Oracle America, Inc. v. Google Inc.
Filing
512
ORDER PARTIALLY GRANTING AND PARTIALLY DENYING SECOND MOTION TO STRIKE PORTIONS OF MITCHELL REPORT AND VACATING HEARING by Judge Alsup granting in part and denying in part #473 Motion to Strike (whalc1, COURT STAFF) (Filed on 10/11/2011)
1
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE NORTHERN DISTRICT OF CALIFORNIA
8
9
ORACLE AMERICA, INC.,
11
For the Northern District of California
United States District Court
10
12
13
Plaintiff,
v.
GOOGLE INC.,
14
Defendant.
/
15
16
17
No. C 10-03561 WHA
ORDER PARTIALLY
GRANTING AND PARTIALLY
DENYING SECOND MOTION
TO STRIKE PORTIONS OF
MITCHELL REPORT AND
VACATING HEARING
INTRODUCTION
In this patent and copyright infringement action involving features of Java and Android,
18
defendant moves to strike portions of opening and reply expert reports regarding patent
19
infringement. For the reasons stated below, the motion is GRANTED IN PART AND DENIED
20
IN PART.
21
STATEMENT
22
The factual background of this action has been set forth in previous orders (see Dkt.
23
Nos. 137, 230, 433). In August 2011, defendant Google Inc. sought leave to file a motion to
24
strike portions of the opening expert report of John C. Mitchell regarding patent infringement.
25
Google asserted that many aspects of the report were not supported by plaintiff Oracle
26
America, Inc.’s infringement contentions as required by the Patent Local Rules (Dkt. No. 377).
27
Over Oracle’s objections, Google was allowed to file a motion limited to three points of critique
28
(Dkt. Nos. 380, 382). The motion was granted in part and denied in part. Because Google raised
1
meritorious critiques, Google was allowed to file the instant additional motion to strike
2
(Dkt. No. 464). This order follows expedited briefing.
3
4
ANALYSIS
Our Patent Local Rule 3-1 requires detailed disclosure of a party’s patent infringement
December 2010, and Google challenged their sufficiency two months later (Dkt. No. 79). Oracle
7
agreed to supplement its initial infringement contentions and in fact did so twice. Oracle
8
ultimately chose to stand on its April 2011 second supplemental disclosures, despite Google’s
9
position that they still were inadequate. Oracle was warned that if its disclosures later proved
10
inadequate to support its infringement theories, there would be no second chance to cure the
11
For the Northern District of California
contentions. See Patent L.R. 3-1. Oracle initially disclosed its infringement contentions in
6
United States District Court
5
defects (Dkt. No. 110 at 10–11).
12
Google now asserts that the opening and reply expert reports of John C. Mitchell contain
13
infringement theories that were not disclosed in Oracle’s April 2011 infringement contentions.
14
Google also asserts that the reply report contains new material that should have been disclosed in
15
the opening report. Oracle objects to the attacks on the reply report, because “Google did not
16
obtain leave to move to strike any part of the Reply Report, as this is beyond the scope of its
17
August 30, 2011 précis and the Court’s September 26, 2011 Order, which concerned only the
18
[opening] Report” (Opp. 4–5). This objection is overruled. The Mitchell reply report had not yet
19
been served at the time of Google’s original précis request. Google’s critiques of the reply report
20
are in the same vein as its critiques of the opening report, and all of Google’s critiques have been
21
fully briefed. These issues will be resolved now, without further procedural ado.
FUNCTIONS VFORK() AND CLONE() (’720 PATENT).
22
1.
23
Patent Local Rule 3-1(c) required Oracle’s disclosure of infringement contentions to
24
include a “chart identifying specifically where each limitation of each asserted claim is found
25
within each Accused Instrumentality.” Google asserts that the functions vfork() and clone() were
26
not identified in Oracle’s claim charts, but that the Mitchell opening report now relies on them as
27
satisfying certain limitations of claims 1 and 6 of United States Patent Number 7,426,720.
28
Google seeks to strike a portion of paragraph 606 and all of paragraphs 622–27 from the Mitchell
2
1
report “because they improperly refer to and rely upon the vfork() and clone() mechanisms”
2
(Br. 1–2).
3
Claim 1 of the ’720 patent covers a “system for dynamic preloading of classes through
4
memory space cloning of a master runtime system process,” comprising multiple components
5
including “a copy-on-write process cloning mechanism” whose function is described in detail in
6
the claim. Claim 6 covers a “system according to claim 1, further comprising . . . a process
7
cloning mechanism” whose function also is described in detail (col. 10:2–40). The
8
“copy-on-write process cloning mechanism” of claim 1 and the “process cloning mechanism” of
9
claim 6 are similar, but not identical.
