throbber
SPEX Tech., Inc. v. Kingston Tech. Corp. et al, 8:16-cv-01790 JVS-AGR (Sept.
`27, 2016)
`SPEX Tech., Inc. v. Western Digital Corp. et al, 8:16-cv-01799 JVS-AGR (Sept.
`28, 2016)
`SPEX Tech., Inc. v. Toshiba Am. Elec. Components Inc. et al, 8:16-cv-01800
`JVS-AGR (Sept. 28, 2016)
`SPEX Tech., Inc. v. Apricorn, 2:16-cv-07349 JVS-AGR (Sept. 28, 2016)
`
`TENTATIVE ORDER REGARDING CLAIM CONSTRUCTION
`
`Plaintiff SPEX Technologies, Inc. (“SPEX” or “Plaintiff”) and Defendants
`Toshiba America Electronic Components Inc., Toshiba America Information
`Systems, Inc., Toshiba Corporation, Western Digital Corporation, Western Digital
`Technologies, Inc., HGST, Inc., Imation Corporation, Kingston Technology
`Corporation, Kingston Digital Inc., Kingston Technology Company, Inc.,
`Apricorn, Datalocker, Inc., and Data Locker International, LLC (together
`“Defendants”) have submitted proposed claim construction for terms contained in
`two of SPEX’s patents. See, e.g., Docket Nos. 88, 92.1 Both parties have submitted
`opening and responsive claim construction briefs. SPEX Op. Br., Docket No. 96;
`Defendants Op. Br., Docket No. 94; SPEX Resp. Br., Docket No. 100; Defendants
`Resp. Br., Docket No. 98.
`
`The Court construes the claim terms identified below.
`
`BACKGROUND
`
`Two of SPEX’s patents are currently at issue:
`
`• U.S. Pat. 6,088,802 (the “’802 patent”). Docket No. 96, Ex. 1.
`• U.S. Pat. 6,003,135 (the “’135 patent”). Id. Ex. 2.
`
`The applications resulting in the ’802 Patent and the ’135 Patent were filed
`the same day: June 4, 1997. The two patents are not technically related. However,
`the patent applications were prosecuted in parallel and each patent incorporates
`
`1All docket citations are to Case No. 8:16-cv-01790 unless otherwise noted.
`
`1
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 1 of 41
`
`

`

`the other by reference. ’802 Patent at 1:7–13; ’135 Patent at 1:6–13. The patents
`also have overlapping figures and specification disclosures.
`
`Both patents relate to devices that can communicate with host computing
`devices to provide various operations, including security operations. See ’802
`Patent at Abstract; ’135 Patent at Abstract. The ’802 Patent is titled
`“PERIPHERAL DEVICE WITH INTEGRATED SECURITY
`FUNCTIONALITY” and issued on July 11, 2000. The ’135 Patent is titled
`“MODULAR SECURITY DEVICE” and issued on December 14, 1999. Both
`patents are now expired.
`
`SPEX alleges that Defendants infringe Claims 1, 2, 6, 7, 11, 12, 23, 25, 38,
`and 39 of the ’802 Patent. SPEX Op. Br. at 2. Claim 1 recites:
`
`1.
`
`A peripheral device, comprising:
`security means for enabling one or more security operations to
`be performed on data;
`target means for enabling a defined interaction with a host
`computing device;
`means for enabling communication between the security means
`and the target means;
`means for enabling communication with a host computing
`device;
`means for operably connecting the security means and/or the
`target means to the host computing device in response to
`an instruction from the host computing device; and
`means for mediating communication of data between the host
`computing device and the target means so that the
`communicated data must first pass through the security
`means.
`
`SPEX also alleges that Defendants infringe Claims 55–58 of the ’135
`Patent. SPEX Br. at 2. Claim 55 recites:
`
`55. For use in a modular device adapted for communication with a
`host computing device, the modular device comprising a security
`module that is adapted to enable one or more security operations to be
`
`2
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 2 of 41
`
`

