Sophos Inc v. RPost Holdings, Inc. et al
Filing
282
Judge Denise J. Casper: ORDER entered. MEMORANDUM AND ORDER - The Court DENIES Sophos' motion for summary judgment with respect to standing, D. 207, ALLOWS Sophos' motion for summary judgment on patent validity, D. 201, finding the '628 patent invalid, and DENIES as moot the remaining summary judgment motions, D. 207 (as to lost profits), D. 221, D. 251. Associated Cases: 1:13-cv-12856-DJC, 1:14-cv-13628-DJC(Hourihan, Lisa)
UNITED STATES DISTRICT COURT
DISTRICT OF MASSACHUSETTS
__________________________________________
)
)
SOPHOS INC.,
)
)
Plaintiff,
)
)
v.
)
Civil Action No. 13-12856-DJC
)
)
RPOST HOLDINGS, INC. and RPOST
)
COMMUNICATIONS LIMITED,
)
)
Defendants.
)
)
)
__________________________________________)
)
)
RPOST HOLDINGS, INC. and RPOST
)
COMMUNICATIONS LIMITED,
)
)
Plaintiffs,
)
)
v.
)
Civil Action No. 14-13628-DJC
)
)
SOPHOS INC.,
)
)
Defendant.
)
)
)
__________________________________________)
MEMORANDUM AND ORDER
CASPER, J.
I.
December 8, 2017
Introduction
Sophos, Inc. (“Sophos”) seeks summary judgment on two separate grounds of the ongoing
dispute between Sophos and RPost Holdings, Inc. (“RPost”) and RPost Communications Limited
1
(“RComm”) (collectively, “the Defendants”). Specifically, Sophos seeks summary judgment on
the issues of the validity of the patent, D. 201, RPost’s standing to sue and the ability of RComm
to recover damages, D. 207, and infringement, D. 251. The Defendants seek summary judgment
on the issue of infringement. D. 221. For the following reasons, the Court DENIES Sophos’
motion for summary judgment with respect to standing, D. 207, ALLOWS Sophos’ motion for
summary judgment on patent validity, D. 201, finding the ‘628 patent invalid, and DENIES as
moot the remaining motions, D. 207 (as to lost profits), D. 221, D. 251.
II.
Procedural History
The procedural history of this case is accounted in more detail in this Court’s prior order,
D. 128 at 3. On November 12, 2013, Sophos sued the Defendants seeking a declaratory judgment
that Sophos does not infringe certain patents owned by the Defendants and that those patents were
invalid. D. 1. The Defendants then sued Sophos bringing a claim of infringement in a separate
suit. No. 14-cv-13628-DJC, D. 1. Both cases are before the Court as related cases. On June 3,
2016, this Court issued a decision regarding the construction of certain claims in the patents at
issue. D. 128. On January 11, 2017, the parties jointly stipulated to the dismissal of claims related
to three of the four patents initially involved in the dispute, leaving only the claims related to U.S.
Patent No. 8,504,628 (“the ‘628 patent”). D. 138. The Defendants contend that Sophos infringes
claims 14, 19, 24, 26, 27 and 30 of the ’628 patent. D. 221 at 4. On December 6, 2017, the Court
heard argument and took the matter under advisement. D. 280.
III. Standard of Review
“A motion for summary judgment is properly granted if there is no genuine issue as to any
material fact and the moving party is entitled to judgment as a matter of law.” IMS Tech., Inc. v.
Haas Automation, Inc., 206 F.3d 1422, 1429 (Fed. Cir. 2000). The Court views “the evidence in
2
a light most favorable to the non-movant, and draw[s] all reasonable inferences in its favor.” Id.
“Essentially, Rule 56[ ] mandates the entry of summary judgment ‘against a party who fails to
make a showing sufficient to establish the existence of an element essential to that party's case,
and on which that party will bear the burden of proof at trial.’” Coll v. PB Diagnostic Sys., 50
F.3d 1115, 1121 (1st Cir. 1995) (quoting Celotex Corp. v. Catrett, 477 U.S. 317, 322 (1986)). This
standard is not altered when there are cross-motions for summary judgment. Wightman v.
