Crypto Research, LLC v. Assa Abloy, Inc. et al

Filing 26

ORDER denying 21 Motion to Dismiss for Failure to State a Claim: For the reasons set out in the associated Memorandum Decision and Order, the defendants' motion to dismiss is denied. Ordered by Judge Ann M Donnelly on 2/17/2017. (Goeke, Justine)

Download PDF
UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK --------------------------------------------------------------- X : CRYPTO RESEARCH, LLC, : Plaintiff, : : MEMORANDUM DECISION AND ORDER : - against - : ASSAY ABLOY, INC. and HID GLOBAL CORPORATION, : 16 Civ. 1718 (AMD) (RER) : Defendants. : --------------------------------------------------------------- X ANN DONNELLY, District Judge. In this patent infringement action, the plaintiff alleges that the defendants, Assay Abloy, Inc. and HID Global Corporation, directly, indirectly, and willfully infringed asserted claims in three patents assigned to the plaintiff by inventor Dr. Bjorn Markus Jakobsson: U.S. Patent No. 8,086,866 (the ’866 Patent), United States Patent No. 8,516,262 (the ’262 Patent), and United States Patent No. 8,990,576 (the ’576 Patent) (collectively the Patents-in-Suit). The defendants move to dismiss, claiming that the patents are directed to subject matter that is not patenteligible, and that the complaint fails to state a claim for which relief can be granted. The plaintiff opposes. I heard oral argument on February 15, 2017. For the reasons set out below, the defendants’ motion to dismiss is denied. 1 BACKGROUND A. Background of the Patented Concept1 The United States Patent and Trademark Office issued the ’866 Patent, the ’262 Patent, and the ’576 Patent, entitled “Methods and Apparatus for Efficient Computations of One-Way Chains in Cryptographic Applications,” on December 27, 2011, August 20, 2013, and March 24, 2015, respectively. The Patents-in-Suit relate generally to the field of cryptography, a field of mathematics targeted to the secure sharing of information. Applications include, among other things, encryption and decryption, digital signatures, and device authentication. Here, the Patents-inSuit address a technique for reducing the computation difficulty and storage capacity demands in using one-way chains on “lightweight” processing devices, like mobile telephones and smartcards.2 The Patents-in-Suit include apparatus, computer-readable medium, and method claims. By way of background, a one-way function refers to a scheme that is easy to compute but hard to invert.3 For some cryptographic applications, it is advantageous to use a one-way chain. A chain in this context refers to a series of values, which may be used to “increment time.” However, the conventional use of a one-way chain necessitates either storage of all values or computation by an iterated application of the function. Thus, if no values are stored, then the computation requires an amount of work proportional to the length of the chain. This creates significant storage and computation demands.                                                              1 Discussion of the patented concept is taken from the descriptions and claims of the ’866 patent. “Smartcard” is a term to describe a credit card, which looks like an ordinary credit card, but contains a microprocessor. 3 Said another way, a one-way function is a function f, for which a person can easily find the value y in y=f (x), if the value of x is provided; but that it is difficult to find the value of x, given only the value of y. 2 2 The Patents-in-Suit describe a method for finding values in a one-way chain that facilitates computation of other values in a one-way chain, and thus reduces the necessary storage or computation. The patented approach is to use “helper values” or “pegs” to reduce the computation requirements, and to move the pegs to appropriate positions in the chain, so that the efficiency gains are repeated for each chain output value. Below, Figure 2B is an example oneway chain computation process consistent with the patented method: Claim 1 of the ’866 patent reads: 1. A method implemented by a processor, the processor being coupled to a memory, the memory having a designated amount of storage available for storing values of a oneway chain, the designated amount of available storage being less than that required to store simultaneously all of the values of the one-way chain, the method comprising the steps of: storing in the memory a subset of the values of the one-way chain as helper values for facilitating computation of other values of the one-way chain not in the subset, the subset of values of the one-way chain comprising a plurality of designated nonconsecutive values of the one-way chain; utilizing one of the values in the subset of values to compute one of the other values of the one-way chain not in the subset; 3 generating a cryptographic output determined by the computed value not in the subset; and updating the stored subset of values of the one-way chain so as to replace at least one of the helper values with a new helper value not previously part of the subset. (’866 Patent, cl. 1.) To the extent that this patented method improves the storage and computational efficiency of a one-way chain computation process, it also increases the efficiency of any application that uses one-way chain computation. However, nothing in the claims or patent descriptions limits the implementation of the method to a specific type of device. B. Allegations in the Complaint According to the plaintiff, the defendants’ CoreStreet-branded and Activ-Identitybranded products—which the defendants “make[], use[], offer[] to sell, or sell[]”— infringed the Patents-in-Suit,4 in that the products, upon information and belief, provided certificate validation features “in