Prism Technologies v. Adobe Systems Incorporated et al
Filing
188
MEMORANDUM AND ORDER before the Court to construe two patent claim terms pursuant to Markman v. Westview Instruments, Inc., 517 U.S. 370 (1996). IT IS ORDERED that "hardware key" and "access key" are construed to mean "An external hardware device or object from which the predetermined digital identification can be read." Ordered by Senior Judge Lyle E. Strom. (MKR)
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEBRASKA
PRISM TECHNOLOGIES, LLC,
)
)
Plaintiff,
)
)
v.
)
)
ADOBE SYSTEMS, INCORPORATED; )
AUTODESK, INC.; McAFEE, INC., )
NATIONAL INSTRUMENTS
)
CORPORATION; SAGE SOFTWARE,
)
INC.; SYMANTEC CORPORATION;
)
THE MATHWORKS, INC.; and
)
TREND MICRO INCORPORATED,
)
)
Defendants.
)
______________________________)
I.
8:10CV220
MEMORANDUM AND ORDER
INTRODUCTION
This matter is before the Court to construe two patent
claim terms pursuant to Markman v. Westview Instruments, Inc.,
517 U.S. 370 (1996).
Plaintiff Prism Technologies, LLC (“Prism”)
has alleged infringement of its patent, U.S. Patent No. 7,290,288
(“‘288 patent”; Filing No. 1-1), by defendants Adobe Systems,
Inc., Autodesk, Inc., McAfee, Inc., National Instruments Corp.,
Sage Software, Inc., Symantec Corp., The Mathworks, Inc., and
Trend Micro, Inc. (collectively, “defendants”).
On December 1,
2010, the Court ordered a briefing schedule to address the
construction of the claim terms “hardware key” and “access key,”1
as used in the ‘288 patent (Filing No. 159).
1
On April 11, 2011,
The parties agree “hardware key” and “access key” have the
same meaning within the context of the ‘288 patent. For ease of
reference, the Court hereafter will refer only to “hardware key.”
the Court conducted a Markman hearing for the purpose of
construing “hardware key”2 (Filing No. 185).
After reviewing the
‘288 patent, briefs, evidentiary submissions, oral arguments, and
the applicable law, the Court construes “hardware key” to mean:
An external hardware device or
object from which the predetermined
digital identification can be read.
II.
BACKGROUND
The ‘288 patent, entitled “Method and System for
Controlling Access, by an Authentication Server, to Protected
Computer Resources Provided via an Internet Protocol Network,”
issued on October 30, 2007, from an application filed August 29,
2002.
Stated generally, the ‘288 patent describes a security
system for computer networks through a process known as twofactor authentication.
Two-factor authentication provides
security for electronic content by requiring a computer user to
input identifying information known to the user (e.g., username
and password) and to attach a hardware key (e.g., CD-ROM,
magnetic card, smart card, biometric reader) to the user’s
computer identifying the user to the computer system containing
the protected content.
Once the computer system containing the
2
The parties dispute the meaning of other claim terms in
the ‘288 patent, but it is possible the Court’s construction of
“hardware key” may be dispositive of the case, making it
unnecessary to construe the other disputed terms.
-2-
protected content authenticates the user’s identity, the system
grants the user access to the protected content.
Prism contends the ‘288 patent is a continuation-inpart of another Prism patent, U.S. Patent No. 6,516,416 (“‘416
patent”), entitled “Subscription Access System for Use with an
Untrusted Network,” issued on February 4, 2003, from an
application filed June 11, 1997 (Filing No. 173-3, Defendants’
Ex. B).
This would make the ‘416 patent a “parent patent” and
the ‘288 patent a “child patent.”
The ‘416 patent also uses the term “hardware key.”
In
previous litigation initiated in 2005 in the District of Delaware
between Prism and other defendants (“Delaware case”), the
district court construed the term “hardware key”3 in the context
of the ‘416 patent.
The district court construed “hardware key”
in the Delaware case to mean “external hardware device or object
from which the predetermined digital identification can be read”
(Filing No. 173-6, Exhibit E (Order (“Delaware Order”), Prism
Techs. LLC v. Verisign, Inc., No. 05-214-JJR, Filing No. 440, at
3 (D. Del. Apr. 2, 2007))).
The district court in the Delaware
case also construed other terms in the ‘416 patent.
Prism
appealed the district court’s claims construction order, which
3
The district court in the Delaware case also construed
“access key.” As is the case here, the parties agreed in the
Delaware case that “hardware key” and “access key” are synonymous
(Delaware Memorandum Opinion, Filing No. 173-5, at 21).
-3-
the Federal Circuit affirmed without comment.
Prism Techs. LLC
v. Verisign, Inc., 263 F. App’x 878 (Fed. Cir. 2008).
