Lilith Games (Shanghai) Co. Ltd. v. uCool, Inc. et al
Filing
117
ORDER (REDACTED) denying 30 MOTION for Preliminary Injunction filed by Lilith Games (Shanghai) Co. Ltd.. Signed by Judge Samuel Conti on 9/23/2015. (sclc1S, COURT STAFF) (Filed on 9/23/2015)
1
2
3
4
5
6
IN THE UNITED STATES DISTRICT COURT
7
FOR THE NORTHERN DISTRICT OF CALIFORNIA
United States District Court
For the Northern District of California
8
9
LILITH GAMES (SHANGHAI) CO.
LTD.,
10
Plaintiff,
11
v.
12
13
UCOOL, INC. AND UCOOL LTD.,
14
Defendants.
15
)
)
)
)
)
)
)
)
)
)
)
)
)
Case No. 15-CV-01267-SC
ORDER DENYING PLAINTIFF'S
MOTION FOR PRELIMINARY
INJUNCTION
16
17
18
I. INTRODUCTION
Now before the Court is Plaintiff Lilith Games Co.'s
19
20
("Lilith") motion for preliminary injunction.
ECF No. 30 ("Mot.").
21
Lilith brings this motion to enjoin Defendants uCool, Inc. and
22
uCool LTD ("uCool") from "any further misappropriation of Lilith's
23
trade secret" and from "reproducing, copying, preparing any
24
derivative works, and/or distributing any of Lilith's registered
25
copyrights . . . which necessarily includes Lilith's code that is
26
now unlawfully contained in uCool's game Heroes Charge . . . ."
27
Mot at 24.
28
///
1
The motion is fully briefed,1 and oral argument was held on
2
September 11, 2015.
3
argument, and the relevant law, and for the reasons discussed
4
herein, Lilith's motion to preliminarily enjoin uCool is DENIED,
5
and uCool's evidentiary objections are OVERRULED.
Having considered the parties' submissions,
6
II. BACKGROUND
7
Plaintiff Lilith is a video game developer that released the
United States District Court
For the Northern District of California
8
9
game Dao Ta Chuan Qi (translated as "Sword and Tower")2 in China in
10
February 2014.
Lilith holds Chinese copyright registrations in
11
Sword and Tower's Lua3 source code and alleges that it owns the
12
copyrights to that code pursuant to Chinese copyright law.
13
and Tower has enjoyed great commercial success, and as of August
14
2014, was the leading game in Asia.
Sword
Mot. at 5.
Defendant uCool is a video game marketer who allegedly
15
16
obtained access to Lilith's copyrighted software code for Sword and
17
Tower and used it to create its own game, Heroes Charge, which it
18
published in the United States in August 2014.
19
20
21
22
23
24
25
26
27
1
ECF Nos. 69 ("Opp'n"), 77 ("Reply"), 87-1 ("Surreply").
2
The game has also been referred to as "Dota Legends". See, e.g.,
ECF No. 43-01 ¶ 2.
3
Lua is a programming language commonly used to develop video
games.
28
2
1
2
3
4
5
August 2014, at which point it attempted to resolve the dispute by
8
United States District Court
Lilith first learned of uCool's allegedly unlawful copying in
7
For the Northern District of California
6
issuing a take-down notice to Apple.5
9
correspondence through the end of November 2014, when those talks
The parties then exchanged
10
stalled without any action from Apple regarding the takedown
11
request.
In March 2015, Lilith decided to release Sword and Tower in
12
13
countries outside of China including the United States, Japan, and
14
certain European countries.
15
the games and because Heroes Charge was already active in many of
16
these countries, many users believed that Sword and Tower had been
17
copied from Heroes Charge and posted comments to that effect on the
18
internet.
19
evidence that uCool's alleged copying has created ongoing damage to
20
Lilith's reputation and confusion in the marketplace.
21
also claims that it has been unable to enter into an exclusive
22
distribution agreement in the United States as a result of the
23
presence of Heroes Charge in the US market.
Because of the similarities between
See Mot. at 12-13.
Lilith cites these comments as
Id.
Lilith
Id.
Shortly thereafter on March 18, 2015, Lilith filed this action
24
25
-- four months after talks with uCool had broken down.
26
4
27
5
Lilith
See https://www.youtube.com/watch?v=GdGKx_IhVbg
Heroes Charge is sold through the Apple and Android (Google Play)
app stores.
28
3
small start-up6 and was reluctant to become involved in costly
3
litigation until it was necessary.
4
until March 2015, according to Lilith, because the harm to Lilith
5
in the form of damage to its reputation and its inability to secure
6
exclusive distribution agreements did not become apparent until
7
March 2015 when Lilith attempted to enter markets where Heroes
8
United States District Court
argues that the four month delay was justified because Lilith is a
2
For the Northern District of California
1
Charge had already been released.
Filing suit was not necessary
In its first claim for relief for copyright infringement,
9
10
Lilith alleges that uCool copied Lilith's copyrighted source code
11
embodied in Sword and Tower and used it to create the source code
12
for Heroes Charge.
13
work as defined in 17 U.S.C. Section 101, Lilith brings its
14
copyright infringement claim under the Berne Convention, an
15
international agreement governing copyright.
Because Sword and Tower is not a United States
In its second claim for relief, Lilith alleges that 240,000
16
17
lines of Lua code embodied in Sword and Tower is a trade secret and
18
that uCool knowingly misappropriated that trade secret in violation
19
of California's Uniform Trade Secrets Act (Cal. Civ. Code § 3426,
20
et seq.) when it allegedly used Lilith's code to create Heroes
21
Charge.
22
evidence of efforts made to maintain the confidentiality of its
23
source code.
24
secure server and limits access only to those employees who need it
25
to perform their duties.
In support of its trade secret claim, Lilith has presented
For example, Lilith stores the source code on a
Lilith also encrypts the Sword and Tower
26
27
6
It is unclear what Lilith means by "small start-up," particularly
given that Lilith owns the most popular game in Asia.
28
4
1
source code so that it cannot be easily deciphered.
2
one employees who have had access to the source code, however, only
3
five signed confidentiality agreements prior to this litigation.
4
Two weeks after filing its complaint, Lilith filed a motion
for preliminary injunction.