part through the use of efficient one-way chain computation techniques of the type developed by Dr. Jakobsson and described by the Patents-in-Suit.”5 (Compl. ¶ 20.) The plaintiff concedes that it did not reverse engineer the CoreStreet and ActivIdentity products in order to establish that they used the computation technique covered by the PatentsIn-Suit; according to the plaintiff, the CoreStreet and ActivIdentity products were sold subject to an agreement prohibiting buyers from reverse engineering the products. (Compl. ¶ 28.) In addition to the direct infringement claim, the plaintiff brings claims for indirect infringement. The plaintiff argues that by advertising, selling, licensing, or supporting the products, the defendants induced others to infringe the Patents-in-Suit. (Compl. ¶¶ 39, 48, 60.)                                                              4 The allegedly infringing CoreStreet-branded products include the “CoreStreet Validation Suite,” the “CoreStreet Validation Authority,” the “CoreStreet Tactical Validation Authority,” and the “CoreStreet Path Builder.” The allegedly infringing ActivIdentity-branded products include the “ActivID® Validation Authority,” the “ActivID® Tactical Validation Authority,” and the “ActivID® Path Builder.” (Compl. ¶ 17.) At oral argument, the plaintiff clarified that the ActivIdentity-branded products and the CoreStreet-branded products were components in the ASSA Validation Products and the HID Validation Products, referred to in the complaint. 5 At oral argument, the plaintiff’s counsel explained that certificate validation is one type of cryptographic application. 4 Additionally, the plaintiff contends that by selling the products, the defendants contributed to the infringement of the Patents-in-Suit by customers and end-users, who use the CoreStreet and ActivIdentity products for certificate validation. (Compl. ¶¶ 37, 49, 61.) The plaintiff alleges upon information and belief that the defendants’ ActivIdentity and CoreStreet products “have no substantial use outside of the context of certificate validation, which functionality is implemented in such products using efficient one-way chain computation techniques of the type . . . described and claimed in the Patents-in-Suit.” (Compl. ¶ 31.) Finally, the plaintiff contends that the defendants’ infringement was willful under two separate theories. First, the plaintiff points out that four patents,6 referred to in this memorandum as the ASSA Patents—for which the defendants’ parent company, ASSA Abloy AB, is the current assignee—acknowledge that the techniques developed by Dr. Jakobsson provide a “surprising time/storage tradeoff.” (Compl. ¶ 13.) Thus, according to the plaintiff, the defendants knew or should have known that their products infringed the Patents-in-Suit. Second, the plaintiff maintains that the defendants knew of the specification and issued claims of the Patents-in-Suit, because the plaintiff sent the defendants letters in February, May, and December of 2015, identifying the Patents-in-Suit, the citations to Dr. Jakobsson’s work in the ASSA Patents, and “suggestions in one or more of the ASSA Patents to utilize efficient oneway chain computation techniques of the type developed by Dr. Jakobsson and described and claimed in the Patents-in-Suit.” (Compl. ¶¶ 23–25.) In the May and December, 2015 letters, the plaintiff specifically asked whether the defendants’ products “incorporated techniques based on the aforementioned ‘surprising time/storage tradeoff’ attributed to Dr. Jakobsson in one or more                                                              6 Those patents are U.S. Patent No. 7,353,396 (the ’396 patent), U.S. Patent No. 8,171,524 (the ’524 patent), U.S. Patent No. 8,732,457 (the ’457 patent), and U.S. Patent No. 9,230,375 (the ’375 patent) (collectively the ASSA Patents).   5 of the ASSA Patents.” (Compl. ¶ 26.) According to the plaintiff, the defendants did not respond. (Compl. ¶ 27.) C. Procedural History The plaintiff filed this action on April 8, 2016 to enjoin infringement and obtain damages for the defendants’ alleged infringement of claims 1, 2, 4, 6, 9, 10, 12, 14 and 17-19 of the ’866 Patent; claims 1, 2, 4, 6, 9, 10, 12, 14 and 17 of the ’262 Patent; and claims 1-4, 6, 9 and 13-20 of the ’576 Patent. (See Compl. ¶¶ 35, 47, 59.) The defendants answered and sought a pre-motion conference regarding their anticipated motion to dismiss on June 16, 2016. (ECF Nos. 14, 15.) After a pre-motion conference on July 7, 2016, the defendants moved to dismiss the complaint. I heard oral argument on February 15, 2017. 7 For the reasons set out below, the defendants’ motion to dismiss is denied. DISCUSSION A. Patent-Eligibility of the Subject Matter Under 35 U.S.C. § 101 The defendants move to dismiss the complaint on the grounds that the Patents-in-Suit are invalid for failing to claim patent-eligible subject matter. See 35 U.S.C.A. § 101. Patent validity under Section 101 is a question of law. See DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1255 (Fed. Cir. 2014). Because patent-eligibility under Section 101 is a threshold question, it may be considered properly on the pleadings. See In re TLI Commc’ns LLC Patent Litig., 823 F.3d 607 (Fed. Cir. 2016) (concluding patented process was abstract, and thus patent-ineligible, on a Rule 12(b)(6) motion to dismiss); Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709 (Fed. Cir. 2014) (finding patented material ineligible for protection on a Rule 12(b)(6) motion to dismiss). Additionally, under certain circumstances, the court may                                                              7 The lawyers for both parties were well-prepared and effective. Oral argument proved helpful in clarifying both the complicated subject matter and the parties’ positions. 6 determine Section 101 validity prior to formal claim construction. Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat. Ass’n, 776 F.3d 1343, 1349 (Fed. Cir. 2014) (“Although the determination of patent eligibility requires a full understanding of the basic character of the claimed subject matter, claim construction is not an inviolable prerequisite to a validity determination under § 101.”). The plaintiff contends that I should apply the presumption of validity, and impose upon the defendants the “burden of establishing invalidity of a patent,” 35 U.S.C. § 282, by clear and convincing evidence. (Pl.’s Mem at 6–7 (citing MultimediaPlus, Inc. v. Playerlync, LLC, No. 14-CV-8216, 2016 WL 4074439, at *2 (S.D.N.Y. July 29, 2016)).) The defendants oppose the application of the “clear and convincing” standard to the Section 101 inquiry. (Defs.’ Mem. at 8 (ECF No. 21-1).) I agree with the defendants that the “clear and convincing” standard has no place in resolving a Rule 12 motion, which was brought on the basis that the patent recites ineligible subject matter. In general, courts do not consider evidence outside the pleadings in resolving a motion to dismiss or for judgment on the pleadings. Thus, application of the “clear and convincing standard”—a burden of proof—is not logically sound. See Modern Telecom Sys. LLC v. Earthlink, Inc., No. SA CV 14-0347-DOC, 2015 WL 1239992, at *7 (C.D. Cal. Mar. 17, 2015). This view is consistent with the weight of authority, which suggests that the presumption of validity does not apply in the Section 101 context. See Ultramercial, 772 F.3d at 720–21 (Mayer, J., concurring) (“Although the Supreme Court has taken up several section 101 cases in recent years, it has never mentioned—much less applied—any presumption of eligibility. The reasonable inference, therefore, is that while a presumption of validity attaches in many contexts 7 . . . no equivalent presumption of eligibility applies in the section 101 calculus.”); OpenTV, Inc. v. Apple, Inc., No. 14-CV-01622-HSG, 2015 WL 1535328, at *3 (N.D. Cal. Apr. 6, 2015) (declining to apply presumption of eligibility to Section 1010 consideration); California Inst. of Tech. v. Hughes Commc’ns Inc., 59 F. Supp. 3d 974, 979 n.6 (C.D. Cal. 2014) (“This Court believes that the clear and convincing evidence standard does not apply to § 101 analysis, because § 101 eligibility is a question of law.”); Modern Telecom Sys., 2015 WL 1239992, at *7 (“clear and convincing evidence standard is not necessarily applicable in the context of determining patent-eligibility under § 101, which is a question of law”); but see Easyweb Innovations, LLC v. Twitter, Inc., No. 11-cv-4550-JFB-SIL, 2016 WL 1253674, at *25 (E.D.N.Y. Mar. 30, 2016) (applying validity presumption to Section 101 inquiry). Moreover, although the Supreme Court has considered many Section 101 cases in the past few years, it has not applied the “clear and convincing” standard in evaluating whether a claim is patent eligible pursuant to Section 101. See Alice Corp. Pty. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014); Ultramercial, 772 F.3d 709; see also OpenTV, Inc., 2015 WL 1535328, at *3 (collecting cases). The defendants, as the parties moving to dismiss, still bear the burden of demonstrating that the claims are not patent eligible under Section 101. In evaluating whether the claims are patent-eligible, I construe the claims in a “manner most favorable” to the plaintiff. See Content Extraction & Transmission, 776 F.3d at 1349. Under Section 101 of the Patent Act, the ambit of patentable discoveries includes “any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof.” 35 U.S.C.A. § 101. However, it is well established that “this provision contains an important implicit exception: Laws of nature, natural phenomena, and abstract ideas 8 are not patentable.” Alice Corp., 134 S. Ct. at 2354 (citation omitted); see also Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S. Ct. 1289, 1293, (2012). The Supreme Court recently reaffirmed the two step analysis set out in Mayo for “distinguishing patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim patent-eligible applications of those concepts.” Alice Corp., 134 S. Ct. at 2355. Specifically, the court must first determine whether the claims at issue are directed to laws of nature, natural phenomena, or abstract ideas. Ultramercial, 772 F.3d at 714. If so, the court must consider whether the claims—both individually and as an ordered combination—include an element that is sufficient to transform the nature of the claim into a patent-eligible application. Id.; Alice Corp., 134 S.Ct. at 2355; Mayo 132 S.Ct. at 1297–98. The Supreme Court has cautioned that courts should “tread carefully in construing” the exceptions to Section 101 “lest [they] swallow all of patent law.” Alice Corp., 134 S. Ct. at 2354 (citation omitted). This admonition reflects that “[a]t some level, all inventions . . . embody, use, reflect, rest upon, or apply laws of nature, natural phenomena, or abstract ideas.” Alice Corp., 134 S. Ct. at 2354 (internal quotation marks and citation omitted); see also Ultramercial, 772 F.3d at 715 (use of an advertisement as currency was an abstract idea). In determining whether the claims of the Patents-in-Suit are directed to an abstract idea— the first step of the Alice analysis—the court must identify the purpose of the claims, which is crucial to a meaningful resolution of the Section 101 inquiry. California Inst. of Tech., 59 F. Supp. 3d at 991; see also Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1337 (Fed. Cir. 2016) (describing claims at too high a level of abstraction “and untethered from the language of the claims all but ensures that the exceptions to § 101 swallow the rule.”); cf. Diamond v. Diehr, 450 U.S. 175, 189 n. 12 (1981) (overgeneralizing claims, “if carried to its extreme, make[s] all 9 inventions unpatentable because all inventions can be reduced to underlying principles of nature which, once known, make their implementation obvious”). In this case, the parties disagree about the nature of the claims of the Patents-in-Suit. The defendants characterize the patented ideas as “directed to computing values of a one-way chain,” (Defs.’ Mem. at 15 (ECF No. 21-1)), while the plaintiff maintains that the claims: recite[] a method implemented by a particular type of computer, namely a processor coupled to a memory having a designated amount of storage available for storing values of a one-way chain, where the designated amount of available storage is less than that required to store simultaneously all of the values of the one-way chain. Claim 1 provides improvements in the functionality of that computer, through the particular combination of method steps recited, including storing, utilizing and updating of helper values. Such a combination of limitations was not known in the prior art. (Pl.’s Mem. at 8 (ECF No. 22).) For purposes of the first step of the Alice inquiry, it is sufficient to say that the claims of the Patents-in-Suit are drawn to computation of values in a one-way chain by storing, using, and updating helper values. While the complaint lists allegedly infringing claims from the Patents-in-Suit, the parties do not distinguish meaningfully between the claims in setting out their characterizations of the claims. The Federal Circuit has held that the district court need not address each claim of the asserted patents individually. Content Extraction & Transmission, 776 F.3d at 1348. Instead, if the district court determines that the claims are substantially similar and linked to the same abstract idea, the court may consider a representative claim. Id. In this case, while the Patentsin-Suit recite apparatus, computer-readable medium, and method claims, in practical effect, the claims cover the same concept related to the efficient computation of hash values in a one-way chain. Consequently, the claims warrant similar substantive treatment. CLS Bank Int’l v. Alice Corp. Pty., 717 F.3d 1269, 1288 (Fed. Cir. 2013), aff’d, 134 S. Ct. 2347 (2014). 10 Because there is no conclusive method of determining what constitutes an “abstract idea” that meets the first step of the Alice framework, courts compare the claims at issue to those claims from previous cases, already determined to be directed to an abstract idea. Enfish, 822 F.3d at 1334. “Distinguishing between claims that recite a patent-eligible invention and claims that add too little to a patent-ineligible abstract concept can be difficult, as the line separating the two is not always clear.” DDR Holdings, 773 F.3d at 1255. This difficulty is particularly pronounced in the context of patent claims related to computer technology. See id.; see also Intellectual Ventures II LLC v. JP Morgan Chase & Co., No. 13-cv-3777-AKH, 2015 WL 1941331, at *5 (S.D.N.Y. Apr. 28, 2015); cf. Diehr, 450 U.S. at 194 (Stevens, J., dissenting) (patent law developments in response to new computer technology are of “recent vintage”). In applying the Alice framework to computer technology, courts have treated two types of computer technology patents differently. In the first line of cases, the Supreme Court and lower courts applying Mayo, Alice, and their progeny, have repeatedly held that the use of a computer to implement a fundamental economic or conventional business practice does not, by itself, render the claims patent eligible. Put another way, Alice stood for the proposition that claims directed to the “same activity” in which “humans engaged . . . long before the invention of computers” were not patent eligible. Paone v. Broadcom Corp., No. 15-cv-0596-BMC-GRB, 2015 WL 4988279, at *9 (E.D.N.Y. Aug. 19, 2015) (citation omitted). In Alice, the patent claims at issue merely instructed the user to “implement the abstract idea of intermediated settlement on a generic computer,” and were therefore patent ineligible. Alice Corp., 134 S. Ct. at 2359. In Ultramercial, 772 F.3d at 715–16, the Federal Circuit found patent-ineligible the abstract idea of using advertising as currency on the Internet. The claims in buySAFE, Inc. v. Google, Inc., 765 F.3d 1350 (Fed. Cir. 2014), were 11 patent ineligible because they were drawn to merely using a computer to send and receive information over a network in order to implement the abstract idea of creating a “transaction performance guaranty.” Id. at 1355. However, in a second line of cases, the Federal Circuit has held that some developments in computer-related technology, in which the focus of the claims is on solutions “necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks,” DDR Holdings, 773 F.3d at 1257, or on “improvement to computer functionality itself,” are not directed to an abstract idea. Enfish, 822 F.3d at 1336. A divided three-judge panel in DDR Holdings affirmed the district court’s decision denying judgment as a matter of law after a trial, and held that the idea to retain website visitors by combining the look and feel of a host website with product information from a third-party merchant’s website was patent eligible. DDR Holdings, 773 F.3d at 1257. The majority noted that that while the claims involve both a computer and the Internet, they “do not merely recite the performance of some business practice known from the pre-Internet world along with the requirement to perform it on the Internet.” Id. Rather, the patents describe a method, based in computer technology, for solving a problem that specifically arises in the arena of