Paragraph 606 of the Mitchell report states: “The Linux fork executed by Android
11
For the Northern District of California
United States District Court
10
provides the ‘copy-on-write process cloning mechanism’ in its fork() system call. Linux provides
12
additional ‘process cloning mechanisms’ in its vfork() and clone() system calls.” The paragraph
13
then quotes at length from a source explaining these three system calls, or “functions” (Banner
14
Exh. A at 301–06).
15
Google’s instant motion does not challenge Mitchell’s theory that the fork() function
16
satisfies the “copy-on-write process cloning mechanism” limitation of claims 1 and 6. Indeed, the
17
Mitchell report also identifies several other items as satisfying the “copy-on-write process cloning
18
mechanism,” and Google does not contend that any of those theories was not timely disclosed.
19
On the other hand, Mitchell’s theory that the vfork() and clone() functions satisfy the
20
“process cloning mechanism” of claim 6 is where the battle is joined. Paragraphs 622–27 of the
21
Mitchell report focus largely on the clone() function as an example of a “process cloning
22
mechanism” for claim 6 purposes (Banner Exh. A at 131–15). Oracle’s operative infringement
23
contentions did not identify the vfork() or clone() functions as satisfying the “process cloning
24
mechanism” limitation of claim 6. This is not disputed. Oracle therefore may not now rely on
25
those functions as satisfying that claim limitation.
26
Oracle states that in both its infringement contentions and in the Mitchell report, its “’720
27
patent infringement theory focuses on a function present in Android called do_fork().” According
28
to Oracle, the report references vfork() and clone() only to explain where do_fork() is found and
3
1
how do_fork is called (Opp. 1–3). True, the Mitchell report identifies the function do_fork() as
2
“provid[ing] the ‘process cloning mechanism’ of claim 6” in one of the very paragraphs Google
3
seeks to strike (Banner Exh. A at 314). Google does not challenge this theory in its instant
4
motion. The report, however, also seems to identify the functions vfork() and clone() as satisfying
5
that limitation, as described above. Such theories would be improper.
6
As to the functions vfork() and clone(), Google’s motion is GRANTED IN PART AND
7
DENIED IN PART as follows. Google has not shown that the Mitchell report identifies vfork() or
8
clone() as satisfying the “copy-on-write process cloning mechanism” limitation of claim 1 and
9
dependent claim 6. This order therefore does not address whether such theories were adequately
disclosed in Oracle’s infringement contentions. On the other hand, the Mitchell report does
11
For the Northern District of California
United States District Court
10
identify vfork() and clone() as satisfying the “process cloning mechanism” limitation of claim 6.
12
Those theories were not disclosed in Oracle’s infringement contentions. Accordingly,
13
Mr. Mitchell may not offer direct testimony that the vfork() or clone() function itself satisfies the
14
“process cloning mechanism” limitation of claim 6. This ruling, however, does not preclude any
15
and all mention of those functions on direct. For example, they may be referenced to describe
16
where and how the do_fork function is called if indeed Oracle contends that do_fork itself
17
satisfies the “process cloning mechanism” limitation.
18
2.
19
Again, the Patent Local Rules required disclosure of a chart identifying where each
“MBS MOBILE” APPLICATION (’476 PATENT).
20
limitation of each asserted claim was found within each accused item. Google asserts that no
21
application called “mBS Mobile” was disclosed in Oracle’s operative infringement contentions,
22
but that the Mitchell opening report now identifies such an application as providing the security
23
functionality claimed in United States Patent Number 6,192,476. Google seeks to strike
24
paragraphs 70 and 77 from the Mitchell report.
25
Paragraphs 70 and 77 are identical. They refer to the mBS Mobile application to illustrate
26
“[s]ome of the ways that application developers could benefit from the java.security framework”
27
(Banner Exh. A at 21–24). It is undisputed that the mBS Mobile application was not mentioned
28
in Oracle’s infringement contentions. The Mitchell report, however, does not accuse the mBS
4
1
Mobile application of satisfying any particular limitation of the asserted claim of the ’476 patent.
2
Rather, the java.security framework is accused, and the mBS Mobile application is cited as an
3
example of the benefit of the alleged infringement. Paragraphs 70 and 77 do not present a new
4
theory of infringement based on the mBS Mobile application. As explained with reference to
5
Google’s first motion to strike portions of the Mitchell report, the Patent Local Rules required
6
Oracle to disclose its theories of infringement, not to identify every evidentiary item of proof
7
supporting those theories.
