[00:00:00] Speaker 00: This afternoon is number 18-1404 in Cora Technologies, Inc. [00:00:05] Speaker 00: versus HTC America. [00:00:08] Speaker 00: Mr. Lorelli. [00:00:16] Speaker 02: Thank you, Your Honor. [00:00:17] Speaker 02: Mr. Lorelli, if we agree within Cora that the district court erred in not addressing in step one the argument regarding the asserted claims improvement in [00:00:29] Speaker 02: computer functionality because it said it was better considered in step two. [00:00:36] Speaker 02: Is in court asserting that we have to remand to do it right or are you asking us to reverse based upon a finding the claims are abstract? [00:00:48] Speaker 04: With the step one analysis your honor it's de novo so you can make that decision right here. [00:00:57] Speaker 04: The court didn't consider [00:00:59] Speaker 04: whether it was a technological improvement in step one, which is what led us down this road. [00:01:04] Speaker 04: But that's where it began. [00:01:07] Speaker 04: There are basically three errors by the district court judge in its 101 decision on the pleadings. [00:01:13] Speaker 04: The first one was characterizing the claim too broadly. [00:01:17] Speaker 04: The second was holding that the claim was directed to an abstract idea when the specification and other decisions made clear that the 941 patent claims are directed to improvements [00:01:28] Speaker 04: to a technical problem of software piracy. [00:01:31] Speaker 04: And the third was its finding that modification and use of erasable non-volatile memory of the bios for license verification of software programs was somehow routine and conventional when that is in direct contradiction with the specification. [00:01:45] Speaker 02: Okay. [00:01:46] Speaker 02: You compare these asserted claims to visual memory. [00:01:50] Speaker 02: Yes. [00:01:51] Speaker 02: And there we found eligible a memory system with programmable operational characteristics that determine the type of data stored. [00:02:00] Speaker 02: And that was similar to the ENFISH specific referential table. [00:02:08] Speaker 02: It was very specifically done code data buffering by a bus master and so forth. [00:02:15] Speaker 02: I'm harder pressed to find similar support [00:02:20] Speaker 02: in the 941 patent's claims or written description for how to accomplish setting up the verification structure. [00:02:28] Speaker 04: Setting up the verification structure is disclosing the specification as using e-squared prom manipulation commands. [00:02:36] Speaker 04: Those are manipulation commands that don't exist on a generic computer. [00:02:42] Speaker 04: That's why the examiner, before allowing the claim, said that you need to claim an agent to set up that verification structure. [00:02:52] Speaker 04: So that's the [00:02:54] Speaker 04: support and specification for the specifics, the tool that's needed to do this, the tool that's needed to make the modification of the bios. [00:03:03] Speaker 00: But the problem is it doesn't tell you how to use the tool. [00:03:07] Speaker 00: And as I understand it, with the blue brief 27 footnote 4, you say that's within the knowledge of someone's skill in the art. [00:03:17] Speaker 00: The patent does not tell you how to do it, right? [00:03:19] Speaker 04: It does not tell you specifically how to do it. [00:03:22] Speaker 04: It tells you the tools to use to do it, those EPROM manipulation commands. [00:03:27] Speaker 04: And one of Skill in the Art would know how to use those commands by using some of the prior art that was, in fact, cited in the original examination. [00:03:39] Speaker 04: It is using those manipulation commands for a specific... Those manipulations. [00:03:45] Speaker 02: are standard in the art, am I correct, for manipulating ROM? [00:03:51] Speaker 04: Well, they don't manipulate ROM, Your Honor, and I think that's an issue. [00:03:55] Speaker 04: EPROM. [00:03:57] Speaker 04: EPROM. [00:03:57] Speaker 04: There are standards that teach people how to do it. [00:04:01] Speaker 04: I don't know that it's widespread, but there are standards that teach people how to do that. [00:04:10] Speaker 01: Your basic submission is essentially a Enfish type submission that this is for 101, never mind about 102 and 103, that the subject of this is improving computer functionality in the specific sense that you are using [00:04:33] Speaker 01: components of the computer to safeguard the computer in ways that had not been done before. [00:04:43] Speaker 04: I think that's very