GoDaddy.com LLC v. RPost Communications Limited et al
Filing
344
ORDER granting 257 GoDaddy's Motion for Summary Judgment. ORDERED granting 284 RPost's Motion for Summary Judgment on Plaintiff's Count I (Fraudulent Misrepresentation of Patent Ownership). The jury trial set for August 22, 2016 is VACATED. FINALLY ORDERED that the Clerk of Court shall enter judgment in this case with prejudice in favor of Plaintiff and against Defendants on Counts VIII-XIII and XV of the First Amended Complaint. Counts III-VII are DISMISSED without prejudic e as moot, Plaintiff shall take nothing on these Counts and the Clerk of Court shall enter judgment accordingly on these Counts. The Clerk of Court shall enter judgment in favor of Defendants and against Plaintiff on Count I of the First Amended C omplaint. This judgment addresses the entire First Amended Complaint, (Doc. 46 ). Due to the Declarations stated above, Defendants Counterclaims, (Doc. 108 ), are DISMISSED in their entirety without prejudice, and the Clerk of Court shall enter judgment accordingly on the Counterclaims. Signed by Senior Judge James A Teilborg on 6/7/16.(EJA)
1
WO
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE DISTRICT OF ARIZONA
8
9
GoDaddy.com LLC,
No. CV-14-00126-PHX-JAT
Plaintiff,
10
11
v.
12
ORDER
RPost Communications Limited, et al.,
13
Defendants.
14
15
Pending before the Court are Plaintiff GoDaddy.com LLC (“GoDaddy”)’s Motion
16
for Summary Judgment, (Doc. 257), and Defendants’1 Motion for Summary Judgment on
17
Plaintiff’s Count I (Fraudulent Misrepresentation of Patent Ownership), (Doc. 284). The
18
Court now rules on the motions.
19
I.
Background
20
After multiple rounds of motions to dismiss, briefing for a three-month stay,
21
complete Markman review, a Daubert motion, and dozens of other motions, the factual
22
background of this case is well-established. In short, GoDaddy filed this Declaratory
23
Judgment Action against RPost, seeking, among other things, damages for fraudulent
24
misrepresentation and declarations of invalidity and non-infringement of various patents
25
(the “Asserted Patents”)2 after RPost attempted to enforce those patents against
26
27
28
1
Defendants are RPost Communications Ltd.; RPost Holdings, Inc.; RPost
International Ltd.; and RMail Ltd. Defendants are collectively referred to as “RPost.”
2
The Asserted Patents are (1) U.S. Patent No. 8,224,913 (filed July 17, 2012) (the
1
GoDaddy. (Doc. 46 at 38). RPost counterclaimed, alleging that GoDaddy is liable for
2
direct infringement of the Asserted Patents. (Doc. 108 at 20–27).
3
II.
Legal Standard
4
Summary judgment is appropriate when “the movant shows that there is no
5
genuine issue as to any material fact and that the moving party is entitled to summary
6
judgment as a matter of law.” Fed. R. Civ. P. 56(a). A party asserting that a fact cannot be
7
or is genuinely disputed must support that assertion by “citing to particular parts of
8
materials in the record,” including depositions, affidavits, interrogatory answers or other
9
materials, or by “showing that materials cited do not establish the absence or presence of
10
a genuine dispute, or that an adverse party cannot produce admissible evidence to support
11
the fact.” Id. at 56(c)(1). Thus, summary judgment is mandated “against a party who fails
12
to make a showing sufficient to establish the existence of an element essential to that
13
party’s case, and on which that party will bear the burden of proof at trial.” Celotex Corp.
14
v. Catrett, 477 U.S. 317, 322 (1986).
15
Initially, the movant bears the burden of pointing out to the Court the basis for the
16
motion and the elements of the causes of action upon which the non-movant will be
17
unable to establish a genuine issue of material fact. Id. at 323. The burden then shifts to
18
the non-movant to establish the existence of material fact. Id. The non-movant “must do
19
more than simply show that there is some metaphysical doubt as to the material facts” by
20
“com[ing] forward with ‘specific facts showing that there is a genuine issue for trial.’”
21
22
23
24
25
26
27
28
“’913 Patent”); (2) U.S. Patent No. 8,209,389 (filed June 26, 2012) (the “’389 Patent”);
(3) U.S. Patent No. 8,161,104 (filed April 17, 2012) (the “’104 Patent”); (4) U.S. Patent
No. 8,468,198 (filed June 18, 2013) (the “’198 Patent”); (5) U.S. Patent No. 8,468,199
(filed June 18, 2013) (the “’199 Patent”); and (6) U.S. Patent No. 6,182,219 (filed
January 30, 2001) (the “’219 Patent”). The ’104, ’389, ’913, ’198, and ’199 Patents are
referred to herein as the “Tomkow Patents.” The ’219 Patent is referenced as the
“Feldbau Patent.”
GoDaddy’s First Amended Complaint (“FAC”) also included Counts for
declarations of invalidity and non-infringement of U.S. Patent No. 6,571,334. (Doc. 46 at
33–34, 36–37). In a prior Order, the Court dismissed those Counts due to a lack of
justiciable controversy. See (Doc. 107 at 9, 14).
-2-
1
Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 586–87 (1986) (quoting
2
Fed. R. Civ. P. 56(e) (1963) (amended 2010)). A dispute about a fact is “genuine” if the
3
evidence is such that a reasonable jury could return a verdict for the nonmoving party.
4
Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248 (1986). The non-movant’s bare
5
assertions, standing alone, are insufficient to create a material issue of fact and defeat a
6
motion for summary judgment. Id. at 247–48. Further, because “[c]redibility
7
determinations, the weighing of the evidence, and the drawing of legitimate inferences
8
from the facts are jury functions, not those of a judge, . . . [t]he evidence of the
9
nonmovant is to be believed, and all justifiable inferences are to be drawn in his favor” at
10
the summary judgment stage. Id. at 255 (citing Adickes v. S.H. Kress & Co., 398 U.S.
11
144, 158–59 (1970)); Harris v. Itzhaki, 183 F.3d 1043, 1051 (9th Cir. 1999) (“Issues of
12
credibility, including questions of intent, should be left to the jury.” (citations omitted)).
13
At the summary judgment stage, the trial judge’s function is to determine whether
14
there is a genuine issue for trial. There is no issue for trial unless there is sufficient
15
evidence favoring the non-moving party for a jury to return a verdict for that party.
16
Liberty Lobby, Inc., 477 U.S. at 249–50. If the evidence is merely colorable or is not
17
significantly probative, the judge may grant summary judgment. Id. Notably, “[i]t is well
18
settled that only admissible evidence may be considered by the trial court in ruling on a
19
motion for summary judgment.” Beyene v. Coleman Sec. Servs., Inc., 854 F.2d 1179,
20
1181 (9th Cir. 1988).
21
III.
GoDaddy’s Motion for Summary Judgment
22
GoDaddy moves for summary judgment on seven issues. First, GoDaddy argues
23
that “the asserted claims of the RPost Patents claim patent-ineligible abstract ideas and
24
are invalid under 35 U.S.C. § 101.” (Doc. 257 at 7). Second, GoDaddy contends that the
25
’913 Patent is invalid as “obvious” under 35 U.S.C. § 103. (Id.) Third, GoDaddy
26
maintains that the “earliest priority date claimable for the Tomkow Patents” is December
27
17, 1999. (Id.) Fourth, GoDaddy asserts that it has “intervening rights as to the Feldbau
28
-3-
1
Patent.” (Id.) Fifth, GoDaddy contends that the Accused Products3 do not infringe the
2
asserted claims of the Tomkow Patents that recite a “copy” or “representation” of “the
3
message.” (Id.) Sixth, GoDaddy insists that the Accused Products do not infringe the
4
asserted Feldbau Patent claims. (Id.) Finally, GoDaddy moves for summary judgment on
5
the issue of damages. (Id.)
6
A.
7
GoDaddy contends that the Asserted Patents are invalid under 35 U.S.C. § 101
8
because they claim patent-ineligible subject matter. (Doc. 257 at 9–10). Specifically,
9
GoDaddy argues that the Asserted Patents claim “abstract ideas” lacking “inventive
10
concepts sufficient to transform the claimed abstract idea into a patent-eligible
11
application.” (Doc. 257 at 10–15) (citing Alice Corp. Pty. Ltd. v. CLS Bank Intern., 134
12
S. Ct. 2347, 2354–55 (2014) (“Alice”)). As to the Feldbau Patent, GoDaddy argues that
13
the claims are drawn to the “abstract idea of collecting and providing information for
14
proving a message was sent to a recipient at a particular time with particular content”
15
without adding an inventive concept sufficient to confer eligibility. (Id. at 18). Regarding
16
the Tomkow Patents, GoDaddy contends that the claims are drawn to the abstract idea of
17
“collecting and providing information for verifying transmission and/or delivery of a
18
message” without including an inventive concept to transform that idea into a patent-
19
eligible application. (Id. at 14).
Eligibility of the Asserted Patents
20
In response, RPost asserts that an eligibility challenge under § 101 is not a
21
statutory defense in patent infringement litigation and therefore the Court lacks
22
jurisdiction over GoDaddy’s argument. (Doc. 299 at 8–13). According to RPost, neither
23
the Supreme Court of the United States nor the Federal Circuit has expressly held that
24
§ 101 is a statutory defense. (Id.) RPost explains that the section heading of § 101,
25
“Inventions patentable,” takes the statute out of the realm of statutory defenses
26
27
28
3
The “Accused Products” are GoDaddy’s Express Email Marketing (“EEM”),
GoDaddy Email Marketing (“GEM”), and the MadMimi email marketing product
(“MadMimi”).
-4-
1
demarcated in 35 U.S.C § 282(b). (Id.) In the alternative, RPost argues that the Asserted
2
Patents are directed to patent-eligible subject matter and recite inventive concepts. (Id. at
3
13–22). Specifically, RPost contends that the Feldbau Claims provide a technical solution
4
to a technical problem using an “authenticator.” (Id. at 20–21). RPost further argues that
5
the Feldbau Claims add an “inventive concept” because the invention requires a physical
6
“transform[ation]” of the information. (Id. at 21–22) As to the Tomkow Patents, RPost
7
asserts that GoDaddy’s characterization of the patents is a “gross oversimplification.” (Id.
8
at 14). Instead, RPost insists that the asserted Tomkow Patent claims “recite specific
9
ways to verify delivery of an electronic message using specific information.” (Id.)
10
1.
Jurisdiction
11
Before reaching the merits of GoDaddy’s eligibility argument, the Court must first
12
determine whether it has jurisdiction over patent-eligibility challenges brought pursuant
13
to § 101. According to RPost, § 101 eligibility is not an authorized statutory defense
14
because § 101 is not listed or referenced in § 282(b), the statute designating patent
15
litigation defenses. (Doc. 299 at 8–13). GoDaddy, on the other hand, believes that its
16
§ 101 eligibility challenge is properly before the Court due to a long litany of Federal
17
Circuit and Supreme Court cases interpreting § 101 in the context of patent litigation.
18
(Doc. 314 at 7–8) (citing cases). Most notably, GoDaddy points to the recent landmark
19
decision in which the Supreme Court further refined the standards applicable to § 101
20
eligibility challenges in patent litigation, Alice. (Id.)
21
a.
Legal Background
22
Section 282(b) of Title 35 of the United States Code provides an exhaustive
23
catalogue of defenses available to an alleged infringer in an action involving the validity
24
or infringement of a patent:
25
26
27
28
(1) Noninfringement, absence of liability for infringement or
unenforceability,
(2) Invalidity of the patent or any claim in suit on any ground specified in
part II of this title as a condition for patentability,
(3) Invalidity of the patent or any claim in suit for failure to comply with—
(A) any requirement of section 112, except that the failure to
-5-
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
disclose the best mode shall not be a basis on which any claim of a
patent may be canceled or held invalid or otherwise unenforceable;
or
(B) any requirement of section 251.
(4) Any other fact or act made a defense by this title.
§ 282(b). For purposes of this case, the pertinent provision of § 282(b) is the second
section, which authorizes defenses based on “invalidity of the patent on or any claim in
suit on any ground specified in part II of this title as a condition for patentability.”
Part II of Title 35 encompasses §§ 100–212. Of these sections, three are relevant
here: §§ 101, 102, and 103. Section 101 is entitled “Inventions patentable” and states as
follows: “Whoever invents or discovers any new and useful process, machine,
manufacture, or composition of matter, or any new and useful improvement thereof, may
obtain a patent therefor, subject to the conditions and requirements of this title.” § 101.
Section 102 is labeled “Conditions of patentability; novelty” while Section 103 is
designated “Conditions for patentability; non-obvious subject matter.” See §§ 102, 103.
Fifty years ago, the Supreme Court stated that,
18
The [Patent] Act sets out the conditions of patentability in three sections.
An analysis of the structure of these three sections indicates that
patentability is dependent upon three explicit conditions: novelty and utility
as articulated and defined in § 101 and § 102, and nonobviousness, the new
statutory formulation, as set out in § 103.
19
Graham v. John Deere Co., 383 U.S. 1, 12 (1966). Fifteen years after Graham, the
20
Supreme Court observed that “Section 101 sets forth the subject matter that can be
21
patented, ‘subject to the conditions and requirements of this title.’ The conditions under
22
which a patent may be obtained follow [§ 101].” Diamond v. Diehr, 450 U.S. 175, 190
23
(1981) (citing S. Rep. No. 1979, 82d Cong., 2d Sess., 5 (1952); U.S. Code Cong. &
24
Admin. News, 1952, p. 2399)). More recently, the Supreme Court explained that,
16
17
25
26
27
28
The § 101 patent-eligibility inquiry is only a threshold test. Even if an
invention qualifies as a process, machine, manufacture, or composition of
matter, in order to receive the Patent Act’s protection the claimed invention
must also satisfy “the conditions and requirements of this title.” § 101.
Those requirements include that the invention be novel, see § 102,
nonobvious, see § 103, and fully and particularly described, see § 112.
-6-
1
Bilski v. Kappos, 561 U.S. 593, 602 (2010). Two years later, the Supreme Court
2
identified a two-part analysis for determining § 101 eligibility in patent litigation. See
3
Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S. Ct. 1289, 1296–97 (2012).
4
Finally, in Alice, the Supreme Court further developed and refined the Mayo two-step
5
inquiry. See 134 S. Ct. at 2354–55.
6
Similarly, although the Federal Circuit has recognized that only §§ 102 and 103
7
are textually “denominated” as “conditions of patentability,” MySpace, Inc. v. GraphOn
8
Corp., 672 F.3d 1250, 1259–60 (Fed. Cir. 2012), it has long held that § 282’s defenses
9
“include not only the ‘conditions of patentability’ in §§ 102 and 103, but also those in
10
§ 101,” DealerTrack, Inc. v. Huber, 674 F.3d 1315, 1330 n.3 (Fed. Cir. 2012); see
11
Aristocrat Techs. Austl. Pty Ltd. v. Int’l Game Tech., 543 F.3d 657, 661, 661 n.3 (Fed.
12
Cir. 2008) (observing that “it is beyond question that section 101’s other requirement,
13
that the invention be directed to patentable subject matter, is also a condition for
14
patentability” but noting that “sections 102 and 103,” unlike § 101, “are explicitly
15
entitled conditions for patentability”). In other words, the Federal Circuit uniformly holds
16
that § 101 can be raised as a defense in patent infringement litigation. See, e.g., MySpace,
17
672 F.3d at 1261 (recognizing the benefits of shifting invalidity challenges towards
18
§§ 102 and 103 but acknowledging that “Does this mean that § 101 can never be raised
19
initially in a patent infringement suit? No.”).
20
b.
Analysis
21
Notwithstanding the complexity of RPost’s argument, the Court finds that it has
22
jurisdiction over GoDaddy’s § 101 eligibility challenge. In a slightly different context,
23
the Federal Circuit recently addressed this precise question. In Versata Development
24
Group, Inc. v. SAP America, Inc., the Federal Circuit summarized the patentee’s
25
argument as follows:
26
27
28
[Covered Business Method (“CBM”)] post-grant review must be limited to
a ground that could be raised under paragraph (2) or (3) of section 282(b).
[Patentee] then reasons that § 282(b)(2) authorizes defenses on any ground
‘specified in part II as a condition for patentability,’ and that the part II
reference includes under the headings in the compiled statutes only
-7-
1
3
‘conditions for patentability,’ i.e., §§ 102 and 103, but not § 101. Based on
the headings in part II of the statutes, [Patentee] draws a distinction
between the heading under which § 101 appears, ‘inventions patentable,’
and ‘conditions of patentability’ under which §§ 102 and 103 are listed.
