throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
`Paper 30
`Entered: January 19, 2017
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`AMERICAN MEGATRENDS, INC., et al.,
`Petitioner,
`
`v.
`
`KINGLITE HOLDINGS INC.,
`Patent Owner.
`____________
`
`Case IPR2015-01515
`Patent 5,978,912
`____________
`
`
`
`Before GLENN J. PERRY, TREVOR M. JEFFERSON, and
`BRIAN J. McNAMARA, Administrative Patent Judges.
`
`PERRY, Administrative Patent Judge.
`
`
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`I. INTRODUCTION
`This is a Final Written Decision entered in an inter partes review
`instituted pursuant to 35 U.S.C. § 314. For reasons discussed below, we
`determine that Petitioner has shown by a preponderance of the evidence that
`some, but not all, of the claims at issue of U.S. Patent No. 5,978,912 (Ex.
`1001, “the ’912 patent”) are unpatentable.
`
`
`A. Procedural History
`American Megatrends, Inc., Micro-Star International Co. Ltd, MSI
`Computer Corp., Giga-Byte Technology Co., Ltd., and G.B.T., Inc.
`(“Petitioner”) filed a Petition (Paper 7, “Pet.”) to institute inter partes review
`of claims 1–60 of the ’912 patent. 35 U.S.C. § 311. Patent Owner, Kinglite
`Holdings Inc., timely filed a Preliminary Response (Paper 12, “Prelim.
`Resp.”) contending that the Petition should be denied as to all. We instituted
`trial as to claims 1–10, 12–15, 17–19, 21−30, 32−45, and 47–60. Paper 16,
`“Dec. to Inst.” Patent Owner filed a Patent Owner Response (Paper 22, “PO
`Resp.”), and Petitioner filed a Petitioner Reply (Paper 23, “Pet. Reply”).
`Petitioner also requested rehearing of our Decision to Institute. Paper 18. In
`our rehearing decision, we added claims 11, 16, and 46 to the review. Paper
`24, “Dec. on Reh’g.” We authorized and received from Patent Owner a
`Supplemental Response directed to the added claims (Paper 26, “Supp.
`Resp.”) and a Petitioner Reply to that Supplemental Response. Paper 27,
`“Reply to Supp. Resp.” We heard oral argument on October 17, 2016 and
`entered a transcript of that argument into the record. Paper 29 (“Tr.”).
`
`2
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`B. Related Matters
`American Megatrends reports the following related matters in civil
`litigation:
`Kinglite Holdings Inc. v. Giga-Byte Tech. Co. Ltd., et al., CV 14-
`04989 JVS (PJWx) (C.D. Ca); and
`Kinglite Holdings Inc. v. Micro-Star Int’l Co. Ltd., et al., CV 14-
`03009 JVS (PJWx) (C.D. Ca). Paper 6, 1.
`American Megatrends reports the following related matters before the
`Board:
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01079 (U.S. Pat. No. 6,373,498);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01081 (U.S. Pat. No. 5,987,604);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01094 (U.S. Pat. No. 6,401,202);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01132 (U.S. Pat. No. 6,523,123);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01133 (U.S. Pat. No. 5,732,268);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01140 (U.S. Pat. No. 6,519,659);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01141 (U.S. Pat. No. 6,633,976);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01188 (U.S. Pat. No. 5,836,013);
`
`3
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01189 (U.S. Pat. No. 5,836,013);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01191 (U.S. Pat. No. 6,892,304);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01197 (U.S. Pat. No. 6,487,656);
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01487 (U.S. Pat. No. 6,308,265); and
`American Megatrends Inc., et al. v. Kinglite Holdings Inc., IPR2015-
`01488 (U.S. Pat. No. 7,185,189). Id. at 1–2.
`
`
`
`C. The ’912 Patent (Ex. 1001)
`1. Described Invention
`The ’912 patent describes a computer that, prior to booting its
`operating system or after an operating system failure, can communicate with
`a networked computer. Ex. 1001, Abstract. A “multitasking kernel” that
`supports communication is implemented in a network-enhanced BIOS. Id.
`Figure 4 of the ’912 patent is reproduced below.
`
`4
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`
`
`Figure 4 depicts a flowchart showing software contained on a computer
`configured for communication in accordance with a preferred embodiment.