Springfield Terminal Ry. Co., 100 F.3d 228, 230 (1st Cir. 1996).
IV. Factual Background
A.
The ‘628 Patent
The patent is entitled “System and Method for Verifying Delivery and Integrity of
Electronic Messages.” D. 1-2 at 2. The abstract describes the ‘628 patent as “[t]hird party
verification of the content and delivery of an electronic message such as an email,” which provides
for using a server that receives an email sent to an addressee and “tags” the email to indicate that
it is “registered” with the service provider. D. 1-2 at 2. The server establishes a direct connection
with the addressee’s Mail User Agent (“MUA”), transmits the tagged email, receives a response
from the MUA that the message was received, and creates and forwards a receipt to the message
originator. D. 1-2 at 2.
Claim 14 is described in the ‘628 patent as:
[a] method of transmitting a message from a sender to a recipient, comprising:
transmitting the message to a server remote from the recipient; determining by the
server if there is a particular indication present in the message that identifies the
message as requiring special processing before the message is transmitted to the
recipient; transmitting the message from the server to the recipient through a first
route if the message lacks the particular indication; and processing the message by
the server in accordance with the particular indication.
D. 1-2 at 34. Claim 19 claims “[t]he method of claim 14, wherein processing the message
in a special manner includes encrypting the message to transmit the message in a more private
3
manner.” D. 1-2 at 34. Claim 24 claims “[t]he method of claim 14, wherein determining if the
particular indication is present in the message includes filtering the content of the message to
determine whether a selected term is present in the message.” Id. Claim 26 claims “[t]he method
of claim 24, wherein the selected term is a flag.” Id. Claim 27 claims “[t]he method of claim 26,
wherein the flag is use selectable.” Id. Finally, Claim 30 claims:
[a] system for transmitting a message from a sender to a recipient, comprising: a
server configured to receive a message from a sender, the server being remote from
a recipient of the message, the server also being programmable using software
commands to determine if there is a particular indication present in the message
that identifies the message as requiring special processing before the message is
transmitted to the recipient, to transmit the message from the server to the recipient
through a first route if the message lacks the particular indication, and to process
the message in accordance with the particular indication if the particular indication
is present.
Id. The ’628 patent was filed on June 4, 2010 and issued on August 6, 2013. D. 1-2 at 2.
The ’628 patent is a continuation of U.S. Patent No. 7,966,372 (“the ’372 patent”). D. 1-2 at 2.1
The ‘628 patent also relates to two other provisional patents, Provisional Application Number
60/172,479, filed on December 17, 1999, and Provisional Application Number 60/146,074, filed
on July 28, 1998. D. 1-2 at 2. A personal of ordinary skill in the art regarding this patent, at the
relevant time, would be a person with at least an undergraduate degree in computer science or
electrical engineer, or the equivalent, and had at least one or two years of work experience
implementing or maintaining email programs or computer networks. D. 203 ¶ 3.
1
A continuation application is “a second application for the same invention claimed in a prior
nonprovisional application and filed before the original prior application becomes abandoned or
patented.” Antares Pharma, Inc. v. Medac Pharma Inc., 771 F.3d 1354, 1358 (Fed. Cir. 2014)
(citations and internal quotation marks omitted).
4
B.
Other Relevant Patents
Sophos directs the Court’s attention to two other patents: U.S. Patent No. 6,609,196, to
Robert Dickinson and Sathvik Krishnamurth (“Dickinson”) and U.S. Patent No. 7,233,992, to John
M. Muldoon et al. (“Muldoon”). D. 203 ¶¶ 4, 29. Dickinson has a relevant priority date of
November 3, 1998. D. 203 ¶ 4. Muldoon was filed on January 14, 2000. D. 203 ¶ 29.
