PersonalWeb Technologies LLC v. Google, Inc. et al
Filing
365
Order granting 361 Motion for Judgment on the Pleadings. Signed by Judge Edward J. Davila on January 29, 2020.The Clerk shall close the file. (ejdlc2S, COURT STAFF) (Filed on 1/29/2020)
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
SAN JOSE DIVISION
7
8
PERSONALWEB TECHNOLOGIES LLC,
Plaintiff,
9
Case No. 5:13-cv-01317-EJD
Re: Dkt. No. 361
v.
10
11
GOOGLE LLC, et al.,
United States District Court
Northern District of California
Defendants.
12
13
PERSONALWEB TECHNOLOGIES LLC,
Plaintiff,
14
15
16
FACEBOOK INC.,
Defendant.
PERSONALWEB TECHNOLOGIES LLC,
et al.,
19
20
21
22
Re: Dkt. No. 85
v.
17
18
Case No. 5:13-cv-01356-EJD
Case No. 5:13-cv-01358-EJD
Re: Dkt. No. 78
Plaintiffs,
v.
EMC CORPORATION, et al.,
Defendants.
ORDER GRANTING DEFENDANTS’
MOTION FOR JUDGMENT ON THE
PLEADINGS
23
24
25
26
27
28
Plaintiff PersonalWeb Technologies LLC owns a family of patents that claim methods for
reliably identifying, locating, and processing data in a computer network. Plaintiff alleges that
Defendants infringed three of these patents. Defendants argue that Plaintiff’s patents are invalid
pursuant to 35 U.S.C. § 101. The Court finds this motion suitable for consideration without oral
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
1
1
argument. See N.D. Cal. Civ. L.R. 7-1(b). Having considered the Parties’ papers, the Court
2
GRANTS Defendant’s motion for judgment on the pleadings.
3
4
I.
BACKGROUND
A. Factual Background
5
Plaintiff argues that Defendants (collectively or separately) infringed U.S. Patent No. (“the
6
’310 patent”), No. 6,415,280 (“the ’280 patent”), and No. 7,949,662 (“the ’662 patent”). The three
7
patents at issue are part of a larger family of patents that Plaintiff calls the “True Name” patents.
8
The patents are aimed at combatting the problems of data storage on larger networks. As
9
computer networking and storage systems evolve, files can be divided and stored across different
devices in dispersed locations. This created problems—different users can unknowingly give
11
United States District Court
Northern District of California
10
identical names to identical files. The inventors of the “True Name” patents patented a solution;
12
they developed a system that replaces conventional file names with unique content-based
13
identifiers. This is done by applying a “hash function” (a mathematical algorithm) to the data in
14
each file. For instance, as described in the ’310 patent, an item’s unique content creates a unique
15
identifier. A myriad of data items can be used to create the unique identifier, which ensures
16
duplicate copies are not created. See, e.g., ’310 patent, (2:18–21) (“[A] data item may be the
17
contents of a file, a portion of a file, a page in memory, an object in an object-oriented program, a
18
digital message, a digital scanned image, a part of a video or audio signal, or any other entity
19
which can be represented by a sequence of bits.”). The three patents acknowledge that the “True
20
Name,” i.e. the assigned identifier, is intended for use with “existing” operating systems and
21
“standard” data-management processes. Id. (6:26).
22
The ’310 Patent. The ’310 patent explains a method and apparatus for creating a unique
23
data-identifier for each file based on the content of the data item. The identifier is independent of
24
the data item’s user-defined name/location, which helps ensure duplicate copies are not created.
25
The identifier for a particular data item is created by applying a cryptographic hash function to the
26
data claim. The output of the hash function is the content-based identifier or “True Name,” which
27
is “virtually guaranteed” to be unique to the data item. PersonalWeb Techs., LLC v. Apple, Inc.,
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
2
1
917 F.3d 1376, 1377–78 (Fed. Cir. 2019). The system uses the content-based identifier to
2
determine whether a particular data item is present on the system. And, when the data item’s
3
contents are changed, the content-based identifier is also changed. The identifiers are then used to
4
determine if access to a data item is licensed or authorized. See, e.g., ’310 patent (claims 24, 81,
5
86).
Five claims of the ’310 patent are at issue. Plaintiff contends Defendant EMC/VMware
6
7
infringed claims 24 and 31 of the patent. Plaintiff alleges Defendants Google/YouTube,
8
Facebook, and EMC/VMware infringed claims 81, 82, and 86 of the patent. The relevant claims
9
of the ’310 patent are as follows:
10
24. A computer-implemented method implemented at least in part by hardware comprising
one or more processors, the method comprising:
United States District Court
Northern District of California
11
(a) using a processor, receiving at a first computer from a second computer, a request
regarding a particular data item, said request including at least a content-dependent name
for the particular data item, the content-dependent name being based, at least in part, on at
least a function of the data in the particular data item, wherein the data used by the function
to determine the content-dependent name comprises at least some of the contents of the
particular data item, wherein the function that was used comprises a message digest
function or a hash function, and wherein two identical data items will have the same
content-dependent name; and
12
13
14
15
16
(b) in response to said request:
(i) causing the content-dependent name of the particular data item to be compared
to a plurality of values;
17
18
(ii) hardware in combination with software determining whether or not access to
the particular data item is unauthorized based on whether the content-dependent
name of the particular data item corresponds to at least one of said plurality of
values, and
19
20
(iii) based on said determining in step (ii), not allowing the particular data item to
be provided to or accessed by the second computer if it is determined that access to
the particular data item is not authorized.
21
22
31. The method of claim 211 wherein, for each particular data item of the plurality of data
23
24
25
26
27
28
1
Claim 21 claims:
A computer-implemented method implemented at least in part by hardware comprising one or
more processors, the method comprising:
(a) obtaining a list of content-dependent names, one for each of a plurality of data items, wherein,
for each particular data item of the plurality of data items, the corresponding content-dependent
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
3
1
2
3
4
5
6
7
8
9
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
items, the corresponding content-dependent name for that particular data item was based
on a function of all of the contents of that particular data item.
81. A device operable in a network of computers, the device comprising hardware
including at least one processor and memory, to:
(a) receive, at said device, from another device in the network, a content-based identifier
for a particular sequence of bits, the content-based identifier being based at least in part on
a function of at least some of the particular sequence of bits, wherein the function
comprises a message digest function or a hash function, and wherein two identical
sequences of bits will have the same content-based identifier, and to
(b) compare the content-based identifier of the particular sequence of bits to a plurality of
values; and to
(c) selectively allow said particular sequence of bits to be provided to or accessed by other
devices depending on whether or not said content-dependent identifier corresponds to one
of the plurality of values.
