PTAB
IPR2016-00220
McAfee Inc v. Cap Co Ltd
Key Events
Petition
Table of Contents
petition
1. Case Identification
- Case #: IPR2016-00220
- Patent #: RE42,196
- Filed: November 19, 2015
- Petitioner(s): McAfee, Inc.
- Patent Owner(s): CAP Co., Ltd.
- Challenged Claims: 16-19 and 23-28
2. Patent Overview
- Title: System and method for blocking harmful information online, and computer readable medium therefor
- Brief Description: The ’196 patent discloses a system for automatically downloading, installing, and executing an antivirus module on a client computer. This module is intended to block harmful information, such as computer viruses, in real-time by inspecting network packets and file input/output (I/O) without requiring manual user intervention.
3. Grounds for Unpatentability
Ground 1: Claims 16-19 and 23-24 are obvious over Ji in view of Freund.
- Prior Art Relied Upon: Ji (Patent 6,728,886) and Freund (Patent 5,987,611).
- Core Argument for this Ground:
- Prior Art Mapping: Petitioner argued that the combination of Ji and Freund taught all limitations of these claims. Ji disclosed a method for automatically downloading and updating a local antivirus scan engine on a client computer upon browser start-up. This downloaded engine would then scan all future HTTP requests and data transfers in real-time, teaching the automatic delivery and network packet inspection elements. Freund disclosed a client-side filter application that provided more robust real-time protection by "hooking" into the operating system's communication drivers (e.g., Winsock) and file subsystem. This allowed Freund’s monitor module to intercept and inspect all TCP/IP communications and file I/O on a per-process basis, determine if the activity was harmful according to predefined rules, and block harmful activity by terminating the associated process or communication.
- Motivation to Combine: Petitioner asserted that a person of ordinary skill in the art (POSITA) would have been motivated to combine the references because they were complementary technologies in the same field of computer security. A POSITA would combine Ji’s efficient method for automatically delivering an up-to-date antivirus engine with Freund’s more comprehensive, OS-level method for real-time inspection and blocking. This combination would create a superior security product that was both current and highly effective, addressing the shared goal of preemptively blocking harmful information before it could damage a client computer.
- Expectation of Success: The petition argued that combining an automatic software delivery mechanism with a known real-time scanning technique was a predictable implementation path for antivirus developers at the time. Both technologies were well-understood, and their integration would have yielded the expected result of an enhanced, automated security system.
Ground 2: Claims 25-28 are obvious over Ji and Freund in view of Levergood.
- Prior Art Relied Upon: Ji (Patent 6,728,886), Freund (Patent 5,987,611), and Levergood (Patent 5,708,780).
- Core Argument for this Ground:
- Prior Art Mapping: This ground incorporated the teachings of Ji and Freund from Ground 1 and added Levergood to address limitations in claims 25-28, particularly those concerning a client receiving a request from a web server. Petitioner argued that Levergood disclosed a standard client-server architecture for an online service, which included an authentication server and a content server. In Levergood’s system, the authentication server sends requests to the client’s browser to manage access to controlled content, such as a "credential query" for a username/password or a "REDIRECT" request to forward the user to a different page. This teaching directly met the claim limitation of a client system receiving a request from a server.
- Motivation to Combine: Petitioner contended that a POSITA seeking to implement the antivirus system of Ji and Freund as a commercial online service would naturally look to prior art like Levergood for standard web service infrastructure. Implementing user authentication and session management is a fundamental requirement for most online services. Levergood provided a known, sensible architecture for this purpose. Therefore, a POSITA would have been motivated to integrate the authentication and server architecture of Levergood with the AV delivery and scanning technology of Ji and Freund to create a complete, commercially viable product.
- Expectation of Success: Integrating a standard user authentication system with an online software delivery service involved combining well-known components for their intended purposes. A POSITA would have had a reasonable expectation of success in creating the claimed system, as it represented a predictable combination of existing technologies.
4. Key Claim Construction Positions
- "harmful information blocking code module": Petitioner proposed this term be construed as "an executable program that blocks harmful information." This construction was based on the patent's repeated description of the invention as a "program" in the Summary of the Invention and the functional requirement that the module must be capable of "running" on a client system, a function limited to executable programs, not all forms of digital information.
- "automatically runs": Petitioner proposed this term means "runs without user installation, start-up, or other involvement." This construction was argued to be consistent with the patent's primary stated objective of overcoming the "labor-intensive" need for users to manually install, configure, and execute antivirus software.
- "internal process": Petitioner argued this term means "instance of a program that is being executed by a client computer." This relied on the well-understood meaning of "process" in computer science and was supported by the patent's specification, which described inspecting "processes currently running on the client."
5. Relief Requested
- Petitioner requested institution of an inter partes review and cancellation of claims 16-19 and 23-28 of Patent RE42,196 as unpatentable.
Analysis metadata