Dickinson discloses an “email firewall with stored key encryption/decryption.” D. 204-2
at 2. Per the description in the abstract, the firewall “applies policies to email messages.” D. 2042 at 2. The firewall comprises a simple mail transfer protocol (“SMTP”) that delivers emails from
a first site and a select subset of second sites. Id. “Policy managers” enforce policies, such as
encryption and decryption policies, such as a “first source/destination policy,” a “first content
policy,” and a “first virus policy,” based on administrator-selectable criteria. Id. The policy
managers comprise an access manager for restricting transmission of emails in accordance with
the source/destination policy; a content manager for restricting transmission of emails in
accordance with the content policy; and a virus manager for restricting transmission of emails in
accordance with the virus policy. Id.
In certain contexts, the email firewall in Dickinson is a server that receives emails and is
remote from external recipients of the email. D. 203 ¶ 6; D. 259 ¶ 6; D. 204-2 at 15. Dickinson
discloses, as examples of policy manager features, that the policy managers could support
detecting the presence of specific words in the body, subject, or attachment of an email; a particular
email destination; a particular size of the email; the priority of the message; the presence of a virus;
the need to encrypt a message; and the presence or absence of certain user-selected flags. D. 203
¶¶ 7-12, 27; D. 259 ¶ 9, 27; D. 204-2 at 14. Depending on whether the message contains those
characteristics, the firewall may transmit the message, return the message to the sender, quarantine
the message, block the message, defer the delivery of the message, annotate the message, or
5
encrypt the message. D. 203 ¶¶ 18-22, D. 259 ¶¶ 18-22. The Dickinson patent contains figures
that indicate that, in a “preferred embodiment of an e-mail firewall,” D. 204-2 at 13, the operation
of the firewall in response to a received message would apply the policy managers before
transmission to a recipient. D. 203 ¶ 13, D. 259 ¶ 13, D. 204-2 at 16, D. 204-6 at 14.
Muldoon is entitled “computerized method and system for managing the exchange and
distribution of confidential documents.” D. 204-3 at 2. Muldoon is directed to a “method of and
system for transmitting a message from a sender to a recipient,” wherein emails are received at an
email server and an internet server remote from the recipient. D. 203 ¶¶ 30-32, D. 259 at 22.
Muldoon also discloses a method wherein “messages to be sent via secure server may be
designated as secure by adding a designator, such as @secure, to the Internet address or URL” and
“[f]rom an external source such as users, secure messages can be transmitted to intranet via secure
server using a similar type of addressing.” D. 204-3 at 37, D. 203 ¶ 33, D. 259 ¶ 33. An email
lacking the designator will be processed to route the email normally. D. 203 ¶ 35, D. 259 ¶ 35, D.
204-4 at 19. Muldoon also discloses alternate approaches to configure the mail template such that
“you might have a confidential check box or you might have a check box that says secure . . . and
by hitting that button or checking off that check box, it will tell that mail environment to route this
particular mail message through the interlink service.” D. 204-3 at 39, D. 203 ¶ 34, D. 259 ¶ 34.
C.
The Parties
The ‘628 patent is assigned to RComm. D. 230-1 ¶ 1. RPost is a wholly owned subsidiary
of RComm. D. 230-1 ¶ 3. RPost offers, among other services, an email service called “Registered
Mail” or “RMail,” which “provides email senders with evidence of delivery, time of delivery, and
exact message content in the form of a Registered Receipt™ email record.” D. 230-1 ¶ 13, D. 261
¶ 13. RComm, the parent company, does not sell any products or services in the United States,
but rather conducts research and development concerning secure messaging technologies and
6
electronic messaging. D. 230-1 ¶¶ 14-15. RPost sells RMail to customers in the United States.
D. 230-1 ¶ 16.
No written license agreement between RComm and RPost regarding the ‘628 patent has
been produced, despite Sophos’ request for the Defendants to produce such an agreement if it
exists. D. 230-1 ¶ 6. Zafar Khan, the CEO of both RComm and RPost, however, stated at his
deposition that RPost is the “exclusive licensee” of the ‘628 patent. D. 231 at 7. Khan could not
recall when the license was granted. D. 231 at 8. Khan could not recall details about the terms of
the license, specifically, whether RPost paid any consideration for the exclusive license to RComm
and what specific rights RPost received under the exclusive license. D. 231 at 14-15. Khan stated
that he believed that the exclusive license agreement was in writing. D. 231 at 7. When asked
whether RComm offered any software services in the United States by means other than RPost,
Khan replied that it may. D. 231 at 10.
Sophos develops “a number of security products for communication endpoint, encryption,
network security, email security, mobile security, unified threat management (“UTM”), and other
products.” D. 221 ¶ 15; D. 252 ¶ 15. Included within Sophos’ product line are the “SG UTM”
product, with a “Fullguard” option; the “XG Firewall” product, also with a “Fullguard option;”
Sophos Email Appliance; Sophos PureMessage; and Reflexion. D. 221 ¶¶ 17-20, 38 D. 252 ¶¶
17-20, 38. Certain of these products contain features that may be enabled by the consumer
including: filtering emails that contain viruses or spam, D. 221 ¶ 21, D. 252 ¶ 21; data leakage
protection, D. 221 ¶ 22, D. 252 ¶ 22; and email encryption, D. 221 ¶ 23, D. 252 ¶ 23. The RPost
email product, unlike the Sophos email product, does not support anti-spam protection, anti-virus
protection, data loss protection, or virtual private networks. D. 230-1 ¶¶ 25-30, D. 261 at 2.
Sophos’ accused products, unlike RPost’s product, does not offer registered email functionality.
7
D. 230-1 ¶¶ 34-36, D. 261 at 2. Sophos sells hardware products that are sold with software,
whereas RPost does not sell hardware. D. 230-1 ¶¶ 32, 33, D. 261 at 2. According to the
Defendants, RPost defines its target market as “secure and verifiable email,” which it defines to
mean the market for “email services that provide content and delivery proof, timestamps, tracking,
electronic signatures on email contracts, or encryption for privacy.” D. 230-1 ¶¶ 35-36, D. 261 at
2. In one analysis of the competitive landscape that the Defendants performed, the Defendants
identified four companies as competitors, none of which were Sophos. D. 231-5 at 13; D. 230-1
¶ 37; D. 261 ¶ 37.
According to expert analysis submitted by Sophos, Sophos competes in a
number of different markets, none of which RPost competes in, and Sophos does not compete in
the market that RPost competes in. D. 230-1 ¶¶ 38-40, D. 261 at 2. The Defendants have not
identified a single customer or sale that RPost has lost to Sophos. D. 230-1 ¶¶ 41-42, D. 261 at 2.
There are several other secure email gateways that compete with Sophos’ accused infringing
products and offer similar services, such as anti-virus, anti-spam, data loss prevention, and email
encryption. D. 230-1 ¶ 44, D. 261 at 2.
The Defendants allege that Sophos has infringed on Claims 14, 19, 24, 26, 27 and 30 of
the ‘628 patent. D. 203 ¶ 2; D. 259 at 2.
V.
Analysis
A.
Standing
A party has standing to sue for infringement of a patent if it is the owner of the patent, the
assignee of the owner, or a licensee with “all substantial rights” in the patent. Sicom Sys., Ltd. v.
Agilent Tech. Inc., 427 F.3d 971, 976 (Fed Cir. 2005). It is the burden of the party bringing the
infringement action to prove that it is standing to sue. Id.
8
Sophos challenges the standing of RPost to pursue its claims concerning the ‘628 patent
against it and seeks summary judgment in its favor. D. 230 at 6-7. In support of this argument, it
points out first, that the Defendants have never produced a written license agreement, and second,
that Khan stated that RComm “may” offer software services in the United States by means other
than RPost. D. 230 at 7. This, however, is not sufficient at the summary judgment stage to show,
as a matter of undisputed fact, that RPost has no standing to bring its claim. Khan testified at his
deposition that RPost has an exclusive license agreement to the ‘628 patent. Even if Sophos
considers that testimony not credible in light of Khan’s inability to provide details regarding that
written agreement and the Defendants’ failure to produce the license agreement, at summary
judgment the Court is required to credit Khan’s statement. Khan’s lack of knowledge regarding
whether RComm offered software services by means other than RPost is similarly unavailing, as
there is no direct support in the record for Sophos’ argument that RComm does in fact license
software services that utilize the ‘628 patent to other entities. The cases cited by Sophos, D. 230
at 6-7, are not to the contrary, as those cases involve the undisputed absence of an exclusive license
agreement, which is not the case here.
Sophos also contends that there is nothing in the record regarding any terms of the license
agreement beyond Khan’s characterization of the agreement as an exclusive license, which Sophos
argues is insufficient for RPost to prove that it has all substantial rights in the patent. D. 230 at 7.
But RPost is a co-plaintiff with the patentee, and “an exclusive licensee that does not have all
substantial rights has standing to sue third parties [] as a co-plaintiff with the patentee.” Textile
Prods., Inc. v. Mead Corp., 134 F.3d 1481, 1484 (Fed. Cir. 1998). Sophos also argues that, if the
license agreement is oral, it would be void under the California statute of frauds because it is a
contract to be performed over a term greater than a year or it is a contract that is too uncertain and
9
indefinite. D. 273 at 12 n.8. The Court, however, may not at this stage infer from the Defendants’
failure to product a written license agreement that any license agreement is not written and only
oral, and thus unenforceable. Additionally, under California law (assuming it applies here), a nonparty, such as Sophos here, to a contract may not raise the statute of frauds to void that contract.
O’Banion v. Paradiso, 61 Cal. 2d 559, 562-63 (1964).
Accordingly, this Court DENIES Sophos’ motion for summary judgment, D. 207, to the
extent that it challenges RPost’s standing to bring infringement claims related to the ‘628 patent.
B.
Invalidity
A patent is “presumed valid,” and the “burden of establishing invalidity of a patent . . .
shall rest on the party asserting such invalidity.” Microsoft Corp. v. I4I Ltd. P’ship, 564 U.S. 91,
95 (2011) (quoting 35 U.S.C. § 282). “A patent is invalid for anticipation if a single prior art
reference discloses each and every limitation of the claimed invention.” Schering Corp. v. Geneva
Pharm., 339 F.3d 1373, 1377 (Fed. Cir. 2003). “Moreover, a prior art reference may anticipate
without disclosing a feature of the claimed invention if that missing characteristic is necessarily
present, or inherent, in the single anticipating reference.” Id. “Anticipation is a question of fact,
including whether or not an element is inherent in the prior art.” Atlas Powder Co. v. Ireco, Inc.,
190 F.3d 1342, 1346 (Fed. Cir. 1999). Here, Sophos contends that the ‘628 patent is invalid for
anticipation where prior art, namely two other patents, disclosed the elements claimed as to the
‘628 patent. The Court must first address the parties’ dispute about the priority date for the ‘628
patent.
1. Priority Date for the ‘628 Patent
Sophos contends that the relevant priority date for the ‘628 patent is July 27, 2000. D. 203
¶ 1. The Defendants, for their part, contend that the relevant priority date is either July 28, 1999,
or December 17, 1999, based on the provisional patents referenced in the ‘628 patent. D. 259 ¶ 1.
10
Sophos responds that the Defendants, in filing an interrogatory, stated that they were “not claiming
a conception and reduction to practice date earlier than” the “filing date of the parent application
of the ‘628 patent – July 27, 2000,” and on that basis defended certain positions they took during
discovery. D. 273 at 5. Additionally, the expert, Dr. Rajeev Surati (“Surati”), upon which the
Defendants rely, stated that “I understand that RPost alleges that all of the claims of the ‘628 patent
were reduced to practice at least as of July 27, 2000.” D. 204-6 at 11. He went on to state that “I
also understand that RPost has not alleged a date of invention earlier than July 27, 2000 though it
reserve its right to do so. Accordingly, I will assume . . . that the priority date . . . is July 27, 2000.”