82. The device of claim 81 wherein the particular sequence of bits represent data selected
from the group comprising: a file, a portion of a file, a page in memory, a digital message,
a portion of a digital message, a digital image, a portion of a digital image, a video signal,
a portion of a video signal, an audio signal, a portion of an audio signal, a Software
product, and a portion of a software product.
86. A device operable in a network of computers, the device comprising hardware,
including at least one processor and memory, to:
(a) receive at said device, from another device in the network, a digital identifier for a
particular sequence of bits, the digital identifier being based, at least in part, on a given
function of at least some of the bits in the particular sequence of bits, wherein the given
function comprises a message digest function or a hash function, and wherein two identical
sequences of bits will have the same digital identifier; and
(b) selectively allow the particular sequence of bits to be provided to or accessed by other
devices in the system, based at least in part on whether or not the digital identifier for the
particular sequence of bits corresponds to a value in a plurality of values, each of the
name for that particular data item is based at least in part on a function of at least Some of the
contents of the particular data item, wherein the function comprises a message digest function or a
hash function, and wherein two identical data items have the same content-dependent name on the
list of content dependent names;
(b) receiving at a first location, and from a second location distinct from said first location, a
content-dependent identifier corresponding to a particular data item, said content-dependent
identifier being based at least in part on at least some of the contents of the particular data item;
(c) at said first location, by a processor, in combination with software, determining, based at least
in part on said content-dependent identifier for said particular data item, and using said list of
content-dependent names, whether a requestor may access the particular data item; and
(d) based on said determining in (c), if it is determined that the requestor may not access the
particular data item, causing access to the particular data item to be denied.
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
4
1
plurality of values being based, at least in part, on the given function of at least some of the
bits in a corresponding sequence of bits.
2
The ’280 Patent. The ’280 patent addresses a method of identifying and requesting data
3
in a network using content-based identifiers. Specifically, it covers a situation where data items
4
are distributed across a network of servers and some of the data items are cached (stored) versions
5
from a source server. The content delivery network (“CDN”) determines a “True Name,” i.e. a
6
content-dependent identifier, for a particular data item (as in the ’310 patent). In response to a
7
request for a particular data item, the CDN provides the particular data item from one of the
8
servers in the network of servers.
Four claims of the ’280 patent are at issue. Plaintiff contends Defendants Facebook,
10
Google, and YouTube infringed claims 15 and 16. Plaintiff alleges Defendant Facebook infringed
11
United States District Court
Northern District of California
9
claims 31 and 31. The relevant claims of the ’280 patent are as follows:
12
15. A method as in claim 102 further comprising:
13
resolving the request for the particular data file based on a measure of availability of at
least one of the servers.
14
15
16. A method as in claim 15 wherein the measure of availability is based on one or more
of:
16
(a) a measurement of bandwidth to the Server;
17
(b) a measurement of a cost of a connection to the server, and
18
(c) a measurement of a reliability of a connection to the SCWC.
19
31. A content delivery method, comprising:
20
21
22
23
24
25
26
27
28
2
Claim 10 claims:
A content delivery method, comprising:
distributing a set of data files across a network of servers;
determining a data identifier for a particular data file, the data identifier being determined using a
given function of the data, wherein said data used by the given function to determine the data
identifier comprises the contents of the particular data file; and
in response to a request for the particular data file, the request including at least the data identifier
of the particular data file, providing the particular data file from a given one of the servers of the
network of servers, said providing being based on the data identifier of the particular data file.
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
5
1
2
3
4
5
6
distributing a set of data files across a network of servers,
determining an MD5 hash of the contents of a particular data file; and
in response to a request for the particular data file, the request including at least the MD5
hash of the particular data file, providing the particular data file from a given one of the
Servers of the network of Servers, Said providing being based on the MD5 hash of the
particular data file.
32. A method as in claim 31 further comprising: resolving the request for the particular
data file based on a measure of availability of at least one of the servers.
The ’662 Patent. The ’662 patent addresses the de-duplication of data in a data-
7
processing system. The invention describes systems and methods for deleting a particular copy of
8
a data item when at least one other copy of the copy of the data item is available. The presence of
9
another copy of the data item is determined based on a content-dependent identifier for the data
10
item, which is calculated using the methods described in the ’310 and ’280 patents. A duplicate
11
United States District Court
Northern District of California
copy may be deleted if it is determined another copy exists elsewhere on another processor in the
12
system. Plaintiff contends that Defendant Google/YouTube infringed claim 33 of the ’662 patent.
13
The relevant claim is:
14
15
16
17
18
19
20
21
22
23
33. A file system comprising:
(i) a plurality of servers to store file data as segments; and
(ii) first data that includes file identifiers for files for which the file data are stored as
segments; and
(iii) second data that maps the file identifiers to the segments to which the file identifiers
correspond; and
(iv) location data that identifies which of the plurality of servers stores which of the
segments; and
(v) a table including file identifiers for files in the file system, said table including a
corresponding status for at least some of the files in the file system,
(vi) at least one computer comprising hardware in combi nation with software and
connected to the plurality of servers, the at least one computer programmed:
24
(A) to receive a request to delete a particular data item in the file system;
25
(B) to ascertain, in response to said request, a digital data item identifier corresponding
to said particular data item, said particular data item consisting of an arbitrary sequence
of bits consisting of a sequence of non-overlapping segments, each of said segments in
said sequence being stored on multiple servers of the plurality of servers in the file
system, said digital data item identifier being based at least in part on a given function
26
27
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
6
of the data comprising the particular data item, said given function comprising a hash
function;
1
2
3
(C) to update an entry in said table corresponding to said particular data item to reflect
deletion of said particular data item in the file system, said entry including at least said
digital data item identifier of said particular data item.
4
B. Procedural History
5
In late 2013, after Plaintiff filed actions against Defendants in the Eastern District of
6
Texas, Judge Davis issued a claim construction order. Dkt. 178 (5:13-cv-01317-EJD). In the
7
order, Judge Davis construed terms in the claims at issue as follows:
8
1. Data items: “sequence of bits”
9
2. Data files: “a named data item(s)”
3. Substantially unique identifier, Data identifier, True Name, Digital identifier, Data item
11
United States District Court
Northern District of California
10
identifier: “an identity for a data item generated by processing all of the data in the data
12
item, and only the data in the data item, through an algorithm that makes the identifier
13
substantially unique”
14
Id. at 47.
15
The cases were subsequently transferred to the Northern District of California. Before
16
transfer, EMC and VMware filed a series of petitions for inter partes review (“IPR”) with the
17
Patent Trial and Appeal Board (“PTAB”) challenging the validity of the ’280 and ’662 patents.
