2:02-cv-73740
Symantec Corp v. Compt Assoc Intl Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Hilgraeve, Inc. (Michigan)
- Defendant: Computer Associates International, Inc. (Delaware)
- Plaintiff’s Counsel: Brooks & Kushman P.C.
- Case Identification: 2:02-cv-73740, E.D. Mich., 09/18/2002
- Venue Allegations: Venue is alleged based on Defendant maintaining offices within the judicial district.
- Core Dispute: Plaintiff alleges that Defendant’s antivirus products infringe a patent related to the "in-transit" detection of computer viruses before they are stored on a destination medium.
- Technical Context: The technology concerns methods for identifying and blocking malicious software code within a data stream during a transfer, such as a file download, rather than scanning files already resident on a hard drive.
- Key Procedural History: The patent-in-suit is a continuation of an earlier, abandoned U.S. patent application. The complaint itself does not allege any prior litigation, licensing history, or other proceedings related to the patent.
Case Timeline
| Date | Event |
|---|---|
| 1990-04-19 | Priority Date for U.S. Patent No. 5,319,776 |
| 1994-06-07 | U.S. Patent No. 5,319,776 Issued |
| 2002-09-18 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 5,319,776 - "IN TRANSIT DETECTION OF COMPUTER VIRUS WITH SAFEGUARD", Issued June 7, 1994
The Invention Explained
- Problem Addressed: The patent describes a shortcoming of conventional antivirus programs of the era, which typically scan files already stored on a computer's storage medium. This approach only alerts a user after the computer has already been potentially compromised, and does not prevent the virus from being stored in the first place (’776 Patent, col. 1:44-54).
- The Patented Solution: The invention proposes a method to detect viruses "in transit" or "on the fly" (’776 Patent, col. 2:55-59). As a data stream is being received (e.g., from a modem or a diskette), it is simultaneously screened for known virus signatures using a finite state machine. If a signature is detected, the system automatically inhibits the data from being stored on the destination medium, thereby preventing the infection before it can occur (’776 Patent, col. 2:25-34). The patent's Figure 1 illustrates this process, showing an input data stream being routed through a "Virus String Search" module before it can be stored on the destination medium.
- Technical Importance: This "in-transit" screening approach represented a proactive security posture, aiming to block threats at the perimeter during data transfer, as opposed to the reactive approach of cleaning up infections after they have already landed on a system's storage.
Key Claims at a Glance
- The complaint does not specify which claims are asserted. Independent claim 1 is representative of the core invention.
- Independent Claim 1:
- A method for screening digital data as it is being transferred for storage in a computer storage medium.
- Causing a quantity of digital data from a source medium to be transferred to a computer system with a destination storage medium.
- Receiving and screening the transferred data prior to storage on the destination medium to determine if one of a plurality of predefined sequences (e.g., virus signatures) is present.
- In response, automatically causing the data to be stored if no predefined sequences are present.
- In response, automatically inhibiting the data from being stored if at least one predefined sequence is present.
III. The Accused Instrumentality
Product Identification
The complaint identifies the accused instrumentalities generally as "defendant's antivirus products" (Compl. ¶7).
Functionality and Market Context
The complaint does not specify any particular products, versions, or features. It alleges that the "use" of these antivirus products infringes the patent-in-suit (Compl. ¶7). The complaint contains no allegations regarding the technical operation or market position of the accused products beyond this general categorization.
IV. Analysis of Infringement Allegations
The complaint provides only a conclusory allegation that Defendant's products infringe the '776 patent and does not identify specific claims or provide an element-by-element analysis of infringement (Compl. ¶7). The complaint notes that "Plaintiff expects to have evidentiary support for theses [sic] infringement allegations upon inspection of the source code" (Compl. ¶7). Without specific allegations mapping product features to claim limitations, a detailed analysis of the infringement theory is not possible based on the complaint alone.
V. Key Claim Terms for Construction
The Term: "screening the transferred digital data prior to storage on the destination storage medium" (from Claim 1)
- Context and Importance: This phrase is the central limitation of the invention, defining the "in-transit" nature of the screening. The case may turn on the precise meaning of "prior to storage." Practitioners may focus on this term because modern computer systems utilize various forms of buffering, caching, and temporary file creation during data transfer, raising the question of when data is formally "stored" on the "destination storage medium."
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification's emphasis on preventing a virus from taking "up residency on the storage medium" could support an interpretation where "storage" means a permanent, non-transient placement of the file in its final intended location (’776 Patent, col. 1:65-col. 2:2).
- Evidence for a Narrower Interpretation: The description of checking data in an "input buffer" (30) before it is written to the "destination medium" (24b) could support a narrower interpretation where any writing to a persistent medium, even a temporary file or cache, constitutes "storage" (’776 Patent, col. 3:45-53).
The Term: "automatically inhibiting the screened digital data from being stored" (from Claim 1)
- Context and Importance: This term defines the required preventative action. The dispute will likely focus on what system behavior qualifies as "inhibiting."
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification suggests actions like terminating the transfer and having the "receiving file being deallocated or marked to be overwritten," which could encompass a range of blocking actions beyond simply preventing initial writes (’776 Patent, col. 3:19-22).
- Evidence for a Narrower Interpretation: The patent also describes a specific embodiment where, upon detection, the system purges and "delete[s] the file from storage," which implies the file may have been at least partially written before the "inhibiting" step is completed (’776 Patent, col. 7:26-28).
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Defendant is "actively inducing others to infringe," but provides no specific factual allegations regarding Defendant's intent or alleged acts of inducement, such as referencing user manuals or marketing materials (Compl. ¶7).
- Willful Infringement: The complaint makes a conclusory allegation of willful infringement (Compl. ¶7). It does not allege any facts to support a claim of pre-suit knowledge of the '776 patent, such as prior correspondence or citation of the patent in other contexts.
VII. Analyst’s Conclusion: Key Questions for the Case
Given the complaint's limited detail, the initial phase of the case will focus on developing the factual record. The central questions that will likely emerge are:
- A core definitional question: What constitutes "storage" on a "destination storage medium" in the context of the accused antivirus products? The interpretation of "prior to storage" will be critical in determining whether the accused products, which may use extensive buffering and temporary files, perform the screening at the time required by the claims.
- A key evidentiary question: What specific architecture do the accused antivirus products employ? The case will depend on whether discovery reveals a technical mechanism that screens data "in-transit" and "automatically inhibit[s]" storage in a manner that maps onto the patent's claims, or if the products operate in a fundamentally different way (e.g., scanning files only after they are fully written to a temporary location).
- A foundational pleading and procedural question: The complaint was filed under a notice pleading standard that predates modern requirements for factual specificity. A significant question is whether the plaintiff's bare allegations of infringement, inducement, and willfulness can be substantiated with sufficient evidence during discovery to survive summary judgment.