6
withdrew its motion as a result of a dispute with uCool relating to
7
a mutual exchange of source code for analysis but re-filed the
8
United States District Court
5
For the Northern District of California
ECF No. 17.
Of the twenty-
On April 22, 2015, Lilith
motion on May 5, 2015.
9
motion for an extension of time so that both sides could perform
10
limited discovery prior to the close of briefing on this motion,
11
including a mutual exchange of source code.
12
response to Lilith's discovery requests, uCool produced a new
13
version of the Heroes Charge source code that had yet to be
14
released.
15
language called C#.
16
the Lua version of the Heroes Charge source code.
17
analyzed the code that was produced and submitted expert
18
declarations as part of their briefing on this motion.
19
Nos. 69-17 ("Kitchen Decl."), 74-4 ("Roman Decl."), 109 ("Suppl.
20
Roman Decl.").
21
the Court heard oral argument on September 11, 2015, at which the
22
parties agreed they could be ready for trial in approximately nine
23
months.
On June 4, 2015, the Court granted uCool's
ECF No. 48.
In
This new version was written in a different programming
Subsequently, uCool also produced portions of
Both parties
See ECF
In addition to the briefs and supporting papers,
24
25
III. LEGAL STANDARD
26
Before a court can grant preliminary injunctive relief, a
27
plaintiff must first "establish that he is likely to succeed on the
28
merits, that he is likely to suffer irreparable harm in the absence
5
1
of preliminary relief, that the balance of equities tips in his
2
favor, and that an injunction is in the public interest."
3
Nutraceuticals, Inc. v. Mucos Pharma GmbH & Co., 571 F.3d 873, 877
4
(9th Cir. 2009) (citations omitted).
5
as the "four-factor test."
6
577 F.3d 1015, 1021 (9th Cir. 2009).
7
Marlyn
This is commonly referred to
See, e.g., Sierra Forest Legacy v. Rey,
Although it was once Ninth Circuit law that a plaintiff in
United States District Court
For the Northern District of California
8
copyright cases was entitled to a presumption of irreparable harm
9
on a showing of likelihood of success on the merits, the Supreme
10
Court ended that practice in eBay Inc. v. MercExchange, L.L.C..
11
See 547 U.S. 388, 393-94 (2006) ("[T]his Court has consistently
12
rejected invitations to replace traditional equitable
13
considerations with a rule that an injunction automatically follows
14
a determination that a copyright has been infringed.").
15
later in Winter v. Natural Res. Def. Council, Inc., the Court
16
further held that the Ninth Circuit's rule allowing for a mere
17
"possibility" of irreparable harm was insufficient.
18
7, 20 (2008).
19
"even in a copyright infringement case, the plaintiff must
20
demonstrate a likelihood of irreparable harm as a prerequisite for
21
injunctive relief."
22
Inc., 654 F.3d 989, 998 (9th Cir. 2011) (emphasis added).
23
Moreover, because a preliminary injunction "is an extraordinary
24
remedy never awarded as of right," a district court may decide to
25
deny a preliminary injunction pursuant to its equitable discretion
26
even where success on the merits is likely.
27
24; see 17 U.S.C. § 502(a) (providing that a court "may . . . grant
28
temporary and final injunctions on such terms as it may deem
Two years
See 555 U.S.
Thus, as the Ninth Circuit has since clarified,
Flexible Lifeline Sys. v. Precision Lift,
6
Winter, 555 U.S. at
1
reasonable to prevent or restrain infringement of a copyright")
2
(emphasis added); eBay Inc., 547 U.S. at 391 (2006); Perfect 10,
3
Inc. v. Google, Inc., 653 F.3d 976, 980 (9th Cir. 2011).
4
Although eBay and Winters require district courts to consider
preliminary injunction, the Ninth Circuit has held that the factors
7
may be balanced such that "a stronger showing of one element may
8
United States District Court
each of the factors of the four-factor test before granting a
6
For the Northern District of California
5
offset a weaker showing of another."
9
v. Cottrell, 632 F.3d 1127, 1131 (9th Cir.2011).
10
Alliance for the Wild Rockies
In denying a preliminary injunction, however, a court need not
11
make findings on all four factors if fewer factors are dispositive
12
of the issue.
13
consideration of [the balance of hardships and the effect of the
14
preliminary injunction on the public interest] alone requires
15
denial of the requested injunctive relief.
16
do not address the lower courts' holding that plaintiffs have also
17
established a likelihood of success on the merits."); Global
18
Horizons, Inc. v. United States Dep't of Labor, 510 F.3d 1054, 1058
19
(9th Cir. 2007) ("Once a court determines a complete lack of
20
probability of success or serious questions going to the merits,
21
its analysis may end, and no further findings [on irreparable harm,
22
balance of hardships, or public interest] are necessary.").
See Winter, 555 U.S. at 23–24 ("A proper
For the same reason, we
23
24
IV. DISCUSSION
25
A.
Mootness
26
In its opposition, uCool argues that Lilith's motion is moot
27
because uCool recently completed a rewrite of the Heroes Charge
28
source code using a different programming language.
7
This new
of Lua, the language used by Lilith to write the source code for
3
Sword and Tower.
4
his declaration showing that the source code is still substantially
5
similar notwithstanding the rewrite, including significant portions
6
that were "literally copied and are identical" or "copied and then
7
translated, modified, reordered, or otherwise obscured in such a
8
United States District Court
version of Heroes Charge uses the programming language C# instead
2
For the Northern District of California
1
way that common code comparison programs would not be able to
9
detect the similarities."
Lilith's expert, however, presented evidence in
Roman Decl. ¶ 43.
uCool counters that
10
(1) Lilith's analysis only specifically pointed to 19 lines of
11
code, (2) C# is so different from Lua "that the new code cannot
12
have been copied from Lilith's code but must have been built from
13
scratch", and (3) Lilith's analysis focused on external files and
14
abstract elements that are not related to the code at issue.
15
Surreply at 4.
16
The C# version of Heroes Charge was being used by less than 1%
17
of users as of the date of the hearing on this motion.
18
users continue to use a Lua version of the game, which the parties
19
agree contains "significant similarities" to the Lua code embodied
20
in Sword and Tower.
21
over whether the C# version of Heroes Charge is substantially
22
similar to the Lua version of Sword and Tower, therefore, is
23
largely academic.