D. 204-6 at 11-12. Thus, Sophos contends, the Defendants are estopped from asserting a priority
date earlier than July 27, 2000, because it seems inequitable to do otherwise.
However, putting aside whether the Defendants are estopped from asserting a priority date
earlier than July 27, 2000, the Defendants have not succeeded in pointing to a genuine dispute of
material fact regarding the potential for an earlier priority date. Because Sophos has "introduced
sufficient evidence to put at issue whether there is prior art alleged to anticipate the claims being
asserted, prior art that is dated earlier than the apparent effective date of the asserted patent claim,"
the Defendants have "the burden of going forward with evidence and argument to the contrary,"
Tech. Licensing Corp. v. Videotek, Inc., 545 F.3d 1316, 1329 (Fed. Cir. 2008), such as evidence
"either that the prior art does not actually anticipate, or . . . that it is not prior art because the
asserted claim is entitled to the benefit of a filing date prior to the alleged prior art," id. at 1327.
To meet that burden, they must show that “the specification of the provisional [application] must
contain a written description of the invention . . . in such full, clear, concise, and exact terms, to
enable an ordinarily skilled artisan to practice the invention claimed in the non-provisional
application.” Amgen Inc. v. Sanofi, 872 F.3d 1367, 1380 (Fed Cir. 2017) (emphasis in original)
11
(citing Dynamic Drinkware, LLC v. National Graphics, Inc., 800 F.3d 1375, 1378 (Fed Cir. 2015)).
Because Surati assumed that the Defendants would not be relying on the provisional patents for a
priority date, his opinion does not contain any support for their contention now that the provisional
patent applications referenced in the ‘628 patent meet that standard. Nor is there anything else in
the record that would support a finding of a genuine dispute of material fact regarding this issue,
as the only citations to the record made by the Defendants in this regard are citations to the text of
the provisional patent. Thus, the Court accepts that the priority date for the ‘628 patent is July 27,
2000. Consequently, both Dickinson and Muldoon are properly considered prior art.
2. Dickinson
Sophos argues, based on the fully developed record with expert reports from both parties,
that Dickinson discloses every limitation of Claim 14 of the ‘628 patent. D. 202 at 9. It contends
that Dickinson is a means of transmitting a message from a sender to a recipient; that the email
firewall referenced in Dickinson is a server that is remote from the recipient; that the policy
managers referenced in Dickinson perform the task of determination by the server of whether there
is a particular indication present in the message designating the message for special processing
before transmission; and that the email firewall performs the special processing if the indication is
present and do not if the indication is not present. D. 203 at 2-6. In doing so, Sophos cites to the
text of the ‘628 patent, its expert report by Dr. Justin Tygar (“Tygar”), and Surati’s expert report
and deposition. Id.
The Defendants first respond that Dickinson is not “a method of transmitting a message
from a sender to a recipient,” D. 204-1 at 34, but rather a method of selectively preventing
transmission of message. D. 259 ¶ 5, D. 204-6 ¶ 108. The only citation to the record that the
Defendants make in support of this argument is a citation to the text of Dickinson, which states
that a significant advantage of the innovation is the ability to filter selectively or encrypt certain
12
emails, and thus does not support their contention. D. 259 ¶ 5; D. 204-2 at 12 (C: 2 L: 21-33).
The flowchart of Dickinson has a step that states “transmit to specified destination” after the
message moves through prior steps. D. 204-2 at 10. Tygar’s expert report relies upon this figure
as evidence that Dickinson does disclose transmission. D. 205 at 57. To the extent that the
Defendants contend that Dickinson is not a means of transmission because, under some particular
indications, Dickinson would fail to transmit a message and thus would not be “processing the
message by the server in accordance with the special indication,” D. 1-2 at 34, D. 1-2 at 34, that
argument fails because Dickinson discloses some mechanisms of processing the message in
accordance with the special indication that do involve transmission, such as deferring the delivery
of the message, annotating the message, or encrypting the message. D. 203 ¶¶ 20-22, D. 259 ¶¶
20-22.
Second, the Defendants contend that the “particular indications” in Dickinson are not
indications set by senders to instruct the server what actions to take, but are rather rules set by an
administrator applied to messages sent by senders. D. 258 at 14, D. 259 ¶ 14. The Defendants
elaborate that whereas the Dickinson patent imposes rules on users, the ‘628 patent “trusts the
sender to do the right thing.” D. 259 ¶ 14, D. 258 at 14. Surati’s opinion elaborates that Dickinson
“teaches away from” the approach in the ‘628 patent because in Dickinson, “everything is
controlled by the administrator,” and “the user doesn’t get the option to determine how the message
is managed,” whereas the ‘628 patent is “designed to allow the sender to notify the server about
treatment of the outgoing message.” D. 204-6 at 15-16. The Defendants, however, point to no
support for their contention that Claim 14 requires that the user be able to select whether the
message has the particular indication that flags it for special processing or that Claim 14 requires
the user to be able to set the rules regarding which particular indications correspond to which
13
special processing instructions. The language of Claim 14 only speaks to “determining by the
server if there is a particular indication present in the message that identifies the message as
requiring special processing before the message is transmitted to the recipient.” D. 1-2 at 34. To
the extent that the Defendants contend that Figure 3 in the ‘628 patent, D. 204-1 at 11, limits the
scope of Claim 14 in this way, D. 259 at 7, this Court rejected the argument in claim construction
that Figure 3 limited the scope of Claim 14. D. 128 at 11-12. Moreover, the undisputed record
shows that in Dickinson, messages may be subject to a particular action on the basis of the presence
or absence of certain user-selected flags. D. 203 ¶¶ 27-28; D. 259 ¶¶ 27-28; D. 204-2 at 14.
Surati’s opinion does not address the claims in Dickinson related to user-selected flags. D. 204-6
at 14-16. Additionally, “the question whether a reference ‘teaches away’ from the invention is
inapplicable to an anticipation analysis.” Celeritas Techs., Ltd. v. Rockwell Int'l Corp., 150 F.3d
1354, 1361 (Fed. Cir. 1998). Thus, this argument also fails.
Finally, the Defendants argue that in Dickinson, “every email undergoes extra processing
and the only distinction (based on sender address, recipient address, content) is what type of extra
processing (decrypt, encrypt . . . , annotate, queue, block),” whereas in the ‘628 patent, only the
messages with the particular indication go through special processing. D. 259 ¶ 15. In support of
this contention, the Defendants point to two portions of Dickinson: first, figures 6A and 6B, which
indicate that all messages go through the stage called “Decryption required?” and “Encryption
required?” D. 204-2 at 9-10, and second, a portion of the text explaining that “[t]he steps shown
in FIG. 6(b) are performed for each destination specified for a message.” D. 204-2 at 16 (C: 9 L:
46-47). But, even if it is true that every email in Dickinson undergoes some level of extra
processing, that claim would not support the Defendants’ argument that Dickinson fails to
anticipate the element of Claim 14 of “transmitting the message from the server to the recipient
14
through a first route if the message lacks the particular indication.” D. 1-2 at 34. In this Court’s
claim construction decision, the Court clarified that the “first route” need not be any particular
route. D. 128 at 11-12. If every email in Dickinson undergoes some processing, and only some
emails undergo additional processing, then Dickinson still practices this element of Claim 14
because the “first route” as specified in Dickinson may just contain more process than the “first
route” as specified in some particular embodiment of the ‘628 patent. This argument thus fails.
There is no dispute of material fact that Dickinson anticipates Claim 14 of the ‘628 patent.
Sophos similarly contends that Dickinson anticipates the remaining claims of the ‘628
patent. D. 202 at 5-6, 9; D. 203 ¶¶ 24-28. The Defendants make no arguments with respect to
these claims that they did not make with respect to Claim 14, D. 258 at 17, and the arguments they
do make fail for the same reasons explained above. Thus, there is no dispute of material fact that
Dickinson anticipates all the relevant claims of the ‘628 patent.
3. Muldoon
Sophos also contends that Muldoon anticipates every element of Claim 14 of the ‘628
patent. D. 202 at 11. Sophos contends that Muldoon is a method of transmitting a message from
a sender to a recipient via a remote server; that Muldoon discloses determining if there is a
particular indication present that identifies the message as requiring special processing, such as by
using the “@secure” designator; that Muldoon discloses transmitting the message from the server
to the recipient by a first route if the message lacks the @secure or other designator; and that
Muldoon discloses processing the message in accordance with the particular indication of the
@secure or other designator by sending the mail along the secure server route. D. 202 at 11.
The Defendants contend that Muldoon does not disclose a method of “special processing,”
but rather the secure mail feature of Muldoon is simply re-addressing an email to a different
recipient via a change in the address of an email – which is an inherent feature in how email works
15
and thus nothing “special.” D. 258 at 18-21; D. 204-6 at 17-18; D. 259 ¶¶ 33-36. That argument,
however, does not account for the undisputed fact that Muldoon also disclosed another means of
designating which emails are to be sent along the secure server route, beyond re-addressing the
email to a different recipient: the use of a “confidential check box” or a “check box that says
secure.” D. 204-3 at 39, D. 203 ¶ 35, D. 259 ¶ 35. Surati does not address the check box approach
disclosed in Muldoon and thus makes no argument as to why the server readdressing an email
based on a check box (rather than on a different email address) would not constitute special
processing. D. 204-6 at 17-19. Thus, the Defendants’ contention fails. There is no genuine dispute
of fact that Muldoon anticipates Claim 14 of the ‘628 patent.
Sophos similarly argues that Muldoon anticipates Claim 30 and the dependent claims of
Claim 14. D. 202 at 5, 11-12. The Defendants respond that Muldoon does not anticipate Claim
24, Claim 26 and Claim 27 of the ‘628 patent. D. 258 at 21-22. Claim 24 is “[t]he method of
Claim 14, wherein determining if the particular indication is present includes filtering the content
of the message to determine whether a selected term is present in the message.” D. 204-1 at 34.
Claim 26 is “[t]he method of Claim 24, wherein the selected term is a flag.” D. 204-1 at 34. Claim
27 is “[t]he method of Claim 26, wherein the flag is user selectable.” D. 204-1 at 34. The
Defendants argue that Muldoon does not disclose any method for filtering the content of the
message, because “in Muldoon, messages are sent directly to a server, and no further processing
occurs at that server other than the normal actions of the server.” D. 258 at 21. This argument
fails for the same reasons explained above – with respect to the check box embodiment rather than
the @secure in the address line embodiment, sending the email to a different address may be
special processing. The Defendants also contend that Muldoon does not disclose any limitation
wherein the selected term is a “flag,” or the flag is user-selectable. D. 258 at 22. But the
16
Defendants point to no support in the record for the argument that the check box itself is not a flag
and Surati, in his deposition, explained that a flag could be an indication in the header of a message
or a button selected by a user. D. 204-4 at 14. Thus, there is no genuine dispute of fact that
Muldoon anticipates the remaining relevant claims of the ‘628 patent.
For all of the aforementioned reasons, the Court concludes that the ‘628 patent is invalid.
VI. Conclusion
For the foregoing reasons, the Court DENIES Sophos’ motion for summary judgment with
respect to standing, D. 207, ALLOWS Sophos’ motion for summary judgment on patent validity,
D. 201, finding the ‘628 patent invalid, and DENIES as moot the remaining summary judgment
motions, D. 207 (as to lost profits), D. 221, D. 251.2
So Ordered.
/s/ Denise J. Casper
United States District Judge
2
The Court DENIES Sophos’ motion to strike, D. 182, as moot.
17
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?