`
`Figure 4 explains operation of “network-enhanced BIOS” 600, which
`works with “conventional BIOS” 500 to provide network communication in
`the absence of a functional operating system. Ex. 1001, 7:1–50. At start-up
`410, control passes to “Early Power On Self Test” (POST) 510 which
`performs preliminary tasks such as programming the memory controller,
`
`5
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`interrupt controller, system bus controller, and other chipset registers. At
`412 control passes to the network-enhanced BIOS installation check routine1
`which scans non-volatile memory 125 looking for a signature indicating the
`start of network-enhanced BIOS 600 code (right side Figure 4). If no
`signature is present, the rest of POST routine 520 executes at 413 and
`control passes at 414 to an operating system (OS) bootstrapping routine. At
`432 the bootstrapping routine loads the OS and at 415 passes CPU control to
`the OS. Ex. 1001, 7:1–18.
`If a network-enhanced BIOS 600 code signature is present, a
`relocation routine 416 copies the network-enhanced BIOS 600 from non-
`volatile memory 125 into RAM 120, and CPU control passes, at 417, to
`initialization routine 610 of the network-enhanced BIOS 600 code stored at a
`an address at a known offset from the signature. Because conventional
`BIOS 500 typically operates in real mode, the network-enhanced BIOS
`initialization routine 610 switches the CPU into protected mode and
`initializes 32-bit kernel 620, and each component of protocol stack 640. Id.,
`7:19–30.
`Network-enhanced BIOS kernel 620 is preferably multithreaded. A
`task may be prevented from executing if waiting for an external event or
`another task on which it depends. To manage tasks, the kernel provides
`functions for signal, semaphore and mutual exclusion. Kernel dispatcher
`621 switches CPU control among tasks. Id., 7:1–18, 7:31–34.
`
`
`1 The check routine is part of enabler 560 shown in Figure 3 of the ’912
`patent.
`
`6
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`Plural 32-bit protected mode threads, started by the network-enhanced
`BIOS initialization routine 610, support network protocol stack 640, and
`communication with management workstation 200 application. Ex. 1001,
`7:44–50.
`
`2. Illustrative Claim
`Claims 1, 37, 38, 51, 52, 57, and 58 are independent. Claim 1 of the
`’912 patent is illustrative of the challenged claims:
`1. A method of operating a computer, said computer
`including a central processing unit (CPU) and a network
`interface coupling said computer to a network, said method
`comprising:
`automatically executing an initial start-up software on
`said CPU upon CPU system start-up;
`loading and executing a network-enhanced software on
`said CPU on completion of at least a first portion of said start-
`up software, said network-enhanced software supporting a
`protocol for communicating with workstations coupled to said
`computer network via said network interface; and
`loading and executing an operating system software on
`said CPU after said loading of said network-enhanced software,
`said operating system software being accessible by user-level
`application software programs executing on said CPU.
`
`
`
`
`
`
`
`
`
`7
`
`
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`D. Instituted Challenges
`We instituted inter partes review, as to all claims, except claims 20
`and 31, as set forth in the following table:
`
`Basis
`35 U.S.C. § 103
`
`Reference(s)
`Chang2 and Dent3
`Chang, Dent, and
`Bizzarri4
`Chang, Dent, and Aegis5 35 U.S.C. § 103
`
`35 U.S.C. § 103
`
`Claim(s) challenged
`1–18, 24–30, 32, 35–
`53, 55, 56, 59 and 60
`19, 21–23, 28, 29
`and 54
`33 and 34
`
`Flaherty6 and Chang
`
`35 U.S.C. § 103
`
`57 and 58
`
`
`
`II. DISCUSSION
`A. Claim Interpretation
`The Board interprets unexpired claims using the “broadest reasonable
`construction in light of the specification of the patent in which [they]
`appear[].” 37 C.F.R. § 42.100(b); Cuozzo Speed Techs., LLC v. Lee,
`136 S. Ct. 2131, 2144–46 (2016) (upholding the use of the broadest
`reasonable interpretation standard as the claim interpretation standard to be
`applied in inter partes reviews). Under this standard, we interpret claim
`
`
`2 U.S. Patent 5,444,850, issued August 22, 1995 (Ex. 1003, “Chang”).