`

`performed on data and a target module that is adapted to enable a
`defined interaction with the host computing device, a method
`comprising the steps of:
`receiving a request from the host computing device for
`information regarding the type of the modular device;
`providing the type of the target module to the host computing
`device in response to the request; and
`operably connecting the security module and/or the target
`module to the host computing device in response to an
`instruction from the host computing device.
`
`LEGAL STANDARD
`
`I.
`
`General Claim Construction Principles
`
`Claim construction is “exclusively within the province of the court.”
`Markman v. W. Instruments, Inc., 517 U.S. 370, 372 (1996). Such construction
`“must begin and remain centered on” the claim language itself. Interactive Gift
`Express, Inc. v. Compuserve, Inc., 256 F.3d 1323, 1331 (Fed. Cir. 2001). But
`extrinsic evidence may also be consulted “if needed to assist in determining the
`meaning or scope of technical terms in the claims.” Pall Corp. v. Micron
`Separations, Inc., 66 F.3d 1211, 1216 (Fed. Cir. 1995).
`
`In construing the claim language, the Court begins with the principle that
`“the words of a claim are generally given their ordinary and customary meaning.”
`Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc) (internal
`quotation marks omitted). This ordinary and customary meaning “is the meaning
`that the [claim] term would have to a person of ordinary skill in the art in question
`at the time of the invention, i.e., as of the effective filing date of the patent
`application.” Id. at 1313. “[T]he person of ordinary skill in the art is deemed to
`read the claim term not only in the context of the particular claim in which the
`disputed term appears, but in the context of the entire patent, including the
`specification.” Id.
`
`“In some cases, the ordinary meaning of claim language as understood by a
`person of skill in the art may be readily apparent even to lay judges, and claim
`construction in such cases involves little more than the application of the widely
`
`3
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 3 of 41
`
`

`

`accepted meaning of commonly understood words. In such circumstances general
`purpose dictionaries may be helpful.” Id. at 1314 (internal citation omitted). In
`other cases, “determining the ordinary and customary meaning of the claim
`requires examination of terms that have a particular meaning in a field of art.” Id.
`Then “the court looks to those sources available to the public that show what a
`person of skill in the art would have understood disputed claim language to
`mean.” Id. (internal quotation marks omitted). These sources include “the words of
`the claims themselves, the remainder of the specification, the prosecution history,
`and extrinsic evidence concerning relevant scientific principles, the meaning of
`technical terms, and the state of the art.” Id. (internal quotation marks omitted).
`
`But it is improper to read limitations from the specification into the claim.
`Callicrate v. Wadsworth Mfg., Inc., 427 F.3d 1361, 1368 (Fed. Cir. 2005) (“[I]f we
`once begin to include elements not mentioned in the claim, in order to limit such
`claim . . . we should never know where to stop.”) (quoting Phillips, 415 F.3d at
`1312). A court does “not import limitations into claims from examples or
`embodiments appearing only in a patent’s written description, even when a
`specification describes very specific embodiments of the invention or even
`describes only a single embodiment, unless the specification makes clear that ‘the
`patentee . . . intends for the claims and the embodiments in the specification to be
`strictly coextensive.’” JVW Enters., Inc. v. Interact Accessories, Inc., 424 F.3d
`1324, 1335 (Fed. Cir. 2005) (internal citations omitted) (italics added).
`
`II. Means Plus Function Claims
`
`Under 35 U.S.C. § 112(6),2 means-plus-function claiming occurs when an
`element in a claim is a “means or step for performing a specified function without
`the recital of structure, material, or acts in support thereof . . . .” In that case, “such
`claim shall be construed to cover the corresponding structure, material, or acts
`described in the specification and equivalents thereof.” Id. This provision allows
`“patentees to express a claim limitation by reciting a function to be performed
`rather than by reciting structure for performing that function . . . .” Williamson v.
`Citrix Online, LLC, 792 F.3d 1339, 1347 (Fed. Cir. 2015) (en banc). At the same
`
`2 § 112(6) was renamed as § 112(f) by the America Invents Act, Pub. L. No. 112–29 (“AIA”),
`which took effect on September 16, 2012. Because the inventors here applied for the patents-in-suit
`before the act’s passage, § 112(6) applies here.
`
`4
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 4 of 41
`
`

