In this patent infringement suit, appellant Symantec Corporation (“Symantec”) appeals from the district court’s grant of summary judgment of non-infringement of claims 1-20 of the asserted patent, U.S. Patent No. 5,319,776 (“the '776 patent”).
Symantec Corp. v. Computer Assocs. Int’l, Inc.,
No. 02-CV-73740-DT,
Because we find that the district court erred in its construction of the claim terms “a method of screening data as it is being transferred,” “destination storage medium,” “computer,” and “computer system,” we vacate and remand as to non-infringement and invalidity. We dismiss CA’s cross-appeal as to laches as improper, but we treat lachеs as an alternative ground for affirming the judgment. We affirm the district court’s decision on laches, inequitable conduct, and inventorship.
BACKGROUND
The '776 patent is here for the third time. The patent is directed to the “In Transit Detection of Computer Virus with Safeguard,” and is described in detail in
*1286
our earlier opinions.
See Hilgraeve Corp. v. McAfee Assocs., Inc.,
1. In a system for transferring digital data for storage in a computer storage medium, a method of screening the data as it is being transferred and automatically inhibiting the storage of screened data containing at least one predefined sequence, comprising the steps of: causing a quantity of digital data resident on a source storage medium to be transferred to a computer system having a destination storage medium; receiving and screening the transferred digital data prior to storage on the destination storage medium to determine if at least one of a plurality of predefined sequences are present in the digital data received; and
in response to said screening step:
(a) automatically causing the screened digital data to be stored on said destination storage medium if none of the plurality of predefined sequences are present, and
(b) automatically inhibiting the screened digital data from being stored on said destination storage medium if at least one predefined sequence is resent.
'776 patent, col. 17 11.9-29 (emphases added).
In the '776 patent’s two prior appearances before this court, the central issue was whether the accused virus-scanning products scanned incoming data files
prior to storage.
In
Hilgraeve I,
Hilgraeve, the original assignee of the '776 patent, brought a patent infringement suit against McAfee Associates (“McAfee”) for its Vi-rusScan product.
In
Hilgraeve II,
Hilgraeve asserted the same '776 patent in a separately filed action against Symantec.
Subsequent to our decision in Hilgraeve II, Symantec settled its dispute with Hil-graeve, and, as part of that settlement, purchased Hilgraeve’s interest in the '776 patent. Hilgraeve had previously filed a new infringement action against CA, alleging infringement of claims 1-20 of thе '776 patent. The district court then substituted Symantec as the plaintiff.
CA, the accused infringer here, develops and sells a number of antivirus software products. The accused products are: (1) the eTrust EZ and eTrust products (collectively “the EAV products”), which employ both an incoming and outgoing scan mode; (2) the ARCserve product, which is designed to restore data from a backup media where the data had previously been archived; and (3) the Gateway products, which operate as a proxy between a user’s personal computer and an unattended gateway computer.
CA’s initial pleadings denied infringement and asserted affirmative defenses and counterclaims for invalidity and non-infringement. Subsequently, CA amended its pleadings to add affirmative defenses (including a defense of laches) and counterclaims for unenforceability of the '776 patent due to inequitable conduct, and for invalidity of the '776 patent under 35 U.S.C. § 256 for failing to name alleged co-inventor Levin. The district court also granted Levin’s motion to intervene as a party and assert a claim for co-inventor-ship of the '776 patent.
As discussed below, the district court construed the terms “a method of screening the data as it is being transferred,” “computer system,” and “destination storage medium” — the critical claim terms on appeal — in an order dated March 16, 2005. Based on its constructions of those terms, it granted summary judgment to CA of non-infringement on the EAV products and the ARCserve product. Although it did not grant summary judgment on the Gateway products, the parties stipulated to non-infringement of the Gateway products under the district court’s claim construction. The district court also granted summary judgment to Symantec on invalidity, holding that the '776 patent was not anticipated or obvious in view of several prior art references. Finally, in separate orders, the district court granted summary judgment to Symantec on: CA’s affirmative defense of laches; CA’s claim that the '776 patent was unenforceable based on inequitable conduct; and CA and Levin’s claim that Levin was a joint inventor of the '776 patent. Symantec timely appealed; CA and Levin timely cross-appealed. We have jurisdiction pursuant to 28 U.S.C. § 1295(a)(1), except as to CA’s improper cross-appeal on the issue of laches.