`3 U.S. Patent 5,884,073, issued March 16, 1999 (Ex. 1004, “Dent”).
`4 U.S. Patent 5,732,268, issued March 24, 1998 (Ex. 1008, “Bizzarri”).
`5 Arbaugh, William A; Farber, David J.; and Smith, Jonathan M., A Secure
`and Reliable Bootstrap Architecture, University of Pennsylvania Scholarly
`Commons, December 2, 1996 (Ex. 1014, “Aegis”).
`6 U.S. Patent 5,146,568, issued September 8, 1992 (Ex. 1006, “Flaherty”).
`8
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`terms using “the broadest reasonable meaning of the words in their ordinary
`usage as they would be understood by one of ordinary skill in the art, taking
`into account whatever enlightenment by way of definitions or otherwise that
`may be afforded by the written description contained in the applicant’s
`specification.” In re Morris, 127 F.3d 1048, 1054 (Fed. Cir. 1997). We
`generally presume that claim terms have their ordinary and customary
`meaning. See Trivascular, Inc. v. Samuels, 812 F.3d 1056, 1062 (Fed. Cir.
`2016) (“Under a broadest reasonable interpretation, words of the claim must
`be given their plain meaning, unless such meaning is inconsistent with the
`specification and prosecution history.”); In re Translogic Tech., Inc., 504
`F.3d 1249, 1257 (Fed. Cir. 2007) (“The ordinary and customary meaning is
`the meaning that the term would have to a person of ordinary skill in the art
`in question.” (internal quotation marks omitted)). A patentee, however, may
`rebut this presumption by acting as his or her own lexicographer, providing a
`definition of the term in the specification with “reasonable clarity,
`deliberateness, and precision.” In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir.
`1994).
`In our Decision to Institute, we preliminary construed the following
`claim terms:
`
`
`
`
`9
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`Claim Term
`“initial start-up software”
`
`“network-enhanced software
`(NES)”
`“operating system (OS) software”
`
`“power on self-test (POST)”
`
`Preliminary Construction
`“a set of instructions that initializes
`a computer system”
`“software that facilitates
`networking”
`“system-level software that controls
`the execution of user level programs
`and that provides services to such
`user-level programs such as
`resource allocation, scheduling, I/O
`control and data management”
`“the testing and initialization phases
`of the BIOS that begins when a
`system powers on”
`
`
`Patent Owner continues to argue for a more restrictive construction of
`“network-enhanced software” that would require various specific functions
`of software described in the Specification. PO Resp. 8. However, we do not
`read into this claim term limitations of particular embodiments in the
`absence of a reason to do so. Here there is none. The term “network-
`enhanced software” appears only in the claims and not elsewhere in the
`Specification. We find no description of the term “network-enhanced
`software” in the Specification that would rise to the level of a definition.
`Embodiments are described as including a “network-enhanced BIOS.” The
`term “BIOS” appears in some, but not all, of the claims. We regard the term
`“network-enhanced software” as being broader in scope than “network-
`enhanced BIOS” based on our understanding that the term BIOS connotes to
`computer engineers specialized software particular to the rudimentary
`operation of a computer. We therefore adopt our preliminary constructions
`
`10
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`along with our reasoning expressed in our Decision to Institute for purposes
`of this decision. Dec. to Inst. 12−14.
`
`
`B. Overview of the References
`We provide an overview of the references discussed in the specific
`challenges.
`
`1. Chang
`Chang describes information and file transfer between a computer, not
`yet booted to its local operating system, and a network computer. Ex. 1003,
`Abstract. To enable communication, a ROM or PROM containing code is
`placed in either 1) an unused boot ROM socket of a LAN card, or 2) a
`motherboard. Id.
`During a boot sequence and prior to loading its operating system
`(OS), the computer performs certain functions using its BIOS to enable
`communication via the network. Id. This process is described at column 6,
`line 49 through column 7, line 36, with reference to Figures 3a and 3b,
`reproduced below.
`
`11
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`
`
`
`Figures 3a and 3b depict flow charts showing
`processing carried out by Chang at system startup.
`
`
`
`12
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`The boot process interrupts after the BIOS executes but before the
`Disk Operating System (DOS) executes. At power-up (step 31), the system
`BIOS is executed (step 33). The system BIOS detects the existence of a
`program in a ROM socket on a network interface card (step 35) and passes
`control to this program (step 37). Network communications software loads
`from the workstation storage medium (step 39) using its internal mini-
`operating system and the appropriate network communications protocols.