`

`time, it constrains “how such a limitation is to be construed, namely, by restricting
`the scope of coverage to only the structure, materials, or acts described in the
`specification as corresponding to the claimed function and equivalents thereof.”
`Id.
`
`The failure to use the term “means” creates a rebuttable presumption that §
`112(6) does not apply. See Advanced Ground Info. Sys., Inc. v. Life360, Inc., 830
`F.3d 1341, 1347 (Fed. Cir. 2016). To overcome this presumption a challenger
`must show “that the claim term fails to recite sufficiently definite structure or else
`recites function without reciting sufficient structure for performing that function.”
`Id. (quoting Williamson, 792 F.3d at 1348). The challenger must establish §
`112(6)’s applicability by a preponderance of the evidence. Skky, Inc. v.
`MindGeek, s.a.r.l., 859 F.3d 1014, 1019 (Fed. Cir. 2017).
`
`Once a court concludes that a term is subject to § 112(6), it follows a two-
`step process. Williamson, 792 F.3d at 1351. “First, the court must determine the
`claimed function. Second, the court must identify the corresponding structure in
`the written description of the patent that performs the function.” Noah Sys., Inc. v.
`Intuit Inc., 675 F.3d 1302, 1311 (Fed. Cir. 2012) (internal citations omitted).
`“Where there are multiple claimed functions . . . the patentee must disclose
`adequate corresponding structure to perform all of the claimed functions. If the
`patentee fails to disclose adequate corresponding structure, the claim is
`indefinite.” Williamson, 792 F.3d at 1351.
`
`A corresponding structure is one that the specification or prosecution
`history “clearly links . . . to the function recited in the claim.” Id. The
`specification’s disclosure of a corresponding structure “must be of adequate
`corresponding structure to achieve the claimed function.” Id. (internal quotations
`omitted). “If a person of ordinary skill in the art would be unable to recognize the
`structure in the specification and associate it with the corresponding function in
`the claim, a means-plus-function clause is indefinite.” Id.
`
`For cases “involving a special purpose computer-implemented means-plus-
`function limitation,” the disclosed structure must “be more than simply a general
`purpose computer or microprocessor.” Noah, 675 F.3d at 1312. Instead, the
`specification must “disclose an algorithm for performing the claimed function.” Id.
`(quoting Net MoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359, 1367 (Fed. Cir.
`
`5
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 5 of 41
`
`

`

`2008)). “The specification can express the algorithm ‘in any understandable terms
`including as a mathematical formula, in prose, or as a flow chart, or in any other
`manner that provides sufficient structure.’” Id. (quoting Finisar Corp. v. DirecTV
`Grp., Inc., 523 F.3d 1323, 1340 (Fed. Cir. 2008)).
`
`CLAIM CONSTRUCTION
`
`“defined interaction” (’802 Patent, Claims 1, 6, 11, 23, 38, 39; ’135
`I.
`Patent, Claims 55, 57, 58) and “interaction with a host computing device in a
`defined way” (’802 Patent, Claims 38, 39)
`
`Defendants’
`Construction
`Both terms:
`Indefinite
`
`Court’s
`Construction
`“an interaction
`[with a host
`computing device]
`that can provide a
`variety of
`functionalities”
`
`SPEX’s Construction
`
`“defined interaction”:
`A specific, predefined functionality of the
`device, such as data storage, data
`communication, data input and output or
`user identification
`“interaction with a host computing device in
`a defined way”: “Interaction with a host
`computing device using a specific,
`predefined functionality of the device, such
`as data storage, data communication, data
`input and output or user identification
`
`The parties dispute whether the terms “defined interaction” and “interaction
`with a host computing device in a defined way” are indefinite. Defendants argue
`that the terms are indefinite because they “have no ordinary meaning in the art and
`are not defined or otherwise clarified by the specifications of the Asserted
`Patents.” Defendants Op. Br. at 3. Defendants argue that the claims themselves
`and the extrinsic evidence do not provide the metes and bounds of a “defined
`interaction” or otherwise clarify the term’s meaning. Id. at 4. Defendants also
`challenge SPEX’s construction as improperly swapping the term “interaction” for
`
`6
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 6 of 41
`
`