24
sections, insofar as the C# version of Heroes Charge merely
25
translated Lilith's code from Lua to C#, it would still infringe on
26
Lilith's copyright in the same way that a French translation of an
27
English novel would infringe on the latter's copyright.
28
Kitchen Decl. ¶ 135.
Over 99% of
The parties' dispute
Furthermore, as explained in subsequent
Accordingly, the Court finds that Lilith's motion is not moot.
8
1
B.
Likelihood of Success on the Merits
2
Lilith pleads two claims in its Second Amended Complaint:
No. 83 ("SAC").
5
likelihood of success on at least one of its claims, it need not
6
demonstrate an absolute certainty of success.
7
Coughlin, 754 F.2d 1015, 1024–1025 (2d Cir. 1985); Netlist Inc. v.
8
United States District Court
copyright infringement and trade secret misappropriation.
4
For the Northern District of California
3
Diablo Techs., Inc., No. 13-cv-05962, 2015 U.S. Dist. LEXIS 3285,
9
at *19-20 (N.D. Cal. Jan. 12, 2015).
1.
10
See ECF
While Lilith must set forth evidence to support a
See Abdul Wali v.
Copyright Infringement
In order to demonstrate a likelihood of success on its
11
12
copyright claim, Lilith must show (1) ownership of a valid
13
copyright and (2) copying of the original elements of the protected
14
work.
15
361 (1991).
Feist Publications v. Rural Tel. Serv. Co., 499 U.S. 340,
a.
16
Ownership
17
Because Lilith claims it owns a Chinese copyright to the
18
source code in Sword and Tower, ownership is a question of Chinese
19
law.
20
F. Supp. 2d 1172, 1174 n.4 (C.D. Cal. 2007).
See Lahiri v. Universal Music & Video Distribution, Inc., 513
Article 59 from the People's Republic of China Copyright Law
21
22
("PRCCL") provides that the State Council is responsible for
23
setting measures for the protection of computer software.
24
69-2 ("PRCCL Amendments") at 25-26 ("Article 59:
25
protection of computer software and of the right of communication
26
through information network shall be formulated separately by the
27
State Council.") (emphasis added).
28
///
9
ECF No.
Measures for the
Pursuant to that mandate, the
1
State Council has issued Regulations on Computer Software
2
("Software Regulations").
3
ECF No. 77-9 ("Chu Decl.") ¶ 9.
Article 7 of the Software Regulations states that registration
¶¶ 10-12.
6
in a piece of software belongs to its developer."
7
organization's "name is mentioned in connection with a piece of
8
United States District Court
of a copyright is prima facie evidence of copyright ownership.
5
For the Northern District of California
4
Id.
software," the organization, "shall, in the absence of proof to the
9
contrary, be its developer."
The Software Regulations also state that the "copyright
Id.
Id. ¶ 10.
If an
In addition, Article 13 provides
10
that, if an employee develops a piece of software in the course of
11
his or her employment, the employer is the owner if just one of the
12
following conditions are met:
13
14
15
(1) the software is developed based on the development
objective explicitly designated in the line of his
service duty;
(2) the software is a foreseeable or natural result of
his work activities in the line of his service duty; or
16
17
18
(3) the software is developed mainly with the material
and technical resources of the legal entity or other
organization, such as funds, special equipment or
unpublished special information, and the legal entity or
other organization assumes the responsibility thereof.
19
20
21
Id. ¶ 13.
Here, Lilith owns valid Chinese copyright registrations and
22
therefore has provided prima facie evidence of copyright ownership
23
under Chinese law.
24
undisputed that Lilith is the entity that filed for and obtained
25
the copyright registrations and that these registrations expressly
26
list Lilith as the copyright owner.
27
of the Sword and Tower source code and the copyright for Sword and
28
Tower consequently belongs to Lilith.
ECF Nos. 17-1 ¶ 4, 17-2.
10
In addition, it is
Thus, Lilith is the developer
Finally, even though the
1
source code for Sword and Tower was developed by Lilith's
2
employees, Lilith retains ownership of the copyright even if it did
3
not secure assignments from those employees because it meets all of
4
the conditions set out in Article 13 of the Software Regulations.
5
6
For these reasons, the Court finds that Lilith is likely to
prove copyright ownership at trial.
b.
7
Copying
United States District Court
For the Northern District of California
8
Copying can be established by either presenting direct
9
evidence of copying, or absent that, circumstantial evidence that
10
the infringer (1) had access to the copyrighted work, and (2) that
11
the parties' works are substantially similar.
12
Inc. v. Aeropostale, Inc., 676 F.3d 841, 846 (9th Cir. 2012).
i.
13
14
L.A. Printex Indus.
Access
"Circumstantial evidence of reasonable access is proven in one
15
of two ways: (1) a particular chain of events is established
16
between the plaintiff's work and the defendants access to that work
17
. . . , or (2) the plaintiff's work has been widely disseminated."
18
Three Boys Music Corp. v. Bolton, 212 F.3d 477, 482 (9th Cir.
19
2000).
20
uCool's access is demonstrated by the fact that Lilith's
21
copyright declaration can be found in at least one version of
22
Heroes Charge.
23
recording of the copyright declaration appearing in Heroes Charge).
24
Lilith also argues that uCool had access because Sword and Tower
25
has been widely disseminated since its release in February 2014.
26
It is unclear, however, how this latter argument is relevant unless
27
the source code is included anytime a user downloads the game from
28
the app store.
See ECF No. 19 ("Ray Decl.") (providing a video
It is the Court's understanding that the source
11
1
code is not disseminated with the game itself, and therefore the
2
fact that Sword and Tower has been "downloaded over 29 million
3
times through one distribution channel alone" does not help to
4
establish access.
5
of Lilith's copyright declaration alone, the Court concludes that
6
Lilith is likely to satisfy the element of access at trial.
ii.
7
United States District Court
For the Northern District of California
Regardless, based on the presence
Substantial Similarity
Computer programs, including video games, are protected under
8
9
Mot. at 16.
copyright law as literary works containing both literal and non-
10
literal elements.7
11
WHA, 2010 WL 2198204, at *4 (N.D. Cal. May 28, 2010).
12
literal elements of a book are the words themselves, the literal
13
elements of a computer program are the alphanumeric instructions
14
written by a programmer –- i.e., the source code.