`Communication with the Server Management Application (SMA) is
`initiated (step 41). Under instructions from the SMA, the invention executes
`the appropriate functions contained in the executive services engine of the
`program in the PROM. The executive services engine uses low-level control
`functions (e.g., BIOS under DOS) to perform the instructions sent by the
`server SMA to the workstation. After the server connects in step 41, the
`workstation NIC address is verified (step 43). If the NIC address is not in
`the address in access control list database (ACL-DB) (step 45), the
`connection to the network is cut, otherwise an attempt is made to connect the
`workstation to the network (step 47) and, if successful, workstation files are
`updated (step 49). Otherwise, the attempt to initiate the network connection
`is repeated (step 41). At step 49, the server sends any required workstation
`updates to the client and performs any assigned tasks under control from the
`SMA. During update, processes programmed in the PROM are executed
`and acknowledged (ACK) (step 51) by the firmware under instruction from
`the server SMA. The server and client communicate directly with
`workstation hardware and firmware at a level below the operating system,
`thus providing a sterile, controlled operating environment. Control then
`
`13
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`returns to the workstation boot process (step 53) and the normal boot process
`is completed (step 55). Steps 39 and 41 are performed by file handler 27a
`and 27b. Steps 43, 45, 47, 49, 51, and 53 are performed by network services
`27c and executable services engine 23. Ex. 1003, 6:49–7:36.
`The firmware kernel provides the workstation with a pristine
`operating environment. The workstation can execute any instructions sent
`by the SMA, exit from control of the firmware, and commence normal boot.
`Changes made during the pre-boot process by the SMA are reflected
`immediately at the workstation.
`
`2. Dent
`Dent describes altering a boot sequence provided by a Basic
`Input/Output System (BIOS) to enable diagnostics of the electronic system
`containing the BIOS by a service provider. Access to the service provider is
`established through a publicly accessible network (e.g., Internet). Ex. 1004,
`Abstract. Dent’s Figure 4 is reproduced below.
`
`
`14
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`
`Figure 4 depicts a flowchart illustrating a boot sequence that
`establishes an interconnection over a network for remote servicing of
`the electronic system upon experiencing a boot error.
`
`As shown in Dent’s Figure 4, after the electronic system has been
`powered, it undergoes a boot sequence in which components critical to
`establishing remote access through a publicly accessible network are
`15
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`initialized before proceeding with the standard boot sequence (step 410). If
`it is necessary to service a boot error in the electronic system before
`proceeding with the standard boot sequence, remote communications are
`established over the Internet (steps 420 and 430). Otherwise, the boot
`sequence proceeds as discussed above by performing an initialization,
`testing and allocation phases before loading the operating system (steps
`440−480). Ex. 1004, 5:1–15.
`
`3. Bizzarri
`Bizzarri describes an extended BIOS to establish remote
`communication for diagnostics and repair. Ex. 1008, Title.
`
`
`
`16
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`Bizzarri’s Figure 2 is reproduced below.
`
`Figure 2 depicts a logic flow diagram of operation
`of an E-BIOS PC at boot up.
`
`After power on at step 21, the E-BIOS is loaded into RAM and begins
`to execute at step 23. At step 25 E-BIOS execution continues, performing
`
`
`
`17
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`POST and other BIOS startup functions and monitors for any fault that will
`prevent completion of the boot process. If no fault prevents normal system
`operation, boot continues. If a fault prevents normal system operation, boot
`proceeds at step 27 to presenting on a display monitor the interactive
`interface allowing a user to direct continuing operation. Control is diverted
`to step 29 and the E-BIOS establishes communication with a remote E-BIOS
`diagnostic and repair unit (item 13 in Figure 1). Ex. 1008, 5:66–6:26.
`4. Aegis
`Aegis is an academic article describing a secure and reliable bootstrap
`architecture. Ex. 1014, cover page. It describes the “AEGIS” architecture
`for initializing a computer system. It validates integrity at each layer
`transition in the bootstrap process. AEGIS also includes a recovery process
`for integrity check failures. Ex. 1014, Abstract.