18
The IPRs also challenged the validity of the ’791, ’539, ’544, and ’096 patents, which are relevant
19
to this case because these patents have identical specifications and priority dates to the three True
20
Name patents at issue. The PTAB found in six separate decisions that it was known in the prior
21
art to use content-based identifiers, based on “hashes” of data items, for the kinds of data-
22
management tasks that Plaintiff claims. The PTAB determined many claims in the “True Name”
23
patents were not novel and were thus invalid under 35 U.S.C. § 102. The PTAB determined:
24
25
26
27
28
1. Claims 1–4, 29–33, and 41 of the ’791 patent were invalid because the prior art
(Woodhill’s backup procedures) already disclosed a method for detecting and avoiding
duplicate binary object identifiers. See Declaration of Marissa A. Lalli in Support of
Defendants’ Motion for Judgment on the Pleadings (“Lalli Decl.”), Ex. A at 39. The
PTAB thus invalidated the claims in the’791 patent that patented a method of using
content-based identifiers to identify and access data items because Woodhill already
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
7
outlined a method of using a binary hash3 algorithm to calculate a binary object identifier
from the “content of the data” instead of “from an external or arbitrary source.” Id. at 15.
Like Plaintiff’s claimed method, the identifier “changes when the contents of the binary
object changes.” Id. at 16.
1
2
3
2. Claims 36 and 38 of the ’280 patent were invalid because the prior art (Woodhill’s selfauditing procedure) disclosed a method of using content-based identifiers to identify and
request a data item based on the “hash of contents” of the data item. Id., Ex. B at 17. As
noted by Defendants’ expert, Dr. Clark, such an “operation was routine because it was old
and well-known to identify and request objects using their identifiers.” Id.
4
5
6
3. Claim 30 of the ’662 patent was invalid because the prior art (Kantor’s method of
identifying duplicate files) disclosed a method of using content-based identifiers, based on
hash functions, to identify duplicate files. Id., Ex. C at 9, 11, 15.
7
8
9
4. Claims 10 and 21 of the ’539 patent were invalid because prior art (Langer) already
disclosed a method of accessing files in a network of computers. Id., Ex. D at 20. Langer
already disclosed a method of calculating a unique identifier for a file using an MD5 hash
function on the contents of the component file, rather than the file’s location. Id.
10
United States District Court
Northern District of California
11
12
5. Claim 1 of the ’544 patent was invalid because prior art (Woodhill) already disclosed a
system for distributed storage management on a computer network system using binary
object identifiers. Id., Ex. E at 14. Claim 1 was invalid because it claimed a method of
using content-based identifiers to compare files, which was already anticipated by
Woodhill. Id. at 22.
13
14
15
16
17
The Federal Circuit affirmed these PTAB decisions. Id., Ex. G. Accordingly, there is no
dispute that it was known in the art to use content-based identifiers, based on “hashes” of data
items, for data-management in multi-server computer networks.
18
19
20
21
22
23
24
Apple (who is not a Defendant in this action) filed a separate IPR challenging the ’310
patent. The PTAB held the asserted claims unpatentable as not novel. The Federal Circuit,
however, reversed the PTAB’s findings and accepted Plaintiff’s argument that the prior art (the
Woodhill system) did not inherently disclose comparing one content-based identifier with a
plurality of identifiers. PersonalWeb, 917 F.3d at 1382–83. Rather, the prior art only disclosed a
one-to-one comparison. Id. at 1382. Thus, Plaintiff could claim a method of comparing one
content-based identifier with multiple identifiers without violating 35 U.S.C. § 102.
25
26
27
28
3
The True Name patents use the terms “hash” and “message digest” interchangeably. ’310
(40:12). “Message digest” functions (like MD5) are a type of hash function. 12:43–46).
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
8
While the Federal Circuit held that the claims in the ’310 patent were novel, the court
1
2
acknowledged that many claims in Plaintiff’s True Name patents were invalid since the prior art
3
disclosed a system for (1) using content-based identifiers, (2) calculated using the contents of a
4
data item,4 (3) which are stored with certain other information, in a binary object identification
5
record, (4) to perform file-management functions, like backing-up files or restoring systems, (5)
6
which check to see if binary objects have changed since the system’s most recent backup, and (6)
7
control access to data items stored in a repository by granting authorization to digital works via a
8
“digital ticket” that identifies whether a user is entitled access to a file. PersonalWeb Techs. v.
9
Apple, Inc., 848 F.3d 987, 989 (Fed. Cir. 2017).
Defendants now argue that the asserted claims of the ’310, ’280, and ’662 “True Name”
10
United States District Court
Northern District of California
11
patents are abstract and not eligible for patent protection under 35 U.S.C. § 101. Defendants’
12
Motion for Judgment on the Pleadings (“Mot.”), Dkt. 361; see also Reply in Support of
13
Defendants’ Motion for Judgment on the Pleadings (“Reply”), Dkt. 364. Plaintiff argues in
14
opposition that the asserted claims are not abstract and are protected under Section 101. Plaintiff’s
15
Opposition to Defendants’ Motion for Judgment on the Pleadings (“Opp.”), Dkt. 362. Because
16
Section 101 challenges are not available in IPRs, the True Patents’ eligibility on this ground has
17
not yet been decided. Neptune Generics, LLC v. Eli Lilly & Co., 921 F.3d 1372, 1378 (Fed. Cir.
18
2019); 35 U.S.C. § 311(b) (stating that in an IPR, a petitioner is limited to grounds that “could be
19
raised under section 102 or 103”). The Court now decides whether the asserted claims are
20
protected by Section 101.
II.
21
A. Motion for Judgment on the Pleadings
22
A motion for judgment on the pleadings under Federal Rule of Civil Procedure 12(c) is a
23
24
LEGAL STANDARD
“means to challenge the sufficiency of the complaint after an answer has been filed.” New.Net,
25
26
27
28
4
Dr. Clark explained that content-based identifiers are created by “hashing” the contents of a data
item so that identical items have the same identifier. Dr. Robert Dewar conceded in his deposition
that this concept was disclosed in the prior art that was the focus of the IPRs. Declaration of
Marissa A. Lalli in Support of Reply (“Lalli Reply Decl.”), Ex. H at 136.