4
793 F.3d 1306, 1329–30 (Fed. Cir. 2015). Ultimately, the Federal Circuit held that
5
jurisdiction over the alleged infringer’s § 101 eligibility challenge was proper for the
6
following reasons:
2
23
[Patentee] is correct that a strict adherence to the section titles can
support an argument that § 101 is not listed as a ‘condition of patentability,’
but rather has the heading of ‘inventions patentable.’ However, as noted by
the [United States Patent and Trademark Office (“USPTO”)], both our
opinions and the Supreme Court’s opinions over the years have established
that § 101 challenges constitute validity and patentability challenges. See
also Standard Oil Co. v. Am. Cyanamid Co., 774 F.2d 448, 453 (Fed. Cir.
1985); Aristocrat, 543 F.3d at 661 n.3.
It would require a hyper-technical adherence to form rather than an
understanding of substance to arrive at a conclusion that § 101 is not a
ground available to test patents under either the [Post Grant Review] or
§ 18 processes. Section 101 validity challenges today are a major industry,
and they appear in case after case in our court and in Supreme Court cases,
not to mention now in final written decisions in reviews under the [America
Invents Act (“AIA”)]. The numerous cases in our court and in the Supreme
Court need no citation . . . .
It is often said, whether accurate or not, that Congress is presumed to
know the background against which it is legislating. Excluding § 101
considerations from the ameliorative processes in the AIA would be a
substantial change in the law as it is understood, and requires something
more than some inconsistent section headings in a statute’s codification.
We agree with the USPTO and SAP and we so hold that, looking at the
entirety of the statutory framework and considering the basic purpose of
CBM reviews, the [Patent Trial and Appeal Board (“PTAB”)] acted within
the scope of its authority delineated by Congress in permitting a § 101
challenge under AIA § 18.
24
Id. at 1330. Of course, as RPost emphasizes, the Versata court decided a slightly different
25
issue, i.e., the jurisdiction of a court to rule on a § 101 challenge brought under AIA § 18.
26
See id. To that end, RPost contends that the statutory history of the AIA is different than
27
that of the Patent Act, and thus argues that Congress did not specify § 101 as a “condition
28
of patentability” for purposes of § 282 in infringement litigation. See (Doc. 299 at 8–13).
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
-8-
1
Similar to the Federal Circuit in Versata, the Court finds that a “hyper-technical
2
adherence” to the section heading of § 101 is not enough to overcome decades of
3
interpreting § 101 as a valid defense in patent infringement litigation. See Lewis v.
4
Hegstrom, 767 F.2d 1371, 1376 (9th Cir. 1985) (noting that courts must not hinge
5
“interpretation of a statute upon a single word or phrase but rather look to the statute as a
6
whole, as well as its object and policies”); see also Pa. Dep’t of Corrs. v. Yeskey, 524
7
U.S. 206, 212 (1998) (“The title of a statute . . . cannot limit the plain meaning of the text.
8
For interpretive purposes, it is of use only when it sheds light on some ambiguous word
9
or phrase.” (quotation omitted)). This is not a case where a mere sprinkling of district
10
courts has incorrectly interpreted an infrequently-invoked statute or where a sharp divide
11
exists in the judicial system. Indeed, the Supreme Court and Federal Circuit
12
unwaveringly consider § 101 to be a viable and robust defense in the context of patent
13
infringement litigation.4 Whether couched as a “threshold test,” see Bilski, 561 U.S. at
14
602, or a “condition of patentability,” see Aristocrat, 543 F.3d at 661 n.3, it is firmly
15
decided that the Court has jurisdiction to determine whether the Asserted Patents claim
16
eligible subject matter under § 101, and RPost’s reliance on § 101’s section heading is
17
not enough to create a “substantial change in the law as it is understood,” Versata, 793
18
F.3d at 1330.
19
c.
Conclusion
20
For the foregoing reasons, the Court concludes that it has jurisdiction to consider
21
whether the Asserted Patents claim patent-eligible subject matter as required by § 101.
22
Accordingly, the Court now turns to the merits of GoDaddy’s § 101 argument.
23
24
2.
Legal Standard for § 101 Eligibility
As quoted above, § 101 of the Patent Act defines the subject matter eligible for
25
26
27
28
4
In fact, during the pendency of these motions, the Federal Circuit has decided
multiple cases where a party accused of patent infringement has invoked § 101 as a
defense. See, e.g., In re TLI Commc’ns LLC Patent Litig., – F.3d –, 2016 WL 2865693, at
*3 (Fed. Cir. May 17, 2016); Enfish, LLC v. Microsoft Corp., – F.3d –, 2016 WL
2756255, at *4 (Fed. Cir. May 12, 2016).
-9-
1
patent protection as follows: “Whoever invents or discovers any new and useful process,
2
machine, manufacture, or composition of matter, or any new and useful improvement
3
thereof, may obtain a patent therefor, subject to the conditions and requirements of this
4
title.” § 101. “Issues of patent-eligible subject matter are questions of law” reserved
5
exclusively to the Court. CyberSource Corp. v. Retail Decisions, Inc., 654 F.3d 1366,
6
1369 (Fed. Cir. 2011).
7
The Supreme Court, as noted above, has identified a two-part test for § 101 patent-
8
eligibility in infringement litigation. See Alice, 134 S. Ct. at 2355 (citing Mayo, 132 S. Ct.
9
at 1296–97). First, the Court must determine whether the claims at issue are directed to a
10
patent-ineligible concept, i.e., “Laws of nature, natural phenomena, and abstract ideas.”
11
Id. (quoting Ass’n for Molecular Pathology v. Myriad Genetics, Inc., 133 S. Ct. 2107,
12
2116 (2013)). The term “abstract idea” embodies “the longstanding rule that an idea of
13
itself is not patentable.” Id. (citing Gottschalk v. Benson, 409 U.S. 63, 67 (1972)). Not
14
surprisingly, “precision has been elusive in defining an all-purpose boundary between the
15
abstract and the concrete.” Internet Patents Corp. v. Active Network, Inc., 790 F.3d 1343,
16
1345 (Fed. Cir. 2015); see Versata, 793 F.3d at 1331 (noting that the abstract ideas
17
exception “is more of a problem, a problem inherent in the search for a definition of an
18
‘abstract idea’ that is not itself abstract”).5
19
Nonetheless, several guiding principles emerge from Supreme Court and Federal
20
Circuit precedent. For example, if the heart of the patent is a “fundamental economic
21
practice,” “conventional business practices,” or a “method of organizing human activity”
22
that has long been “prevalent in our system of commerce,” then the patent is directed to
23
an abstract idea. Alice, 134 S. Ct. at 2356; see DDR Holdings LLC v. Hotels.com, L.P.,
24
773 F.3d 1245, 1256 (Fed. Cir. 2014) (same). Moreover, concepts involving processes
25
humans can perform without the aid of a computer, such as processes that can be done
26
5
27
28
The Federal Circuit has strained for years to develop a coherent and consistent
test for ascertaining what is or is not an “abstract idea.” See MySpace, 672 F.3d at 1259
(“This effort to descriptively cabin § 101 jurisprudence is reminiscent of the oenologists
trying to describe a new wine.”).
- 10 -
1
mentally or using pen and paper, are generally directed to abstract ideas. See, e.g.,
2
Content Extraction & Transmission LLC v. Wells Fargo Bank, N.A., 776 F.3d 1343, 1347
3
(Fed. Cir. 2014) (noting that “humans have always performed” the functions of
4
collecting, recognizing, and storing data); CyberSource, 654 F.3d at 1373 (“[A] method
5
that can be performed by human thought alone is merely an abstract idea and is not
6
patent-eligible under § 101.”); Gottschalk, 409 U.S. at 67 (observing that the conversion
7
of binary numerals can be done mentally using a mathematical table). Notably, method
8
patents, like the ones at issue in this case, present “special problems in terms of
9
vagueness and suspect validity.” Bilski, 561 U.S. at 608.
10
If the claims at issue are directed to a patent-ineligible concept, the Court must
11
then consider “what else” encompasses the claims to determine whether an “inventive
12
concept,” i.e., “an element or combination of elements that is ‘sufficient to ensure that the
13
patent in practice amounts to significantly more than a patent upon the [ineligible
14
concept] itself,’” exists. Alice, 134 S. Ct. at 2360 (quoting Mayo, 132 S. Ct. at 1298). The
15
Supreme Court has recognized that “[a]t some level, all inventions embody, use, reflect,
16
rest upon, or apply laws of nature, natural phenomenon, or abstract ideas.” Id. at 2354
17
(citing Diamond, 450 U.S. at 187). Thus, only if an invention applies a patent-ineligible
18
concept towards a “new and useful end” will it remain eligible for patent protection. Id.
19
(citing Gottschalk, 409 U.S. at 67). To perform this analysis, the Court reviews “the
20
elements of each claim both individually and as an ordered combination to determine
21
whether the additional elements transform the nature of the claim into a patent-eligible
22
application.” Id. (internal quotations omitted). Ultimately, the Court must “distinguish
23
between patents that claim the building blocks of human ingenuity and those that
24
integrate the building blocks into something more, thereby transforming them into a
25
patent-eligible invention.” Id. (citing Mayo, 132 S. Ct. at 1303).
26
Notably, “[m]erely requiring a generic computer implementation fails to transform
27
[an] abstract idea into a patent-eligible invention.” Id. at 2352; see, e.g., buySAFE, Inc. v.
28
Google, Inc., 765 F.3d 1350, 1354–55 (Fed. Cir. 2014) (noting that Alice “made clear that
- 11 -
1
a claim directed to an abstract idea does not move into § 101 eligibility territory by
2
merely requiring generic computer implementation” (quotation omitted)); Ultramercial,
3
Inc. v. Hulu, LLC, 772 F.3d 709, 717 (Fed. Cir. 2014) (“[A]dding a computer to
4
otherwise conventional steps does not make an invention patent-eligible.”). If the claim
5
purports to solve a problem arising only in the Internet context, the claim must be
6
innovative enough to “override[] the routine and conventional” use of the computer. DDR
7
Holdings, 773 F.3d at 1258–59.
8
3.
Burden of Proof
9
By statute, issued patents are “presumed valid.” § 282(a). As the party challenging
10
the validity of the Asserted Patents, GoDaddy bears the burden of proof. See Microsoft
11
Corp. v. i4i Ltd. P’ship, 131 S. Ct. 2238, 2242 (2011). RPost argues that GoDaddy must
12
meet this burden by setting forth “clear and convincing evidence” of patent ineligibility.
13
(Doc. 299 at 14). GoDaddy, however, contends that “the usual presumption of validity
14
does not apply” to issues of patent-eligibility. (Doc. 257 at 8).
15
While district courts have varied in their approaches when ruling on a validity
16
challenge based on patent-eligibility, see, e.g., Broadband iTV, Inc. v. Oceanic Time
17
Warner Cable, LLC, 135 F. Supp. 3d 1175, 1180 (D. Haw. 2015) (declining to apply the
18
presumption of validity but requiring clear and convincing evidence to prove underlying
19
questions of fact); Tranxition, Inc. v. Lenovo (U.S.) Inc., 2015 WL 4203469, at *5 (D. Or.
20
July 9, 2015) (“[T]he Court fails to see how the ‘clear and convincing’ standard applies to
21
the validity analysis under Section 101 in this case.”), and at least one Federal Circuit
22
judge believes that “applying a presumption of eligibility is particularly unwarranted,”
23
Ultramercial, 772 F.3d at 720 (Mayer, J., concurring), neither the Supreme Court nor the
24
Federal Circuit has issued a controlling decision designating which standard applies.
25
Nonetheless, the Court finds it unnecessary to resolve this issue because even if the clear
26
and convincing standard applied and the Asserted Patents were presumed eligible, the
27
result of this case would be no different than if the preponderance of the evidence
28
standard applied without a presumption of validity.
- 12 -
1
4.
Feldbau Patent6
2
The Feldbau Claims disclose a “method of authenticating” that a sender of a
3
“dispatch” “electrically transmitted” it to a particular destination at a particular time and
4
that it had a particular content. ‘219 Patent, col. 2 ll. 56–col. 3 ll. 14 (amended version).7
5
The Feldbau Claims accomplish this objective by having the sender of the transmission
6
“electrically transmit” the contents to a non-interested third party, i.e., “an authenticator.”
7
Id. at col. 2 ll. 63–67. The authenticator then “associates” information such as the time of
8
the successful transmission and the dispatch’s contents to “generate” data that
9
“authenticate[s] the dispatch and the contents of the dispatch,” i.e., “authentication data.”
10
Id. at col. 3 ll. 1–7. The authenticator must also “secure” the authentication data “against
11
tampering.” Id. at col. 3 ll. 8–10. In full, the Feldbau Claims recite as follows:
12
13
14
15
16
17
18
19
20
21
22
60. A method of authenticating a dispatch and contents of the
dispatch successfully transmitted from a sender to a recipient, comprising
the steps of:
receiving content data representative of the contents of the dispatch
originated from the sender and being electrically transmitted to said
recipient, and a destination of the dispatch;
providing an indicia [relating to] of a time of successful
transmission of the dispatch to the recipient, said time related indicia being
recorded by an authenticator and provided in a manner resistant to or
indicative of tampering by either of the sender and the recipient;
associating, by [an] the authenticator functioning as a noninterested
third party with respect to the sender and the recipient, the content data with
dispatch record data which includes at least said time related indicia and an
indicia related to the destination of the dispatch, to generate authentication
data which authenticate the dispatch and the contents of the dispatch; and
securing by said authenticator at least part of the authentication data
against tampering of the sender and the recipient;
23
24
25
26
6
The asserted claims of the Feldbau Patent are Claim Nos. 60, 62, 66, and 69. See
(Docs. 258 at 12; 271-5 at 2; 300 at 10). These claims will be referenced herein as the
“Feldbau Claims.”
7
27
28
In 2012, the Feldbau Patent underwent an Ex Parte Reexamination by the
USPTO. See (Doc. 271-16 at 25). Several claims—including two of the claims asserted
against GoDaddy in this case—were amended upon Reexamination. See (id. at 26). When
citing to the reexamined patent, the Court will refer to it as the “amended version.”
- 13 -
1
2
3
4
5
6
7
8
9
10
11
12
13
wherein at least one of the steps of associating and securing utilizes
mathematical association methods for a selected portion of a combination
of the content data and the dispatched record data.
Id. at col. 2 ll. 56–col. 3 ll. 14 (amendments by Ex Parte Reexamination Certificate are
shown in italics; deletions in bolded square brackets).
62. A method according to claim 60, further including the step of providing
an output of at least part of the authentication data.
‘219 Patent, col. 24 ll. 32–34.
66. A method according to claim 60, wherein the step of providing the time
[related] indicia includes generating the time [related] indicia.
‘219 Patent, col. 3 ll. 17–19 (amended version) (amendments by Ex Parte Reexamination
Certificate are shown in italics; deletions in bolded square brackets).
69. A method according to claim 60, wherein the authentication data further
includes a delivery indicia relating to said dispatch.
‘219 Patent, col. 24 ll. 52–54.
14
To begin, the Court must determine whether the Feldbau Claims are drawn to a
15
patent-ineligible concept, i.e., law of nature, natural phenomena, or abstract idea. See
16
Alice, 134 S. Ct. at 2355. If so, the Court will then consider whether the claims add an
17
“inventive concept” such that the ineligible concept transforms into a patent-eligible
18
application. Id.
19
a.
Step One: Patent-Ineligible Concept
20
GoDaddy argues that the Feldbau Claims are directed to the abstract idea of
21
collecting and providing information about a dispatch and its contents using a third party
22
intermediary. (Doc. 257 at 18). GoDaddy contends that the asserted claims simply apply
23
“pure math” to accomplish its goals. (Id.) In response, RPost insists that the Feldbau
24
Claims “address[] the specific technical problem of proving that specific information has
25
been electronically sent at a specific time to a specific receiving party” by having an
26
“authenticator [] generate authentication data which authenticate[s] the dispatch and the
27
contents of the dispatch.” (Doc. 299 at 20). RPost explains that the Feldbau Claims do not
28
use “pure math” but apply “specific functions” performed by the authenticator. (Id.)
- 14 -
1
Although RPost’s application of the Feldbau Claims may be phrased in its narrow,
2
flowery rhetoric, the claim language is not nearly as particularized. Rather, the Feldbau
3
Claims are directed to a general method of collecting and providing information about a
4
dispatch using a third party intermediary. This is an abstract idea that has an extensive
5
history dating back decades, if not centuries. For example, the Fedlbau Patent’s
6
specification posits that “[p]ost, courier, forwarding and other mail services, which
7
enable people to exchange documents and data, have been widely used both in the past
8
and at the present time.” ‘219 Patent, col. 1 ll. 23–29. The specification further describes
9
how third party intermediaries collect and provide certain information about a message in
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
the modern world,
Proof of delivery of non-electronic documents is provided, for
example, by Registered Mail and courier services. It is commonly used to
authenticate the delivery of materials at a certain time to a certain party, and
serves as admissible proof of delivery in a court of law. However, no proof
is provided as to the information contents of the specific dispatch.