wrong. [00:04:45] Speaker 01: And you may be wrong about whether they hadn't been done or whether they're obvious. [00:04:51] Speaker 01: That's for a different day. [00:04:53] Speaker 04: But I think if you look at the concept of the specification that we have here, the specification is very clear. [00:05:03] Speaker 04: We talked about infish, and we talked about fails and visual memory. [00:05:08] Speaker 04: And all of those cases were very similar. [00:05:10] Speaker 04: When you look at the specification, you can often tell a lot about an invention. [00:05:15] Speaker 04: And in this case, the specification... One would hope. [00:05:17] Speaker 04: One would hope. [00:05:18] Speaker 04: But one wouldn't, often doesn't, when they're looking at some of the claims that are attacked under 101. [00:05:26] Speaker 04: In our specification, we talk about the technical problem. [00:05:30] Speaker 04: software piracy. [00:05:31] Speaker 04: It's a problem that didn't exist before computers. [00:05:34] Speaker 04: Before computers, there was no software that could be no software piracy. [00:05:37] Speaker 00: Just to be clear, what is happening here and what the invention is, is moving the licensed software from one place to another, right? [00:05:48] Speaker 00: In the second place, it's more difficult to hack. [00:05:51] Speaker 04: That is one notion of the improvement over one of the items of prior art solutions that was disclosed in the specification. [00:05:59] Speaker 04: There's another set of improvements over the other prior art that was disclosed in the specification. [00:06:03] Speaker 04: That was use of a dongle. [00:06:05] Speaker 04: Whenever I would want to run a software program, I'd have to plug a dongle into one of the ports in order for it to operate. [00:06:12] Speaker 04: And BIOS is very important, your honor, in understanding how it was back in 1998. [00:06:19] Speaker 04: It was October 1st, 1998, 20 years. [00:06:22] Speaker 02: BIOS boots up, yes? [00:06:24] Speaker 02: Yes. [00:06:25] Speaker 02: That's what it does. [00:06:27] Speaker 04: It boots the computer up. [00:06:28] Speaker 04: And folks that use computers don't have access to it. [00:06:32] Speaker 00: And it does checking for licenses at the time it boots up, right, with respect to the operating system? [00:06:38] Speaker 04: It does not, Your Honor. [00:06:40] Speaker 04: It does not check for licenses for software. [00:06:42] Speaker 04: It does not. [00:06:42] Speaker 00: Does it check for licenses for hardware? [00:06:45] Speaker 04: I believe it checks for the existence of hardware, but not for licenses of it, Your Honor. [00:06:51] Speaker 04: And BIOS, it's not something that a program could get to. [00:06:57] Speaker 04: That's one of the, again, I'm making 103 arguments, your honor, but that's for a different day, but it is for a different day. [00:07:04] Speaker 04: What we have here is a unique implementation. [00:07:08] Speaker 02: You're effectively modifying firmware, is that right? [00:07:11] Speaker 02: Yes, your honor. [00:07:12] Speaker 04: And in 1998, that's not something that computer programmers did. [00:07:18] Speaker 04: That's not something that computer programmers could do with a generic computer. [00:07:23] Speaker 04: And again, back to the specification. [00:07:28] Speaker 04: did a great job here, outlining the prior art solutions to the computer piracy problem and identifying the solution that was set forth in the specification and the solution that was claimed in claim one of the 941 patent. [00:07:44] Speaker 04: So then when we get a step one Alice analysis that says, wait a second, your claim is just directed to this abstract concept, which by the way, could read on all those prior art solutions too, we're taking a back. [00:07:58] Speaker 04: because the whole patent was written to focus on the use and modification of the E double, E squared prom, prom, to improve the security of licensing mechanisms. [00:08:17] Speaker 04: And that's what the invention was and did. [00:08:20] Speaker 04: And obviously we'll get to 103 a different day, but this is, this is what the. [00:08:28] Speaker 04: 102. [00:08:29] Speaker 04: But this is what the patent is directed to, the claim is directed to. [00:08:35] Speaker 04: So when we get an opinion that doesn't go through the specification, the prosecution history, and just assumes that claim one is directed to an abstract idea, which is, if you notice on page nine of our blue brief, we highlighted the parts of the claims that the district