15
Controls, Inc. v. Phoenix Control Sys., Inc., 886 F.2d 1173, 1175
16
(9th Cir. 1989).
17
elements, expressive aspects of the source code steps removed from
18
the alphanumeric instructions themselves.
19
non-literal elements include the characters, setting, and plot
20
created by the words on the page.
21
elements of a computer program include expressive elements created
See Miller v. Facebook, Inc., No. C 10-00264
Just as the
See Johnson
This can be contrasted with the non-literal
In the case of a book,
Similarly, the non-literal
22
23
24
25
26
27
7
The distinction between literal and non-literal elements is
separate from the distinction between literal and non-literal
copying. See Altai, 982 F.2d at 701–02. "Literal" copying is
verbatim copying of original expression. "Non-literal" copying is
"paraphrased or loosely paraphrased rather than word for word."
Lotus Dev. Corp. v. Borland Int'l, 49 F.3d 807, 814 (1st Cir.
1995). Both types of copying are unlawful, and both are at issue
in this case. The Court uses the word "literal" in this order,
however, to distinguish the types of protectable elements, not as a
synonym for verbatim copying.
28
12
user interface (including artwork and other visual elements
3
embodied in the code); and -- in the case of sophisticated video
4
games -- the plot, characters, and setting of the game.
5
1175.
6
computer program extends to both literal and non-literal elements
7
of a computer program.
8
United States District Court
by the source code: the code's order, sequence, and structure; the
2
For the Northern District of California
1
Altai, Inc., 982 F.2d 693, 702 (2d Cir. 1992).
9
will examine each in turn.
See id. at
It is well established that copyright protection for a
See id.; Computer Associates Int'l, Inc. v.
1.
10
Thus, the Court
Literal Elements
Substantial similarity in the literal elements of a computer
11
12
program can be demonstrated either by showing verbatim (or near
13
verbatim) copying of the source code or that the "fundamental
14
essence" of the code was duplicated.
15
§ 13.03.
16
a book passage is duplicated when an infringer paraphrases the
17
passage or simply translates it into a different language.
18
Similarly, copying will be found where source code is translated
19
from one programming language to another or where insignificant
20
changes are made, such as replacing certain terms, reordering lines
21
of code, or adding or removing comments.8
22
53 (listing common methods used to obfuscate copying).
Returning to the book analogy, the fundamental essence of
See also Roman Decl. ¶
If at least some amount of copying can be shown, whether the
23
24
See 4-13 Nimmer on Copyright
works are substantially similar turns on whether the copying is
25
26
27
8
Similarly, such minor variations violate a
exclusive right to create derivative works.
Copyright § 3.01 ("a work will be considered
if it would be considered an infringing work
28
13
copyright holder's
See 1-3 Nimmer on
a derivative work only
. . . .").
1
sufficiently extensive to constitute a substantial portion of the
2
plaintiff's work.
3
quantitative relation of the similar material to the total material
4
contained in plaintiff's work is certainly of importance.
5
even if the similar material is quantitatively small, if it is
6
qualitatively important, the trier of fact may properly find
7
substantial similarity."
4-13 Nimmer on Copyright § 13.03.
"The
However,
Id.
United States District Court
For the Northern District of California
8
Lilith embedded within the Sword and Tower source code a
9
copyright declaration that, if triggered, results in a pop-up
10
window that reads "LILITH GAMES ©."
11
convincing evidence that at least one version of Heroes Charge
12
contains the code that triggers this copyright declaration.
13
Ray Decl..
14
pop-up, it conspicuously fails to identify the version of Heroes
15
Charge used in those attempts -- that is, whether it used the same
16
version used by Lilith (Version 1.8.1) or whether it used later
17
versions that uCool had changed subsequent to the start of this
18
litigation to prevent the pop-up from appearing.
19
refused to provide this information in discovery.
20
3, 9, 11.
21
Lilith provided the Court with
See
Although uCool claims it was unable to replicate the
uCool also
ECF No. 77-1 ¶¶
The appearance of Lilith's copyright declaration in uCool's
22
game is sufficient to establish more than a de minimis level of
23
copying.
24
3428 PSG, 2013 U.S. Dist. LEXIS 8113, at *34-36 (N.D. Cal. Jan. 10,
25
2013) (holding that the copying of 145 lines of copyrighted code
26
provided substantial evidence that defendants' actions exceeded
27
merely de minimis copying of code).
28
Lilith presented other evidence of widespread duplication.
See Brocade Commc'ns Sys v. A10 Networks, Inc., No. 10-
14
If that were not enough,
For
the source code in Sword and Tower as compared to the C# version of
3
Heroes Charge.
4
Heroes Charge is identical, merely translated into C#, or
5
insignificantly modified.
6
79, 87, 88, 97-99.
7
of the source code in Sword and Tower as compared to a Lua version
8
United States District Court
example, Lilith provided the Court with side-by-side comparisons of
2
For the Northern District of California
1
of Heroes Charge.
The comparison showed again that much of the
9
code is identical.
See, e.g., Suppl. Roman Decl. ¶¶ 16-20, 22.
10
The comparisons show that much of the code in
See, e.g., Roman Decl. ¶¶ 70, 71, 74,
Lilith also provided the Court with comparisons
Considering the literal elements of the source code alone, the
11
Court finds that a finder of fact is likely to conclude that the
12
source code for Heroes Charge is substantially similar to the
13
source code for Sword and Tower.
14
examines the non-literal elements of the source code in the
15
following section.
2.
16
17
Nevertheless, the Court also
Non-Literal Elements
Whether the non-literal elements of a program "are protected
18
depends on whether, on the particular facts of each case, the
19
component in question qualifies as an expression of an idea, or an
20
idea itself."
21
filtration-comparison" test formulated by the Second Circuit and
22
expressly adopted by several other circuits.
23
Accolade, Inc., 977 F.2d 1510, 1525 (9th Cir. 1992) ("In our view,
24
in light of the essentially utilitarian nature of computer
25
programs, the Second Circuit's approach is an appropriate one.").
26
As the Second Circuit explains, this test has three steps.
27
abstraction step, the court identifies which aspects of the program
28
constitute its expression and which are the ideas.
Id.
The Ninth Circuit has endorsed an "abstraction-
15
Sega Enters. Ltd. v.
