PerdiemCo, LLC. v. Industrack LLC
Filing
155
CLAIM CONSTRUCTION MEMORANDUM AND ORDER. Signed by Magistrate Judge Roy S. Payne on 7/7/2016. (ch, )
THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
MARSHALL DIVISION
PERDIEM CO, LLC,
v.
INDUSTRACK LLC, et al.
§
§
§
§
§
§
§
CASE NO. 2:15-cv-727-JRG-RSP
CLAIM CONSTRUCTION
MEMORANDUM AND ORDER
On April 21, 2016, the Court held a hearing to determine the proper construction of
disputed claim terms in United States Patents No. 8,223,012, 8,493,207, 8,717,166, 9,033,499,
and 9,071,931. Having reviewed the arguments made by the parties at the hearing and in the
parties’ claim construction briefing (Dkt. Nos. 86, 91, and 94),1 having considered the intrinsic
evidence, and having made subsidiary factual findings about the extrinsic evidence, the Court
hereby issues this Claim Construction Memorandum and Order. See Phillips v. AWH Corp., 415
F.3d 1303, 1314 (Fed. Cir. 2005); Teva Pharm. USA, Inc. v. Sandoz, Inc., 135 S. Ct. 831, 841
(2015).
1
Citations to documents (such as the parties’ briefs and exhibits) in this Claim Construction
Memorandum and Order refer to the page numbers of the original documents rather than the
page numbers assigned by the Court’s electronic docket unless otherwise indicated.
-1-
Table of Contents
I. BACKGROUND ....................................................................................................................... 4
II. LEGAL PRINCIPLES ........................................................................................................... 5
III. THE PARTIES’ STIPULATED TERMS ......................................................................... 10
IV. CONSTRUCTION OF DISPUTED TERMS ................................................................... 10
A. “information-sharing system,” “information-sharing environment(s),” and “location
information sharing environment(s)”.................................................................................. 10
B. “varying levels of administrative privilege(s)” ................................................................... 15
C. “user” and “authorized user” ............................................................................................... 18
D. “administrator” .................................................................................................................... 23
E. “conveyance . . . is managed based on an access list” ........................................................ 25
F. Steps..................................................................................................................................... 28
(1) “associate with,” “associates,” “to associate one or more users that use the plurality
of location information sharing environment[s] with each one of the plurality of
user groups,” and “associate at least one user identification code with each one of a
plurality of group identification codes” .......................................................................... 28
(2) “authorizes a first user” .................................................................................................. 31
(3) “to access an object location information from a location information source” ............ 32
(4) “specified by said first user” .......................................................................................... 33
(5) “to define a relationship of an information package” and “to define an information
package access code” ...................................................................................................... 35
(6) “are used to specify” ...................................................................................................... 37
G. Indefiniteness ...................................................................................................................... 39
(1) “user identification codes” and “authorized user identification code”........................... 39
(2) “user codes,” “first user code,” and “privileged user code” ........................................... 43
(3) “group identification codes”........................................................................................... 47
(4) “information access code” and “information package access code” .............................. 48
(5) “access control codes,” “access control codes requiring multiple levels of access
control,” and “access control codes associated with the plurality of authorized user
identification codes” ....................................................................................................... 53
(6) Conveying or Managing Conveyance Based on Something other than Information
Access Codes .................................................................................................................. 56
(7) “levels of location information access privilege”........................................................... 58
(8) “grouping configurations” .............................................................................................. 61
(9) Dependent Claims 6, 8, and 9 of the ’012 Patent ........................................................... 63
H. Means-Plus-Function .......................................................................................................... 66
-2-
(1) “administrator system” ................................................................................................... 66
(2) “one or more servers configured to” and “one or more computer servers
configured to” ................................................................................................................. 73
(3) “administrator device”.................................................................................................... 77
(4) “interfaces for configuring . . . based on varying levels of administrative
privileges” ....................................................................................................................... 79
(5) “first level of administrator privilege being used in a first information-sharing
environment to allow for configuring a plurality of event information-sharing
environments” ................................................................................................................. 82
(6) “access control systems” ................................................................................................ 83
I. Computing Device / Mobile Device / Etc. Associated with a User Identification Code or
User, or Having a User Identification Code ....................................................................... 85
J. “information access code” associated with, comprises, or specifies a “user identification
code” ................................................................................................................................... 87
K. “based on the information access code” ............................................................................. 89
L. Hybrid Claims ..................................................................................................................... 91
V. CONCLUSION...................................................................................................................... 93
APPENDIX A .............................................................................................................................. 94
-3-
I. BACKGROUND
Plaintiff has alleged infringement of United States Patents No. 8,223,012 (“the ’012
Patent”), 8,493,207 (“the ’207 Patent”), 8,717,166 (“the ’166 Patent”), 9,033,499 (“the ’499
Patent”), and 9,071,931 (“the ’931 Patent”).
The ’012 Patent, titled “System and Method for Conveying Object Location
Information,” issued on July 17, 2012, and bears an earliest priority date of December 23, 2005.
The Abstract of the ’012 Patent states:
An improved system and method for defining an event based upon an object
location and a user-defined zone and managing the conveyance of object location
event information among computing devices where object location events are
defined in terms of a condition based upon a relationship between user-defined
zone information and object location information. One or more location
information sources are associated with an object to provide the object location
information. One or more user-defined zones are defined on a map and one or
more object location events are defined. The occurrence of an object location
event produces object location event information that is conveyed to users based
on user identification codes. Accessibility to object location information, zone
information, and object location event information is based upon an object
location information access code, a zone information access code, and an object
location event information access code, respectively.
The remaining four patents-in-suit are all related to the ’012 Patent through
continuations. Plaintiff thus submits that all of the patents-in-suit share a common specification.
(Dkt. No. 86 at 5 n.1). Herein, as the parties have done in their briefing, the Court cites the
specification of the ’931 Patent.
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
preliminary constructions with the aim of focusing the parties’ arguments and facilitating
discussion. Those preliminary constructions are set forth infra within the discussion for each
term.
-4-
II. LEGAL PRINCIPLES
A.
Claim Construction
“It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention
to which the patentee is entitled the right to exclude.’” Phillips v. AWH Corp., 415 F.3d 1303,
1312 (Fed. Cir. 2005) (en banc) (quoting Innova/Pure Water Inc. v. Safari Water Filtration Sys.,
Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). To determine the meaning of the claims, courts start
by considering the intrinsic evidence. Id. at 1313; C.R. Bard, Inc. v. U.S. Surgical Corp., 388
F.3d 858, 861 (Fed. Cir. 2004); Bell Atl. Network Servs., Inc. v. Covad Commc’ns Group, Inc.,
262 F.3d 1258, 1267 (Fed. Cir. 2001). The intrinsic evidence includes the claims themselves, the
specification, and the prosecution history. Phillips, 415 F.3d at 1314; C.R. Bard, Inc., 388 F.3d at
861. The general rule—subject to certain specific exceptions discussed infra—is that each claim
term is construed according to its ordinary and accustomed meaning as understood by one of
ordinary skill in the art at the time of the invention in the context of the patent. Phillips, 415 F.3d
at 1312–13; Alloc, Inc. v. Int’l Trade Comm’n, 342 F.3d 1361, 1368 (Fed. Cir. 2003); Azure
Networks, LLC v. CSR PLC, 771 F.3d 1336, 1347 (Fed. Cir. 2014) (“There is a heavy
presumption that claim terms carry their accustomed meaning in the relevant community at the
relevant time.”) (vacated on other grounds).
“The claim construction inquiry . . . begins and ends in all cases with the actual words of
the claim.” Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d 1243, 1248 (Fed. Cir. 1998).
“[I]n all aspects of claim construction, ‘the name of the game is the claim.’” Apple Inc. v.
Motorola, Inc., 757 F.3d 1286, 1298 (Fed. Cir. 2014) (quoting In re Hiniker Co., 150 F.3d 1362,
1369 (Fed. Cir. 1998)). First, a term’s context in the asserted claim can be instructive. Phillips,
415 F.3d at 1314. Other asserted or unasserted claims can also aid in determining the claim’s
-5-
meaning, because claim terms are typically used consistently throughout the patent. Id.
Differences among the claim terms can also assist in understanding a term’s meaning. Id. For
example, when a dependent claim adds a limitation to an independent claim, it is presumed that
the independent claim does not include the limitation. Id. at 1314–15.
“[C]laims ‘must be read in view of the specification, of which they are a part.’” Id.
(quoting Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc)).
“[T]he specification ‘is always highly relevant to the claim construction analysis. Usually, it is
dispositive; it is the single best guide to the meaning of a disputed term.’” Id. (quoting Vitronics
Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teleflex, Inc. v. Ficosa N. Am.
Corp., 299 F.3d 1313, 1325 (Fed. Cir. 2002). But, “‘[a]lthough the specification may aid the
court in interpreting the meaning of disputed claim language, particular embodiments and
examples appearing in the specification will not generally be read into the claims.’” Comark
Commc’ns, Inc. v. Harris Corp., 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting Constant v.
Advanced Micro-Devices, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 1988)); see also Phillips, 415
F.3d at 1323. “[I]t is improper to read limitations from a preferred embodiment described in the
specification—even if it is the only embodiment—into the claims absent a clear indication in the
intrinsic record that the patentee intended the claims to be so limited.” Liebel-Flarsheim Co. v.
Medrad, Inc., 358 F.3d 898, 913 (Fed. Cir. 2004).
The prosecution history is another tool to supply the proper context for claim
construction because, like the specification, the prosecution history provides evidence of how the
U.S. Patent and Trademark Office (“PTO”) and the inventor understood the patent. Phillips, 415
F.3d at 1317. However, “because the prosecution history represents an ongoing negotiation
between the PTO and the applicant, rather than the final product of that negotiation, it often lacks
-6-
the clarity of the specification and thus is less useful for claim construction purposes.” Id. at
1318; see also Athletic Alternatives, Inc. v. Prince Mfg., 73 F.3d 1573, 1580 (Fed. Cir. 1996)
(ambiguous prosecution history may be “unhelpful as an interpretive resource”).
Although extrinsic evidence can also be useful, it is “‘less significant than the intrinsic
record in determining the legally operative meaning of claim language.’” Phillips, 415 F.3d at
1317 (quoting C.R. Bard, Inc., 388 F.3d at 862). Technical dictionaries and treatises may help a
court understand the underlying technology and the manner in which one skilled in the art might
use claim terms, but technical dictionaries and treatises may provide definitions that are too
broad or may not be indicative of how the term is used in the patent. Id. at 1318. Similarly,
expert testimony may aid a court in understanding the underlying technology and determining
the particular meaning of a term in the pertinent field, but an expert’s conclusory, unsupported
assertions as to a term’s definition are entirely unhelpful to a court. Id. Generally, extrinsic
evidence is “less reliable than the patent and its prosecution history in determining how to read
claim terms.” Id. The Supreme Court recently explained the role of extrinsic evidence in claim
construction:
In some cases, however, the district court will need to look beyond the patent’s
intrinsic evidence and to consult extrinsic evidence in order to understand, for
example, the background science or the meaning of a term in the relevant art
during the relevant time period. See, e.g., Seymour v. Osborne, 11 Wall. 516, 546
(1871) (a patent may be “so interspersed with technical terms and terms of art that
the testimony of scientific witnesses is indispensable to a correct understanding of
its meaning”). In cases where those subsidiary facts are in dispute, courts will
need to make subsidiary factual findings about that extrinsic evidence. These are
the “evidentiary underpinnings” of claim construction that we discussed in
Markman, and this subsidiary factfinding must be reviewed for clear error on
appeal.
Teva Pharm. USA, Inc. v. Sandoz, Inc., 135 S. Ct. 831, 841 (2015).
-7-
B.
Departing from the Ordinary Meaning of a Claim Term
There are “only two exceptions to [the] general rule” that claim terms are construed
according to their plain and ordinary meaning: “1) when a patentee sets out a definition and acts
as his own lexicographer, or 2) when the patentee disavows the full scope of the claim term
either in the specification or during prosecution.”2 Golden Bridge Tech., Inc. v. Apple Inc., 758
F.3d 1362, 1365 (Fed. Cir. 2014) (quoting Thorner v. Sony Computer Entm’t Am. LLC, 669 F.3d
1362, 1365 (Fed. Cir. 2012)); see also GE Lighting Solutions, LLC v. AgiLight, Inc., 750 F.3d
1304, 1309 (Fed. Cir. 2014) (“[T]he specification and prosecution history only compel departure
from the plain meaning in two instances: lexicography and disavowal.”). The standards for
finding lexicography or disavowal are “exacting.” GE Lighting Solutions, 750 F.3d at 1309.
To act as his own lexicographer, the patentee must “clearly set forth a definition of the
disputed claim term,” and “clearly express an intent to define the term.” Id. (quoting Thorner,
669 F.3d at 1365); see also Renishaw, 158 F.3d at 1249. The patentee’s lexicography must
appear “with reasonable clarity, deliberateness, and precision.” Renishaw, 158 F.3d at 1249.
To disavow or disclaim the full scope of a claim term, the patentee’s statements in the
specification or prosecution history must amount to a “clear and unmistakable” surrender. Cordis
Corp. v. Boston Sci. Corp., 561 F.3d 1319, 1329 (Fed. Cir. 2009); see also Thorner, 669 F.3d at
1366 (“The patentee may demonstrate intent to deviate from the ordinary and accustomed
meaning of a claim term by including in the specification expressions of manifest exclusion or
restriction, representing a clear disavowal of claim scope.”) “Where an applicant’s statements are
amenable to multiple reasonable interpretations, they cannot be deemed clear and unmistakable.”
2
Some cases have characterized other principles of claim construction as “exceptions” to the
general rule, such as the statutory requirement that a means-plus-function term is construed to
cover the corresponding structure disclosed in the specification. See, e.g., CCS Fitness, Inc. v.
Brunswick Corp., 288 F.3d 1359, 1367 (Fed. Cir. 2002).
-8-
3M Innovative Props. Co. v. Tredegar Corp., 725 F.3d 1315, 1326 (Fed. Cir. 2013); see also
Avid Tech., Inc. v. Harmonic, Inc., 812 F.3d 1040, 1045 (Fed. Cir. 2016) (“When the prosecution
history is used solely to support a conclusion of patentee disclaimer, the standard for justifying
the conclusion is a high one.”).
C.
Definiteness Under 35 U.S.C. § 112, ¶ 2 (pre-AIA) / § 112(b) (AIA) 3
Patent claims must particularly point out and distinctly claim the subject matter regarded
as the invention. 35 U.S.C. § 112, ¶ 2. A claim, when viewed in light of the intrinsic evidence,
must “inform those skilled in the art about the scope of the invention with reasonable certainty.”
Nautilus Inc. v. Biosig Instruments, Inc., 134 S. Ct. 2120, 2129 (2014). If it does not, the claim
fails § 112, ¶ 2 and is therefore invalid as indefinite. Id. at 2124. Whether a claim is indefinite is
determined from the perspective of one of ordinary skill in the art as of the time the application
for the patent was filed. Id. at 2130. As it is a challenge to the validity of a patent, the failure of
any claim in suit to comply with § 112 must be shown by clear and convincing evidence. Id. at
2130 n.10. “[I]ndefiniteness is a question of law and in effect part of claim construction.” ePlus,
Inc. v. Lawson Software, Inc., 700 F.3d 509, 517 (Fed. Cir. 2012).
When a term of degree is used in a claim, “the court must determine whether the patent
provides some standard for measuring that degree.” Biosig Instruments, Inc. v. Nautilus, Inc.,
783 F.3d 1374, 1378 (Fed. Cir. 2015) (quotation marks omitted). Likewise, when a subjective
term is used in a claim, “the court must determine whether the patent’s specification supplies
some standard for measuring the scope of the [term].” Datamize, LLC v. Plumtree Software, Inc.,
3
Because the Asserted Patents have an effective filing date before September 16, 2012, the
effective date of the America Invents Act (“AIA”), the Court refers to the pre-AIA version of
§ 112.
-9-
417 F.3d 1342, 1351 (Fed. Cir. 2005); accord Interval Licensing LLC v. AOL, Inc., 766 F.3d
1364, 1371 (Fed. Cir. 2014) (citing Datamize, 417 F.3d at 1351).
III. THE PARTIES’ STIPULATED TERMS
The parties reached agreement on constructions as stated in their January 28, 2016 Joint
Claim Construction and Prehearing Statement (Dkt. No. 61 at 1–2). The parties’ agreements are
set forth in Appendix A to the present Claim Construction Memorandum and Order.