court said were the abstract idea. [00:08:55] Speaker 04: It's a very, it's like 10 words out of, you know, a hundred word claim, but it misses the heart of it. [00:09:02] Speaker 04: It misses what the patent was all about. [00:09:04] Speaker 04: So that's where we struggle a lot with the determination of an abstract idea. [00:09:10] Speaker 04: But when we go back to the specification, the specification talks about how it's a technological improvement. [00:09:17] Speaker 04: And from Alice to Infish to visual memory, we have to investigate whether [00:09:25] Speaker 04: the claims embody a technical improvement. [00:09:28] Speaker 04: And if we do that by looking at the specification, the answer is clear. [00:09:32] Speaker 04: In this case, we have more help because HTC filed a petition for a CBM, a covered business method. [00:09:39] Speaker 04: And there the PTAB decided after looking at the filings that the 941 patent claims was a technical solution to a technical problem. [00:09:50] Speaker 04: We believe that's enough to bring us out of step one [00:09:54] Speaker 01: And I don't remember, but when the board rejected the CBM petition, did it do it on... The CBM definition of the statute is a two... Yeah, the statute is a two-part one, right? [00:10:10] Speaker 01: It has to be in a business method and not a technical solution. [00:10:15] Speaker 01: Which of those steps did the board find this pattern not to be? [00:10:23] Speaker 04: I can have that answer for you when I stand back up here, your honor, but the focus of the analysis was technical solution, technical problem. [00:10:30] Speaker 01: I see, not the, this just doesn't claim anything business, I'm using the short hand. [00:10:36] Speaker 04: I believe that's accurate, your honor, but I would like to check on that. [00:10:40] Speaker 04: So we are, we believe, like visual memory, because visual memory was deciding based on the processor that's involved in the computer what type of data to store on the cache. [00:10:53] Speaker 04: Cache still stored data, but they made a determination based on something else. [00:10:59] Speaker 04: We believe we're in lockstep with visual memory. [00:11:01] Speaker 04: And then if we take it to the second step, and we take it there and look at an inventive concept, we have a lot of support that the inventive concept is modifying and using this type of BIOS in a new and revolutionary manner, something that wasn't done before. [00:11:19] Speaker 04: the district court that we had a case against Apple in 2012 when she went through the intrinsic record tech tutorial and experts found in actually I believe said the inventive aspect of this claim is exactly what we're pointing to here today. [00:11:40] Speaker 04: But I believe that in this step two, we are locked up with Bascom if we get that far, Your Honor. [00:11:47] Speaker 01: 319 is the relevant passage of the CBN decision, which says what you said it says. [00:11:53] Speaker 00: Thank you, Your Honor. [00:11:56] Speaker 00: Okay. [00:11:56] Speaker 00: I'm going to save your remodel. [00:12:00] Speaker 00: Mr. Lateef. [00:12:07] Speaker 03: May it please the court, Mr. Latif for HTC. [00:12:11] Speaker 02: Mr. Latif, and Cora says that before the 9-4-1 patent, OS-level programs did not traditionally interact with BIOS, and that one skilled in the art would not consider storing licensing information for programs in the computer's BIOS. [00:12:29] Speaker 02: That's in their blue brick at 34. [00:12:32] Speaker 02: And the Red Rape responds that that is demonstrably false. [00:12:37] Speaker 02: I'm looking at page 35 of the red brief. [00:12:41] Speaker 02: And they cite the patent examiner who said in the patent's prosecution record that, quote, that the prior art taught the use of underlined bios memory for storing license numbers. [00:12:56] Speaker 02: That's in your red brief at 35, Judge, from you. [00:13:00] Speaker 02: Am I correct? [00:13:03] Speaker 03: I couldn't hear the last part. [00:13:04] Speaker 02: Am I correct that that's it? [00:13:06] Speaker 02: at 35 in the red brief. [00:13:07] Speaker 02: Yes. [00:13:09] Speaker 02: So I go and look at the examiner's notice of allowability at 283. [00:13:15] Speaker 02: It appears to me that HDC omitted the rest of the examiner's explanation. [00:13:24] Speaker 02: The examiner goes on to say, quote, while it appears initially to render obvious the 9-4-1 pattern, [00:13:33] Speaker 02: quote, the prior art systems singly or collectively do not teach licensed programs