E-mail and other electronic messages forwarding services are
commonly used today. The sender sends a message to the dispatching
service which, in turn, forwards the message to the destination and provides
the sender with a delivery report which typically includes the date and time
of the dispatch, the recipient’s address, the transmission completion status,
and sometimes even the transmitted data, the number of pages delivered,
the recipient’s identification information, and so on. The provided delivery
report mainly serves for accounting purposes and for notifying the sender
of the dispatch and/or its contents. . . .
Id. at col. 2 ll. 26–44. Thus, the specification’s own language details how the general
concept at the heart of the Feldbau Claims is one that has been implemented for years.
Moreover, despite the possibility for a narrow application, the Court finds that the
claimed idea is comparable to claims that the Supreme Court and Federal Circuit have
determined to be drawn to abstract ideas. See, e.g., Gottschalk, 409 U.S. at 71 (holding
abstract and ineligible patent claims involving an algorithm for converting binary-coded
decimal numerals into pure binary form); Parker v. Flook, 437 U.S. 584, 594–95 (1978)
(holding abstract and ineligible a mathematical formula for computing “alarm limits” in a
catalytic conversion process); Alice, 134 S. Ct. at 2360 (holding abstract and ineligible a
- 15 -
1
generalized computer method of intermediated settlement whereby two parties using a
2
third-party intermediary exchange financial obligations); Bilski, 561 U.S. at 609 (finding
3
that the concept of “hedging or protecting against risk” was drawn to an abstract idea);
4
buySAFE, 765 F.3d at 1353, 1355 (finding that “transaction performance guaranty” was
5
an abstract idea because the “narrowing of such long-familiar commercial transactions [to
6
particular relationships] does not make the idea non-abstract for section 101 purposes”);
7
Digitech Image Techs. LLC v. Elecs. for Imaging, Inc., 758 F.3d 1344, 1348–51 (Fed.
8
Cir. 2014) (holding that claims directed to digital image processing using math to
9
combine data into a device profile were too abstract despite narrow application);
10
Intellectual Ventures I LLC v. Capital One Bank, 792 F.3d 1363, 1367 (Fed. Cir. 2015)
11
(holding that a method patent aimed at “tracking” and “storing” information was directed
12
to patent-ineligible abstract idea of budgeting); Bancorp Servs., L.L.C. v. Sun Life Assur.
13
Co. of Canada (U.S), 687 F.3d 1266, 1278 (Fed. Cir. 2012) (holding that a method patent
14
to track, reconcile, and administer life insurance policies was not drawn to patent eligible
15
subject matter); In re TLI Commc’ns, 2016 WL 2865693, at *3 (concluding that claims
16
directed to “classifying and storing digital images in an organized manner” were abstract
17
and ineligible); Content Extraction, 776 F.3d.at 1347 (finding that claims directed to
18
collecting, recognizing, and storing data were abstract and ineligible); Cyberfone Sys.,
19
LLC v. CNN Interactive Grp., Inc., 558 F. App’x. 988, 991–92 (Fed. Cir. 2014)
20
(concluding that concept of “using categories to organize, store, and transmit
21
information” is an abstract idea).
22
Moreover, the Feldbau Claims are not directed to a specific improvement in
23
computer functionality but simply recite conventional and generic technology to perform
24
“generalized steps” in a well-known computer environment. Enfish, 2016 WL 2756255,
25
at *4–5; see In re TLI Commc’ns, 2016 WL 2865693, at *3 (same). RPost’s argument
26
that the Feldbau Claims do not solely rely on “pure math” to “associat[e]” information is
27
belied by a cursory review of the claim language. Particularly, the claims designate only
28
one possible “association” or “securing” method: “mathematical association.” ‘219
- 16 -
1
Patent, col. 3 ll. 11–14 (amended version). Beyond “mathematical association,” the
2
claims do not recite any other method for how the undefined “authenticator” is to
3
associate or secure the data or detail what “mathematical association” method is to be
4
applied. Even if the claim language did so, the claims would still be drawn to an abstract
5
idea. See Ultramercial, 772 F.3d at 715 (“Although certain additional limitations, such as
6
consulting an activity log, add a degree of particularity, the concept embodied by the
7
majority of the limitations describes only the abstract idea[.] ”).
8
Furthermore, the method outlined in the Feldbau Claims is directed to a patent-
9
ineligible “mental” process. The claimed “associating” and “securing” functions, “while
10
‘primarily useful for computerized [applications],’ could still be made [using a] pencil
11
and paper.” Parker, 437 U.S. at 586 (citations omitted). In fact, the Feldbau Claims are
12
not even limited to an electronic embodiment. The only language plausibly requiring
13
electronic implementation is “receiving content data representative of the contents of the
14
dispatch originated from the sender and being electrically transmitted to said recipient,
15
and a destination of the dispatch.” ‘219 Patent, col. 2 ll. 59–62. However, whether the
16
“sender” or “recipient”8 “electrically transmit” a dispatch has no bearing on whether the
17
authenticator’s claimed functionality is restricted to an electronic embodiment.9 To be
18
sure, the specification teaches that the claimed authenticator-implemented functions of
19
“associating” and “securing” can be performed manually. Particularly, Figure 1 illustrates
20
as follows:
21
22
23
24
25
26
27
28
8
The Court construed “sender” and “recipient” as requiring “computerized
devices.” (Doc. 219 at 101–03). Nonetheless, whether the “sender” and “recipient”
require computerized devices has no bearing on the functionality of the authenticator,
which is a separate and distinct third-party intermediary.
9
At Markman, the parties stipulated that “authenticator” be construed as “a subsystem that operates to authenticate a dispatch.” (Doc. 219 at 26). This construction does
not necessarily limit the authenticator to an electronic embodiment.
- 17 -
1
2
3
4
5
6
7
8
9
10
11
12
13
‘219 Patent, Fig. 1. The specification defines Figure 1 as a “schematic pictorial
14
illustration of the authentication method of the present invention implemented in a
15
manual manner,” id. at col. 4 ll. 45–47, and describes Figure 1 as follows:
16
17
18
19
20
21
22
23
24
25
26
27
28
Reference is now made to FIG. 1 which illustrates the method of the
present invention as it can be implemented for paper documents being sent
non-electronically. The method of FIG. 1 can be implemented for
documents sent via any document dispatching service, such as a courier
service or the registered mail service of the post office.
The sender 10 provides the documents 12 to be sent and a
destination address 14 to a clerk 20 of the document dispatching service.
The clerk 20 prepares a dispatch sheet 26, which typically has a unique
dispatch identifier (not shown) and has room for dispatch information such
as the date and time of dispatch or delivery 16, the destination address 14,
an indication 18 of proof of delivery such as the recipient’s identity and/or
signature, and optionally, additional dispatch information such as the
dispatcher’s signature and the identity of the sender.
The clerk 20 fills in the dispatch sheet 26 with the date/time 16 and
the address 14, and then prepares a copy 24 of the documents 12 and a copy
34 of the dispatch sheet 26, typically by utilizing a copy machine 22 or an
electronic scanner. The clerk 20 then places the original documents 12 into
an envelope 28 carrying the address 14, and sends the envelope 28 to its
destination 30. In one embodiment of the present invention the dispatching
service utilizes a cash-register like device to fill in the dispatch sheet 26.
- 18 -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
This provides for reliable time stamping and automated dispatch record
keeping. Furthermore, the electronic dispatch information produced by
such device can be associated using a special mathematical method as
discussed in greater detail below.
The clerk 20 associates the copy 24 of the documents 12 with the
copy 34 of the dispatch sheet 26 by any method, a few examples of which
follow:
a) by inserting the documents copy 24 and the dispatch sheet copy
34 into an envelope 32;
b) by inserting the copy 24 of the documents into an envelope 32 and
marking the dispatch identifier on the outside of the envelope 32;
c) by printing the dispatch identifier on the documents copy 24; or
d) attaching the copies 24 and 34 and applying the stamp of the
dispatch service in such a manner that part of the stamp is on the copy 24 of
the documents and part of the stamp is on the copy 34 of the dispatch sheet
26.
Preferably, the clerk 20 secures the copies 24 and 34 in a manner
that makes it difficult to modify or replace the information contained
therein, for example by marking the pages of the copy 24 with the
dispatching service’s signature, stamp or seal, by spreading each page with
invisible or other ink, by sealing the envelope 32 or by retaining them in the
service’s secure file 36 and so forth.
Id. at col. 4 ll. 66–col. 5 ll. 50 (emphasis added); see also id. at col. 5 ll. 51–col. 6 ll. 30.
Based on this language, it is indisputable that the Feldbau Claims are directed to a
concept that can be performed manually.10 Regardless, even if an electronic limitation for
the claimed method existed, it would do little to limit the Feldbau Claims’ expansive
scope. The specification makes clear that the Feldbau Claims are not restrained to a
particular application as they encompass “all types” of information, “all types” of
dispatch methods, and “all types” of methods and devices for “associating” and
“securing” the authentication data. Id. at col. 4 ll. 1–7 ll. 16–19. This lack of specificity
underscores the abstract nature of the claims. See Internet Patents, 790 F.3d at 1348–49
10
During oral argument, RPost attempted to distinguish Figure 1 as not being a
pictorial representation of the “authenticator” because the specification does not
expressly define it as such. This argument is unpersuasive. The specification
unambiguously defines Figure 1 as an illustration of “the authentication method of the
present invention.” Id. at col. 4 ll. 45–47. There can be no dispute that the Feldbau
Claims embody the “authentication method of the present invention.”
- 19 -
1
(finding that claims were directed to abstract idea of maintaining computer state without
2
recitation of specific activity used to generate that result).
3
Finally, RPost’s argument that the Feldbau Claims “do not preempt all ways of
4
accomplishing the alleged abstract idea,” (Doc. 299 at 21), is not dispositive. The Federal
5
Circuit confirmed that the simple fact that “the claims do not preempt all [methods of
6
providing information about a dispatch] or may be limited to [such activity in the
7
electronic] setting do not make them any less abstract.” OIP Techs., Inc. v. Amazon.com,
8
Inc., 788 F.3d 1359, 1362–63 (Fed. Cir. 2015) (citing buySAFE, 765 F.3d at 1355).
9
For these reasons, the Court concludes that the Feldbau Claims, describing a
10
method of collecting and providing information about a dispatch and its contents using a
11
third-party intermediary, falls squarely within the “collection and organization of data”
12
characterization deemed by the Federal Circuit to be abstract. CyberSource, 654 F.3d at
13
1370; see, e.g., YYZ, LLC v. Hewlett-Packard Co., 2015 WL 5886176, at *3 (D. Del. Oct.
14
8, 2015) (“Because computer software comprises a set of instructions, the first step of
15
Alice is, for the most part, a given; i.e., computer-implemented patents generally involve
16
abstract ideas.”). Thus, the Feldbau Claims are directed to an abstract idea.
17
b.
Step Two: Inventive Concept
18
Because the Feldbau Claims are drawn to a patent-ineligible concept, the Court
19
must next consider whether the claims add an “inventive concept” that transforms the
20
claims into a patent-eligible application. See Alice, 134 S. Ct. at 2355. The Court finds
21
that beyond the abstract idea of collecting and providing information about a particular
22
dispatch, the claims merely recite “well-understood, routine conventional activities,” such
23
as mathematical association or routine data-gathering and storing steps. Id. at 2359
24
(quoting Mayo, 132 S. Ct. at 1294). Considered individually or taken together as an
25
ordered combination, the claim elements fail to “‘transform’ the claimed abstract idea
26
into a patent-eligible application.” Id. at 2357 (quoting Mayo, 132 S. Ct. at 1294, 1298).
27
RPost insists that the Feldbau Claims disclose at least two inventive concepts: the
28
“authenticator”-implemented steps of (1) associating content data with dispatch record
- 20 -
1
data to generate authentication data and (2) securing the authentication data. (Doc. 299 at
2
21–22). But beyond requiring that “at least one of the steps of associating and securing”
3
be performed by an undefined “mathematical association method,” the Feldbau Claims
4
do not specify what type of mathematical association is performed or explain how the
5
content data is associated with the dispatch record data in a manner that generates
6
authentication data. See ‘219 Patent, col. 3 ll. 11–14 (amended version). Similarly, the
7
unremarkable claim that the authentication data “authenticate[s] the dispatch and the
8
contents of the dispatch,” id. at col. 3 ll. 6–7, fails to explain what material comprises the
9
authentication data.
10
Furthermore, the Feldbau Claims do not detail what the “authenticator” actually is
11
or how the device secures the data against tampering beyond requiring “at least one of”
12
the associating or securing steps be performed by an amorphous “mathematical
13
association method.” Id. at col. 3 ll. 11–14. Instead, the “authenticator” is loosely defined
14
as “all types of apparatus” capable of performing the associating and securing functions,
15
see ‘219 Patent, col. 4 ll. 16–19, and therefore is not tied to “a particular machine or
16
apparatus,” Bilski, 561 U.S. at 601. In other words, the Feldbau Claims broadly indicate
17
what the “authenticator” does, but not what it is; this does not add “significantly more” to
18
the abstract idea. See Alice, 134 S. Ct. at 2355 (citing Mayo, 132 S. Ct. at 1294).
19
Ultimately, the Court finds that the “associating” and “securing” “computer
20
functions are ‘well-understood, routine, conventional activit[ies]’ previously known to
21
the industry.” Id. at 2359 (quoting Mayo, 132 S. Ct. at 1294); see buySAFE, 765 F.3d at
22
1355 (“That a computer receives and sends the information over a network—with no
23
further specification—is not even arguably inventive.”); OIP Techs., 788 F.3d at 1363
24
(holding that “sending a first set of electronic messages over a network to devices, the
25
devices being programmed to communicate, storing test results in a machine-readable
26
medium, and using a computerized system . . . to automatically determine an estimated
27
outcome and setting a price” were conventional activities); CyberSource, 654 F.3d at
28
1373 (“[C]omputational methods which can be performed entirely in the human mind are
- 21 -
1
the types of methods that embody the ‘basic tools of scientific and technological work’
2
that are free to all men and reserved exclusively to none.” (quoting Gottschalk, 409 U.S.
3
at 67)). The Feldbau Claims merely “add” the generic computer functions of
4
“associating” and “securing” to the claimed abstract idea of collecting and providing
5
information about a particular dispatch. As explained above, these steps could be
6
performed by humans without a computer as the only connection to an electrical
7
embodiment concerns the sending of the message, not the functions of the authenticator.
8
See Mortg. Grader, Inc. v. First Choice Loan Servs. Inc., 811 F.3d 1314, 1324 (Fed. Cir.
9
2016) (“The series of steps covered by the asserted claims—borrower applies for a loan,
10
a third party calculates the borrower’s credit grading, lenders provide loan pricing
11
information to the third party based on the borrower’s credit grading, and only thereafter
12
(at the election of the borrower) the borrower discloses its identity to a lender—could all
13
be performed by humans without a computer.”). This is not enough to constitute an
14
inventive concept under Alice. See DDR Holdings, 773 F.3d at 1256 (“[A]fter Alice, there
15
can remain no doubt: recitation of generic computer limitations does not make an
16
otherwise ineligible claim patent-eligible. The bare fact that a computer exists in the
17
physical rather than purely conceptual realm is beside the point.” (internal citations and
18
quotation marks omitted)); Ultramercial, 772 F.3d at 717 (“[A]dding a computer to
19
otherwise conventional steps does not make an invention patent-eligible.”).11
20
Finally, nothing in the Feldbau Claims “purport[s] to improve the functioning of
21
the computer itself,” Alice, 134 S. Ct. at 2359, “effect an improvement in any other
22
technology or technical field,” id.; see Enfish, 2016 WL 2756255, at *4, or solve a
23
problem unique to the Internet, see DDR Holdings LLC, 773 F.3d at 1257. The Feldbau
24
Claims’ method of converting input information (i.e., dispatch time, content, and
25
destination data) to output information (i.e., authentication data) does not add
26
27
28
11
In fact, the encryption and association methods described in the Feldbau
Patent’s specification are described as “widely used for security and for authentication
purposes.” ‘219 Patent, col. 2 ll. 9–18.
- 22 -
1
significantly more to the claimed abstract idea, see Alice, 134 S. Ct. at 2358, nor is it
2
innovative enough to “override the routine and conventional” use of the computer, see
3
DDR Holdings, 773 F.3d at 1258–59; Enfish, 2016 WL 2756255, at *7–8.