8
9
In its reply brief, Google characterizes the discussion in paragraphs 70 and 77 as a new
theory of indirect infringement. Google, however, does not explain how Oracle’s disclosures
concerning indirect infringement are supposedly inadequate to support the challenged paragraphs.
11
For the Northern District of California
United States District Court
10
As to the mBS Mobile application, Google’s motion is DENIED.
12
3.
SECURITYMANAGER AND ACCESSCONTROLLER (’476 PATENT).
13
Google asserts that paragraph 115 of the Mitchell reply report “should be stricken because
14
it represents a new infringement theory that was never previously disclosed by Oracle” (Br. 4).
15
The entirety of challenged paragraph 115 states (Banner Exh. B at 47) (internal quotations and
16
citation omitted):
17
20
Even if the SecurityManager is disabled, the Java security
framework may still be used. For example, the static methods in
AccessController are always available to be called. Even if no
SecurityManager is instantiated, Android code includes
AccessController.java and the static methods associated with the
class may be called. Therefore, the functionality of the Java
security framework is accessible via the AccessController.
21
Google argues that this theory is improper because it was not disclosed in Oracle’s infringement
22
contentions and was not presented in the opening Mitchell report. According to Google, both the
23
infringement contentions and the opening report relied on SecurityManager rather than
24
AccessController to show infringement of the ’476 patent (Br. 3–4).
18
19
25
Challenged paragraph 115 is located in a portion of the reply report that addresses
26
claim 10 as an example, stating that the other then-asserted claims “are similar” (Banner Exh. B
27
at 46). At present, only claim 14 of the ’476 patent remains at issue (Dkt. No. 471). The instant
28
record includes portions of the infringement contentions and opening report that address claim 10,
5
1
but not claim 14. These excerpts specifically address the “determining whether said action is
2
authorized” limitation of claim 10. Claim 14 includes a similar, but not identical, limitation.
3
Because both sides rely on the claim 10 portions of the infringement disclosures and opening
4
report, this order assumes for the limited purposes of the instant motion that those claim 10
5
arguments apply equally to claim 14.
6
Oracle’s infringement contentions disclose AccessController along with SecurityManager
7
with respect to the relevant limitation (Banner Exh. D at 22). Thus, the statements about
8
AccessController in paragraph 115 do not run afoul of the disclosure rules.
9
Whether the content of paragraph 115 should have been in the opening report is a separate
question. The parties were warned that reply reports must be limited to true rebuttal, should be
11
For the Northern District of California
United States District Court
10
very brief, and should not add new material that should have been placed in the opening report
12
(Dkt. No. 56 at ¶ 8). The Mitchell opening report opined that SecurityManager.java was the
13
accused element that satisfied the “determining whether said action is authorized” claim
14
limitation (Banner Exh. A at 362). The report further explained that it did so “by calling the
15
AccessController.checkPermission method, which in turn calls the
16
AccessControlContext.checkPermission method to check the permissions” (id. at 363). The
17
opening report did not identify any other accused element as satisfying the limitation in question,
18
and it did not identify any other steps by which the AccessController could be called.
19
The statement in paragraph 115 of the reply report that the AccessController methods may
20
be called by something other than the SecurityManager presents a new infringement theory. This
21
statement is not true rebuttal; it is sandbagging. Oracle had the burden to set forth all of its
22
infringement theories in the opening report. If Oracle intended to accuse something other than the
23
SecurityManager of infringing the claims of the ’476 patent by calling the AccessController
24
methods, then the Mitchell opening report should have said so.
25
Google argues that this critique is analogous to the critique regarding DvmDex.h in
26
Google’s first motion to strike, and that this critique should be rejected for the same reason. Not
27
so. There, the infringement contentions identified specific accused functions, and the Mitchell
28
report later identified the code files in which those functions were stored. Here, the opening
6
1
report identified a series of accused steps, and the reply report then sought to replace one step in
2
the series with a different (and unspecified) accused element. Doing so would present a new
3
infringement theory.
4
As to the theory of infringement by something other than the SecurityManager calling the
5
AccessController methods, Google’s motion is GRANTED. Paragraph 115 of the Mitchell reply
6
report is STRICKEN.
7
4.
MULTIPLE INSTRUCTIONS AND UNSUCCESSFUL SIMULATED EXECUTION
(’520 PATENT).
