Rembrandt Patent Innovations v. Apple, Inc.

CourtCourt of Appeals for the Federal Circuit
DecidedNovember 22, 2017
Docket16-2324
StatusUnpublished

This text of Rembrandt Patent Innovations v. Apple, Inc. (Rembrandt Patent Innovations v. Apple, Inc.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Federal Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Rembrandt Patent Innovations v. Apple, Inc., (Fed. Cir. 2017).

Opinion

NOTE: This disposition is nonprecedential.

United States Court of Appeals for the Federal Circuit ______________________

REMBRANDT PATENT INNOVATIONS, LLC, REMBRANDT SECURE COMPUTING, LP, Plaintiffs-Appellants

v.

APPLE, INC., Defendant-Appellee ______________________

2016-2324 ______________________

Appeal from the United States District Court for the Northern District of California in Nos. 3:14-cv-05093- WHA, 3:14-cv-05094-WHA, Judge William H. Alsup. ______________________

Decided: November 22, 2017 ______________________

J. MICHAEL JAKES, Finnegan, Henderson, Farabow, Garrett & Dunner, LLP, Washington, DC, argued for plaintiffs-appellants. Also represented by EDWARD ROBERT YOCHES; JACOB ADAM SCHROEDER, Palo Alto, CA.

MARK S. DAVIES, Orrick, Herrington & Sutcliffe LLP, Washington, DC, argued for defendant-appellee. Also represented by MELANIE L. BOSTWICK, KATHERINE M. KOPP, AMISHA R. PATEL; CHRISTOPHER JAMES GASPAR, 2 REMBRANDT PATENT INNOVATIONS v. APPLE, INC.

ANDREW LICHTENBERG, Milbank, Tweed, Hadley & McCloy LLP, New York, NY; MARK C. SCARSI, Los Ange- les, CA. ______________________

Before PROST, Chief Judge, CHEN, and HUGHES, Cir- cuit Judges. CHEN, Circuit Judge. Plaintiffs (collectively, Rembrandt) sued Apple, Inc. (Apple) for infringement of U.S. Patent No. 6,185,678 (the ’678 patent). The district court construed certain terms in the ’678 patent’s claims and granted Apple’s motion for summary judgment of noninfringement. Rembrandt appeals the district court’s claim construction and nonin- fringement rulings. We affirm. BACKGROUND I. The ’678 Patent The ’678 patent describes techniques for securely ini- tializing, or “bootstrapping,” a computer system. ’678 patent col. 1 ll. 23–25. The asserted claims recite systems and methods for verifying the integrity of a computer’s boot components and recovering at least one boot compo- nent that is found to be corrupted. Verification involves a “chain of integrity checks,” executed by certain hardware and a computer’s Basic Input Output System (BIOS), to determine whether boot components have been corrupted. Id. col. 6 ll. 6–24. Recovery involves the replacement of any corrupted boot components. Apple’s noninfringement arguments hinge on whether the claimed recovery step must be performed automatically without human inter- vention, as Apple argues, or whether there is no such requirement, as Rembrandt argues. Figure 2a depicts the functional steps and components used in a preferred embodiment of the claimed invention: REMBRANDT PATENT INNOVATIONS v. APPLE, INC. 3 4 REMBRANDT PATENT INNOVATIONS v. APPLE, INC.

In Figure 2a, verification begins when a computer is powered on and executes a “Power on Self Test” (POST) at functional layer 200, which tests the computer’s processor and initiates other tests controlled by the BIOS. Id. col. 7 l. 61 – col. 8 l. 11. Components at layer 200 are “assumed to be valid.” Id. col. 8 ll. 48–49. Control is subsequently passed from one functional layer to the next, but only after each layer cryptographically verifies the integrity of components in the next layer. Once initialized, each layer adds correspondingly higher levels of capability to the system. Verification of all boot layers ensures the sys- tem’s integrity before control is passed to the computer’s operating system. Recovery takes place only if verification detects an in- tegrity failure. “Once an integrity failure is detected, the invention uses a secure protocol to inform a trusted repository that a failure has occurred and to obtain a valid replacement component.” Id. col. 4 ll. 49–51. As depicted in Figure 2a, the claimed “trusted repository” may be implemented via the “AEGIS ROM” component for “secure recovery of any integrity failures found during the initial bootstrap.” Id. col. 10 ll. 47–67. The specification describes the ’678 patent’s invention as “relat[ing] to an architecture for initializing a computer system and more particularly to a secure bootstrap pro- cess and automated recovery procedure.” ’678 patent col. 1 ll. 23–25. According to the specification, the invention achieves a reduction in the total cost of owning a personal computer by “automatically detecting and repairing integrity failures,” without requiring a user to call tech- nical support staff or suffer any machine downtime. Id. col. 4 ll. 60–65. Rembrandt asserted claims 1, 3, 4, and 7 of the ’678 patent. Independent claim 1 recites: An architecture for initializing a computer system comprising: REMBRANDT PATENT INNOVATIONS v. APPLE, INC. 5