IV. CONSTRUCTION OF DISPUTED TERMS
A. “information-sharing system,” “information-sharing environment(s),” and “location
information sharing environment(s)”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
“a computing network where the conveyance
of information (e.g., location information, zone
information, or event information) from a
server to a group of users’ computing devices
can be controlled or configured”
“a computing4 network including a map server
and computing devices, and a plurality of users
who are able to share information with each
other through that network”
(Dkt. No. 86 at 4); (Dkt. No. 91 at 5); (Dkt. No. 97, App’x A at 18). Defendants submit that
these disputed terms appear in Claims 17 and 19 of the ’207 Patent and Claims 4–5, 9–10, 16,
19, and 24 of the ’166 Patent.5 (Dkt. No. 61, Ex. B at 5).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “a computing network where the conveyance of
4
Defendants have also proposed “computer” rather than “computing.” (Dkt. No. 61, Ex. B at 5);
(Dkt. No. 97, App’x A at 18).
5
Plaintiff’s portion of the Joint Claim Construction and Prehearing Statement suggests that:
“Claims identified below are from Defendants’ [P.R.] 4-2 disclosure, and therefore may not be
accurate.” (Dkt. No. 61, Ex. A at 10 n.4). The Court does not here conduct an independent
investigation because the parties are in the best position to identify the claims at issue, in
particular because Plaintiff has selected the asserted claims and because the Local Rules require
the parties to identify the claims and terms in dispute. The Court therefore relies upon the
identification of claims in Defendants’ portion of the Joint Claim Construction and Prehearing
Statement. See (id. at Ex. B).
- 10 -
information from a server to a group of users’ computing devices can be controlled or
configured.”
(1) The Parties’ Positions
Plaintiff argues that Defendants’ proposal of a “users” limitation “is entirely inconsistent
with the teaching that the users are removed from the automated process,” and “Defendants’
construction reads in another limitation (‘map server’) that wrongly suggests that the claims
require a particular type of server.” (Dkt. No. 86 at 4). Plaintiff also argues: “By analogy, the
user identification codes are like the license plate on a car. The license plate number may
identify the owner of the car, but it does not mean that the owner has to actually drive the car.
Additionally, the license plate number allows any licensed driver to use the car, and the number
does not change depending on the driver. Therefore, the driver is irrelevant to the license plate
number.” (Id. at 9). Plaintiff further urges that Defendants’ proposal “may confuse the jury into
wrongly concluding that the server has to store the maps, or that it cannot serve other purposes.”
(Id. at 10).
Defendants respond that “the proper analysis must begin with ‘information sharing
environment’ and the express statements in the specification which characterize that term, e.g.,
‘an information-sharing environment consists of a computing network including a map server
and computing devices.’” (Dkt. No. 91 at 5) (quoting ’931 Patent at 4:65–67). As to “plurality
of users,” Defendants argue “[t]he context of the claims and the specification illustrate that
‘users’ (as properly construed) are so inextricably woven into the fabric of the purported
invention that it would be error for the Court to eliminate them from the construction of
information sharing environment.” (Dkt. No. 91 at 6). Finally, Defendants argue the claim
language itself requires that “‘sharing’ must occur within the environment.” (Id. at 7).
- 11 -
At the April 21, 2016 hearing, Defendants reiterated that the specification refers to the
present invention as using a map server, and Defendants clarified that “map server” in their
proposal refers to a server that is limited to providing maps. Defendants also emphasized
Retractable Techs., Inc. v. Becton, Dickinson & Co., 653 F.3d 1296, 1305 (Fed. Cir. 2011), as
prohibiting the claim scope from departing from what the specification describes as the
invention. Plaintiff responded that the specification discloses that servers can have various
functions and that maps can be stored separately.
(2) Analysis
As to Defendants’ proposal of requiring a “map server,” the specification discloses:
The present invention provides a system and method for defining an event that
relates to a location of an object and managing the conveyance of related
information among computing devices associated with corresponding user
identification codes. In accordance with the present invention, an informationsharing environment consists of a computing network including a map server and
computing devices. Objects associated with sources of location information
provide object location information comprising one or more coordinates. In an
exemplary embodiment, the coordinates correspond to one or more determined
locations of the objects within an established coordinate system. In the system
and method of the present invention, an object can comprise any device, thing,
person or entity that can be located or tracked. A user of a computing device can
retrieve a map, for example, from a map server and define a user-defined zone on
the map. According to one aspect of the invention, an object location event is
defined based on a relationship between one or more object locations and one or
more user-defined zones, where the occurrence of the object location event is
determined when a condition associated with the relationship is satisfied.
’931 Patent at 4:61–5:14 (emphasis added). Also of note, although the specification refers to the
“Server” 110 shown in Figure 1 as “map server 110,” the “map information 112” (labeled as
“MAPS” in Figure 1) is illustrated in Figure 1 as distinct from the server. See id. at 6:4–8
(“Referring to FIG. 1, information-sharing environment 100 includes computing network 102
having wired and wireless network links 104, 106 and connectivity to the Internet 108 that
provides access to a map server 110 and map information 112.”). Further, the specification
- 12 -
discloses more generally that a “database of user information” can be maintained on a
“company’s computer server.” Id. at 12:61–67.
On balance, the above-quoted disclosure of a map server being “[i]n accordance with” the
present invention, particularly in light of the subsequent reference to “an exemplary
embodiment,”6 demonstrates that a “map server” is a specific feature of particular embodiments
that should not be imported into the claims. See Comark, 156 F.3d at 1187; see also Phillips,
415 F.3d at 1323.
As to Defendants’ proposal of requiring “users,” Claim 17 of the ’207 Patent recites
“each user identification code being associated with a user” (emphasis added):
17. An information-sharing system, comprising:
a database storing user information associated with a plurality of groups of
users of computing devices, each computing device having a corresponding user
identification code stored in the database, each user identification code being
associated with a user within each group of users; and
an administrator device that associates a first user identification code with
an authorized user within a group of users, the authorized user of the group of
users having an access privilege to location information of a computing device
associated with a second user identification code of a user within the group of
users that includes the authorized user, wherein the location information of the
computing device associated with the second user identification code is conveyed
based on an authorization by the authorized user.
Nonetheless, although parts of the claimed system are “associated” with users, the users
are not recited as being part of the claimed system. Indeed, the specification discloses that a
server communicates with other computers. See, e.g., ’931 Patent at 4:61–65 (quoted above).
Further, the specification discloses that identification can be device-specific rather than userspecific. See id. at 2:18–20 (“association of a user identification code with a computing device
can be an embedded association (e.g., hard-wired) or it can be based on a user log-in at the
6
The preceding paragraph also states that the “invention should not . . . be construed as limited
to the embodiments set forth herein.” ‘931 Patent at 4:56–57.
- 13 -
computing device”) & 7:32–36 (“Certain computing devices (e.g., a PDA or smart phone) may
allow a user identification code to be embedded or programmed into a computing device’s
memory such that any user of the computing device is considered to be the user owning the
device.”).
Although Defendants cite a disclosure that “[t]he invention requires defining a zone by
the one or more users,” no such limitation is apparent in the above-quoted claim. Moreover,
Defendants have not demonstrated that any requirement of user-defined zones necessarily means
that users themselves are a claim limitation. The Court thus rejects Defendants’ proposal of
requiring “a plurality of users.”
Finally, as to Defendants’ proposal that users must be able to “share information with
each other through that network,” the specification discloses for example that “[t]he sharing of
information may be managed among a small number of users such as a family or group of
friends, or among a very large number of users such as among employees of very large business,
or among a worldwide user base such as a might be provided via an Internet service.” Id.
at 5:28–33. Because “sharing” appears in the disputed term itself and is adequately expressed by
Plaintiff’s proposal of “conveyance,” the Court rejects Defendants’ proposal in that regard as
redundant and unnecessary.
The Court therefore hereby construes “information-sharing system,” “informationsharing environment(s),” and “location information sharing environment(s)” to mean “a
computing network where the conveyance of information from a server to a group of users’
computing devices can be controlled or configured.”
- 14 -
B. “varying levels of administrative privilege(s)”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
“a hierarchy of privileges for administering
groups or sub-groups of users”
“a different administrator for configuring each
information-sharing environment”
(Dkt. No. 86 at 11); (Dkt. No. 97, App’x A at 24). Defendants submit that these disputed terms
appear in Claims 4, 5, 9, 10, 16, 19, and 24 of the ’166 Patent and Claims 1, 4, 5, 12, and 17 of
the ’499 Patent. (Dkt. No. 61, Ex. B at 14).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Plaintiff’s proposal of ‘hierarchy’ / Expressly rejecting Defendants’ proposal of ‘different
administrator.’”
(1) The Parties’ Positions
Plaintiff submits: “Each claim states that certain events occur based on the varying levels
of administrative privileges.
This means that there has to be a hierarchy of ‘levels’ of
administrative privilege that allows certain events to occur.” (Dkt. No. 86 at 12). Plaintiff
argues that “Defendants seek a construction that improperly adds a new and conflicting
requirement to the claims that a different administrator actually configure each informationsharing environment.” (Id. at 13).
Defendants respond that “as an alternative to finding the term indefinite, a POSA
[(person of ordinary skill in the art)] could conclude that the claim term ‘varying levels of
administrative privilege’ refers to the ‘various levels of administrator privilege’ referenced in the
specification.” (Dkt. No. 91 at 8) (citing ’931 Patent at 5:51–54) (footnote omitted). Further,
Defendants argue, “from the fact that those various levels of administrator privilege exist
- 15 -
because there can be multiple smaller environments which are independent or independently
configurable, the POSA would conclude there is a different administrator for each environment.”
(Dkt. No. 91 at 8–9).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
(2) Analysis
Claim 1 of the ’499 Patent recites in relevant part (emphasis added): “said plurality of
information-sharing environments are configurable based on varying levels of administrator
privileges, said varying levels of administrator privilege comprising a first level of administrator
privilege associated with a network administrator and a second level of administrator privileges
associated with said plurality of authorized users.”
Claim 1 of the ’166 Patent, as another example, recites (emphasis added):
1. A method for conveying information related to locations of a plurality of
mobile devices of users in a plurality of user groups, comprising:
creating a plurality of information-sharing environments over a network of
computing devices comprising interfaces for configuring the plurality of
information-sharing environments for users based on varying levels of
administrative privileges, wherein the plurality of information-sharing
environments comprise a first information-sharing environment and a plurality of
second information-sharing environments, said plurality of second informationsharing environments comprising a plurality of independently configurable
location information sharing environments created within the first information
sharing environment;
configuring the first information-sharing environment based on a first
level of administrative privilege to associate one or more users that use the
plurality of location information sharing environment with each one of the
plurality of user groups;
configuring each one [of] the plurality of location information-sharing
environments for each user group independent of one another based on at least
one second level of administrative privilege by specifying one or more levels of
location information access privilege for at least one authorized user in each user
group; and
- 16 -
managing conveyance of information related to location of the plurality of
the mobile devices in the plurality of user groups based on a plurality of location
information access privileges associated with a plurality of authorized users.
The claims thus set forth how different levels of administrative privileges may be used,
and the claim does not recite multiple administrators or that multiple computers must be used to
perform configuration. Likewise, the specification discloses:
Because smaller information-sharing environments can exist within larger
information-sharing information environments, various levels of administrator
privileges can exist.
’931 Patent at 5:51–54.
Also, the specification discloses that “one or more” administrators may configure the
environments:
In one embodiment, one or more administrators may be given privileges to
configure the information-sharing environment. Such configuration could include
specifying authorized users of the environment and their access privileges, etc.
Such configuration can also define groups of users as part of an established
organizational structure associated with the information-sharing environment.
Id. at 5:39–45 (emphasis added); see id. at 7:7–19. Further, whereas Claim 1 of the ’499 Patent
for example recites an “administrator,” above-quoted Claim 1 of the ’166 Patent does not. See
id. at 5:62–65 (“A family can set up its own information-sharing environment and an individual
may set up his or her own information-sharing environment.”).
As to Plaintiff’s proposal of a “hierarchy,” however, Plaintiff has not demonstrated that
the existence of different “levels” necessarily requires a hierarchical organization. It is possible
for “varying levels of administrative privileges” to exist without those levels being arranged in a
hierarchy.
The Court therefore expressly rejects Plaintiff’s proposed construction as well as
Defendants’ proposed construction. No further construction is necessary. See U.S. Surgical
- 17 -
Corp. v. Ethicon, Inc., 103 F.3d 1554, 1568 (Fed. Cir. 1997) (“Claim construction is a matter of
resolution of disputed meanings and technical scope, to clarify and when necessary to explain
what the patentee covered by the claims, for use in the determination of infringement. It is not
an obligatory exercise in redundancy.”); see also O2 Micro Int’l Ltd. v. Beyond Innovation Tech.
Co., 521 F.3d 1351, 1362 (Fed. Cir. 2008) (“[D]istrict courts are not (and should not be) required
to construe every limitation present in a patent’s asserted claims.”); Finjan, Inc. v. Secure
Computing Corp., 626 F.3d 1197, 1207 (Fed. Cir. 2010) (“Unlike O2 Micro, where the court
failed to resolve the parties’ quarrel, the district court rejected Defendants’ construction.”);
ActiveVideo Networks, Inc. v. Verizon Commcn’s, Inc., 694 F.3d 1312, 1326 (Fed. Cir. 2012);
Summit 6, LLC v. Samsung Elecs. Co., Ltd., 802 F.3d 1283, 1291 (Fed. Cir. 2015).
The Court therefore hereby construes “varying levels of administrative privilege(s)” to
have its plain meaning.
C. “user” and “authorized user”
“user”
(’012 Patent, Claims 6, 9, 10, 23, 27;
’207 Patent, Claims 17, 19;
’166 Patent, Claims 4, 5, 9, 10, 16, 19, 24;
’499 Patent, Claims 1, 4, 5, 12, 17;
’931 Patent, Claim 6)
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
“a person who uses”
- 18 -
“authorized user”
(’207 Patent, Claims 17, 19;
’166 Patent, Claims 4, 5, 9, 10, 16, 19, 24;
’499 Patent, Claims 1, 4, 5, 12, 17)
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Alternatively, a
user that is authorized.
(Dkt. No. 61, Ex. A at 79); (id., Ex. B at 11); (Dkt. No. 86 at 15); (Dkt. No. 91 at 3); (Dkt. No.
97, App’x A at 1 & 18).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary constructions: “user” means “a person who uses”; and “authorized
user” has its “Plain and ordinary meaning (applying the Court’s construction of ‘user’).”
(1) The Parties’ Positions
Plaintiff argues that “[i]n situations like this one, it is difficult to envision a claim
construction that is clearer than the claim language itself.” (Dkt. No. 86 at 15). Plaintiff also
argues that Defendants’ proposal “is a blatant attempt to interject a human-element into a claim
where it does not exist” and “raises the question: uses what?” (Id. at 16). Further, Plaintiff
argues, “the users are irrelevant to the automated system, and the ‘user identification codes’ may
be hardwired or programmed,” and “the Asserted Patents provide embodiments for tracking pets
and other animals” rather than merely people. (Id.).
Defendants respond by explaining that “a ‘user’ is a person who is able to control at least
some of the operation and behavior of the purported invention.” (Dkt. No. 91 at 3). Defendants
argue that “the specification differentiates between users (i.e., the people who ‘use’ the system)
and ‘objects’ (i.e., ‘things’ that are merely tracked by the system).” (Id.). Further, Defendants
- 19 -
argue that “[w]hile a ‘user’ may be an ‘object,’ the reverse is not necessarily true.” (Id. at 4).
Finally, Defendants argue: “The term ‘authorized user’ . . . is indefinite. ‘Authorized users’ and
‘users’ are claimed differently in the Asserted Patents, without any indication as to what
distinguishes the two. In fact, all ‘users’ are described as being ‘authorized.’ [’931 Patent at]
5:54–57.” (Dkt. No. 91 at 3 n.2).
At the April 21, 2016 hearing, Plaintiff had no objection to requiring a user to be a human
being, but Plaintiff expressed concern that Defendants’ proposal of “use” is intended to require
that a user must be able to actively control operation of the claimed invention. Defendants
responded that they are not proposing any construction of “use.”
(2) Analysis
The specification refers to “users” in contexts in which users appear to be people:
The sharing of information may be managed among a small number of users such
as a family or group of friends, or among a very large number of users such as
among employees of very large business, or among a worldwide user base such as
a [sic] might be provided via an Internet service.
