, INC.   v. CISCO SYSTEMS, INC.
    royalty base simply by asserting a low enough royalty
    rate. See 
    Uniloc, 632 F.3d at 1320
    . Although the result of
    that equation would be mathematically sound if properly
    applied by the jury, there is concern that the high royalty
    base would cause the jury to deviate upward from the
    proper outcome. 
    Id. Thus, in
    Uniloc, we noted that “[t]he
    disclosure that a company has made $19 billion dollars in
    revenue from an infringing product cannot help but skew
    the damages horizon for the jury, regardless of the contri-
    bution of the patented component to this revenue.” 
    Id. Similarly, here,
    the use of a 50/50 starting point—itself
    unjustified by evidence about the particular facts—
    provides a baseline from which juries might hesitate to
    stray, even if the evidence supported a radically different
    split.
    Even the 25% rule had its share of support in the lit-
    erature, which had observed that, at least as an anecdotal
    matter, a 25% royalty rate was a common starting point—
    and not far off from a common end point—of licensing
    negotiations across numerous industries. See 
    Uniloc, 632 F.3d at 1313
    (citing Robert Goldscheider, John Jarosz and
    Carla Mulhern, Use of the 25 Per Cent Rule in Valuing IP,
    37 les Nouvelles 123, 132–33 (Dec. 2002); Stephen A.
    Degnan & Corwin Horton, A Survey of Licensed Royalties,
    32 les Nouvelles 91, 95 (June 1997)). Nevertheless, we
    rejected it, insisting on testimony tied to the particular
    facts. The same insistence is vital here.
    We note that the Nash Bargaining Solution does offer
    at least one noticeable improvement over the 25% rule:
    where the 25% rule was applied to the entire profits
    associated with the allegedly infringing product, the Nash
    theory focuses only on the incremental profits earned by
    the infringer from the use of the asserted patents. But
    while we commend parties for using a theory that more
    appropriately (and narrowly) defines the universe of
    profits to be split, the suggestion that those profits be
    split on a 50/50 basis—even when adjusted to account for
    VIRNETX, INC.   v. CISCO SYSTEMS, INC.                 41
    certain individual circumstances—is insufficiently tied to
    the facts of the case, and cannot be supported.
    For each of the reasons stated above, we vacate the
    damages award and remand for further proceedings
    consistent with this opinion.
    AFFIRMED-IN-PART, REVERSED-IN-PART,
    VACATED-IN-PART and REMANDED
    COSTS
    Each party shall bear its own costs.
    

Document Info

Docket Number: 13-1489

Citation Numbers: 767 F.3d 1308

Filed Date: 9/16/2014

Precedential Status: Precedential

Modified Date: 1/12/2023

Authorities (31)

Medical Care America, Inc. v. National Union Fire Insurance ... , 341 F.3d 415 ( 2003 )

Eon-Net LP v. Flagstar Bancorp , 653 F.3d 1314 ( 2011 )

Liebel-Flarsheim Company and Mallinckrodt Inc. v. Medrad, ... , 358 F.3d 898 ( 2004 )

Uniloc USA, Inc. v. Microsoft Corp. , 632 F.3d 1292 ( 2011 )

Anchor Wall Systems, Inc. v. Rockwood Retaining Walls, Inc.,... , 340 F.3d 1298 ( 2003 )

Lucent Technologies, Inc. v. Gateway, Inc. , 580 F.3d 1301 ( 2009 )

Hoechst Celanese Corporation v. Bp Chemicals Limited and ... , 78 F.3d 1575 ( 1996 )

Cybor Corporation v. Fas Technologies, Inc., and Fastar Ltd.... , 138 F.3d 1448 ( 1998 )

Vitronics Corporation v. Conceptronic, Inc. , 90 F.3d 1576 ( 1996 )

Verizon Services Corp. v. Cox Fibernet Virginia, Inc. , 602 F. Supp. 3d 1325 ( 2010 )

Herbert Markman and Positek, Inc. v. Westview Instruments, ... , 52 F.3d 967 ( 1995 )

Finjan, Inc. v. Secure Computing Corp. , 626 F.3d 1197 ( 2010 )

Z4 Technologies, Inc. v. Microsoft Corp. , 507 F.3d 1340 ( 2007 )

Unisplay, S.A. v. American Electronic Sign Co., Inc., and ... , 69 F.3d 512 ( 1995 )

Crown Packaging Technology, Inc. v. Rexam Beverage Can Co. , 559 F.3d 1308 ( 2009 )

I4i Ltd. Partnership v. Microsoft Corp. , 598 F.3d 831 ( 2010 )

C.R. Bard, Inc. And Davol Inc. v. United States Surgical ... , 388 F.3d 858 ( 2004 )

ClearValue, Inc. v. Pearl River Polymers, Inc. , 668 F.3d 1340 ( 2012 )

ResQNet. Com, Inc. v. Lansa, Inc. , 594 F.3d 860 ( 2010 )

Net MoneyIN, Inc. v. VeriSign, Inc. , 545 F.3d 1359 ( 2008 )

View All Authorities »