running at the OS level interacting with a program verification structure stored in the bios to verify the program using the verification structure and having a user act on the program according to the verification. [00:13:56] Speaker 02: That's at 283 in the record. [00:14:01] Speaker 02: Why was that? [00:14:03] Speaker 02: remainder of the examiner's explanation omitted. [00:14:15] Speaker 02: And I'll tell you, my concern, one of them, in addition to it being omitted, is I start with your argument that the court has been lied to, that a demonstrably false statement has been made in the [00:14:34] Speaker 02: So why was that omitted? [00:14:37] Speaker 03: We were just summarizing what the examiner had stated. [00:14:43] Speaker 02: Isn't it reasonable for me to conclude that, in fact, the mischaracterization is in the red brief and not in the blue brief? [00:14:53] Speaker 03: No, I do not believe so. [00:14:54] Speaker 03: I mean, there is nothing in the claims that talk about this OS interaction with the bias. [00:15:00] Speaker 02: The language that I read here. [00:15:04] Speaker 02: seems to be not only pertinent to your statement in the red read, but contradictory. [00:15:12] Speaker 02: Is it not? [00:15:21] Speaker 02: Can you tell me why? [00:15:24] Speaker 02: I want to hear. [00:15:28] Speaker 03: We were just summarizing what the Notice of Allowance said, and I believe that the Notice of Allowance is talking about this interaction which is not in the claims. [00:15:40] Speaker 03: And the fact that the spec talks about including EPROM manipulation commands in no way limits whether the spec is talking about [00:15:53] Speaker 03: the manipulation commands from the OS or from any other device or programming. [00:15:59] Speaker 02: The examiner goes on to say, it is well known to those of ordinary skill of the art, he says, that a computer BIOS is not set up to manage a software license verification structure. [00:16:19] Speaker 02: Do you disagree with that? [00:16:21] Speaker 03: I agree he said that. [00:16:22] Speaker 03: I don't agree that that's pertinent to the claims at issue because the claims do not call for the bias to manage anything. [00:16:32] Speaker 03: The bias is just memory and it stores whatever you put in it. [00:16:35] Speaker 03: It is not required to manage or interact with anything and the claims here don't require it either. [00:16:45] Speaker 03: The prior art reference that the examiner referred to earlier on the top of that page clearly states that Ewerts teaches the use of bias memory for storing licensed numbers. [00:16:59] Speaker 03: So the examiner himself is contradicting an earlier statement that he made in that notice of balance. [00:17:09] Speaker 02: Does conventional bios include a quote, erasable non-volatile memory? [00:17:15] Speaker 03: I believe that the spec says that. [00:17:21] Speaker 03: The spec states that the invention includes a conventional computer. [00:17:33] Speaker 01: What are you reading from? [00:17:35] Speaker 03: Yeah, I'm sorry. [00:17:36] Speaker 03: It's column 1, 946. [00:17:44] Speaker 03: And it starts thus consider a conventional computer having a conventional bias module in which a key was embedded at the ROM section thereof. [00:17:56] Speaker 03: So the bias module has a ROM section. [00:18:00] Speaker 03: It goes on, and then I can read the whole thing, but the next part that is relevant is around line 65 of column 1, which states, the resulting encrypted license record is stored in another second non-volatile section of the bias. [00:18:20] Speaker 03: It's clearly still talking about the conventional bias module that has at least two sections. [00:18:28] Speaker 02: Do you agree? [00:18:29] Speaker 02: that generic computer components can sometimes operate in such an unconventional manner as to achieve improvement in functionality? [00:18:41] Speaker 02: Keep Amdocs in mind. [00:18:43] Speaker 03: I do not believe that is the case here. [00:18:48] Speaker 02: You agree it can be? [00:18:52] Speaker 03: I have to hear the question again, I'm sorry. [00:18:53] Speaker 03: Okay, that's right. [00:18:55] Speaker 02: Do you agree that generic computer components can sometimes operate [00:19:00] Speaker 02: in such an unconventional manner that they achieve an improvement in functionality? [00:19:05] Speaker 03: Yes. [00:19:07] Speaker 03: But I don't believe that is the case here. [00:19:09] Speaker 03: The functionality of the computer hasn't changed. [00:19:13] Speaker 03: It operates the same