***
[A]n Internet service based on the present invention can be provided and
administered such that anyone having access to the Internet can purchase the
service and be an authorized user.
’931 Patent at 5:28–31 & 5:54–57.
In accordance with the present invention, the users of the computing devices each
have user identification codes that can be associated with the computing devices
in order to manage the conveyance of information to the computing devices based
upon the identify [sic, identity] of the user and information access privileges.
***
Furthermore, user identification codes are typically associated with other user
information such as the user name, title, address information, email address,
phone numbers, etc.
- 20 -
***
Information maintained for a user typically includes a user account name and
password and a user identification code, and may include a variety of information
about the user including the user’s name, address, phone number(s), email
address(s), company name, title, birth date, etc.
Id. at 6:64–7:2, 7:23–26 & 12:67–13:4. Likewise, the specification refers to a “user log-in at the
computing device”:
For example, association of a user identification code with a computing device
can be an embedded association (e.g., hard-wired) or it can be based on a user
log-in at the computing device.
Id. at 2:18–21; see id. at 7:29–31 (“user login process whereby a user enters a user account name
and password”); see also id. at 7:50–52 (“by a user logging into a computing device, a given user
identification code is associated with the computing device”).
As to extrinsic evidence, Defendants have submitted a technical dictionary definition of
“user” as meaning “end user,” which in turn is defined as: “The person who uses a computer
system and its application programs at home or at work to perform tasks and produce results.”
(Dkt. No. 91, Ex. 2) (Webster’s New World Computer Dictionary 129, 387 (10th ed. 2003))
(emphasis added).
As to Plaintiff’s argument that construing a “user” to be a “person” would violate the
prohibition against claiming a human organism, the claims here at issue are directed to
interactions between a person and a system rather than to the person as an organism. As noted
above, at the April 21, 2016 hearing Plaintiff had no objection to requiring a user to be a human
being. Although the specification refers to tracking pets, a pet is disclosed as being an object,
not a user. See ’931 Patent at 19:1–8; see also id. at 6:20–24 (“FIG. 1 also illustrates various
examples of objects (e.g., devices, things, people, vehicles, animals, etc.) that can be associated
- 21 -
with location information sources enabling object location information to be conveyed to
computing devices.”).
As to Plaintiff’s concerns regarding how Defendants’ might be interpreting the word
“use,” Defendants are not proposing any construction or elaboration upon the word “use” and the
Court does not adopt any. Instead, at least upon the present record, any question of “use”
appears to be a factual question of infringement rather than a legal question for claim
construction. PPG Indus. v. Guardian Indus. Corp., 156 F.3d 1351, 1355 (Fed. Cir. 1998)
(“[A]fter the court has defined the claim with whatever specificity and precision is warranted by
the language of the claim and the evidence bearing on the proper construction, the task of
determining whether the construed claim reads on the accused product is for the finder of fact.”).
Further, although Plaintiff argues that Defendants’ proposed construction would render
phrases such as “user identification code” nonsensical, such a phrase can be readily understood
as referring to an identification code of a person who uses.
Finally, Defendants have not adequately supported their footnoted argument that
“authorized user” is indefinite. (Dkt. No. 91 at 3 n.2). The Court therefore rejects Defendants’
indefiniteness argument and finds that “authorized user” has its plain meaning apart from the
Court’s construction of the term “user.”
The Court accordingly hereby construes the disputed terms as set forth in the following
chart:
Term
Construction
“user”
“a person who uses”
“authorized user”
Plain meaning apart from the Court’s
construction of “user”
- 22 -
D. “administrator”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
“a user who has rights to configure a
computing network”
(Dkt. No. 86 at 16); (Dkt. No. 91 at 7); (Dkt. No. 97, App’x A at 1). Defendants submit that this
disputed term appears in Claims 6, 9, 10, and 12 of the ’012 Patent, Claims 17 and 19 of the ’207
Patent, Claim 24 of the ’166 Patent, and Claims 1, 4, 5, 12, and 17 of the ’499 Patent. (Dkt.
No. 61, Ex. B at 3).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ proposal that an administrator must be a ‘user.’”
(1) The Parties’ Positions
Plaintiff argues: “Once again, Defendants propose a construction that interjects
unnecessary ambiguity into an already clear term. Moreover, Defendants propose the same
construction for different contexts, leading to illogical constructions. Even worse, Defendants’
construction improperly attempts to read a human-element into claims where there is none.”
(Dkt. No. 86 at 16). For example, Plaintiff notes that “[s]ometimes ‘administrator’ is used as a
noun; sometimes it is used as an adjective.” (Id. at 17).
Defendants respond that “[w]here ‘administrator’ is used in the specification, it refers to a
person, not a device,” and “[t]he only logical implication is that claims which use ‘administrator’
alone do not intend to remove the human element from the claim.” (Dkt. No. 91 at 7–8) (citing
’931 Patent at 5:39–48, 9:21–24 & 13:13–21).
- 23 -
At the April 21, 2016 hearing, Defendants urged that just as a “user” is a person who
uses, an “administrator” is a person who administers.
Plaintiff responded that the term
“administrator” can encompass people as well as devices.
(2) Analysis
Claim 1 of the ’012 Patent, for example, recites (emphasis added):
1. A method for conveying user location information, comprising:
interfacing with an administrator that authorizes a first user associated
with a first user identification code to access an object location information from
a location information source associated with a second user identification code
that is different from the first identification code; and
conveying the object location information to a third user based on an
information access code specified by said first user, said information access code
being associated with a third user identification code that is different from the first
and second user identification codes.
This claim language thus contains no indication that an administrator must be a “user” or
that an administrator must be a person. Further, whereas Defendants’ proposed construction uses
the term “rights,” the recital of “an administrator that authorizes” is sufficiently clear on its face
and the specification does not refer to “rights.”
Defendants argue that “[a]pplying principles of claim differentiation, the term
‘administrator,’ when used alone as a noun, must be broader than an ‘administrator system’ or
‘administrator device.’” (Dkt. No. 91 at 7).
[T]wo considerations generally govern this claim construction tool when applied
to two independent claims: (1) claim differentiation takes on relevance in the
context of a claim construction that would render additional, or different,
language in another independent claim superfluous; and (2) claim differentiation
“can not broaden claims beyond their correct scope.”
Curtiss-Wright Flow Control Corp. v. Velan, Inc., 438 F.3d 1374, 1381 (Fed. Cir. 2006).
Defendants refer to the recital of an “administrator system” in Claim 7 of the ’012 Patent,
which is an independent claim (emphasis added):
- 24 -
7. An apparatus for conveying information related to groups of users, comprising:
an administrator system having access to object location information, zone
information and object location event information associated with an information
access code that specifies a user group associated with a plurality of user codes
including 1) a privileged user code that is different from the information access
code and 2) a second user code that is different from the first user code and
information access code; and
a server configured to interface with a network comprising a plurality of
mobile devices associated with corresponding user identification codes, wherein
the second user code is associated with a location information source of one of the
mobile devices of the plurality of mobile devices based on the privileged user
code; and wherein an object location information provided by the location
information source is conveyed based on the information access code.
On balance, no distinction is evident between “administrator” and “administrator system”
that would warrant limiting “administrator” to a “user.” See Edwards Lifesciences LLC v. Cook
Inc., 582 F.3d 1322, 1330 (Fed. Cir. 2009) (“Different terms or phrases in separate claims may
be construed to cover the same subject matter where the written description and prosecution
history indicate that such a reading of the terms or phrases is proper.”) (citation and internal
quotation marks omitted).
The Court therefore hereby expressly rejects Defendants’ proposed construction,
including Defendants’ proposal of requiring a “user” and Defendants’ argument that an
“administrator” must be a person. No further construction is necessary. See U.S. Surgical,
103 F.3d at 1568; see also O2 Micro, 521 F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo,
694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
The Court accordingly hereby construes “administrator” to have its plain meaning.
E. “conveyance . . . is managed based on an access list”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
“conveyance is managed by entry of an access
code that specifies an access list”
- 25 -
(Dkt. No. 86 at 17); (Dkt. No. 91 at 9); (Dkt. No. 97, App’x A at 29). Defendants submit that
this disputed term appears in Claims 4, 9 and 10 of the ’166 Patent. (Dkt. No. 61, Ex. B at 19).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ proposed ‘access code’ limitation.”
(1) The Parties’ Positions
Plaintiff argues that “[t]his is a classic case of a defendant trying to improperly import a
limitation from the specification into the claims.” (Dkt. No. 86 at 18). Plaintiff submits that
“[t]he claim language is clear: the information is conveyed to a user if that user is included on the
access list, and not conveyed if that user is not on the access list.” (Id. at 17).
Defendants respond that “[t]he specification provides only one reference to an ‘access
list,’” and “[i]n that reference, an access code is paramount.” (Dkt. No. 91 at 9) (citing ’931
Patent at 8:4–14). Defendants argue that “[t]he specification never suggests the ‘access list’ may
be alienated from the ‘access code,’ nor does it suggest the ‘access list’ itself is an ‘access
code.’” (Dkt. No. 91 at 9).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
(2) Analysis
Claims 4 and 8 of the ’166 Patent recite (emphasis added):
4. The method of claim 3, wherein conveyance of information related to
locations of the mobile devices is managed based on an access list comprising a
plurality of user identification codes, including a first user identification code
associated with a first mobile device and a second identification code associated
with a second mobile device, wherein information related to a location of the
second mobile device is conveyed to the first mobile device based on a location
information access privilege specified for an authorized user in a user group, and
wherein the location information of the second mobile device is conveyed to a
- 26 -
third mobile device associated with a third identification code different from the
first and second user identification codes based on the location information access
privilege specified for the authorized user.
***
8. The system of claim 5, wherein conveyance of information related to locations
of the mobile devices is managed based on an access list comprising a plurality of
user identification codes, including a first user identification code associated with
a first mobile device and a second identification code associated with a second
mobile device.
The specification discloses:
Under still another arrangement, an access code specifies the individual users or
groups having access to the information to which the access code is associated
provided a given user knows the password. As such, the access code may specify
one or more users and/or one or more groups that can enter the appropriate
password in order to access the information. With this approach there are two
conditions that must be met to gain access, being included on the access list, and
having knowledge of the password allowing access to information to be managed
by changing the access list and/or changing the password.
’931 Patent at 8:4–14 (emphasis added); see also id. at 7:37–8:23 (“access codes”).
Thus, although the specification discloses that an “access code” may be used, the claims
recite an “access list” without reference to an “access code.” On balance, use of an “access
code” is a specific feature of particular embodiments that should not be imported into the claims.
See Comark, 156 F.3d at 1187; see also Phillips, 415 F.3d at 1323.
The Court therefore expressly rejects Defendants’ proposed construction. No further
construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521 F.3d at
1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
The Court accordingly construes “conveyance . . . is managed based on an access list”
to have its plain meaning.
- 27 -
F. Steps
Defendants argue that various terms require performance of actual steps rather than
merely configuration. Plaintiff replies that “the claim language dictates that these terms describe
a characteristic of another object.”
(Dkt. No. 94 at 10). The Court herein addresses the
groupings of terms identified in the parties’ briefing.
(1) “associate with,” “associates,” “to associate one or more users that use the plurality
of location information sharing environment[s] with each one of the plurality of user
groups,” and “associate at least one user identification code with each one of a plurality
of group identification codes”
Defendants have identified numerous terms in Appendix B to their responsive claim
construction brief. See (Dkt. No. 91 at App’x B); see also (Dkt. No. 97 at App’x A).
(a) The Parties’ Positions
Plaintiff argues that “the context of the term is clear from the claim language, and there is
no special meaning given to the term in the intrinsic record.” (Dkt. No. 86 at 19). Further,
Plaintiff submits that “[i]n the more than 45 instances of the term Defendants have proposed for
construction, only one instance requires an action of ‘associating.’” (Id. at 20) (citing ’166
Patent at Cl. 23).
Defendants respond: “Every Asserted Claim recites the term ‘associate’ in some form.
That language must require proof of something for infringement: an affirmative step of
association or, at a minimum, and [sic, an] actual state of association (i.e., the product of an
actual step of association), as distinguished from the mere capability of forming an association.”
(Dkt. No. 91 at 16). Defendants also argue that “method claim [6 of the ’012 Patent] expressly
requires steps that cannot be performed until after the required association steps are completed.”
(Id. at 17). Defendants further argue that in Claims 4 and 19 of the ’166 Patent, “[t]he term ‘to
associate’ modifies ‘configuring’ and makes clear that the action constituting ‘configuring’ is the
- 28 -
action of ‘associating.’” (Id.). As to Claim 17 of the ’207 Patent, Defendants argue that “the
claim states that location information is conveyed, after the recited associations are actually
made and the authorized user interacts with the ‘system.’” (Id. at 18).
At the April 21, 2016 hearing, Defendants argued that all of the terms at issue recite
method steps. Plaintiff responded that the terms at issue are not method steps but rather are
merely descriptive of particular claim elements. Plaintiff nonetheless acknowledged that the
“associate” terms require actual configuration rather than mere capability. Also, as to the
limitation “configuring the first information-sharing environment based on a first level of
administrative privilege to associate one or more users that use the plurality of location
information sharing environment with each one of the plurality of user groups” in Claim 1 of the
’166 Patent, the parties disputed whether the “to associate” phrase modifies “configuring” or
“administrative privilege.”
(b) Analysis
Plaintiff has not argued that the “associate” terms should be read out of the claims, and
Plaintiff acknowledges that the “associating” limitations recited in Claim 23 of the ’166 Patent
are steps that must be performed. (Dkt. No. 94 at 10 n.7); see (Dkt. No. 86, App’x A at p. 14
#27). The remaining disputed terms require configuration as is evident from the context in
which those terms are used.
See (Dkt. No. 86 at App’x A); see also Microprocessor
Enhancement Corp. v. Tex. Instruments Inc., 520 F.3d 1367, 1375 (Fed. Cir. 2008) (noting that
functional claim language is permissible); cf. Summit 6, 802 F.3d at 1291 (finding that the phrase
“being provided to” was “not used as a verb” in the claim at issue but rather was “part of a
phrase that conveys information about” a term).
- 29 -
As to the particular claims that have been addressed by Defendants, in Claim 6 of the
’012 Patent the phrase “is associated” sets forth an attribute of the recited “second user
identification code,” and the “is conveyed” phrase recites that such conveyance is “based on the
information access code.” These limitations thus refer to configuration rather than actual method
steps. Claim 18 of the ’012 Patent is similar as to the word “associated.” Claims 1, 4, and 19 of
the ’166 Patent and Claims 17 and 19 of the ’207 Patent are also similar in this regard. For
example, Claim 17 of the ’207 Patent recites “an administrator device that associates . . .,” but
this merely sets forth a functional requirement rather than an actual method step. As to the flow
charts in Figures 3–7 of the patents-in-suit, “patent coverage is not necessarily limited to
inventions that look like the ones in the figures.” MBO Labs. Inc. v. Becton, Dickinson & Co.,
474 F.3d 1323, 1333 (Fed. Cir. 2007).
Because Defendants have not presented specific arguments as to the remainder of the 45
“associate” terms, the Court need not address each of those terms individually.
The parties’ dispute at the April 21, 2016 hearing as to the above-noted “configuring . . .
to associate” limitation (in Claim 1 of the ’166 Patent) is illustrative of the inappropriateness of
Defendants’ proposal of construing the term “associate” categorically across all patents and
claims. As to that specific dispute in Claim 1 of the ’166 Patent, the Court hereby finds that the
“to associate . . .” phrase modifies “configuring.” This is evident from the parallel structure of
the “configuring . . . by specifying” limitation that follows the “configuring . . . to associate”
limitation in the claim.
See Phillips, 415 F.3d at 1314 (“the claims themselves provide
substantial guidance as to the meaning of particular claim terms”; “the context of the surrounding
words of the claim also must be considered in determining the ordinary and customary meaning
of those terms”) (citations and internal quotation marks omitted).
- 30 -
No further construction is necessary.
(2) “authorizes a first user”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
Required step of authorizing a first user
(Dkt. No. 61, Ex. A at 99); (id., Ex. B at 11); (Dkt. No. 97, App’x A at 1). Defendants submit
that this disputed term appears in Claim 6 of the ’012 Patent. (Dkt. No. 61, Ex. B at 11).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Requires that an administrator actually authorize a first
user.”
