Cioffi v. Google LLC

CourtCourt of Appeals for the Federal Circuit
DecidedApril 18, 2023
Docket18-1049
StatusUnpublished

This text of Cioffi v. Google LLC (Cioffi v. Google LLC) is published on Counsel Stack Legal Research, covering Court of Appeals for the Federal Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Cioffi v. Google LLC, (Fed. Cir. 2023).

Opinion

Case: 18-1049 Document: 61 Page: 1 Filed: 04/18/2023

NOTE: This disposition is nonprecedential.

United States Court of Appeals for the Federal Circuit ______________________

ALFONSO CIOFFI, MELANIE ROZMAN, MEGAN ROZMAN, MORGAN ROZMAN, Plaintiffs-Appellees

v.

GOOGLE LLC, Defendant-Appellant ______________________

2018-1049 ______________________

Appeal from the United States District Court for the Eastern District of Texas in No. 2:13-cv-00103-JRG, Chief Judge J. Rodney Gilstrap. ______________________

Decided: April 18, 2023 ______________________

CHRISTIAN JOHN HURT, The Davis Firm, PC, Longview, TX, argued for plaintiffs-appellees. Also represented by WILLIAM DAVIS; ERIC W. BENISEK, ROBERT MCARTHUR, Vasquez Benisek & Lindgren, LLP, Walnut Creek, CA.

ANDREW DUFRESNE, Perkins Coie LLP, Madison, WI, argued for defendant-appellant. Also represented by DAN L. BAGATELL, Hanover, NH; NATHAN K. KELLEY, Washing- ton, DC; DAVID ALMELING, MARK LIANG, LUANN LORAINE Case: 18-1049 Document: 61 Page: 2 Filed: 04/18/2023

SIMMONS, DARIN W. SNYDER, O'Melveny & Myers LLP, San Francisco, CA. ______________________

Before REYNA, BRYSON, and TARANTO, Circuit Judges. BRYSON, Circuit Judge. The plaintiffs-appellees (collectively, “Cioffi”) brought this patent infringement action against defendant-appel- lant Google LLC, alleging infringement of a total of four claims across three patents. Following a trial, the jury found the asserted claims to be infringed and not invalid. The district court then addressed the question whether the asserted claims were invalid under 35 U.S.C. § 251 and held that they were not. We reverse the district court’s de- termination that the claims were not invalid. I A Cioffi asserted four patent claims against Google in this case: claim 43 of U.S. Patent No. RE43,500 (“the ’500 patent”); claims 5 and 67 of U.S. Patent No. RE43,528 (“the ’528 patent”); and claim 49 of U.S. Patent No. RE43,529 (“the ’529 patent”). Each of the asserted patents is a reis- sue patent of U.S. Patent No. 7,484,247 (“the ’247 patent”). The asserted patents and the ’247 patent are all di- rected to the use of multiple processors or processes in a computer system to prevent malware obtained over a net- work from accessing certain data stored on the computer. As the specification of the ’247 patent explains, prior art computer systems would frequently run “a known and trusted set of programs” concurrently with an “Internet browser” and other programs such as “Java applets[] or EXE/COM executables.” ’247 patent, col. 4, ll. 60–65. Those latter programs, the specification notes, could “pos- sibly contain[] malware.” Id. at col. 4, ll. 65–66. When the known and trusted programs share memory and resources Case: 18-1049 Document: 61 Page: 3 Filed: 04/18/2023