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
9
Inc. v. Lavasoft, 356 F.Supp.2d 1090, 1115 (C.D. Cal.2004). The standard is functionally
2
identical to a motion to dismiss. Dworkin v. Hustler Magazine, Inc., 867 F.2d 1188, 1192 (9th
3
Cir. 1989). On a Rule 12(c) motion, disputed material facts preclude judgment. Hal Roach
4
Studios, Inc. v. Richard Feiner and Co., Inc., 896 F.2d 1542, 1550 (9th Cir.1990) (“Judgment on
5
the pleadings is proper when the moving party clearly establishes on the face of the pleadings that
6
no material issue of fact remains to be resolved and that it is entitled to judgment as a matter of
7
law.”). In deciding such a motion, the Court may consider the pleadings, documents incorporated
8
by reference in the pleadings, and matters of judicial notice. Heliotrope Gen., Inc. v. Ford Motor
9
Co., 189 F.3d 971, 981 n.18 (9th Cir. 1999) (“When considering a motion for judgment on the
10
pleadings, this court may consider facts that ‘are contained in materials of which the court may
11
United States District Court
Northern District of California
1
take judicial notice.’” (citation omitted)).5
B. Conversion
12
Plaintiff argues the Court should convert Defendants’ motion for judgment on the
13
14
pleadings into one for summary judgment. This would allow the Court to consider the
15
concurrently filed Declaration of Dr. Samuel Russ, Ph.D. Defendants object and argue, in the
16
alternative, that if the Court converts the motion into one for summary judgment, it should defer
17
deciding the motion until Defendants can depose Plaintiff’s expert, present their own evidence,
18
and brief an argument under the summary judgment standard. Reply at 15 n.11.
19
Federal Rule of Civil Procedure 12(c) provides that a motion for judgment on the
20
pleadings may be filed “[a]fter the pleadings are closed—but early enough not to delay trial[.]”
21
“Conversion to summary judgment is generally not appropriate where . . . only the nonmoving
22
party has introduced evidentiary exhibits in response to . . . a motion for judgment on the
23
pleadings.” Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC, 2016 WL 4373698, at *4
24
(D. Del. Aug. 15, 2016) (collecting cases). Generally, a district court should give parties notice of
25
its intent to convert a motion for judgment on the pleadings into a motion for summary judgment.
26
27
28
5
The IPR materials cited by Defendants and Plaintiff are subject to judicial notice. See Atlas IP
LLC v. Pac. Gas & Elec. Co., 2016 WL 1719545, at *1 n.1.
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
10
1
2
James v. Poole, 2013 WL 132492, at *2 (W.D.N.Y. Jan. 9, 2013).
Plaintiff argues that, in the interest of fairness and timing, the lengthy duration of the
3
litigation and the fact that discovery is nearly closed support converting Defendants’ motion into
4
one for summary judgment. Opp. at 9. In Plaintiff’s view, the Court should not sanction
5
Defendants’ “tactical” use of a Rule 12(c) motion. Opp. at 10–11. Plaintiff also argues that
6
because genuine issues of material fact exist, judgment on the pleadings is improper.
7
Defendants object to conversion and contend that Plaintiff’s use Dr. Russ to “manufacture
8
a factual dispute.” Reply at 14, 15. They point to the fact that despite the length of litigation, Dr.
9
Russ has never been involved in the case. Defendants also argue Dr. Russ’s declaration does not
create a genuine issue of material fact because the declaration is directly contrary to multiple
11
United States District Court
Northern District of California
10
PTAB findings and Federal Circuit rulings. Hence, the purported disputes are not genuine and do
12
not preclude a Rule 12(c) motion.
13
The Court declines to convert the motion into one for summary judgment. Conversion to
14
summary judgment is generally not appropriate when, as here, only the nonmoving party has
15
introduced evidentiary exhibits in response to a motion for judgment on the pleadings. See Two-
16
Way Media Ltd., 2016 WL 4373698 at *4. Only Plaintiff, the nonmovant, has introduced
17
evidence not subject to judicial notice. Furthermore, conversion is only appropriate where a party
18
has notice. See James, 2013 WL 132492 at *2. Here, Defendants did not have notice of
19
conversion. At a joint conference, the Court instructed Defendants to file a joint motion for
20
judgment on the pleadings. Plaintiff neither objected to this nor indicated it intended to convert
21
the motion into one for summary judgment. See Transcript of Proceedings, Dkt. 133 (parties only
22
discussed a Rule 12(c) motion with the Court). Reneging on this discussion and converting the
23
motion into one for summary judgment would produce waste—the Court would have wasted its
24
time in discussing a Rule 12(c) motion with the Parties and Defendants would have wasted their
25
time preparing Rule 12(c) briefing. See Reply at 15 n.11.
26
Plaintiff’s timeliness argument is unconvincing. The fact that these cases have been
27
pending for nearly six years is obviated by the multiple IPRs and Federal Circuit appeals. Indeed,
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
11
1
once these IPRs and appeals concluded, Defendants immediately filed their Rule 12(c) motion.
2
See Richter, 2018 WL 6728515 at *6. Given this timeline and the fact that no trial date is set, the
3
motion was filed “early enough not to delay trial.” Fed. R. Civ. P. 12(C). The motion is thus
4
timely. The Court thus fails to see how Rule 12(c) is being “tactically used” when Defendants
5
brought the motion at the earliest opportunity.
Finally, to the extent factual disputes exist, neither the summary judgment nor motion for
6
7
judgment on the pleadings standard allow this Court to find for Defendants. Accordingly,
8
Plaintiff’s request for conversion is DENIED and Dr. Russ’s declaration will not be used.
9
III.
DISCUSSION
Patent eligibility under 35 U.S.C. § 101 is a question of law that may contain underlying
11
United States District Court
Northern District of California
10
issues of fact. OIP Techs., Inc. v. Amazon.com, Inc., 788 F.3d 1359, 1362 (Fed. Cir. 2015); see
12
also Interval Licensing LLC v. AOL, Inc., 896 F.3d 1335, 1342 (Fed. Cir. 2018). Hence, when the
13
“basic character of the claimed subject matter is readily ascertainable from the face of the patent,”
14
courts may determine patent eligibility at the motion for judgment on the pleadings stage. See
15
Internet Patents Corp. v. Gen. Auto. Ins. Servs., Inc., 29 F. Supp. 3d 1264, 1268 (N.D. Cal. 2013).
16
Under 35 U.S.C. § 101, the scope of patentable subject matter includes “any new and
17
useful process, machine, manufacture, or composition of matter, or any new and useful
18
improvement thereof.” The Supreme Court has “long held that this provision contains an
19
important implicit exception: Laws of nature, natural phenomena, and abstract ideas are not
20
patentable.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. 208, 216 (2014) (quotation marks
21
and citation omitted). These three exceptions are “the basic tools of scientific and technological
22
work” and monopolization of these tools “might tend to impede innovation more than it would
23
tend to promote it, thereby thwarting the primary object of the patent laws.” Id. (quotation marks
24
and citation omitted).
25
In three recent cases, the Supreme Court has established a legal framework for determining
26
if an exception applies. See Bilski v. Kappos, 561 U.S. 593 (2010); Mayo Collaborative Servs. v.
