Tviim, LLC v. McAfee, Inc.

851 F.3d 1356, 122 U.S.P.Q. 2d (BNA) 1381, 122 U.S.P.Q. (BNA) 1381, 2017 WL 1056113, 2017 U.S. App. LEXIS 4979
CourtCourt of Appeals for the Federal Circuit
DecidedMarch 21, 2017
Docket2016-1562
StatusPublished
Cited by9 cases

This text of 851 F.3d 1356 (Tviim, LLC v. McAfee, Inc.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Federal Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Tviim, LLC v. McAfee, Inc., 851 F.3d 1356, 122 U.S.P.Q. 2d (BNA) 1381, 122 U.S.P.Q. (BNA) 1381, 2017 WL 1056113, 2017 U.S. App. LEXIS 4979 (Fed. Cir. 2017).

Opinion

REYNA, Circuit Judge.

TVIIM, LLC (“TVIIM”) sued McAfee, Inc. (“McAfee!’) in the United States District Court for the Northern District of California for infringement of U.S. Patent No. 6,889,168 (“’168 patent”). A jury determined that McAfee did not infringe the T68 patent and that the T68 patent was invalid. After the jury verdict, TVIIM filed motions for judgment as a matter of law (“JMOL”) and for a new trial. The district court denied both motions, and TVIIM filed this appeal challenging the jury verdict and the district court’s denial of its post-verdict motions. We affirm because substantial evidence supports the jury’s findings of non-infringement and invalidity under a uniform construction of the relevant claim terms, and the district court did not abuse its discretion in denying a new trial.

Background

1. The T68 Patent

The T68 patent is entitled “Method and Apparatus for Assessing the Security of a Computer.” It describes “a security system which identifies security vulnerabilities and discrepancies for a computing system.” T68 patent, coi. 1,11. 65-67. The T68 patent both identifies potential security threats to a computer and, under certain conditions, recommends action to a user to stop the threat.

*1360 Four claims of the ’168 patent are relevant to this appeal. Independent claim 1 recites:

A security system for a computer apparatus, wherein said computer apparatus includes a processor and system memory, said security system comprising:
at least one security module which under direction from the processor accesses and analyzes selected portions of the computer apparatus to identify vulnerabilities;
at least one utility module which under the direction from the processor, performs various utility functions with regards to the computer apparatus in response to the identified vulnerabilities; and
a security system memory which contains security information for performing the analysis of the computer apparatus.

’168 patent, col. 10, 1. 65 to col. 11, 1. 10 (disputed terms emphasized).

Dependent claim 7 recites:

The security system of claim 1 wherein the security modules include at least one of ... an integrity checking module which analyzes files in the system memory to identify system vulnerabilities;
a network checking module which analyzes the computer apparatus to identify vulnerabilities created as a result of the computer apparatus connecting with a data network; and
a password checking module which analyzes passwords for users of the computer apparatus to identify vulnerabilities.

Id. col. 11,11. 25-46 (disputed term emphasized).

Dependent claim 9 recites: “The security system of claim 7 wherein the system memory comprises a list of known vulnerabilities which may be employed by the integrity checking module.” Id. col. 11, 11. 62-64.

Finally, independent claim 11 recites:

A method of providing a security assessment for a computer system which includes a system memory, comprising the steps of:
providing a security subsystem in the computer system such that functionality of the security subsystem is directed through a processor for the computer system, wherein the security performs steps comprising:
identifying a configuration of the system;
accessing the system memory and performing at least one procedure to provide a security assessment for at least one aspect of the computer system;
as a result of any vulnerabilities discovered in the assessment, identifying corrective measures to be taken with regards to the computer system;
reporting the discovered vulnerability and the identified corrective measures; and
upon receiving an appropriate command, initiating the corrective measures.

Id. col. 12,11. 1-18 (disputed terms emphasized).

2. McAfee

McAfee developed “Program Updates” for Microsoft Windows users to protect software programs against new security threats. Program Updates detects and installs updates for numerous non-Windows programs such as Apple iTunes and Adobe Acrobat. To do so, it scans a user’s computer to determine whether any of the non-Windows programs are installed. If it detects such a program, Program Updates makes two determinations: (1) whether the *1361 National Vulnerability Database (“NVD”) lists any vulnerabilities in the currently installed version of that program; and (2) whether an update is available. If an update is available, Program Updates will install the update.

Prior to installing an update, Program Updates does not provide users with a detailed report of security threats; rather, it tells the user whether an update is “Critical” or merely “Recommended.” J.A. 2044-46, 3338. If an update is available, Program Updates will install the available update whether or not the NVD lists any known vulnerabilities. By contrast, if no software update is available, Program Updates will not take action even if it detects a vulnerability. Without an available update, Program Updates will not provide users with any information about a detected vulnerability. J.A. 2047-48. To summarize, the presence of a known vulnerability is irrelevant to whether Program Updates installs an update.

3. Prior Art

At trial, McAfee argued that two prior art references anticipated the ’168 patent and, in the alternative, that their combination would have rendered the T68 patent obvious.

The first reference, HostGUARD, is a software program developed by several named inventors of the ’168 patent. Host-GUARD first detects computer security threats and then reports them to the user. J.A. 1090, 3796-97. These detailed reports include file names and locations, the particular nature of the vulnerability, and steps the user can take to combat the threat. HostGUARD requires the user to decide whether to take corrective action. Thus, the user (not HostGUARD itself) takes any desired corrective action. J.A. 3796.

The second reference, System Security Scanner (“S3”), is a “security assessment tool” that “evaluates system vulnerabilities from the inside.” J.A. 3799. S3 allows a user to select which specific vulnerabilities to assess and then provides a “detailed description” of detected vulnerabilities to the user. J.A. 3816, 3801, 3836. For example, it offers a “long description” report that identifies “bugs” that create exploitable weaknesses in the system. J.A. 2610-11; see also J.A. 2293 (testimony that S3 provides users with reports on “specific vulnerabilities found on specific computers”).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
851 F.3d 1356, 122 U.S.P.Q. 2d (BNA) 1381, 122 U.S.P.Q. (BNA) 1381, 2017 WL 1056113, 2017 U.S. App. LEXIS 4979, Counsel Stack Legal Research, https://law.counselstack.com/opinion/tviim-llc-v-mcafee-inc-cafc-2017.