Hilgraeve, Inc. v. Symantec Corp.

271 F. Supp. 2d 964, 2003 U.S. Dist. LEXIS 11999, 2003 WL 21686228
CourtDistrict Court, E.D. Michigan
DecidedJuly 9, 2003
DocketCIV. 97-40370
StatusPublished
Cited by3 cases

This text of 271 F. Supp. 2d 964 (Hilgraeve, Inc. v. Symantec Corp.) is published on Counsel Stack Legal Research, covering District Court, E.D. Michigan primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Hilgraeve, Inc. v. Symantec Corp., 271 F. Supp. 2d 964, 2003 U.S. Dist. LEXIS 11999, 2003 WL 21686228 (E.D. Mich. 2003).

Opinion

MEMORANDUM OPINION AND ORDER

GADOLA, District Judge.

Before the Court are the following motions: (1) Defendant’s motion for summary judgment of invalidity; (2) Plaintiffs motion for summary judgment that the asserted claims of the ’776 patent are not invalid; and (3) Plaintiffs motion for summary judgment of infringement. The Court heard oral argument on the first two motions at a hearing held on April 23, 2003. The Court heard oral argument on the third motion at a hearing held on May 12, 2003. For reasons set forth below, the Court shall deny Defendant’s motion for summary judgment of invalidity, grant Plaintiffs motion for summary judgment that the asserted claims of the ’776 patent are not invalid, and deny Plaintiffs motion for summary judgment of infringement.

I. BACKGROUND

Plaintiff Hilgraeve, Inc. (“Plaintiff’) is a Michigan corporation with its principal place of business in Michigan. Plaintiff is the owner of U.S. Patent No. 5,319,776 (“ ’776 patent”), which issued on June 7, 1994 to inventors John K. Hile, Matthew H. Gray, and Donald L. Wakelin and was thereafter assigned to Plaintiff. Defendant Symantec Corporation (“Defendant”) is a Delaware corporation with its principal place of business in California. The ’776 patent is entitled “In Transit Detection of Computer Virus With Safeguard.” Plaintiff filed the Complaint in this patent infringement action on September 15, 1997. Plaintiff filed an Amended Complaint on January 21, 2003, pursuant to an order of this Court. See Hilgraeve Corp. v. Symantec Corp., 212 F.R.D. 345, 350 (E.D.Mich.2003) (Gadola, J.). In the Amended Complaint, Plaintiff alleges a single count of patent infringement pursuant to 35 U.S.C. § 271. Plaintiff alleges that the use of Defendant’s products directly infringes the ’776 patent and that Defendant induces others to infringe the ’776 patent. On February 6, 2003, Defendant filed a counterclaim in response to the Amended Complaint, alleging that the ’776 patent is invalid and that its products are non-infringing.

On March 28, 2000, this Court granted Defendant’s motion for summary judgment of non-infringement. See Hilgraeve Corp. v. Symantec Corp. 90 F.Supp.2d 850, 859, 861 (E.D.Mich.2000) (“Symantec F). On appeal, the Federal Circuit vacated this Court’s order granting Defendant’s motion for summary judgment of non-infringement and remanded this case for further proceedings. See Hilgraeve Corp. v. Symantec Corp., 265 F.3d 1336, 1346 (Fed.Cir. 2001) (“Symantec II”). 1 On remand, Defendant moves for summary judgment of invalidity. Plaintiff moves for summary judgment that the asserted claims of the ’776 patent are not invalid and for summary judgment of infringement.

A. THE’776 PATENT

The Federal Circuit has explained that [t]he ’776 patent relates to computer virus detection software. The software scans a digital data file for viruses as the file is transferred to a storage medium. If the software detects a virus prior to storing the file, it automatically blocks storage of the file. The software may be used, for example, to scan a file for viruses as the file is transferred from a floppy disk to a hard disk of a computer system, or as the file is transferred over the Internet from one computer system *967 to a storage medium of another computer system.

Symantec II, 265 F.3d at 1339.

The ’776 patent contains twenty claims, yet only independent claims 1 and 18 were at issue in Symantec I and II. Claims 1 and 18 read as follows:

1. In a system for transferring digital data for storage in a computer storage medium, a method of screening the data as it is being transferred and automatically inhibiting the storage of screened data containing at least one predefined sequence, comprising the steps of: causing a quantity of digital data resident on a source storage medium to be transferred to a computer system having a destination storage medium;
receiving and screening the transferred digital data prior to storage on the destination storage medium to determine if at least one of a plurality of predefined sequences are present in the digital data received;
and
in response to said screening step:
(a) automatically causing the screened digital data to be stored on said destination storage medium if none of the plurality of predefined sequences are present,
and
(b) automatically inhibiting the screened digital data from being stored on said destination storage medium if at least one predefined sequence is present.
18. A method of preventing the spread of computer viruses to a computer having a storage medium, comprising the steps of: simultaneously searching for a plurality of virus signatures, each of which comprising an identifiable digital sequence, while said computer is receiving a stream of digital data for storage on said storage medium;
providing an indication of the detection of a virus from said searching step; and automatically inhibiting the storage of said digital stream on said storage medium if any of said virus signatures have been detected.

’776 patent, col. 17,11. 9-29 and col. 18,11. 45-57.

B. PRIOR DECISIONS

1. Symantec I

In Symantec I, this Court focused its claim construction on the meaning of the word “storage” in claims 1 and 18 of the ’776 patent. See Symantec I, 90 F.Supp.2d at 856-58. This Court held that “storage occurs when the incoming digital data is sufficiently present on the destination storage medium so that any viruses contained in the data can spread and infect the computer system.” Symantec I, 90 F.Supp.2d at 857. After construing the term “storage,” the Court compared the accused devises to claims 1 and 18 of the ’776 patent. In so doing, the Court outlined the operation of Defendant’s products as follows:

The transferred file is accessible to other programs prior to being examined by the accused products because the Norton AntiVirus Scan Engine is not invoked and does not access the transferred file until after the operating system closes the file. To invoke the Norton AntiVirus Scan Engine, the file to be scanned must be completely received and stored on the local disk drive, the file must be. closed, and the file name of the closed file must be given to the Norton AntiVirus Scan Engine. In short, the accused products scan for viruses only after the entire file has been transferred and after the file has been stored on the destination storage medium.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Kotula
200 F. App'x 472 (Sixth Circuit, 2006)
Hilgraeve, Inc. v. Symantec Corp.
272 F. Supp. 2d 613 (E.D. Michigan, 2003)

Cite This Page — Counsel Stack

Bluebook (online)
271 F. Supp. 2d 964, 2003 U.S. Dist. LEXIS 11999, 2003 WL 21686228, Counsel Stack Legal Research, https://law.counselstack.com/opinion/hilgraeve-inc-v-symantec-corp-mied-2003.