After the
Delaware district court entered its claim construction memorandum
and order, Prism disclosed these documents from the Delaware case
to the Patent and Trademark Office (“PTO”) (Information
Disclosure, Filing No. 173-17, Exhibit P, at 2).
In December 2008, Prism filed a cause of action in the
District of Nebraska against Research in Motion, Ltd. for
infringement of the ‘288 patent (“RIM case”).
The parties in the
RIM case identified “hardware key” as one of the terms needing
construction.
In its claims construction brief, Prism recognized
that the ‘416 patent and ‘288 patent share many common terms,
including “hardware key” (Prism’s Claim Construction Brief in RIM
Case, Filing No. 173-10, at 10).
Prism acknowledged the Delaware
case’s claims construction decision was “highly relevant” to the
‘288 patent’s construction because Prism had provided a copy of
the Delaware case’s claims construction decision to the PTO
during the prosecution of the ‘288 patent (Id. at 11).
Prism
proposed in the RIM case “that common terms of the ‘288 and ‘416
patents be given the same construction” (Id. at 12).
Despite
this and other similar statements Prism made in its claims
construction brief, however, Prism’s proposed construction for
“hardware key” in the RIM case was not identical to the
construction given in the Delaware case.
-4-
Instead, Prism’s
proposed construction for “hardware key” was “external hardware
device or object from which a digital identification can be
generated, derived or read” (Id. at 14).
This Court never
construed any of the ‘288 patent’s terms in the RIM case as the
parties settled the matter prior to the Markman hearing.
Prism brought the current action against defendants on
June 8, 2010 (Complaint, Filing No. 1).
III.
STANDARD OF REVIEW
“[T]he claims of a patent define the invention to which
the patentee is entitled the right to exclude.”
Phillips v. AWH
Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc).
In
construing a claim term, the Court must give each term its
“ordinary and customary meaning, as [it] would be understood by
one of ordinary skill in the art in question at the time of the
invention.”
Intervet, Inc. v. Merial Ltd., 617 F.3d 1282, 1287
(Fed. Cir. 2010) (citing Phillips, 415 F.3d at 1312-13).
While
the ordinary meaning of a claim term may be readily apparent to a
lay person, often the understanding of a claim term by a person
of skill in the art in question is not readily apparent.
O2
Micro Int’l Ltd. v. Beyond Innovation Tech. Co., 521 F.3d 1351,
1360 (Fed. Cir. 2008).
When a claim term’s meaning is not readily apparent,
courts look to “‘those sources available to the public that show
what a person of skill in the art would have understood [the
-5-
disputed claim term] to mean.’”
Phillips, 415 F.3d at 1314
(quoting Innova/Pure Water, Inc. v. Safari Water Filtration Sys.,
Inc., 381 F.3d 1111, 1116 (Fed. Cir. 2004)).
Sources available
to the public include (1) the claims’ words, (2) the patent’s
specifications, (3) the patent’s prosecution history, and (4)
extrinsic evidence pertaining to relevant scientific principles,
such as a technical term’s meaning and the state of the art.
Phillips, 415 F.3d at 1314; Innova, 381 F.3d at 1115; Vitronic
Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996).
The first three categories are known as intrinsic evidence.
Because intrinsic evidence provides the “most significant source
of the legally operative meaning of disputed claim [terms],”
courts should consider intrinsic evidence first when construing
claim terms.
Vitronics, 90 F.3d at 1582.
By contrast, extrinsic
evidence generally is viewed as “less reliable” than intrinsic
evidence, though it still can be useful to claim construction.
Phillips, 415 F.3d at 1318.
Regarding the various types of intrinsic evidence, each
can provide different, but important guidance for interpreting a
claim term’s meaning.
The claims themselves can provide
substantial guidance as to a term’s meaning, and it is proper to
begin claims analysis by looking at the claim language itself.
Phillips, 415 F.3d at 1314; Innova, 381 F.3d at 1115.
Because
claim terms are typically used consistently throughout a patent,
-6-
a term’s usage in one claim can provide insight to the same
term’s meaning in another claim.
Id.
The other intrinsic evidence sources -- the
specifications and the prosecution history -- are also important
to interpreting a claim term’s meaning.
The specifications,
informed as needed with the prosecution history, provide “the
best source for understanding a technical term.”
Id. at 1315.
The specifications provide the claimed invention’s full and exact
description.
§ 112).
Phillips, 415 F.3d at 1316 (citing 35 U.S.C.
The specifications provide context to the claims and may
be used to better understand a claim term’s meaning.
F.3d at 1116.
Innova, 381
“In most cases, the best source for discerning the
proper context of claim terms is the patent specification wherein
the patent applicant describes the invention.”
Metabolite Labs.,
Inc. v. Lab. Corp. of Am. Holdings, 370 F.3d 1354, 1360 (Fed.
Cir. 2004).
Often, the specifications are “dispositive” of a
disputed term’s meaning.
Vitronics, 90 F.3d at 1582.
The prosecution history is also important to
deciphering a claim term’s meaning.
Hynix Semiconductor, Inc. v.
Rambus, Inc., __ F.3d __, Nos. 2009-1299 and 2009-1347, 2011 WL
1815978 (Fed. Cir. May 13, 2011) (citing Phillips, 415 F.3d at
1314).
The prosecution history includes “the complete record of
proceedings before the PTO and includes the prior art cited
during the examination of the patent.”
-7-
Phillips, 415 F.3d at
1317.
The record before the PTO, in particular, is often
“critical[ly] significan[t]” to ascertaining a claim term’s
meaning.
Vitronics, 90 F.3d at 1582.
IV.
ANALYSIS
The parties offer similar, but not identical proposed
constructions for “hardware key:”
Prism’s Proposed Construction
Defendants’ Proposed
Construction
External hardware device or
object from which [1] a
digital identification can be
[2] generated, derived or
read.
An external hardware device or
object from which [1] the
predetermined digital
identification can be [2]
read.
(Prism’s Claim Construction Brief, Filing No. 178, at 3
(bracketed numbers and emphasis added); Defendants’ Claim
Construction Brief, Filing No. 172, at 15 (bracketed numbers and
emphasis added)).
For ease of reference, the Court will
reference the disputed text denoted by “[1]” as the
“predetermined issue” and the disputed text denoted by “[2]” as
the “read issue.”
Defendants’ proposed construction is identical
to the Delaware district court’s construction of “hardware key.”
Prism’s proposed construction is identical to its proposed
construction in the RIM case.
Defendants argue their proposed construction of
“hardware key” is better supported because it is identical to the
Delaware district court’s construction of the same term in the
-8-
‘416 patent, which is a parent patent to the ‘288 patent.
Defendants also contend their proposed construction is consistent
with the ‘288 patent’s intrinsic evidence.
Defendants argue the
“digital identification” referenced in the “hardware key”
construction must be “predetermined” because the authentication
server protecting the electronic content cannot authenticate a
client computer user’s identity unless it makes a comparison
between the hardware key’s digital identification and the stored
authorization data from the clearinghouse database.
Defendants
also take issue with Prism’s proposed construction because the
digital identification on the hardware key must be “read,” and
Prism’s proposed construction allows for possibilities where the
digital identification is not “read” from the hardware key.
Prism argues its proposed construction more closely
follows the ‘288 patent’s claim language and argues the common
terms of the ‘288 and ‘416 patent need not be identically
construed because they are different patents.
Prism points out
that the ‘288 patent’s claims and specifications do not use the
word “predetermined” when referencing the hardware key’s digital
identification.
Further, Prism argues its proposed construction
of “generated, derived or read” is proper because “generated” and
“derived” are words used in the patent claims.
The Court finds defendants’ proposed construction is
supported and adopts that construction.
-9-
A.
Predetermined Issue
The inclusion of “predetermined” in the construction of
“hardware key” is proper because it is supported by the ‘288
patent’s claims, specifications, and prosecution history.
The
‘288 patent’s claims contemplate a comparison between the
hardware key’s digital identification and the authorization data
stored on the clearinghouse database.
116, 117, 150, 185, 186, 187.
See Claims 1, 31, 62, 87,
If the hardware key’s digital
identification is not predetermined, then the authentication
server would not be able to compare the hardware key’s digital
identification and the authorization data stored on the
clearinghouse database.
Without such a comparison,
authentication of the user’s identity would not be possible.
Thus, the ‘288 patent’s claims support a conclusion that the
hardware key’s digital identification must be “predetermined.”
Similarly, the ‘288 patent’s specification support the
inclusion of “predetermined.”
Like the claims, the
specifications make repeated references to comparisons made
between the hardware key’s digital identification and the stored
authorization information on the clearinghouse database.
example, the specifications state:
For
“[T]he account holder
authentication server accesses the account holder’s information
from its database and authenticates the login parameters.
In
using two or three factor authentication, this authentication
-10-
involves the comparison of the digital ID.”
17:12-16 (emphasis added).
‘288 Patent at
Also, in describing two-factor
authentication with a hardware key, the ‘288 patent states:
“[T]wo factor authentication could be provided by some other
physical device, such as a credit card, a key, an ATM card, or
the like which is known to have been assigned and given to a
specific person.”
Id. at 19:50-53 (emphasis added).
These
examples and others found in the specifications support a
conclusion that the hardware key’s digital identification must be
“predetermined.”
See also id. at 2:9-13, 13:37-43. 14:28-38,
16:60-67, 22:6-23.
The prosecution history also supports the inclusion of
“predetermined” in the construction of “hardware key.”
Prism
contends the ‘288 patent is a continuation-in-part of the
previous ‘416 patent.
During the prosecution of the ‘288 patent,
Prism provided the PTO with copies of the Delaware district
court’s claims construction memorandum and order, thus making
those items part of the ‘288 patent’s prosecution history.
Prior
constructions of identical claim terms in related patents are
highly relevant to construing claim terms.
NTP, Inc. v. Research
in Motion, Ltd., 418 F.3d 1282, 1293 (Fed. Cir. 2005) (“Because
NTP’s patents all derive from the same parent application and
share many common terms, we must interpret the claims
consistently across all asserted patents.”); Omega Eng’g, Inc. v.
-11-
Raytek Corp., 334 F.3d 1314, 1333 (Fed. Cir. 2003) (“[W]e
presume, unless otherwise compelled, that the same claim term in
the same patent or related patents carries the same construed
meaning.”); Dayco Prods., Inc. v. Total Containment, Inc., 258
F.3d 1317, 1326 (Fed. Cir. 2001) (“Since the structure and
wording of the ‘752 and ‘822 patent claims is similar to the
structure and wording of the ‘050 and ‘023 patent claims, we see
no reason to construe the claims of the former two patents more
narrowly than those of the latter two patents.”); Jonsson v.
Stanley Works, 903 F.2d 812, 818 (Fed. Cir. 1990) (“Hence, the
prosecution history of the ‘251 patent and the construction of
the term ‘diffuse light’ contained in that patent, is relevant to
an understanding of ‘diffuse light’ as that term is used in the
‘912 patent.”).
Because “hardware key” was construed in the ‘288
patent’s parent (i.e., the ‘416 patent) to include a
“predetermined” digital identification, the prosecution history
of the ‘288 patent supports a conclusion that the construction of
“hardware key” should include “predetermined.”
The ‘288 patent’s intrinsic evidence supports including
“predetermined” in the construction of “hardware key.”
A person
or ordinary skill in the art would understand “hardware key” to
include “predetermined,” and the Court will construe the claim
term as such.
-12-
B.
Read Issue
Regarding the read issue, the Court finds Prism’s
proposed construction is improper and defendants’ proposed
construction better explains how a person of ordinary skill in
the art would understand “hardware key” to mean.
Prism’s
proposed construction includes the terms “generate” and “derive,”
which are terms found in the ‘288 patent’s claims.
See ‘288
Patent, Claims 1, 31, 62, 76, 87, and 116 (generating); Id.,
Claims 117, 150, 166, 167, 169, 171, 176, 185, 186, and 187
(deriving).
However, Prism’s proposed construction of
“generated, derived or read” does not accurately portray the ‘288
patent’s invention.
Prism’s inclusion of “or” in its proposed
construction implies there are situations when the hardware key’s
digital identification may be “generated” or “derived” but not
“read.”
This cannot be the case because the intrinsic evidence
of the ‘288 patent clearly requires the hardware key’s digital
identification to be “read.”
Through identifying a user’s identity with two-factor
authentication, a comparison is made between the hardware key’s
digital identification and the authorization data stored on the
clearinghouse database.
In order to make the authentication
comparison, the digital identification must be read from the
hardware key.
The structure of the ‘288 patent’s claims imply
that the hardware key’s digital identification must be “read” in
-13-
order to make the authentication comparison.
The specifications,
which use the term “read” in relation to the hardware key’s
digital identification, also support the conclusion that the
digital identification must be “read.”
Id. at 5:44, 7:52, 14:31,
16:65, and 18:35.
The prosecution history provides further support for a
“read” requirement.
Despite the ‘416 patent’s use of the term
“generate” in its claims, the Delaware district court construed
“hardware key” to mean that the digital identification is “read.”
Compare ‘416 patent, Claims 1 and 13 (using “generate” in the
context of “hardware key”) with Delaware Order at 3 (“‘Hardware
Key’ is construed to mean ‘external hardware device from which
the predetermined digital identification can be read.’”).
Further, given that the ‘288 patent and ‘416 patent are related
patents sharing identical terms, the Delaware district court’s
use of “read” in its construction of “hardware key” lends
substantial support to making an identical construction in this
case.
NTP, 418 F.3d at 1293; Omega Eng’g, 334 F.3d at 1333;
Dayco Prods., 258 F.3d at 1326; Jonsson, 903 F.2d at 818.
Because of these intrinsic sources, the Court rejects Prism’s
proposed construction regarding the read issue and will not
include “generated” or “derived” in the construction of “hardware
key.”
-14-
IT IS ORDERED that “hardware key” and “access key” are
construed to mean “An external hardware device or object from
which the predetermined digital identification can be read.”
DATED this 1st day of June, 2011.
BY THE COURT:
/s/ Lyle E. Strom
____________________________
LYLE E. STROM, Senior Judge
United States District Court
-15-
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?