4
In sum, the Feldbau Claims are directed to the abstract idea of collecting and
5
providing information about a particular dispatch and its contents using an unspecified
6
“authenticator” that applies an undefined “mathematical association method” to
7
“associate” and “secure” pre-existing information. These generic conventional
8
activities—even if carried out by a computer—are not sufficient to pass the second step
9
of Alice. See, e.g., Intellectual Ventures I, 792 F.3d at 1368 (“Instructing one to ‘apply’
10
an abstract idea and reciting no more than generic computer elements performing generic
11
computer tasks does not make an abstract idea patent-eligible.” (quoting Alice, 134 S. Ct.
12
at 2359–60)); Digitech, 758 F.3d at 1349–51 (holding ineligible a concept of gathering
13
and combining data by reciting steps of organizing information through mathematical
14
relationships where the gathering and combining merely employed mathematical
15
relationships to manipulate existing information to generate additional information in the
16
form of a “device profile” without limit to any use of the device profile).
17
c.
Conclusion
18
For the foregoing reasons, the Court concludes that the Feldbau Claims are drawn
19
to the abstract idea of collecting and providing information about a particular dispatch
20
and fail to add “significantly more” such that an “inventive concept” “transforms” that
21
idea into a patent-eligible application. See Alice, 134 S. Ct. at 2355. Accordingly, the
22
Court will grant GoDaddy’s motion for summary judgment on this issue and declare that
23
Feldbau Patent Claim Nos. 60, 62, 66, and 69 are invalid under § 101.
24
5.
Tomkow Patents
25
GoDaddy also contends that the Tomkow Patents claim patent-ineligible subject
26
matter without adding inventive concepts to confer validity. (Doc. 257 at 10–14). In
27
GoDaddy’s view, the Tomkow Patents are all directed to the same abstract idea:
28
“collecting and providing information for verifying transmission and/or delivery of a
- 23 -
1
message.” (Id. at 14). GoDaddy argues that no inventive concept is added because the
2
claims merely address conventional activities without solving a problem unique to the
3
Internet. (Id. at 14–15).
4
RPost responds that the Tomkow Patents do not simply recite the collection and
5
provision of generic information about a message but provide “specific” steps to verify
6
the receipt of a message using “specific information.” (Doc. 299 at 14). To that end,
7
RPost argues that the Tomkow Patents provide a technical solution to a technical
8
problem. (Id. at 17). RPost explains that “[t]he technical problem addressed by the
9
Tomkow patents is providing reliable proof of content and delivery of electronic
10
messages without requiring the co-operation of the recipient and without requiring
11
special e-mail software,” while the technical solution entails “using an intermediate
12
server between a sender and receiver of an electronic message” to provide a “first
13
information” or “authenticatible information.” (Id. at 17–18). Thus, RPost insists that the
14
inventive concept “does not lie in the computer hardware” or software but “in the
15
technical features recited by the asserted claims.” (Id. at 19).
16
As noted above, the Tomkow Patents are the ‘913, ‘104, ‘198, ‘199, and ‘389
17
Patents. These patents share a specification and are broadly described as “a system and
18
method for verifying delivery and integrity of electronic messages.” See ‘913 Patent,
19
(54). Nonetheless, each Tomkow Patent describes a slightly different method to provide
20
slightly different information, and thus, the Court will address each patent separately.
21
a.
‘913 Patent12
22
The ‘913 Patent Claims disclose “a system and method for verifying delivery and
23
integrity of electronic messages” sent by a sender to a recipient through a server. Id. The
24
‘913 Patent Claims accomplish this goal by having the server record “some portion” of a
25
mail transport protocol dialog, either Simple Mail Transport Protocol (“SMTP”) or
26
Extended Mail Transport Protocol (“EMTP”), in which a Mail Transport Agent (“MTA”)
27
28
12
The asserted ‘913 Patent claims are Claim Nos. 1 and 2. See (Docs. 258 at 2;
271-5 at 2; 300 at 2). These claims will be referenced as the “’913 Patent Claims.”
- 24 -
1
for the recipient accepts or declines delivery of the message. Id. at col. 27 ll. 48–54. In
2
full, the ‘913 Patent Claims recite as follows:
3
4
5
6
7
8
9
10
11
12
13
14
15
1. A method of transmitting a message from a sender to a recipient
through a server acting as a Mail Transport Agent, including the steps at the
server of:
transmitting the message to the recipient’s Mail Transport Agent in a
protocol dialog selected from a group consisting of the selected one of the
SMTP and ESMTP protocols; and
recording at the server some portion of the selected one of the SMTP
and ESMTP protocol dialog between the server and the recipient through
the server including those portions of the selected one of the SMTP and
ESMTP protocol dialog between the server and the recipient in which the
receiving Mail Transport Agent accepts or declines delivery of the
transmitted message
2. The method as set forth in claim 1, including the step of:
storing the recorded dialog in some form in which it may be
associated with the message and the sender and the recipient of the message
in such a way that it may be used to document the delivery history of the
message from the sender to the recipient.
Id. at col. 27 ll. 41–60.
i.
16
Step One: Patent-Ineligible Concept
17
The Court finds that the ‘913 Patent Claims are directed to the abstract idea of
18
collecting information about the delivery of a message. Similar to the Feldbau Claims,
19
the concept of collecting delivery information about a message has been practiced in
20
various forms for decades, if not centuries. Most notably, the method disclosed by the
21
‘913 Patent Claims is essentially an electronic version of certified or registered mail that
22
has long been implemented by the United States Postal Service (“USPS”). See ‘913
23
Patent, col. 1 ll. 33–37; (Docs. 258 at 5–8; 294 at 26).13 In fact, the ‘913 Patent’s
24
13
25
26
27
28
To the extent RPost “objects” to GoDaddy’s provision of historical references
concerning USPS under Local Rule of Civil Procedure for the District Court of Arizona
7.2(m)(2), see (Doc. 299 at 22–23), the Court overrules the objection. Not only do the
Tomkow Patents disclose that the patented subject matter attempts to mirror the services
provided by USPS, see, e.g., ‘219 Patent, col. 2 ll. 26–33; ‘913 Patent, col. 1 ll. 28–42,
GoDaddy analyzed the USPS relationship during Markman briefing, see, e.g., (Doc. 117
at 12), and disclosed the USPS connection in its invalidity contentions, see (Doc. 304-1 at
- 25 -
1
specification details how USPS and private mail carriers such as the United Parcel
2
Service (“UPS”) and Federal Express (“FedEx”) provide “confirmation that [a] letter was
3
successfully delivered to the addressee or the addressee’s authorized agent.” ‘913 Patent,
4
col. 1 ll. 33–42. The shared-specification goes on to teach that the goal of the Tomkow
5
Patents is to reach if not surpass the evidentiary heights of USPS-registered mail. See id.
6
at col. 3 ll. 11–14. In other words, the heart of the ‘913 Patent Claims is directed to a
7
“conventional business practice” that has long been “prevalent in our system of
8
commerce.” Alice, 134 S. Ct. at 2356.
9
Much of what RPost believes is pertinent under the first step of Alice is more
10
applicable to the second step of the inquiry. For example, whether the ‘913 Patent Claims
11
disclose “specific” or “defined” steps, see (Doc. 299 at 14), speaks to whether the claims
12
add “something more” to transform the claimed concept into a patent-eligible application,
13
not whether the concept itself is abstract. See Ultramercial, 772 F.3d at 715 (“We do not
14
agree . . . that the addition of merely novel or non-routine components to the claimed idea
15
necessarily turns an abstraction into, something concrete. In any event, any novelty in
16
implementation of the idea is a factor to be considered only in the second step of the
17
Alice analysis.”). Being abstract does not mean that a concept is devoid of steps. Multi-
18
step, computer-implemented method patents are frequently found ineligible as directed to
19
abstract ideas. See, e.g., Digitech, 758 F.3d at 1349–51; Mortg. Grader, 811 F.3d at 1324;
20
Internet Patents, 790 F.3d at 1348–49. Here, although the ‘913 Patent Claims include
21
“specific” steps, the steps are “generalized steps to be performed on a computer using
22
conventional computer activity.” Enfish, 2016 WL 2756255, at *7. The “heart” of a
23
patent is determinative for Alice step one, see Ultramercial, 772 F.3d at 714, and as
24
expressed above, the heart of the ‘913 Patent Claims is drawn to the abstract idea of
25
collecting information about the delivery of a message.
26
RPost also argues that the numerous prior art references disclosed in the
27
specification demonstrate that there is “no risk of preempting . . . the entire field of
28
4). The Court finds these disclosures are adequate.
- 26 -
1
creating a delivery receipt using tracking information.” (Doc. 299 at 15–16). The Federal
2
Circuit has soundly rejected this argument. In Vehicle Intelligence & Safety LLC v.
3
Mercedes-Benz USA, LLC, the appellant argued that “the existence of prior art methods
4
of equipment operator testing, evidenced by the eleven prior art references identified in
5
the . . . specification, prove that the claims at issue do not preempt the abstract idea of
6
performing equipment operator testing because these references describe non-infringing
7
methods for doing so.” 2015 WL 9461707, at *3 (Fed. Cir. Dec. 28, 2015). The Federal
8
Circuit jettisoned this contention as “meritless” because “the mere existence of a non-
9
preempted use of an abstract idea does not prove that a claim is drawn to patent-eligible
10
subject matter.” Id. The Federal Circuit explained that if it adopted such an approach,
11
then “all a patentee would need do to insulate itself from a § 101 challenge would be to
12
identify a single prior art reference in the specification and state that its invention
13
improves upon that reference.” Id.; see also OIP Techs., 788 F.3d at 1362–63.
14
Furthermore, the tangible, physical components recited by the ‘913 Patent Claims
15
“merely provide a generic environment in which to carry out the abstract idea” of
16
collecting information about the delivery of a message. In re TLI Commc’ns, 2016 WL
17
2865693, at *3; see ART+COM Innovationpool GmbH v. Google Inc., 2016 WL
18
1718221, at *4 (D. Del. Apr. 28, 2016) (finding that claim was drawn to “abstract idea of
19
storing image data, then repeatedly requesting specific data, which is then stored and
20
displayed”). The specification’s emphasis that the present invention “relates generally to
21
a system and method for verifying delivery and content of an electronic message,” ‘913
22
Patent, col. 1 ll. 21–22, without requiring any “special e-mail software,” id. at col. 2 ll.
23
67–col. 3 ll. 1, underscores that the ‘913 Patent Claims are directed to an abstract idea.
24
Finally, the Court finds that the concept of collecting information about the
25
delivery of a message is no less abstract than any of the concepts the Supreme Court and
26
Federal Circuit have determined to be drawn to abstract ideas. See, e.g., CyberSource,
27
654 F.3d at 1370 (“collection and organization of data”); Gottschalk, 409 U.S. at 71
28
(algorithm for converting binary-coded decimal numerals into pure binary form); Parker,
- 27 -
1
437 U.S. at 594–95 (formula for computing “alarm limits” in a catalytic conversion
2
process); Alice, 134 S. Ct. at 2360 (intermediated settlement whereby two parties using a
3
third-party intermediary exchange financial obligations); Bilski, 561 U.S. at 609
4
(“hedging or protecting against risk”); buySAFE, 765 F.3d at 1353, 1355 (“transaction
5
performance guaranty”); Digitech, 758 F.3d at 1348–51 (digital image processing using
6
math to combine data into a device profile); Intellectual Ventures I, 792 F.3d at 1367
7
(“tracking” and “storing” information directed to abstract idea of budgeting).
8
For these reasons, the Court finds that the ‘913 Patent Claims merely “recite[]
9
generalized steps to be performed on a computer using conventional computer activity,”
10
Enfish, 2016 WL 2756255, at *7 (citations omitted), and are directed to the abstract idea
11
of collecting information about the delivery of a message.
12
ii.
Step Two: Inventive Concept
13
Because the ‘913 Patent Claims are drawn to a patent-ineligible concept, the Court
14
must now determine whether there is “significantly more” in the claims that “transforms”
15
that concept into a patent-eligible application. Alice, 134 S. Ct. at 2355.
16
Claim 1 of the ‘913 Patent recites that a message is “transmitt[ed]” to the
17
recipient’s MTA and the server “record[s] some portion of the selected one of the SMTP
18
and ESMTP protocol dialog,” ‘913 Patent, col 27 ll. 48–49, while Claim 2 states that the
19
server “stor[es] the recorded dialog,” id. at col. 27 ll. 55–56. The ‘913 Patent Claims
20
therefore invoke three computer-executed functions—“transmitting” information,
21
“recording” information, and “storing” information—all of which can be implemented by
22
“nearly every computer.” See Alice, 134 S. Ct. at 2361 (“Nearly every computer [is]
23
capable of performing . . . basic calculation, storage, and transmission functions.”);
24
buySAFE, 765 F.3d at 1355 (“That a computer receives and sends the information over a
25
network—with no further specification—is not even arguably inventive.”). As expressed
26
above, the mere “recitation of generic computer limitations does not make an otherwise
27
ineligible claim patent-eligible.” DDR Holdings, 773 F.3d at 1256; see Ultramercial, 772
28
F.3d at 717 (“[A]dding a computer to otherwise conventional steps does not make an
- 28 -
1
invention patent-eligible.”). Here, the Court finds that the disclosed steps of
2
“transmitting,” “recording,” and “storing” pre-existing information are “computer
3
functions [that] are ‘well-understood, routine, conventional activit[ies]’ previously known
4
to the industry.” Alice, 134 S. Ct. at 2359 (quoting Mayo, 132 S. Ct. at 1294); see OIP
5
Techs., 788 F.3d at 1363 (holding that “sending a first set of electronic messages over a
6
network to devices, the devices being programmed to communicate, storing test results in
7
a machine-readable medium, and using a computerized system . . . to automatically
8
determine an estimated outcome and setting a price” were conventional activities).
9
RPost suggests “compelling evidence” exists that the ‘104, ‘389, and ‘913 Patents
10
provide a “technical solution to a technical problem” because the PTAB denied petitions
11
to institute CBM patent reviews of the three patents. (Doc. 299 at 18). The threshold
12
standard for instituting a CBM review is whether it is “more likely than not” that a patent
13
is un-patentable. 35 U.S.C. § 324(a). A CBM patent excludes patents for “technological
14
inventions,” i.e., patents that claim “a technological feature that is novel and obvious over
15
the prior art; and solves a technical problem using a technical solution.” 37 C.F.R.
16
§ 42.301(b). Regarding the ‘913 Patent, the PTAB denied the petitioner’s request because
17
the “conclusory language in the petition that none of the steps of a claim requires any
18
novel and unobvious technological implementation, or solves a technical problem,
19
without more, is not sufficient to demonstrate that the claimed subject matter is not a
20
technical invention.” (Doc. 304-5 at 10). The PTAB also faulted the petitioner for failing
21
to “analyze[] the method steps separately, instead of examining each claim as a whole, as
22
required” to determine whether the patent is a technological invention. (Id.)14
23
The Court has analyzed the ‘913 Patent Claims as a whole and concludes that no
24
“inventive concept” is recited, nor do the claims purport to solve a technical problem
25
using a technical solution. Instead, the claimed steps are conventional activities that
26
“nearly every computer” can perform. Alice, 134 S. Ct. at 2361. To the extent RPost
27
28
14
The PTAB applied similar reasoning for the ‘104 and ‘389 Patents. See
(Docs. 304-3 at 9–10; 304-4 at 9–10).
- 29 -
1
argues that the ‘913 Patent Claims solve a problem “necessarily rooted in computer
2
technology” as illustrated in DDR Holdings, see (Doc. 299 at 17), that argument fails for
3
two reasons. First, nothing in the claim language is innovative enough to “override[] the
4
routine and conventional” use of the computer. Enfish, 2016 WL 2756255, at *7–8; DDR
5
Holdings, 773 F.3d at 1258–59. In fact, the generalized steps of the ‘913 Patent Claims
6
are routine and conventional. Second, the problem purportedly addressed by the ‘913
7
Patent Claims is not “necessarily rooted in computer technology” as explained by DDR
8
Holdings. The “problem” of verifying the delivery of a message has long troubled mail
9
delivery systems, and the facile fact that the ‘913 Patent Claims are drawn to electronic
10
mailing is of no consequence. See, e.g., Alice, 134 S. Ct. at 2361; buySAFE, 765 F.3d at
11
1355. Ultimately, the claims are “recited too broadly and generically to be considered
12
sufficiently specific and meaningful applications of their underlying abstract ideas.” DDR
13
Holdings, 773 F.3d at 1256; see also Internet Patents, 790 F.3d at 1348 (finding patent
14
ineligible where claim “contain[ed] no restriction on how the result [was]
15
accomplished”). Accordingly, RPost’s “rooted in computer technology” and “technical
16
solution to technical problem” arguments do not furnish the necessary “inventive
17
concept” to confer patent-eligibility.