In the
In the
1
filtration step, the court "sift[s] out all non-protectable
2
material," including ideas and "expression that is necessarily
3
incidental to those ideas."
4
court compares the remaining creative expression with the allegedly
5
infringing program.
6
Id. at 706.
In the final step, the
In the expert declaration of Kendyl Roman, Lilith provided an
United States District Court
analysis of the non-literal elements of the Lua source code from
8
For the Northern District of California
7
Sword and Tower and the C# source code from Heroes Charge.
9
Roman states that he applied the abstraction-filtration-comparison
Mr.
10
test in his analysis.
11
application of each step, and it is not entirely clear as a result
12
whether all of the similarities to which he points are protected by
13
copyright.
14
similarities across a significant number of copyrighted elements.
15
For example, at the component level of abstraction, similar groups
16
of files are found in similar directories, such as the files for
17
the user interface.
18
chart level of abstraction, the sequences show that the same
19
algorithm is being implemented.
20
parameter list level of abstraction, the function calls show
21
identical and equivalent parameter lists.
22
the function level of abstraction, many of the functions are
23
identical and show up in the same order inside the file.
24
Mr. Roman, however, failed to document his
Nevertheless, it is clear that there are substantial
Roman Decl. ¶ 67.
In addition, at the flow
Id. ¶ 80.
Further, at the
Id. ¶ 81.
Finally, at
Id. ¶ 82.
Lilith also presents evidence of significant similarities
25
between the Lua versions of both games.
See generally Suppl. Roman
26
Decl..
27
analysis, uCool's own expert admitted in his declaration that
28
"there are significant similarities between the Lua source code for
Although uCool attempts to dispute some aspects of Lilith's
16
1
Heroes Charge and the Lua source code for [Sword and Tower],
2
including similarities in [non-literal elements such as] structure,
3
function calls, and parameter values."
Kitchen Decl. ¶ 135.
After considering expert reports from both sides, the Court
4
literal elements of both the Lua and C# versions of Heroes Charge
7
are substantially similar to the non-literal elements of Sword and
8
United States District Court
finds that a finder of fact is likely to conclude that the non-
6
For the Northern District of California
5
Tower.
3.
9
User Interface
The forgoing analysis is sufficient to establish that Lilith
10
11
is likely to succeed in showing substantial similarity at trial.
12
This includes evidence that uCool copied the source code itself
13
(verbatim, with slight modifications, or by translating it from Lua
14
to C#) as well as non-literal elements of the source code,
15
including its structure, sequence, and organization.
16
remains, however, whether the Court should also take into
17
consideration the visual elements of the games as they appear on
18
the computer screen as well as other aspects perceived by users
19
(collectively "the user interface"9).
The question
20
Both parties assert that Lilith's claims "present a relatively
21
straightforward question of whether uCool copied Lilith's protected
22
source code –- a question that will be largely resolved by
23
comparing the alphanumeric instructions read by a computer . . . ."
24
ECF No. 61 at 1-2, Opp'n at 1.
Lilith also argues, however, that
25
26
27
9
"The user interface, also called the 'look and feel' of the
program, is generally the design of the video screen and the manner
in which information is presented to the user. Johnson Controls,
Inc., 886 F.2d at 1176 n.3.
28
17
they "constitute circumstantial evidence of uCool's unlawful
3
copying [of the Sword and Tower source code]" (Reply at 8).
4
addition, Lilith points in its Second Amended Complaint ("SAC") to
5
the user interface as one of the expressive elements of its source
6
code protected by its copyright.
7
screenshots comparing the visual elements of the two games).
8
United States District Court
the similarities in the games' user interfaces are relevant because
2
For the Northern District of California
1
uCool, however, contends that the Court should strike these and
9
similar references in Lilith's filings because Lilith "waived any
In
See SAC ¶ 13 (providing various
10
argument that it is asserting a copyright in the [user interface]"
11
and admitted in its opposition to the motion to intervene "that
12
comparing screen images is irrelevant to this lawsuit."
13
23.
14
OVERRULED and its request to strike is DENIED.
Opp'n at
For the reasons set forth below, Lilith's objection is
Lilith did not waive its ability to point to the visual
15
16
similarities between the games.
17
comparing the user interfaces.
18
Lilith that it would not have been relevant to this case to compare
19
the intervenors' images with the parties' images.10
20
whether the parties' images infringed the intervenors' copyrighted
21
images is immaterial to whether uCool infringed Lilith's
22
copyrighted source code.
23
24
25
26
27
It included in its SAC screenshots
Further, the Court agrees with
After all,
The same cannot be said, however, about
10
On August 17, 2015, the Court denied a motion to intervene, in
part, because the intervenors' claims focused entirely on the
visual similarities between their games and certain characters in
Heroes Charge and Sword and Tower. ECF No. 93. In its order, the
Court agreed with Lilith and uCool that intervention would be
inappropriate because the intervenors' claims had nothing to do
with Lilith’s source code. The order, however, was not intended to
imply that the visual similarities between Heroes Charge and Sword
and Tower are irrelevant to this case.
28
18
1
2
the similarities between the parties' images.
A video game copyright protects all of the copyrightable
separately protect the user interface of a computer game as an
5
independent audiovisual work (see Data E. USA, Inc. v. Epyx, Inc.,
6
862 F.2d 204, 206 (9th Cir. 1988)), courts have also held that a
7
user interface is a non-literal element of the program's source
8
United States District Court
elements of that game.
4
For the Northern District of California
3
While it is true that the copyright laws
code (see Johnson Controls, Inc., 886 F.2d at 1175; Lotus Dev.
9
Corp. v. Paperback Software Int'l, 740 F. Supp. 37, 63-65 (D. Mass.
10
1990); see also Torah Soft Ltd. v. Drosnin, 136 F. Supp. 2d 276,
11
283 (S.D.N.Y. 2001) (connecting the visual output of a computer
12
program with the underlying program itself)).
13
view, the Copyright Office issues a single copyright registration
14
that protects all of a game's copyrightable elements, regardless of
15
whether the game is registered as a literary or audiovisual work.
16
See 17 U.S.C. § 102(b); 37 C.F.R. § 202.1.
17
claim is focused on its source code, that claim includes all of the
18
non-literal expressive elements of that code as well, including the
19
user interface.