(a) The Parties’ Positions
Plaintiff argues that this disputed term is merely descriptive of the “administrator” that
“authorizes a first user with a first user identification code” in Claim 1 of the ’012 Patent. (Dkt.
No. 86 at 22).
Defendants respond that this disputed term “is written in present tense and describes an
active and ongoing step in which the administrator authorizes a first user.” (Dkt. No. 91 at 19).
At the April 21, 2016 hearing, Defendants argued that this authorizing must occur with or
after the “interfacing.” Plaintiff responded that “authorizes” is not a method step and could be
done in advance.
(b) Analysis
Claim 1 of the ’012 Patent recites (emphasis added):
1. A method for conveying user location information, comprising:
interfacing with an administrator that authorizes a first user associated
with a first user identification code to access an [sic] object location information
from a location information source associated with a second user identification
code that is different from the first identification code; and
- 31 -
conveying the object location information to a third user based on an
information access code specified by said first user, said information access code
being associated with a third user identification code that is different from the first
and second user identification codes.
This recital of “authorizes” does not refer to a mere capability or configuration for
authorizing but rather sets forth an action performed by the administrator. Nonetheless, this does
not give rise to a separate method step. Instead, this limitation is a condition on the claimed
“administrator” in the “interfacing” step.
The Court accordingly hereby finds that the term “authorizes a first user” is not a
method step but requires that an administrator actually authorize a first user.
(3) “to access an object location information from a location information source”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
Required step of accessing an object location
information source
(Dkt. No. 61, Ex. A at 101); (id., Ex. B at 11); (Dkt. No. 97, App’x A at 1). Defendants submit
that this disputed term appears in Claim 6 of the ’012 Patent. (Dkt. No. 61, Ex. B at 11).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Refers to what is authorized rather than itself being a
required method step.”
(a) The Parties’ Positions
Plaintiff submits that the limitation at issue is “interfacing with an administrator that
authorizes a first user associated with a first user identification code to access an object location
information from a location information source associated with a second user identification
code,” and “the method step is not to access, but rather, it is ‘interfacing . . . to access . . . .’”
(Dkt. No. 86 at 22) (quoting ’012 Patent at Cl. 1) (emphasis Plaintiff’s).
- 32 -
Defendants respond that this disputed term recites a step that “must occur before the
‘conveying . . .’ steps can be completed” because “[o]therwise, the claimed method would be
inoperable.” (Dkt. No. 91 at 20).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
(b) Analysis
Claim 1 of the ’012 Patent recites (emphasis added):
1. A method for conveying user location information, comprising:
interfacing with an administrator that authorizes a first user associated
with a first user identification code to access an object location information from
a location information source associated with a second user identification code
that is different from the first identification code; and
conveying the object location information to a third user based on an
information access code specified by said first user, said information access code
being associated with a third user identification code that is different from the first
and second user identification codes.
This recital of “authorizes a first user . . . to access . . . object location information”
relates to what is authorized rather than any actual accessing.
The Court therefore hereby finds that the term “to access an object location
information from a location information source” refers to what is authorized rather than
itself being a required method step.
(4) “specified by said first user”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
Required step of a first user specifying
(Dkt. No. 61, Ex. A at 102); (id., Ex. B at 11); (Dkt. No. 97, App’x A at 1). Defendants submit
that this disputed term appears in Claim 6 of the ’012 Patent. (Dkt. No. 61, Ex. B at 11).
- 33 -
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Refers to how an information access code has been
specified rather than itself being a required method step.”
(a) The Parties’ Positions
Plaintiff submits that the limitation at issue is “conveying the object location information
to a third user based on an information access code specified by said first user,” and “[t]he action
in this step is ‘conveying the object location information,’” such that “‘specified by said first
user’ is not used as a verb, but is describing the ‘information access code.’” (Dkt. No. 86 at 22)
(quoting ’012 Patent at Cl. 1) (emphasis Plaintiff’s).
Defendants respond that this disputed term recites a step that “must occur before the
‘conveying . . .’ steps can be completed” because “[o]therwise, the claimed method would be
inoperable.” (Dkt. No. 91 at 20).
At the April 21, 2016 hearing, the parties argued this term together with the term
“authorizes a first user” (addressed above).
(b) Analysis
Claim 1 of the ’012 Patent recites (emphasis added):
1. A method for conveying user location information, comprising:
interfacing with an administrator that authorizes a first user associated
with a first user identification code to access an [sic] object location information
from a location information source associated with a second user identification
code that is different from the first identification code; and
conveying the object location information to a third user based on an
information access code specified by said first user, said information access code
being associated with a third user identification code that is different from the first
and second user identification codes.
This recital of “specified by said first user” sets forth who specifies an information access
code and requires an attribute of having been thus specified, but this does not amount to a
- 34 -
separate method step. The term “specified by said first user” recites a condition of the
“information access code.”
The Court therefore hereby finds that “specified by said first user” refers to how an
information access code has been specified rather than itself being a required method step.
(5) “to define a relationship of an information package” and “to define an information
package access code”
“to define a relationship of an information package”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
Required step of defining a relationship of an
information package
“to define an information package access code”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
Required step of defining an information
[package] access code
(Dkt. No. 61, Ex. A at 103–04); (id., Ex. B at 11); (Dkt. No. 97, App’x A at 15). Defendants
submit that these disputed terms appear in Claims 23 and 27 of the ’012 Patent. (Dkt. No. 61,
Ex. B at 11).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “These terms recite actions that must be performed as
part of providing the interface.”
- 35 -
(a) The Parties’ Positions
Plaintiff argues surrounding claim language demonstrates that “[t]he step is . . . providing
an interface, where the interface has the capability to define a relationship.” (Dkt. No. 86 at 23)
(citing ’012 Patent at Cl. 18).
Defendants respond that the claims at issue also “expressly require the step of ‘conveying
[an] information package to a second computing device . . . based on [an] information package
access code,’” and “in order for such a conveyance to be performed, someone must first interact
with the ‘interface’ to define the information package and the information package access code.”
(Dkt. No. 91 at 20).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
(b) Analysis
Claim 18 of the ’012 Patent recites (emphasis added):
18. A method for conveying information among a plurality of computing devices
associated with a plurality of users including a first user, a second user, and a
third user, the method comprising:
providing an interface to a first computing device associated with the first
user to define a relationship of an information package with at least one of a zone
information, an object location information, or an object location event
information and to define an information package access code;
conveying the information package to a second computing device
associated with one of the second user or the third user based on said information
package access code.
Because the “conveying” step involves “the information package” and is “based on said
information package access code,” and because the interface is recited as being provided to
enable defining these, the “to define” limitations must be performed.
- 36 -
The Court therefore hereby finds that “to define a relationship of an information
package” and “to define an information package access code” recite actions that must be
performed as part of providing the interface.
(6) “are used to specify”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary
Required step of specifying
(Dkt. No. 61, Ex. A at 119); (id., Ex. B at 23); (Dkt. No. 97, App’x A at 32). Defendants submit
that this disputed term appears in Claims 5, 9, 10, and 16 of the ’166 Patent. (Dkt. No. 61, Ex. B
at 23).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ proposal that this term sets forth a required method step.”
(a) The Parties’ Positions
Plaintiff argues: “This claim language is in a wherein clause describing the second levels
of administrative privilege. This language does not require actually specifying one or more
levels of location information access privilege, but rather describes what the privileges are used
for.” (Dkt. No. 86 at 23) (citing ’166 Patent at Cl. 5).
Defendants respond that “[t]he phrase ‘are used to specify’ signifies an active step of
specifying which is performed by a person with the requisite ‘second level[] of administrative
privilege.’” (Dkt. No. 91 at 19).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
- 37 -
(b) Analysis
Claim 5 of the ’166 Patent recites (emphasis added):
5. A system for conveying information related to locations of mobile devices
associated with one or more object location sources that provide location
information for each mobile device comprising:
one or more user information databases storing a plurality of user
identification codes associated with a plurality of mobile devices in a plurality of
user groups;
one or more computing devices that create a plurality of informationsharing environments for users over a network comprising interfaces for
configuring the plurality of information-sharing environments based on one or
more varying levels of administrative privileges, said plurality of informationsharing environments comprising a first information-sharing environment and a
plurality of second information-sharing environments within the first informationsharing environment, the first information-sharing environment being
configurable based on a first level of administrative privilege by associating one
or more users with each one of a plurality of user groups, said plurality of second
information-sharing environment comprising a plurality of location information
sharing environments that are configurable for each user group independent of
one another based on one or more second levels of administrative privilege,
wherein the one or more second levels of administrative privilege are used to
specify one or more levels of location information access privilege for at least one
authorized user in each user group, wherein conveyance of information related to
locations of the plurality of mobile devices is managed based [on] a plurality of
location information access privileges specified for a plurality of authorized users.
In the context of this system claim as a whole, the disputed term refers to configuration
rather than to an actual action that must be performed, see Microprocessor Enhancement, 520
F.3d at 1375, cf. Summit 6, 802 F.3d at 1291, particularly in light of the disputed term appearing
in a “wherein” clause.
The Court therefore hereby expressly rejects Defendants’ proposed interpretation. No
further construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521
F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d
at 1291.
- 38 -
The Court accordingly hereby construes “are used to specify” to have its plain
meaning.
G. Indefiniteness
Plaintiff has submitted: “[Plaintiff] expects Defendants will not brief each and every one
of these terms, just as [Plaintiff] does not expect Defendants will address every single term that
they proposed. . . . [Plaintiff] will therefore respond to Defendants’ allegations in its reply brief.”
(Dkt. No. 86 at 23).
Defendants have responded with arguments as set forth below.
(1) “user identification codes” and “authorized user identification code”
“user identification codes”
(’012 Patent, Claims 6, 10, 12;
’207 Patent, Claims 17, 19;
’166 Patent, Claims 4, 5, 9, 10, 16, 19, 24;
’499 Patent, Claims 1, 4, 5, 12, 17)
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Or alternatively, a
code that identifies a user.
“authorized user identification code”
(’499 Patent, Claims 1, 4, 5, 12, 17)
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary.
(Dkt. No. 61, Ex. A at 12 & 77); (id., Ex. B at 1 & 24); (Dkt. No. 91 at 20–21); (Dkt. No. 97,
App’x A at 2, 53 & 57).
- 39 -
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument.”
(a) The Parties’ Positions
Defendants argue that whereas “[t]hese ‘codes’ are used to identify a person as a user to a
computer program,” “the specification deviates from that meaning without providing guidance as
to the scope of the term.” (Dkt. No. 91 at 21). Defendants also submit that “Plaintiff’s assertion
that the ‘user identification code’ can be any ID or other code demonstrates there is no constraint
on what can qualify as the ‘user identification code.’” (Id. at 22). Defendants further argue that
the term “mobile object identification code” is indefinite for the same reasons. (Id. at 20 n.17);
see (Dkt. No. 97, App’x A at 54 & 59).
Plaintiff replies that contrary to Defendants’ arguments, “there is nothing ‘conflicting’
about the notion that a user identification code may include a user account name or user number,
and the notion that a database may store a user identification code together with a user account
name and password.” (Dkt. No. 94 at 5). “Moreover,” Plaintiff argues, “the fact that the user
identification code may include and/or be stored with other user information (such as an account
name) does not vitiate the basic point that a user identification code is a code that identifies a
user.” (Id.).
At the April 21, 2016 hearing, Defendants presented argument as to all of the “code”
terms together. Defendants reiterated that the disclosures as to the various “codes” fail to
describe the “code” terms with reasonable certainty. Defendants also submitted, for example,
that whereas Plaintiff’s infringement contentions refer to a license plate as a user identification
code, a user is a person, not a vehicle.
- 40 -
(b) Analysis
Claim 1 of the ’499 Patent, for example, recites (emphasis added):
1. A system for conveying a plurality of event information associated with a
corresponding plurality of events that occur based on satisfactions of a
corresponding plurality of specified event conditions related to locations of a
corresponding plurality of mobile objects having a corresponding plurality of
mobile object identification codes, wherein each mobile object is associated with
at least one location information source that provides a corresponding location
information over a wireless network, said system comprising:
one or more computer servers configured to create a plurality of
information-sharing environments, said plurality of information-sharing
environments providing user interfaces for a plurality of authorized users over a
network of computing devices, said plurality of authorized users being associated
with a corresponding plurality of authorized user identification codes, wherein
said plurality of information-sharing environments are configurable based on
varying levels of administrator privileges, said varying levels of administrator
privilege comprising a first level of administrator privilege associated with a
network administrator and a second level of administrator privileges associated
with said plurality of authorized users, said first level of administrator privilege
being used in a first information-sharing environment to allow for configuring a
plurality of event information-sharing environments within said first informationsharing environment independent of one another, wherein said plurality of event
information-sharing environments are configurable based on said second levels of
administrator privileges for specifying the plurality of specified event conditions;
one or more access control systems that are configured to communicates
[sic] with said one or more computer servers to control access to the plurality of
information sharing environments, wherein access control to the plurality of
information sharing environments is based on access control codes requiring
multiple levels of access control comprising a first level of access control and a
second levels [sic] of access control, wherein access to said first information
sharing environment is controlled under the first level of access control based on
access control codes associated with the plurality of authorized user identification
codes, wherein access to said event information sharing environments is
controlled under the second level of access control to access the plurality of
specified event conditions independent of each other based on a corresponding
plurality of event information access codes that are associated with the plurality of
authorized user identification codes; and
an administrator system in communication with said one or more
computer servers adapted to configure a corresponding plurality of access
privileges for the plurality of authorized users that specify the specified event
conditions based on the plurality of event information access codes, wherein
conveyance of the plurality of event information is managed based on the
plurality of access privileges.
- 41 -
Although Defendants argue that “there is no guidance in the claims or otherwise to
distinguish an ‘authorized user identification code’ from a generic ‘user identification code’”
(Dkt. No. 91 at 21 n.18), the meaning of “authorized” in this context is sufficiently clear on its
face, particularly in light of the recital of “a plurality of authorized users” in the above-quoted
claim.
As to “user identification code,” the specification discloses that an example could be a
user account name, but the specification also discloses a user account name as being distinct
from a user identification code:
In accordance with the present invention, the users of the computing devices each
have user identification codes that can be associated with the computing devices
in order to manage the conveyance of information to the computing devices based
upon the identify [sic, identity] of the user and information access privileges.
Such user identification codes may be managed by a control station or may be
established based on user unique user [sic] information. Such codes would
typically include an identifier (e.g., a user account name or user number) and can
be associated with one or more groups, and one or more information access
privilege classifications, etc.
***
Information maintained for a user typically includes a user account name and
password and a user identification code, and may include a variety of information
about the user including the user’s name, address, phone number(s), email
address(s), company name, title, birth date, etc.
’931 Patent at 6:64–7:7 & 12:67–13:4 (emphasis added).
Contrary to Defendants’ arguments, no clear contradiction is apparent. Instead, the
specification thus discloses that whereas in some embodiments a user identification code may be
a user account name, in other embodiments the user identification code could be something other
than (or in addition to) a user account name.
Further, to the extent Defendants are arguing that these disputed terms are simply too
broad, “[b]readth is not indefiniteness.” In re Gardner, 427 F.2d 786, 788 (C.C.P.A. 1970); see
- 42 -
O.S. Sec. LLC v. BRK Brands, Inc., No. SACV 14-00310 AG, 2015 WL 6511400, at *7 (C.D.
Cal. Mar. 16, 2015) (Guilford, J.) (“the ‘input code’ terms, although broad, have a reasonably
certain scope” and “[t]hus they are not indefinite”).
The Court therefore expressly rejects Defendants’ indefiniteness arguments. No further
construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521 F.3d at
1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
Defendants have cited Maytag Corp. v. Electrolux Home Prods., Inc., 411 F. Supp. 2d 1008
(N.D. Iowa 2008), as authority for the proposition that construction is required because
“asserting that [the ordinary meaning of a term] should apply, without further construction,
merely begs the question of what that meaning is.” (Dkt. No. 91 at 3 n.3) (quoting Maytag, 411
F. Supp. 2d at 1037–38). Maytag is not binding authority and, moreover, here the Court has
resolved the parties dispute by rejecting Defendants’ indefiniteness argument and Defendants’
argument that the breadth of the “code” terms necessarily gives rise to a lack of reasonable
certainty as to claim scope.
The Court accordingly hereby construes “user identification codes” and “authorized
user identification code” to have their plain meaning.
(2) “user codes,” “first user code,” and “privileged user code”
“user codes”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Or alternatively, a
code that identifies a user.
- 43 -
“first user code”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Or alternatively, a
code that identifies a first user.