computer technology. Id. Thus, the subject matter of the patent was distinguishable from those held patent ineligible in Ultramercial and buySAFE, among others. Id. at 1258–59. The Federal Circuit took up a similar issue in Enfish. There, a unanimous three-judge panel reversed the lower court’s decision granting summary judgment on Section 101 grounds. Enfish, 822 F.3d 1329. The case concerned infringement of a patent covering software that included a self-referential table for a computer database. Id. at 1332. In determining that the claims were not directed merely to the abstract idea of “storing, organizing, and retrieving 12 memory in a logical table,” the court noted that the self-referential table functioned differently than a conventional database, and increased flexibility, generated faster search times, and required less memory. Id. at 1337. Because the panel determined that the self-referential table was “a specific type of data structure designed to improve the way a computer stores and retrieves data in memory,” the claims were not directed to an abstract idea. Id. at 1339. Most recently, in In re TLI Commc’ns LLC Patent Litig., 823 F.3d 607, the Federal Circuit affirmed a district court’s decision to dismiss a complaint on Section 101 grounds, because the patent-in-suit claimed no more than the abstract idea of classifying and storing digital images in an organized way. Id. at 609. The Federal Circuit rejected the plaintiff’s contention that the claims were directed to a specific improvement to computer functionality. Id. at 612. Rather, the court found that the claims were “directed to the use of conventional or generic technology in a nascent but well-known environment, without any claim that the invention reflects an inventive solution to any problem presented by combining [a camera with a cellular telephone].” Id. at 612. In this case, the defendants urge that the claims in the Patents-in-Suit were directed to the abstract ideas of “(1) storing values, (2) computing additional values and data, and (3) storing a new value in the place of one of the previously stored values.” (Defs.’ Mem. at 13 (ECF No. 211).) However, as the Federal Circuit observed in Enfish, “describing the claims at such a high level of abstraction and untethered from the language of the claims all but ensures that the exceptions to § 101 swallow the rule.” Enfish, 822 F.3d at 1337; see also Diehr, 450 U.S. at 189 n.12 (warning that overgeneralizing claims “if carried to its extreme, make all inventions unpatentable because all inventions can be reduced to underlying principles of nature which, once known, make their implementation obvious.”). 13 The Patents-in-Suit recite a method for calculating the values of one-way chains that reduce the requirements for storage or computation capacity. The plaintiff maintains and the patents recite that conventional techniques for computing values of one-way chains were known in the art, but necessitated storing all values ahead of time or computing the values as needed. This conventional approach involved a significant drawback, in that it was either storage or computation intensive. The Patents-in-Suit describe the use of “helper values” or “pegs” to reduce computation demands, and a process to move the pegs to various positions in the one-way chain, so that the efficiency gains are repeated for each chain output value. According to the plaintiff, this is an improvement upon conventional methods for computing values in a one-way chain. The storage and computation difficulty posed by the conventional process for computing values in a one-way chain was a computer-centric problem. The Patents-in-Suit are specifically directed to a technique that solves that problem and improves the functioning of a computer.8 In fact, the concept recited in the Patents-in-Suit seems to be the paradigmatic example described in DDR Holdings for computer technology claims that are patent-eligible under Section 101, namely “an invention as technologically complex as an improved, particularized method of digital data compression.” DDR Holdings, 773 F.3d at 1259. In light of the line of cases instructing that patents directed to improvements in computer functionality do not fail under Section 101, I conclude that the Patents-in-Suit are not directed to a patent ineligible abstract idea. Nonetheless, because there is not yet a developed evidentiary record, and because some of the cases to consider the patent eligibility of computer-related                                                              8 As explained in the Patents-in-Suit, the benefits of the patented technology are even more pronounced in a lightweight device like a mobile telephone. 14 technology focus on Alice step two, I turn to consideration of the second step.9 Cf. Enfish, 822 F.3d at 1339 (cases in which there are close calls about how to characterize computer-related claims may be considered properly at step two). Under step two of the Alice test, the court must consider whether the elements of the claims, both individually and “as an ordered combination” include an “inventive concept,” that is “sufficient to ensure that the patent in practice amounts to significantly more than a patent upon the [ineligible concept] itself.” Alice Corp., 134 S. Ct. at 2355. I conclude that the patent claims include an “inventive concept,” such that the idea is not patent-ineligible under Section 101. In ascertaining whether a process claim recounts an abstract idea, the court must evaluate the claim as a whole, keeping in mind that a concept is not ineligible just because it relies on a mathematical formula. This is because an application of a mathematical formula to a process may be deserving of patent protection. Diehr, 450 U.S. at 187; see also Digitech Image Techs., LLC v. Elecs. for Imaging, Inc., 758 F.3d 1344, 1350 (Fed. Cir. 2014). However, a claim that recites an abstract idea does not become eligible merely by adding the words “apply it.” Bancorp Servs., L.L.C. v. Sun Life Assur. Co. of Canada (U.S.), 687 F.3d 1266, 1276 (Fed. Cir. 2012) (citing Mayo, 132 S.Ct. at 1294.). Likewise, a claim does not warrant patent protection merely by reciting “apply it with a computer.” Alice Corp., 134 S. Ct. at 2358; see also Content Extraction & Transmission, 776 F.3d at 1348. The defendants maintain that the Patents-in-Suit are categorically abstract because they are directed to the field of cryptography. (Defs.’ Mem. at 14–15 (ECF No. 21-1).) This is not so.                                                              9 In Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1348 (Fed. Cir. 2016), the court observed that the Federal Circuit has “found software-related patents eligible under both steps of the test Alice sets out.” 15 Two district court cases are instructive. In this district, in Paone v. Broadcom Corporation, 2015 WL 4988279, the Honorable Brian Cogan took up the question of whether claims describing computer-implemented methods of encrypting data may be directed to patenteligible subject matter. As an initial matter, Judge Cogan opined that a “patent on a method of data encryption is not per se invalid, as long as it is specific enough.” Id., at *5. In rejecting the defendants’ argument that the patent described the abstract idea of “authenticating authorship” by “executing a cryptographic operation using a cryptographic key,” Judge Cogan characterized the claims as an invention that improved upon existing block cipher technology by “chang[ing] the encryption key for each data block, based on additional, randomly generated data.” Id., at *4. Judge Cogan concluded that the patent did not merely involve the encryption of data, but rather “claims a specific method of doing so,” and was thus patent eligible. Id., at *7. In TQP Dev., LLC v. Intuit Inc., No. 2:12-cv-180-WCB, 2014 WL 651935 (E.D. Tex. Feb. 19, 2014), the Honorable William Bryson determined that a patent of a use of a predetermined characteristic of data being transmitted to trigger the generation of new key values for the use in encryption and decryption in a data communication system was patent eligible. Id., at *3, *7. Judge Bryson noted that limitations in the claim so narrowed it that the preemptive effect was “very much diminished.” Id., at *4. “Because the claim [was] drawn to a very specific method of changing encryption keys, it contain[ed] an ‘inventive concept,’ . . . and [was] a far cry from something that could fairly be characterized as a ‘basic tool[] of scientific and technological work.’” Id. (citing Gottschalk v. Benson, 409 U.S. 63, 67).   The same can be said here. In this case, the concept at issue is not merely the use of a one-way chains, or the conventional process for computing values in a one-way chain. Instead, the Patents-in-Suit describe a method for placing and relocating pegs in a one-way chain, in 16 order to reduce the computation or storage required for computing the values in a one-way chain. This additional limitation on the process of computing values in a one-way chain is not simply a “trivial appendix to the underlying abstract idea.” CLS Bank Int’l, 717 F.3d at 1283. Rather, and taking the facts in the light most favorable to the plaintiff, the Patents-in-Suit set out an inventive process that improves upon existing technology. Under the present procedural posture, the defendants have not established that the claims are patent-ineligible under Section 101. B. Motion to Dismiss for Failure to State a Claim The defendants also seek to dismiss the complaint on the grounds that it does not allege sufficient facts to state a plausible claim for direct or indirect infringement, or that the defendants’ allegedly infringing conduct was willful. The pleading applicable pleading standard is the familiar one set out in Ashcroft v. Iqbal, 556 U.S. 662 (2009) and Bell Atl. Corp. v. Twombly, 550 U.S. 544 (2007). See Paone, 2015 WL 4988279, at *13. Rule 8 of the Federal Rules of Civil Procedure requires a plaintiff to provide “a short and plain statement of the claim showing that the pleader is entitled to relief.” Fed. R. Civ. P. 8(a)(2). This demands more than “an unadorned, the-defendant-unlawfully-harmed-me accusation.” Iqbal, 556 U.S. at 678 (citations omitted). A complaint that merely “tenders naked assertions devoid of further factual enhancement” is not sufficient. Id. In evaluating a motion to dismiss, a court must accept as true the facts alleged in the complaint, and draw all reasonable inferences in the plaintiff’s favor. Town of Babylon v. Fed. Hous. Fin. Agency, 699 F.3d 221, 227 (2d Cir. 2012). However, the principle that “a court must accept a complaint’s allegations as true is inapplicable to threadbare recitals of a cause of action’s elements, supported by mere conclusory statements.” Iqbal, 556 U.S. at 678. A 17 complaint will only survive a motion to dismiss if the law recognizes the claims, and if it pleads “enough facts to state a claim to relief that is plausible on its face.” Twombly, 550 U.S. at 570. An allegation is plausible on its face when the plaintiff “pleads factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” Iqbal, 556 U.S. at 678. “[D]etermining whether a complaint states a plausible claim is [a] context-specific” task. Id. at 679. On a motion to dismiss, consideration is “limited to the factual allegations in plaintiff’s complaint, which are accepted as true, to documents attached to the complaint as an exhibit or incorporated in it by reference, to matters of which judicial notice may be taken, or to documents either in plaintiff’s possession or of which plaintiff had knowledge and relied on in bringing suit.” Faconti v. Potter, 242 F. App’x 775, 777 (2d Cir. 2007) (alterations and citations omitted). i. Direct Infringement Direct infringement claims are governed by Section 271(a), which provides “whoever without authority makes, uses, offers to sell, or sells any patented invention, within the United States . . . during the term of the patent . . . infringes the patent.”10 35 U.S.C.A. § 271(a). In order to prove direct infringement, the plaintiff must establish that a party performed every element of a claimed invention. BMC Res., Inc. v. Paymentech, L.P., 498 F.3d 1373, 1378 (Fed. Cir. 2007) overruled on other grounds by Akamai Techs., Inc. v. Limelight Networks, Inc., 692 F.3d 1301 (Fed. Cir. 2012); see also Advanced Steel Recovery, LLC v. X-Body Equip., Inc., 808 F.3d 1313, 1319 (Fed. Cir. 2015) (every limitation set forth in a claim must be found in an accused product).                                                              10 The defendants’ mental state is immaterial, as direct infringement is a strict liability offense. Commil USA, LLC v. Cisco Sys., Inc., 135 S. Ct. 1920, 1926 (2015). 18 Until recently, courts analyzed the sufficiency of a complaint alleging direct infringement by comparing the allegations in the complaint with Form 18 of the Federal Rules of Civil Procedure. K-Tech Telecommunications, Inc. v. Time Warner Cable, Inc., 714 F.3d 1277, 1283 (Fed. Cir. 2013) (“to the extent any conflict exists between Twombly (and its progeny) and the Forms regarding pleading requirements, the Forms control”). Form 18, which set out the requirements for a pleading alleging direct infringement, required: (1) an allegation of jurisdiction; (2) a statement that the plaintiff owns the patent; (3) a statement that defendant has been infringing the patent ‘by making, selling, and using [the device] embodying the patent’; (4) a statement that the plaintiff has given the defendant notice of its infringement; and (5) a demand for an injunction and damages. K-Tech Telecommunications, 714 F.3d at 1283 (citation omitted). A complaint alleging these elements was essentially immune from attack on the grounds that the pleading was insufficient. Id. As of December 1, 2015, the Federal Rules of Civil Procedure no longer included Form 18. See e.Digital Corp. v. iBaby Labs, Inc., No. 15-cv-05790-JST, 2016 WL 4427209, at *2 (N.D. Cal. Aug. 22, 2016). As a result of that change, most courts to consider the question have concluded that the Twombly pleading standard now applies to direct infringement claims. See id. (collecting cases). However, the extent to which a plaintiff must plead direct infringement element-by-element remains unsettled. Compare Niazi v. Pressure Prod. Med. Supplies, Inc., No. 16-cv-670-JDP, 2017 WL 108114, at *1 (W.D. Wis. Jan. 11, 2017) (declining to require a plaintiff to plead direct infringement element-by-element) with Scripps Research Inst. v. Illumina, Inc., No. 16-cv-661-JLS-BGS, 2016 WL 6834024, at *5 (S.D. Cal. Nov. 21, 2016) (“to adequately plead direct infringement, a plaintiff must allege sufficient facts to plausibly show that a defendant’s accused instrumentality contains each limitation of the asserted patent claim.”). 19 I decline to require that the plaintiff plead direct infringement of each and every element of the allegedly infringed claims. Imposing such a requirement would be inconsistent with the admonition that the court, in considering a motion to dismiss, should draw all reasonable inferences in the light most favorable to the plaintiff. At the pleading stage, the plaintiff need only “nudge” its claim “across the line from conceivable to plausible.” Iqbal, 556 U.S. at 680. In this case, the plaintiff specifically identifies the CoreStreet-branded and ActivIdentitybranded products, which, according to the plaintiff, directly infringe the Patents-in-Suit. In support of its direct infringement claim, the plaintiff alleges that these products “generate certificate validation proofs in the manner described in the ASSA Patents, namely, utilizing efficient one-way chain computation techniques of the type developed by Dr. Jakobsson and described and claimed in the Patents-in-Suit.” The plaintiff suggests that the products were designed to include “certificate validation infrastructure features such as extremely low latency and scalability to very large numbers of certificates.” In addition, the plaintiff lists the claims from the Patents-in-Suit that the defendants allegedly infringed. Together, these allegations are sufficient to plead direct infringement. ii. Indirect Infringement The defendants move to dismiss the claims for indirect infringement—i.e., induced or contributory infringement—on the grounds that the plaintiff has not alleged sufficient facts to state a claim upon which relief can be granted. (Defs.’ Mem. at 21–23 (ECF No. 21-1).) 1. Inducing Infringement The plaintiff alleges that the defendants induced infringement within the meaning of Section 271(b), which provides, “Whoever actively induces infringement of a patent shall be liable as an infringer.” 35 U.S.C.A. § 271(b). Induced infringement, unlike direct infringement, 20 is not a strict liability offense. Commil USA, LLC v. Cisco Sys., Inc., 135 S. Ct. 1920, 1926 (2015). To state a claim for induced infringement, the plaintiff must allege that the defendants: “(1) had knowledge of the patent-in-suit; (2) knew the induced acts were infringing; and (3) specifically intended to encourage another’s infringement.” Carson Optical Inc. v. eBay Inc., No. 15-cv-3793-KAM-SIL, 2016 WL 4385998, at *3 (E.D.N.Y. Aug. 17, 2016) (citations omitted). Said another way, the defendants must induce activity intentionally that they actually knew to be infringing. Glob.-Tech Appliances, Inc. v. SEB S.A., 563 U.S. 754, 765 (2011). The complaint sufficiently alleges that the defendants’ end-users engaged in infringing activity. The plaintiff asserts that the defendants sold the allegedly infringing CoreStreet and ActivIdentity products to consumers. A customer’s use of an infringing process is primary infringement. Conair Corp. v. Jarden Corp., No. 13-cv-67020AJN, 2014 WL 3955172, at *2 (S.D.N.Y. Aug. 12, 2014) (citing Aro Mfg. Co. v. Convertible Top Replacement Co., 377 U.S. 476, 484 (1964); R. Carl Moy, Moy’s Walker on Patents § 14:32 (4th ed.)). Consequently, while the complaint does not specify instances of direct infringement, it adequately alleges infringing activity by the defendants’ “end users.” Conair Corp., 2014 WL 3955172, at *2; see also Paone, 2015 WL 4988279, at *13 (“Plaintiff’s allegations that the ‘end users’ of defendants’ accused products infringe the . . . patent are sufficient.”). Additionally, in light of the fact that the defendants’ products are allegedly infringing, and drawing all reasonable inferences in the plaintiff’s favor, the mere sale of the allegedly infringing product is enough to plead the defendants’ intent to induce their end-users’ infringement. Conair Corp., 2014 WL 3955172, at *3; see also Ricoh Co. v. Quanta Computer Inc., 550 F.3d 1325, 1343 (Fed. Cir. 2008) (the defendant’s “role as the designer and manufacturer of the [allegedly infringing devices] may evidence an intent sufficiently specific to 21 support a finding of inducement.”). Finally, the plaintiff alleges that the defendants “continued to make, use, offer to sell, sell, and/or import into the United States” the infringing products after the plaintiff put the defendants on notice of its infringement by sending it letters notifying it of the Patents-in-Suit and inquiring into whether the defendants’ products incorporated the techniques attributed to Dr. Jakobsson in the ASSA Patents. This adequately pleads that the defendants had the requisite knowledge. Accordingly, I conclude that the plaintiff has stated a claim for inducing infringement. 2. Contributory Infringement The plaintiff asserts that the defendants are liable for contributory infringement. Under Section 271(c), “[w]hoever offers to sell or sells within the United States . . . a material or apparatus for use in practicing a patented process, constituting a material part of the invention, knowing the same to be especially made or especially adapted for use in an infringement of such patent, and not a staple article or commodity of commerce suitable for substantial noninfringing use, shall be liable as a contributory infringer.” 35 U.S.C.A. § 271(c). To prove contributory infringement, the plaintiff must demonstrate: “1) that there is direct infringement, 2) that the accused infringer had knowledge of the patent, 3) that the component has no substantial noninfringing uses, and 4) that the component is a material part of the invention.” Fujitsu Ltd. v. Netgear Inc., 620 F.3d 1321, 1326 (Fed. Cir. 2010). The defendants assert that the complaint is inadequate because it does not allege that the defendants sold a material part of the invention, or that they knew the accused products were adapted for infringing use. The arguments do not succeed for reasons already outlined—the plaintiff adequately alleges direct infringement, and asserts that the defendants sold ActivIdentity and CoreStreet products that infringed the plaintiff’s Patents-in-Suit that had as their subject the 22 techniques for efficient computation of values in a one-way chain. From those allegations, a reasonable inference can be drawn that the plaintiff expected that customers would use its products and, by doing so, infringe the plaintiff’s patent. Further, the complaint sufficiently alleges that the defendants knew about the plaintiff’s patents by describing the reference to the Patents-in-Suit in the ASSA Patents and by setting out the letters that the plaintiff sent to the defendants. The defendants also argue that the plaintiff does not adequately allege that a material part of the ActivIdentity and CoreStreet products lacked non-infringing uses. (Defs.’ Mem. at 22–23 (ECF No. 21-1).) The complaint specifically notes that the ActivIdentity and CoreStreet products “have no substantial use outside of the context of certificate validation,” and that this cannot be performed without the efficient one-way chain computation techniques claimed in the Patents-in-Suit. While this seems conclusory, many courts post-Iqbal have not demanded detailed factual allegations that the defendants’ products lack substantial noninfringing uses. Conair Corp., 2014 WL 3955172, at *4 (collecting cases). I agree with this approach. Accordingly, the plaintiff’s claim for contributory infringement survives the defendants’ motion to dismiss. iii. Willful Infringement Willful infringement requires that the plaintiff plead that the defendants were “aware of the asserted patent but acted despite an objectively high likelihood that [their] actions constituted infringement of a valid patent.” Paone, 2015 WL 4988279, at *14 (citations omitted); see also i4i Ltd. P’ship v. Microsoft Corp., 598 F.3d 831, 860 (Fed. Cir. 2010), aff’d, 564 U.S. 91 (2011). The complaint adequately alleges that the defendants committed acts of infringement with full knowledge of the plaintiff’s rights in its patents. That is sufficient. 23 CONCLUSION For the foregoing reasons, the defendants’ motion to dismiss is denied. SO ORDERED. _/s Ann M. Donnelly_________ Ann M. Donnelly United States District Judge Dated: Brooklyn, New York February 17, 2017 24

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?