20
Consistent with that
Thus, although Lilith's
uCool argues that copyright protection as it relates to a
21
video game's source code should be considered separately from a
22
game's audiovisual aspects because, in part, there are many ways
23
one can write source code to achieve the same audiovisual output.
24
For that reason, the argument goes, similarities as to the
25
audiovisual outputs are not probative of whether the copyright in
26
the source code was violated.
27
28
While it is true that one cannot conclude based on a game's
visual similarities that the literal alphanumeric instructions
19
Indeed, there are many different ways to write a book to achieve
3
the same non-literal expressive elements of plot, setting,
4
character, and so forth, whether through the selection of different
5
words or the use of different languages.
6
literal expressive elements of that book are substantially the same
7
as another copyrighted book, however, the former has infringed on
8
United States District Court
written by the programmer are the same, that is not the point.
2
For the Northern District of California
1
the latter regardless of whether the words themselves have been
9
copied.
Insofar as the non-
Likewise, infringement will be found where the non-literal
10
elements expressed by a game's source code -- including the user
11
interface -- are substantially similar to another game, even though
12
there are many different ways to write the source code to create
13
those non-literal elements.
14
uCool's attempts to limit the analysis merely to whether the
15
alphanumeric code itself was copied verbatim; copyright analysis is
16
not so simplistic.
For that reason, the Court rejects
17
Accordingly, the Court finds that the user interface of Sword
18
and Tower is one of the various non-literal elements of the source
19
code protected by Lilith's copyright, including the visual elements
20
as depicted through screenshots in Lilith's complaint, motion, and
21
supporting papers.
22
uCool's objection is therefore OVERRULED.
Given the significant evidence of copying in the previous two
23
sections, the Court need not engage in a full analysis of whether
24
the protected elements of the games' user interfaces are
25
substantially similar.
26
similarities between the games' protected elements such as the
27
visual appearance of characters and settings further support the
28
Court's conclusion that Lilith is likely to prove substantial
It is clear, however, that the striking
20
1
similarity at trial.
2
almost identical from the user's standpoint, with only minor
3
modifications.
4
13, Ex. A.
5
6
United States District Court
For the Northern District of California
9
See Mot. 7-10; ECF No. 30-18 ("Yang Decl.") ¶¶ 3-
For the forgoing reasons, the Court finds that Lilith is
likely to succeed on its copyright infringement claim.
2.
7
8
Indeed, the evidence shows that the games are
Trade Secret Misappropriation
In order to demonstrate a likelihood of success on its trade
secret claim under California's Uniform Trade Secrets Act
10
("CUTSA"), Lilith must show (1) the existence of a trade secret,
11
and (2) misappropriation of the trade secret.
12
Diagnostics Corp. v. Terarecon, Inc., 260 F. Supp. 2d 941, 950
13
(N.D. Cal. 2003) (citing Cal. Civ. Code § 3426.1(b)).
a.
14
AccuImage
Existence of a Trade Secret
15
Under California law, a trade secret is defined as something
16
that (1) derives independent economic value, actual or potential,
17
from not being generally known to the public or to other persons
18
who can obtain economic value from its disclosure or use; and (2)
19
is the subject of efforts that are reasonable under the
20
circumstances to maintain its secrecy.
21
34.26.1(b).
Cal. Civil Code §
22
Here, it cannot be questioned that Lilith derives independent
23
economic value from Sword and Tower and by extension its protected
24
source code.
25
efforts to maintain the source code for Sword and Tower as a
26
secret.
What is at issue is whether Lilith made reasonable
27
Reasonable efforts to maintain the secrecy of certain
28
information include limiting access to the information, advising
21
to sign nondisclosure agreements, and keeping secret documents
3
under lock.
4
Communication Services, Inc., 923 F. Supp. 1231, 1253 (N.D. Cal.
5
1995).
6
techniques will not terminate the secrecy provided that the
7
techniques employed were, in and of themselves, reasonably
8
United States District Court
employees of the existence of a trade secret, requiring employees
2
For the Northern District of California
1
prudent."
9
See Religious Technology Center v. Netcom On-Line
"[F]ailure to employ the fullest range of protective
1-1 Milgrim on Trade Secrets § 1.04.
The Court finds that Lilith's efforts to maintain the
10
confidentially of its source code, while not as rigorous as they
11
could have been, were sufficiently reasonable to maintain the code
12
as a trade secret.
13
and limits access only to those employees who need it to perform
14
their duties.
15
so that it cannot be easily deciphered.
16
secure confidentiality agreements from all of the employees that
17
had access to the code, Lilith has presented evidence to show that
18
these employees understood Lilith's code to be confidential
19
business information.
20
that any of these employees disclosed the code to a third party.
Lilith also encrypts the Sword and Tower source code
b.
21
22
Lilith keeps its source code on a secure server
Although Lilith failed to
Further, there is no evidence to suggest
Misappropriation
uCool does not address the misappropriation element in its
23
opposition or surreply.
24
finds that Lilith is likely to succeed on this element as well.
25
26
27
Regardless, the Court takes it up here and
Misappropriation can be established by either acquisition or
disclosure/use:
(b) Misappropriation means:
28
22
(1) Acquisition of a trade secret of another without
express or implied consent by a person who
knows or has reason to know that the trade
secret was acquired by improper means; or
1
2
3
(2) Disclosure or use of a trade secret of another
without express or implied consent by a person
who:
4
5
(A) Used improper means to acquire knowledge of
the trade secret; or
6
(B) At the time of the disclosure or use, knew
or had reason to know that his or her
knowledge of the trade secret was:
7
United States District Court
For the Northern District of California
8
(i)
derived from or through a person who
had
utilized
improper
means
to
acquire it;
(ii)
acquired under circumstances giving
rise to a duty to maintain its
secrecy or limit its use; or
9
10
11
12
(iii) derived from or through a person who
owed a duty to the person seeking
relief to maintain its secrecy or
limit its use.
13
14
15
Cal. Civ. Code § 3426.1.
As explained below, Lilith has shown
16
misappropriation by both acquisition and use.
17
Lilith provided evidence showing that uCool acquired and used
18
the source code embodied in Sword and Tower without Lilith's
19
consent.
As detailed in the Court's copyright analysis above,
20
Lilith has provided significant evidence showing that uCool copied
21
its source code.