“privileged user code”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Alternatively, a
code that identifies a privileged user.
(Dkt. No. 61, Ex. A at 71 & 75); (Dkt. No. 91 at 22); (Dkt. No. 97, App’x A at 10–11).
Defendants submit that these disputed terms appear in Claims 9, 10 and 12 of the ’012 Patent.
(Dkt. No. 61, Ex. B at 9–10).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction for “user code”: “Plain and ordinary meaning. / Expressly
rejecting Defendants’ indefiniteness argument.” The Court also provided the parties with the
following preliminary constructions: “first user code” means “privileged user code”; and
“privileged user code” means “code that identifies a privileged user.”
(a) The Parties’ Positions
Defendants argue that “[b]ecause these different terms are used in the same claim, they
are presumed to have different meanings,” but “‘user code’ is never used in the specification, and
what distinguishes a ‘user code’ from a ‘user identification code’ is indeterminable.” (Dkt.
No. 91 at 22–23).
- 44 -
Plaintiff replies that “[t]he ‘privileged user code’ is also called a ‘first user code’ later in
the claim, to distinguish it from the ‘second user code’ also recited in the claim.” (Dkt. No. 94
at 6–7).
At the April 21, 2016 hearing, the parties presented oral argument as to all of the “code”
terms together.
(b) Analysis
Claim 7 of the ’012 Patent recites (emphasis added):
7. An apparatus for conveying information related to groups of users, comprising:
an administrator system having access to object location information, zone
information and object location event information associated with an information
access code that specifies a user group associated with a plurality of user codes
including 1) a privileged user code that is different from the information access
code and 2) a second user code that is different from the first user code and
information access code; and
a server configured to interface with a network comprising a plurality of
mobile devices associated with corresponding user identification codes, wherein
the second user code is associated with a location information source of one of the
mobile devices of the plurality of mobile devices based on the privileged user
code; and wherein an object location information provided by the location
information source is conveyed based on the information access code.
Although “the first user code” lacks explicit antecedent basis, antecedent basis can be
implicit. See Energizer Holdings Inc. v. Int’l Trade Comm’n, 435 F.3d 1366, 1371 (Fed. Cir.
2006) (holding that “an anode gel comprised of zinc as the active anode component” provided
implicit antecedent basis for “said zinc anode”); see also Ex Parte Porter, 25 U.S.P.Q. 2d (BNA)
1144, 1145 (B.P.A.I. 1992) (“The term ‘the controlled fluid’ . . . finds reasonable antecedent
basis in the previously recited ‘controlled stream of fluid . . . .’”). On balance, “the first user
code” has sufficiently clear antecedent basis in “a privileged user code.” See id.
- 45 -
Further, “privileged user code” is sufficiently clear on its face as meaning a code that
identifies a privileged user, and the parties have not presented any substantive dispute as to the
meaning of the word “privileged.”
As to the term “user codes,” the above-quoted claim also recites “user identification
codes,” and generally “we must presume that the use of . . . different terms in the claims
connotes different meanings.” CAE Screenplates, Inc. v. Heinrich Fiedler GmbH & Co. KG, 224
F.3d 1308, 1317 (Fed. Cir. 2000); see Primos, Inc. v. Hunter’s Specialties, Inc., 451 F.3d 841,
848 (Fed. Cir. 2006) (“[T]he terms ‘engaging’ and ‘sealing’ are both expressly recited in the
claim and therefore ‘engaging’ cannot mean the same thing as ‘sealing’; if it did, one of the
terms would be superfluous.”); see also Chi. Bd. Options Exch., Inc. v. Int’l Sec. Exch., LLC, 677
F.3d 1361, 1369 (Fed. Cir. 2012) (noting “[t]he general presumption that different terms have
different meanings”).
Nonetheless, “it is not unknown for different words to be used to express similar
concepts, even though it may be poor drafting practice.” Bancorp Servs., L.L.C. v. Hartford Life
Ins. Co., 359 F.3d 1367, 1373 (Fed. Cir. 2004). The Court therefore hereby expressly rejects
Defendants’ indefiniteness arguments.
The Court accordingly hereby construes the disputed terms as set forth in the following
chart:
Construction
Term
“user codes”
Plain meaning
“the first user code”
“privileged user code”
“privileged user code”
“code that identifies a privileged user”
- 46 -
(3) “group identification codes”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Alternatively, a
code that identifies a group.
(Dkt. No. 61, Ex. A at 95); (Dkt. No. 91 at 23); (Dkt. No. 97, App’x A at 29). Defendants
submit that this disputed term appears in Claims 4 and 19 of the ’166 Patent and Claims 12 and
17 of the ’499 Patent. (Dkt. No. 61, Ex. B at 15).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument.”
(a) The Parties’ Positions
Defendants argue that this disputed term is indefinite for the same reasons as for the term
“user identification code,” which is addressed above. (Dkt. No. 91 at 23).
At the April 21, 2016 hearing, the parties presented oral argument as to all of the “code”
terms together.
(b) Analysis
Claim 19 of the ’166 Patent, for example, recites (emphasis added):
19. A method for conveying information relating to location of mobile devices
associated with one or more object location sources that provide location
information for each mobile device comprising:
storing in one or more user information databases user identification codes
associated with a plurality of mobile devices;
creating a plurality of information-sharing environments for users over a
network of computing devices comprising interfaces for configuring the plurality
of information-sharing environments based on one or more varying levels of
administrative privileges, said information-sharing environments comprising a
first information-sharing environment and a plurality of second informationsharing environments that exist independent of each other, said plurality of second
- 47 -
information-sharing environments comprising a plurality of independently
configurable location information sharing environments within the first
information-sharing environment;
configuring the first information-sharing environment based on a first
level of administrative privilege comprising a privilege to associate at least one
user identification code with each one of a plurality of group identification codes;
configuring each one of the plurality of location information-sharing
environments for each one of the plurality of group identification codes
independent of one another based on a second level of administrative privilege
that comprises at least one location information access privilege specified for an
authorized of a [sic] user group; and
managing conveyance of information related to location of the plurality of
mobile devices based [on] a plurality of location information access privileges
specified for a plurality of authorized users.
The claim thus distinctly recites “user identification codes” and “group identification
codes,” and Defendants have not explained how this distinction is purportedly unclear. The
Court therefore hereby expressly rejects Defendants’ indefiniteness arguments.
No further
construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521 F.3d
at 1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
The Court accordingly hereby construes “group identification codes” to have its plain
meaning.
(4) “information access code” and “information package access code”
“information access code”
(’012 Patent, Claims 6, 9;
’499 Patent, Claims 1, 4, 5, 12, 17)
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Or alternatively, a
code for controlling access to information.
- 48 -
“information package access code”
(’012 Patent, Claims 23, 27)
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Or alternatively, a
code for controlling access to an information
package.
(Dkt. No. 61, Ex. A at 46–47); (id., Ex. B at 2 & 7); (Dkt. No. 91 at 23); (Dkt. No. 97, App’x A
at 2 & 17).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary constructions: “information access code” means “a code for
controlling access to information”; and “information package access code” means “a code for
controlling access to an information package.”
(a) The Parties’ Positions
Defendants argue that whereas “[a] POSA [(person of ordinary skill in the art)] would
have understood the term ‘access code’ to be a ‘password,’” here the specification and the
prosecution history demonstrate that “the Plaintiff intended to deviate from this common usage.”
(Dkt. No. 91 at 24). Nonetheless, Defendants urge, “the specification . . . deviate[s] from the
customary meaning of information access code without describing to a reasonable certainty what
scope the term should have.” (Id.).
Plaintiff replies that the plain meaning of these terms is sufficiently clear and is consistent
with how the patentee used these terms. (Dkt. No. 94 at 6). Also, Plaintiff argues, Defendants
have failed to show that “access code” would be understood in the art as synonymous with
- 49 -
“password” or that the patentee used “information access code” to mean anything broader than
“a code for controlling access to information.” (Id.).
At the April 21, 2016 hearing, Defendants reiterated that whereas the specification
discloses an embodiment in which an “information access code” is a password, during
prosecution the patentee distinguished a password from an “information access code.”
Defendants concluded that this contradiction gives rise to lack of reasonable certainty and,
therefore, indefiniteness. Plaintiff responded that Defendants’ argument is based on a false
assumption that an “information access code” is limited to being a password. As to “information
package access code,” Defendants argued that the term lacks reasonable certainty because there
is no way to determine whether, or how, this term differs from “information access code.”
(b) Analysis
Claim 18 of the ’012 Patent, for example, recites (emphasis added):
18. A method for conveying information among a plurality of computing devices
associated with a plurality of users including a first user, a second user, and a
third user, the method comprising:
providing an interface to a first computing device associated with the first
user to define a relationship of an information package with at least one of a zone
information, an object location information, or an object location event
information and to define an information package access code;
conveying the information package to a second computing device
associated with one of the second user or the third user based on said information
package access code.
The specification discloses that an “access code” can be a password:
Under another arrangement, an access code is assigned to information in the form
of a user-defined access code (i.e., a password) that a given user must have
knowledge of in order to be granted access to the information. With this
approach, the user associating the access code with information defines the userdefined access code and then conveys the user-defined access code to other
trusted users to which the user desires to have access to the information. Those
trusted users must enter the access code into their computing devices in order to
be granted access to the information.
- 50 -
’931 Patent at 7:61–8:3 (emphasis added).
During prosecution of parent United States Patent No. 7,525,425 (“the ’425 Patent”),7
however, the patentee distinguished an “information access code” from a password while
discussing the “Irish” reference, United States Patent No. 6,691,032:
. . . Irish does no[t] teach or suggest an access codes [sic], as conceded by the
Action. The Action, however, argues that “access codes are no more than
conventional pass words data that allow that allow [sic] user 18 access to certain
authorized information.” This argument is incorrectly premised on equating the
claimed requirement for the information access code with pass words for users.
As is well known by artisans, pass words are often selected by the users
themselves to allow authorized access to information. If a user in the game
system disclosed in Irish is given a pass word to prevent access to the user’s
location information, the game would not work. Therefore, one of ordinary skill
in the art would have no reasons to pass word protect the user location
information in Irish’s game. According to the present invention, however, the
required information access code are [sic] associated with the second user
specifically to prevent unauthorized conveyance of information relating to the
objects to unauthorized users. Based on the foregoing it is respectfully submitted
that Irish does not teach or suggest 1) associating an information access code with
information relating to an object 2) associating the information access code with a
second user and 3) conveying information relating to the object based on the
association.
(Dkt. No. 91, Ex. 6) (Nov. 24, 2008 Amendment in Response to Non-Final Office Action at 9–
10) (emphasis added).
Nonetheless, this statement that a password is not equivalent to an access code does not
amount to a definitive statement that the term “access code” cannot encompass a password. See
Omega Eng’g v. Raytek Corp., 334 F.3d 1314, 1324 (Fed. Cir. 2003) (“As a basic principle of
claim interpretation, prosecution disclaimer promotes the public notice function of the intrinsic
evidence and protects the public’s reliance on definitive statements made during prosecution.”)
7
All of the patents-in-suit are related to the ‘425 Patent through continuations. See Microsoft
Corp. v. Multi-Tech Sys., Inc., 357 F.3d 1340, 1349 (Fed. Cir. 2004) (“the prosecution history of
one patent is relevant to an understanding of the scope of a common term in a second patent
stemming from the same parent application”).
- 51 -
(emphasis added); see also Golight, Inc. v. Wal-Mart Stores, Inc., 355 F.3d 1327, 1332 (Fed. Cir.
2004) (“Because the statements in the prosecution history are subject to multiple reasonable
interpretations, they do not constitute a clear and unmistakable departure from the ordinary
meaning of the term . . . .”).
Likewise, the specification discloses that a password may be required in addition to an
access code:
Under still another arrangement, an access code specifies the individual users or
groups having access to the information to which the access code is associated
provided a given user knows the password. As such, the access code may specify
one or more users and/or one or more groups that can enter the appropriate
password in order to access the information. With this approach there are two
conditions that must be met to gain access, being included on the access list and
having knowledge of the password allowing access to information to be managed
by changing the access list and/or changing the password.
’931 Patent at 8:4–14; see id. at 8:15–21 (similar); see also id. at 7:37–8:23.
Thus, although the specification distinguishes between access codes and passwords, this
disclosure confirms that the term “access code” is potentially broader than a password and may
merely be used in conjunction with a password. Indeed, a technical dictionary submitted by
Defendants defines “access code” as meaning: “an identification number or password used to
gain access to a computer system.” (Dkt. No. 91, Ex. 2) (Webster’s New World Computer
Dictionary 8 (10th ed. 2003)) (emphasis added).
The Court accordingly hereby construes the disputed terms as set forth in the following
chart:
Term
“information access code”
Construction
“a code for controlling access to
information”
- 52 -
“information package access code”
“a code for controlling access to an
information package”
(5) “access control codes,” “access control codes requiring multiple levels of access
control,” and “access control codes associated with the plurality of authorized user
identification codes”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary. Alternatively,
codes for controlling access.
(Dkt. No. 61, Ex. A at 123–24); (Dkt. No. 91 at 24); (Dkt. No. 97, App’x A at 56). Defendants
submit that these disputed terms appear in Claims 1, 4, 5, 12, and 17 of the ’499 Patent. (Dkt.
No. 61, Ex. B at 27).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument.”
(a) The Parties’ Positions
Defendants submit that whereas surrounding claim language demonstrates that “access
control codes” are for controlling access to information sharing environments, “the specification
never describes ‘access control codes’ for accessing the environments themselves, only access to
certain information within the environment.” (Dkt. No. 91 at 25). Defendants argue that
“[w]hen read in view of the corresponding disclosure, a POSA [(person of ordinary skill in the
art)] is unable to determine with reasonable certainty whether the claim is proposing that the
‘access control code’ prompts access to information (as described in the specification) or the
environment (as recited in the claim).” (Id.).
- 53 -
Plaintiff replies that “this is a distinction without a difference. The information-sharing
environment is where location information is conveyed.” (Dkt. No. 94 at 7).
At the April 21, 2016 hearing Defendants submitted that, whereas Plaintiff is proposing
that these terms refer to controlling access to information, the claims refer to controlling access
to environments. Defendants urged that this inconsistency gives rise to indefiniteness. Plaintiff
responded that the specification discloses various codes for controlling various types of access,
and the analysis should focus on the language of each claim.
(b) Analysis
Claim 1 of the ’499 Patent recites (emphasis added):
1. A system for conveying a plurality of event information associated with a
corresponding plurality of events that occur based on satisfactions of a
corresponding plurality of specified event conditions related to locations of a
corresponding plurality of mobile objects having a corresponding plurality of
mobile object identification codes, wherein each mobile object is associated with
at least one location information source that provides a corresponding location
information over a wireless network, said system comprising:
one or more computer servers configured to create a plurality of
information-sharing environments, said plurality of information-sharing
environments providing user interfaces for a plurality of authorized users over a
network of computing devices, said plurality of authorized users being associated
with a corresponding plurality of authorized user identification codes, wherein
said plurality of information-sharing environments are configurable based on
varying levels of administrator privileges, said varying levels of administrator
privilege comprising a first level of administrator privilege associated with a
network administrator and a second level of administrator privileges associated
with said plurality of authorized users, said first level of administrator privilege
being used in a first information-sharing environment to allow for configuring a
plurality of event information-sharing environments within said first informationsharing environment independent of one another, wherein said plurality of event
information-sharing environments are configurable based on said second levels of
administrator privileges for specifying the plurality of specified event conditions;
one or more access control systems that are configured to communicates
[sic] with said one or more computer servers to control access to the plurality of
information sharing environments, wherein access control to the plurality of
information sharing environments is based on access control codes requiring
multiple levels of access control comprising a first level of access control and a
second levels [sic] of access control, wherein access to said first information
- 54 -
sharing environment is controlled under the first level of access control based on
access control codes associated with the plurality of authorized user identification
codes, wherein access to said event information sharing environments is
controlled under the second level of access control to access the plurality of
specified event conditions independent of each other based on a corresponding
plurality of event information access codes that are associated with the plurality of
authorized user identification codes; and
an administrator system in communication with said one or more
computer servers adapted to configure a corresponding plurality of access
privileges for the plurality of authorized users that specify the specified event
conditions based on the plurality of event information access codes, wherein
conveyance of the plurality of event information is managed based on the
plurality of access privileges.