27
Prometheus Laboratories, Inc., 566 U.S. 66 (2012); Alice Corp., 573 U.S. 208. As elaborated in
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
12
1
Alice, the § 101 eligibility inquiry proceeds in two steps. Alice Corp., 573 U.S. at 217–18. First,
2
the court determines whether the patent(s) at issue are directed to an abstract idea, law of nature,
3
or natural phenomenon. Id. at 217. If the court determines the patent(s) do not cover an excepted
4
subject matter, the inquiry ends. Id. If, however, the patent(s) do focus on one of these categories,
5
the court proceeds to the second step, where it determines if “the elements of each claim both
6
individually and ‘as an ordered combination’ . . . ‘transform the nature of the claim’ into a patent-
7
eligible application.” Id. (quoting Mayo Collaborative Servs., 566 U.S. at 78). If the claims fail to
8
provide this “inventive concept,” the patent is ineligible. Id. at 217–18.
9
Accordingly, the Court must first decide whether the three True Name patents at issue
cover an excepted subject-matter, i.e. an abstract concept, and, if yes, whether an “inventive
11
United States District Court
Northern District of California
10
concept” exists.
12
13
14
A. Alice/Mayo Step One
1. Foundational Background
At step one of the Alice framework, the Court “look[s] at the focus of the claimed advance
15
over the prior art to determine if the claim’s character as a whole is directed to excluded subject
16
matter.” Affinity Labs of Tex., LLC v. DIRECTV, LLC, 838 F.3d 1253, 1257 (Fed. Cir. 2016).
17
Courts must be careful not to overgeneralize claims otherwise “all inventions can be reduced to
18
underlying principles of nature.” Diamond v. Diehr, 450 U.S. 175, 189 n.12 (1981). On the other
19
hand, the judicial inquiry should root out “creative drafting efforts” designed to “monopolize” the
20
abstract idea. See Alice, 573 U.S. at 221. “In cases involving software innovations, this inquiry
21
often turns on whether the claims focus on ‘the specific asserted improvement in computer
22
capabilities . . . or, instead, on a process that qualifies as an abstract idea for which computers are
23
invoked merely as a tool.’” Finjan, Inc. v. Blue Coat System, Inc., 879 F.3d 1299, 1303 (Fed. Cir.
24
2018) (quoting Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335–36 (Fed. Cir. 2016)).
25
Merely stating an “improved result” to an otherwise abstract idea is insufficient; the patent must
26
recite a “specific means or method that solves a problem in an existing technological process.”
27
Koninkliijke KPN N.V. v. Gemalto M2M GmbH, 942 F.3d 1143, 1150 (Fed. Cir. 2019).
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
13
1
Accordingly, the relevant inquiry is what problem the patent claims to solve and whether the
2
patent specifically asserts a method to make improvements.
3
Four recent Federal Circuit cases, which Plaintiff relies on, illustrate the Alice step one
inquiry. In Enfish, the court held that a software patent covering a “self-referential database” did
5
not constitute an abstract idea. 822 F.3d at 1337–38. There, unlike the prior model of “relational
6
databases,” which generated multiple and separate data-tables for each entity, the plaintiff’s
7
patents claimed a self-referential model that allowed all of the information in a database to be
8
contained and displayed in a single table. Id. at 1330, 1337. Thus, the patents sought to improve a
9
concrete software-specific inefficiency that had existed in referential databases. This made the
10
patents different from cases like Alice where a patent-holder simply wanted to add conventional
11
United States District Court
Northern District of California
4
computer components to well-known business practices. Id. at 1338. Because the self-referential
12
table was a specific type of data structure distinct from the abstract idea of improving the way a
13
computer stores and retrieves data in memory, the patent was not so sweeping that “general-
14
purpose computer components” could be added “post-hoc to a fundamental economic practice or
15
mathematical equation.” Id. at 1339; cf. Alice, 573 U.S. at 221 (noting that the judicial inquiry
16
should root out creative drafting designed to monopolize an abstract idea).
17
In McRO, Inc. v. Bandai Namco Games America, Inc., the court held that the patent was
18
not abstract because the claims were limited to rules with specific characteristics. 837 F.3d 1299,
19
1313 (Fed. Cir. 2016). There, the patent at issue claimed a method of using a computer to
20
automate conventional activity. Specifically, the patent covered a method of accurately and
21
realistically syncing lip and facial expressions in animated characters. Id.at 1314. Previously, this
22
could only be produced by human animators. Id. It did this through an “ordered combination of
23
claimed steps, using unconventional rules that relate subsequences of phonemes, timings, and
24
morph weight sets.” Id. at 1302–03. The court focused its analysis on the specific rules claimed
25
in the patent—as in Enfish, the claimed process used a combined order of specific rules to resolve
26
a specific ineffiency, thereby obviating the fear that the patent covered an “entire abstract idea”
27
and could preempt all innovation in the field. See id. at 1314–15 (noting patent’s rules ensured
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
14
1
“future alternative discoveries were not foreclosed”).
2
In Finjan, the court held the patent was not abstract because the patent addressed a
3
software-based innovation prescribed by specific steps. 879 F.3d at 1303–06. There, the patent at
4
issue was directed to a method of providing computer security by scanning a downloadable
5
program and attaching results of that scan to the downloadable in the form of a “security profile.”
6
Id. at 1303. This operation is distinguished from traditional, “code-matching” virus scans that are
7
limited to recognizing the presence of previously-identified viruses. Id. at 1304. The claimed
8
method thus “constitute[d] an improvement in computer functionality.” Id. Much like in Enfish,
9
the virus improvement constituted a “non-abstract improvement to computer technology” because
it addressed a specific inefficiency, namely it “employ[ed] a new kind of file that enable[d] a
11
United States District Court
Northern District of California
10
computer security system to do things it could not do before.” Id. at 1305. And, much like
12
McRO, the claims recited specific steps and thus claimed more than “a mere result.” Id.; see also
13
Koninkliijke KPN N.V v. Gemalto M2M GmbH., 942 F.3d 1143, 1150 (Fed. Cir. 2019) (holding,
14
like in Finjan, claimed invention not abstract because it “employ[ed] a new way of generating
15
check data” (emphasis added)).
16
Contrast these cases with In re TLI Communications LLC Patent Litigation, 823 F.3d 607
17
(Fed. Cir. 2016). There, the patent at issue related to an “apparatus for recording of a digital
18
image, communicating the digital image from the recording device to a storage device, and []
19
administering the digital image in the storage device.” Id. at 609. The claims were directed to
20
storing and organizing digital photos. Id. The court determined that the patent covered an abstract
21
idea because it did not claim any new technology or use of such technology. Id. at 612. Instead, it
22
“describe[d] the system and methods in purely functional terms” and failed to provide “any
23
technical details for the tangible components.” Id. The claims were “simply directed to the
24
abstract idea of classifying and storing digital images in an organized manner.” Id. at 613. Thus,
25
the patent, unlike the aforementioned cases, was abstract because the patent covered the
26
conventional application of known ideas. Indeed, the patent failed to describe any type of method
27
for improving software functionality or solving a specific technological problem. Id. at 613.