DISCUSSION
We review summary judgment decisions without deference, reapplying the standard used by the district court.
Innogenetics, N.V. v. Abbott Labs.,
I
A
Symantec’s primary challenge is to the district court’s determination that the term “a method of screening the data as it *1288 is being transferred,” appearing in the preambles to the claims, was a claim limitation, and its construction of that phrase to mean “a method of screening the data whilе it is being moved or copied and before the data is stored to the computer storage medium.” J.A. at 15. These determinations bear directly on the infringement analysis of each of the accused CA products. The dispute centers on whether the claims cover methods that do not screen data until after that data is written to a storage medium but do conduct screening “prior to storage,” i.e., before the data is accessible to the operating system or to other computer programs.
Under the district court’s construction, antivirus programs that screen data at any time after that data is written to the storage medium (e.g., the computer’s hard drive), but before it becomes accessible to the operating system or to other computer programs, fall outside the scope of the “as it is being transferred” limitation, even if screening is completed entirely before the data becomes accessible. This constructiоn, Symantec argues, is in direct conflict with our earlier decision in
Hilgraeve II,
where we construed the term “storage” to occur “when the incoming digital data is sufficiently present on the destination storage medium and accessible by the operating system or other programs so that any viruses contained in the data can spread and infect the computer system.”
On appeal, CA does not dispute the binding effect of our earlier construction of the term “storage” in Hilgraeve II. Instead, CA contends that our earlier panel decision did not address the claim term “a method of screening data as it is being transferred,” appearing in the preamble, now at issue. That term, it argues, is a separate claim limitation that was added independently to overcome prior art virus-detection methods.
Claim construction is a question of law that we review without deference.
Cybor Corp. v. FAS Techs., Inc.,
Because the disputed term appears in the preamble to claim 1, we must first determine whether it is in fact a separate limitation. In general, a preamble is construed as a limitation “if it recites essential structure or steps, or if it is ‘necessary to give life, meaning, and vitality’ to the claim.”
Catalina Mktg. Int’l, Inc. v. Coolsavings.com, Inc.,
Here, the only basis for the district court’s departure from the general rule was the notion that the “as it is being transferred” language was added separately from the “prior to storage” limitation to overcome the prior art. However, the district court erred in its description of the prosecution history. The prosecution history is clear that both terms were added concurrently to overcome the same prior art. The “as it is being transferred” language did not have its own independent significance. The prosecution history fails to demonstrate “clear reliance on the preamble during prosecution to distinguish the claimed invention from the prior art.” See id. at 808. 2
CA argues alternatively that the district court’s construction was nonetheless correct because the “as it is being transferred” term and the “prior to storage” term cannot have the same meaning — they must each be given a distinct construction. Although CA is correct that when construing terms in the body of a claim, the general assumption is that different terms have different meanings,
Applied Medical Resources Corp. v. United States Surgical Corp.,
Indeed, if the term “as it is being transferred” is to be read consistently with our prior construction of the term “storage,” the claim term “as it is being transferred” can only mean that virus scanning occurs “prior to storage.”
4
Any other construction of that term would vitiate the meaning that we previously gave to the term “storage” in
Hilgraeve I
and
Hilgraeve II. See Kimberly-Clark Corp. v. Fort Howard Paper Co.,
We conclude that the term “as it is being transferred” simply means “prior to storage.” Given our previous construction of the term “storage” in Hilgraeve II, the term “as it is being transferred” must mean “before the incoming digital data is sufficiently present on the destination storage medium and accessible by the operating system or other programs so that any viruses contained in the data can spread and infect the computer system.” 5 Under these circumstances, the language in the preamble does not impose a separate claim limitation.
B
Symantec also challenges the district court’s construction of the terms “computer” and “computer system.” The district court construed these terms to mean a “personal computer or workstation.” In doing so, the district court rejected Symantec’s proposed construction that “computer system” meant “any combination of hardware, software, documentation, and manual procedures that are combined to perform a specific function.” J.A. at 16. Based on the district court’s claim construction, the parties stipulated that the Gateway products do not infringe the asserted claims.
