PersonalWeb Technologies LLC v. Google, Inc. et al
Filing
367
***AMENDED*** ORDER re ( 82 in 5:13-cv-01358-EJD) Order on Motion for Judgment on the Pleadings, ( 92 in 5:13-cv-01356-EJD) Order on Motion for Judgment on the Pleadings, ( 365 in 5:13-cv-01317-EJD) Order on Motion for Judgment on the Pleadings. Signed by Judge Edward J. Davila on 1/31/2020. (amkS, COURT STAFF) (Filed on 1/31/2020)
1
2
3
4
UNITED STATES DISTRICT COURT
5
NORTHERN DISTRICT OF CALIFORNIA
6
SAN JOSE DIVISION
7
8
PERSONALWEB TECHNOLOGIES LLC,
Plaintiff,
9
Case No. 5:13-cv-01317-EJD
Re: Dkt. No. 361
v.
10
11
GOOGLE LLC, et al.,
United States District Court
Northern District of California
Defendants.
12
13
PERSONALWEB TECHNOLOGIES LLC,
Plaintiff,
14
15
16
FACEBOOK INC.,
Defendant.
PERSONALWEB TECHNOLOGIES LLC,
et al.,
19
20
21
22
Re: Dkt. No. 85
v.
17
18
Case No. 5:13-cv-01356-EJD
Case No. 5:13-cv-01358-EJD
Re: Dkt. No. 78
Plaintiffs,
v.
EMC CORPORATION, et al.,
Defendants.
AMENDED ORDER GRANTING
DEFENDANTS’ MOTION FOR
JUDGMENT ON THE PLEADINGS
23
24
25
26
27
28
Plaintiff PersonalWeb Technologies LLC owns a family of patents that claim methods for
reliably identifying, locating, and processing data in a computer network. Plaintiff alleges that
Defendants infringed three of these patents. Defendants argue that Plaintiff’s patents are invalid
pursuant to 35 U.S.C. § 101. The Court finds this motion suitable for consideration without oral
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
1
1
argument. See N.D. Cal. Civ. L.R. 7-1(b). Having considered the Parties’ papers, the Court
2
GRANTS Defendant’s motion for judgment on the pleadings.
3
4
5
I.
BACKGROUND
A. Factual Background
Plaintiff argues that Defendants (collectively or separately) infringed U.S. Patent No.
6
7,802,310 (“the ’310 patent”), No. 6,415,280 (“the ’280 patent”), and No. 7,949,662 (“the ’662
7
patent”). The three patents at issue are part of a larger family of patents that Plaintiff calls the
8
“True Name” patents. The patents are aimed at combatting the problems of data storage on larger
9
networks. As computer networking and storage systems evolve, files can be divided and stored
across different devices in dispersed locations. This created problems—different users can
11
United States District Court
Northern District of California
10
unknowingly give identical names to identical files. The inventors of the “True Name” patents
12
patented a solution; they developed a system that replaces conventional file names with unique
13
content-based identifiers. This is done by applying a “hash function” (a mathematical algorithm)
14
to the data in each file. For instance, as described in the ’310 patent, an item’s unique content
15
creates a unique identifier. A myriad of data items can be used to create the unique identifier,
16
which ensures duplicate copies are not created. See, e.g., ’310 patent, (2:18–21) (“[A] data item
17
may be the contents of a file, a portion of a file, a page in memory, an object in an object-oriented
18
program, a digital message, a digital scanned image, a part of a video or audio signal, or any other
19
entity which can be represented by a sequence of bits.”). The three patents acknowledge that the
20
“True Name,” i.e. the assigned identifier, is intended for use with “existing” operating systems and
21
“standard” data-management processes. Id. (6:26).
22
The ’310 Patent. The ’310 patent explains a method and apparatus for creating a unique
23
data-identifier for each file based on the content of the data item. The identifier is independent of
24
the data item’s user-defined name/location, which helps ensure duplicate copies are not created.
25
The identifier for a particular data item is created by applying a cryptographic hash function to the
26
data claim. The output of the hash function is the content-based identifier or “True Name,” which
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
2
1
is “virtually guaranteed” to be unique to the data item. PersonalWeb Techs., LLC v. Apple, Inc.,
2
917 F.3d 1376, 1377–78 (Fed. Cir. 2019). The system uses the content-based identifier to
3
determine whether a particular data item is present on the system. And, when the data item’s
4
contents are changed, the content-based identifier is also changed. The identifiers are then used to
5
determine if access to a data item is licensed or authorized. See, e.g., ’310 patent (claims 24, 81,
6
86).
7
Five claims of the ’310 patent are at issue. Plaintiff contends Defendant EMC/VMware
8
infringed claims 24 and 32 of the patent. Plaintiff alleges Defendants Google/YouTube,
9
Facebook, and EMC/VMware infringed claims 81, 82, and 86 of the patent. The relevant claims
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
of the ’310 patent are as follows:
24. A computer-implemented method implemented at least in part by hardware comprising
one or more processors, the method comprising:
(a) using a processor, receiving at a first computer from a second computer, a request
regarding a particular data item, said request including at least a content-dependent name
for the particular data item, the content-dependent name being based, at least in part, on at
least a function of the data in the particular data item, wherein the data used by the function
to determine the content-dependent name comprises at least some of the contents of the
particular data item, wherein the function that was used comprises a message digest
function or a hash function, and wherein two identical data items will have the same
content-dependent name; and
(b) in response to said request:
(i) causing the content-dependent name of the particular data item to be compared
to a plurality of values;
(ii) hardware in combination with software determining whether or not access to
the particular data item is unauthorized based on whether the content-dependent
name of the particular data item corresponds to at least one of said plurality of
values, and
(iii) based on said determining in step (ii), not allowing the particular data item to
be provided to or accessed by the second computer if it is determined that access to
the particular data item is not authorized.
32. The method of claim 24 wherein the data used by the function to determine the
content-dependent name of the particular data item comprises of all of the contents of the
particular data item.
81. A device operable in a network of computers, the device comprising hardware
including at least one processor and memory, to:
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
3
1
2
3
4
5
6
7
8
9
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
(a) receive, at said device, from another device in the network, a content-based identifier
for a particular sequence of bits, the content-based identifier being based at least in part on
a function of at least some of the particular sequence of bits, wherein the function
comprises a message digest function or a hash function, and wherein two identical
sequences of bits will have the same content-based identifier, and to
(b) compare the content-based identifier of the particular sequence of bits to a plurality of
values; and to
(c) selectively allow said particular sequence of bits to be provided to or accessed by other
devices depending on whether or not said content-dependent identifier corresponds to one
of the plurality of values.