`

`the term “functionality” and the term “defined for the terms “specific, predefined.”
`Id. at 5–6.
`
`Claims 38 and 39 of the ’802 Patent include both the “defined interaction”
`and “interaction with a host computing device in a defined way” terms. In these
`two claims, the term “interaction with a host computing device in a defined way”
`provides an antecedent basis for the term “defined interaction.” For example,
`Claim 38 recites:
`
`38. For use in a peripheral device adapted for communication with
`a host computing device, performance of one or more security
`operations on data, and interaction with a host computing device in a
`defined way, a method comprising the steps of:
`receiving a request from a host computing device for
`information regarding the type of the peripheral device;
`and
`providing to the host computing device, in response to the
`request, information regarding the type of the defined
`interaction.
`
`Accordingly, these terms should be construed the same. Haemonetics Corp. v.
`Baxter Healthcare Corp., 607 F.3d 776, 780–82 (Fed. Cir. 2010).
`
`
`The ’802 Patent Abstract further discusses “defined interactions”:
`
`The defined interactions can provide a variety of types of
`functionality (e.g., data storage, data communication, data input and
`output, user identification). The peripheral device can also be
`implemented so that the security operations are performed in-line, i.e.,
`the security operations are performed between the communication of
`data to or from the host computing device and the performance of the
`defined interaction.
`
`’802 Patent at Abstract (emphasis added); see also id. at 3:33–36; ’135 Patent at
`4:18–31.
`
`7
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 7 of 41
`
`

`

`Defendants challenge SPEX’s construction for omitting the term
`“interaction.” Id. In doing so, Defendants acknowledge that they understand the
`plain meaning of the term “interaction.” See Defendants Op. Br. at 4–5 (arguing
`that SPEX’s proposed construction “conflicts with the meaning of the word
`‘interaction’. . .”). The Court agrees with Defendants that this word should not be
`read out of the claim terms.
`
`The Court similarly agrees that swapping the term “interaction” for the term
`“functionality” would be in error. As Defendants note, the patent specification
`refers to a defined interaction as providing a functionality. It would be nonsensical
`to construe an “interaction” as a “functionality” because it would lead portions of
`the specification to effectively state that a “functionality provides a functionality.”
`
`But while SPEX’s proposed constructions have a number of shortcomings,
`
`Defendants have not met their burden of showing by clear and convincing
`evidence that these claim terms are indefinite. As stated, Defendants acknowledge
`that the term “interaction” has meaning. Defendants also acknowledge that the
`specification refers to a defined interaction as providing “a variety of types of
`functionality.” Defendants Op. Br. at 5; see ’802 Patent at Abstract.
`
`Defendants’ only other argument appears to be that the term “defined” does
`not have a reasonably definite scope. The Court finds SPEX’s expert testimony on
`this issue persuasive:
`
`In the 1997 timeframe, it had become common to specify operating
`behavior for end-point devices in order to improve compatibility and
`interoperability within a host computing environment. Legacy
`systems that lacked this capability often demonstrated an inability to
`coexist and operate properly. The problem had become especially
`severe in open systems such as personal computers where circuit
`cards were commonly added to expand the system capabilities. Often
`these cards did not work as intended due to a mismatch of the
`expected behaviors. A person of ordinary skill in the timeframe of the
`patent was very familiar with these problems and would have been
`
`8
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 8 of 41
`
`

`

`familiar with the solutions. One such solution was to define the types
`of functionality within which a product would operate and to convey
`that information to the host computer.
`
`SPEX Op. Br., Attachment 10 (“Gomez Decl.”) ¶ 40. Mr. Gomez’s explanation of
`a solution that “define[s] the types of functionality within which a product would
`operate and [] convey[s] that information to the host computer” is consistent with
`how the patent claims and specification use the term “defined interaction.”
`Specifically, Mr. Gomez provides further explanation for the ordinary meaning of
`the word “defined” as it would be understood in the context of the patent.
`
`The Court finds the term “defined interaction” conveys a reasonably certain
`meaning to a person of skill in the art. The Court construes the term as “an
`interaction [with a host computing device] that can provide a variety of types of
`functionality.”
`
`II.
`
`“peripheral device” (’802 Patent, Claims 1, 2, 6, 7, 11, 12, 23, 25, 38, 39)
`
`SPEX’s Construction
`
`“Any device that operates
`outside of a host
`computing device (i.e. the
`keyboard-computer-screen
`system) and that is
`connected to the host
`computing device. Typical
`peripheral devices include
`but are not limited to a
`disk drive and a printer.”
`
`Defendants’
`Construction
`“any device that operates
`outside of a host
`computing device and that
`is connected to the host
`computing device”
`
`Court’s Construction
`
`“a device that operates
`outside of a host computing
`device and that is connected
`to the host computing
`device, including such
`devices in the same housing
`as the host computing
`device”
`
`The parties dispute whether “peripheral device” must be limited to a type of
`device located physically outside the housing or casing of a host computing
`
`9
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 9 of 41
`
`

