572 F. Supp. 2d 511

SRI INTERNATIONAL INC., a California corporation, Plaintiff, v. INTERNET SECURITY SYSTEMS, INC., a Georgia corporation, Symantec Corporation, a Delaware corporation, and Internet Security Systems, Inc., a Delaware corporation, Defendants.

Civ. No. 04-1199-SLR.

United States District Court, D. Delaware.

Aug. 21, 2008.

*512Thomas Lee Halkowski, Timothy Dev-lin, Kyle Wagner Compton and John F. Horvath of Fish & Richardson, P.C., Wilmington, DE, Fish & Richardson, P.C. (Katherine D. Prescott, Todd G. Miller, of counsel), for plaintiff.

Richard L. Horwitz of Potter Anderson & Corroon, LLP, Wilmington, DE, King & Spalding LLP, Atlanta, GA (Holmes J. Hawkins III, Natasha H. Moffitt, of counsel), for Internet Security Systems, Inc.

David Ellis Moore of Potter Anderson & Corroon, LLP, Wilmington, DE, King & Spalding, New York, NY (Adam M. Conrad, Allison H. Altersohn, Charles A. Pan-nell, Latif Oduola-Owoo, Scott T. Weinga-ertner, of counsel), for Internet Security Systems, Inc.

Richard K. Herrmann and Mary Matter-er of Morris James LLP, Wilmington, DE, *513Day, Casebeer Madrid & Batehelder LLP, Cupertino, CA (Goffrey M. Godfrey, Katie J.L. Scott, Paul S. Grewal, Renee Bubord Brown and Robert M. Galvin, of counsel), for Symantec Corporation.

memorandum: opinion

SUE L. ROBINSON, District Judge.

I. introduction

Plaintiff SRI International, Inc. (“SRI”) brought suit against defendants Symantec Corporation (“Symantec”) and Internet Security Systems, Inc.1 (“ISS”) charging infringement of four patents: United States Patent Nos. 6,484,203 (“the '203 patent”), 6,708,212 (“the '212 patent”), 6,321,338 (“the '338 patent”), and 6,711,615 (“the '615 patent”). Currently before the court is defendants’ renewed motion for summary judgment that three of the four patents in suit are invalid pursuant to 35 U.S.C. § 102 and § 103.2 (D.I.297) The court’s initial summary judgment determination was affirmed in part, and vacated and remanded-in-part, by the United States Court of Appeals for the Federal Circuit. (D.1.491) The issues presently before the court were not reached previously and were renewed by defendants at the status conference held on April 29, 2008. (D.I.504) For the following reasons, defendants’ renewed motion for summary judgment of invalidity (D.I.297) is denied.

II. BACKGROUND

The patents in suit relate to the monitoring and surveillance of computer networks for intrusion detection. In particular, the patents in suit teach a computer-automated method of hierarchical event monitoring and analysis within an enterprise network that allows for real-time detection of intruders. Upon detecting any suspicious activity, the network monitors generate reports of such activity. The claims of the '203 and '615 patents focus on methods and systems for deploying a hierarchy of network monitors that can generate and receive reports of suspicious network activity. To detect attacks which do not possess deterministic signatures or to detect previously unknown (new) attacks, the patents in suit disclose the use of statistical detection methods on network data. The claims of the '338 patent are directed to a particular statistical algorithm for detecting suspicious network activity.

Mr. Porras and Peter G. Neumann, on behalf of plaintiff, published a conceptual overview of the EMERALD system3 in December 1996. (D.I.301, ex. JJ) In October 1997, the authors published a more thorough account of the EMERALD system in Emerald 1997. (Id., ex. E) Emerald 1997 was before the patent examiner during prosecution of the '338 patent, from whose application the remaining patents in suit were derived, and is listed as a reference on the face of the '615 patent. (Id., exs. A, B, & D) Within the text of Emerald 1997 are twenty-four citations to outside references. (Id. at 365) Two of those references included the Intrusive Activity 1991 reference.4 (D.I.301, ex. G) Mr. *514Porras is a named inventor on each of the patents in suit. (Id.,- exs. A-D)