The specification discloses:
Briefly, the present invention relates to conveying information relating to an
object to one or more users. The invention requires defining a zone by the one or
more users. An event is also defined in terms of a condition related to a
relationship between an object location and the zone. The condition can relates
[sic] to entry by the object into the zone, exit by the object from the zone, or
proximity of the object to the zone[.] Upon meeting the condition, information
regarding the event is conveyed to the at least one of the one or more users. The
one or more users can access at least one of the location information, information
relating to the zone or conveyed information regarding the event using one or
more access control codes. The access control codes can be configured to require
multiple levels of access control.
’931 Patent at 1:61–2:7 (emphasis added).
This above-quoted disclosure sufficiently demonstrates that “access control codes” are
codes for controlling access. Because this is also clear from the claim language itself, no
construction is necessary.
Further, contrary to Defendants’ arguments, the above-quoted
surrounding claim language that refers to information sharing environments (rather than simply
information) does not give rise to any contradiction or inconsistency.
Instead, the claim
language merely sets forth the nature of the access that is at issue.
The Court therefore hereby expressly rejects Defendants’ indefiniteness arguments. No
further construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521
- 55 -
F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d
at 1291.
The Court accordingly hereby construes “access control codes,” “access control codes
requiring multiple levels of access control,” and “access control codes associated with the
plurality of authorized user identification codes” to have their plain meaning.
(6) Conveying or Managing Conveyance Based on Something other than Information
Access Codes
The disputed terms here at issue are set forth in Appendix A to Defendants’ responsive
brief (Dkt. No. 91 at App’x A) and are: “conveyed . . . based on an authorization by the
authorized user,” “managing conveyance . . . based on a plurality of [location] information
access privileges associated with a plurality of authorized users,” “managing conveyance . . .
based [on] a plurality of location information access privileges specified for a plurality of
authorized users,” “conveyance . . . is managed based [on] a plurality of location information
access privileges specified for a plurality of authorized users,” “conveyed . . . based on a location
information access privilege specified for an authorized user,” and “conveyance . . . is managed
based on the plurality of access privileges.” See also (Dkt. No. 97 at App’x A).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument.”
(a) The Parties’ Positions
Defendants argue that “[t]he specification only contemplates conveyance and managing
conveyance of information based on ‘user identification codes’ and ‘information access codes.’”
(Dkt. No. 91 at 25). Defendants further urge that “conveyance based on broad, abstract concepts
of ‘authorization’ and ‘privileges’ is never described in the specification, and is broader than
- 56 -
what is envisioned by the specification, leaving a POSA [(person of ordinary skill in the art)]
unable to ascertain the scope of such conveyance.” (Id. at 26).
Plaintiff replies that “this is not an indefiniteness argument at all. By arguing that these
claim elements are unsupported by the specification, Defendants are really making a written
description argument, which should be presented via a summary judgment motion or at trial.”
(Dkt. No. 94 at 8).
At the April 21, 2016 hearing, the parties did not present any oral argument as to these
terms.
(b) Analysis
Defendants’ arguments that what is claimed is “broader than what is envisioned by the
specification” (Dkt. No. 91 at 25) may perhaps relate to issues such as enablement or written
description but are not relevant in the present claim construction proceedings. See Phillips, 415
F.3d at 1327 (“we have certainly not endorsed a regime in which validity analysis is a regular
component of claim construction”).
During prosecution of the parent ’425 Patent, the patentee distinguished the “Irish”
reference based on lack of use of access codes. (Dkt. No. 91, Ex. 6) (Nov. 24, 2008 Amendment
in Response to Non-Final Office Action at 9–10) (emphasis added). Defendants have not
demonstrated, however, that the same claim language was at issue in that prosecution history as
is at issue here. Instead, the document cited by Defendants sets forth claim language explicitly
reciting use of access codes. See (id. at 2, 6).
The Court therefore hereby expressly rejects Defendants’ indefiniteness arguments. No
further construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521
- 57 -
F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d
at 1291.
The Court accordingly hereby construes “conveyed . . . based on an authorization by
the authorized user,” “managing conveyance . . . based on a plurality of [location]
information access privileges associated with a plurality of authorized users,” “managing
conveyance . . . based [on] a plurality of location information access privileges specified for
a plurality of authorized users,” “conveyance . . . is managed based [on] a plurality of
location information access privileges specified for a plurality of authorized users,”
“conveyed . . . based on a location information access privilege specified for an authorized
user,” and “conveyance . . . is managed based on the plurality of access privileges” to have
their plain meaning.
(7) “levels of location information access privilege”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
“a hierarchy of privileges for accessing
location information”
Indefinite
(Dkt. No. 86 at 11); (Dkt. No. 91 at 26); (Dkt. No. 97, App’x A at 25). Defendants submit that
this disputed term appears in Claims 4, 5, 9, 10, and 16 of the ’166 Patent. (Dkt. No. 61, Ex. B at
16).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Plaintiff’s proposal of ‘hierarchy’ / Expressly rejecting Defendants’ indefiniteness argument.”
- 58 -
(a) The Parties’ Positions
Defendants argue that whereas “the claims themselves distinguish between privileges for
‘authorized users’ and ‘administrators,’ and thus a POSA [(person of ordinary skill in the art)]
would understand there must be a difference between the two,” this disputed term has “no
generally accepted definition,” and “the specification provides no guidance on how multiple
levels of ‘location access privilege’ for a single authorized user could be ‘specified.’” (Dkt.
No. 91 at 26–27).
Plaintiff replies that “this term plainly connotes how according to the level of access
privilege(s) assigned, users are able to access certain information that other users with lower or
without access privileges are unable to access.”
(Dkt. No. 94 at 8) (citation and internal
quotation marks omitted).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
(b) Analysis
Claim 1 of the ’166 Patent, for example, recites (emphasis added):
1. A method for conveying information related to locations of a plurality of
mobile devices of users in a plurality of user groups, comprising:
creating a plurality of information-sharing environments over a network of
computing devices comprising interfaces for configuring the plurality of
information-sharing environments for users based on varying levels of
administrative privileges, wherein the plurality of information-sharing
environments comprise a first information-sharing environment and a plurality of
second information-sharing environments, said plurality of second informationsharing environments comprising a plurality of independently configurable
location information sharing environments created within the first information
sharing environment;
configuring the first information-sharing environment based on a first
level of administrative privilege to associate one or more users that use the
plurality of location information sharing environment with each one of the
plurality of user groups;
- 59 -
configuring each one [of] the plurality of location information-sharing
environments for each user group independent of one another based on at least
one second level of administrative privilege by specifying one or more levels of
location information access privilege for at least one authorized user in each user
group; and
managing conveyance of information related to location of the plurality of
the mobile devices in the plurality of user groups based on a plurality of location
information access privileges associated with a plurality of authorized users.
The specification discloses:
Because smaller information-sharing environments can exist within larger
information-sharing information environments, various levels of administrator
privileges can exist.
’931 Patent at 5:51–54. Although this disclosure refers to “administrator privileges” rather than
location information access privileges, this disclosure is nonetheless instructive as to the
significance of using multiple levels of privileges.
Further, although Defendants argue that “it is unclear how an ‘authorized user’ can have
more than one level of privilege in a user group, as the specification suggests the privilege for the
user is tied to the group with which the user is associated” (Dkt. No. 91 at 26–27), Defendants
have not identified any persuasive evidence that warrants precluding a user from having multiple
levels of location information access privilege.
As to Plaintiff’s proposal of a “hierarchy,” however, Plaintiff has not demonstrated that
the existence of multiple “levels” necessarily requires a hierarchical organization.
The Court therefore hereby expressly rejects Plaintiff’s proposed construction as well as
Defendants’ proposed construction. No further construction is necessary. See U.S. Surgical,
103 F.3d at 1568; see also O2 Micro, 521 F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo,
694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
The Court therefore hereby construes “levels of location information access privilege”
to have its plain meaning.
- 60 -
(8) “grouping configurations”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary.
(Dkt. No. 61, Ex. A at 98); (Dkt. No. 91 at 27); (Dkt. No. 97, App’x A at 59). Defendants
submit that this disputed term appears in Claims 12 and 17 of the ’499 Patent. (Dkt. No. 61, Ex.
B at 25).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Claim 6 of the ’499 Patent is indefinite because ‘said
plurality of specified event configurations’ lacks sufficiently clear antecedent basis in Claim 1.”
(a) The Parties’ Positions
Defendants argue: “The term ‘grouping configurations’ is never recited in the
specification. It is entirely unclear what ‘grouping configurations associated with said plurality
of specified event configurations’ means within the claims.” (Dkt. No. 91 at 27) (footnote
omitted).
Plaintiff replies that “[c]ontrary to Defendants’ argument, the claim language shows that
this term refers to configurations by which certain authorized user ID codes or mobile object ID
codes are associated with certain group ID codes for certain events.” (Dkt. No. 94 at 8). “For
example,” Plaintiff argues, “different events will cause location information to be sent to
different groups, depending on which authorized user and mobile object ID codes are associated
with which groups for that event.” (Id. at 9).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
- 61 -
(b) Analysis
“[A] claim could be indefinite if a term does not have proper antecedent basis where such
basis is not otherwise present by implication or the meaning is not reasonably ascertainable.”
Halliburton Energy Servs., Inc. v. M-I LLC, 514 F.3d 1244, 1249 (Fed. Cir. 2008).
Claims 6 and 11 of the ’499 Patent depend from Claim 1. Claims 1, 6, and 11 recite
(emphasis added):
1. A system for conveying a plurality of event information associated with a
corresponding plurality of events that occur based on satisfactions of a
corresponding plurality of specified event conditions related to locations of a
corresponding plurality of mobile objects having a corresponding plurality of
mobile object identification codes, wherein each mobile object is associated with
at least one location information source that provides a corresponding location
information over a wireless network, said system comprising:
one or more computer servers configured to create a plurality of
information-sharing environments, said plurality of information-sharing
environments providing user interfaces for a plurality of authorized users over a
network of computing devices, said plurality of authorized users being associated
with a corresponding plurality of authorized user identification codes, wherein
said plurality of information-sharing environments are configurable based on
varying levels of administrator privileges, said varying levels of administrator
privilege comprising a first level of administrator privilege associated with a
network administrator and a second level of administrator privileges associated
with said plurality of authorized users, said first level of administrator privilege
being used in a first information-sharing environment to allow for configuring a
plurality of event information-sharing environments within said first informationsharing environment independent of one another, wherein said plurality of event
information-sharing environments are configurable based on said second levels of
administrator privileges for specifying the plurality of specified event conditions;
one or more access control systems that are configured to communicates
[sic] with said one or more computer servers to control access to the plurality of
information sharing environments, wherein access control to the plurality of
information sharing environments is based on access control codes requiring
multiple levels of access control comprising a first level of access control and a
second levels [sic] of access control, wherein access to said first information
sharing environment is controlled under the first level of access control based on
access control codes associated with the plurality of authorized user identification
codes, wherein access to said event information sharing environments is
controlled under the second level of access control to access the plurality of
specified event conditions independent of each other based on a corresponding
- 62 -
plurality of event information access codes that are associated with the plurality of
authorized user identification codes; and
an administrator system in communication with said one or more
computer servers adapted to configure a corresponding plurality of access
privileges for the plurality of authorized users that specify the specified event
conditions based on the plurality of event information access codes, wherein
conveyance of the plurality of event information is managed based on the
plurality of access privileges.
***
6. The system of claim 1, further comprising one or more databases accessible by
the one or more computer servers adapted to store a plurality of identification
codes comprising said plurality of authorized user identification codes and mobile
object identification codes, wherein said plurality of identification codes are
associated with a plurality of user group identification codes in the one or more
data bases under a plurality of grouping configurations associated with said
plurality of specified event configurations for the plurality of mobile objects.
***
11. The system of claim 6, wherein said plurality of grouping configurations are
user specified.
Because “said plurality of specified event configurations” in Claim 6 lacks sufficiently
clear antecedent basis (in Claim 6 itself or in Claim 1, from which Claim 6 depends), Claim 6 of
the ’499 Patent is indefinite.
(9) Dependent Claims 6, 8, and 9 of the ’012 Patent
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Not indefinite under 35 U.S.C. § 112(4).”
(a) The Parties’ Positions
Defendants argue that “[d]ependent claims 012:6, 8, and 9 actually broaden the claims
from which they depend (claims 1 and 7)” and are therefore indefinite. (Dkt. No. 91 at 27).
Specifically, Defendants submit that whereas “independent claim 1 and 7 explicitly recite that
- 63 -
‘object location information’ is conveyed,” “dependent claims 6, 8, and 9 are implicated if only
zone or event information is conveyed.” (Dkt. No. 91 at 27).
Plaintiff replies: “Defendants do not contest that the dependent claims add other
limitations that narrow these claims. Thus, each dependent claim is narrower overall than its
parent independent claim, just as [35 U.S.C.] Section 112 requires.” (Dkt. No. 94 at 9).
At the April 21, 2016 hearing, Defendants argued that these dependent claims are
indefinite because they attempt to be both broader and narrower than the claims from which they
depend. Plaintiff responded that these dependent claims are not improperly broadening because
they do not purport to remove any limitation. Further, Plaintiff argued that even if portions of
the dependent claims are attempting to broaden rather than narrow, as Defendants contend, then
the result would not be indefiniteness but would be merely that such portions are ineffective. Cf.
In re Johnston, 435 F.3d 1381, 1384 (Fed. Cir. 2006) (“optional elements do not narrow the
claim because they can always be omitted”).
(b) Analysis
Claim 6 of the ’012 Patent depends from Claim 5, which in turn depends from Claim 1.
Claims 1, 5, and 6 of the ’012 Patent recite (emphasis added):
1. A method for conveying user location information, comprising:
interfacing with an administrator that authorizes a first user associated
with a first user identification code to access an object location information from
a location information source associated with a second user identification code
that is different from the first identification code; and
conveying the object location information to a third user based on an
information access code specified by said first user, said information access code
being associated with a third user identification code that is different from the first
and second user identification codes.
***
5. The method of claim 1, wherein the second user identification code is
associated with a zone information comprising a coordinate on a map; and
- 64 -
wherein at least one of the object location information or zone information is
conveyed to the third user based on the information access code.
6. The method of claim 5, wherein the second user identification code is
associated with an object location event information that relates the object
location information to the zone information; and wherein at least one of the
object location information or the zone information or the object location event
information is conveyed to the third user based on the information access code.
Claim 9 of the ’012 Patent depends from Claim 8, which in turn depends from Claim 7.
Claims 7–9 of the ’012 Patent recite (emphasis added):
7. An apparatus for conveying information related to groups of users, comprising:
an administrator system having access to object location information, zone
information and object location event information associated with an information
access code that specifies a user group associated with a plurality of user codes
including 1) a privileged user code that is different from the information access
code and 2) a second user code that is different from the first user code and
information access code; and
a server configured to interface with a network comprising a plurality of
mobile devices associated with corresponding user identification codes, wherein
the second user code is associated with a location information source of one of the
mobile devices of the plurality of mobile devices based on the privileged user
code; and wherein an object location information provided by the location
information source is conveyed based on the information access code.
8. The apparatus of claim 7, wherein at least one zone information comprising a
coordinate on a map is associated with the second user based on the privileged
user code, and wherein at least one of the object location information or zone
information is conveyed based on the information access code.
9. The apparatus of claim 8, wherein at least one object location event
information that relates the object location information to the zone information is
associated with the second user based on the privileged user code, and wherein at
least one of the object location information or zone information or object location
event information is conveyed based on the information access code.
Because the dependent claims recite additional limitations, Defendants have failed to
demonstrate that any claim is impermissibly broader that any corresponding claim from which
the claim depends. See 35 U.S.C. § 112, ¶ 4 (“a claim in dependent form shall contain a
- 65 -
reference to a claim previously set forth and then specify a further limitation of the subject matter
claimed”). The Court therefore hereby expressly rejects Defendants’ indefiniteness arguments.
H. Means-Plus-Function
(1) “administrator system”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary. Or alternatively, a
system for administering.
Indefinite as written, or when construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Not indefinite; Should not be construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Function: [accessing] object location
information, zone information and object
location event information associated with an
information access code (’012, cl. 7)
Function: configure a corresponding plurality
of access privileges for the plurality of
authorized users that specify the specified
event conditions based on the plurality of event
information access codes (’499, cl. 1)
No corresponding structure, material, or acts
are disclosed.