18
iii.
Conclusion
19
For the foregoing reasons, the Court concludes that the ‘913 Patent Claims are
20
directed to the abstract idea of collecting information about the delivery of a message and
21
fail to add an “inventive concept” that “transforms” the idea into a patent-eligible
22
application. Alice, 134 S. Ct. at 2355. Accordingly, the Court will grant GoDaddy’s
23
motion for summary judgment on this issue and declare that ‘913 Patent Claim Nos. 1
24
and 2 are invalid under § 101.
25
26
b.
‘104 Patent15
The ‘104 Patent Claims disclose a method of providing information about the
27
28
15
The asserted ‘104 Patent claims are Claim Nos. 1, 9, 27, 32. See (Docs. 258 at 2;
271-5 at 2; 300 at 2). These claims will be referenced as the “’104 Patent Claims.”
- 30 -
1
opening of an electronic message sent from a sender to a recipient through a server. See
2
‘104 Patent, col. 27 ll. 63–col. 28 ll. 16, col. 31 ll. 20–37. To accomplish this goal, the
3
server “add[s] a link” to the electronic message that executes when the message is opened
4
at the recipient to provide the server an indication that the message has been opened. Id.
5
Pursuant to Claim 1, the server then “provid[es] an authenticatible information” related to
6
the message, id. at col. 27 ll. 10–11, while under Claim 27, the server “constructs
7
authenticatible information” and “transmits” the “indication of opening” and
8
“authenticatible information” to the sender or originating processor, id. at col. 31 ll. 33–
9
37. In full, the ‘104 Patent Claims recite as follows:
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
1. A method of transmitting a message from a sender to a recipient
and providing an indication that the message was opened by the recipient,
comprising:
receiving the message at a server from the sender, the server being
displaced from the recipient,
adding a link to the message by the server, the link configured to
execute when the message is opened at the recipient to provide an
indication that the message has been opened by the recipient,
transmitting the message and the link from the server to the
recipient,
executing the link when the message is opened at the recipient to
control the server to provide an indication that the message has been
opened at the recipient,
providing an authenticatible information related to the message,
including the indication of the opening of the message at the recipient, at
the server,
transmitting the indication of the opening of the message at the
recipient, and the authenticatible information from the server to the sender.
Id. at col. 27 ll. 63–col. 28 ll. 16.
9. The method of claim 1, wherein transmitting the authenticatible
information includes transmitting a representation of the message.
Id. at col. 28 ll. 49–51.
27. A system for transmitting a message from an originating
processor to a recipient processor in an electronic mail system and
providing an indication that the message was opened by the recipient
processor, comprising:
28
- 31 -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
a server in electronic communication in the electronic mail system,
the server receiving the message from the originating processor and adding
a link to the message before transmitting the message and link to the
recipient processor, the link being configured to execute automatically
when the message is opened at the recipient processor to control the server
to provide an indication at the server that the message has been opened at
the recipient processor; and
wherein the server constructs authenticatible information related to
the message; and
wherein the server transmits the indication of the opening of the
message at the recipient processor and the authenticatible information to the
originating processor.
Id. at col. 31 ll. 20–37.
32. The system of claim 27, wherein the server transmits the
indication of the opening of the message at recipient processor and the
authenticatible information to the originating processor in a secure,
verifiable manner.
Id. at col. 32 ll. 1–4.
i.
Step One: Patent-Ineligible Concept
15
Similar to the ‘913 Patent Claims, the Court finds that the ‘104 Patent Claims are
16
directed to the abstract idea of collecting and providing information about the opening of
17
a message. The minor variation between the concepts—message “delivery” and message
18
“opening”—is inconsequential. Rather, the concept at the heart of the ‘104 Patent Claims
19
is directed to a generic idea that has been implemented in the electronic messaging
20
industry for years. For example, the ‘104 Patent’s specification recites that,
21
22
23
24
25
26
27
28
Many existing e-mail systems and e-mail programs already provide
for some form of proof of delivery. For instance, some e-mail systems
today allow a sender to mark a message with ‘request for notifications’
tags. Such tags allow a sender to request notification that the message was
delivered and/or when the message was opened. When a sender requests
delivery notification, the Internet e-mail system may provide the sender
with an e mail receipt that the message was delivered to the mail server or
the electronic inbox of the recipient. The receipt message may include the
title of the message, the destination address, and the time of delivery. It
may also include (depending on the types of “flags” that are provided and
activated in the mailing software) a list of all the Internet “stations” that the
message passed through en route to its destination. This form of reporting is
- 32 -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
built into some of the rules and protocols which implement e-mail.
Furthermore, when a message is sent with a ‘read notification’ request, the
recipient’s email program may send to the sender an e-mail notification that
the recipient opened that message for reading. Many electronic mail clients
can and do support this kind of reporting; however, Internet protocols do
not make it mandatory.
Id. at col. 1 ll. 41–62; see (Doc. 271-17 at 10) (portion of Dr. Terrance Tomkow’s
deposition describing pre-existing process of adding links to electronic messages that
provide “read notifications” when activated at the recipient).
Furthermore, the concept of collecting and providing information about the
opening of a message is analogous to other data collection and tracking methods deemed
by courts to be drawn to abstract ideas. See, e.g., Content Extraction, 776 F.3d at 1347
(holding that a patent for reading and processing the data on checks was directed to the
abstract idea of “data collection, recognition, and storage,” processes that are
“undisputedly well-known”); Wireless Media Innovations v. Maher Terminals, 100 F.
Supp. 3d 405, 413 (D.N.J. 2015) (concluding that concept of “monitoring locations,
movement, and load status of shipping containers . . . and storing, reporting and
communicating this information in various forms through generic computer functions”
was too abstract for patent-eligibility); YYZ, 2015 WL 5886176, at *7 (finding that
apparatus and method for “measuring, monitoring, tracking, and simulating enterprise or
business communications and processes in an asynchronous messaging environment”
was directed to an abstract idea); Neochloris, Inc. v. Emerson Process Mgmt. LLLP, 2015
WL 5951753, at *4–5 (N.D. Ill. Oct. 13, 2015) (holding that claims describing process of
collecting data, transmitting data to computer, monitoring data using computer and
software, and sending alarms when problems arise, were directed to abstract idea).
RPost’s contention that the ‘104 Patent Claims are not directed to an abstract idea
because they can verify the opening of a message without the recipient’s cooperation or
compliance is unpersuasive. At their core, the ‘104 Patent Claims simply provide
information that a particular message was opened. Whether or not the ‘104 Patent Claims
require the recipient’s “cooperation” speaks not to whether the idea is abstract but to
- 33 -
1
whether the claims add an inventive concept, i.e., the second step in the Alice paradigm.
2
See Ultramercial, 772 F.3d at 715 (“We do not agree . . . that the addition of merely
3
novel or non-routine components to the claimed idea necessarily turns an abstraction into,
4
something concrete. In any event, any novelty in implementation of the idea is a factor to
5
be considered only in the second step of the Alice analysis.”).
6
Similarly, RPost’s argument that the ‘104 Patent Claims are not directed to an
7
abstract idea because they require “specific” steps to verify the opening of a message via
8
a tangible “intermediate server that records” and “forms” certain information is beside the
9
point; the claims merely recite the abstract idea of collecting and providing information
10
about the opening of a message. See Alice, 134 S. Ct. at 2358 (“The fact that a computer
11
necessarily exist[s] in the physical, rather than purely conceptual, realm . . . is beside the
12
point.”). The Federal Circuit recently explained that a relevant inquiry at the first step of
13
Alice is to “ask whether the claims are directed to an improvement to computer
14
functionality versus being directed to an abstract idea.” Enfish, 2016 WL 2756255, at *4.
15
Specifically, Enfish contrasted claims “directed to an improvement in the functioning of a
16
computer” with claims “simply adding conventional computer components to well-
17
known business practices,” or claims reciting “use of an abstract mathematical formula
18
on any general purpose computer,” or “a purely conventional computer implementation
19
of a mathematical formula,” or “generalized steps to be performed on a computer using
20
conventional computer activity.” Id. at *4–5; see In re TLI Commc’ns, 2016 WL
21
2865693, at *3 (same). Here, the ‘104 Patent Claims are not directed to a specific
22
improvement in computer functionality, but use conventional and generic technology to
23
perform “generalized steps” in a well-known environment. To be sure, the disclosed
24
“server” is indisputably not new,16 and the added “link” is nothing more than a standard
25
26
27
28
16
RPost admits as much in its opposition to summary judgment. See (Doc. 299 at
19) (“The inventive concept of the asserted claims does not lie in the computer
hardware.”). Furthermore, the server is described simply in terms of performing generic
computer functions such as transmitting, receiving, and storing data. See ‘104 Patent, col.
27 ll. 63–col. 28 ll. 16, col. 31 ll. 20–37. But these functions are described in vague terms
- 34 -
1
hyperlink configured to execute at a certain time,17 which certainly is not inventive.
2
Finally, the ‘104 Patent Claims do not solve “a challenge particular to the
3
Internet.” DDR Holdings, 773 F.3d at 1256–57. As explained above, the problem
4
purportedly “solved” by the Tomkow Patents was long prevalent in the pre-Internet,
5
analog world, and there is nothing unique to the Internet about collecting and providing
6
information about the opening of a message. Despite RPost’s endeavors to describe the
7
‘104 Patent Claims as performing “specific” steps to provide “specific” information, the
8
claim language divulges nothing more than the process of transmitting a message, adding
9
a link to the message, and storing information about the message. These are all abstract
10
ideas individually, and in ordered combination, the steps recite an abstraction—an idea,
11
having no particular concrete or tangible form; namely, a method of receiving and
12
transmitting electronic messages and collecting the relevant data as to the opening of the
13
message. See Ultramercial, 772 F.3d at 715 (“Although certain additional limitations,
14
such as consulting an activity log, add a degree of particularity, the concept embodied by
15
the majority of the limitations describes only [an] abstract idea.”).
16
For these reasons, the Court finds that, like the claims at issue in Content
17
Extraction which were directed to “collecting data,” “recognizing certain data within the
18
collected data set,” and “storing the recognized data in memory,” 776 F.3d at 1347,
19
collecting and providing information about the opening and delivery of a message is a
20
well-established “basic concept” that is patent-ineligible under Alice step one.
21
ii.
Step Two: Inventive Concept
22
RPost insists that the ‘104 Patent Claims add an inventive concept to the abstract
23
idea because after “receiving” the message, the server adds a link that is “configured to
24
execute” upon opening of the message, thereby generating an “indication” that the
25
26
27
28
without any meaningful limitations and thus, the “focus of the patentee and of the claims
was not on an . . . improved server.” In re TLI Commc’ns, 2016 WL 2865693, at *4.
17
At Markman, the Court construed the claim term “link” by its plain and ordinary
meaning because it needed no clarification or explanation. (Doc. 219 at 35–36).
- 35 -
1
message was opened. (Doc. 299 at 18). RPost claims that evidence of an inventive
2
concept is seen by the server “transforming” the indication into something more, i.e.,
3
“authenticatible information.” (Id.) According to RPost, the inventive concept resides in
4
these “technical features” which enable a sender to verify the opening of a message
5
without the recipient’s “cooperation” or “compliance.” (Id. at 18–19).
6
To begin, “links” or “tags” have been added to electronic messages for decades.
7
As the ‘104 Patent’s specification teaches, “read notifications” and “request for
8
notification” tags have long been appended to electronic messages and are commonplace
9
in the electronic messaging industry. See ‘104 Patent, col. 1 ll. 41–62. Moreover, Dr.
10
Tomkow testified that the concept of inserting hyperlinks into e-mail was well-known
11
before the Tomkow Patents, see (Doc. 294 at 30–31), as were Internet links and
12
hyperlinks, see (id.; Doc. 271-17 at 10). Thus, merely adding a “link” to a message is not
13
inventive. See Soverain Software LLC v. Newegg Inc., 705 F.3d 1333, 1344 (Fed. Cir.
14
2013) (finding that the use of “hypertext” to communicate information “was a routine
15
incorporation of Internet technology into existing processes”).
16
Similarly, the claimed “server” “fail[s] to add an inventive concept sufficient to
17
bring the abstract idea into the realm of patentability.” In re TLI Commc’ns., 2016 WL
18
2865693, at *5. “For the role of a computer in a computer-implemented invention to be
19
deemed meaningful in the context of [the inventive concept] analysis, it must involve
20
more than performance of ‘well-understood, routine, [and] conventional activities
21
previously known in the industry.’” Content Extraction, 776 F.3d at 1347–48 (quoting
22
Alice, 134 S. Ct. at 2359). Here, the server merely “receives” a message, “adds” a link to
23
the message, and “transmits” the message. These steps fall squarely within Supreme
24
Court and Federal Circuit precedent finding generic computer components insufficient to
25
add an inventive concept to an otherwise abstract idea. See, e.g., id. at 1345, 1348
26
(holding that “storing information” into memory and using a computer to “translate the
27
shapes on a physical page into typeface characters” was insufficient to confer patent
28
eligibility); Alice, 134 S. Ct. at 2361 (“Nearly every computer will include a
- 36 -
1
‘communications controller’ and a ‘data storage unit’ capable of performing the basic
2
calculation, storage, and transmission functions required by the method claims.”);
3
buySAFE, 765 F.3d at 1355 (“That a computer receives and sends the information over a
4
network—with no further specification—is not even arguably inventive.”); Mortg.
5
Grader, 811 F.3d at 1324–25 (holding that claimed components “interface,” “network,”
6
and “database” were merely “generic computer components” insufficient to confer
7
eligibility); Intellectual Ventures I, 792 F.3d at 1368 (finding that claimed components
8
“database,” “user profile,” and “communication medium” did not confer eligibility).
9
To the extent RPost argues that the link itself is “inventive” because it is
10
“configured to execute when the message is opened” thereby removing the need for
11
recipient “cooperation,” see (Doc. 299 at 18), the Court disagrees. A component that “can
12
be configured” to perform a claimed function—without more—is neither sufficiently
13
described nor sufficiently innovative to transform an abstract idea into patent-eligible
14
subject matter. See Planet Bingo, LLC v. VKGS LLC, 576 F. App’x 1005, 1008–09 (Fed.
15
Cir. 2014) (rejecting argument that unclaimed features are relevant for patent-eligibility
16
purposes). Thus, to broadly claim a method of accomplishing a routine function requires
17
more than just an “apply it” directive, even if in a specific technical environment. See,
18
e.g., Alice, 134 S. Ct. at 2358 (“[I]f a patent’s recitation of a computer amounts to a mere
19
instruction to implement an abstract idea on . . . a computer, . . . that addition cannot
20
impart patent eligibility.” (citing Mayo, 132 S. Ct. at 1301)); Intellectual Ventures I, 792
21
F.3d at 1368 (“Instructing one to ‘apply’ an abstract idea and reciting no more than
22
generic computer elements performing generic computer tasks does not make an abstract
23
idea patent-eligible.” (quoting Alice, 134 S. Ct. at 2359–60)).
24
Equally unpersuasive is RPost’s thin argument that the ‘104 Patent Claims’
25
“transform[ation]” of the “indication” into “authenticatible information” signals an
26
inventive concept. The Federal Circuit has held that the machine-or-transformation test
27
can provide a “useful clue” during the second step of the Alice framework. See Bancorp
28
Servs., 687 F.3d at 1278. Thus, a claimed process can be patent-eligible under § 101 if:
- 37 -
1
“(1) it is tied to a particular machine or apparatus, or (2) it transforms a particular article
2
into a different state or thing.” In re Bilski, 545 F.3d 943, 954 (Fed. Cir. 2008) (en banc),
3
aff’d on other grounds by Bilski, 561 U.S. 593. In this case, the claim language does not
4
substantiate
5
“authenticatible information.” Rather, the claim language simply recites that the server
6
“provid[es] an authenticatible information related to the message, including the indication
7
of the opening of the message,” ‘104 Patent, col. 28 ll. 10–12, and “constructs
8
authenticatible information,” id. at col. 31 ll. 33–34. The claim language does not
9
disclose or even imply that the “indication” is in any way “transformed.”18 RPost’s
10
argument is therefore flawed from the start.19 Even if the “indication” was “transformed”
11
into “authenticatible information,” the ‘104 Patent Claims still do not disclose any details
12
as to how the “transformation” transpires, nor do they inform that the “transformed”
13
product, i.e., “authenticatible information,” is anything more than the general, pre-
14
existing “indication.” Such free-standing information is simply not patentable. See
15
Digitech, 758 F.3d at 1350 (“Data in its ethereal, non-physical form is simply information
16
that does not fall under any of the categories of eligible subject matter.”).