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
15
1
These cases stand for four principles: first, when claims recite purely functional language
2
and use conventional technology in a typical manner, the claims are not patent eligible. See Elec.
3
Power Grp., LLC v. Alstom S.A.,830 F.3d 1350, 1356 (Fed. Cir. 2016) (affirming district court’s
4
holding that patent was abstract because claims only focused on the combination of “abstract-idea
5
processes” without adding any “particular assertedly inventive technology” or processes). Second,
6
and relatedly, claims that merely recite steps people go through in their minds, or by mathematical
7
algorithms, without more, are abstract mental processes. See TLI, 823 F.3d at 613 (holding that
8
claims were abstract because they simply recited the abstract ideas of “classifying and storing
9
digital images in an organized manner”). Third, as Finjan and Enfish show, eligibility requires
some fixed subject-matter with fixed parameters. See Finjan, 879 F.3d at 1305–06 (holding patent
11
United States District Court
Northern District of California
10
was not abstract because it claimed a specific way to accomplish specific result). Finally, a result,
12
even if innovative, is not patentable. Id. at 1305 (collecting cases). Only the specific steps that
13
accomplish an innovative result are patentable. Id. These four principles reaffirm that preemption
14
is at the heart of the Mayo/Alice analysis. By constraining patentability, courts aim to balance
15
innovation and monopolization.
16
Accordingly, at step one, the inquiry must be: what a patent is “directed to?” This ensures
17
that the patent seeks to resolve a specific problem through specific means, thus ensuring the field
18
is not completely occupied and creativity is not preempted.
19
20
2. The ’380, ’280, and ’662 Patents Are Directed to an Abstract Idea
The claims in the True Name patents at issue are directed to:
21
1. ’310 patent: using a known, content-based identifier to control access to data.
22
2. ’280 patent: retrieving and delivering copies of data items across a network of servers.
23
3. ’662 patent: identifying copies of identical data items in a network of servers based on the
24
data’s unique content-based identifier and deleting one of the duplicate data copies.
25
The Parties do not dispute this. See Opp. at 14, 24. Hence, the True Name patents,
26
broadly construed, focus on the idea of using content-based identifiers to manage data in a
27
computer system.
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
16
1
Even accepting this, Plaintiff argues that the True Name patents are not abstract. First,
2
Plaintiff contends the claims are not abstract because “[n]othing like this existed at the time.”
3
Opp. at 14. Alternatively, Plaintiff contends the patents cover a specific improvement in data-
4
management, namely a method that identifies any variable sequence of bits within a network,
5
based on the data file’s content, to more efficiently locate, access, and de-duplicate data in a
6
network . Id. Finally, Plaintiff argues the claims do not simply recite a desired result, they
7
“explain how [it] is done.” Id. at 15.
8
9
The Court disagrees with Plaintiff’s assessment. The three patents are all directed to the
same abstract three-step process: (1) using a content-based identifier generated from a “hash or
message digest function,” (2) comparing that content-based identifier against something else, i.e.
11
United States District Court
Northern District of California
10
another content-based identifier or a request for data; and (3) providing access to, denying access
12
to, or deleting data. Collection, comparison, and access to information are abstract concepts. See
13
Elec. Power Grp., 820 F.3d at 1353–54; see also Content Extraction & Transmission LLC v. Wells
14
Fargo Bank, Nat’l Ass’n, 776 F.3d 1343, 1347 (Fed. Cir. 2014) (holding claims ineligible under
15
Section 101 because they were drawn to abstract and well-known ideas of “1) collecting data, 2)
16
recognizing certain data within the collected data set, and 3) storing that recognized data in a
17
memory”). As Enfish, Finjan, and McRO, show above, fundamental concepts may not be
18
claimed; only the steps which go beyond the abstract concept are patent eligible.
19
Here, the patents claim the fundamental concept itself—they claim a method of accessing,
20
storing, and deleting data in a multi-computer network system. And, the patents are not aimed at
21
addressing a specific problem within data-management. Rather, they are aimed at generally
22
making data-management more efficient. As an example, in Enfish the Federal Circuit held that
23
the claim at issue was patentable under Section 101 because it focused on a specific
24
improvement—the self-referential table—that helped computers better store and retrieve data.
25
Enfish, 822 F.3d at 1335. The patent thus did not cover general data storage improvements; it
26
covered the specific method claimed to create a self-referential table. This helped ensure the
27
entire field of data storage and retrieval was not preempted, therefore maintaining the balance
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
17
1
between monopolization and innovation.
Likewise, in KPN, the Federal Circuit held that the asserted claims were patent eligible
2
3
because they were focused on clear, specific improvements to existing computer functions. 942
4
F.3d at 1153. There, the claimed invention was a system to “check data” to ensure that there were
5
not “systematic errors” with data transmission. Id. at 1145. The patent proposed adding
6
variability to the calculation of the check data by switching around bits in the data block or using
7
different algorithms. Id. at 1146. This, the court determined, was patentable because the patent
8
claimed only the specific steps of using a new “check data” system and thus only sought to solve a
9
specific problem within the check-data field. Id. at 1153. Hence, the patent was not directed at
10
data processing and transmission generally.
At step one, the Court broadly construes a patent’s purpose and asks what problem does
United States District Court
Northern District of California
11
12
the patent seek to resolve? Using broad brushes, a commonality can be gleaned from each patent
13
discussed in the aforementioned cases. In each case, the patent-holder patented a new and specific
14
method to resolve a problem. For example: (1) in Enfish, a new type of table was claimed; (2) In
15
KPN, a new “check data” method was claimed; (3) in McRO, a new way to sync an anima
16
character’s facial expressions and speech was claimed; and (4) in Finjan, a new file-scanning
17
system was claimed. In contrast, here, no “new” system is claimed. The patents are generally
18
aimed at making data-storage in multi-computer networks easier and more efficient. Unlike
19
Enfish, McRO, KPN, and Finjan, the True Name patents do not claim a “new way” of storing,
20
accessing, or naming files. Indeed, the True Name patents cannot, and do not, claim the process
21
for generating a data-based identifier.6 Rather, they claim the process of “applying” such
22
identifiers to perform “particularly-recited data management operations.” Opp. at 15. But,
23
claiming the “application” of a well-known hashing technique to the abstract concept of data
24
management does not render the idea non-abstract. See Bilski, 561 U.S. at 612 (“[L]imiting an
25
abstract idea to one field of use or adding token postsolution components [does] not make the
26
27
28
6
As noted above, this is prior art. See supra I.B.