a processor; an expansion bus coupled to said processor; a memory coupled to said expansion bus, said memory storing a system BIOS for execution by said processor upon power up of the computer sys- tem; a plurality of boot components coupled to said expansion bus and accessed by said processor when said system BIOS is executed; a trusted repository coupled to said expansion bus; and means for verifying the integrity of said boot components and said system BIOS wherein integ- rity failures are recovered through said trusted repository. Id. col. 21 l. 39 – col. 22 l. 11. Claim 3 depends from claim 1 and recites: An architecture for initializing a computer system according to claim 1, wherein said trusted repository is a host computer communicating with said computer system through a communications interface coupled to said expansion bus. Id. col. 22 ll. 15–19. Independent claim 4 recites: A method for initializing a computer system comprising the steps of: (1) invoking a Power on Self Test (POST); (2) verifying the integrity of a system BIOS; (3) verifying the integrity of a boot component; and 6 REMBRANDT PATENT INNOVATIONS v. APPLE, INC.

(4) when said boot component fails, recovering said failed boot component. Id. col. 22 ll. 20–26. Claim 7 depends from claim 4 and recites: The method of claim 4, wherein step (4) em- ploys a secure protocol to obtain a replacement boot component from a trusted repository to re- place said failed boot component. Id. col. 22 ll. 37–40. II. The Accused Products Rembrandt accuses various models of Apple’s iPhone, iPad, and iPod Touch devices of infringing the asserted claims. Each of the accused products runs Apple’s operat- ing system for mobile devices, iOS. When products run- ning iOS are powered on, their processors initiate a verification procedure that uses a chain of integrity checks, starting with the execution of software stored in a SecureROM component. Additional software components in the boot sequence include, in order of access: the LLB, iBoot, and iOS kernel. Each of the boot components, other than the iOS kernel, checks the integrity of the next boot component by comparing a measured cryptographic value of the next component with a value obtained from a stored digital signature. When iOS’s boot process suc- ceeds, each component in the boot chain is verified, and the iOS kernel loads the iOS operating system. When the integrity of a boot component cannot be ver- ified, the accused mobile devices enter one of two recovery modes: Device Firmware Update (DFU) Mode or Recovery Mode. The devices enter DFU Mode when SecureROM fails to verify the integrity of LLB or when LLB fails to verify the integrity of iBoot. The devices enter Recovery Mode when iBoot fails to verify the integrity of the iOS kernel. Upon entering a recovery mode, Apple’s devices REMBRANDT PATENT INNOVATIONS v. APPLE, INC. 7

will display either a blank screen (in DFU Mode) or an image prompting users to restore their devices using Apple’s iTunes software (in Recovery Mode). In either recovery mode, Apple’s customer support web pages and service guides instruct a user to connect the corrupted mobile device to a computer running iTunes. The corrupted device will be unusable unless the user connects it to a computer running iTunes and initi- ates the recovery process.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Graver Tank & Mfg. Co. v. Linde Air Products Co.
339 U.S. 605 (Supreme Court, 1950)
Warner-Jenkinson Co. v. Hilton Davis Chemical Co.
520 U.S. 17 (Supreme Court, 1997)
Verizon Services Corp. v. Vonage Holdings Corp.
503 F.3d 1295 (Federal Circuit, 2007)
Honeywell International, Inc. v. ITT Industries, Inc.
452 F.3d 1312 (Federal Circuit, 2006)
Thorner v. Sony Computer Entertainment America LLC
669 F.3d 1362 (Federal Circuit, 2012)
Dolly, Inc. v. Spalding & Evenflo Companies, Inc.
16 F.3d 394 (Federal Circuit, 1994)
Vitronics Corporation v. Conceptronic, Inc.
90 F.3d 1576 (Federal Circuit, 1996)
Telemac Cellular Corporation v. Topp Telecom, Inc.
247 F.3d 1316 (Federal Circuit, 2001)
Brilliant Instruments, Inc. v. Guidetech, LLC.
707 F.3d 1342 (Federal Circuit, 2013)
Tolan v. Cotton
134 S. Ct. 1861 (Supreme Court, 2014)
Augme Technologies, Inc. v. Yahoo! Inc.
755 F.3d 1326 (Federal Circuit, 2014)
Virnetx, Inc. v. Cisco Systems, Inc.
767 F.3d 1308 (Federal Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
Rembrandt Patent Innovations v. Apple, Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/rembrandt-patent-innovations-v-apple-inc-cafc-2017.