`5. Flaherty
`Figure 1 of Flaherty is reproduced below.
`
`
`
`18
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`
`Figure 1 depicts a network having a computer node 10 that makes
`use of the host OS 23 and a minimum-boot program 34 of computer
`host node 14 via communications interface 28.
`
`
`Flaherty describes Figure 1 at column 5, lines 1–21. It depicts a network
`having a computer node 10 that makes use of the host OS 23 and a
`minimum-boot program 34 of computer host node 14 via communications
`interface 28. At power up, processor 24 executes a power on self test
`(“POST”) sequence during which it attempts to find a boot device which
`contains a file with its operating system in it. If it does not find a boot
`device, the network device 26 broadcasts a request for an operating system
`over the network communications line 12. The network device 28 on the
`host 14 determines that the message is in broadcast mode and notifies CPU
`30. Ex. 1006, 4:40–68. The CPU 30 determines a message to be a boot
`request and identifies an OS for the node 10. If it finds such an
`identification, it constructs a message by attaching the hardware address of
`the network device 26 of node computer 10 onto a minimum-boot program
`file 34 and places the message on the communications line 12. The
`communications device 26 of the node 10 receives the message and copies
`the minimum boot program into the node’s low memory addresses 36 of its
`memory 27. The CPU 24 then begins to execute the minimum-boot
`program. The minimum-boot program is then copied into the high addresses
`46 of memory 27 and the POST sequence completes. Ex. 1006, 5:1–21.
`
`
`19
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`C. Challenges Relying on Chang and Dent
`Petitioner contends that claims 1–18, 24–30, 32, 35–53, 55, 56, 59 and
`60 are obvious under 35 U.S.C. § 103 based on Chang and Dent, relying on
`the supporting testimony in the form of a Declaration by Mr. Stefano Righi
`(Ex. 1019). Pet. 9. Petitioner provides a detailed reading of these
`challenged claims on Chang and Dent, including references to the Righi
`Declaration. Id. at 11–47.
`Patent Owner argues that this challenge should be denied because
`portions of Mr. Righi’s testimony are not discussed in the Petition itself. PO
`Resp. 6–29. Patent Owner correctly notes that a Petitioner must make its
`arguments in the Petition. We have only considered portions of the Righi
`testimony that relate to arguments presented in the Petition.
`Except for claims 15, 16 and 50, as noted below, Petitioner’s detailed
`reading of the challenged claims on the references has established by a
`preponderance of the evidence that these claims are unpatentable based on
`Chang and Dent. The discussion below focuses on claims for which Patent
`Owner provides argument, albeit not supported by any declaration
`testimony. These arguments essentially contend that Petitioner did not
`sustain its burden to establish unpatentability.
`1. Combining Chang and Dent
`Petitioner argues that one of ordinary skill would have had a reason to
`combine Chang with Dent because Chang’s system can pre-boot remote
`diagnostics. Pet. 13 (citing Ex. 1003, 3:32–33). Dent provides specific
`details on how to implement diagnostics in a similar computing
`environment. Id. (citing Ex. 1004, Figure 3–2). Both references provide
`
`20
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`similar solutions to the problem of providing communication capability
`before the OS is loaded. Both references disclose using a BIOS to establish
`a network connection before an operating system is active. Id. (citing Ex.
`1019 ¶ 56).
`According to Petitioner, Chang implements firmware that interfaces
`with a server management application (SMA) of a remote computer (e.g.,
`workstation server) before a full operating system is active. Id. (citing Ex.
`1003, 4:46–50; Ex. 1019 ¶ 56). Chang details how a remote server accesses,
`updates, manages, controls, and repairs a local computer. Id. (citing Ex.
`1019 ¶ 42; Ex. 1003, 3:12–50). Dent describes a similar concept, i.e., after
`computer initialization upon power-on, establishing remote connection by
`initializing a network interface controller (NIC) in response to a boot error.
`Id. (citing Ex. 1004, Figure 5, item 560).