`

`device. SPEX argues that a peripheral device may be housed with a host
`computing device, while Defendants argue the term must be limited solely to
`devices that exist physically apart from the host computing device. SPEX Op. Br.
`at 6–8; Defendants Op. Br. at 8–9.
`
`The specification explicitly defines a “peripheral device” as “any device that
`operates outside of a host computing device and that is connected to the host
`computing device.” ’802 Patent at 4:52–55. The parties, however, dispute whether
`this express definition (and specifically the word “outside”) requires a physical
`separation between the peripheral device and the host computing device.
`
`The term “peripheral device” appears in the preamble of the claims. For
`example, the preamble of Claim 1 of the ’802 Patent states: “[a] peripheral device,
`comprising . . . .” Id. at 18:55. The claims do not recite language that would
`impose a limitation on the physical location of the peripheral device.
`
`The parties dispute whether certain disclosure in the specification limits the
`term “peripheral device.” SPEX Op. Br. at 6–8; Defendants Op. Br. at 8–9;
`Defendants Resp. Br. at 4–5. Both parties tie their arguments about “peripheral
`device” to characterizations about the scope of the term “host computing device.”
`Id. For instance, SPEX asserts a narrow interpretation of host computing device,
`describing the “host computing device” as a system that may physically exist with
`other structures (such as a peripheral device) even though such structures are not
`considered part of the “host computing device.” SPEX Op. Br. 6–8 (citing ’802
`Patent at 6:23–33, Fig. 6). Specifically, SPEX cites to a portion of the patent
`specification that describes the “host computing device” as a “monitor, keyboard,
`CPU[,] and RAM combination.” Id. at 6–7 (citing ’802 Patent at 6:23–33, Fig. 6).
`
`Defendants argue that SPEX is attempting to narrow the meaning of “host
`computing device” by excluding internal hard drives. Defendants Resp. Br. at 4.
`Defendants contend that the patent discloses a broader interpretation of a “host
`computing device,” which includes the hard disk drives internally housed with the
`rest of the host computing device. Defendants’ Resp. Br. at 4. The ’802 Patent
`discloses:
`
`10
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 10 of 41
`
`

`

`[t]he peripheral device driver can have previously been installed on a
`data storage device (e.g., hard disk) of the host computing device (in
`FIG. 6, the peripheral device driver is shown stored in the memory
`section 606b of the memory device 606 of the host computing device
`601) . . . .
`
`’802 Patent at 9:5–9; see Defendants Resp. Br. at 4.
`
`The parties’ arguments about the scope of the term “host computing device”
`are tangentially related to the construction of “peripheral device.” Indeed, the
`parties have not asked the Court to construe the term “host computing device.” At
`bottom, these disclosures in the patent do not discuss the physical location of the
`“peripheral device.” Indeed, Defendants have not pointed to any disclosure in the
`patent explicitly restricting the location of the “peripheral device” to be physically
`separate from the “host computing device.” While the patent discloses that a driver
`can be stored on a hard disk or memory section in the host computing device, as
`depicted for example in Figure 6 of the ’802 Patent, Defendants fail to identify
`language in the specification that explicitly limits a “peripheral device” to a device
`that operates physically outside a host computing device. See ’802 Patent at 9:5–9,
`Fig. 6. Absent an unambiguous disclaimer, the Court finds “peripheral device”
`need not be physically separate from the host computing device.
`
`The extrinsic evidence supports this understanding of a peripheral device.
`According to Mr. Gomez’s expert testimony, “[h]ard drives (i.e., a permanent
`storage solution that resides in a computer case) were considered peripheral
`devices.” Gomez Decl. ¶ 48. Mr. Gomez cites a dictionary definition that states, in
`part, “[t]ypical peripherals are a disk drive, a printer. . . .” Id. (citing SPEX Op.
`Br., Ex. 6). This evidence is consistent with how a person of skill in the art would
`understand the term “peripheral device” in the context of the ’802 Patent.
`
`In view of the above, the Court construes “peripheral device” as “any device
`that operates outside of a host computing device and that is connected to the host
`computing device, including such devices in the same housing as the host
`computing device.”
`
`11
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 11 of 41
`
`