III. STANDARD OF REVIEW

A court shall grant summary judgment only if “the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law.” Fed.R.Civ.P. 56(c). The moving party bears the burden of proving that no genuine issue of material fact exists. See Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 586 n. 10, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). “Facts that could alter the outcome are ‘material,’ and disputes are ‘genuine’ if evidence exists from which a rational person could conclude that the position of the person with the burden of proof on the disputed issue is correct.” Horowitz v. Fed. Kemper Life Assurance Co., 57 F.3d 300, 302 n. 1 (3d Cir.1995) (internal citations omitted). If the moving party has demonstrated an absence of material fact, the nonmoving party then “must come forward with ‘specific facts showing that there is a genuine issue for trial.’ ” Matsushita, 475 U.S. at 587, 106 S.Ct. 1348 (quoting Fed.R.Civ.P. 56(e)). The court will “view the underlying facts and all reasonable inferences therefrom in the light most favorable to the party opposing the motion.” Pa. Coal Ass’n v. Babbitt, 63 F.3d 231, 236 (3d Cir.1995). The mere existence of some evidence in support of the nonmoving party, however, will not be sufficient for denial of a motion for summary judgment; there must be enough evidence to enable a jury reasonably to find for the nonmoving party on that issue. See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 249, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). If the nonmoving party fails to make a sufficient showing on an essential element of its case with respect to which it has the burden of proof, the moving party is entitled to judgment as a matter of law. See Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986).

IV. DISCUSSION

A. Anticipation

A patent is anticipated under 35 U.S.C. § 102 if a single prior art reference explicitly discloses each and every limitation of the claimed invention. See Smith-Kline Beecham Corp. v. Apotex Corp., 403 F.3d 1331, 1343 (Fed.Cir.2005). The prior art reference must be a printed publication, published more than one year prior to the date of the patent application in the United States. See Helifix Ltd. v. Blok-Lok, Ltd., 208 F.3d 1339, 1346 (Fed.Cir.2000). The Federal Circuit has stated that “[tjhere must be no difference between the claimed invention and the reference disclosure, as viewed by a person of ordinary skill in the field of the invention.” Scripps Clinic & Research Found. v. Genentech, Inc., 927 F.2d 1565, 1576 (Fed.Cir.1991). “In determining whether a patented invention is [explicitly] anticipated, the claims are read in the context of the patent specification in which they arise and in which the invention is described.” Glaverbel Societe Anonyme v. Northlake Mktg. & Supply, Inc., 45 F.3d 1550, 1554 (Fed.Cir.1995). The prosecution history and the prior art may be consulted “[i]f needed to impart clarity or avoid ambiguity” in ascertaining whether the invention is novel or was previously known in the art. Id. (internal citations omitted).

A prior art reference also may anticipate without explicitly disclosing a feature of the claimed invention if that missing characteristic is inherently present in the single anticipating reference. See Continental Can Co. USA v. Monsanto Co., 948 *515F.2d 1264, 1268 (Fed.Cir.1991). The Federal Circuit has explained that an inherent limitation is one that is necessarily present and not one that may be established by probabilities or possibilities. See id. at 1268-69. That is, “ ‘[t]he mere fact that a certain thing may result from a given set of circumstances is not sufficient.’ ” Id. at 1269 (citations omitted). The Federal Circuit also has explained that “inherency operates to anticipate entire inventions as well as single limitations within an invention.” Schering Corp. v. Geneva Pharms. Inc., 339 F.3d 1373, 1380 (Fed.Cir.2003). Recognition of the inherent limitation by a person of ordinary skill in the art before the critical date is not required to establish inherent anticipation. See id. at 1377.

An anticipation inquiry involves two steps. First, the court must construe the claims of the patent in suit as a matter of law. See Key Pharm. v. Hercon Labs. Corp., 161 F.3d 709, 714 (Fed.Cir.1998). Second, the finder of fact must compare the construed claims against the prior art. See id. A finding of anticipation invalidates the patent. See Applied Med. Resources Corp. v. U.S. Surgical Corp., 147 F.3d 1374, 1378 (Fed.Cir.1998). Issued patents are presumed valid, and the “underlying determination of invalidity ... must be predicated on facts established by clear and convincing evidence.” Rockwell Int’l Corp. v. United States, 147 F.3d 1358, 1362 (Fed.Cir.1998) (citations omitted).