The dispute here centers on whether the term “computer system” is properly limited to a single computer, or whether it covers a network of multiple computers. The district court explained that its construction limited the term “computer system” to a single personal computer or workstation. The district court premised its construction on the preferred embodiment’s use of a single computеr, which as the court noted, “constitutes the complete description of the computer system.” The district court also relied on expert testimony that the term “computer system,” as used in the specification, referred to a single computer.
On appeal, Symantec contends that the district court improperly limited the claims to cover only the preferred embodiment. The specification does not limit the invention to the preferred embodiment, and the ordinary meaning of the term “computer system,” according to Symantec, includes both a single computer and a system of multiple, interconnected computers.
We agree with Symantec that the district court’s construction of the terms “computer” and “computer system” unduly limits the scope of the claims to a single personal computer. The claims “must be read in view of the specification, of which they are a part.”
Phillips v. AWH Corp.,
Bеcause the specification does not reveal any special definition for the terms “computer” or “computer system,” we must construe those terms according to their ordinary meaning. In
Phillips,
we explained that “the words of a claim ‘are generally given their ordinary and customary meaning.’ ”
Anything we choose to regard (a) as an entity and (b) as cоmprising a set of related components. In computing the word is widely used with many shades of meaning. Most commonly, however, it may refer to a related set of hardware units, or programs, or both. The hardware contents of a computer room may be spoken of as “the system,” and so may a range of manufacturer’s equipment[.]
Dictionary of Computing 375 (2d ed.1986). By contrast, the same dictionary defined the term “stand-alone” as “[d]enoting a computer system or subsystem that is capable of operation without being connected to any other computer system or subsystem.” Id. at 360. In other words, a stand alone computer is only one type of computer or computer system. We therefore conclude that the ordinary meaning of the terms “computer” and “computer system” to one of ordinary skill in the art in 1990 was not limited to a single, stand-alone computer or workstation and that the district court erred by unduly limiting its construction of those terms.
Because we find that the terms “computer” and “computer system” are not limited to a single computer, we must vacate and remand to the district court on the issue of infringement of CA’s Gateway products. Given our construction of these terms, on remand, the district court should determine whether the combination of computers used in the Gateway system performs all the claimed method steps.
C
Symantec also contends that the district court erred in construing the term “destination storage medium” to mean “a computer storage medium that is the target of the transfer of data as a result of the causing step.” This construction, when read together with the district court’s construction of the terms “computer” and “computer system,” which we rejected above, effectively limited the term “destination storage medium” to encompass only a storage system residing within a stand-alone computer, such as a computer’s hard drive. Such a limitation had the effect of excluding from the claim’s scоpe *1292 any peripheral devices, such as floppy drives or thumb drives.
The district court reasoned that construing “destination storage medium” to include peripheral devices would be inconsistent with its construction of the term “computer system,” since such a construction would “permit the invention to operate outside of the computer system.” J.A. at 18. Under the correct construction of “computer system,” there is no reason that “destination storage medium” must be limited to a computer hard drive. Under our construction of “destination storage medium,” peripheral devices, such as floppy drives and thumb drives, are properly within the scope of that term. In addition, we note that the inclusion of peripheral devices within the scope of the term “destination storage medium” is consistent with the broad construction we gave that term in
Hilgraeve II: “
‘storage medium’ refers to any storage medium of the computer system, if the data, when stored on the medium, arе accessible to the operating system or other programs, such that viruses in the data can spread and infect the computer system.”
II
Next, Symantec argues that the district court improperly granted summary judgment of non-infringement on the EAV products based on a finding that CA does not induce infringement of the '776 patent. The district court held that the EAV products failed to meet both the “as it is being transferred” claim limitation and the “causing a quantity of digital data resident on a source storage medium to be transferred” claim limitation. As we have already found that the former was based on an erroneous claim construction, we now need only address the latter claim limitation.