way. [00:19:15] Speaker 03: it still verifies a license. [00:19:18] Speaker 03: The licensing procedure that the claims are directed to has not been improved. [00:19:24] Speaker 03: What has been improved is the economic problem of license being attacked by a hacker. [00:19:32] Speaker 03: Whether a hacker could get into the bias, that functionality existed before this invention. [00:19:40] Speaker 00: In other words, what you're saying is the license verification technology is the same whether it's starred in BIOS or elsewhere. [00:19:48] Speaker 03: Correct. [00:19:49] Speaker 03: Just moving the verification structure from the hard drive to the BIOS is not an improvement in computer technology. [00:20:00] Speaker 02: Why isn't it? [00:20:01] Speaker 02: Instead of using a dongle or instead of having it accessible to a hacker, [00:20:08] Speaker 02: Isn't that different? [00:20:09] Speaker 03: It is different, but I don't believe it's invented and I don't believe it's unconventional to use memory as memory. [00:20:17] Speaker 03: The bias is just memory. [00:20:18] Speaker 02: Does it make it harder for a hacker? [00:20:22] Speaker 03: It could. [00:20:22] Speaker 02: Yes, bias is... Isn't that an improvement to functionality? [00:20:25] Speaker 03: That's not an improvement to the functionality of the computer. [00:20:28] Speaker 03: That is a property the computer had before this invention. [00:20:32] Speaker 01: In Enfish, the computer had the possibility of being programmed to have these cross-referencing tables. [00:20:45] Speaker 03: I agree that there are, if you look at computer technology, there's always an argument that could be made that new software is something that changes the computer, but I don't think it's enough just to have some new software to automatically make the argument that that's an improvement in the computer functionality or else all software cases [00:21:08] Speaker 03: could be argued to be an improvement in computer functionality. [00:21:14] Speaker 01: Right, but what Enfish does, and some of the later cases do, is pick up on the Alice parent lesson of the U.S. [00:21:26] Speaker 01: government's submission that computer improvements [00:21:30] Speaker 01: are on the eligibility side of the line and try to give it a real world definition so as not to be limited to new hardware but new ways of using the basic computer functionality of input output systems, displays to improve those things without regard to the particular [00:21:56] Speaker 01: use being made of the ultimate resulting computer operation. [00:22:03] Speaker 01: Once we start drawing that line, as indeed we have, and he said it's a necessary line to draw, then why exactly is this not on the Enfish virtual memory side of that line? [00:22:19] Speaker 03: Because this used conventional, ordinary technology in a conventional, ordinary way. [00:22:25] Speaker 02: Oh, let me ask you this. [00:22:27] Speaker 02: Is a hacked computer less functional? [00:22:30] Speaker 02: Would you agree with me on that? [00:22:33] Speaker 03: Yes. [00:22:34] Speaker ?: Okay. [00:22:35] Speaker 02: It's been hacked, so I guess it... So if you make it less hackable, it's more functional. [00:22:41] Speaker 02: Would you agree with that? [00:22:43] Speaker 03: It depends on what perspective you look at functionality. [00:22:46] Speaker 03: I believe that the test is whether the computer is able to function better as in efficiency, as in memory, as in database storage and processing. [00:22:55] Speaker 03: The processing of the computer has not been changed at all by the use of the bias as a memory. [00:23:01] Speaker 02: It's able to function less worse. [00:23:03] Speaker 02: Is that okay? [00:23:06] Speaker 03: No, it's not OK. [00:23:07] Speaker 03: It's not less worse if it could be hacked. [00:23:10] Speaker 03: Besides the fact that it could be hacked, it might be difficult to hack if it doesn't change the functionality of the computer. [00:23:22] Speaker 03: Thank you. [00:23:31] Speaker 04: Mr. Lorelli? [00:23:33] Speaker 04: Just a few comments, Your Honors. [00:23:37] Speaker 00: The statement that... Is it true that the functionality of the computer has not been changed? [00:23:44] Speaker 04: Absolutely not, your honor. [00:23:47] Speaker 04: They want to see the functionality of the computer, how it would work if people were licensed and using it properly. [00:23:53] Speaker 04: It has been changed for those hackers. [00:23:58] Speaker 04: Security has been improved. [00:24:00] Speaker 04: That is the