82. The device of claim 81 wherein the particular sequence of bits represent data selected
from the group comprising: a file, a portion of a file, a page in memory, a digital message,
a portion of a digital message, a digital image, a portion of a digital image, a video signal,
a portion of a video signal, an audio signal, a portion of an audio signal, a Software
product, and a portion of a software product.
86. A device operable in a network of computers, the device comprising hardware,
including at least one processor and memory, to:
(a) receive at said device, from another device in the network, a digital identifier for a
particular sequence of bits, the digital identifier being based, at least in part, on a given
function of at least some of the bits in the particular sequence of bits, wherein the given
function comprises a message digest function or a hash function, and wherein two identical
sequences of bits will have the same digital identifier; and
(b) selectively allow the particular sequence of bits to be provided to or accessed by other
devices in the system, based at least in part on whether or not the digital identifier for the
particular sequence of bits corresponds to a value in a plurality of values, each of the
plurality of values being based, at least in part, on the given function of at least some of the
bits in a corresponding sequence of bits.
The ’280 Patent. The ’280 patent addresses a method of identifying and requesting data
18
in a network using content-based identifiers. Specifically, it covers a situation where data items
19
are distributed across a network of servers and some of the data items are cached (stored) versions
20
from a source server. The content delivery network (“CDN”) determines a “True Name,” i.e. a
21
content-dependent identifier, for a particular data item (as in the ’310 patent). In response to a
22
request for a particular data item, the CDN provides the particular data item from one of the
23
servers in the network of servers.
24
Four claims of the ’280 patent are at issue. Plaintiff contends Defendants Facebook,
25
Google, and YouTube infringed claims 15 and 16. Plaintiff alleges Defendant Facebook infringed
26
claims 31 and 32. The relevant claims of the ’280 patent are as follows:
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
4
1
15. A method as in claim 101 further comprising:
2
resolving the request for the particular data file based on a measure of availability of at
least one of the servers.
3
4
16. A method as in claim 15 wherein the measure of availability is based on one or more
of:
5
(a) a measurement of bandwidth to the Server;
6
(b) a measurement of a cost of a connection to the server, and
7
(c) a measurement of a reliability of a connection to the SCWC.
8
31. A content delivery method, comprising:
9
distributing a set of data files across a network of servers,
determining an MD5 hash of the contents of a particular data file; and
11
United States District Court
Northern District of California
10
in response to a request for the particular data file, the request including at least the MD5
hash of the particular data file, providing the particular data file from a given one of the
Servers of the network of Servers, Said providing being based on the MD5 hash of the
particular data file.
12
13
14
32. A method as in claim 31 further comprising: resolving the request for the particular
data file based on a measure of availability of at least one of the servers.
15
The ’662 Patent. The ’662 patent addresses the de-duplication of data in a data-
16
processing system. The invention describes systems and methods for deleting a particular copy of
17
a data item when at least one other copy of the copy of the data item is available. The presence of
18
another copy of the data item is determined based on a content-dependent identifier for the data
19
item, which is calculated using the methods described in the ’310 and ’280 patents. A duplicate
20
21
1
Claim 10 claims:
22
A content delivery method, comprising:
23
distributing a set of data files across a network of servers;
24
determining a data identifier for a particular data file, the data identifier being determined using a
given function of the data, wherein said data used by the given function to determine the data
identifier comprises the contents of the particular data file; and
25
26
27
28
in response to a request for the particular data file, the request including at least the data identifier
of the particular data file, providing the particular data file from a given one of the servers of the
network of servers, said providing being based on the data identifier of the particular data file.
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
5
1
copy may be deleted if it is determined another copy exists elsewhere on another processor in the
2
system. Plaintiff contends that Defendant Google/YouTube infringed claim 33 of the ’662 patent.
3
The relevant claim is:
4
33. A file system comprising:
5
(i) a plurality of servers to store file data as segments; and
6
(ii) first data that includes file identifiers for files for which the file data are stored as
segments; and
7
8
9
10
United States District Court
Northern District of California
11
12
13
14
15
16
17
18
19
20
(iii) second data that maps the file identifiers to the segments to which the file identifiers
correspond; and
(iv) location data that identifies which of the plurality of servers stores which of the
segments; and
(v) a table including file identifiers for files in the file system, said table including a
corresponding status for at least some of the files in the file system,
(vi) at least one computer comprising hardware in combi nation with software and
connected to the plurality of servers, the at least one computer programmed:
(A) to receive a request to delete a particular data item in the file system;
(B) to ascertain, in response to said request, a digital data item identifier corresponding
to said particular data item, said particular data item consisting of an arbitrary sequence
of bits consisting of a sequence of non-overlapping segments, each of said segments in
said sequence being stored on multiple servers of the plurality of servers in the file
system, said digital data item identifier being based at least in part on a given function
of the data comprising the particular data item, said given function comprising a hash
function;
(C) to update an entry in said table corresponding to said particular data item to reflect
deletion of said particular data item in the file system, said entry including at least said
digital data item identifier of said particular data item.
B. Procedural History
21
In late 2013, after Plaintiff filed actions against Defendants in the Eastern District of
22
Texas, Judge Davis issued a claim construction order. Dkt. 178 (5:13-cv-01317-EJD). In the
23
order, Judge Davis construed terms in the claims at issue as follows:
24
1. Data items: “sequence of bits”
25
2. Data files: “a named data item(s)”
26
3. Substantially unique identifier, Data identifier, True Name, Digital identifier, Data item
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
6
1
identifier: “an identity for a data item generated by processing all of the data in the data
2
item, and only the data in the data item, through an algorithm that makes the identifier
3
substantially unique”
4
Id. at 47.
5
The cases were subsequently transferred to the Northern District of California. Before
6
transfer, EMC and VMware filed a series of petitions for inter partes review (“IPR”) with the
7
Patent Trial and Appeal Board (“PTAB”) challenging the validity of the ’280 and ’662 patents.
8
The IPRs also challenged the validity of the ’791, ’539, ’544, and ’096 patents, which are relevant
9
to this case because these patents have identical specifications and priority dates to the three True
Name patents at issue. The PTAB found in six separate decisions that it was known in the prior
11
United States District Court
Northern District of California
10
art to use content-based identifiers, based on “hashes” of data items, for the kinds of data-
12
management tasks that Plaintiff claims. The PTAB determined many claims in the “True Name”
13
patents were not novel and were thus invalid under 35 U.S.C. § 102. The PTAB determined:
14
1. Claims 1–4, 29–33, and 41 of the ’791 patent were invalid because the prior art
(Woodhill’s backup procedures) already disclosed a method for detecting and avoiding
duplicate binary object identifiers. See Declaration of Marissa A. Lalli in Support of
Defendants’ Motion for Judgment on the Pleadings (“Lalli Decl.”), Ex. A at 39. The
PTAB thus invalidated the claims in the’791 patent that patented a method of using
content-based identifiers to identify and access data items because Woodhill already
outlined a method of using a binary hash2 algorithm to calculate a binary object identifier
from the “content of the data” instead of “from an external or arbitrary source.” Id. at 15.