RPost’s
contention
that
the
“indication”
is
“transformed”
into
17
As was the case in Alice, the Court finds that “the function performed by the
18
computer at each step of the process is ‘[p]urely conventional.’” Alice, 134 S. Ct. at 2359
19
(quoting Mayo, 132 S. Ct. at 1298). Simply narrowing an abstract idea implemented by
20
pre-existing components to a particular technological environment is insufficient to pass
21
22
23
24
18
This is in contrast to the ‘389 and ‘199 Patent Claims which, as discussed
below, disclose that a “first information” is “form[ed] . . . from” a particular indication
and certain other information.
19
25
26
27
28
In fact, the claim language implies the opposite of RPost’s argument. Namely,
the ‘104 Patent Claims disclose that at the end of the claimed process, the server
transmits the “indication of the opening of the message . . . and the authenticatible
information” to the sender. Id. at col. 28 ll. 14–16, col. 31 ll. 35–37 (emphasis added).
Pragmatically, there would be no reason to provide the sender with both pieces of
information if they included the same information. Thus, this suggests that the
“authenticatible information” is formed from other, non-claimed information.
- 38 -
1
muster under § 101. See, e.g., Digitech, 758 F.3d at 1348–51 (holding that claims
2
directed to digital image processing using math to combine data into a device profile
3
were too abstract despite narrow application); Planet Bingo, 576 F. App’x at 1009
4
(finding that claims failed to add an inventive concept to abstract idea because the claims
5
merely “recite a program that is used for the generic functions of storing, retrieving, and
6
verifying a chosen set of bingo numbers against a winning set of bingo numbers”). The
7
§ 101 inquiry is focused on the claim language and whether the ordered combination of
8
the limitations disclose patent-eligible subject matter or add an inventive concept to an
9
abstract idea. Here, the ‘104 Patent Claims fail to recite any elements that individually or
10
as an ordered combination transform the abstract idea of collecting and providing
11
information about the opening of a message into a patent-eligible application.
12
iii.
Conclusion
13
For these reasons, the Court concludes that the ‘104 Patent Claims are directed to
14
the abstract idea of collecting and providing information about the opening of a message
15
and fail to add an inventive concept to confer patent eligibility. Alice, 134 S. Ct. at 2355.
16
Accordingly, the Court will grant GoDaddy’s motion for summary judgment on this issue
17
and declare that ‘104 Patent Claim Nos. 1, 9, 27, and 32 are invalid under § 101.
18
c.
‘198 Patent20
19
The ‘198 Patent, a continuation of the ‘104 Patent, claims a method of providing
20
information about the opening and delivery of an electronic message sent from a sender
21
to a recipient through a server. See ‘198 Patent, col. 28 ll. 6–25, col. 29 ll. 11–27, col. 30
22
ll. 7–25. To achieve this goal, a server adds a link to the electronic message that is
23
“configured to execute when the link is activated at the recipient” to provide the server an
24
indication that the message has been opened or delivered. Id. The server then forms
25
“authenticatible information” relating to the message, which includes the indication of
26
27
28
20
The asserted ‘198 Patent claims are Claim Nos. 1, 6, 7, 10, 18, 23, 32, 35. See
(Docs. 258 at 2; 271-5 at 2; 300 at 2). These claims will be referenced as the “’198 Patent
Claims.”
- 39 -
1
opening or delivery, and transmits the “authenticatible information” to the sender. Id. In
2
full, the ‘198 Patent Claims recite as follows:
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
1. A method of transmitting a message from a sender to a recipient
and providing an indication that the message was opened by the recipient,
comprising:
receiving the message at a server from the sender, the server being
displaced from the recipient,
associating a link with the message by the server, the link configured
to execute when the link is activated at the recipient to provide an
indication that the message has been opened by a recipient,
transmitting the message and the link from the server to the
recipient,
executing the link when the link is activated at the recipient to
control the server to provide an indication that the message has been
delivered to the recipient,
providing an authenticatible information related to the message,
including the indication of the delivery of the message at the recipient, at
the server, and
transmitting the indication of the delivery of the message at the
recipient, and the authenticatible information from the server to the sender.
Id. at col. 28 ll. 6–25.
6. The method of claim 1, wherein the link is activated at the
recipient to provide an indication that the message has been opened by the
recipient.
7. The method of claim 6, wherein the indication of the opening of
the message at the recipient, and the authenticatible information are stored
in a memory.
Id. at col. 28 ll. 39–44.
10. The method of claim 1, wherein the indication of the delivery of
the message, and the authenticatible information are stored in a memory.
Id. at col. 28 ll. 50–53.
18. A system transmitting a message from a sender to a recipient and
providing an indication that the message was opened by the recipient,
comprising:
a server in electronic communication with the sender and the
receiver, the server programmed to receive a message from the sender, to
associate a link with the message, the link configured to execute when the
link is activated at the recipient to provide an indication that the message
- 40 -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
has been opened by a recipient, to transmit the message and the link from
the server to the recipient, wherein
the link is executed when the link is activated at the recipient to
control the server to provide an indication that the message has been
opened at the recipient, and
wherein the server is programmed to form an authenticatible
information related to the message, and to transmit the indication of the
opening of the message at the recipient and the authenticatible information
from the server to the sender.
Id. at col. 29 ll. 11–28.
23. The system of claim 18, wherein the indication of the opening of
the message at the recipient, and the authenticatible information are stored
in a memory.
Id. at col. 29 ll. 41–43.
32. A system transmitting a message from a sender to a recipient and
providing an indication that the message was opened by the recipient,
comprising:
a server in electronic communication with the sender and receiver,
the server programmed to receive a message from the sender, to associate a
link with the message, the link configured to execute when the link is
activated at the recipient to provide an indication that the message has been
delivered to a recipient, to transmit the message and the link from the server
to the recipient, wherein
the link is executed when the link is activated at the recipient to
control the server to provide an indication that the message has been
delivered to the recipient; and
wherein the server is programmed to form an authenticatible
information related to the message, and to transmit the indication of the
delivery of the message to the recipient and the authenticatible information
from the server to the sender.
Id. at col. 30 ll. 7–25.
35. The system of claim 32, wherein the indication of the delivery of
the message to the recipient, and the authenticatible information are stored
in a memory.
Id. at col. 30 ll. 31–33.
i.
Step One: Patent-Ineligible Concept
27
As a continuation of the ‘104 Patent, the ‘198 Patent incorporates the same
28
features and components as its parent, such as a “server,” a “link,” a “message,” an
- 41 -
1
“MTA,” a “recipient,” a “sender,” and “memory.” Also similar is the general concept of
2
the ‘198 Patent. Like the ‘104 Patent Claims, the ‘198 Patent Claims disclose a method of
3
providing information about the opening of a message. And like the ‘913 Patent Claims,
4
the method described in the ‘198 Patent Claims also provides information about the
5
delivery of a message, albeit via activation of a link.
6
Because there is no practical difference between the concepts of these three
7
patents, the Court finds that the ‘198 Patent Claims are directed to the same abstract ideas
8
as the ‘913 and ‘104 Patent Claims, to wit, collecting and providing information about the
9
opening and delivery of a message. Consequently, for the reasons expressed above, the
10
Court finds that the ‘198 Patent Claims are directed to the patent-ineligible abstract idea
11
of collecting and providing information about the opening and delivery of a message.
12
ii.
Step Two: Inventive Concept
13
Likewise, for the reasons detailed above regarding the ‘913 and ‘104 Patent
14
Claims, the Court concludes that the ‘198 Patent Claims fail to add “significantly more”
15
to the claimed abstract idea such that the idea is “transformed” into a patent-eligible
16
application. Alice, 134 S. Ct. at 2355. The functions recited by the ‘198 Patent Claims,
17
e.g., receiving a message, transmitting a message, adding a link, and storing information
18
using pre-existing components, are “conventional activities” that “nearly every
19
computer” can perform. Id. at 2361. Thus, because “[i]nstructing one to ‘apply’ an
20
abstract idea and reciting no more than generic computer elements performing generic
21
computer tasks does not make an abstract idea patent-eligible,” Intellectual Ventures I,
22
792 F.3d at 1368 (quoting Alice, 134 S. Ct. at 2359–60), the Court concludes that the
23
‘198 Patent Claims do not add an inventive concept to the abstract idea.21
24
25
26
27
28
21
Additionally, the ‘198 Patent Claims recite that the “associated” link executes
“when activated at the recipient.” ‘198 Patent, col. 28 ll. 17–19. Unlike the ‘104 Patent
Claims, the ‘198 Patent Claims do not indicate when this activation takes place or how
the link is activated. Rather, the link simply executes when it is activated, thereby causing
the ‘198 Patent Claims to be even more opaque than the ‘104 Patent Claims.
- 42 -
1
iii.
Conclusion
2
For the foregoing reasons, the Court finds that the ‘198 Patent Claims are directed
3
to the abstract idea of collecting and providing information about the delivery and
4
opening of a message and fails to add an inventive concept sufficient to confer patent
5
eligibility. Accordingly, the Court will grant GoDaddy’s motion for summary judgment
6
on this issue and declare that ‘198 Patent Claim Nos. 1, 6, 7, 10, 18, 23, 32, and 35 are
7
invalid under § 101.
8
d.
‘389 Patent22
9
The ‘389 Patent discloses a “system and method of verifying delivery and integrity
10
of electronic messages.” ‘389 Patent, (54). Like the ‘913 Patent Claims, the ‘389 Patent
11
Claims attain this goal by using a server that receives a portion of a mail transport
12
protocol dialog generated by the transmission of the message from the server to the
13
recipient and an indication that the recipient has received the message. Id. at col. 27 ll.
14
58–67. The server then “form[s]” a “first information” from this data and “transmit[s]” it
15
to the sender. Id. at col. 28 ll. 1–7. In full, the ‘389 Patent Claims recite as follows:
16
1. A method of transmitting a message from a sender to a recipient
through a server displaced from the recipient, the steps at the server
comprising:
receiving the message at the server from the sender;
transmitting the message to the recipient;
receiving at the server at least a portion of a mail transport protocol
dialog generated during transmission of the message from the server to the
recipient;
receiving at the server from the recipient an indication of the receipt
of the message by the recipient;
forming at the server a first information from the at least a portion of
the mail transport protocol dialog and the indication of the receipt of the
message by the recipient; and
transmitting, before any authentication of the message, a copy of the
message and the first information to the sender from the server.
17
18
19
20
21
22
23
24
25
26
27
28
22
The asserted ‘389 Patent claims are Claim Nos. 1, 7, 12, 14, and 15. See
(Docs. 258 at 2; 271-5 at 2; 300 at 2). These claims will be referenced as the “’389 Patent
Claims.”
- 43 -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Id. at col. 27 ll. 58–col. 28 ll. 7.
7. A system for transmitting a message through an electronic mail
system from an originating processor to a recipient processor and providing
proof of receipt of the message by the recipient processor, comprising:
a server displaced from the originating processor, the server capable
of being configured by software commands to:
receive a message from the originating processor and to transmit the
message to the recipient processor;
receive an indication of receipt of the message from the recipient
processor and a mail transport protocol dialog generated by the electronic
mail system during transmission of the message from the server to the
recipient processor;
generate a first information including the indication of receipt of the
message from the recipient processor and at least a portion of the mail
transport protocol dialog generated by the electronic mail system during
transmission of the message from the server to the recipient processor.
Id. at col. 28 ll. 33–52.
12. The system of claim 7, further comprising a memory and
wherein the server is further configured to store a copy of the message and
the first information to the originating processor in the memory before any
authentication of the message by the server.
Id. at col. 29 ll. 8–12.
14. A method of transmitting a message from a sender to a recipient
through a server displaced from the recipient, the steps at the server
comprising:
receiving the message at the server from the sender, transmitting the
message to the recipient;
receiving at the server from the recipient a first information
including an indication of the receipt of the message by the recipient and at
least a portion of a generated during transmission of the first information
from the server to the recipient; and
storing a representation of the message and the first information
received by the server from the recipient in a memory, before any
authentication of the message.
15. The method of claim 14, further comprising:
transmitting the representation of the message and the first
information received by the server from the recipient to the sender from the
server, before any authentication of the message.
Id. at col. 29 ll. 16–col. 30 ll. 13.
- 44 -
1
i.
Step One: Patent-Ineligible Concept
2
Like the ‘913, ‘104, and ‘198 Patent Claims, at the heart of the ‘389 Patent Claims
3
is the general concept of collecting and providing information about a particular message,
4
which is similar to methods of “tracking,” “monitoring,” and “data collection,” that
5
courts have deemed to be directed to abstract ideas. See, e.g., Content Extraction, 776
6
F.3d at 1347–48 (“data collection, recognition, and storage”); Wireless Media
7
Innovations, 100 F. Supp. 3d. at 413 (“monitoring locations, movement, and load status .
8
. . and storing, reporting and communicating this information in various forms through
9
generic computer functions”); YYZ, 2015 WL 5886176, at *7 (“measuring, monitoring,
10
tracking, and simulating enterprise or business communications and processes in an
11
asynchronous messaging environment”); Neochloris, 2015 WL 5951753, at *4–5
12
(“collecting,” “transmitting,” and “monitoring” data). Consequently, the Court finds that
13
the ‘389 Patent Claims are directed to the abstract idea of collecting and providing
14
information about the receipt of a message.
15
ii.
Step Two: Inventive Concept
16
RPost contends that the ‘389 Patent Claims add an inventive concept because they
17
recite “specific ways to verify delivery of an electronic message using specific
18
information.” See (Doc. 299 at 14). Particularly, RPost explains that the claims require
19
the server to receive a “portion of a transport protocol dialog generated between the
20
server and a recipient during transmission of an electronic message” and an “indication of
21
receipt” of the message from the sender in order to “form” and “transmit” a “first
22
information” to the sender. Id.
23
Arguing that something is specific does not make it so. To be sure, underpinning
24
RPost’s “specifics” is “the performance of some business practice known from the pre-
25
Internet world along with the requirement to perform it on the Internet.” DDR Holdings,
26
773 F.3d at 1257. This is not a case where the claims are directed to “a problem
27
specifically arising in the realm of computer technology.” DDR Holdings, 773 F.3d at
28
1257. Rather, the problem of verifying the receipt of a message existed in the pre-
- 45 -
1
Internet, analog world, and the ‘389 Patent Claims simply disclose a process “for which
2
computers are invoked merely as a tool.” Enfish, 2016 WL 2756255, at *5.
3
Moreover, “whether or not [RPost] has added that special ‘something more’ to this
4
conventional business practice is determined by the quality, not the quantity, of its
5
specific adornments and limitations.” Mobile Telecomms. Techs., LLC v. United Parcel
6
Serv., Inc., 2016 WL 1171191, at *7 (N.D. Ga. Mar. 24, 2016). Here, the server disclosed
7
in the ‘389 Patent Claims performs three general functions: “receiving” information,
8
“transmitting” information, and “forming” information. It is well-settled that “receiving”
9
and “transmitting” functions are conventional activities. See Alice, 134 S. Ct. at 2355.
10
The only arguably inventive concept is “forming” of “first information.” However, the
11
‘389 Patent Claims do not chronicle how the “forming” is performed or even indicate that
12
the “first information” is anything more than the pre-existing input information, i.e., “at
13
least a portion of the mail transport protocol dialog and the indication of the receipt of the
14
message by the recipient.” ‘389 Patent, col. 28 ll. 1–3.23 As stated above, mere
15
information—even information formed from “verifiable information” as RPost
16
contends—is not patentable. See Digitech, 758 F.3d at 1350. Consequently, no inventive
17
concept has been added by the claims.
18
iii.
Conclusion
19
For the foregoing reasons, the Court finds that the ‘389 Patent Claims are directed
20
to the abstract idea of collecting and providing information about the receipt of a message
21
and fail to add an inventive concept sufficient to confer eligibility. Accordingly, the
22
Court will grant GoDaddy’s motion for summary judgment on this issue and declare that
23
‘389 Patent Claim Nos. 1, 7, 12, 14, and 15 are invalid under § 101.
24
25
26
23
27
28
Contrary to RPost’s argument, the PTAB did not “find” or “recognize” that the
“forming” step of the ‘389 Patent was a “technical feature that solves a technical
problem.” (Doc. 299 at 18–19). Instead, the PTAB merely determined that the petitioner
failed to meet its burden of proof to institute a CBM patent review. (Doc. 304-4 at 9–10).
- 46 -
1
e.