8
Google asserts that the Mitchell reply report presents two new theories of infringement of
9
United States Patent Number 6,061,520. According to Google, Oracle’s infringement contentions
10
asserted claims of the ’520 patent “where it successfully creates a single new instruction, referred
For the Northern District of California
United States District Court
and the Mitchell opening report both advanced the theory that Android’s dx tool infringes the
11
12
to as a fill-array-data instruction, that replaces a less efficient series of Java bytecode instructions
13
for initializing individual elements of a static array” (Br. 4). On the other hand, Google interprets
14
the Mitchell reply report as claiming that infringement includes “instances where more than one
15
instruction is created” and instances where simulated execution is not successful (id. at 5).
16
Google moves to strike the “one or more” phrase and the last three sentences of paragraph 92 of
17
the Mitchell reply report.
18
A.
Creation of Multiple Instructions.
19
The relevant portions of Oracle’s infringement contentions and the Mitchell opening
20
report do refer to creating a single instruction, not one or more instructions (e.g., Banner Exh. E
21
at 29, Exh. A at 277). The portion of paragraph 92 that refers to creating “one or more
22
instructions” purports to further explain Oracle’s infringement theory; it does not directly
23
respond to any argument by the opposing expert.
24
Oracle does not attempt to explain or justify the reference to creating “one ore more”
25
instructions in the Mitchell reply report. Oracle cites only to Google’s interrogatory responses,
26
which are irrelevant to the question at hand (Opp. 7). The statement in paragraph 92 that the
27
accused elements create “one or more” instructions amounts to a new infringement theory. As
28
such, it is improper.
7
1
2
B.
Unsuccessful Simulated Execution.
The last three sentences of paragraph 92 address “Prof. Parr’s example in his Appendix A,
not standard, Android code (Peters Exh. C). As such, it is a hypothetical example. The
5
statements addressing this hypothetical example are true rebuttal and need not be supported by
6
any previous disclosures. In particular, the statement that the claims of the ’520 patent “do not
7
require the simulating step to succeed” expresses a broad view on the scope of the claims as
8
applied to the hypothetical example. It does not amount to an entirely new infringement theory,
9
because it does not accuse any particular new item of infringement. Even if Oracle chose in its
10
infringement contentions to accuse only devices and methods in which simulated execution is
11
For the Northern District of California
Section II” (Banner Exh. B at 39). This example involved a test that was run on modified, i.e.,
4
United States District Court
3
successful, Oracle’s expert still may rebut a hypothetical example by opining that circumstances
12
in which simulated execution does not succeed may also infringe. The last three sentences of
13
paragraph 92 are proper.
14
As to the reply report discussion of the ’520 patent, Google’s motion is GRANTED IN
15
PART AND DENIED IN PART.
16
from the third sentence of paragraph 92 of the Mitchell reply report. The last three sentences of
17
that paragraph remain intact.
18
19
The reference to creating more than one instruction is STRICKEN
CONCLUSION
For the reasons stated above, defendant’s motion to strike portions of the opening and
20
reply expert reports of John C. Mitchell regarding patent infringement is GRANTED IN PART AND
21
DENIED IN PART. As to the functions vfork() and clone(), the motion is GRANTED IN PART AND
22
DENIED IN PART. Mr. Mitchell may not offer direct testimony that the vfork() or clone() function
23
itself satisfies the “process cloning mechanism” limitation of claim 6 of the ’720 patent. As to the
24
mBS Mobile application, the motion is DENIED. As to the theory that the ’476 patent can be
25
infringed by something other than the SecurityManager calling the AccessController methods, the
26
motion is GRANTED. Paragraph 115 of the Mitchell reply report is STRICKEN. As to the reply
27
report discussion of the ’520 patent, Google’s motion is GRANTED IN PART AND DENIED IN PART.
28
The reference to creating more than one instruction is STRICKEN from the third sentence of
8
1
paragraph 92 of the Mitchell reply report. The last three sentences of that paragraph
2
remain intact.
3
Any denial of a motion to strike does not mean that the item at issue in the motion is
4
automatically admitted in evidence — it still must be moved in evidence, subject to any other
5
objections, at trial. Similarly, any grant of a motion to strike does not exclude the item at issue in
6
the motion under any and all circumstances; a party who prevailed on a motion to strike may
7
open the door to the stricken material.
8
The hearing on the instant motion previously set for October 13, 2011, is VACATED. The
9
hearing on the motion for relief from a non-dispositive pretrial order of a magistrate judge, set for
the same day, will go forward as planned.
11
For the Northern District of California
United States District Court
10
12
IT IS SO ORDERED.
13
14
Dated: October 11, 2011.
WILLIAM ALSUP
UNITED STATES DISTRICT JUDGE
15
16
17
18
19
20
21
22
23
24
25
26
27
28
9
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?