`Patent Owner argues that there is no motivation to combine Chang
`and Dent. PO Resp. 6–7. According to Patent Owner, Petitioner’s analysis
`ignores fundamental differences in operation between the systems taught in
`the two references. PO Resp. 6. Chang establishes a connection with a
`server upon detection of a program in the PROM. Pet. 6–7 (citing Ex. 1003
`at 6:55–57 (“The system BIOS detects the existence of a program in a ROM
`socket on a network interface card (step 35) and passes control to this
`program (step 37).”)). Dent establishes communication only when there is a
`boot error. Ex. 1004 at 3:4–8 (“to enable remote system level diagnostics
`through a privately or publicly accessible network in the event of a boot
`error”). Patent Owner argues that given these differences, there would have
`been no motivation to combine these references. PO Resp. 6−7.
`
`21
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`We determine that the differences noted by Patent Owner would not
`dissuade one of ordinary skill from combining the teachings Chang and
`Dent. As noted above, Chang, during a boot sequence and prior to loading
`its operating system (OS), uses its BIOS to enable network communication.
`Dent describes a boot sequence that establishes an interconnection over a
`network for remote servicing of an electronic system upon experiencing a
`boot error. Thus, they address the same general problem and are similar in
`overall approach to solving that problem.
`2. Independent Claims 1, 38, and 52
`Independent claim 1 requires “loading and executing a network-
`enhanced software on said CPU on completion of at least a first portion of
`said start-up software.” The specification describes “early POST” 510 and
`the rest of POST 520. Ex. 1001, 6:38–58.
`Petitioner reads claim 1 on Chang and Dent, noting that both of these
`references describe the limitations of claim 1. Petitioner argues that Chang’s
`BIOS detects the existence of a program in the ROM of a network interface
`card and then passes control to this program. Petitioner also argues that
`Dent executes BIOS software upon completion of at least a first portion of
`initial start-up software (ISUS). Pet. 14–17.
`We agree with Petitioner’s understanding of Chang and Dent as they
`apply to the limitations of claim 1. Claim 1 merely recites that a “first
`portion” of software is executed. Petitioner demonstrates that at least some
`portion of software has beenexecuted in both Chang and Dent before
`“network-enhanced software” is loaded and executed.
`
`22
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`As to independent claims 1, 38, and 52, Patent Owner argues that
`Chang and Dent do not meet the “network-enhanced software” limitation
`because Chang’s operation always requires an operating system to be
`present before connecting to the network server. PO Resp. 7.
`According to Patent Owner, Chang uses its mini-operating system to
`download the network communications software from the workstation
`storage medium (Paper No. 16 at 14), and the client and the server
`communicate in a sterile operating environment (Id. at 15). However,
`according to Patent Owner, “Chang requires an operating system to be
`present before connecting to the network server.” Id. at 29. Chang teaches
`“[a] suitable operating system kernel 25 is available from Hitech Business
`Solutions, Inc. of Wilmington, Del.” Ex. 1003 at 6:43–45. This “kernel” is
`located in Hitech’s X-DOS disk operating system for personal computers.
`HBS X-DOS 5 PC Disk Operating System User Manual, 1–1 & 5–10 (Aug.
`8, 1995) (Ex. 2003).
`Patent Owner further argues that under a proper construction of
`“network-enhanced software,” Chang’s operating system kernel does not
`satisfy the “network-enhanced software” required by claims 1, 38 and 52 of
`the ‘912 patent. PO Resp. 8.
`As stated in our claim construction, we do not limit the term
`“network-enhanced software” as suggested by Patent Owner. Rather, we
`construe “network-enhanced software,” as used in claim 1, to encompass the
`kernel of an operating system.
`Thus, we are not persuaded by Patent Owner’s arguments that
`Chang’s “kernel” does not meet the requirements of the “network enhanced
`
`23
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`software” described by independent claims 1, 38 and 52. We conclude,
`based on Petitioner’s detailed read of these independent claims on Chang
`and Dent that Petitioner has established by a preponderance of the evidence
`that claims 1, 38, and 52 are unpatentable based on Chang and Dent.
`3. Independent Claims 37 and 51
`Claims 37 and 51 do not refer to “networked enhanced software,” as
`in claim 1. Rather, they recite a “second BIOS” supporting communication.
`Thus, at least as to this limitation, claims 37 and 51 are not as broad in scope
`as claim 1. Independent claim 37 is reproduced below.