‘199 Patent24
2
The ‘199 Patent, a continuation of the ‘389 Patent, claims a method of providing
3
information that an electronic message sent from a sender to a recipient through a server
4
failed to be delivered. ‘199 Patent, col. 27 ll. 58–col. 28 ll. 15. To accomplish this
5
objective, the ‘199 Patent Claims recite the same components and processes as the ‘389
6
Patent Claims, i.e., a server receives a portion of a mail transport protocol dialog
7
generated by the transmission of the message from the server to the recipient and an
8
indication from the recipient and then “form[s]” a “first information” from that data and
9
“transmit[s]” it to the sender. Id. at col. 27 ll. 58–col. 28 ll. 7. The lone distinction
10
between the ‘199 and ‘389 Patent Claims is that the “indication” received by the ‘199
11
Patent server indicates the failure of message delivery. Id. at col. 27 ll. 66–67. In full, the
12
‘199 Patent Claims recite as follows:
13
14
15
16
17
18
19
20
21
22
23
24
1. A method of transmitting a message from a sender to a recipient
through a server displaced from the recipient, the steps at the server
comprising:
receiving the message at the server from the sender;
transmitting the message to the recipient;
receiving at the server at least a portion of a data transport protocol
dialog generated during transmission of the message from the server to the
recipient; and
receiving at the server from the recipient an indication of the failure
to deliver the message to the recipient;
forming at the server a first information from the at least a portion of
the data transport protocol dialog and the indication of the failure to deliver
the message by the recipient; and
transmitting, before any authentication of the message, a copy of the
first information to the sender from the server.
2. The method of claim 1, wherein the copy of the first information
is stored in a memory in communication with the server.
25
26
27
28
24
The asserted ‘199 Patent claims are Claim Nos. 1, 2, and 3. See (Docs. 258 at 2;
271-5 at 2; 300 at 2). These claims will be referenced as the “’199 Patent Claims.”
- 47 -
1
2
3
3. The method of claim 1, wherein transmitting, before any
authentication of the message, includes transmitting a copy of the message
and the first information to the sender from the server.
‘199 Patent, col. 27 ll. 58–col. 28 ll. 14.
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
i.
Step One: Patent-Ineligible Concept
Like the asserted claims of its parent application, the Court finds that the ‘199
Patent Claims are directed to an abstract idea, namely, collecting and providing
information that a message was not delivered. The problem purportedly solved by the
‘199 Patent Claims long permeated the pre-Internet, analog world, while the concept of
providing information that an electronic message failed to be delivered has been
implemented by standard SMTP “bounce” code for dozens of years. See (Docs. 258 at 8;
271-11 at 6; 300 at 7). Moreover, the concept of collecting and providing information that
a message was not delivered is similar to other concepts found by the Federal Circuit to
be directed to abstract ideas. See CyberSource, 654 F.3d at 1370 (finding that “collection
and organization of data” is directed to abstract idea); Content Extraction, 776 F.3d at
1347–48 (finding that “collecting data,” “recognizing certain data within the collected
data set,” and “storing the recognized data in memory” were directed to a patentineligible concept). Consequently, the Court finds that the ‘199 Patent Claims are drawn
to an abstract idea.
ii.
Step Two: Inventive Concept
Like its parent application, at the heart of ‘199 Patent Claims is a method “for
which computers are invoked merely as a tool.” Enfish, 2016 WL 2756255, at *5. There
is nothing new about the concept of providing information that a message was not
delivered—generic SMTP code has performed this feat for decades. See (Docs. 258 at 8;
271-11 at 6; 300 at 7). Further, as a continuation of the ‘389 Patent, the ‘199 Patent
Claims merely recite the same conventional steps, e.g., “transmitting,” “receiving,” and
“forming,” that are implemented by generic components, e.g., a “server,” a “sender,” and
a “recipient,” that decidedly do not add an inventive concept to the claims. See, e.g.,
Ultramercial, 772 F.3d at 717 (“[A]dding a computer to otherwise conventional steps
- 48 -
1
does not make an invention patent-eligible.”); Intellectual Ventures I, 792 F.3d at 1368
2
(“Instructing one to ‘apply’ an abstract idea and reciting no more than generic computer
3
elements performing generic computer tasks does not make an abstract idea patent-
4
eligible.” (quoting Alice, 134 S. Ct. at 2359–60)). Accordingly, the Court concludes that
5
no inventive concept has been added to the ‘199 Patent Claims sufficient to transform the
6
abstract idea into a patent-eligible application.
7
iii.
Conclusion
8
For these reasons, the Court finds that the ‘199 Patent Claims are directed to the
9
abstract idea of collecting and providing information that a message was not delivered
10
and failed to add an inventive concept sufficient to confer eligibility. The Court will
11
therefore grant GoDaddy’s motion for summary judgment on this issue and declare that
12
’199 Patent Claim Nos. 1, 2, and 3 are invalid under § 101.
13
B.
14
For the foregoing reasons, the Court concludes that all asserted claims of the
15
Feldbau and Tomkow Patents are ineligible and invalid under § 101.25 The remainder of
16
GoDaddy’s motion for summary judgment will therefore be deemed moot.26
17
IV.
Conclusion for Patent-Eligibility
RPost’s Motion for Summary Judgment
18
RPost moves the Court for summary judgment on Count I of GoDaddy’s FAC.
19
(Doc. 284). In Count I, GoDaddy asserts that during the parties’ pre-suit discussions,
20
21
22
23
24
25
26
27
28
25
On June 3, 2016, Judge Denise J. Casper of the United States District Court for
the District of Massachusetts ruled on a motion for judgment on the pleadings in a similar
case and held that the claims of the ‘389, ‘913, and ‘199 Patents are not directed to an
abstract idea and claim an inventive concept. See Sophos Inc. v. RPost Holdings, Inc.,
2016 U.S. Dist. LEXIS 72699 (D. Mass. June 3, 2016). The Court has considered Judge
Casper’s order and gives it “weight,” see, e.g., Stevenson v. Sears, Roebuck & Co., 713
F.2d 705, 711 (Fed. Cir. 1983); Gillette Co. v. S.C. Johnson & Son, Inc., 919 F.2d 720,
723 (Fed. Cir. 1990), but “reach[es] a contrary legal conclusion” after exercising due
“caution,” see Mendenhall v. Cederapids, Inc., 5 F.3d 1557, 1569 (Fed. Cir. 1993).
26
As the Federal Circuit stated, “[t]he claim being invalid there is nothing to be
infringed.” Richdel, Inc. v. Sunspool Corp., 714 F.2d 1573, 1580 (Fed. Cir. 1983).
- 49 -
1
RPost fraudulently misrepresented that it had “unrestricted rights” to enforce the Asserted
2
Patents in lieu of disclosing that the patents’ title was “clouded.” (Doc. 46 at 12–17).
3
Specifically, GoDaddy complains that RPost did not inform GoDaddy about litigation in
4
California and Texas that “clouded” ownership of the Asserted Patents. (Id. at 13).
5
In its motion for summary judgment, RPost contends that there is no disputed
6
issue of material fact as to whether it fraudulently misrepresented its patent ownership
7
during pre-suit discussions with GoDaddy. See (Doc. 284). RPost argues that GoDaddy
8
failed to present any evidence that RPost lacked the legal right to enforce the Asserted
9
Patents and therefore cannot be liable for not disclosing “clouded” title. (Id. at 13). RPost
10
also maintains that GoDaddy had knowledge of the California and Texas lawsuits via
11
discussions with RPost representatives and access to public records. (Id.) RPost finally
12
contends that Count I suffers from two pleading errors, namely, that “omissions” cannot
13
form the basis for a fraudulent misrepresentation claim under Arizona law and that
14
GoDaddy failed to plead a necessary element of fraudulent misrepresentation. (Id. at 7).
15
In response, GoDaddy argues that a disputed issue of material fact exists as to
16
whether title to the Asserted Patents is “clouded.” (Doc. 298). In GoDaddy’s view, if
17
there is a “cloud” on a patent’s title, the patent owner must disclose that fact to an alleged
18
infringer. (Id.) To that end, GoDaddy insists that there is a disputed issue of material fact
19
as to whether RPost fraudulently misrepresented that it possessed “unrestricted title” to
20
the Asserted Patents when a “cloud” on that title existed. (Id.)
21
A.
22
The ownership of the Asserted Patents has been detailed by the Court as follows:
23
Starting in 1999, Dr. Terrance Tomkow applied for the [Asserted
Patents], which describe a way of tracking and confirming delivery of
email. (Doc. 46 at 6). Kenneth Barton and Zafar Khan joined Tomkow in
creating a corporate structure to protect this intellectual property and
founded RPost International and a related organization called RPost, Inc.
(Id.) Tomkow, Barton, and Khan were all shareholders in RPost
International. (Id.) On September 13, 2000, Dr. Tomkow assigned his
patent applications to RPost International, and the three principals
unsuccessfully pursued funding to commercialize the intellectual property
24
25
26
27
28
Background
- 50 -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
owned by RPost International. (Id.)
Barton’s relationship with Tomkow and Khan fell apart over time,
and Barton eventually brought two actions against Tomkow and Khan (the
“Barton Cases”). (Id.) First, on August 3, 2012, a California court found
that Tomkow, Khan, and RPost International had acted with malice,
oppression, and fraud when they converted Barton’s RPost International
shares. (Id. at 7). Tomkow, Khan, and RPost International were ordered to
restore Barton’s shares and to pay punitive and general damages. (Id.)
Second, Barton brought another state action against RPost International,
RMail, and RComm alleging that RPost International, Tomkow, and Khan
fraudulently transferred corporate assets, including intellectual property
assets, of RPost International to RComm and RMail. (Id.) Barton alleges
that Tomkow and Khan formed the new off-shore entity, RMail, and then
as officers of both RPost International and RMail, caused $750,000 to be
transferred from RPost International to RMail. (Id. at 8). RMail used that
money to purchase RPost International’s intellectual property assets,
including the [Asserted Patents]. (Id.) RPost International then paid
$200,000 to RMail as a license fee for the use of those same intellectual
property assets. (Id.) Barton did not approve or sign any of these property
transfers. (Id. at 9). RPost has tried to exploit the [Asserted Patents] since
these transfers have occurred. (Id.)
Khan and Tomkow have each filed for bankruptcy under Chapter 13
(the “Bankruptcy Cases”), but Barton has objected to the bankruptcy filings
for various reasons. (Id.) In December 2013, the bankruptcy court granted
Barton’s motions to convert Khan and Tomkow’s Chapter 13 Bankruptcy
Cases to Chapter 7 and appointed a trustee to manage their assets, including
the [Asserted Patents]. (Id.)
RPost has filed lawsuits against several of GoDaddy’s competitors
alleging infringement of the Patents-in-Suit, which have been consolidated
into one action called Rmail Ltd. v. Amazon.com, Inc., No. 2:10-cv-258JRG in the Eastern District of Texas (the “Amazon Case”), filed August 24,
2012. (Id. at 10–11). Just before trial, one defendant in the Amazon Case
received correspondence from the plaintiff in the Barton Cases advising
that there should be no settlement or disposition in actions involving the
Patents-in-Suit until their ownership has been determined. (Id. at 11). In
light of this correspondence, on January 30, 2014, the judge in the Eastern
District of Texas stayed and administratively closed the Amazon Case
pending resolution of the patent ownership disputes. (Id. at 11).
GoDaddy.com, LLC v. RPost Commc’ns Ltd., 2014 WL 6908507, at *1–2 (D. Ariz. Dec.
9, 2014); (Doc. 105 at 2–3). The Court has also described the party’s pre-suit discussions
as follows:
- 51 -
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
RPost first contacted GoDaddy via email on July 17, 2013 (“the
Email”) and advised of its belief that GoDaddy was infringing [the
Asserted Patents]. (Doc. 46-4). RPost alleged in the Email that GoDaddy’s
“business processes and electronic messaging and document operations”
infringed RPost’s patents. (Doc. 46-4 at 3). The Email also suggested that
GoDaddy “review the RPost patents noted below for a more complete
description of RPost patented technologies and review these in the context
of your technology operations.” (Id.) The Email then listed seventeen
patents owned by RPost including the Tomkow Patents, RMail Patents, and
others, with no attention drawn to any particular patent in the list. (Id. at 3–
4).
In a letter on October 4, 2013 (“the Letter”), RPost further asserted
the Tomkow Patents by providing claim charts “identifying certain claims
of certain patents and [GoDaddy’s] infringing conduct.” (Doc. 46-5 at 4).
RPost brought specific attention to GoDaddy’s “Express Email Marketing”
product and service. (Id.) Only claims from the Tomkow Patents were
analyzed, but RPost advised GoDaddy that “[i]t is likely that [GoDaddy’s]
products and services are infringing other claims of RPost’s patents.” (Id.)
RPost provided a comprehensive list of patents owned by RPost at the end
of the Letter, which included foreign and U.S. patents, the Tomkow
Patents, RMail Patents, and pending patent applications, with no attention
drawn to any specific patent.
On October 22, 2013, an RPost representative named Jerry Silver
called GoDaddy’s Associate General Counsel for Intellectual Property,
Karl Fazio, telephonically to discuss the Email and the Letter (“the Phone
Call”). (Doc. 84-2 at 3). Silver accused GoDaddy of infringing RPost’s
patents and brought up RPost’s past litigation, indicating that RPost is not
afraid to litigate in order to enforce its patents. (Id. at 4). Silver and Fazio
discussed RPost’s patents, but GoDaddy has provided no evidence that any
specific patents were discussed in detail. (See id. at 3–4; doc. 84 at 3–4).
Finally, on or about November 19, 2013, RPost sent GoDaddy a
PowerPoint presentation (“the Presentation”) entitled “Summary of
Preliminary Infringement Analysis.” (Doc. 84 at 4). On the cover page of
the Presentation, four of the Tomkow Patents were listed under a heading
entitled “Patents & Claims in Analysis,” and the ’219 patent (an RMail
Patent), along with one Tomkow Patent and three other patents, was listed
under a heading entitled “Additional Recommended Review.” (Doc. 84-2 at
10). On the next slide of the Presentation, there was a list of many patents
owned by RPost with no attention drawn to any particular patent. (Doc. 842 at 11).
27
28
GoDaddy.com, LLC v. RPost Commc’ns Ltd., 2014 WL 6908520, at *1–2 (D. Ariz. Dec.
- 52 -
1
9, 2014); (Doc. 107 at 2–3).
2
B.
3
In order to establish a fraudulent misrepresentation claim under Arizona law, a
4
claimant must show: “1) a representation; 2) its falsity; 3) its materiality; 4) the speaker’s
5
knowledge of the representation’s falsity or ignorance of its truth; 5) the speaker’s intent
6
that it be acted upon by the recipient in the manner reasonably contemplated; 6) the
7
hearer’s ignorance of its falsity; 7) the hearer’s reliance on its truth; 8) the right to rely on
8
it; and 9) his consequent and proximate injury.” Echols v. Beauty Built Homes, 647 P.2d
9
629, 631 (Ariz. 1982).
Fraudulent Misrepresentation
10
Because RPost also raises a pleading deficiency in addition to seeking summary
11
judgment, the Court notes that certain elements of fraud claims carry a higher standard of
12
pleading under the Federal Rules of Civil Procedure (“Rules”). Namely, “[i]n all
13
averments of fraud or mistake, the circumstances constituting fraud or mistake shall be
14
stated with particularity. Malice, intent, knowledge, and other condition of the mind of a
15
person may be averred generally.” Fed. R. Civ. P. 9(b). “To allege fraud with
16
particularity, a [claimant] . . . must set forth an explanation as to why the statement or
17
omission complained of was false or misleading.” In re GlenFed, Inc. Sec. Litig., 42 F.3d
18
1541, 1548 (9th Cir. 1994). “While statements of the time, place and nature of the alleged
19
fraudulent activities are sufficient, mere conclusory allegations of fraud are insufficient.”
20
Moore v. Kayport Package Exp., Inc., 885 F.2d 531, 540 (9th Cir. 1989).
21
C.
22
In Count I of its FAC, GoDaddy contends that because RPost’s ownership of the
23
Asserted Patents was called into question by the Barton and Bankruptcy Cases, RPost is
24
liable for fraudulently misrepresenting that it possessed “unclouded ownership in and
25
rights to enforce” the Asserted Patents. See (Doc. 46 at 16). In other words, GoDaddy
26
seeks to recover damages not because it believes (or has any evidence that) RPost does
27
not have the legal right to enforce the Asserted Patents, but because RPost did not inform
28
GoDaddy that a “cloud” shadows the patents’ title.
Analysis
- 53 -
1
To begin, the Court questions the propriety of RPost challenging the adequacy of
2
GoDaddy’s pleading via a motion for summary judgment where it is the movant’s burden
3
to either set forth evidence proving that it is entitled to judgment as a matter of law or
4
show that the non-movant cannot establish all necessary elements of its claim.