Before the district court, there was no dispute that the EAV products do not “cause[ ] a quantity of digital data resident on a source storage medium to be transferred,” as required by claim 1. Instead, as the district court found, the EAV products work in conjunction with a downloading or copying program, such as an internet browser. The EAV products perform the anti-virus scanning; the downloading program performs the downloading. Symantec argued that CA induces its customers to infringe the '776 patent by promoting its EAV products to be used in an infringing manner in conjunction with a downloading program. The district court rejected this argument. It held that Sym-antec could not establish active inducement because it did not show that any third party directly infringed the '776 patent using the EAV products.
35 U.S.C. § 271(b) provides that “[w]hoever actively induces infringement of a patent shall be liable as an infringer.” “In order to succeed on a claim of inducement, the patentee must show, first that there has been direct infringement,” and “second, that the alleged infringer knowingly induced infringement and possessed specific intent to encourage another’s infringement.”
MEMO Elec. Materials, Inc. v. Mitsubishi Materials Silicon Corp.,
On appeal, Symantec asserts that it produced ample evidence to establish that the EAV products have no utility apart from screening downloaded or copied data files. That is, the EAV products operate only when a user downloads or copies a file onto his computer, and the downloading or copying must happen via a downloading or copying software program. In particular, Symantec points out that the EAV product manual establishes that CA promotes its use of the EAV product in combination with a downloading program in an infringing manner. The manual states that “[t]hе Realtime Monitor scans programs on a workstation or server each time a file is executed, accessed, or opened.” J.A. at 6213. In its discussion of the internet, the manual states that “[t]he newest source of infections is the Internet.... This feature works with browsers from Netscape and Microsoft.” Id. at 6214. In response, CA maintains that Symantec has not shown any evidence of direct infringement because it has not shown that any CA customer actually performs all of the claimed method steps. Absent such a showing, CA contends that the district court properly granted summary judgment.
We find that there are genuine issues of material fact as to whether CA induced its customers to infringe the '776 patent. We agree with Symantec that CA encouraged customers to engage in direct infringement by using the EAV products in conjunction with a downloading program. This is not a case where the customers may be using the product in either an infringing way or a non-infringing way; CA’s customers can only use the EAV products in an infringing way. Under these circumstances, Symantec has produced sufficient circumstantial evidence of direct infringement to create a genuine issue of material fact, even though Syman-tec has not produced evidence that any particular customer has directly infringed the '776 patent. Direct evidence of infringement, as opposed to circumstantial evidence, is not necessary.
See Chiuminatta Concrete Concepts, Inc. v. Cardinal Indus., Inc.,
We therefore vacate and remand the district court’s summary judgment finding of non-infringement with respect to the EAV products. 7 On remand, the district court should consider whether the specific intent requirement set forth in DSU, which wаs decided after the grant of summary judgment in this case, was met.
Ill
On cross-appeal, CA challenges the district court’s summary judgment finding that the doctrine of laches does not bar Symantec’s recovery for CA’s alleged patent infringement prior to the filing of suit. At the outset, we dismiss CA’s laches claim as an improper cross-appeal. “A party may cross-appeal if adversely affected by the appealed judgment in some particular which it seeks to have modified.”
TypeRight Keyboard Corp. v. Microsoft Corp.,
However, we may consider CA’s laches arguments as an alternative ground for sustaining the judgment of non-infringement.
TypeRight Keyboard,
A defendant, in order to invoke the defense of laches, must prove: “(1) [that] the plaintiff delayed filing suit for an unreasonable and inexcusable length of time from the time the plaintiff knew or reasonably should have known of its claim against the defendant, and (2) [that] the delay operated to the prejudice or injury of the defendant.” AC.
Aukerman Co. v. R.L. Chaides Constr. Co.,
The '776 patent issued to Hilgraeve on June 7, 1994. In June 1995, an independent software company called Cheyenne Software began marketing a real-time an-tivirus software product called Inoculan. Hilgraeve sent a warning letter to Cheyenne dated October 5,1996, regarding possible infringement. On November 6, 1996, CA acquired Cheyenne Software, and thereafter allegedly “re-branded” the Ino-culan product into one of its eTrust antivi-rus products. Hilgraeve filed the present suit against CA on September 18, 2002, and, as discussed above, Symantec later acquired Hilgraeve’s interest in the '776 patent and was substituted as the plaintiff in the present suit.
Before the district court, CA argued that Symantec should be charged with the period of delay attributable to Hilgraeve when it stepped in as the plaintiff in the present suit. CA asserted that Cheyenne’s open and notorious marketing of Inoculan in June 1995 established Hil-graeve’s constructive knowledge of Cheyenne’s infringing use, and that, regardless, the October 5, 1996, warning letter established Hilgraeve’s actual knowledge of Cheyenne’s infringing use. Finally, CA argued that by establishing Hilgraeve’s knowledge of Cheyenne’s alleged infringement, it was also establishing Hilgraeve’s knowledge with respect to the accused CA *1295 products at issue here, since CA “re-branded” the Inoculan product into one of its own.
The district court held that Hilgraeve’s alleged knowledge of Inoculan, either constructive or actual, was insufficient as a matter of law to establish Hilgraeve’s knowledge of the alleged infringing CA products. In doing so, it did not reach the question of whethеr Symantec should be charged with Hilgraeve’s knowledge. Rather, it concluded that CA had failed to show evidence establishing that Inoculan was the same or similar to the products in suit. We agree that laches would only apply if the products were the same or similar, see
Watkins v. Northwestern Ohio Tractor Pullers Association, Inc.,
IV
Levin (and CA) asserts that he is an omitted co-inventor of the '776 patent.
10
To show co-inventorship, Levin is required to prove his contribution to the conception of the claims by clear and convincing evidence.
See Ethicon, Inc. v. U.S. Surgical Corp.,
Before the district court, Levin submitted a declaration stating that he gave Matthew H. Gray (“Gray”), one of the named inventors of the '776 patent, the idea for the in-transit virus scan method in a February 12,1990, telephone call. To corroborate his declaration, Levin submitted Gray’s day planner, which reflected Gray’s notes confirming that the disputed telephone call took place. Levin points out that Gray testified that the day planner *1296 entry that reflected his conversation with Levin was “relat[ed] to the '776 patent.” J.A. at 10,064. In addition, Levin relied on the lack of evidence showing Gray’s conception of the in-transit virus scan invention, which he argued further corroborated his own testimony.
The district court found that the day planner entry was insufficient as corroborating evidence. That entry, according to the district court, “at most shows only that [Levin and Gray] discussed the then-current state of the art”; it “fail[ed] to explicitly identify [Levin’s] contribution.” J.A. at 87-88. We agree with the district court that, at most, the day planner entry establishes that Gray and Levin spoke about the then-current state of anti-virus programs; it does not establish that Levin contributed to the idea. That entry, listing an “IBM SCAN program,” a “Computer Virus Handbook,” “Jim McAffey’s Virus Scan,” and “Levin’s Checkup Antivirus System,” J.A. at 1841, suggests only that Gray simply called Levin to discuss the state of the prior art.
The district court also found that any evidence tending to call into question Gray’s contribution to the invention was irrelevant to the question of whether Levin made any contribution. Again, we agree with the district court that the evidence regarding Gray’s contribution was not relevant to the question of Levin’s contribution. This is particularly so because Gray was not the sole inventor here; even though he may have lacked technical expertise, there is no suggestion that his co-inventors also lacked any technical expertise. This case is thus distinguishable from
Ethicon,
where we held that a
sole
inventor’s lack of technical expertise corroborated another’s claim of coinventorship.
Levin’s declaration itself is insufficient because it lacks corroboration. We therefore affirm the district court’s conclusion that Levin has failed to establish a genuine issue of material fact that he was a co-inventor of the '776 patent.
V
CA appeals the district court’s summary judgment determination that Hilgraeve did not commit inequitable conduct before the Patent Office in procuring the '776 patent. CA alleges that Hilgraeve made three separate false and material misrepresentations to the Patent Office: (1) Gray’s April 18, 1990, declaration that he was an inventor of the '776 patent; (2) Gray’s August 12, 1990, declaration to overcome prior art; and (3) co-inventor Donald Wakelin’s April 18, 1990, declaration that hе understood the claims of the patent application.
Patent applicants “have a duty to prosecute patent applications in the Patent Office with candor, good faith, and honesty.”
Honeywell Int’l Inc. v. Universal Avionics Sys. Corp.,
*1297
Information is material when “a reasonable examiner would consider it important in deciding whether to allow the application to issue as a patent.”
eSpeed, Inc. v. BrokerTec USA, L.L.C.,
CA’s first inequitable conduct claim arises out of the April 18,1990, declaration that Gray signed and submitted with the patent application that led to the '776 patent. In the declaration, Gray submitted that he was “an original, first and joint inventor ... of the subject matter which is claimed and for which a patent is sought.” J.A. at 1828-30. CA asserts that Gray’s declaration was a false statement because the idea for the in transit virus-detection method was Levin’s. Even if Levin somehow contributed to the invention (which, as noted above, has not been established), that fact alone would not establish that Gray did not also contribute to the invention. CA also relies on Gray’s inability at trial to identify with specificity the contribution that he made to the invention.
We agree with the district court that Gray’s inability to identify with precision his contribution, nearly fourteen years later, does not show anything more than that Gray simply could not recall, particularly since Gray and a co-inventor, John Hile, both testified in general terms that Gray came up with the idea. 11 Finally, CA contends that Gray’s lack of technical expertise establishes that Gray was not an inventor. We disagree. Gray was not the sole inventor of the claimed method. Indeed, Gray worked with the other inventors who did have technical expertise to design the invention. For these reasons, we find that the district court did not err in granting summary judgment that CA has failed to present a genuine issue of material fact that Gray was not the inventor.
CA’s second inequitable conduct claim arises from an August 12, 1992, declaration submitted by Gray to the PTO in response to an office action. Gray’s declaration was submitted together with a number of prior art references. In the declaration, Gray described the statе of the prior art with specific reference to the attached publications and identified the “significant advantages over the existing virus scanning, detecting and eliminating software” that his invention achieved. J.A. at 3866. In paragraph 1 of the declaration, Gray stated that he “ha[d] practiced in the field of computer software and, more particularly, in the area of computer communications software for 10 years ... [and that a]s a consequence, [Gray had] become intimately familiar with the state of the art as it relates to computer viruses, computer virus detection, and computer virus prevention.” Id. at 3863. CA claims that this declaration was false and misleading, because Gray was a marketing person, not a software person with technical expertise.
CA does not assert that the substance of the declaration itself was either false or misleading. The sole argument is that Gray’s description of his own qualifications is mislеading. The district court found that Gray’s lack of technical expertise alone was insufficient to establish that his declaration was a misrepresentation. We *1298 agree. There is nothing in the record that indicates that Gray was not “intimately familiar with the state of the art,” and the mere fact that he was not a technical person does nothing to refute that. 12
CA also relies on paragraph 4 of that declaration, where Gray stated that he “set out to develop an algorithm which would determine whether a file was infected with a virus during [a] transfer and to stop the transfer before the virus was copied into the system.” Id. at 3864. CA asserts that this claim was also false and misleading, since Gray later testified that he did not develop the mathematical algorithm, but rather that one of the co-inventors, Donald Wakelin, developed the algorithm. Gray’s assertion that he “set out to develop an algorithm” is not the same as asserting that he actually develoрed the algorithm himself. Again, we see no basis for a misrepresentation claim. We conclude that CA has not established a genuine question of material fact that Gray’s August 12, 1992, declaration was false or misleading.
CA’s final inequitable conduct claim arises from Wakelin’s April 18, 1990, declaration submitted with the original application, where he stated that he had “reviewed and understood] the contents of the ... specification, including the claims.Id. at 1828. That declaration, according to CA, was false and misleading because Wakelin allegedly did not understand the claims of the patent. Instead, Wakelin testified that he only understood the claims in general terms, that “the statements in claim one are so vague as to be practically unintelligible,” id. at 10006, and that he didn’t “really understand what these claims are saying.” Id. at 10007. The district court found that, even if Wakelin did not fully understand the claims of the patent, that alone was not sufficient to establish a threshold level of materiality. We agree. As the district court stated, “Wakelin’s failure to fully understand the language of the claim contents should not be confused for failure to understand the meaning of the claims, which would likely be considered material by a 'reasonable examiner.’” Id. at 124.
VI
Finally, we must address CA’s counterclaims for invalidity. Our constructions of the terms “computer,” “computer system,” and “destination storage medium” require us to vacate and remand the district court’s summary judgment finding that the Photonix and the Mac prior art references did not render the claims invalid. This is because the same construction governs for validity determinations as for infringement determinations.
Yoon Ja Kim v. ConAgra Foods, Inc.,
CONCLUSION
We hold that the district court erred in its construction of the claim terms “a method of screening data as it is being transferred,” “destination storage medium,” “computer,” and “computer system.” We therefore vacate and remand as to non-infringement and invalidity. We affirm the district court’s decision on laches, inequitable cоnduct, and inventorship.
The judgment of the district court is AFFIRMED-IN-PART and VACATED-INPART and REMANDED.
No costs.
Notes
. The citations are to the reports and recommendations of the magistrate judge. The district court adopted these reports and recommendations in their entirety by order. Symantec, No. 02-CV-73740-DT (E.D.Mich. Jan. 23, 2007) (order accepting and adopting magistrate judge's reports and recommendations).
.CA also argues that the "prior to storage” requirement was already in the claim before amendment because the claim referred to "inhibiting the digital data of said transmission from being stored on said destination storage medium if at least one predefined sequence is present.” J.A. at 7439. Even if the original claim language could be construed to include the "prior to storage” limitation, the applicant chose not to rely on that language, and added additional specific "prior to storage” language to overcome the prior art. Under these circumstances, we must assume that the additional language had significance in distinguishing the prior art.
. CA relies on expert testimony that the preamble and the body of the claim should be interpreted as requiring separate limitations. That testimony does not, however, identify an accepted meaning in the field. To the extent that the testimony merely gives the expert’s opinion as to claim construction, we attribute it no weight.
See Sinorgchem Co., Shandong v. Int’l Trade Comm’n,
. This appears to have been our assumption in
Hilgraeve I,
where we stated: "The claimed invention scans a body of data during its transfer, i.e., before storage of the data with potential viruses on the destination storage medium.”
. Although implicit in the requirement that the screening is performed on “incoming digital data,” we note that the claims do not cover methods of screening data for viruses before that data has left the source storage medium.
. Although the preferred embodiment utilizes a single computer, this is not a case where the specification consistently refers to the invention as involving a single computer.
See Ormco Corp. v. Align Tech., Inc.,
. We note that thе district court appeared to confuse the test for inducement with the test for the doctrine of equivalents. The two concepts are not related.
. CA's other cross-appeals, directed to inequitable conduct, invalidity over the prior art, and inventorship, are proper because they would expand the scope of the judgment. In
TypeRight Keyboard,
we explained that "where the appellee urges invalidily as a new ground on which to support a judgment of non-infringement ... a cross-appeal is necessary since a judgment of invalidity is broader than a judgment of non-infringement.”
. Relying on an expert's affidavit, CA asserts that the latest products at issue here utilize the same “antivirus engine technology” as that used in the original Inoculan product. This is hardly the same as demonstrating that the earlier product embodied the same claimed features as the accused product.
. Levin licensed any interest he may have in the '776 patent to CA.
. CA appears to argue that Gray testified that the notes in the day planner described the invention, and that, since the notes summarized the Levin telephone call, the idea must have originated with Levin. Gray’s testimony, however, was that the day planner entry was evidence of the date of conception, and not of the idea itself.
. When questioned as to whether "[slitting here today, [Gray had] any knowledge concerning the state of the art in connection with computer software design and development,” Gray stated: "I don’t believe there’s any point in time when I would have been so bold as to claim I had knowledge of the state of the art of anything.” J.A. at 9993. We do not read that statement as contradicting the statement he made in the declaration concerning his earlier knowledge of virus screening technology, but rather to relate to his lack of knowledge of computer software design and development generally.
. The district court appeared not to address claims 18-20, and on remand should treat them separately.