Like Plaintiff’s claimed method, the identifier “changes when the contents of the binary
object changes.” Id. at 16.
15
16
17
18
19
20
2. Claims 36 and 38 of the ’280 patent were invalid because the prior art (Woodhill’s selfauditing procedure) disclosed a method of using content-based identifiers to identify and
request a data item based on the “hash of contents” of the data item. Id., Ex. B at 17. As
noted by Defendants’ expert, Dr. Clark, such an “operation was routine because it was old
and well-known to identify and request objects using their identifiers.” Id.
21
22
23
24
3. Claim 30 of the ’662 patent was invalid because the prior art (Kantor’s method of
identifying duplicate files) disclosed a method of using content-based identifiers, based on
25
26
27
28
2
The True Name patents use the terms “hash” and “message digest” interchangeably. ’310
(40:12). “Message digest” functions (like MD5) are a type of hash function. 12:43–46).
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
7
hash functions, to identify duplicate files. Id., Ex. C at 9, 11, 15.
1
4. Claims 10 and 21 of the ’539 patent were invalid because prior art (Langer) already
disclosed a method of accessing files in a network of computers. Id., Ex. D at 20. Langer
already disclosed a method of calculating a unique identifier for a file using an MD5 hash
function on the contents of the component file, rather than the file’s location. Id.
2
3
4
5. Claim 1 of the ’544 patent was invalid because prior art (Woodhill) already disclosed a
system for distributed storage management on a computer network system using binary
object identifiers. Id., Ex. E at 14. Claim 1 was invalid because it claimed a method of
using content-based identifiers to compare files, which was already anticipated by
Woodhill. Id. at 22.
5
6
7
The Federal Circuit affirmed these PTAB decisions. Id., Ex. G. Accordingly, there is no
8
9
10
dispute that it was known in the art to use content-based identifiers, based on “hashes” of data
items, for data-management in multi-server computer networks.
Apple (who is not a Defendant in this action) filed a separate IPR challenging the ’310
United States District Court
Northern District of California
11
12
patent. The PTAB held the asserted claims unpatentable as not novel. The Federal Circuit,
13
however, reversed the PTAB’s findings and accepted Plaintiff’s argument that the prior art (the
14
Woodhill system) did not inherently disclose comparing one content-based identifier with a
15
plurality of identifiers. PersonalWeb, 917 F.3d at 1382–83. Rather, the prior art only disclosed a
16
one-to-one comparison. Id. at 1382. Thus, Plaintiff could claim a method of comparing one
17
content-based identifier with multiple identifiers without violating 35 U.S.C. § 102.
While the Federal Circuit held that the claims in the ’310 patent were novel, the court
18
19
acknowledged that many claims in Plaintiff’s True Name patents were invalid since the prior art
20
disclosed a system for (1) using content-based identifiers, (2) calculated using the contents of a
21
data item,3 (3) which are stored with certain other information, in a binary object identification
22
record, (4) to perform file-management functions, like backing-up files or restoring systems, (5)
23
which check to see if binary objects have changed since the system’s most recent backup, and (6)
24
25
26
27
28
3
Dr. Clark explained that content-based identifiers are created by “hashing” the contents of a data
item so that identical items have the same identifier. Dr. Robert Dewar conceded in his deposition
that this concept was disclosed in the prior art that was the focus of the IPRs. Declaration of
Marissa A. Lalli in Support of Reply (“Lalli Reply Decl.”), Ex. H at 136.
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
8
1
control access to data items stored in a repository by granting authorization to digital works via a
2
“digital ticket” that identifies whether a user is entitled access to a file. PersonalWeb Techs. v.
3
Apple, Inc., 848 F.3d 987, 989 (Fed. Cir. 2017).
Defendants now argue that the asserted claims of the ’310, ’280, and ’662 “True Name”
4
patents are abstract and not eligible for patent protection under 35 U.S.C. § 101. Defendants’
6
Motion for Judgment on the Pleadings (“Mot.”), Dkt. 361; see also Reply in Support of
7
Defendants’ Motion for Judgment on the Pleadings (“Reply”), Dkt. 364. Plaintiff argues in
8
opposition that the asserted claims are not abstract and are protected under Section 101. Plaintiff’s
9
Opposition to Defendants’ Motion for Judgment on the Pleadings (“Opp.”), Dkt. 362. Because
10
Section 101 challenges are not available in IPRs, the True Patents’ eligibility on this ground has
11
United States District Court
Northern District of California
5
not yet been decided. Neptune Generics, LLC v. Eli Lilly & Co., 921 F.3d 1372, 1378 (Fed. Cir.
12
2019); 35 U.S.C. § 311(b) (stating that in an IPR, a petitioner is limited to grounds that “could be
13
raised under section 102 or 103”). The Court now decides whether the asserted claims are
14
protected by Section 101.
15
16
17
II.
LEGAL STANDARD
A. Motion for Judgment on the Pleadings
A motion for judgment on the pleadings under Federal Rule of Civil Procedure 12(c) is a
18
“means to challenge the sufficiency of the complaint after an answer has been filed.” New.Net,
19
Inc. v. Lavasoft, 356 F.Supp.2d 1090, 1115 (C.D. Cal.2004). The standard is functionally
20
identical to a motion to dismiss. Dworkin v. Hustler Magazine, Inc., 867 F.2d 1188, 1192 (9th
21
Cir. 1989). On a Rule 12(c) motion, disputed material facts preclude judgment. Hal Roach
22
Studios, Inc. v. Richard Feiner and Co., Inc., 896 F.2d 1542, 1550 (9th Cir.1990) (“Judgment on
23
the pleadings is proper when the moving party clearly establishes on the face of the pleadings that
24
no material issue of fact remains to be resolved and that it is entitled to judgment as a matter of
25
law.”). In deciding such a motion, the Court may consider the pleadings, documents incorporated
26
by reference in the pleadings, and matters of judicial notice. Heliotrope Gen., Inc. v. Ford Motor
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
9
1
Co., 189 F.3d 971, 981 n.18 (9th Cir. 1999) (“When considering a motion for judgment on the
2
pleadings, this court may consider facts that ‘are contained in materials of which the court may
3
take judicial notice.’” (citation omitted)).4
B. Conversion
4
Plaintiff argues the Court should convert Defendants’ motion for judgment on the
5
6
pleadings into one for summary judgment. This would allow the Court to consider the
7
concurrently filed Declaration of Dr. Samuel Russ, Ph.D. Defendants object and argue, in the
8
alternative, that if the Court converts the motion into one for summary judgment, it should defer
9
deciding the motion until Defendants can depose Plaintiff’s expert, present their own evidence,
10
and brief an argument under the summary judgment standard. Reply at 15 n.11.
United States District Court
Northern District of California
11
Federal Rule of Civil Procedure 12(c) provides that a motion for judgment on the
12
pleadings may be filed “[a]fter the pleadings are closed—but early enough not to delay trial[.]”
13
“Conversion to summary judgment is generally not appropriate where . . . only the nonmoving
14
party has introduced evidentiary exhibits in response to . . . a motion for judgment on the
15
pleadings.” Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC, 2016 WL 4373698, at *4
16
(D. Del. Aug. 15, 2016) (collecting cases). Generally, a district court should give parties notice of
17
its intent to convert a motion for judgment on the pleadings into a motion for summary judgment.
18
James v. Poole, 2013 WL 132492, at *2 (W.D.N.Y. Jan. 9, 2013).
Plaintiff argues that, in the interest of fairness and timing, the lengthy duration of the
19
20
litigation and the fact that discovery is nearly closed support converting Defendants’ motion into
21
one for summary judgment. Opp. at 9. In Plaintiff’s view, the Court should not sanction
22
Defendants’ “tactical” use of a Rule 12(c) motion. Opp. at 10–11. Plaintiff also argues that
23
because genuine issues of material fact exist, judgment on the pleadings is improper.
Defendants object to conversion and contend that Plaintiff’s use Dr. Russ to “manufacture
24
25
26
27
28
4
The IPR materials cited by Defendants and Plaintiff are subject to judicial notice. See Atlas IP
LLC v. Pac. Gas & Elec. Co., 2016 WL 1719545, at *1 n.1.
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
10
1
a factual dispute.” Reply at 14, 15. They point to the fact that despite the length of litigation, Dr.
2
Russ has never been involved in the case. Defendants also argue Dr. Russ’s declaration does not
3
create a genuine issue of material fact because the declaration is directly contrary to multiple
4
PTAB findings and Federal Circuit rulings. Hence, the purported disputes are not genuine and do
5
not preclude a Rule 12(c) motion.
6
The Court declines to convert the motion into one for summary judgment. Conversion to
7
summary judgment is generally not appropriate when, as here, only the nonmoving party has
8
introduced evidentiary exhibits in response to a motion for judgment on the pleadings. See Two-
9
Way Media Ltd., 2016 WL 4373698 at *4. Only Plaintiff, the nonmovant, has introduced
evidence not subject to judicial notice. Furthermore, conversion is only appropriate where a party
11
United States District Court
Northern District of California
10
has notice. See James, 2013 WL 132492 at *2. Here, Defendants did not have notice of
12
conversion. At a joint conference, the Court instructed Defendants to file a joint motion for
13
judgment on the pleadings. Plaintiff neither objected to this nor indicated it intended to convert
14
the motion into one for summary judgment. See Transcript of Proceedings, Dkt. 133 (parties only
15
discussed a Rule 12(c) motion with the Court). Reneging on this discussion and converting the
16
motion into one for summary judgment would produce waste—the Court would have wasted its
17
time in discussing a Rule 12(c) motion with the Parties and Defendants would have wasted their
18
time preparing Rule 12(c) briefing. See Reply at 15 n.11.
19
Plaintiff’s timeliness argument is unconvincing. The fact that these cases have been
20
pending for nearly six years is obviated by the multiple IPRs and Federal Circuit appeals. Indeed,
21
once these IPRs and appeals concluded, Defendants immediately filed their Rule 12(c) motion.
22
See Richter, 2018 WL 6728515 at *6. Given this timeline and the fact that no trial date is set, the
23
motion was filed “early enough not to delay trial.” Fed. R. Civ. P. 12(C). The motion is thus
24
timely. The Court thus fails to see how Rule 12(c) is being “tactically used” when Defendants
25
brought the motion at the earliest opportunity.
26
27
28
Finally, to the extent factual disputes exist, neither the summary judgment nor motion for
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
11
1
judgment on the pleadings standard allow this Court to find for Defendants. Accordingly,
2
Plaintiff’s request for conversion is DENIED and Dr. Russ’s declaration will not be used.
3
III.
DISCUSSION
4
Patent eligibility under 35 U.S.C. § 101 is a question of law that may contain underlying
5
issues of fact. OIP Techs., Inc. v. Amazon.com, Inc., 788 F.3d 1359, 1362 (Fed. Cir. 2015); see
6
also Interval Licensing LLC v. AOL, Inc., 896 F.3d 1335, 1342 (Fed. Cir. 2018). Hence, when the
7
“basic character of the claimed subject matter is readily ascertainable from the face of the patent,”
8
courts may determine patent eligibility at the motion for judgment on the pleadings stage. See
9
Internet Patents Corp. v. Gen. Auto. Ins. Servs., Inc., 29 F. Supp. 3d 1264, 1268 (N.D. Cal. 2013).
10
Under 35 U.S.C. § 101, the scope of patentable subject matter includes “any new and
United States District Court
Northern District of California
11
useful process, machine, manufacture, or composition of matter, or any new and useful
12
improvement thereof.” The Supreme Court has “long held that this provision contains an
13
important implicit exception: Laws of nature, natural phenomena, and abstract ideas are not
14
patentable.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. 208, 216 (2014) (quotation marks
15
and citation omitted). These three exceptions are “the basic tools of scientific and technological
16
work” and monopolization of these tools “might tend to impede innovation more than it would
17
tend to promote it, thereby thwarting the primary object of the patent laws.” Id. (quotation marks
18
and citation omitted).
19
In three recent cases, the Supreme Court has established a legal framework for determining
20
if an exception applies. See Bilski v. Kappos, 561 U.S. 593 (2010); Mayo Collaborative Servs. v.
21
Prometheus Laboratories, Inc., 566 U.S. 66 (2012); Alice Corp., 573 U.S. 208. As elaborated in
22
Alice, the § 101 eligibility inquiry proceeds in two steps. Alice Corp., 573 U.S. at 217–18. First,
23
the court determines whether the patent(s) at issue are directed to an abstract idea, law of nature,
24
or natural phenomenon. Id. at 217. If the court determines the patent(s) do not cover an excepted
25
subject matter, the inquiry ends. Id. If, however, the patent(s) do focus on one of these categories,
26
the court proceeds to the second step, where it determines if “the elements of each claim both
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
12
1
individually and ‘as an ordered combination’ . . . ‘transform the nature of the claim’ into a patent-
2
eligible application.” Id. (quoting Mayo Collaborative Servs., 566 U.S. at 78). If the claims fail to
3
provide this “inventive concept,” the patent is ineligible. Id. at 217–18.
4
Accordingly, the Court must first decide whether the three True Name patents at issue
5
cover an excepted subject-matter, i.e. an abstract concept, and, if yes, whether an “inventive
6
concept” exists.
7
8
9
A. Alice/Mayo Step One
1. Foundational Background
At step one of the Alice framework, the Court “look[s] at the focus of the claimed advance
over the prior art to determine if the claim’s character as a whole is directed to excluded subject
11
United States District Court
Northern District of California
10
matter.” Affinity Labs of Tex., LLC v. DIRECTV, LLC, 838 F.3d 1253, 1257 (Fed. Cir. 2016).
12
Courts must be careful not to overgeneralize claims otherwise “all inventions can be reduced to
13
underlying principles of nature.” Diamond v. Diehr, 450 U.S. 175, 189 n.12 (1981). On the other
14
hand, the judicial inquiry should root out “creative drafting efforts” designed to “monopolize” the
15
abstract idea. See Alice, 573 U.S. at 221. “In cases involving software innovations, this inquiry
16
often turns on whether the claims focus on ‘the specific asserted improvement in computer
17
capabilities . . . or, instead, on a process that qualifies as an abstract idea for which computers are
18
invoked merely as a tool.’” Finjan, Inc. v. Blue Coat System, Inc., 879 F.3d 1299, 1303 (Fed. Cir.
19
2018) (quoting Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335–36 (Fed. Cir. 2016)).
20
Merely stating an “improved result” to an otherwise abstract idea is insufficient; the patent must
21
recite a “specific means or method that solves a problem in an existing technological process.”
22
Koninkliijke KPN N.V. v. Gemalto M2M GmbH, 942 F.3d 1143, 1150 (Fed. Cir. 2019).
23
Accordingly, the relevant inquiry is what problem the patent claims to solve and whether the
24
patent specifically asserts a method to make improvements.
25
26
27
28
Four recent Federal Circuit cases, which Plaintiff relies on, illustrate the Alice step one
inquiry. In Enfish, the court held that a software patent covering a “self-referential database” did
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
13
1
not constitute an abstract idea. 822 F.3d at 1337–38. There, unlike the prior model of “relational
2
databases,” which generated multiple and separate data-tables for each entity, the plaintiff’s
3
patents claimed a self-referential model that allowed all of the information in a database to be
4
contained and displayed in a single table. Id. at 1330, 1337. Thus, the patents sought to improve a
5
concrete software-specific inefficiency that had existed in referential databases. This made the
6
patents different from cases like Alice where a patent-holder simply wanted to add conventional
7
computer components to well-known business practices. Id. at 1338. Because the self-referential
8
table was a specific type of data structure distinct from the abstract idea of improving the way a
9
computer stores and retrieves data in memory, the patent was not so sweeping that “generalpurpose computer components” could be added “post-hoc to a fundamental economic practice or
11
United States District Court
Northern District of California
10
mathematical equation.” Id. at 1339; cf. Alice, 573 U.S. at 221 (noting that the judicial inquiry
12
should root out creative drafting designed to monopolize an abstract idea).
13
In McRO, Inc. v. Bandai Namco Games America, Inc., the court held that the patent was
14
not abstract because the claims were limited to rules with specific characteristics. 837 F.3d 1299,
15
1313 (Fed. Cir. 2016). There, the patent at issue claimed a method of using a computer to
16
automate conventional activity. Specifically, the patent covered a method of accurately and
17
realistically syncing lip and facial expressions in animated characters. Id.at 1314. Previously, this
18
could only be produced by human animators. Id. It did this through an “ordered combination of
19
claimed steps, using unconventional rules that relate subsequences of phonemes, timings, and
20
morph weight sets.” Id. at 1302–03. The court focused its analysis on the specific rules claimed
21
in the patent—as in Enfish, the claimed process used a combined order of specific rules to resolve
22
a specific ineffiency, thereby obviating the fear that the patent covered an “entire abstract idea”
23
and could preempt all innovation in the field. See id. at 1314–15 (noting patent’s rules ensured
24
“future alternative discoveries were not foreclosed”).
25
In Finjan, the court held the patent was not abstract because the patent addressed a
26
software-based innovation prescribed by specific steps. 879 F.3d at 1303–06. There, the patent at
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
14
issue was directed to a method of providing computer security by scanning a downloadable
2
program and attaching results of that scan to the downloadable in the form of a “security profile.”
3
Id. at 1303. This operation is distinguished from traditional, “code-matching” virus scans that are
4
limited to recognizing the presence of previously-identified viruses. Id. at 1304. The claimed
5
method thus “constitute[d] an improvement in computer functionality.” Id. Much like in Enfish,
6
the virus improvement constituted a “non-abstract improvement to computer technology” because
7
it addressed a specific inefficiency, namely it “employ[ed] a new kind of file that enable[d] a
8
computer security system to do things it could not do before.” Id. at 1305. And, much like
9
McRO, the claims recited specific steps and thus claimed more than “a mere result.” Id.; see also
10
Koninkliijke KPN N.V v. Gemalto M2M GmbH., 942 F.3d 1143, 1150 (Fed. Cir. 2019) (holding,
11
United States District Court
Northern District of California
1
like in Finjan, claimed invention not abstract because it “employ[ed] a new way of generating
12
check data” (emphasis added)).
13
Contrast these cases with In re TLI Communications LLC Patent Litigation, 823 F.3d 607
14
(Fed. Cir. 2016). There, the patent at issue related to an “apparatus for recording of a digital
15
image, communicating the digital image from the recording device to a storage device, and []
16
administering the digital image in the storage device.” Id. at 609. The claims were directed to
17
storing and organizing digital photos. Id. The court determined that the patent covered an abstract
18
idea because it did not claim any new technology or use of such technology. Id. at 612. Instead, it
19
“describe[d] the system and methods in purely functional terms” and failed to provide “any
20
technical details for the tangible components.” Id. The claims were “simply directed to the
21
abstract idea of classifying and storing digital images in an organized manner.” Id. at 613. Thus,
22
the patent, unlike the aforementioned cases, was abstract because the patent covered the
23
conventional application of known ideas. Indeed, the patent failed to describe any type of method
24
for improving software functionality or solving a specific technological problem. Id. at 613.
25
These cases stand for four principles: first, when claims recite purely functional language
26
and use conventional technology in a typical manner, the claims are not patent eligible. See Elec.
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
15
1
Power Grp., LLC v. Alstom S.A.,830 F.3d 1350, 1356 (Fed. Cir. 2016) (affirming district court’s
2
holding that patent was abstract because claims only focused on the combination of “abstract-idea
3
processes” without adding any “particular assertedly inventive technology” or processes). Second,
4
and relatedly, claims that merely recite steps people go through in their minds, or by mathematical
5
algorithms, without more, are abstract mental processes. See TLI, 823 F.3d at 613 (holding that
6
claims were abstract because they simply recited the abstract ideas of “classifying and storing
7
digital images in an organized manner”). Third, as Finjan and Enfish show, eligibility requires
8
some fixed subject-matter with fixed parameters. See Finjan, 879 F.3d at 1305–06 (holding patent
9
was not abstract because it claimed a specific way to accomplish specific result). Finally, a result,
even if innovative, is not patentable. Id. at 1305 (collecting cases). Only the specific steps that
11
United States District Court
Northern District of California
10
accomplish an innovative result are patentable. Id. These four principles reaffirm that preemption
12
is at the heart of the Mayo/Alice analysis. By constraining patentability, courts aim to balance
13
innovation and monopolization.
14
Accordingly, at step one, the inquiry must be: what a patent is “directed to?” This ensures
15
that the patent seeks to resolve a specific problem through specific means, thus ensuring the field
16
is not completely occupied and creativity is not preempted.
17
18
2. The ’380, ’280, and ’662 Patents Are Directed to an Abstract Idea
The claims in the True Name patents at issue are directed to:
19
1. ’310 patent: using a known, content-based identifier to control access to data.
20
2. ’280 patent: retrieving and delivering copies of data items across a network of servers.
21
3. ’662 patent: identifying copies of identical data items in a network of servers based on the
22
data’s unique content-based identifier and deleting one of the duplicate data copies.
23
The Parties do not dispute this. See Opp. at 14, 24. Hence, the True Name patents,
24
broadly construed, focus on the idea of using content-based identifiers to manage data in a
25
computer system.
26
27
28
Even accepting this, Plaintiff argues that the True Name patents are not abstract. First,
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
16
1
Plaintiff contends the claims are not abstract because “[n]othing like this existed at the time.”
2
Opp. at 14. Alternatively, Plaintiff contends the patents cover a specific improvement in data-
3
management, namely a method that identifies any variable sequence of bits within a network,
4
based on the data file’s content, to more efficiently locate, access, and de-duplicate data in a
5
network . Id. Finally, Plaintiff argues the claims do not simply recite a desired result, they
6
“explain how [it] is done.” Id. at 15.
7
The Court disagrees with Plaintiff’s assessment. The three patents are all directed to the
same abstract three-step process: (1) using a content-based identifier generated from a “hash or
9
message digest function,” (2) comparing that content-based identifier against something else, i.e.
10
another content-based identifier or a request for data; and (3) providing access to, denying access
11
United States District Court
Northern District of California
8
to, or deleting data. Collection, comparison, and access to information are abstract concepts. See
12
Elec. Power Grp., 820 F.3d at 1353–54; see also Content Extraction & Transmission LLC v. Wells
13
Fargo Bank, Nat’l Ass’n, 776 F.3d 1343, 1347 (Fed. Cir. 2014) (holding claims ineligible under
14
Section 101 because they were drawn to abstract and well-known ideas of “1) collecting data, 2)
15
recognizing certain data within the collected data set, and 3) storing that recognized data in a
16
memory”). As Enfish, Finjan, and McRO, show above, fundamental concepts may not be
17
claimed; only the steps which go beyond the abstract concept are patent eligible.
18
Here, the patents claim the fundamental concept itself—they claim a method of accessing,
19
storing, and deleting data in a multi-computer network system. And, the patents are not aimed at
20
addressing a specific problem within data-management. Rather, they are aimed at generally
21
making data-management more efficient. As an example, in Enfish the Federal Circuit held that
22
the claim at issue was patentable under Section 101 because it focused on a specific
23
improvement—the self-referential table—that helped computers better store and retrieve data.
24
Enfish, 822 F.3d at 1335. The patent thus did not cover general data storage improvements; it
25
covered the specific method claimed to create a self-referential table. This helped ensure the
26
entire field of data storage and retrieval was not preempted, therefore maintaining the balance
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
17
1
between monopolization and innovation.
Likewise, in KPN, the Federal Circuit held that the asserted claims were patent eligible
2
3
because they were focused on clear, specific improvements to existing computer functions. 942
4
F.3d at 1153. There, the claimed invention was a system to “check data” to ensure that there were
5
not “systematic errors” with data transmission. Id. at 1145. The patent proposed adding
6
variability to the calculation of the check data by switching around bits in the data block or using
7
different algorithms. Id. at 1146. This, the court determined, was patentable because the patent
8
claimed only the specific steps of using a new “check data” system and thus only sought to solve a
9
specific problem within the check-data field. Id. at 1153. Hence, the patent was not directed at
10
data processing and transmission generally.
At step one, the Court broadly construes a patent’s purpose and asks what problem does
United States District Court
Northern District of California
11
12
the patent seek to resolve? Using broad brushes, a commonality can be gleaned from each patent
13
discussed in the aforementioned cases. In each case, the patent-holder patented a new and specific
14
method to resolve a problem. For example: (1) in Enfish, a new type of table was claimed; (2) In
15
KPN, a new “check data” method was claimed; (3) in McRO, a new way to sync an anima
16
character’s facial expressions and speech was claimed; and (4) in Finjan, a new file-scanning
17
system was claimed. In contrast, here, no “new” system is claimed. The patents are generally
18
aimed at making data-storage in multi-computer networks easier and more efficient. Unlike
19
Enfish, McRO, KPN, and Finjan, the True Name patents do not claim a “new way” of storing,
20
accessing, or naming files. Indeed, the True Name patents cannot, and do not, claim the process
21
for generating a data-based identifier.5 Rather, they claim the process of “applying” such
22
identifiers to perform “particularly-recited data management operations.” Opp. at 15. But,
23
claiming the “application” of a well-known hashing technique to the abstract concept of data
24
management does not render the idea non-abstract. See Bilski, 561 U.S. at 612 (“[L]imiting an
25
abstract idea to one field of use or adding token postsolution components [does] not make the
26
27
28
5
As noted above, this is prior art. See supra I.B.
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
18
1
concept unpatentable.”); see also Prism Techs. LLC v. T-Mobile USA, Inc., 696 F. App’x 1014,
2
1017 (Fed. Cir. 2017) (holding claims directed to “(1) receiving identity data from a device with a
3
request for access to resources; (2) confirming the authenticity of the identity data associated with
4
that device; (3) determining whether the device identified is authorized to access the resources
5
requested; and (4) if authorized, permitting access to the requested resources” abstract because
6
claimed abstract idea of “providing restricted access to resources”).
7
For instance, in Bridge & Post, Inc. v. Verizon Communications, Inc., the court held that
the claims “determining user information for a user” and “generating a user identifier from the
9
determined user information” were unpatentable. 319 F. Supp. 3d. 818, 822 (E.D. Va. 2018). The
10
disputed claims in Bridge & Post covered “swapping a changeable identifier with an unchangeable
11
United States District Court
Northern District of California
8
one” and using the identifier to implement targeted marketing. Id. at 824–25. But targeted
12
marketing and using “an unchangeable identifier” are abstract ideas. Id. at 825; see also Secured
13
Mail Sols. LLC v. Universal Wilde, Inc., 873 F.3d 905, 910 (Fed. Cir. 2017) (“There is no
14
description of how the unique identifier is generated . . . .”). Hence, applying abstract ideas to a
15
specific concept does not render them non-abstract. Bridge & Post, Inc., 319 F. Supp. 3d at 825.
16
Here, as in Bridge & Post, Plaintiff neither claims they invented the content-based
17
identifier nor that their invention is computer-specific. Indeed, Plaintiff cannot argue either of
18
these things—the content-based identifier is prior art and Plaintiff has sought to broadly enforce
19
the True Name patents. See supra I.B.; Mot. at 4 n.4. As shown in Defendants’ briefing, the True
20
Name patents have been asserted across a wide array of technologies like content-delivery
21
networks, peer-to-peer music swapping, cloud storage and web applications. Id. This confirms
22
that, broadly construed, the claims are directed at “generating, transmitting, receiving, and storing”
23
data and are not directed at improving computer functionality in some concrete way. See Visual
24
Memory LLC v. NVIDIA Corp., 867 F.3d 1253, 1258 (Fed. Cir. 2017) (“[W]e must . . . ask
25
whether the claims are directed to an improvement to computer functionality versus being directed
26
to an abstract idea.”). Therefore, the claims are directed to the “basic concept” of data
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
19
1
management, which is sufficient to fall under Alice step 1. See TLI, 823 F.3d at 613 (holding
2
claims directed to collecting data, recognizing certain data within the collected set, and storing the
3
recognized data in memory were a “well-established basic concept”).
4
Finally, the Court notes Defendants’ argument that Plaintiff is “computerizing” a
5
conventional process known in the art. Opp. at 15. Defendants argue that the concept claimed in
6
the True Name patents is derivative of other data-management systems like the Dewey Decimal
7
and Library of Congress Classification systems. Reply at 10. For example, librarians often locate
8
books based on a “call system” where they assign books unique identifiers based on call numbers,
9
which change dependent on a book’s volume, etc. Using a “master call list,” a librarian can
compare the call numbers to see if multiple copies of the same text exist and purge books
11
United States District Court
Northern District of California
10
accordingly. Hence, Defendants argue that the True Name patents cover this well-known concept,
12
except applied to computers. See OIP Techs., 788 F.3d at 1362–63 (limiting abstract ideas to a
13
particular environment does not make the claims less abstract in Alice step one).
14
In OpenTV, Inc. v. Apple, Inc., the court held that the patent was abstract because it could
15
not pass the “pen and paper test.” 2015 WL 1535328, at *4 (N.D. Cal. Apr. 6, 2015). There, one
16
could use a pen, paper, and her own brain to perform the claimed steps of the patent. Id. The fact
17
that the claims could be done without modern technology showed the patents were directed at
18
“abstract ideas.” Id. Failing the “pen and paper test” indicates that a patent applies to an abstract
19
concept, which means the patent-holder can monopolize entire fields of thought, thus hampering
20
innovation. Here, as in OpenTV, the problem of how to store, organize, and access data is not new
21
(see Dewey Decimal system). Hence, the purported solutions claimed in the True Name patents
22
are not a uniquely technological problem and thus do not create solutions to computer-centric
23
problems like the patents in Enfish, McRO, KPN, and Finjan. Accordingly, the Court holds the
24
three True Name patents abstract under Alice step 1 and proceeds to step 2.
25
26
27
28
B. Alice/Mayo Step Two
At step two, the court examines the elements of the claims, both individually and “as an
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
20
1
ordered combination” to determine if they contain an “inventive step” sufficient to “transform” the
2
claimed abstract idea into a patent-eligible application. Alice, 573 U.S. at 221 (citing Mayo, 556
3
U.S. at 78–79). Step two is satisfied when the claim limitations “involve more than performance
4
of ‘well-understood, routine, [and] conventional activities previously known to the industry.’”
5
Content Extraction, 778 F.3d at 1347–48 (quoting Alice, 573 U.S. at 225). “If a claim’s only
6
‘inventive concept’ is the application of an abstract idea using conventional and well-understood
7
techniques, the claim has not been transformed into a patent-eligible application of an abstract
8
idea.” BSG Tech LLC v. Buyseasons, Inc., 899 F.3d 1281, 1290–91 (Fed. Cir. 2018). After
9
identifying an ineligible concept at step one, the court asks at step two: “What else is there in the
10
claims?” Mayo, 566 U.S. at 78.
United States District Court
Northern District of California
11
The question of whether a claim element or combination is well-understood, routine, and
12
conventional to a skilled artisan in the relevant field is a question of fact and thus any fact that is
13
pertinent to the invalidity conclusion must be proven by clear and convincing evidence.
14
Berkheimer v. HP Inc., 881 F.3d 1360, 1368 (Fed. Cir. 2018). Notably, “[t]he mere fact that
15
something is disclosed in a piece of prior art . . . does not mean it was well-understood, routine,
16
and conventional.” Id. at 1369; but see Va. Innovation Scis. Inc. v. Amazon.com, Inc., 227 F.
17
Supp. 3d 582, 599 (E.D. Va. 2017) (“That is not to say that the §§ 102 and 103 analyses are
18
completely irrelevant to the eligibility question.”); Reply at 10–11 (arguing that PTAB decisions
19
invalidating claims based on novelty are persuasive); see also supra I.B. at 9 (discussing prior art).
20
The ’310 patent teaches the use of a “processor,” “network of servers,” data transfer, data
21
“comparison,” and data access/restriction, based on a data item’s “content-based digital identifier,”
22
which comprises a “message digest function or a hash function.” ’310 patent (claims 24, 32, 81,
23
82, and 86); see id. (claim 81) (discussing the use of a device comprising a “processor and
24
memory” in a network of computers and data comparison). The ’280 patent teaches the use
25
“requesting” a data file based on a network’s availability, which is determined by “measurement
26
of” either the server, the cost of a connection to the server, or the reliability of a connection to the
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
21
1
server, whereby data is delivered based on an “MD5 hash of the contents of a particular data file.”
2
’280 patent (claims 15, 16, 31, and 32); see id. (claim 31) (discussing a content delivery method
3
where files are distributed across a network of servers where the request and receipt of a data file
4
is based on the file’s MD5 hash). Finally, the ’662 patent teaches the use marking duplicate files
5
for deletion across a “plurality of servers” whereby location data, i.e. a data item’s unique content-
6
based identifier, is used to determine duplicate files. ’662 patent (claim 33).
7
Plaintiff argues that the Court cannot decide patent eligibility at this stage because a factual
8
dispute exists about what is routine and conventional in the art. Opp. at 20–21. Plaintiff further
9
argues that Defendants have not shown by clear and convincing evidence that a person of ordinary
skill in the art (“POSITA”) would have deemed the “ordered combinations” of elements in each
11
United States District Court
Northern District of California
10
claim to be “well-understood, routine, or conventional.” Id. at 21. Specifically, Plaintiff argues
12
that the specifications disclose numerous “improvements” over the prior art like: (1) ensuring a
13
system only stores one copy of any data item; (2) using data-identifiers to provide access to data
14
while simultaneously using the identifier to ensure only appropriate persons access the data file;
15
and (3) verifying that requested data is the correct data using only the data identifier. Opp. at 25–
16
27. This, Plaintiff’s argue, shows that the patents claim an inventive use of hash functions and
17
thus recite unconventional features that provide benefits over conventional prior art. Id. at 25
18
(citing Perricone v. Medicis Pharm. Corp., 432 F.3d 1368, 1378 (Fed. Cir. 2005) (“New uses of
19
old products or processes are indeed patentable subject matter.”)).
20
The Court disagrees with Plaintiff; the asserted claims fail to provide an inventive concept.
21
The relevant inquiry is “not whether the claimed invention as a whole is unconventional or non-
22
routine.” BSG, 899 F.3d at 1290. Rather, the court assesses “whether the claim limitations other
23
than the invention’s use of the ineligible concept to which it was directed were well-understood,
24
routine, and conventional.” Id. (emphasis added). No “inventive concept” exists when an abstract
25
idea is used in a conventional way. Id. at 1290–91.
26
27
28
A “hash identifier” uses extracted data to identify a specific data-file—it is a “generic and
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
22
1
routine concept that does not transform the claims to a patent eligible application of the abstract
2
idea.” Smart Sys. Innovations, LLC v. Chi. Transit Auth., 873 F.3d 1364, 1375 n.9 (Fed. Cir.
3
2017). Concepts like “comparing,” “restricting access,” and “de-duplicating” data are well-known
4
and conventional functions of computers and data-management systems, as are “processors” and
5
“computer networks.” See, e.g., Alice, 573 U.S. at 226 (“But what petitioner characterizes as
6
specific hardware—a ‘data processing system’ with a ‘communications controller’ and ‘data
7
storage unit,’ . . . is purely functional and generic. Nearly every computer will include a
8
‘communications controller’ and ‘data storage unit’ capable of performing the basic calculation,
9
storage, and transmission functions.”); Mortg. Grader, Inc. v. First Choice Loan Servs. Inc., 811
F.3d 1314, 1324–25 (Fed. Cir. 2016) (holding generic computer components like “interface,”
11
United States District Court
Northern District of California
10
“network,” and “database” do not satisfy the inventive concept requirement); buySAFE, Inc. v.
12
Google, Inc., 765 F.3d 1350, 1355 (Fed. Cir. 2014) (“That a computer receives and sends the
13
information over a network—with no further specification—is not even arguably inventive.”);
14
TLI, 823 F.3d at 611, 614–15 (holding that when claims use functional language and conventional
15
technology, like a phone receiving data, extracting information from that data, and storing images,
16
claims are not patent eligible); Intellectual Ventures I LLC v. Capital One Bank (USA), 792 F.3d
17
1363, 1371 (Fed. Cir. 2015) (“Requiring the use of a ‘software’ ‘brain’ ‘tasked with tailoring
18
information and providing it to the user’ provides no additional limitation beyond applying an
19
abstract idea, restricted to the Internet, on a generic computer.”); see also SAP Am., Inc. v.
20
InvestPic, LLC, 898 F.3d 1161, 1163 (Fed. Cir. 2018) (“We may assume that the techniques
21
claimed are groundbreaking, innovative, or even brilliant, but that is not enough for eligibility.”
22
(quotation marks and citation omitted)).
23
There is, in short, nothing “inventive” about any claim details, individually or in
24
combination, that are not themselves abstract ideas. The claims are directed at “standard file
25
management” functions. ’310 (6:28). Using a generic hash function, a server system, or a
26
computer does not render these claims non-abstract; the claims are still directed to the abstract
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
23
1
ideas of receiving, storing, deleting, and controlling access to data. See BSG, 899 F.3d at 1290–
2
91. Hence, none of the hardware recited by the claims “offers a meaningful limitation beyond
3
generally linking ‘the use of the [method] to a particular technological environment.’” Alice, 573
4
U.S. at 226 (quoting Bilski, 561 U.S. at 610–11). Allowing the three True Name patents to survive
5
Section 101 would allow Plaintiff to monopolize the entire field of data-storage. Cf. id. at 226–27
6
(“The concept of patentable subject matter under § 101 is not like a nose of wax which may be
7
turned and twisted in any direction.” (quotation marks and citation omitted)). Accordingly,
8
because the asserted claims’ steps do nothing more than apply a well-known hashing concept to
9
data-storage, the ’310, ’280, and ’662 patents are directed to patent-ineligible subject matter and
10
United States District Court
Northern District of California
11
12
fail under Section 101.
IV.
CONCLUSION
For the foregoing reasons, the Court GRANTS Defendants’ motion for judgment on the
13
pleadings and holds the ’310, ’280, and ’662 patents invalid for failure to satisfy 35 U.S.C. § 101.
14
Since this is a legal issue and amendment would be futile, leave to amend would be denied. In any
15
event, such leave was not requested. The Clerk shall close the file and a judgment in favor of
16
Defendants shall follow.
17
18
19
20
IT IS SO ORDERED.
Dated: January 31, 2020
______________________________________
EDWARD J. DAVILA
United States District Judge
21
22
23
24
25
26
27
28
Case No.: 5:13-cv-01317-EJD
AMENDED ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE
PLEADINGS
24
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?