(Dkt. No. 61, Ex. A at 70); (id., Ex. B at 2); (Dkt. No. 97, App’x A at 9). Defendants submit that
this disputed term appears in Claims 9, 10, and 12 of the ’012 Patent and Claims 1, 4, 5, 12, and
17 of the ’499 Patent. (Dkt. No. 61, Ex. B at 2).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “‘a computer system for administering’ / Expressly
rejecting Defendants’ indefiniteness argument / Expressly rejecting Defendants’ argument that
this term is governed by 35 U.S.C. § 112(6).”
(a) The Parties’ Positions
Plaintiff submits as to Claim 1 of the ’499 Patent that “the claim does not even recite a
function for the ‘administrator system’ to perform” and “instead recites terms explaining how the
- 66 -
administrator system is adapted, but there is nothing for the administrator system to perform.”
(Dkt. No. 86 at 25). “Further,” Plaintiff argues, “in the context of the asserted patents, the
‘administrator system’ designates structure to skilled artisans — namely, a component of the
information system that provides administration.” (Id.). Plaintiff also argues that this term in
Claim 7 of the ’012 Patent “is not expressed in terms using the words ‘means’ or ‘step’ for
performing a function, no specified function follows the recited element, and the term would be
understood as structure to a person skilled in the art.” (Id. at 26).
Defendants respond that “[t]here is no generally accepted definition or structure in the art
for ‘administrator system,’” “[t]he claims fail to disclose the scope of ‘administrator system,’ and
the specification never refers to any ‘administrator system.’” (Dkt. No. 91 at 13). Alternatively,
Defendants argue that this is a means-plus-function term because “‘system’ is a known ‘nonce’
term” and “[t]he modifier ‘administrator’ is merely functional.”
(Id. at 14).
“Finally,”
Defendants urge, “there is no corresponding algorithm in the specification for implementing the
functions corresponding to the ‘administrator system.’ Rather, to the extent these functions may
be described, they are recited at a high level of abstractness and are not even tied to any ‘system’
or ‘device.’” (Id. at 15).
Plaintiff replies by incorporating the arguments set forth in its opening brief. See (Dkt.
No. 94 at 1 n.2).
At the April 21, 2016 hearing, Defendants reiterated that “system” is a nonce term that
fails to connote any structure for performing the recited functions. Plaintiff responded that the
claim language at issue recites configuration, not function.
- 67 -
(b) Analysis
Title 35 U.S.C. § 112, ¶ 6 provides: “An element in a claim for a combination may be
expressed as a means or step for performing a specified function without the recital of structure,
material, or acts in support thereof, and such claim shall be construed to cover the corresponding
structure, material, or acts described in the specification and equivalents thereof.” “[T]he failure
to use the word ‘means’ . . . creates a rebuttable presumption . . . that § 112, para. 6 does not
apply.” Williamson v. Citrix Online LLC, 792 F.3d 1339, 1348 (Fed. Cir. 2015) (citations and
internal quotation marks omitted). “When a claim term lacks the word ‘means,’ the presumption
can be overcome and § 112, para. 6 will apply if the challenger demonstrates that the claim term
fails to recite sufficiently definite structure or else recites function without reciting sufficient
structure for performing that function.” Id. at 1349 (citations and internal quotation marks
omitted).
Williamson, in an en banc portion of the decision, abrogated prior statements that the
absence of the word “means” gives rise to a “strong” presumption against means-plus-function
treatment.
Id. (citation omitted).
Williamson also abrogated prior statements that this
presumption “is not readily overcome” and that this presumption cannot be overcome “without a
showing that the limitation essentially is devoid of anything that can be construed as structure.”
Id. (citations omitted). Instead, Williamson found, “[h]enceforth, we will apply the presumption
as we have done prior to Lighting World . . . .” Id. (citing Lighting World, Inc. v. Birchwood
Lighting, Inc., 382 F.3d 1354, 1358 (Fed. Cir. 2004)). In a subsequent part of the decision not
considered en banc, Williamson affirmed the district court’s finding that the term “distributed
learning control module” was a means-plus-function term that was indefinite due to lack of
- 68 -
corresponding structure, and in doing so Williamson stated that “‘module’ is a well-known nonce
word.” Id. at 1350.
The term “system” as used here is different from the word “module” in Williamson. Id.
at 1348 (“What is important is . . . that the term, as the name for structure, has a reasonably well
understood meaning in the art.”) (quoting Greenberg v. Ethicon Endo-Surgery, Inc., 91 F.3d
1580, 1583 (Fed. Cir. 1996)).
In so finding, the Court applies long-standing principles articulated prior to the abrogated
Lighting World decision. See, e.g., Linear Tech. Corp. v. Impala Linear Corp., 379 F.3d 1311,
1320 (Fed. Cir. 2004) (“when the structure-connoting term ‘circuit’ is coupled with a description
of the circuit’s operation, sufficient structural meaning generally will be conveyed to persons of
ordinary skill in the art, and § 112 ¶ 6 presumptively will not apply”; noting “language reciting
[the circuits’] respective objectives or operations”); Apex Inc. v. Raritan Computer, Inc., 325
F.3d 1364, 1372 (Fed. Cir. 2003) (“While we do not find it necessary to hold that the term
‘circuit’ by itself always connotes sufficient structure, the term ‘circuit’ with an appropriate
identifier such as ‘interface,’ ‘programming’ and ‘logic,’ certainly identifies some structural
meaning to one of ordinary skill in the art.”); Personalized Media Commc’ns, LLC v. Int’l Trade
Comm’n, 161 F.3d 696, 705 (Fed. Cir. 1998) (“Even though the term ‘detector’ does not
specifically evoke a particular structure, it does convey to one knowledgeable in the art a variety
of structures known as ‘detectors.’
We therefore conclude that the term ‘detector’ is a
sufficiently definite structural term to preclude the application of § 112, ¶ 6.”); Greenberg, 91
- 69 -
F.3d at 1583 (finding that “detent mechanism” was not a means-plus-function term because it
denotes a type of device with a generally understood meaning in the mechanical arts).8
Claim 1 of the ’499 Patent recites, in relevant part (emphasis added):
1. A system for conveying a plurality of event information associated with a
corresponding plurality of events that occur based on satisfactions of a
corresponding plurality of specified event conditions related to locations of a
corresponding plurality of mobile objects having a corresponding plurality of
mobile object identification codes, wherein each mobile object is associated with
at least one location information source that provides a corresponding location
information over a wireless network, said system comprising:
one or more computer servers configured to create a plurality of
information-sharing environments, said plurality of information-sharing
environments providing user interfaces for a plurality of authorized users over a
network of computing devices, . . .;
. . . and
an administrator system in communication with said one or more
computer servers adapted to configure a corresponding plurality of access
privileges for the plurality of authorized users that specify the specified event
conditions based on the plurality of event information access codes, wherein
conveyance of the plurality of event information is managed based on the
plurality of access privileges.
Claim 7 of the ’012 Patent recites (emphasis added):
7. An apparatus for conveying information related to groups of users, comprising:
an administrator system having access to object location information, zone
information and object location event information associated with an information
access code that specifies a user group associated with a plurality of user codes
including 1) a privileged user code that is different from the information access
code and 2) a second user code that is different from the first user code and
information access code; and
a server configured to interface with a network comprising a plurality of
mobile devices associated with corresponding user identification codes, wherein
the second user code is associated with a location information source of one of the
mobile devices of the plurality of mobile devices based on the privileged user
8
Greenberg, 91 F.3d at 1583 (“‘detent’ denotes a type of device with a generally understood
meaning in the mechanical arts, even though the definitions are expressed in functional terms”);
id. (“It is true that the term ‘detent’ does not call to mind a single well-defined structure, but the
same could be said of other commonplace structural terms such as ‘clamp’ or ‘container.’ What
is important is not simply that a ‘detent’ or ‘detent mechanism’ is defined in terms of what it
does, but that the term, as the name for structure, has a reasonably well understood meaning in
the art.”)
- 70 -
code; and wherein an object location information provided by the location
information source is conveyed based on the information access code.
The specification refers to an administrator in the context of computer systems, as evident
from discussion of using a database of user information:
In accordance with the present invention, an administrator of an informationsharing environment maintains a database of user information for those having
access to the information-sharing environment. Such a database can be
maintained on a central or distributed control station that may be a company’s
computer server or on an individual’s personal computer.
Information
maintained for a user typically includes a user account name and password and a
user identification code, and may include a variety of information about the user
including the user’s name, address, phone number(s), email address(s), company
name, title, birth date, etc. A user may be given access privileges to certain
classes of information based on the user’s position or role within a company or
family, a Government security clearance, and/or for other reasons deemed
appropriate for a given information-sharing environment.
An administrator can define one or more groups to which a given user can be
associated. Groups may be defined in accordance with an organizational structure
or hierarchy. For example, an administrator for an information-sharing
environment corresponding to a company may define groups for the various
organizations within the company, such as legal, accounting, shipping, etc., and
for groups of users not based on organization, such as executive, management,
administrative, exempt employees, non-exempt employees, etc. After a group has
been defined, the administrator can associate individual users with one or more of
the defined groups. Similarly, a parent administering an information-sharing
environment might define groups such as parents, teenagers, children, drivers, and
so forth. Information maintained for a group typically includes a group name and
group identification code, and may include a variety of information about the
group including the group’s address, phone number, email address, website,
point-of-contact, etc. As such, a user may be associated with one or more groups
defined by an administrator of an information-sharing environment.
’931 Patent at 12:61–13:29 (emphasis added).
Plaintiff’s expert, Dr. Schonfeld, likewise persuasively opines that the term
“administrator system” would be understood as referring to a computer system:
242. A person of ordinary skill in the art would recognize that “an administrator
system” in both of these claims [(Claim 1 of the ’499 Patent and Claim 7 of the
’012 Patent], refers to a structural component of the information system described
throughout the specification that provides the administration of the inventions in
- 71 -
those claims. More specifically, one skilled in the art would recognize from the
specification that the administrator system is a computer system (e.g., server) with
access to a database including information regarding the identification of objects
in the information system, and any access privileges assigned to those objects.
This is reflected in the claim language above, which describes the administrator
system as one that has access to the different access privileges for the users of the
information system.
(Dkt. No. 86, Ex. 6) (Feb. 20, 2016 Schonfeld Decl. at ¶ 242); see Teva, 135 S. Ct. at 841.
Such a reading is also consistent with the surrounding claim language in Claim 1 of the
’499 Patent, quoted above, which recites that the administrator system is “in communication with
. . . one or more computer servers.”
Although Defendants have cited authority for the
proposition that “system” is a “nonce” term that is simply a substitute for the word “means,” the
authorities cited by Defendants are not binding on this Court and do not address circumstances
analogous to the above-discussed intrinsic and extrinsic evidence.
See Joao Control &
Monitoring Sys., LLC v. Protect Am., Inc., No. 1:14-CV-134, 2015 WL 4937464, at *5 (W.D.
Tex. Aug. 18, 2015) (Yeakel, J.); Vir2us, Inc. v. Invincea Labs, LLC, No. 2:15-CV-162, Dkt.
No. 78, slip op. at 12–13 (E.D. Va. Feb. 19, 2016) (Morgan, J.).
Thus, the Court hereby expressly rejects Defendants’ arguments that “administrator
system” is a means-plus-function term.
The Court accordingly hereby construes “administrator system” to mean “a computer
system for administering.”
- 72 -
(2) “one or more servers configured to” and “one or more computer servers
configured to”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary.
Indefinite as written, or when construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Not indefinite; Should not be construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Function: interface with a network comprising
a plurality of mobile devices associated with
corresponding user identification codes (’012,
cl. 7)
Function: to create a plurality of informationsharing environments (’499, cl. 1)
Function: to communicates [sic] with said one
or more computer servers to control access to
the plurality of information sharing
environments (’499, cl. 1)
Function: to control access to the plurality of
information sharing environments (’499,
cl. 19)
Function: All steps of ’931 patent, cl. 1 and 2
No corresponding structure, material, or acts
are disclosed.
(Dkt. No. 61, Ex. A at 116); (id., Ex. B at 4); (Dkt. No. 97, App’x A at 8). Defendants submit
that these disputed terms appear in Claims 9, 10, and 12 of the ’012 Patent, Claims 1, 4, 5, 12,
and 17 of the ’012 Patent, and Claims 2, 6, 12, 13, 16, 20, and 22–26 of the ’931 Patent. (Dkt.
No. 61, Ex. B at 4).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ argument that this term is governed by 35 U.S.C. § 112(6) / The Court construes
- 73 -
‘configured to’ to have its plain meaning, which the Court understands to require not merely
being capable of being configured but rather being actually configured.”
(a) The Parties’ Positions
Plaintiff argues that “[C]laims 1 and 2 [of the ’931 Patent] include clear structure in the
claim itself” because “[a] ‘server’ is a well known term in the art, and is not a nonce term.”
(Dkt. No. 86 at 27) (emphasis omitted). As to Claims 1 and 19 of the ’499 Patent and Claim 7 of
the ’012 Patent, Plaintiff likewise argues that “[t]he claims describe the configuration of the
claimed element, but are not written in the style of a means plus function claim.” (Id. at 29).
Defendants respond that Claim 1 of the ’931 Patent “is a classic example of an attempt to
exalt form over substance to avoid triggering § 112 ¶ 6.” (Dkt. No. 91 at 10). Specifically,
Defendants argue that the recital of “one or more servers” is a “black box” that lacks structure,
and “‘configured to’ is merely a substitute for the word ‘for.’” (Id.). In other words, Defendants
argue that “the claim recites the server(s) in purely functional terms, failing to impart sufficient
structure to perform each of the claims’ functions.” (Id. at 12). As to corresponding structure,
Defendants argue that “[b]ecause this is a computer-implemented claim limitation, an algorithm
must be disclosed in the specification,” but “no algorithm is disclosed for performing any of the
twelve functions recited in [the claim].” (Id.).
Defendants likewise respond as to Claim 1 of the ’499 Patent that “the generic recitation
of ‘one or more servers’ . . . provides insufficient structure for ‘creat[ing] a plurality of
information-sharing environments.’” (Id. at 13).
Plaintiff replies that the intrinsic evidence as well as case law demonstrate that the term
“server” connotes structure such that 35 U.S.C. § 112, ¶ 6 does not apply. (Dkt. No. 94 at 1–4).
- 74 -
At the April 21, 2016 hearing, Defendants reiterated their arguments that the claims
simply use the word “server” in place of “means” because the generic term “server” is
insufficient to describe structure for performing the recited functions. Plaintiff responded that
Defendants are attempting to apply the corresponding structure requirement of a means-plusfunction analysis in an attempt to demonstrate that “server” is a means-plus-function term.
Moreover, Plaintiff argued, a “server” is not a general-purpose computer but rather is a specialpurpose computer.
(b) Analysis
Defendants have failed to demonstrate that the term “server” lacks sufficient structural
meaning. See, e.g., Nomadix, Inc. v. Hosp. Core Servs. LLC, No. 14-08256, 2016 WL 344461,
at *7–*8 (C.D. Cal. Jan. 27, 2016) (Pregerson, J.) (“‘server’ is . . . a well-known structural
term”); Atser Research Techs., Inc. v. Raba-Kistner Consultants Inc., No. SA-07-CA-93-H, 2009
WL 691118, at *13 (W.D. Tex. Mar. 2, 2009) (Hudspeth, J.) (finding “server” not a nonce term
because it is “clear that a server is a noun that denotes a type of structure”); cf. Intellectual
Ventures II LLC v. BITCO Gen. Ins. Corp., No. 6:15-CV-59, 2016 WL 125594, at *14 (E.D.
Tex. Jan. 11, 2016) (Gilstrap, J.) (regarding an “administrative interface” term, finding that
“‘interface’ is not a verbal construct but rather connotes sufficiently definite structure to one
skilled in the art”).
The authorities cited by Defendants are unpersuasive.
Pi-Net, which involved a
“computer system” term, is unpersuasive because whereas the court emphasized that “the
specification provides no details,” the court did not address whether the term “computer system”
itself connoted structure to a person of ordinary skill in the art. Pi-Net Int’l Inc. v. JPMorgan
Chase & Co., No. 12-282-SLR, 2014 WL 1997039, at *12–*13 (D. Del. May 14, 2014)
- 75 -
(Robinson, J.).
The Intellectual Ventures I cases are similar as to terms that included a
“processing device” and a “computing device.” Intellectual Ventures I, LLC v. Canon Inc., No.