`
`37. A method of operating a computer, said computer
`including a central processing unit (CPU) and a network
`interface coupling said computer to a network, said CPU
`operating in at least two modes including a real mode and a
`protected mode, said method comprising:
`
`executing a first basic input/output system (BIOS) on
`said CPU in real mode, said first BIOS performing a power on
`system test of said computer;
`
`executing a second BIOS on said CPU in protected mode
`after execution of a portion of said first BIOS, said second
`BIOS supporting a network protocol stack; and
`
`executing an operating system on said CPU in protected
`mode after execution of a portion of said second BIOS, said
`operating system software supporting user-level application
`software programs executing on said CPU.
`
`Petitioner’s claim chart for claim 37 appears at pages 37–39 of the
`Petition. The claim chart points to a statement in the ’912 patent that use of
`real and protected modes was commonly known (Ex. 1003, 7:20–24). We
`credit this statement and find that those of ordinary skill would, at the time
`24
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`of the invention, understand how to use real and protected modes. The claim
`chart also points to the subject matter of Melo (Ex. 1010, 4:10–14) as being
`known to one of ordinary skill in the art. Melo describes in detail
`transitioning between real and protected modes of operation of a CPU.
`Petitioner points to Banset (Exhibit 1011, 1:43–50), which describes how
`UNIX operates in protected mode and directly controls its applications, as
`being known to one of ordinary skill. Petitioner also points to IBM (Ex.
`1017), which describes switching from real to protected mode, as being
`known to one of ordinary skill. Petitioner also points to Bartek (Ex. 1012,
`1:45–47), which explains operating a CPU running OS/2 in protected mode,
`as being known to one of ordinary skill. Petitioner relies upon Chang and
`Dent in much the same manner as with respect to claim 1. Id.
`Patent Owner argues that the plain meaning of “BIOS” is a “basic
`input/output system.” PO Resp. 9 (citing Ex. 1003, 5:8). According to
`Patent Owner, there is nothing in the Chang reference that describes its
`operating system kernel as being a portion of a BIOS. Patent Owner notes
`that kernel is depicted and described as part of the PROM or ROM of the
`invention. Id. (citing Ex. 1003, 6:8–11, 6:30–38, Figure 2). Chang’s BIOS
`detects the presence of a program in a ROM socket and passes control to the
`program in the PROM. Id. at 6:55–59. Thus, according to Patent Owner,
`Chang’s operating system kernel is not part of BIOS, and cannot satisfy the
`“second BIOS” limitation of claims 37 and 51. Patent Owner argues that
`because the Board did not rely upon the Dent reference as separately
`teaching this limitation, the subject prior art combination lacks this
`limitation.
`
`25
`
`
`
`

`
`Case IPR2015-01515
`Patent 5,978,912
`
`
`Petitioner argues, and we agree, that one of ordinary skill would
`consider Chang’s firmware to be a “BIOS.” Pet. 30 (citing Ex. 1019 ¶ 113).
`Petitioner also provides a detailed argument in its claim chart that Chang’s
`operating system kernel is, in effect, a “mini operating system.” Pet. 38
`(citing Ex. 1003, 6:30–38). Patent Owner has not cited any testimony or
`other evidence to the contrary.
`Patent Owner further argues that claims 37 and 51 require that the
`“first BIOS” execute in “real mode” and that Chang and Dent say nothing
`about a) operating BIOS in real mode; and b) operating a second, discrete
`BIOS in protected mode; and c) operating two BIOS programs sequentially
`in real and protected modes. PO Resp. 9–10.
`Patent Owner correctly notes that Petitioner relies upon the
`knowledge of one of ordinary skill when reading Chang and Dent. This
`knowledge includes the subject matter described by Melo, Banset, IBM and
`Bartek. The ordinarily skilled person reading these references would
`appreciate that when a computer using an Intel 80386 or 80486 processor is
`first turned on, it begins operation in “real mode.” Pet. 37; Ex. 1019 ¶ 53.
`Petitioner establishes that Chang meets the “second BIOS” limitation by
`offering the unrebutted Righi testimony which explains the knowledge of
`one of ordinary skill of real and protected modes, and that it would have
`been obvious to execute the second BIOS in protected mode, which was
`well-known at the time of the invention. Ex. 1019 ¶¶ 48–57. Patent Owner
`offers no testimony to counter the Righi testimony.
`We find that, at the time of the invention, real and protected modes

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket