Copy Protection LLC v. Netflix Inc.

Filing 108

MEMORANDUM OPINION re claim construction. Signed by Judge Leonard P. Stark on 8/5/15. (ntl)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE COPY PROTECTION LLC, Plaintiff, v. NETFLIX, INC., Defendant. ) ) ) ) ) ) ) ) ) ) Civil Action No. 14-365-LPS Brian E. Farnan and Michael J. Farnan, FARNAN LLP, Wilmington, DE Jonathan A. David, Stephen F. Roth, Aaron S. Eckenthal, Maegan A. Fuller, LERNER, DAVID, LITTENBERG, KRUMHOLZ & MENTLIK, LLP, Westfield, NJ Attorneys for Plaintiff Richard L. Horwitz, David E. Moore, Bindu A. Palapura, Stephanie E. O'Byrne, POTTER ANDERSON & CORROON LLP, Wilmington, DE Clay C. James, C. Matthew Rozier, Aaron S. Oakley, HOGAN LOVELLS US LLP, Denver, CO Melissa J. Baily, James D. Judah, Adam Botzenhart, QUINN EMANUEL URQUHART & SULLIVAN, LLP, San Francisco, CA Attorneys for Defendant MEMORANDUM OPINION August 5, 2015 Wilmington, Delaware ~L8 STARK, U.S. District Judge: I. BACKGROUND Plaintiff Copy Protection LLC ("Plaintiff') filed this patent infringement action against Defendant Netflix, Inc., alleging infringement of U.S. Patent No. 7,079,649 ("the '649 Patent"). The '649 patent generally relates to a method for preventing unauthorized copying of downloaded data in a computer system. Pending before the Court is the issue of claim construction of various disputed terms of the patent-in-suit. The parties completed briefing on June 19, 2015. (D.I. 57, 59, 75, 76) The Court heard argument on claim construction on July 20, 2015. (See Transcript ("Tr.")) II. LEGALSTANDARDS The ultimate question of the proper construction of a patent is a question of law. See Teva Pharm. USA, Inc. v. Sandoz, Inc., 135 S. Ct. 831, 837 (2015) (citing Markman v. Westview Instruments, Inc., 517 U.S. 370, 388-91 (1996)). "It is a bedrock principle of patent law that the claims of a patent define the invention to which the patentee is entitled the right to exclude." Phillips v. AWHCorp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (internal quotation marks omitted). "[T]here is no magic formula or catechism for conducting claim construction." Id. at 1324. Instead, the court is free to attach the appropriate weight to appropriate sources "in light of the statutes and policies that inform patent law." Id. "[T]he words of a claim are generally given their ordinary and customary meaning ... [which is] the meaning that the term would have to a person of ordinary skill in the art in question at the time of the invention, i.e., as of the effective filing date of the patent application." Id. at 1312-13 (internal citations and quotation marks omitted). "[T]he ordinary meaning of a 1 claim term is its meaning to the ordinary artisan after reading the entire patent." Id. at 1321 (internal quotation marks omitted). The patent specification "is always highly relevant to the claim construction analysis. Usually, it is dispositive; it is the single best guide to the meaning of a disputed term." Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996). While "the claims themselves provide substantial guidance as to the meaning of particular claim terms," the context of the surrounding words of the claim also must be considered. Phillips, 415 F.3d at 1314. Furthermore, "[o]ther claims of the patent in question, both asserted and unasserted, can also be valuable sources of enlightenment ... [b]ecause claim terms are normally used consistently throughout the patent .... " Id. (internal citation omitted). It is likewise true that"[ d]ifferences among claims can also be a useful guide .... For example, the presence of a dependent claim that adds a particular limitation gives rise to a presumption that the limitation in question is not present in the independent claim." Id. at 131415 (internal citation omitted). This "presumption is especially strong when the limitation in dispute is the only meaningful difference between an independent and dependent claim, and one party is urging that the limitation in the dependent claim should be read into the independent claim." SunRace Roots Enter. Co., Ltd. v. SRAM Corp., 336 F.3d 1298, 1303 (Fed. Cir. 2003). It is also possible that "the specification may reveal a special definition given to a claim term by the patentee that differs from the meaning it would otherwise possess. In such cases, the inventor's lexicography governs." Phillips, 415 F.3d at 1316. It bears emphasis that "[e]ven when the specification describes only a single embodiment, the claims of the patent will not be read restrictively unless the patentee has demonstrated a clear intention to limit the claim scope using words or expressions of manifest exclusion or restriction." Liebel-Flarsheim Co. v. 2 Medrad, Inc., 358 F.3d 898, 906 (Fed. Cir. 2004) (internal quotation marks omitted), aff'd, 481 F.3d 1371 (Fed. Cir. 2007). In addition to the specification, a court "should also consider the patent's prosecution history, if it is in evidence." Markman v. Westview Instruments, Inc., 52 F.3d 967, 980 (Fed. Cir. 1995), ajf'd, 517 U.S. 370 (1996). The prosecution history, which is "intrinsic evidence,'' "consists of the complete record of the proceedings before the PTO [Patent and Trademark Office] and includes the prior art cited during the examination of the patent." Phillips, 415 F.3d at 1317. "[T]he prosecution history can often inform the meaning of the claim language by demonstrating how the inventor understood the invention and whether the inventor limited the invention in the course of prosecution, making the claim scope narrower than it would otherwise be." Id. In some cases, "the district court will need to look beyond the patent's intrinsic evidence and to consult extrinsic evidence in order to understand, for example, the background science or the meaning of a term in the relevant art during the relevant time period." Teva, 135 S. Ct. at 841. Extrinsic evidence "consists of all evidence external to the patent and prosecution history, including expert and inventor testimony, dictionaries, and learned treatises." Markman, 52 F.3d at 980. For instance, technical dictionaries can assist the court in determining the meaning of a term to those of skill in the relevant art because such dictionaries "endeavor to collect the accepted meanings of terms used in various fields of science and technology." Phillips, 415 F.3d at 1318. In addition, expert testimony can be useful "to ensure that the court's understanding of the technical aspects of the patent is consistent with that of a person of skill in the art, or to establish that a particular term in the patent or the prior art has a particular meaning in the 3 pertinent field." Id. Nonetheless, courts must not lose sight of the fact that "expert reports and testimony [are] generated at the time of and for the purpose of litigation and thus can suffer from bias that is not present in intrinsic evidence." Id. Overall, while extrinsic evidence "may be useful" to the court, it is "less reliable" than intrinsic evidence, and its consideration "is unlikely to result in a reliable interpretation of patent claim scope unless considered in the context of the intrinsic evidence." Id. at 1318-19. Where the intrinsic record unambiguously describes the scope of the patented invention, reliance on any extrinsic evidence is improper. See Pitney Bowes, Inc. v. Hewlett-Packard Co., 182 F.3d 1298, 1308 (Fed. Cir. 1999) (citing Vitronics, 90 F.3dat 1583). Finally, "[t]he construction that stays true to the claim language and most naturally aligns with the patent's description of the invention will be, in the end, the correct construction." Renishaw PLC v. Marposs Societa 'per Azioni, 158 F.3d 1243, 1250 (Fed. Cir. 1998). It follows that "a claim interpretation that would exclude the inventor's device is rarely the correct interpretation." Osram GmbHv. Int'! Trade Comm'n, 505 F.3d 1351, 1358 (Fed. Cir. 2007) (quoting Modine Mfg. Co. v. US. Int'! Trade Comm 'n, 75 F.3d 1545, 1550 (Fed. Cir. 1996)). III. AGREED-UPON CLAIM TERM The parties agree on the proper construction for the following claim term: Claim Term Agreed-Upon Construction under control of the program portion (claims 1, 10, 25) performed by the program portion The Court will adopt the agreed-upon construction. 4 IV. DISPUTED CLAIM TERMS A. (1) "program portion" [claims 1, 10, 22, and 25] (2) "program" [claims 9, 11, 19, and 23] Plaintifrs Proposed Construction Defendant's Proposed Construction ( 1) part of a program (1) set of instructions forming a single entity, defined independently of the processing environment in which the instructions might eventually be executed (2) sequence of instructions that can be executed by a computer (2) [same as program portion] Court's Construction: (1) part of a program (2) sequence of instructions that can be executed by a computer The parties agree that a program portion is a "sequence" or "set" of "instructions," which can be "executed" by a computer. (See Tr. at 12-13, 27-28) Their primary disputes regarding "program portion" and "program" are (1) whether a program portion must be "a single entity, defined independently of the processing environment in which the instructions might eventually be executed," and (2) whether the term "program" should be construed identically to "program portion." The Court agrees with Plaintiff that the patentee did not limit the claims to program portions that are "a single entity, defined independently of the processing environment" and, further, that the term "program" carries a different meaning than "program portion." During prosecution, the patentee attempted to distinguish a prior art patent, U.S. Patent No. 6,055,314 to Spies ("Spies"), by arguing that Spies disclosed a method for cryptographically protecting video content using two separate programs to perform the claimed method steps, while the patentee's invention uses only a single program to perform those steps. (See D.I. 53, Ex. C-3 5 at COPYP0000068-88) In that context, the patentee described the "program portion" claim term in a way that mirrors the language Defendant would have the Court read into the term: Claim 1 ... requires that the same program portion generates and uploads a request for access to data and performs conversion of the cryptographically protected data to an unprotected form. The "same" program portion forms a set of instructions forming a single entity, defined independently of the processing environment in which the instructions might eventually be executed (although when they are executed, it would be in the context of the instructions being part of a single entity). The same program portion may be downloaded (see, e.g., dependent claim 7) as a whole, not fragmented and executed piecemeal. The "same" program portion allows an unbroken chain of control from the time during which the data set is in a protected form (i.e. an encrypted form) to control during conversion (e.g., decryption) of the data set into an unprotected form and for as long as the data set remains in the unprotected form. The chain of control provided by the "same" program portion thus remains unbroken. (Id. at COPYP0000077-78 (emphasis added)) The Court is not persuaded that the patentee's statement during prosecution is sufficiently unambiguous to limit the meaning of the claim term "program portion." (Id. at COPYP0000077; see also generally Tr. at 37 (when asked "what defined independently of the processing environment really means," Defendant responded that "[u]nfortunately the applicants weren't really clear about what they meant about that")); Grober v. Mako Prods., Inc., 686 F.3d 1335, 1341 (Fed. Cir. 2012) ("When a patentee makes a 'clear and unmistakable disavowal of scope during prosecution,' a claim's scope may be narrowed under the doctrine of prosecution disclaimer."). It appears that the statement at issue was offered by the patentee in an attempt to explain that, unlike the Spies prior art, claim 1 requires that the "same" program portion perform both of the method steps at issue, based on the limitations in the claim (that the program portion 6 both uploads the request for data and converts the data to unprotected form). Read in that context, this statement was an attempt to describe and explain those limitations, 1 rather than an effort to re-define the meaning of the term "program portion" to include only programs that are "defined independently of the processing environment in which the instructions might eventually be executed." (See Tr. at 26 (Defendant explaining that this statement during prosecution was "not really ... about claim disavowal")) Additionally, it is unclear what the practical implications might be of construing "program portion" to include a limitation that the program is "defined independently of the processing environment in which the instructions might eventually be executed." The specification and the prosecution history do not explain the meaning of this phrase, and contain no other suggestion that the "program portion" of the claim is limited to only certain kinds of programs. Hence, a construction that included Defendant's "defined independently" limitation might itself require further construction, in order for a jury to determine what kinds of programs do and do not meet that limitation. (See Tr. at 37-38 (Defendants expressing uncertainty regarding whether Java applet, as used in preferred embodiment, is "program portion" under their proposed construction)) As to the second dispute, a construction of "program portion" that is coextensive with "program" would read "portion" out of the claims - an inappropriate result. See Apple Inc. v. Motorola, Inc., 757 F.3d 1286, 1305 (Fed. Cir. 2014) (affirming district court's rejection of 1 Some of the parties' statements at oral argument hinted that there could be a dispute as to the "unitary nature" of the program portion. (Tr. at 33, 36, 40-43) No such dispute was presented in the parties' briefs, however, and both proposed constructions require a "set" or "sequence" of instructions. 7 proposed claim construction that "reads [the construed language] out of the claim"), overruled on other grounds by Williamson v. Citrix Online, LLC, No. 2013-1130, 2015 WL 3687459 (Fed. Cir. June 16, 2015). Defendant points to the fact that the patentee referred to an "applet" as both a "program" and a "program portion." (See D.I. 53, Ex. C-3 at COPYP0000270 ("the program portion (e.g., a Java applet)"); id., Ex. C-1 at COPYP0000072 (referring to "program (an applet)")) But that only indicates that the patentee viewed an applet as being both a "program" and a "part of a program," not that the terms "program" and "program portion" necessarily have the same meaning. 2 (See Tr. at 15-16 (Plaintiff stating that "hyper-technically" a Java applet can be viewed as either program or program portion)) B. (1) "selectively controlling access to copy or save functions at the client in respect of the data in its unprotected form" [claim 1] (2) "suppress client computer copy or save functions with respect to the unprotected copy of the requested data" [claim 9], "suppress client computer copy and save functions with respect to the unprotected copy of the requested data" [claim 23] (3) "restricting or preventing access to copy or save functions at the client in respect of the data in its unprotected form" [claims 10 and 25] (4) "restrict or prevent client computer copy or save functions with respect to the unprotected copy of the requested data" [claims 11 and 19] 2 The Board of Patent Appeals and Interferences also treated "program portion" and "program" similarly, in that they applied arguments regarding the "program portion" to claims that used only the "program" language. (D.I. 53, Ex. C-1 at COPYP0000032-34) But it is not clear whether the Board took the view that the terms were identical, or merely that the same analysis applied to both. 8 Plaintiff's Proposed Construction Defendant's Proposed Construction (1) disabling or enabling the user's ability to copy or save the unprotected data ( 1) disabling functionality to copy or save the unprotected data that would otherwise be available at the client (2) suppress the user's ability to copy or save the unprotected requested data (2) suppress functionality to copy or save the unprotected data that would otherwise be available at the client (3) restrict or prevent the user's ability to copy or save the unprotected data (3) restricting or preventing functionality to copy or save the unprotected data that would otherwise be available at the client (4) restrict or prevent the user's ability to copy or save the unprotected requested data (4) restrict or prevent functionality to copy or save the unprotected data that would otherwise be available at the client Court's Construction: (1) disabling or enabling functionality to copy or save the unprotected data that would otherwise be available at the client (2) suppress functionality to copy or save the unprotected data that would otherwise be available at the client (3) restricting or preventing functionality to copy or save the unprotected data that would otherwise be available at the client (4) restrict or prevent functionality to copy or save the unprotected data that would otherwise be available at the client The parties present two disputes regarding the above claim terms: (1) whether "controlling" includes "enabling," and (2) whether the functions that are controlled, suppressed, prevented, or restricted must be functions that "would otherwise be available at the client." The Court holds that "controlling" includes "enabling" and that the functions at issue must be otherwise available at the client. As to the first dispute, the specification makes clear that the term "controlling" in claim 1 9 encompasses both enabling and disabling functions at the client. (See '649 patent, col. 9:36-46 (describing embodiment that "offer[ s] an option to save the document in an unprotected format upon payment of an additional larger fee")) Defendant's construction would exclude that embodiment from the claims. As to the second dispute, claim 1 describes "selectively controlling access to copy or save functions at the client." Implicit in that language is that the functions would otherwise be available at the client - if not, there would be no functions to "control." Statements by the patentee during prosecution support Defendant's construction. In distinguishing the prior art, the patentee described "the present invention" as providing "functionality ... to suppress access to [copy and save] functions which are otherwise available in respect to particular data sets." (D.I. 53, Ex. C-2 at COPYP0000168 (emphasis added)) A similar statement earlier in the prosecution was that "in the present invention, ... the program portion (e.g., a Java applet) ... is being used to restrict access to functions that would otherwise be legitimately available at the client (e.g., provided via the Java subsystem)." 3 (Id., Ex. C-3 at COPYP0000270 (emphasis added)) Further, "controlling" includes "disabling" and "enabling" copy or save functionality. "Disabling" implies that the functions are otherwise available. As to "enabling," the act of enabling copy or save functionality when no such functionality would otherwise have been present would be in tension with the purpose of the invention, which is directed to protecting copyrighted works in situations where they would be at risk of being copied or saved by the user. 3 The Court relies on this language not as a disclaimer but as additional support for the "otherwise available" limitation, which is already apparent from the claim language itself and the specification. 10 (See '649 patent, col. 1:41-48 (noting problem that "copyrighted works ... may be readily copied onto the hard disk of a client's computer and replicated many times digitally."); see also D.I. 53, Ex. C-2 at COPYP0000166 (describing "selectively control" functionality of claim 1 as "restricting access to a data set," not as providing such access) (emphasis added)) 4 At oral argument, Plaintiff argued that the phrase "otherwise be available at the client" would be unhelpful to the jury and would require further construction, because it is unclear whether those functions must have been otherwise available to the user (as opposed to, for example, the programmer of an application). (Tr. at 46-49, 60-61) However, the patent specification makes clear that the invention is directed toward protecting copyrighted works from infringement by the end user of a computer system. (See, e.g., '649 patent, cols. 1:41-48, 2:2124, 5:60-6:20, 9:2-9) Thus, functions "otherwise available at the client" include only those functions that would have been presented or otherwise available to the user absent some action on the part of the programmer. The "otherwise available" limitation applies equally to the remaining phrases at issue, which relate to claims 9, 10, 11, 19, 23, and 25. These phrases use words like suppressing, restricting, or preventing copy or save functionality - terms that imply that such functionality would otherwise be available in some fashion. Absent such pre-existing copy or save functionality, there is nothing to restrict, prevent, or suppress. 4 This purpose is also reflected in the title of the invention, "Copy Protection of Data," and in the specification's description of the embodiments. (See, e.g., '649 patent, col. 2:21-24 ("As a result of processing a Java applet, the usual copy and save functions will not be presented to the user, thereby providing security in respect of the unprotected data presented to the user."); id., cols. 5:60-6:20, 9:2-9, 9:35-46 (describing how copy and save functions that would otherwise be presented to user upon click of right mouse button on copyrighted material are no longer presented, or are presented only upon payment)) 11 C. "determining a machine identifier of the client by analysing its hardware and/or its software configuration" [claim 18] Plaintiff's Proposed Construction Defendant's Proposed Construction ascertaining characteristics of the hardware and/or software of the client to determine a machine identifier scanning the arrangement of the hardware and/or software of the client to determine a machine identifier Court's Construction: ascertaining characteristics of the hardware and/or software of the client to determine a machine identifier The parties' dispute regarding this claim term is whether "analyzing" should be replaced with "ascertaining characteristics of' or "scanning the arrangement of." The Court concludes that Plaintiffs phrasing, "ascertaining characteristics of," is more appropriate. Defendant's proposed construction would improperly limit the claim term "analyzing" to the single "scanning" embodiment disclosed in the specification. See Kara Tech. Inc. v. Stamps. com Inc., 582 F.3d 1341, 1348 (Fed. Cir. 2009) ("The claims, not specification embodiments, define the scope of patent protection. The patentee is entitled to the full scope of his claims, and we will not limit him to his preferred embodiment or import a limitation from the specification into the claims."). 5 5 Defendant asserts that Plaintiffs proposed construction would render the claim invalid for indefiniteness and lack of enablement, but Defendant presents these arguments in a conclusory fashion (D.I. 57 at 11-12), and the Court will not address them at this time. 12 D. "cryptographically protecting the data" [claims 1, 10, and 25] Plaintiff's Proposed Construction Defendant's Proposed Construction protecting the data by encryption and/or by an integrity checking procedure cryptographically protecting the data at the server Court's Construction: protecting the data by encryption and/or by an integrity checking procedure With regard to this claim term, the parties dispute whether the data must be protected "at the server." The Court concludes that the step of cryptographically protecting the data need not be performed at the server. The claims and the specification include no explicit limitation that the cryptographic protection must be performed "at the server." Defendant nonetheless asserts that the data protection must be performed at the server because that is where it occurs in the "sole embodiment." (D.I. 57 at 15-16 (citing '649 patent, figs. 3, 5, 6)) But the fact that a disclosed embodiment (even the sole embodiment) includes a limitation is insufficient to read that limitation into the claims. See Kara Tech., 582 F.3d at 1348. Defendant also asserts that, logically, the data protection cannot be performed at the client, because the client must receive the data in protected form. But that conclusion does not dictate that the server must perform the protection, because there is no statement in the claims or specification that the client and server are the only computers involved in performing the method. Plaintiff's construction is otherwise supported by the specification, which states that "[t]he data may be cryptographically protected by encryption and/or by an integrity checking procedure such as hashing." ('649 patent, col. 1:60-62) 13 E. (1) "a server computer" [claims 9, 11, 19, and 23] (1) "a server" [claims 1, 9, 10, 11, 19, 23, and 25] Plaintiff's Proposed Construction Defendant's Proposed Construction (1) one or more computers that are capable of providing information by receiving and responding to requests (1) one or more computers, each capable of performing all recited server-side steps (2) one or more processing devices that are capable of providing information by receiving and responding to requests (2) [same as a server computer] Court's Construction: (1) one or more computers that are capable of providing information by receiving and responding to requests (2) one or more processing devices that are capable of providing information by receiving and responding to requests Both parties' constructions encompass a "server" or "server computer" consisting of one or more processing devices or computers. The dispute is whether, as Defendant proposes, each computer must be capable of performing all recited server-side steps. The Court concludes that there is no limitation in the claims that requires each device that forms a "server" or "server computer" to be capable of performing all of the recited server-side steps. Defendant first argues that the "sole embodiment" in the written description "utilize[d] a single server to perform all of the recited steps," and that the specification generally referred only to "a server," rather than a distributed server where each computer is individually capable of performing only some tasks. (See D.I. 57 at 12-13) But both proposed constructions encompass the use of multiple computers as a server, and Defendant confirmed at oral argument that its construction encompassed multiple different servers performing the steps of the claim, as long as all of the servers are capable of performing each of the steps. (Tr. at 107 ("Netflix isn't even 14 arguing that you couldn't theoretically have maybe different servers each performing the steps.")) The relevant question, then, is whether each of those computers that makes up the server must be "capable of performing all recited server-side steps" - and Defendant offers little support from the specification or prosecution history as to that issue. Defendant suggests that Plaintiffs construction would conflict with the patentee's description of the invention during prosecution as entailing "an unbroken chain of control" over the data. (D.I. 53, Ex. C-1 at COPYP0000077) But that argument by the patentee related to the software at the client, not the server. (Id.) Moreover, the chain of control is equally "broken" regardless of whether each separate computer that may perform each step is "capable" of performing the other steps as well. Finally, Defendant relies heavily on other cases construing the same or similar claim terms. (See D.I. 57 at 13-14; D.I. 75 at 12; see also FotoMedia Technologies, LLC v. AOL, LLC, 2009 WL 2175845, at *6 (E.D. Tex. July 21, 2009); Zapmedia Servs., Inc. v. Apple, Inc., 2010 WL 8599970, at *3 (E.D. Tex. Aug. 19, 2010), ajf'd, 482 F. App'x 533 (Fed. Cir. 2012); MasterObjects, Inc. v. Google, Inc., 2013 WL 2319087, at *7-10 (N.D. Cal. May 28, 2013)) Plaintiff attempts to distinguish these cases. (D.I. 76 at 16-17) The Court finds these cases to be helpful, but not binding, and ultimately they do not persuade the Court to adopt Defendant's proposed construction. 15 F. "sending the cryptographically protected data to the client" [claims 1, 10, and 25) Plaintiff's Proposed Construction Defendant's Proposed Construction sending the cryptographically protected data to the client (no need to construe) sending the cryptographically protected data from the server to the client Court's Construction: sending the cryptographically protected data from a server to the client It is clear that the data referred to in the claims at issue originates at a server, because the preambles to the claims each state that the data is "sent from a server to a client." However, given the Court's conclusion above that multiple server computers may be used to perform the steps of the claims, it would be incorrect to require that the data be sent from "the server" as opposed to needing to be sent from "a server." At the hearing, Plaintiff agreed with this construction proposed by the Court (see Tr. at 99-100), and the Court now adopts it. G. "a request for access to data" [claims 1, 10, and 25) Plaintiff's Proposed Construction Defendant's Proposed Construction a request to receive data a request for permission to receive data from the server Court's Construction: a request for permission to receive data from a server The parties dispute ( 1) whether the request must be for "permission" to receive data, and (2) whether that data must come from the server. The Court will construe this term to mean "a request for permission to receive data from a server." As to the first dispute, the claim language indicates that the client does not request the 16 data itself, but instead requests "access" to that data - i.e., that the client be allowed to receive, or retrieve, such data. This is consistent with the first portion of Defendant's proposed construction, "a request for permission to receive data." Plaintiff's proposed construction is inconsistent with the claims, as Plaintiff would have the user request the data itselfrather than (as the claims require) request "access" to the data. Plaintiff points to dependent claims 5 and 18, which involve "authenticating that the client is permitted to receive the data" and "identifying the client to the server, to permit ... data to be downloaded," suggesting that these claims show that the patentee distinguished between requesting "access to the data" and '"permission' to access the data." (D.I. 58 at 12-13) But neither of those claims conflict with a construction of "a request for access to data" as "a request for permission to receive data." Instead, each of those claims describes a specific means for requesting access to data. As to the second dispute, the Court concluded above that the language in the claims indicates that the requested data is sent from a server to the client. (See also Tr. at 75 (Plaintiff agreeing that data must be sent from "a" server)) The same conclusion applies here. H. Order of the Steps [claims 1, 10, and 25] The parties dispute the whether the first and second steps of the claims must be performed in order. Each of claims 1, 10, and 25 includes the following steps: (1) running a program portion to request access to data, (2) cryptographically protecting the data, (3) sending the data to the client, and (4) converting the data to an unprotected form. The Court concludes that steps one and two need not be performed in any order, and as such the data may be cryptographically protected before it is requested. The parties agree that the remaining steps 17 steps three and four - must be performed in order, and must be performed after steps one and two. The Federal Circuit has stated that "[s]teps in a method claim need not necessarily be performed in the order they are written," but "if grammar, logic, the specification, or the prosecution history require the steps to be performed sequentially, then the claims are so limited." Apple, 757 F.3d at 1305. Defendant has not shown that the claims' grammar or logic requires that steps one and two be performed sequentially. The steps of the claims are not numbered, and the first two steps - unlike the third and fourth steps - include no explicit limitation regarding the order in which they must be performed. Defendant suggests that the fact that steps three and four include an explicit order shows that the entire claim has "a logical order," and that steps one and two must therefore be performed in order as well. (D.I. 57 at 18-19) But there is nothing before the Court to show that the invention cannot function equally well regardless of the order in which steps one and two are performed; either way, the data is prepared for delivery to the client in protected form, such that steps three and four may occur. There is no logical requirement in the claims that steps one and two be performed in order, as long as those steps are collectively performed prior to steps three and four. This construction is supported by the specification, which refers to an implementation that is agnostic as to the order in which the steps are performed. (See '649 patent, cols. 1:63-2:5 (stating that, in one embodiment, "a request is uploaded to the server for a file containing the cryptographically protected data," which suggests that the file may already contain protected data at the time at which it is requested)) Also, two other independent claims, claims 11 and 19, lack 18 the first two steps entirely, further suggesting that (if performed) they need not be performed in a particular order. 6 V. CONCLUSION An appropriate Order follows. 6 Defendant cites several cases in favor of its proposed construction, including Respironics, Inc. v. Invacare Corp., 303 Fed. Appx. 865 (Fed. Cir. 2008). In Respironics, the Federal Circuit held that where a claimed method step referred to "selected ... pressure magnitudes," those pressure magnitudes must be "selected" prior to the step that refers to them. 303 Fed. Appx. at 870. This conclusion was based, at least in part, on the specification's disclosure of only a single embodiment, in which the pressure magnitudes were selected in advance. See id. The claims at issue here have no language similar to the "selected" language of Respironics and, as discussed above, the specification refers to at least one embodiment that is agnostic as to whether the data is cryptographically protected before or after the request. (See '649 patent, col. 1:63-67) The other two cases cited by Defendants are also distinguishable, because they involved claims that were numbered or lettered. See Aerate!, Ltd. v. Tel co Group, Inc., 2010 WL 1916015, at *6-8 (S.D.N.Y. May 10, 2010) (involving claim that "list(ed] the steps in lettered order"), ajf'd in part, vacated in part on other grounds, 433 Fed. Appx. 903 (Fed. Cir. 2011); Michael S. Sutton Ltd. v. Nokia Corp., 647 F. Supp. 2d 737, 743 (E.D. Tex. 2009) (holding that numbered steps claimed using "logically progressive language" must be performed in order, and noting that order of the steps was not "the true dispute"), aff'd, 2010 WL 5230901 (Fed. Cir. 2010). 19

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?