This includes convincing evidence that at least
22
one version of Heroes Charge (Version 1.8.1) included a portion of
23
Lilith's code that triggers Lilith's copyright notice.
Insofar as
24
there was copying, there is no dispute that it was done without
25
Lilith's consent.
26
Lilith also provided evidence showing that uCool knew or had
27
reason to know that the source code was acquired by improper means
28
23
is defined as "theft, bribery, misrepresentation, breach or
3
inducement of a breach of a duty to maintain secrecy, or espionage
4
through electronic or other means."
5
uCool would have known, or should have known, that the source code
6
that it copied in order to create Heroes Charge belonged to Lilith
7
given that the user interface is almost identical to Sword and
8
United States District Court
or in breach of a duty to maintain its secrecy.
2
For the Northern District of California
1
"Improper means"
Tower, with which uCool would have been familiar given Sword and
9
Tower's significant success in the video game market.
Cal. Civ. Code § 3426.1.
Further, it
10
is well known that source code is the confidential property of a
11
game's owner.
12
will infer that uCool knew the code was acquired through improper
13
means or in breach of a duty because Lilith would not have given
14
its competitor, uCool, free access to its code.
15
16
In that context, it is likely that a trier of fact
For these reasons, the Court finds that Lilith is likely to
succeed on its trade secret misappropriation claim.
17
C.
Irreparable Harm
18
Lilith must provide "evidence and reasoned analysis" that the
19
remedies available at law, such as monetary damages, are inadequate
20
to compensate for that injury."
21
Alleged harm that is remote or speculative will not be considered
22
irreparable; rather, the movant must demonstrate that the
23
threatened harm is imminent.
24
Town of Parker, 776 F.2d 846, 849–851 (9th Cir. 1985).
25
eBay, 547 U.S. at 391.
See Colorado River Indian Tribes v.
Lilith advances two theories to support its assertion that it
26
will suffer irreparable harm in the absence of a preliminary
27
injunction: damage to its reputation and its alleged inability to
28
secure an exclusive distribution agreement in the United States.
24
Loss of goodwill, as well as damage to reputation, can support
1
Plush Toys, Inc., No. C 12-5543 SBA, 2012 U.S. Dist. LEXIS 169020,
4
*29-33, (N.D. Cal. Nov. 27, 2012).
5
suffered reputational damage because some users have posted
6
comments on the internet accusing Lilith of copying Heroes Charge.
7
For the reasons set forth below, however, the Court is not
8
United States District Court
a finding of irreparable harm.
3
For the Northern District of California
2
convinced that anecdotal comments on the internet establish a
9
likelihood of irreparable harm sufficient to justify extraordinary
10
See Rovio Entm't, Ltd. v. Royal
Lilith argues that it has
relief in the form of a preliminary injunction.
Lilith points to Rovio Entm't, Ltd. v. Royal Plus Toys, Inc..
11
12
Id.
In Rovio, the defendant was allegedly selling unauthorized
13
knockoff plush toys that were inferior but nearly identical in
14
appearance to the plaintiff's products in violation of its
15
copyrights and trademarks.
16
plaintiff suffered irreparable harm, in part, because (1)
17
irreparable harm in trademark cases includes a loss of trade, (2)
18
defendant's product threatened plaintiff's reputation because it
19
posed a potential public health risk, and (3) the potential harm to
20
plaintiff was significant given the "great energy, time and money"
21
plaintiff had spent building its reputation.
Id. at *1.
The court held that the
Id. at *31-32.
22
Although Lilith's evidence suggests the possibility of some
23
damage to its reputation, unlike the plaintiffs in Rovio, Lilith
24
has not expended great energy, time, and money to build its
25
reputation outside of Asia in the markets where its reputation has
26
allegedly been damaged by uCool.
27
newcomer to the United States, Europe, and other markets where
28
Heroes Charge has been released.
Indeed, Lilith is a relative
Moreover, unlike in Rovio where
25
responsible for plaintiff's reputational damage, it does not appear
3
that Heroes Charge is necessarily inferior to Sword and Tower.
4
Thus, while there is the potential for confusion in the market
5
given the similarities between the games, the damage to Lilith's
6
reputation caused by this confusion is relatively small.
7
potential damage is even more limited given that the parties, as
8
United States District Court
the inferiority of the defendant's product was primarily
2
For the Northern District of California
1
stated during the hearing on this motion, are likely to go to trial
9
in only nine months' time.
The
Instead of facing irreparable harm to its reputation, Lilith
10
11
is primarily facing challenges to its ability to expand into new
12
markets.
13
year before Sword and Tower and has built up a significant base of
14
users after an aggressive marketing campaign.
15
penetrate this market given the popularity of Heroes Charge and the
16
fact that Sword and Tower is incredibly similar from a user's
17
perspective.
18
distribution agreements for the release of Sword and Tower in the
19
United States, it is likely that it would have been able to secure
20
much better terms but for the presence of Heroes Charge in the
21
marketplace.
22
nonexclusive distribution contract, however, does not constitute
23
irreparable harm given that it can be quantified and remedied
24
through monetary damages.
Heroes Charge was released in the United States over a
Lilith cannot easily
Although Lilith has been able to secure nonexclusive
The difference in value between an exclusive and
Because Lilith has failed to establish that it will suffer
25
26
imminent harm that cannot be remedied with monetary damages, the
27
Court finds for uCool on this factor.
28
///
26
1
D.
Balance of the Equities
2
"In each case, courts 'must balance the competing claims of
or withholding of the requested relief.'"
5
(quoting Amoco Prod. Co. v. Gambell, 480 U.S. 531, 542 (1987)).
6
doing so, the court balances the injury faced by the applicant for
7
an injunction against the injury that would be sustained by the
8
United States District Court
injury and must consider the effect on each party of the granting
4
For the Northern District of California
3
defendant if relief were granted.
9
v.Watt, 714 F.2d 962, 966–967 (9th Cir. 1983); Brooktree Corp. v.
Winter, 555 U.S. at 24
In
See American Motorcyclist Ass'n
10
Advanced Micro Devices, Inc., 705 F. Supp. 491, 497 (S.D. Cal.
11
1988).
Here, the balance of the equities tips in uCool's favor.
12
If
13
the Court were to grant Lilith's motion, uCool would be forced to
14
take down its most popular game, threatening uCool's viability as a
15
company.