`

`III.
`
`“modular device” (’135 Patent, Claims 55, 57, 58)
`
`SPEX’s Construction
`
`Plain and ordinary
`meaning. The plain and
`ordinary meaning is:
`“physically separate
`devices that can be
`physically and
`electronically joined”
`
`Defendants’
`Construction
`“a device that operates
`outside of a host
`computing device and that
`is connected to the host
`computing device”
`
`Court’s Construction
`
`“a device that operates
`outside of a host computing
`device and that is connected
`to the host computing
`device”
`
`Defendants argue that peripheral device and modular device are used
`interchangeably by the asserted patents and should be construed the same.
`Defendants Op. Br. at 9–10 (citing ’135 Patent at 10:34–42, 9:45–48, 9:53–59).
`Unlike its arguments for peripheral device, SPEX argues that modular device has a
`plain and ordinary meaning and is a physically separate device that can be
`physically and electronically joined to the host computing device. SPEX Op. Br. at
`25 (citing ’135 Patent at 7:42–45).
`
`The specification uses the terms peripheral device and modular device
`interchangeably. For instance, the ’135 Patent states:
`
`Once connection between the modular device and the host computing
`device is made, the host computing device detects the presence of the
`modular device, as shown by step 502. Such detection of the presence
`of a peripheral device is typically enabled as a standard aspect of the
`operating system software of the host computing device.
`
`’135 Patent at 9:45–48; see also id. at 9:53–59, 10:34–42.
`
`SPEX’s argument that the modular device must be a physically separate
`device is unpersuasive. SPEX’s citations from the intrinsic record relate to
`
`12
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 12 of 41
`
`

`

`physically and electrically joining a security module and a target module in a
`particular embodiment. See ’135 Patent at 7:42–45 (“The security module 401 and
`target module 402 are physically separate devices that can be physically and
`electrically joined (as described further below) to enable communication between
`the modules 401 and 402.”). This disclosure does not require that a modular
`device be a physically separate device.
`
`The Court is also unpersuaded by Plaintiff’s argument about the prosecution
`history. See SPEX Op. Br. at 25. While the patent examiner referred to the
`peripheral device and modular device in slightly different terms (see SPEX Op.
`Br., Ex. 8 at 4), the patent applicant did not make any representations about the
`similarities or differences between a peripheral device and a modular device.
`Particularly given the ’135 Patent’s interchangeable use of the terms, there is no
`clear basis in the prosecution history for finding that these terms have different
`scope.
`
`The Court construes “modular device” consistent with “peripheral device”
`as “a device that operates outside of a host computing device and that is connected
`to the host computing device, including such devices in the same housing as the
`host computing device.”
`
`“security means for enabling one or more security operations to be
`IV.
`performed on data” (’802 Patent, Claims 1, 6, 11, 23, 25); “means for
`performing the one or more security operations” (’802 Patent, Claim 39)
`
`SPEX’s Construction
`
`Subject to 35 U.S.C. §
`112(6)
`Recited Function: enabling
`one or more security
`operations to be performed
`on data; performing the
`one or more security
`
`Defendants’
`Construction
`Subject to 35 U.S.C. §
`112(6)
`Recited Function: (1)
`enabling security
`operations to be performed
`on data; (2) performing the
`security operations
`
`Court’s Construction
`
`Subject to 35 U.S.C. §
`112(6)
`Recited Function: enabling
`one or more security
`operations to be performed
`on data; performing the one
`or more security operations
`
`13
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 13 of 41
`
`

`

`Corresponding Structures:
`1. A specific hardware
`component programmed or
`configured to perform a
`security operation
`disclosed in the ‘802
`Patent at 18:1-47 or the
`‘135 Patent at 21:29-22:9;
`2. A special purpose
`embedded processor,
`embodied on a single
`integrated chip and
`designated as MYK-82
`(and also referred to by the
`name Capstone), which
`includes an ARM6TM
`processor core and several
`special purpose
`cryptographic processing
`elements that have been
`developed by the
`Department of Defense.
`
`Corresponding Structures:
`1. A specific hardware
`component programmed or
`configured to perform a
`security operation
`disclosed in ‘802 Patent at
`18:1-47 or ‘135 Patent at
`21:29-22:9;
`2. A special purpose
`embedded processor,
`embodied on a single
`integrated chip and
`designated as MYK-82
`(and referred to by the
`name Capstone) , which
`includes an ARM6TM
`processor core and several
`special purpose
`cryptographic processing
`elements that have been
`developed by the
`Department of Defense
`(‘802 Patent at 15:67-16:8)
`
`operations
`Corresponding Structures:
`1. Cryptographic
`processing device 801
`(processor capable of
`performing the
`cryptographic operations ,
`as described at ‘802 Patent
`at 15:63-67);
`2. Security token (device
`that performs security
`operations and that include
`one or more mechanisms
`(such as, for example, use
`of a hardware random
`number generator and/or
`protected memory) to
`provide security for the
`content of those operations
`as described at ‘802 Patent
`at 5:33-39);
`3. A specific hardware
`component programmed or
`configured to perform a
`security operation
`disclosed in ‘802 Patent at
`18:1-47 or ‘135 Patent at
`21:29-22:9;
`4. A special purpose
`embedded processor,
`embodied on a single
`integrated chip and
`
`14
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 14 of 41
`
`