Defendants argue in their renewed motion for summary judgment that the so-called JiNao Report anticipates independent claims 1 and 24 of the '338 patent.5 The JiNao Report issued in April 1997 as part of a collaborative project6 “aim[ed] at designing and developing a software system for protecting against intruders from breaking into network routers, switches, and network management channels.” (D.I. 507, ex. F at 1) Although the stated goal of the project was to protect network infrastructure, the scope of the project was limited to “the development of local detection capabilities;” “detection conditions” were “confined to those that manifest on a local scale, specifically, those than can be observed somehow by neighboring entities.”7 (Id. at 12-13) To this end, the *516 JiNao intrusion detection system intercepts and redirects “the target protocol information flow” to various modules for performance of both “statistical- and protocol-based intrusion checks.” “Any behavior deviating from the normal signature will be considered as an anomaly and appropriate alarms can be triggered.” (Id. at 5) With respect to the “components of the statistical approach,”

[ajspects of subject behavior are represented as measures (e.g., packet ...). For each measure, we will construct a probability distribution of short-term and long-term behaviors. For example, for the packet types received, the long-term probability distribution would consist of the historical probabilities with which different types of packets have been received, and the short-term probability distribution would consist of the recent probabilities with which different types packets have been received. In this case, the categories to which probabilities are attached are the names of packet types, which are learned by the system as they are received. We would classify] the Ji-Nao measures into two groups: activity intensity and audit record distribution measures. These two types of measures serve different dimensional purposes. The activity intensity measures determine whether the volume of general activity in the recent past ... is normal. These measures can detect bursts of activity or prolonged activity that is abnormal, primarily based on the volume of audit data generated. The audit record distribution measure determines whether, for recently observed activity (say, the last few hundred audit records received), the types of actions being generated across neighbors are normal. For example, we might find that the last 200 routing packets received contained 120 of Hello packets, 15 of Database Description packets, 10 of Link State Request packets, 35 of Link State Update packets, and 20 of Acknowledgment packets. These data are compared to a profile of previous activity ... to determine whether or not the distribution of activity types generated in the recent past (i.e., the last few hundred audit records) is unusual.

(Id. at 19)

The above paragraph illustrates the factual issue at bar. Although plaintiff concedes that the JiNao Report applied statistical methods and generated long-term and short-term statistical profiles, plaintiff argues that the data that formed the basis of these profiles was audit data, to be distinguished from “at least one measure of the network packets.” (D.I. 507, ex. 1 at 25) The JiNao Report unquestionably refers both to receipt of different “packet types”8 and analysis of audit data/audit records.9 (D.I. 507, ex. F at 19-20) Based on the record, it is unclear to the court10 whether the JiNao intrusion detection system in fact builds its statistical profiles from at least one measure of network packets received, given that the scope of the JiNao project was limited to “the development of local detection capabilities.” (D.I. 507, ex. *517F at 13) Because the scale of the JiNao Report arguably was different than that of the '338 patent, the court declines to find through a motion practice that the functions of the two systems (and semantics used to describe those functions) are exactly the same.

B. Obviousness

“A patent may not be obtained ... if the differences between the subject matter sought to be patented and the prior art are such that the subject matter as a whole would have been obvious at the time the invention was made to a person having ordinary skill in the art.” 35 U.S.C. § 103(a). Obviousness is a question of law, which depends on several underlying factual inquiries.

Under § 103, the scope and content of the prior art are to be determined; differences between the prior art and the claims at issue are to be ascertained; and the level of ordinary skill in the pertinent art resolved. Against this background the obviousness or nonobvi-ousness of the subject matter is determined. Such secondary considerations as commercial success, long felt but unsolved needs, failure of others, etc., might be utilized to give light to the circumstances surrounding the origin of the subject matter sought to be patented.

KSR Int'l Co. v. Teleflex Inc., — U.S. -, -, 127 S.Ct. 1727, 1734, 167 L.Ed.2d 705 (2007) (quoting Graham v. John Deere Co., 383 U.S. 1, 17-18, 86 S.Ct. 684, 15 L.Ed.2d 545 (1966)). “Because patents are presumed to be valid, see 35 U.S.C. § 282, an alleged infringer seeking to invalidate a patent on obviousness grounds must establish its obviousness by facts supported by clear and convincing evidence.” Kao Corp. v. Unilever U.S., Inc., 441 F.3d 963, 968 (Fed.Cir.2006) (citation omitted).

“[A] patent composed of several elements is not proved obvious merely by demonstrating that each of its elements was, independently, known in the prior art.” KSR, 127 S.Ct. at 1741. Likewise, a defendant asserting obviousness in view of a combination of references has the burden to show, by clear and convincing evidence, that a person of ordinary skill in the relevant field had a reason to combine the elements in the manner claimed, Id. at 1741-42. The Supreme Court has emphasized the need for courts to value “common sense” over “rigid preventative rules” in determining whether a motivation to combine existed. Id. at 1742^3. “[A]ny need or problem known in the field of endeavor at the time of invention and addressed by the patent can provide a reason for combining the elements in the manner claimed.” Id. at 1742.