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
18
1
concept unpatentable.”); see also Prism Techs. LLC v. T-Mobile USA, Inc., 696 F. App’x 1014,
2
1017 (Fed. Cir. 2017) (holding claims directed to “(1) receiving identity data from a device with a
3
request for access to resources; (2) confirming the authenticity of the identity data associated with
4
that device; (3) determining whether the device identified is authorized to access the resources
5
requested; and (4) if authorized, permitting access to the requested resources” abstract because
6
claimed abstract idea of “providing restricted access to resources”).
7
For instance, in Bridge & Post, Inc. v. Verizon Communications, Inc., the court held that
the claims “determining user information for a user” and “generating a user identifier from the
9
determined user information” were unpatentable. 319 F. Supp. 3d. 818, 822 (E.D. Va. 2018). The
10
disputed claims in Bridge & Post covered “swapping a changeable identifier with an unchangeable
11
United States District Court
Northern District of California
8
one” and using the identifier to implement targeted marketing. Id. at 824–25. But targeted
12
marketing and using “an unchangeable identifier” are abstract ideas. Id. at 825; see also Secured
13
Mail Sols. LLC v. Universal Wilde, Inc., 873 F.3d 905, 910 (Fed. Cir. 2017) (“There is no
14
description of how the unique identifier is generated . . . .”). Hence, applying abstract ideas to a
15
specific concept does not render them non-abstract. Bridge & Post, Inc., 319 F. Supp. 3d at 825.
16
Here, as in Bridge & Post, Plaintiff neither claims they invented the content-based
17
identifier nor that their invention is computer-specific. Indeed, Plaintiff cannot argue either of
18
these things—the content-based identifier is prior art and Plaintiff has sought to broadly enforce
19
the True Name patents. See supra I.B.; Mot. at 4 n.4. As shown in Defendants’ briefing, the True
20
Name patents have been asserted across a wide array of technologies like content-delivery
21
networks, peer-to-peer music swapping, cloud storage and web applications. Id. This confirms
22
that, broadly construed, the claims are directed at “generating, transmitting, receiving, and storing”
23
data and are not directed at improving computer functionality in some concrete way. See Visual
24
Memory LLC v. NVIDIA Corp., 867 F.3d 1253, 1258 (Fed. Cir. 2017) (“[W]e must . . . ask
25
whether the claims are directed to an improvement to computer functionality versus being directed
26
to an abstract idea.”). Therefore, the claims are directed to the “basic concept” of data
27
management, which is sufficient to fall under Alice step 1. See TLI, 823 F.3d at 613 (holding
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
19
1
claims directed to collecting data, recognizing certain data within the collected set, and storing the
2
recognized data in memory were a “well-established basic concept”).
3
Finally, the Court notes Defendants’ argument that Plaintiff is “computerizing” a
4
conventional process known in the art. Opp. at 15. Defendants argue that the concept claimed in
5
the True Name patents is derivative of other data-management systems like the Dewey Decimal
6
and Library of Congress Classification systems. Reply at 10. For example, librarians often locate
7
books based on a “call system” where they assign books unique identifiers based on call numbers,
8
which change dependent on a book’s volume, etc. Using a “master call list,” a librarian can
9
compare the call numbers to see if multiple copies of the same text exist and purge books
accordingly. Hence, Defendants argue that the True Name patents cover this well-known concept,
11
United States District Court
Northern District of California
10
except applied to computers. See OIP Techs., 788 F.3d at 1362–63 (limiting abstract ideas to a
12
particular environment does not make the claims less abstract in Alice step one).
13
In OpenTV, Inc. v. Apple, Inc., the court held that the patent was abstract because it could
14
not pass the “pen and paper test.” 2015 WL 1535328, at *4 (N.D. Cal. Apr. 6, 2015). There, one
15
could use a pen, paper, and her own brain to perform the claimed steps of the patent. Id. The fact
16
that the claims could be done without modern technology showed the patents were directed at
17
“abstract ideas.” Id. Failing the “pen and paper test” indicates that a patent applies to an abstract
18
concept, which means the patent-holder can monopolize entire fields of thought, thus hampering
19
innovation. Here, as in OpenTV, the problem of how to store, organize, and access data is not new
20
(see Dewey Decimal system). Hence, the purported solutions claimed in the True Name patents
21
are not a uniquely technological problem and thus do not create solutions to computer-centric
22
problems like the patents in Enfish, McRO, KPN, and Finjan. Accordingly, the Court holds the
23
three True Name patents abstract under Alice step 1 and proceeds to step 2.
24
25
B. Alice/Mayo Step Two
At step two, the court examines the elements of the claims, both individually and “as an
26
ordered combination” to determine if they contain an “inventive step” sufficient to “transform” the
27
claimed abstract idea into a patent-eligible application. Alice, 573 U.S. at 221 (citing Mayo, 556
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
20
1
U.S. at 78–79). Step two is satisfied when the claim limitations “involve more than performance
2
of ‘well-understood, routine, [and] conventional activities previously known to the industry.’”
3
Content Extraction, 778 F.3d at 1347–48 (quoting Alice, 573 U.S. at 225). “If a claim’s only
4
‘inventive concept’ is the application of an abstract idea using conventional and well-understood
5
techniques, the claim has not been transformed into a patent-eligible application of an abstract
6
idea.” BSG Tech LLC v. Buyseasons, Inc., 899 F.3d 1281, 1290–91 (Fed. Cir. 2018). After
7
identifying an ineligible concept at step one, the court asks at step two: “What else is there in the
8
claims?” Mayo, 566 U.S. at 78.
The question of whether a claim element or combination is well-understood, routine, and
10
conventional to a skilled artisan in the relevant field is a question of fact and thus any fact that is
11
United States District Court
Northern District of California
9
pertinent to the invalidity conclusion must be proven by clear and convincing evidence.
12
Berkheimer v. HP Inc., 881 F.3d 1360, 1368 (Fed. Cir. 2018). Notably, “[t]he mere fact that
13
something is disclosed in a piece of prior art . . . does not mean it was well-understood, routine,
14
and conventional.” Id. at 1369; but see Va. Innovation Scis. Inc. v. Amazon.com, Inc., 227 F.
15
Supp. 3d 582, 599 (E.D. Va. 2017) (“That is not to say that the §§ 102 and 103 analyses are
16
completely irrelevant to the eligibility question.”); Reply at 10–11 (arguing that PTAB decisions
17
invalidating claims based on novelty are persuasive); see also supra I.B. at 9 (discussing prior art).