`

`designated as MYK-82
`(and referred to by the
`name Capstone) , which
`includes an ARM6TM
`processor core and several
`special purpose
`cryptographic processing
`elements that have been
`developed by the
`Department of Defense
`(‘802 Patent at 15:67-
`16:8); or
`5. Equivalents thereof.
`If an algorithm is
`necessary for any
`corresponding structures,
`SPEX identifies one or
`more of the security
`operations disclosed in the
`‘802 Patent at 18:1-47.
`
`The parties agree that the “security means . . .” terms are subject to § 112(6)
`and agree on two corresponding structures:
`
`1. A specific hardware component programmed or configured to
`perform a security operation disclosed in the ‘802 Patent at 18:1-47 or
`the ‘135 Patent at 21:29-22:9;
`
`2. A special purpose embedded processor, embodied on a single
`integrated chip and designated as MYK-82 (and also referred to by
`the name Capstone), which includes an ARM6TM processor core and
`several special purpose cryptographic processing elements that have
`been developed by the Department of Defense.
`
`15
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 15 of 41
`
`

`

`SPEX argues that this term should encompass two additional structures: a
`cryptographic processing device and a security token. SPEX Op. Br. at
`9–10. Defendants argue that the specification fails to disclose algorithms for
`these additional “generic elements” and they should be rejected. Defendants
`Op. Br. at 12–13.
`
`The “special purpose embedded processor” structure, which the
`parties agree on, is disclosed in the ’802 Patent as a type of cryptographic
`processing device 801:
`
`The cryptographic processing device 801 can be adapted to perform
`security operations. Generally, the cryptographic processing device
`801 can be embodied by any processor capable of performing the
`cryptographic operations desired to be provided by the peripheral
`device 800. In one embodiment of the peripheral device 800, the
`cryptographic processing device 801 is a special purpose embedded
`processor, embodied on a single integrated chip and designated as
`MYK-82 (and also referred to by the name Capstone), which includes
`an ARM6™ processor core and several special purpose cryptographic
`processing elements that have been developed by the Department of
`Defense. The construction and operation of the Capstone chip is
`known by those skilled in the art of cryptographic processing.
`
`’802 Patent at 15:63–16:9. The specification’s more general disclosure of a
`cryptographic processing device provides insufficient corresponding structure for
`this means plus function term. For patent claims “involving a special purpose
`computer-implemented means-plus-function limitation,” the disclosed structure
`must “be more than simply a general purpose computer or microprocessor.” Noah,
`675 F.3d at 1312. Instead, the specification must “disclose an algorithm for
`performing the claimed function.” Id. (quoting Net MoneyIN, Inc. v. VeriSign,
`Inc., 545 F.3d 1359, 1367 (Fed. Cir. 2008)). Besides the specific example
`provided, the patent’s disclosure of “any processor capable of performing the
`cryptographic operations desired” does not provide sufficient particularity to
`constitute a corresponding structure for this claim term.
`
`16
`
`WESTERN DIGITAL CORPORATION, EXHIBIT 1014
`Page 16 of 41
`
`

`

`SPEX’s proposed “security token” structure suffers from a similar defect.
`The ’802 Patent discloses:
`
`The security mechanism 302a can be, for example, embodied as a
`security token. Herein, “security token” refers to a device that
`performs security operations and that includes one or more
`mechanisms (such as, for example, use of a hardware random number
`generator and/or protected memory) to provide security for the
`content of those operations.
`
`’802 Patent at 5:33–39. SPEX argues that a “security token” is a “special purpose
`device” for performing cited functions. SPEX Op. Br. at 10. But SPEX does not
`argue that a security token is a device well known in the art to have a particular
`corresponding structure. Further, the ’802 Patent describes the security token
`generally and in terms of its functio

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket