West View Research, LLC v. Bayerische Motoren Werke AG et al
Filing
105
ORDER On 89 Motion for Judgment on the Pleadings. It is ordered after having considered the submissions of the parties and based on the language of the asserted claims and the specification common to the patents at issue, the Court finds that the asserted claims of U.S. Patent No. 8,301,456 and US. Patent No. 8,311,834 are not drawn to patent-eligible subject matter under 35 U.S.C. §101 and are invalid. BMW's motion for judgment on the pleadings is therefore granted. Signed by Judge Cathy Ann Bencivengo on 12/30/2016. (dxj)
1
2
3
4
5
6
7
8
UNITED STATES DISTRICT COURT
9
10
11
SOUTHERN DISTRICT OF CALIFORNIA
WEST VIEW RESEARCH, LLC, a
California corporation,
Plaintiff,
12
13
14
15
16
17
18
19
v.
BAYERISCHE MOTOREN WERKE
AG, a German corporation;
BMW OF NORTH AMERICA, LLC,
a Delaware corporation; and BMW
MANUFACTURING CO., LLC, a
Delaware corporation,
Defendants.
Case No.: 14-CV-2670-CAB (WVG)
ORDER ON MOTION FOR
JUDGMENT ON THE
PLEADINGS
[Doc. No. 89]
And Related Counterclaim(s).
20
21
Before the Court is the motion for judgment on the pleadings filed by Bayerische
22
Motoren Werke AG, BMW of North America, LLC and BMW Manufacturing Co., LLC,
23
(collectively, “BMW”). [Doc. No. 89.] BMW argues that United States Patent Nos.
24
8,301,456 and 8,311,834, which Plaintiff West View Research, LLC (“West View”) asserts
25
against BMW, are invalid because they are not directed to patentable subject matter under
26
35 U.S.C. §101. West View opposed the motion. [Doc. No. 90.] For the reasons set forth
27
below, the motion is GRANTED.
28
1
14cv2670
1
I.
2
The ‘456 patent is titled “Electronic Information Access System and Methods.”
3
[Doc. No. 89-1 at 5-44.]1 The ‘834 patent is titled “Computerized Information Selection
4
and Download Apparatus and Methods.” [Doc. No. 89-1 at 46-86.] Both patents are
5
continuations of United States Patent No. 6,615,175 for a “‘Smart’ Elevator System and
6
Method.” The common specification discloses a system and subsystems utilizing computer
7
hardware, software and other peripherals to provide information to occupants in an elevator
8
or users of other “personnel transport devices,” such as moving walkways or shuttles.
9
Among the many sub-systems described in the specification is a system designed to
10
identify authorized users and provide them with access or information personalized to the
11
identified user.2
Background
12
The continuation claims of the ‘456 and the ‘834 patents, filed some 13 years after
13
the original parent application, relate to the disclosed user identification subsystem. The
14
asserted claims are directed at an information system that uses electromagnetic energy to
15
identify whether one is an authorized user of the information system. Then, if the system
16
determines that the person is authorized to access information, the system is configured to
17
communicate information, perhaps tailored or specific to the person, to a personal
18
electronic device of the authorized user.3
19
Claim 1 of the ‘456 patent reads:
20
1. An information system associated with a transport apparatus, the transport
apparatus configured to move from one location to another, the access to
information of said information system being authorized for only one or more
certain persons, the system comprising:
an antenna adapted to receive electromagnetic energy, said
electromagnetic energy encoding first data associated with at least one
person; and
21
22
23
24
25
26
1
Page cites to docket references are to the CM/ECF assigned page numbers.
The portions of the common specification discussed herein are referenced to the column and line
locations in the ‘456 patent. [Doc. No. 89-1 at 39-40, Col. 17:46-20:6.]
3
The asserted Claims of the ‘456 patent are independent Claim 1 and its dependent claims 2, 4, 6, 7, 8
and 17.
2
27
28
2
14cv2670
1
processing apparatus in signal communication with said antenna, said
processing apparatus configured to:
access a first database containing second data relating to said one or
more certain persons;
analyze at least portions of said first data and said second data to
determine if said at least one person is authorized to access said
information; and
if said at least one person is authorized access, facilitate download of
said information to a personal electronic device (PED) of said at
least one person.
2
3
4
5
6
7
8
[Doc. No. 89-1 at 42, Col. 24:38-55.] The asserted dependent claims add these limitations:
9
2. The system of claim 1, wherein the processing apparatus is further
configured to enable data communication with the PED before said download
occurs.
4. The system of claim 1, further comprising an interrogator apparatus
configured to elicit transmission of said electromagnetic energy from a radio
frequency device associated with the at least one person.
6. The system of claim 1, wherein the information comprises information
specifically tailored for the at least one person based on more prior preferences
or selections of the at least one person.
7. The system of claim 1, wherein the information comprises information
specific to the at least one person.
8. The system of claim 1, wherein the antenna is configured for short-range
radio frequency communications with a corresponding radio frequency device
of said at least one person.
17. The system of claim 1, where in the system is further configured to retain
a record of said access by said at least one person.
10
11
12
13
14
15
16
17
18
19
20
21
[Doc. No. 89-1 at 42-43, Col. 24:56-25:34.]
West View asserts four independent claims of the ‘834 patent.4 Claim 36 and its
22
23
dependent claims are representative:
36. A method of providing information to a user of a portable electronic
apparatus, the method comprising:
24
25
26
27
28
The asserted Claims of the ‘834 patent are independent Claim 1 and its dependent claim 4, independent
claim 36 and its dependent claim 39, independent claim 52 and its dependent claim 54, and independent
claim 66.
4
3
14cv2670
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
receiving, via a wireless link, data specifically identifying a wireless
device, the device associated with a user of the portable electronic
apparatus;
based at least in part on the data, identifying at least one information profile
associated to that user; and
causing provision of information configured according to the at least one
profile to the portable electronic apparatus via a data interface;
wherein said data is part of a radio frequency (RF) signal emitted at a
particular frequency when proper authentication of an interrogation
apparatus by said wireless device occurs.
37. The method of claim 36, wherein said wireless device comprises a short
range radio frequency identification (RFID) device, and the data interface
comprises a data interface operating according to a communication protocol
different than that of the RFID device.
38. The method of claim 37, wherein the portable electronic apparatus
comprises application software resident thereon, the software configured to
receive the provided information and store it within the storage device of the
portable electronic apparatus.
39. The method of claim 38, wherein the act of causing provision comprises
causing provision of information relevant and useful to the user, the
information relevant and useful to the user having been previously selected by
the user.
[Doc. No. 89-1 at 85, Col. 27:49-28:9.]
18
West View asserts that these claimed systems/methods are an advancement to a
19
computer-specific technology problem, specifically an improvement in the operation or
20
functionality of the computer system to prevent electronic fraud, such as “spoofing” or
21
“man-in-the-middle (MITM) attacks” in wireless interface systems. [Doc. No. 90 at 6-7.]
22
According to West View these problems are addressed by the patents through “various
23
mechanisms, including (i) use of a short-range wireless protocol (so as to mitigate
24
interception); (ii) use of e.g., reader authentication; and (iii) optional use of encrypted
25
data.” [Id. at 7, emphasis in the original.]
26
BMW argues that the claims of these continuation patents are directed at an
27
abstraction: retrieving data associated with a user and providing relevant information to
28
that user in return. Further, according to BMW: (1) the asserted claims provide no element
4
14cv2670
1
or combination of elements that is significantly more than a patent on that abstraction; (2)
2
the asserted claims are not new solutions to fraud prevention in wireless interface systems;
3
(3) the asserted claims do not include limitations of encrypted data protocols, or disclose
4
any new or improved system or method of doing so;5 and (4) the asserted claims do not
5
recite improvements in the technological function of an RFID tag or advancement in
6
encoding technology, but employ existing systems and methods in conventional ways.
7
II.
8
Ninth Circuit procedural law for Rule 12(c) motions applies here. Imation Corp. v.
9
Koninklijke Philips Electronics N.V., 586 F.3d 980, 984 (Fed. Cir. 2009) (“In reviewing a
10
grant of judgment on the pleadings, this court applies the procedural law of the regional
11
circuit.”). In the Ninth Circuit, a “motion for judgment on the pleadings faces the same
12
test as a motion under Rule 12(b)(6).” McGlinchy v. Shell Chem. Co., 845 F.2d 802, 810
13
(9th Cir. 1988). The standard under Rule 12(b) is a familiar one, and there is no need to
14
address it at length here. In short, “[t]o survive a motion to dismiss, a complaint must
15
contain sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible
16
on its face.’” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atlantic Corp. v.
17
Twombly, 550 U.S. 544, 570 (2007)); see also Cafasso, U.S. ex rel. v. Gen. Dynamics C4
18
Sys., Inc., 637 F.3d 1047, 1055 (9th Cir. 2011) (holding that the Iqbal standard applies to
19
Rule 12(c) motions).
Legal Standard Under Rule 12(c)
20
III.
21
Section 101 defines the subject matter eligible for patent protection as: “any new and
22
useful process, machine, manufacture, or composition of matter, or any new and useful
23
improvement thereof.” 35 U.S.C. § 101. The Supreme Court has clarified that Section 101
24
“contains an important implicit exception: Laws of nature, natural phenomena, and
35 U.S.C. § 101
25
26
27
28
5
Even if a security protocol limitation was included as an element of any of the asserted claims, the
specification does not teach any advancement in the utilization of security protocols. Rather the
specification discloses that “the use of passwords, encrypted data protocols and spread spectrum
techniques for security is well known in the art, and accordingly will not be described further herein.”
[Doc. No. 89-1 at 39, Col. 18:14-17.]
5
14cv2670
1
abstract ideas are not patentable.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 134 S.Ct. 2347,
2
2354 (2014); see also Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S.Ct.
3
1289, 1293 (2012) (“Phenomena of nature, though just discovered, mental processes, and
4
abstract intellectual concepts are not patentable, as they are the basic tools of scientific and
5
technological work.”) (quoting Gottschalk v. Benson, 409 U.S. 63, 67 (1972)). However,
6
“an invention is not rendered ineligible for patent simply because it involves an abstract
7
concept.” Alice, 134 S.Ct. at 2354. Rather, “applications of such concepts to a new and
8
useful end . . . remain eligible for patent protection.” Id. (internal quotations and brackets
9
omitted). “Accordingly, in applying the § 101 exception, [the court] must distinguish
10
between patents that claim the building blocks of human ingenuity and those that integrate
11
the building blocks into something more, thereby transforming them into a patent-eligible
12
invention.” Id. (internal quotations, citations, and brackets omitted); see also Potter Voice
13
Tech., LLC v. Apple Inc., No. C 13-1710 CW, 2015 WL 5672598, at *2 (N.D. Cal. Jun. 11,
14
2015) (same).
15
“The issue of invalidity under Section 101 presents a question of law.” OpenTV,
16
Inc. v. Apple, Inc., No. 14-cv-1622-HSG, 2015 WL 1535328, at *2 (N.D. Cal. Apr. 6,
17
2015). The analysis of whether a patent falls within the exceptions to Section 101 is a two-
18
step process. In the first step, the Court must “determine whether the claims at issue are
19
directed to a patent-ineligible concept.” Alice, 134 S.Ct. at 2355; see also DDR Holdings,
20
LLC v. Hotels.com, L.P., 773 F.3d 1245, 1255 (Fed. Cir. 2014). With regard to computer-
21
related technology, this inquiry concerns whether the claims focus on the specific asserted
22
improvement in computer capabilities (in this case West View contends an improvement
23
in electronic fraud prevention in wireless systems) or, instead, on a process that qualifies
24
as an abstract idea for which computers are invoked merely as a tool. Enfish, LLC v.
25
Microsoft Corp., 822 F.3d 1327, 1335-36 (Fed. Cir. 2016). In some cases involving
26
computer-related claims, there “may be close calls about how to characterize what the
27
claims are directed to,” in which case, “an analysis of whether there are arguably concrete
28
improvements in the recited computer technology could take place under step two.” Id. at
6
14cv2670
1
1339; see also Elec. Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1353 (Fed. Cir. 2016)
2
(“[T]he two stages involve overlapping scrutiny of the content of the claims … [and] there
3
can be close questions about when the inquiry should proceed from the first stage to the
4
second”).
5
At step two, if the claims are directed to a patent-ineligible concept, the Court must
6
“consider the elements of each claim both individually and as an ordered combination to
7
determine whether the additional elements transform the nature of the claim into a patent-
8
eligible application.” Alice, 134 S.Ct. at 2355. This second step is also known as “a search
9
for an inventive concept—i.e., an element or combination of elements that is sufficient to
10
ensure that the patent in practice amounts to significantly more than a patent upon the
11
ineligible concept itself.” Id. (internal quotations and brackets omitted).
12
Although novelty, obviousness and enablement, under §102, §103 and §112 are
13
separate considerations from a §101 analysis, certain questions relevant to those
14
determinations overlap with the “search for an inventive concept.” For example: Do the
15
elements of the claim, individually or in combination, and viewed in the context of the
16
specification, disclose and teach advancements to the technology to solve the identified
17
problem? Or, do the claim elements merely use known procedures, or conventional steps,
18
specified at a high level of generality? See Market Track, LLC v. Efficient Collaborative
19
Retail Marketing, LLC, No. 14 C 4957, 2015 WL 3637740, *5 (N.D. Ill. June 12, 2015)
20
citing Content Extraction & Transmission, LLC v. Wells Fargo Bank, Nat’l. Ass’n, 776
21
F.3d 1343, 1347-48 (Fed. Cir. 2014) (discounting “well-known” or long-practiced
22
procedures and finding no “inventive concept” in claims that “merely recite the use of []
23
existing . . . technology”).
24
25
26
IV.
Analysis
A. Abstract Ideas
BMW argues that the claims at issue here are invalid under Section 101 because they
27
are patent-ineligible abstract ideas.
“The “abstract ideas” category embodies the
28
longstanding rule that an idea of itself is not patentable.” Alice Corp., 134 S.Ct. at 2355
7
14cv2670
1
(internal quotations and brackets omitted). “The Federal Circuit has characterized an
2
abstraction as ‘an idea, having no particular concrete or tangible form.’” Potter Voice
3
Tech., 2015 WL 5672598, at *2 (quoting Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709,
4
714 (Fed. Cir. 2014)).
5
The ‘456 patent simply describes the invention as an electronic information access
6
system and associated methods. [Doc. No. 89-1 at 5.] The ‘834 patent describes the
7
invention as methods and apparatus for providing information useful to a particular user of
8
a computerized apparatus. [Doc. No. 89-1 at 46.] The asserted claims are directed at
9
authenticating a user of the system and providing information to that user that is
10
downloaded to the user’s personal electronic device. The claims broadly recite a system
11
employing a wireless device that uses electromagnetic energy as an identifying signal sent
12
to an interrogating receiver, which upon identifying the signal, accesses and provides
13
information associated with the identified user, which is communicated to the user’s
14
portable electronic device.
15
The claim language is result-oriented and functional—requesting a signal from a
16
wireless device; receiving, analyzing and authenticating the response signal; and thereafter
17
providing access to information customized to the user and transmitting that information
18
to that user to be communicated/downloaded to the user’s personal electronic device. The
19
physical components of the claims, such as an antenna or interrogator apparatus, a radio
20
frequency device, a processing apparatus, a personal electronic device are generic
21
descriptions of well-known components used to carry out this abstract function. See
22
Affinity Labs of Texas, LLC v. Amazon.com Inc., 838 F.3d 1266, 1270 (Fed. Cir. 2016)
23
(affirming invalidity under § 101 of claims that set forth routine and generic capabilities of
24
computers that the patentee did not invent, and at a level generality known in the art as of
25
the priority date of the patent).
26
West View describes the asserted claims as inventions that improve the operation or
27
functionality of a computer by “preventing it from being ‘spoofed’ or subjected to MITM
28
attacks and improv[ing] technology in the field of wireless information provision or
8
14cv2670
1
commerce by enabling secure transactions and preventing release of a user’s sensitive data
2
to a malicious third party.” [Doc. No. 90 at 7.] Although this description implies inventions
3
that introduce advancements to computer technology addressing a problem specifically
4
arising in the realm of computer networks, it is a fiction. There is nothing in the
5
specification to support this representation that the inventions provide new and improved
6
systems, protocols or methods of securing wireless transactions from interception by
7
unauthorized users. Rather the claims recite known RFID tag and reader systems used to
8
provide authentication of system users for access to information.
9
The asserted claims are directed at identifying an authorized user and providing
10
information to that user. The concept of identifying a system user and then delivering user-
11
specific content to that user’s portable electronic device is an abstract idea.
12
B. Inventive Concept
13
Having determined that the claims at issue are directed at abstract ideas, the next
14
step is to “examine the elements of the claim to determine whether it contains an ‘inventive
15
concept’ sufficient to ‘transform’ the claimed abstract idea into a patent-eligible
16
application.” Alice Corp., 134 S.Ct. at 2357 (internal quotations omitted.) An abstract
17
process could be directed to a patent-eligible subject if it discloses a specific improvement
18
in computer performance designed to implement the process. See McRO, Inc. v. Bandai
19
Namco Games Am. Inc., 837 F.3d 1299, 1314 (Fed. Cir. 2016). However, “the mere
20
recitation of a generic computer cannot transform a patent-ineligible abstract idea into a
21
patent-eligible invention.” Alice Corp., 134 S.Ct. at 2358; see also DDR Holdings, 773
22
F.3d at 1256 (“[A]fter Alice, there can remain no doubt: recitation of generic computer
23
limitations does not make an otherwise ineligible claim patent-eligible.”).
24
West View emphasizes that the patents claim systems or methods that are an
25
advancement to a computer-specific technology problem, specifically an improvement in
26
the operation or functionality of a wireless computer system to prevent electronic fraud.
27
West View identifies the following claim elements as the purported advancements to the
28
operation of the claimed information system introduced to frustrate interception by a third
9
14cv2670
1
party: (1) the use of a short-range wireless protocol; (2) the use of reader authentication;
2
and (3) the optional use of encrypted data.
3
The asserted claims broadly recite wireless devices to interrogate, receive and
4
transmit signals. When specified in a claim, the only identification and access system
5
disclosed in the patent consists of an RFID tag, a reader and an access database “of the type
6
well known in the art.” [Doc. No. 89-1 at 39, Col. 17:49-52.] Independent claim 66 of the
7
‘834 patent includes the limitation that the signal sent from the reader/interrogator to the
8
wireless device (i.e., the RFID tag) and the return signal from the wireless device are short-
9
range wireless transmissions.6 West View asserts that this limitation is an improvement
10
to the operation of the system intended to mitigate interception by third parties. There is
11
nothing in the patent, however, to suggest that West View introduced the use of short-range
12
wireless transmission to RF systems, let alone that West View did so as an advancement
13
intended to mitigate third party interception of the signals. The patent does not disclose
14
how such transmissions would operate if they are an innovation to the operation of RF
15
systems. The specification in fact makes no specific reference to the use of short-range
16
wireless transmission other than to state that the RFID interrogator/reader “has limited
17
range and is directional in nature such that it will not interfere with the readers of other
18
elevators cars nearby or other RF devices.” [Id., Col. 18:23-26.]
19
West View also asserts that the claims introduce the use of reader authentication to
20
the RF system to frustrate third party interception. However, the asserted claims of the
21
‘456 patent do not include as a limitation of the system that the RFID tag authenticate the
22
transmission from the interrogator before responding. Therefore, this limitation is not
23
claimed in the ‘456 patent as a purported advancement in an RF identification system. The
24
asserted method claims of the ‘834 patent do include the step of the wireless device (i.e.,
25
26
The only asserted independent claim of the ‘456 patent, claim 1, does not have a limitation that the
transmission be short-range. It appears in dependent claim 8 of that patent. The other asserted
independent claims of the ‘834 patent, claims 1, 36, and 52, also do not have this limitation, but it appears
in their dependent claims 4, 37 and 53, respectively.
6
27
28
10
14cv2670
1
RFID tag) evaluating or authenticating the signal from the interrogating device to
2
determine if it should respond. [Doc. No. 89-1 at 83-86, Col. 24:66-67; Col. 27:59-62; Col.
3
30:20-25.] The specification discusses this step of the RFID tag authenticating the tag
4
reader before it transmits a response signal as follows:
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
In one embodiment, the RFID tag of the present invention
authenticates the tag reader of the access sub-system such that
when the tag is interrogated by the reader …, an appropriate code
or password must be provided within the RF signal from the
reader for the tag to radiate its RF identification signal. In this
fashion, unauthorized access to the RF signature or emission of
the tag through use of an unauthorized reader are [sic] frustrated.
[Doc. No. 89-1 at 39, Col. 17:54-63.]
The language of the claims reciting this particular step is generic in its description
of the function. The RFID tag “evaluates” or “authenticates” the signal received from the
interrogator before responding. The specification describes the manner in which such
authentication is performed as providing an “appropriate code or password … within the
RF signal from the reader for the tag to [identify].” Nothing further is disclosed to explain
the operation of this step if such a step was indeed inventive. Nor is there any suggestion
that the implementation of this step is a concept introduced in these patents as a security
innovation for RF signal transmission systems.
To the contrary, the specification
represents that there are known methods of defeating this authentication process and
therefore suggests the optional implementation of encryption protocols to enhance security.
[Id., Col. 17:63-18:7.]
The last claim element West View identifies as an improvement in computer
functionality to solve the problem of electronic fraud in wireless systems is the disclosed
optional use of encrypted data in the RF signal transmission system. As noted supra, none
of the asserted claims include limitations of encrypted data protocols or include a step of
encrypting or decrypting data. Even if the Court construes claim language requiring the
step of authenticating a transmitted signal configured in a way to frustrate unauthorized
28
11
14cv2670
1
access [Doc. No. 89-1 at 86, Col 30:4-25] to implicate the use of encryption protocols,
2
there is no disclosure of any new or improved system or method of doing so. Instead, the
3
specification discloses that “the use of passwords, encrypted data protocols and spread
4
spectrum techniques for security is well known in the art, and accordingly will not be
5
described further herein.” [Doc. No. 89-1 at 39, Col. 18:14-17.]
6
West View does not identify anything else that might constitute an inventive
7
concept. The Court is not persuaded by West View’s contention that the claimed systems
8
and methods introduce a security advancement designed to protect the users of portable
9
electronic devices from having their communications intercepted or altered.
These
10
wireless communication issues – “spoofing and MITM attacks,” asserted by West View as
11
huge computer problems of today7 are not the technology problems identified in the
12
patents. Now a decade and a half after the specification supporting these claims was
13
initially filed, West View’s contention that these alleged problems were the motivation for
14
the conception of the claimed inventions is without foundation or even suggestion in the
15
specification.
16
West View’s argument blatantly jettisons any relationship to the actual field of the
17
invention stated in the specification: “the field of personnel transport apparatus, and
18
specifically elevators and similar devices for transporting people from one location to
19
another which incorporate various information technologies.” [Id., Col 1:37-42.] It ignores
20
the only problems identified in the patent as the issues to which these claims relate: the
21
goal of replacing magnetic striped cards and card readers, prone to wear and unauthorized
22
use, as a means of restricting elevator access to certain floors during certain time periods,
23
with RFID systems to “allow for automatic recognition of an individual in order to provide
24
25
26
As West View itself explains, “electronic ‘fraud’, ‘spoofing’, MITM attacks, etc. are a huge problem
today for wireless interfaces” [Doc. No. 90 at 11], but provides no citation to any portion of the
specification of these patents that indicates these were problems in 1999 (when the specification was
originally filed) or that they were the problems addressed by RFID systems claimed.
7
27
28
12
14cv2670
1
access to certain restricted locations and initiation of certain functions such as lighting and
2
HVAC.” [Id., Col. 2:34-59, 3:15-19.]
3
Untethered to the problems the patent disclosure identifies, these continuation claims
4
are written at a level of abstraction that purports to claim any system employing a wireless
5
device that sends an identifying signal to a receiver, which upon identifying the signal,
6
accesses and provides information associated with the identified user, which can be
7
downloaded to that user’s portable electronic device. Without any reference to actual
8
language in the disclosure required to support its assertions, West View argues that the
9
technological problem being addressed is in the field of wireless information provision or
10
commerce, to enable secure transactions and prevent the release of the user’s sensitive data
11
to a malicious third party. [Doc. No. 90 at 7.] This contention only serves to underscore
12
the level of abstraction of these continuation claims and the intention to preempt a field
13
never contemplated in the patent disclosure.
14
V.
15
Having considered the submissions of the parties and based on the language of the
16
asserted claims and the specification common to the patents at issue, the Court finds that
17
the asserted claims of U.S. Patent No. 8,301,456 and US. Patent No. 8,311,834 are not
18
drawn to patent-eligible subject matter under 35 U.S.C. §101 and are invalid. BMW’s
19
motion for judgment on the pleadings is therefore GRANTED.
Conclusion
20
It is SO ORDERED.
21
Dated: December 30, 2016
22
23
24
25
26
27
28
13
14cv2670
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?