functionality that we're talking about here. [00:24:03] Speaker 04: That's the technological investment. [00:24:05] Speaker 00: I mean, that is what we're talking about, is an improvement in computer security, not an improvement in the way the computer actually functions, right? [00:24:16] Speaker 04: That would be accurate, your honor. [00:24:18] Speaker 04: It's an improvement in computer security, license security, so that those companies that spend all that money designing software can protect those investments. [00:24:31] Speaker 04: The point is that [00:24:35] Speaker 04: We talk about improvements. [00:24:37] Speaker 04: Improvements, you've got to look at something that came before it. [00:24:40] Speaker 04: And the improvement is in the security of the process. [00:24:43] Speaker 04: That was different from if you just stored it on a hard drive. [00:24:46] Speaker 04: Or if you want to talk about the dongle, it's actually interesting standing here. [00:24:50] Speaker 02: Your opposing counsel agrees that a computer that's been hacked is less functional. [00:24:56] Speaker 04: Then maybe I should stop then, Your Honor. [00:25:02] Speaker 04: But the comment that really got to me was that we were just using conventional stuff in a conventional way, and that's just wrong. [00:25:11] Speaker 00: Oh, wait, wait. [00:25:12] Speaker 00: I mean, I thought you admitted earlier that you haven't changed the license verification process. [00:25:19] Speaker 00: It's just a question of where it's stored, which is more protective from hacking, right? [00:25:26] Speaker 04: Your Honor, and if I did say that, perhaps I misspoke. [00:25:29] Speaker 04: We moved it to it. [00:25:31] Speaker 04: not necessarily move to a different area because you can't do that on a normal computer. [00:25:37] Speaker 04: It was set up in a BIOS area, an area that people never considered using for licensing. [00:25:45] Speaker 00: I understand that argument, but the fact is it's just storing it in a different place. [00:25:49] Speaker 00: Maybe that's 101 eligible, maybe it's not, but that's what this is about, right? [00:25:55] Speaker 04: That is an issue as to what it's about. [00:25:57] Speaker 04: The benefits that you obtain [00:26:00] Speaker 04: from use of the BIOS for license security. [00:26:05] Speaker 02: But it's also a way of doing that, is it not? [00:26:08] Speaker 04: It's one way. [00:26:10] Speaker 02: But I say storing it in the booting system requires methodology, which you've also developed. [00:26:23] Speaker 02: That is, modification of the instructions. [00:26:28] Speaker 04: Correct, Your Honor. [00:26:29] Speaker 04: That's the prerequisite to the whole process. [00:26:32] Speaker 00: So the process is different. [00:26:33] Speaker 00: I thought there was no claim that you had invented a new instruction that was done using conventional approaches. [00:26:44] Speaker 00: What we're talking about here is making this 101 eligible is the fact, the very fact of moving it from one area to the other. [00:26:53] Speaker 00: You haven't invented [00:26:56] Speaker 00: a way of moving it from one place to the other? [00:27:01] Speaker 04: We did, Your Honor. [00:27:02] Speaker 04: We used those standard protocols that are not on a generic computer. [00:27:06] Speaker 04: We used them to create a structure that didn't exist before in the bios. [00:27:11] Speaker 00: Well, that's the point about moving it from one place to the other, but I didn't understand you in claiming that you invented a new method of moving it from one area to the other. [00:27:26] Speaker 04: I guess this will get us into the novelty in the 103 because no one ever did that before, Your Honor. [00:27:33] Speaker 04: I understand. [00:27:34] Speaker 00: I understand. [00:27:35] Speaker 00: But the question is whether you invented a way of doing it or the idea of doing it. [00:27:42] Speaker 04: We invented a way and the details of that way are represented in Claim 1. [00:27:48] Speaker 04: It's not just simply an abstract idea of license verification. [00:27:51] Speaker 04: The way we did it was by using [00:27:55] Speaker 04: the agent to set up the verification structure in the bios in an area that never saw licensing structures before. [00:28:03] Speaker 00: Okay. [00:28:03] Speaker 00: All right. [00:28:03] Speaker 00: Thank you. [00:28:04] Speaker 00: Thank you. [00:28:06] Speaker 00: I thank both counsel. [00:28:07] Speaker 00: The case is submitted. [00:28:08] Speaker 00: That concludes our session for this afternoon.