5
Nonetheless, RPost argues that “[n]on-disclosure cannot form the basis of an Arizona-
6
based fraudulent misrepresentation claim because those are well-recognized as separate
7
torts under the Arizona common law.” (Doc. 315 at 7) (citing Resort Funding, L.L.C. v.
8
Canyonview Dev., L.P., 2012 WL 3760440, at *9 (Ariz. Ct. App. Aug. 30, 2012)).
9
Although it is true that Arizona distinguishes between tort claims for fraudulent
10
misrepresentation, fraudulent concealment, and non-disclosure, see Wells Fargo Bank v.
11
Ariz. Laborers Local No. 395 Pension Trust Fund, 38 P.3d 12, 34–36 (2002), Count I of
12
GoDaddy’s FAC claims that RPost affirmatively misrepresented that it possessed
13
“unclouded ownership in and rights to enforce” the Asserted Patents while failing to
14
disclose the pending California and Texas actions, (Doc. 46 at 16). Because Count I
15
alleges that RPost affirmatively represented a particular fact that was false, the Court
16
finds that Count I falls within the contours of a claim for fraudulent misrepresentation.
17
See Wells Fargo Bank, 38 P.3d at 34 (“Where failure to disclose a material fact is
18
calculated to induce a false belief, ‘the distinction between concealment and affirmative
19
misrepresentation is tenuous.’” (quoting Schock v. Jacka, 460 P.2d 185, 187 (Ariz.
20
1969))).27
21
22
23
24
25
26
27
28
27
The Court also rejects RPost’s argument that Count I suffers from a pleading
deficiency because GoDaddy did not plead its ignorance of the falsity of RPost’s
representations. Although GoDaddy did not plead that it lacked knowledge of the falsity
of RPost’s representations in a separate number, the Rules permit a party to plead this
element “generally.” See Fed. R. Civ. P. 9(b). In this regard, Count I incorporates
assertions that generally and plausibly allege that GoDaddy lacked knowledge of the
purported falsity of RPost’s representations. Namely, Count I claims that GoDaddy
“reasonably relied to its detriment” on RPost’s representations. (Doc. 46 at 17). Under
Arizona law, one cannot “reasonably rely” on information that is false. See Fectay v.
Tahiri, 2015 WL 7710272, at *2 (Ariz. Ct. App. Nov. 30, 2015). Thus, by pleading that it
“reasonably relied” on RPost’s representations, GoDaddy “generally” pled that it lacked
- 54 -
1
Despite overcoming RPost’s pleading deficiency arguments, GoDaddy failed to
2
establish that any of RPost’s representations were, in fact, false. After substantial review
3
of the parties’ papers, the Court finds that GoDaddy has not articulated any disputed issue
4
of material fact as to “why the statement or omission complained of was false or
5
misleading.” In re GlenFed, Inc. Sec. Litig., 42 F.3d at 1548. The fundamental problem
6
with Claim I is its underlying assumption that RPost had an obligation to inform
7
GoDaddy about the alleged “cloud” on the Asserted Patents’ title. See (Doc. 46 at 16).28
8
GoDaddy, however, advanced no evidence or binding authority demonstrating that “free
9
and clear” ownership is necessary to assert a patent. The lone case cited by GoDaddy in
10
this regard is an unpublished decision from the Southern District of New York that
11
insignificantly remarks that “people do not ordinarily pay lawyers to bring lawsuits to
12
enforce patents that they do not own.” Advanced Video Techs. LLC v. HTC Corp., 2015
13
WL 7621483, at *11 (S.D.N.Y. Aug. 28, 2015). Only through a particularly pretentious
14
reading of this statement could a reader smoke out any indication that a patent owner
15
must inform an alleged infringer about a “cloud” on the patent’s title, let alone arrive at
16
the conclusion that a patent owner must own its patent “free and clear” to assert it.29
17
In any event, GoDaddy’s belief that RPost must have had “free and clear” title in
18
19
knowledge of the representation’s alleged falsity.
28
20
21
22
23
24
25
26
The half-page of footnotes in GoDaddy’s brief explaining the “clouded title”
doctrine all relate to the sale of real property. See (Doc. 298 at 6). In contrast, the
provision of the Patent Act describing patent ownership states that “patents shall have the
attributes of personal property.” 35 U.S.C. § 261 (emphasis added). The only case
GoDaddy cites to support its conclusory theory that “[t]he clouded or defective title
doctrine, though typically arising in real property, applies with equal force to titles of
patents” is a 114 year-old case issuing from the D.C. Circuit. See (Doc. 298 at 6) (citing
Columbia Nat’l Sand Dredging Co. v. Miller, 20 App. D.C. 245, 252 (D.C. Cir. 1902)).
In any event, GoDaddy cites no authority to establish that asserting a patent (personal
property) against an alleged infringer is akin to the sale of real property.
29
27
28
GoDaddy also cites Rule 11 to support its argument that a patent must be owned
“free and clear” in order to be enforced. (Doc. 298 at 5). Rule 11, however, deals with
pleadings made to a court of law and certainly has no bearing on whether a patent must
be owned “free and clear” to be asserted before litigation. See Fed. R. Civ. P. 11(b).
- 55 -
1
order to assert its patents against GoDaddy in pre-litigation discussions is not required
2
under the law. Rather, the question of patent ownership focuses on whether RPost had
3
“legal title” to enforce the patents. See, e.g., MyMail, Ltd. v. Am. Online, Inc., 476 F.3d
4
1372, 1375–76 (Fed. Cir. 2007) (“A plaintiff must demonstrate legal title to the patent at
5
the inception of the lawsuit to be entitled to sue for patent infringement.”); Arachnid, Inc.
6
v. Merit Indus., Inc., 939 F.2d 1574, 1579 (Fed. Cir. 1991) (“[O]ne seeking to recover
7
money damages for infringement of a United States patent (an action ‘at law’) must have
8
held the legal title to the patent during the time of the infringement.” (citing Crown Die &
9
Tool Co. v. Nye Tool & Mach. Works, 261 U.S. 24, 40–41 (1923))); Paradise Creations,
10
Inc. v. UV Sales, Inc., 315 F.3d 1304, 1309 (Fed. Cir. 2003) (“[I]n order to assert
11
standing for patent infringement, the plaintiff must demonstrate that it held enforceable
12
title to the patent at the inception of the lawsuit.”).
13
Consequently, as the party alleging fraudulent misrepresentation of patent
14
ownership, GoDaddy bears the burden of proving that RPost lacked “legal title” to the
15
Asserted Patents at the time of the representations. In this regard, GoDaddy failed to
16
provide any evidence showing that RPost did not have “legal title” to the patents, and no
17
court has determined otherwise.30 Alleged clouded title to a patent does not mean that the
18
patent owner lacks legal title to assert that patent. See Arachnid, 939 F.2d at 1577–82
19
(holding that although a third-party’s legal title to the asserted patent was questioned by a
20
challenger’s equitable title at the time of the alleged infringement, only the legal title-
21
holder had the right to sue for money damages).31 Because GoDaddy “fail[ed] to make a
22
23
24
25
26
27
28
30
The Court explained this concept in its prior Order dismissing Counts III–XII of
GoDaddy’s FAC against certain RPost-affiliated entities. See GoDaddy.com, LLC v.
RPost Commc’ns Ltd., 2014 WL 7263537, at *6 (D. Ariz. Dec. 9, 2014); (Doc. 106 at 9).
Specifically, the Court identified that the “legitimacy of the assignment of the Tomkow
Patents . . . is not the present issue before the Court, nor has that assignment been deemed
fraudulent by any court to date.” Id.
31
Again, the singular case cited by GoDaddy to argue that RPost should be liable
for fraudulently misrepresenting “unrestricted patent infringement litigation rights” is
untenable. See (Doc. 298 at 13) (citing Intamin, Ltd. v. Magnetar Techs. Corp., 623 F.
- 56 -
1
showing sufficient to establish the existence of an element essential to [its] case, and on
2
which [it] will bear the burden of proof at trial,” Celotex, 477 U.S. at 322, summary
3
judgment in favor of RPost is appropriate.
4
Moreover, to prevail on a claim for fraudulent misrepresentation, GoDaddy must
5
show that RPost made a misrepresentation of fact. See Wells Fargo Bank, 38 P.3d at 34
6
n.22. In several instances, GoDaddy conflates representations of fact with representations
7
of opinion. For example, GoDaddy asserts that Mr. Khan fraudulently termed RPost’s
8
ongoing litigation in California and Texas as “nothing to worry about” and “frivolous.”
9
(Doc. 308-1 at 189). These assertions, however, were certainly not representations of
10
fact, but were Mr. Khan’s opinions that the ongoing cases concern unproven
11
allegations—which, to this day, still do. Whether GoDaddy relied on these statements is
12
inconsequential to the inquiry of whether the representations were of fact, an element of
13
fraud to which GoDaddy bears the burden of proof. See Caruthers v. Underhill, 287 P.3d
14
807, 816 (Ariz. Ct. App. 2012) (“Expressions of opinion are not material facts sufficient
15
to support a claim of fraud.” (citation omitted)).
16
Finally, even assuming a “cloud” covered RPost’s title to the Asserted Patents and
17
RPost’s representations of “unclouded ownership” were false, GoDaddy failed to present
18
evidence that the representations were “material.” Namely, even if a “cloud” existed, that
19
does not mean RPost did not have the legal right to enforce the patents, see Arachnid, 939
20
F.2d at 1577–82, and GoDaddy provided no evidence proving that RPost did not possess
21
legal title to the patents at the time of the representations. Without such evidence, RPost’s
22
23
24
25
26
27
28
Supp. 2d 1055 (C.D. Cal. 2009)). In Intamin, the court determined that a patentee
“misrepresent[ed] . . . its ownership interest in the patent” pursuant to the unclean hands
doctrine when it sent a demand letter to an alleged infringer but did not own the patent.
623 F. Supp. 2d at 1072, 1077–78. In this case, the doctrine of unclean hands is not at
issue, and, more importantly, GoDaddy has set forth no evidence that RPost does not own
the Asserted Patents. In fact, GoDaddy even appears to concede that RPost currently
owns and has the right to enforce the patents. See (Doc. 298 at 10) (“A jury will see from
these claims that they created a cloud on title to the RPost Patents, with the resulting
material risk that RPost would lose ownership of and the right to enforce the patents
altogether . . . .” (emphasis added)).
- 57 -
1
representation of “unclouded ownership” could not have been “material” for fraud.
2
D.
3
Accordingly, the Court finds that even if all justifiable inferences are construed in
4
GoDaddy’s favor, no disputed issue of material fact exists such that a reasonable jury
5
could find RPost liable on Count I of the FAC. GoDaddy failed to set forth any evidence
6
that RPost’s representations of legal title to the Asserted Patents were materially false
7
even assuming the title was “clouded.” Simply because a third party makes a claim to a
8
patent’s title does not mean the patent owner simultaneously forfeits its legal right to
9
enforce the patent. Thus, the Court will grant RPost’s motion for summary judgment.
10
V.
Conclusion on RPost’s Motion for Summary Judgment
Conclusion
11
Based on the foregoing,
12
IT IS ORDERED that GoDaddy’s Motion for Summary Judgment (Doc. 257) is
13
14
15
16
17
18
19
20
21
22
23
24
25
GRANTED and the Court DECLARES as follows:
The asserted claims of the ‘219 Patent, Claim Nos. 60, 62, 66, and 69, are
INVALID under 35 U.S.C. § 101.
The asserted claims of the ‘913 Patent, Claim Nos. 1 and 2, are INVALID
under 35 U.S.C. § 101.
The asserted claims of the ‘104 Patent, Claim Nos. 1, 9, 27, and 32, are
INVALID under 35 U.S.C. § 101.
The asserted claims of the ‘198 Patent, Claim Nos. 1, 6, 7, 10, 18, 23, 32,
and 35, are INVALID under 35 U.S.C. § 101.
The asserted claims of the ‘199 Patent, Claim Nos. 1, 2, and 3, are
INVALID under 35 U.S.C. § 101.
The asserted claims of the ‘389 Patent, Claim Nos. 1, 7, 12, 14, and 15, are
INVALID under 35 U.S.C. § 101.
26
The remainder of GoDaddy’s motion for summary judgment and the
27
remaining Counts seeking declarations in GoDaddy’s First Amended
28
- 58 -
Complaint are deemed moot.32
1
2
IT IS FURTHER ORDERED that RPost’s Motion for Summary Judgment on
3
Plaintiff’s Count I (Fraudulent Misrepresentation of Patent Ownership) (Doc. 284) is
4
GRANTED.
5
6
IT IS FURTHER ORDERED that the jury trial set for August 22, 2016 is
VACATED.
7
IT IS FINALLY ORDERED that the Clerk of Court shall enter judgment in this
8
case with prejudice in favor of Plaintiff and against Defendants on Counts VIII–XIII and
9
XV of the First Amended Complaint.33 Counts III–VII are DISMISSED without
10
prejudice as moot, Plaintiff shall take nothing on these Counts and the Clerk of Court
11
shall enter judgment accordingly on these Counts. The Clerk of Court shall enter
12
judgment in favor of Defendants and against Plaintiff on Count I of the First Amended
13
14
15
16
17
18
19
20
21
22
23
24
25
26
32
RPost’s original infringement contentions included several claims that RPost
decided to withdraw after the Court’s Markman Order. See (Docs. 258 at 2, 12; 300 at 2,
10). These originally-asserted but withdrawn claims are as follows: ‘198 Patent Claim
No. 40; ‘199 Patent Claim No. 7; ‘389 Patent Claim Nos. 5 and 13; and ‘219 Patent
Claim Nos. 82, 86, and 88. See (Docs. 191-1 at 1, 10; 258 at 2, 12; 271-5 at 2; 300 at 2,
10). In its statement of facts, GoDaddy stated that the currently-asserted claims are as
follows: ‘219 Patent Claim Nos. 60, 62, 66, and 69; ‘199 Patent Claim Nos. 1, 2, and 3;
‘198 Patent Claim Nos. 1, 6, 7, 10, 18, 23, 32, and 35; ‘389 Patent Claim Nos. 1, 7, 12,
14, and 15; ‘913 Patent Claim Nos. 1 and 2; and ‘104 Patent Claim Nos. 1, 9, 27, and 32.
(Doc. 258 at 2, 12). In support, GoDaddy attached an e-mail from RPost’s counsel dated
February 24, 2016, confirming these claims. See (Doc. 271-5 at 2). RPost did not dispute
these statements of fact or the e-mail. (Doc. 300 at 2, 10). Consequently, the Court will
treat the statements of fact as true, see Fed. R. Civ. P. 56(e)(2), and, because GoDaddy
moved for summary judgment on all currently-asserted claims, no claims remain pending
before the Court. Finally, GoDaddy’s First Amended Complaint requested a declaration
of invalidity of “each of the Patents-in-Suit.” (Doc. 46 at 38). To be clear, the Court does
not declare the entirety of each Asserted Patent to be invalid; rather, the Court holds and
declares invalid the currently-asserted claims expressly listed as invalid.
33
27
28
Because the Counts on which Plaintiff prevailed seek only a declaration,
Plaintiff is not awarded any monetary damages. Plaintiff, should it so desire, may move
for an award of attorneys’ fees, consistent with the Federal and Local Rules, pursuant to
35 U.S.C. § 285.
- 59 -
1
Complaint. This judgment addresses the entire First Amended Complaint, (Doc. 46).34
2
Due to the Declarations stated above, Defendants’ Counterclaims, (Doc. 108), are
3
DISMISSED in their entirety without prejudice, and the Clerk of Court shall enter
4
judgment accordingly on the Counterclaims.
5
Dated this 7th day of June, 2016.
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
34
Counts II, XIV, and XVI of the First Amended Complaint were dismissed by
prior Orders. See (Docs. 105, 107). The Court also notes that the First Amended
Complaint seeks injunctive relief. See (Doc. 46 at 38). However, in moving for summary
judgment (as opposed to partial summary judgment), Plaintiff failed to mention
injunctive relief. Accordingly, the Court deems any such request to be waived. See Fed.
R. Civ. P. 56(a) advisory committee’s note to 2010 amendment (explaining “that
summary judgment may be requested not only as to an entire case but also as to a claim,
defense, or part of a claim or defense” and that “‘partial summary judgment’ . . .
describe[s] disposition of less than the whole action”); see generally Jenkins v. Cty. of
Riverside, 398 F.3d 1093, 1095 (9th Cir. 2005) (observing that party “abandoned” two
claims plead in complaint “by not raising them in opposition to the [defendant]’s motion
for summary judgment”).
- 60 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?