16
885, 910 (N.D. Cal. 2014) ("A preliminary injunction is a drastic
17
remedy and the hardship on a preliminarily enjoined party who is
18
required to withdraw its product from the market before trial can
19
be devastating.").
20
continue to incur a significant amount of fixed costs associated
21
with Heroes Charge.
22
irreparable.
23
after trial, it would likely struggle to recapture its lost market
24
share.
25
industry, there is a good chance that once users are no longer able
26
to use Heroes Charge, they will simply move on to another game.
27
addition, if Heroes Charge was suddenly unavailable for play, uCool
28
///
See also Open Text, S.A. v. Box, Inc., 36 F. Supp. 3d
uCool would not only lose profits but would
Further, the harm to uCool would likely be
Even if uCool was able reintroduce Heroes Charge
Given the dynamic and fast-moving nature of the video game
27
In
1
would likely suffer from a significant loss of goodwill, making it
2
difficult to create trust with players in the future.
3
The equities are also affected by the eight months that passed
for a preliminary injunction.
6
allegedly unlawful copying in August 2014, at which point it
7
attempted to resolve the dispute by issuing a take-down notice.
8
United States District Court
from when Lilith discovered the alleged copying to when it filed
5
For the Northern District of California
4
The parties then exchanged correspondence through the end of
9
November 2014, when those talks stalled without any resolution.
10
Lilith then waited an additional four months before filing this
11
suit, during which time uCool invested millions of dollars in
12
Heroes Charge, including an ad that ran during the Super Bowl.
13
Lilith argues that the four-month delay was justified because it
14
was reluctant to become involved in costly litigation until it was
15
necessary.
16
2015 because the harm to its reputation and its inability to secure
17
exclusive distribution agreements did not become apparent until
18
March 2015.
19
between the games, but even assuming that Lilith was justified in
20
waiting, the delay still affects the equities in this case.
21
made huge investments during those four months that would likely be
22
lost if the Court were to grant a preliminary injunction.
23
Lilith first learned of uCool's
Lilith claims filing suit was not necessary until March
These challenges were foreseeable given the similarity
uCool
In contrast, Lilith does not face significant irreparable harm
24
if an injunction is denied.
As discussed in the previous section,
25
if successful at trial (a mere nine months from now), Lilith could
26
recover significant monetary damages that would compensate it for
27
past harm.
28
permanently enjoin uCool from distributing Heroes Charge moving
At that point, it could also ask the Court to
28
1
2
3
forward.
For these reasons, the Court finds that the balance of
equities tips in favor of uCool.
4
E.
Public Interest
5
If evidence of infringement is strong, then the public
in seeing the copyright laws enforced.
8
United States District Court
interest favors its abatement given that the public has an interest
7
For the Northern District of California
6
v. Parametric Tech., Corp., 2013 U.S. Dist. LEXIS 133403, *28 (N.D.
9
Cal. Sept. 16, 2013).
See Flextronics Int'l, Ltd.
However, "[i]n the typical case, [this]
10
consideration adds little . . . [except where] the public interest
11
implicates separate issues."
12
5-14 Nimmer on Copyright § 14.06.
Here, evidence of infringement is strong, and therefore the
13
public interest tips towards granting the injunction.
However,
14
because there are no issues relating to the public interest
15
separate from Lilith's likelihood of success on the merits, the
16
public interest factor does not weigh heavily in the Court's
17
analysis.
18
F.
Balancing the Factors
19
Having assessed each factor individually, the Court –- using
20
its equitable discretion -- weighs the factors together to
21
determine whether an injunction should ultimately issue.
22
Posner of the Seventh Circuit aptly described the task at hand:
23
24
25
26
27
28
Judge
A district judge asked to decide whether to grant or deny
a preliminary injunction must choose the course of action
that will minimize the costs of being mistaken. Because
he is forced to act on an incomplete record, the danger
of a mistake is substantial.
And a mistake can be
costly.
If the judge grants the preliminary injunction
to a plaintiff who it later turns out is not entitled to
any judicial relief -- whose legal rights have not been
violated -- the judge commits a mistake whose gravity is
measured by the irreparable harm, if any, that the
injunction causes to the defendant while it is in effect.
29
1
Am. Hosp. Supply Corp. v. Hosp. Products Ltd., 780 F.2d 589, 593
2
(7th Cir. 1986).
Accordingly, the Court will only grant an injunction if the
3
by Lilith's likelihood of success on the merits, exceeds the
6
irreparable harm to uCool if the injunction is granted, multiplied
7
by the likelihood that Lilith will not succeed on the merits.11
8
United States District Court
irreparable harm to Lilith if the injunction is denied, multiplied
5
For the Northern District of California
4
See id.; see also Drakes Bay Oyster Co. v. Jewell, 747 F.3d 1073,
9
1099 (9th Cir. 2014) (applying a similar test).
Although exact
10
figures cannot be calculated, this formula provides the analytical
11
framework within which the Court must make its decision.
This is a close case.
12
Lilith has demonstrated a strong
13
likelihood of success on the merits.
14
Court's decisions in eBay and Winter, such a showing would have
15
compelled the Court to grant the requested relief.
16
considering the remaining factors, however, the Court finds that
17
granting a preliminary injunction at this juncture would be
18
inappropriate.
19
harm.
20
///
21
///
22
///
23
///
24
///
25
11
26
27
28
Indeed, prior to the Supreme
After
Lilith has not shown a likelihood of irreparable
Further, because of the extent of the irreparable harm to
This framework can also be represented formulaically: Grant
1
∗ , where
preliminary injunction if but only if ∗
Lilith's probability of success on the merits,
the irreparable
harm to the plaintiff if the injunction is not granted, and
the irreparable harm to the defendant if the injunction is granted.
Id.
30
1
the defendant if the injunction is granted, the balance of equities
2
tips decidedly in uCool's favor.
3
4
5
V. CONCLUSION
For the forgoing reasons, Lilith's motion for preliminary
6
injunction is DENIED.
7
uCool's evidentiary objections are
OVERRULED.
United States District Court
For the Northern District of California
8
9
IT IS SO ORDERED.
10
11
Dated: September 23, 2015
12
UNITED STATES DISTRICT JUDGE
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
31
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?