CIOFFI v. GOOGLE LLC 3

with programs that may contain malware, the malware may be “capable of corrupting critical files on the shared memory storage medium.” Id. at col. 6, ll. 56–64. To address that problem, the ’247 patent discloses “a means of isolating the network interface program [e.g., a web browser] from the main computer system such that the network interface program does not share a common memory storage area with other programs.” Id. at col. 7, ll. 1–4. In such a system, the specification explains, “malware programs are rendered unable to automatically corrupt critical system and user files located on the main memory storage area.” Id. at col. 7, ll. 9–11. For purposes of this appeal, claim 49 of the ’529 patent is generally representative of the asserted claims. Claim 49 depends from claim 36 of the ’529 patent. Those claims recite: 36. A method of operating a portable computer based system employing a common operating sys- tem and configured with a first memory space and a second protected memory space and at least one electronic data processor, comprising: storing at least one system file within the first memory space; downloading website content potentially contain- ing malware from a network of one or more com- puters using a secure web browser process, wherein the secure web browser process is config- ured to execute on the at least one electronic data processor, and comprises a first web browser pro- cess and at least one second protected web browser process, the first web browser process and the at least one second protected web browser process be- ing configured to access the website content via the network of one or more computers; Case: 18-1049 Document: 61 Page: 4 Filed: 04/18/2023

executing instructions in the first web browser pro- cess, wherein the first web browser process is con- figured to access data contained in the first memory space and to initialize the at least one sec- ond protected web browser process; passing data from the first web browser process to the at least one second protected web browser pro- cess; executing instructions in the at least one second protected web browser process, wherein the at least one second protected web browser process is config- ured to access data contained in the second pro- tected memory space and to execute instructions from the downloaded website content, wherein the downloaded website content is capable of accessing the second protected memory space but is denied access to the first memory space; displaying digital content generated by the secure web browser process; wherein the secure web browser process is config- ured such that the at least one system file residing on the first memory space is protected from corrup- tion by website content potentially containing mal- ware downloaded from the network and executing as part of the at least one second protected web browser process. *** 49. The method of claim 36 further comprising: executing instructions from the first web browser process on a first core of a multi-core processor; and executing instructions from the at least one second protected web browser process on a second core of the multi-core processor. Case: 18-1049 Document: 61 Page: 5 Filed: 04/18/2023

CIOFFI v. GOOGLE LLC 5

’529 patent, claims 36, 49. The asserted claims of the ’500 and ’528 patents are similar, although claim 43 of the ’500 patent and claim 67 of the ’528 patent recite a “computer program product” configured to perform certain steps ra- ther than a method of operating a computer system. The specification of the ’247 patent discloses several embodiments that are relevant to this appeal. Figure 1 of the ’247 patent depicts a computer system that contains a first processor (“P1”), a first memory (“M1”), a second pro- cessor (“P2”), and a second memory (“M2”). ’247 patent, col. 9, ll. 30–47; id. at col. 10, ll. 29–37; id. at Fig. 1. In that embodiment, P1 can access the data stored in M1 and M2, while P2 can access only the data stored in M2. Id. at col. 10, ll. 43–58. Additionally, only P2 is used to access the network. See id. at col. 10, ll. 29–31. That arrangement has the effect of “isolat[ing]” P1 and M1 from the network such that malware may not “initiat[e] unwanted intrusions on [P1].” Id. at col. 10, ll. 40–43. Figure 2 of the ’247 patent depicts a “process flow” ac- cording to which the system of Figure 1 operates. Id. at col. 10, ll. 64–66. In that embodiment, a user may open a “pro- tected process,” such as a web browser program, that exe- cutes on P2. Id. at col. 11, ll. 2–11. Meanwhile, P1 “receives user interface data,” such as keystrokes, from a user and passes that data to P2 when the protected process is active. Id. at col. 11, ll. 17–22. P2 then generates “video data” from the protected process and passes that data to a “video processor,” which is separate from P1 and P2. Id. at col. 11, ll. 27–29; id. at Fig. 1.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Corbin Cabinet Lock Co. v. Eagle Lock Co.
150 U.S. 38 (Supreme Court, 1893)
Antares Pharma, Inc. v. Medac Pharma Inc.
771 F.3d 1354 (Federal Circuit, 2014)
Cioffi v. Google, Inc.
632 F. App'x 1013 (Federal Circuit, 2015)
Forum US, Inc. v. Flow Valve, LLC
926 F.3d 1346 (Federal Circuit, 2019)

Cite This Page — Counsel Stack

Bluebook (online)
Cioffi v. Google LLC, Counsel Stack Legal Research, https://law.counselstack.com/opinion/cioffi-v-google-llc-cafc-2023.