In addition to showing that a person of ordinary skill in the art would have had reason to attempt to make the composition or device, or carry out the claimed process, defendant must also demonstrate by clear and convincing evidence that “such a person would have had a reasonable expectation of success in doing so.” PharmaStem Therapeutics, Inc. v. Via-Cell, Inc., 491 F.3d 1342, 1360 (Fed.Cir.2007).

Defendants argue in their renewed motion for summary judgment that Emerald 1997 in combination with an internally cited reference to Intrusive Activity 1991 renders obvious the asserted claims of the '203 and '615 patents.11 (D.I. *518299 at 22) The limitation at issue is that of particular categories of network traffic. According to defendants, it would have been obvious in light of the express teaching in Emerald 1997 to analyze those network traffic categories based upon the citation to Intrusive Activity 1991. (D.I. 299 at 23) The court, therefore, must determine whether: (1) Intrusive Activity 1991 disclosed one of the claimed categories of network traffic data; and (2) there was a reason to combine Emerald 1997 with Intrusive Activity 1991.

With respect to Intrusive Activity 1991, the following are disclosed: (1) intrusion detection systems “examine available sources of information;” (2) the main source of information for most intrusion detection systems is the audit trail generated by the operating system; (3) observation of network packets, however, can also be used as a basis to detect intrusive activity through a system description language (“SDL”); (4) the SDL provides a structure that allows for the generalization of basic objects to detect complex objects and assigns meaning to those objects to determine whether intrusive activity is present; (5) basic objects, “similar to terminal symbols in traditional programming languages,” are packets;12 (6) complex objects are composed of basic objects and/or other complex objects and can include a “stream” of packets; (7) a “stream” is a complex object type which defines a process and includes the “number of packets exchanged” between two processes; (8) “[ojnce the structural grammar, attributes, and attribute functions have been defined, a second set of functions, called behavior-detection functions, must be defined for each object in the structural grammar,” allowing for a determination regarding whether the object is associated with intrusive activity. (D.I.508, ex. D) (Intrusive Activity 1991 at 363-69)

Defendants argue that Intrusive Activity 1991 specifically disclosed analysis of the claimed network traffic data category “network packet data volume.” (D.I. 500 at 2 n. 3) Defendants, however, provide no expert testimony in support of this asser*519tion, relying solely on the text.13 Plaintiff argues that this text concerns the syntax for creating a descriptive language that provided the general framework for the Network Security Monitor (“NSM”) and, in this regard, proffers Dr. George Kesi-dis’ testimony.14 (See D.I. 507, ex. J at ¶ 40) More specifically, plaintiff asserts that the “cited language says literally nothing about using packet data volume to detect suspicious activity.”15 (D.I. 502 at 2) Based on the above, it is unclear to the court whether the discussion of “network packet data volume” contained in Intrusive Activity 1991 sufficiently discloses to one having ordinary skill in the art that this parameter could be used to detect suspicious network activity such that the limitation at issue is rendered obvious.

Defendants’ argument that Intrusive Activity 1991 discloses network connection “requests” and “denials” also does not persuade the court that summary judgment is warranted. Relying on the text of Intrusive Activity 1991, which states that “network connections are created and destroyed continuously,” defendants simply assert that “[o]ne of ordinary skill would have understood this disclosure of analyzing the creation and destruction of network connections to disclose monitoring network connection requests and network connection denials.” (D.I. 508, ex. B at 31-32) As with the alleged disclosure of “network packet data volume,” the court is not comfortable with granting summary judgment where the meaning of the text to a person having ordinary skill in the art is unclear.16 In other words, a genuine issue of material fact exists regarding what a person having ordinary skill in the art would interpret the disclosure in Intrusive Activity 1991 to convey.

Y. CONCLUSION

For the reasons stated, defendants’ renewed motion for summary judgment (D.I. 297) is denied. An appropriate order shall issue.

ORDER

At Wilmington this 21st day of August, 2008, consistent with the memorandum opinion issued this same date;

IT IS ORDERED that defendants’ renewed motion for summary judgment (D.I. 297) is denied.

SRI International Inc. v. Internet Security Systems, Inc.
572 F. Supp. 2d 511

Case Details

Name
SRI International Inc. v. Internet Security Systems, Inc.
Decision Date
Aug 21, 2008
Citations

572 F. Supp. 2d 511

Jurisdiction
United States

References

Referencing

Nothing yet... Still searching!

Referenced By

Nothing yet... Still searching!