18
The ’310 patent teaches the use of a “processor,” “network of servers,” data transfer, data
19
“comparison,” and data access/restriction, based on a data item’s “content-based digital identifier,”
20
which comprises a “message digest function or a hash function.” ’310 patent (claims 24, 31, 81,
21
82, and 86); see id. (claim 81) (discussing the use of a device comprising a “processor and
22
memory” in a network of computers and data comparison). The ’280 patent teaches the use
23
“requesting” a data file based on a network’s availability, which is determined by “measurement
24
of” either the server, the cost of a connection to the server, or the reliability of a connection to the
25
server, whereby data is delivered based on an “MD5 hash of the contents of a particular data file.”
26
’280 patent (claims 15, 16, 31, and 32); see id. (claim 31) (discussing a content delivery method
27
where files are distributed across a network of servers where the request and receipt of a data file
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
21
1
is based on the file’s MD5 hash). Finally, the ’662 patent teaches the use marking duplicate files
2
for deletion across a “plurality of servers” whereby location data, i.e. a data item’s unique content-
3
based identifier, is used to determine duplicate files. ’662 patent (claim 33).
4
Plaintiff argues that the Court cannot decide patent eligibility at this stage because a factual
dispute exists about what is routine and conventional in the art. Opp. at 20–21. Plaintiff further
6
argues that Defendants have not shown by clear and convincing evidence that a person of ordinary
7
skill in the art (“POSITA”) would have deemed the “ordered combinations” of elements in each
8
claim to be “well-understood, routine, or conventional.” Id. at 21. Specifically, Plaintiff argues
9
that the specifications disclose numerous “improvements” over the prior art like: (1) ensuring a
10
system only stores one copy of any data item; (2) using data-identifiers to provide access to data
11
United States District Court
Northern District of California
5
while simultaneously using the identifier to ensure only appropriate persons access the data file;
12
and (3) verifying that requested data is the correct data using only the data identifier. Opp. at 25–
13
27. This, Plaintiff’s argue, shows that the patents claim an inventive use of hash functions and
14
thus recite unconventional features that provide benefits over conventional prior art. Id. at 25
15
(citing Perricone v. Medicis Pharm. Corp., 432 F.3d 1368, 1378 (Fed. Cir. 2005) (“New uses of
16
old products or processes are indeed patentable subject matter.”)).
17
The Court disagrees with Plaintiff; the asserted claims fail to provide an inventive concept.
18
The relevant inquiry is “not whether the claimed invention as a whole is unconventional or non-
19
routine.” BSG, 899 F.3d at 1290. Rather, the court assesses “whether the claim limitations other
20
than the invention’s use of the ineligible concept to which it was directed were well-understood,
21
routine, and conventional.” Id. (emphasis added). No “inventive concept” exists when an abstract
22
idea is used in a conventional way. Id. at 1290–91.
23
A “hash identifier” uses extracted data to identify a specific data-file—it is a “generic and
24
routine concept that does not transform the claims to a patent eligible application of the abstract
25
idea.” Smart Sys. Innovations, LLC v. Chi. Transit Auth., 873 F.3d 1364, 1375 n.9 (Fed. Cir.
26
2017). Concepts like “comparing,” “restricting access,” and “de-duplicating” data are well-known
27
and conventional functions of computers and data-management systems, as are “processors” and
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
22
1
“computer networks.” See, e.g., Alice, 573 U.S. at 226 (“But what petitioner characterizes as
2
specific hardware—a ‘data processing system’ with a ‘communications controller’ and ‘data
3
storage unit,’ . . . is purely functional and generic. Nearly every computer will include a
4
‘communications controller’ and ‘data storage unit’ capable of performing the basic calculation,
5
storage, and transmission functions.”); Mortg. Grader, Inc. v. First Choice Loan Servs. Inc., 811
6
F.3d 1314, 1324–25 (Fed. Cir. 2016) (holding generic computer components like “interface,”
7
“network,” and “database” do not satisfy the inventive concept requirement); buySAFE, Inc. v.
8
Google, Inc., 765 F.3d 1350, 1355 (Fed. Cir. 2014) (“That a computer receives and sends the
9
information over a network—with no further specification—is not even arguably inventive.”);
TLI, 823 F.3d at 611, 614–15 (holding that when claims use functional language and conventional
11
United States District Court
Northern District of California
10
technology, like a phone receiving data, extracting information from that data, and storing images,
12
claims are not patent eligible); Intellectual Ventures I LLC v. Capital One Bank (USA), 792 F.3d
13
1363, 1371 (Fed. Cir. 2015) (“Requiring the use of a ‘software’ ‘brain’ ‘tasked with tailoring
14
information and providing it to the user’ provides no additional limitation beyond applying an
15
abstract idea, restricted to the Internet, on a generic computer.”); see also SAP Am., Inc. v.
16
InvestPic, LLC, 898 F.3d 1161, 1163 (Fed. Cir. 2018) (“We may assume that the techniques
17
claimed are groundbreaking, innovative, or even brilliant, but that is not enough for eligibility.”
18
(quotation marks and citation omitted)).
19
There is, in short, nothing “inventive” about any claim details, individually or in
20
combination, that are not themselves abstract ideas. The claims are directed at “standard file
21
management” functions. ’310 (6:28). Using a generic hash function, a server system, or a
22
computer does not render these claims non-abstract; the claims are still directed to the abstract
23
ideas of receiving, storing, deleting, and controlling access to data. See BSG, 899 F.3d at 1290–
24
91. Hence, none of the hardware recited by the claims “offers a meaningful limitation beyond
25
generally linking ‘the use of the [method] to a particular technological environment.’” Alice, 573
26
U.S. at 226 (quoting Bilski, 561 U.S. at 610–11). Allowing the three True Name patents to survive
27
Section 101 would allow Plaintiff to monopolize the entire field of data-storage. Cf. id. at 226–27
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
23
1
(“The concept of patentable subject matter under § 101 is not like a nose of wax which may be
2
turned and twisted in any direction.” (quotation marks and citation omitted)). Accordingly,
3
because the asserted claims’ steps do nothing more than apply a well-known hashing concept to
4
data-storage, the ’310, ’280, and ’662 patents are directed to patent-ineligible subject matter and
5
fail under Section 101.
6
7
IV.
CONCLUSION
For the foregoing reasons, the Court GRANTS Defendants’ motion for judgment on the
8
pleadings and holds the ’310, ’280, and ’662 patents invalid for failure to satisfy 35 U.S.C. § 101.
9
Since this is a legal issue and amendment would be futile, leave to amend would be denied. In any
event, such leave was not requested. The Clerk shall close the file and a judgment in favor of
11
United States District Court
Northern District of California
10
Defendants shall follow.
12
13
14
15
IT IS SO ORDERED.
Dated: January 29, 2020
______________________________________
EDWARD J. DAVILA
United States District Judge
16
17
18
19
20
21
22
23
24
25
26
27
28
Case No.: 5:13-cv-01317-EJD
ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE PLEADINGS
24
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?