13-473-SLR, 2015 WL 1458035, at *14 (D. Del. Mar. 27, 2015) (Robinson, J.); Intellectual
Ventures I, LLC v. Canon Inc., No. 11-792-SLR, 2014 WL 1392690, at *2–*3 (D. Del. Apr. 10,
2014) (Robinson, J.).
Likewise, Soque Holdings found that “if ‘computer’ is insufficient [corresponding]
structure for a ‘means’ limitation, the naked term ‘computer’ cannot describe sufficient structure
when recited directly in the claim limitation.” Soque Holdings Ltd. v. Keyscan, Inc., No.
C 09-2651, 2010 WL 2292316, at *12 (N.D. Cal. June 7, 2010) (Patel, J.).
The Court of Appeals for the Federal Circuit, however, has rejected such an approach:
The overall means-plus-function analysis is a two-step process. Naturally, there
is some analytical overlap between these two steps. In the first step, we must
determine if the claim limitation is drafted in means-plus-function format. As
part of this step, we must construe the claim limitation to decide if it connotes
“sufficiently definite structure” to a person of ordinary skill in the art, which
requires us to consider the specification (among other evidence). In the second
step, if the limitation is in means-plus-function format, we must specifically
review the specification for “corresponding structure.” Thus, while these two
“structure” inquiries are inherently related, they are distinct.
***
[T]he first step in the means-plus-function analysis requires us to determine
whether the entire claim limitation at issue connotes “sufficiently definite
structure” to a person of ordinary skill in the art. . . . In so doing, we naturally
look to the specification, prosecution history, and relevant external evidence to
construe the limitation. While this inquiry may be similar to looking for
corresponding structure in the specification, our precedent requires it when
deciding whether a claim limitation lacking means connotes sufficiently definite
structure to a person of ordinary skill in the art.
Apple Inc. v. Motorola, Inc., 757 F.3d 1286, 1296–97 (Fed. Cir. 2014) (citations omitted),
abrogated on other grounds by Williamson, 792 F.3d 1339.
- 76 -
Finally, Defendants have cited Ex Parte Reddy, a decision by the Patent Trial and Appeal
Board (“PTAB”) finding that “[t]he word ‘server’ is a generic nonce word that connotes no
particular structure. Rather, the word describes a function, viz. serving.” Ex Parte Reddy,
No. 2012-000454, 2014 WL 5511407, at *6 (P.T.A.B. Oct. 29, 2014)
This PTAB decision is
not binding on this Court and is unpersuasive, in particular because Ex Parte Reddy cited no
evidence for its finding that “server” does not connote structure. See id.
The Court therefore hereby expressly rejects Defendants’ arguments that these disputed
terms are means-plus-function terms governed by 35 U.S.C. § 112, ¶ 6, and the Court hereby
construes “one or more servers configured to” and “one or more computer servers
configured to” to have their plain meaning, including as to the phrase “configured to,” “which
the Court understands to require not merely being capable of being configured but rather being
actually configured.” SIPCO v. Amazon.com, Inc., et al., No. 2:08-CV-359, 2012 WL 5195942,
at *56 (E.D. Tex. Oct. 19, 2012) (Gilstrap, J.).
(3) “administrator device”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary.
Indefinite as written, or when construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Not indefinite; Should not be construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Function: associates a first user identification
code with an authorized user within a group of
users
No corresponding structure, material, or acts
are disclosed.
(Dkt. No. 61, Ex. A at 82); (id., Ex. B at 14); (Dkt. No. 97, App’x A at 21). Defendants submit
that this disputed term appears in Claims 17 and 19 of the ’207 Patent. (Dkt. No. 61, Ex. B at
14).
- 77 -
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “‘a computer system for administering’ / Expressly
rejecting Defendants’ indefiniteness argument / Expressly rejecting Defendants’ argument that
this term is governed by 35 U.S.C. § 112(6).”
(a) The Parties’ Positions
Plaintiff argues that “[o]ne of ordinary skill in the art would recognize that an
‘administrator device’ is a structural component that is, for example, a server with access to a
database including information regarding the identification of objects in the information system,
and any access privileges assigned to those objects.” (Dkt. No. 86 at 29).
Defendants respond that “[t]he same rationale for the indefiniteness of ‘administrator
system’ [(addressed above)] applies here.” (Dkt. No. 91 at 15).
Plaintiff replies by incorporating the arguments set forth in its opening brief. See (Dkt.
No. 94 at 1 n.2).
At the April 21, 2016 hearing, Defendants reiterated that “device” is a nonce term that
fails to connote any structure for performing the recited functions. Plaintiff responded that the
claim language at issue recites configuration, not function.
(b) Analysis
Claim 17 of the ’207 Patent recites (emphasis added):
17. An information-sharing system, comprising:
a database storing user information associated with a plurality of groups of
users of computing devices, each computing device having a corresponding user
identification code stored in the database, each user identification code being
associated with a user within each group of users; and
an administrator device that associates a first user identification code with
an authorized user within a group of users, the authorized user of the group of
users having an access privilege to location information of a computing device
associated with a second user identification code of a user within the group of
users that includes the authorized user, wherein the location information of the
- 78 -
computing device associated with the second user identification code is conveyed
based on an authorization by the authorized user.
For substantially the same reasons set forth above as to the term “administrator system,”
the Court finds that “administrator device” is not a means-plus-function term subject to 35
U.S.C. § 112, ¶ 6. Also of note, the usage of the modifier “administrator” throughout the
intrinsic evidence demonstrates that an “administrator device” is a computer system. See ’931
Patent at 12:61–13:29; see also Williamson, 792 F.3d at 1351 (noting that “the presence of
modifiers can change the meaning of” an otherwise nonce term); (Dkt. No. 86, Ex. 6) (Feb. 20,
2016 Schonfeld Decl. at ¶ 247); see Teva, 135 S. Ct. at 841.
The Court therefore hereby construes “administrator device” to mean “a computer
system for administering.”
(4) “interfaces for configuring . . . based on varying levels of administrative privileges”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary.
Indefinite as written, or when construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Not indefinite; Should not be construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Function: configuring the plurality of
information-sharing environments for users
based on varying levels of administrative
privileges
No corresponding structure, material, or acts
are disclosed.
(Dkt. No. 61, Ex. A at 84); (id., Ex. B at 20); (Dkt. No. 97, App’x A at 26–27). Defendants
submit that this disputed term appears in Claims 4, 5, 9, 10, 16, and 24 of the ’166 Patent. (Dkt.
No. 61, Ex. B at 20).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
- 79 -
Defendants’ indefiniteness argument / Expressly rejecting Defendants’ argument that this term is
governed by 35 U.S.C. § 112(6).”
(a) The Parties’ Positions
Plaintiff argues: “‘Interface’ is not a nonce term. It refers to a user interface, which one
of ordinary skill in the art would understand is a well-known component of a computer system
that allows for the exchange of information in the systems.” (Dkt. No. 86 at 29–30).
Defendants respond that this disputed term is “written in means-plus-function format
without any sufficient structure to perform the functions. The term ‘interface’ is a generic term,
and contrary to Plaintiff’s position, is not a ‘user interface.’” (Dkt. No. 91 at 10 n.6).
Plaintiff replies by incorporating the arguments set forth in its opening brief. See (Dkt.
No. 94 at 1 n.2).
At the April 21, 2016 hearing, the parties did not present any oral argument as to these
terms.
(b) Analysis
Claim 1 of the ’166 Patent, for example, recites (emphasis added):
1. A method for conveying information related to locations of a plurality of
mobile devices of users in a plurality of user groups, comprising:
creating a plurality of information-sharing environments over a network of
computing devices comprising interfaces for configuring the plurality of
information-sharing environments for users based on varying levels of
administrative privileges, wherein the plurality of information-sharing
environments comprise a first information-sharing environment and a plurality of
second information-sharing environments, said plurality of second informationsharing environments comprising a plurality of independently configurable
location information sharing environments created within the first information
sharing environment;
configuring the first information-sharing environment based on a first
level of administrative privilege to associate one or more users that use the
plurality of location information sharing environment with each one of the
plurality of user groups;
- 80 -
configuring each one [of] the plurality of location information-sharing
environments for each user group independent of one another based on at least
one second level of administrative privilege by specifying one or more levels of
location information access privilege for at least one authorized user in each user
group; and
managing conveyance of information related to location of the plurality of
the mobile devices in the plurality of user groups based on a plurality of location
information access privileges associated with a plurality of authorized users.
Defendants have failed to demonstrate that the term “interfaces” does not connote
structure. See Intellectual Ventures II, 2016 WL 125594, at *14 (Gilstrap, J.) (regarding an
“administrative interface” term, finding that “‘interface’ is not a verbal construct but rather
connotes sufficiently definite structure to one skilled in the art”); cf. Personalized Media, 161
F.3d at 705 (“Even though the term ‘detector’ does not specifically evoke a particular structure,
it does convey to one knowledgeable in the art a variety of structures known as ‘detectors.’ We
therefore conclude that the term ‘detector’ is a sufficiently definite structural term to preclude the
application of § 112, ¶ 6.”); Greenberg, 91 F.3d at 1583 (finding that “detent mechanism” was
not a means-plus-function term because it denotes a type of device with a generally understood
meaning in the mechanical arts).
The Court therefore hereby expressly rejects Defendants’ arguments that this “interfaces”
term is a means-plus-function term. No further construction is necessary. See U.S. Surgical,
103 F.3d at 1568; see also O2 Micro, 521 F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo,
694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
The Court accordingly hereby construes “interfaces for configuring . . . based on
varying levels of administrative privileges” to have its plain meaning.
- 81 -
(5) “first level of administrator privilege being used in a first information-sharing
environment to allow for configuring a plurality of event information-sharing
environments”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary.
Indefinite as written, or when construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Not indefinite; Should not be construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Function: configuring a plurality of event
information-sharing environments
No corresponding structure, material, or acts
are disclosed.
(Dkt. No. 61, Ex. A at 90); (id., Ex. B at 25); (Dkt. No. 97, App’x A at 54). Defendants submit
that this disputed term appears in Claims 1, 4, 5, 12, and 17 of the ’499 Patent. (Dkt. No. 61, Ex.
B at 25).
Plaintiff submits that “[t]he ‘first level of administrator privilege’ is one of the ‘varying
levels of administrative privilege,’ for which both parties have set forth a construction.” (Dkt.
No. 86 at 30). Defendants’ response brief does not address this term. See (Dkt. No. 91). Plaintiff
replies by incorporating the arguments set forth in its opening brief. See (Dkt. No. 94 at 1 n.2).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this term.
Because Defendants have not presented any argument in their briefing, the Court does not
construe this term.
- 82 -
(6) “access control systems”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
No construction necessary. Alternatively,
systems for controlling access.
Indefinite as written, or when construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Not indefinite; Should not be construed in
accordance with 35 U.S.C. § 112, ¶ 6.
Function: to communicates [sic] with said one
or more computer servers to control access to
the plurality of information sharing
environments
No corresponding structure, material, or acts
are disclosed.
(Dkt. No. 61, Ex. A at 122); (id., Ex. B at 26); (Dkt. No. 97, App’x A at 56). Defendants submit
that this disputed term appears in Claims 1, 4, 5, 12, and 17 of the ’499 Patent. (Dkt. No. 61, Ex.
B at 26).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument / Expressly rejecting Defendants’ argument that this term is
governed by 35 U.S.C. § 112(6).”
(a) The Parties’ Positions
Plaintiff argues that this disputed term “refers to structural components of an information
system, such as servers, that control access to information for devices in the system.” (Dkt.
No. 86 at 30).
Defendants respond that “[t]he same rationale for the indefiniteness of ‘administrator
system’ applies here.” (Dkt. No. 91 at 15–16). In particular, Defendants argue that “the ‘access
control’ modifier only describes the system’s purported function and does not impart any
structure.” (Id. at 16).
- 83 -
Plaintiff replies by incorporating the arguments set forth in its opening brief. See (Dkt.
No. 94 at 1 n.2).
At the April 21, 2016 hearing, the parties presented similar arguments as to this term as
for “administrator system,” which is addressed above.
(b) Analysis
Claim 1 of the ’499 Patent recites, in relevant part (emphasis added):
1. A system for conveying a plurality of event information associated with a
corresponding plurality of events that occur based on satisfactions of a
corresponding plurality of specified event conditions related to locations of a
corresponding plurality of mobile objects having a corresponding plurality of
mobile object identification codes, wherein each mobile object is associated with
at least one location information source that provides a corresponding location
information over a wireless network, said system comprising:
...
one or more access control systems that are configured to communicates
[sic] with said one or more computer servers to control access to the plurality of
information sharing environments, wherein access control to the plurality of
information sharing environments is based on access control codes requiring
multiple levels of access control comprising a first level of access control and a
second levels [sic] of access control, wherein access to said first information
sharing environment is controlled under the first level of access control based on
access control codes associated with the plurality of authorized user identification
codes, wherein access to said event information sharing environments is
controlled under the second level of access control to access the plurality of
specified event conditions independent of each other based on a corresponding
plurality of event information access codes that are associated with the plurality of
authorized user identification codes; . . .
....
The language that follows this disputed term thus recites that the access control systems
“are configured to communicates [sic] with said one or more computer servers.” This weighs in
favor of construing the disputed term in the context of computer systems. See Phillips, 415 F.3d
at 1314 (“the context of the surrounding words of the claim also must be considered in
determining the ordinary and customary meaning of those terms”) (citation and internal
quotation marks omitted).
- 84 -
The specification likewise discusses access codes and access control in the context of
computer systems. See ’931 Patent at 7:37–8:23 & 10:30–39. Plaintiff’s expert likewise opines:
“One of ordinary skill in the art would understand that the ‘access control systems’ in claim 1 of
the ’499 patent refers to structural components of an information system. Namely, it refers to
computing systems (e.g., servers) that control access to information for devices in the
information system.” (Dkt. No. 86, Ex. 6) (Feb. 20, 2016 Schonfeld Decl. at ¶ 262); see Teva,
135 S. Ct. at 841.
For these reasons, as well as substantially the same reasons set forth as to the term
“administrator system” (addressed above), the Court hereby expressly rejects Defendants’
arguments that “access control systems” is a means-plus-function term. No further construction
is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521 F.3d at 1362; Finjan,
626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
The Court hereby construes “access control systems” to have its plain meaning.
I. Computing Device / Mobile Device / Etc. Associated with a User Identification Code or
User, or Having a User Identification Code
The disputed terms here at issue are set forth in Appendix B to Defendants’ responsive
brief (Dkt. No. 91 at App’x B) and are: “[object] associated with . . . user identification code [or
user]”; “location information source associated with a second user identification code”; “the
second user code is associated with a location information source of one of the mobile devices of
the plurality of mobile devices based on the privileged user code”; “second computing device
associated with one of the second user or the third user”; “first computing device associated with
the first user”; “mobile devices associated with corresponding user identification codes”;
“computing devices associated with a plurality of users”; “mobile device associated with a user
identification code in the contact list”; “computing device having a . . . user identification code”;
- 85 -
“computing device associated with a second user identification code”; “computing devices
associated with the first and second user identification codes”; “each computing device having a
corresponding user identification code stored in the database”; “a third user identification code is
associated with a computing device . . .”; “mobile device associated with [the] second
identification code”; “second identification code associated with a second mobile device”; “first
user identification code associated with a first mobile device”; “a plurality of user identification
codes associated with a plurality of mobile devices”; “third mobile device associated with a third
identification code”; “plurality of mobile objects having a corresponding plurality of mobile
object identification codes”; and “each mobile device is associated with an identification (ID).”
See (Dkt. No. 97 at App’x A).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument.”
(1) The Parties’ Positions
Defendants argue that “‘association’ of a computing device (or the like) with a user or
user identification code means a user identification code must either be embedded in, or entered
into the computing device via a user log-in at, the computing device itself.” (Dkt. No. 91 at 28).
Plaintiff replies that Defendants’ arguments should be disregarded because “Dr. Heppe
[Defendants’ expert] offered these alternative constructions in his declaration, but Defendants
never adopted them in their [P.R.] 4-2 disclosures or the Joint Claim Construction Statement.”
(Dkt. No. 94 at 10).
At the April 21, 2016 hearing, the parties did not present any oral argument as to these
terms.
- 86 -
(2) Analysis
Defendants’ response brief refers to these terms in a section titled “Indefinite Terms with
Alternative Construction,” but Defendants have presented no indefiniteness argument as to these
terms aside from their arguments as to the terms “user identification codes” and “authorized user
identification code,” which are addressed above.
As to Defendants’ proposal that a particular type of “association” is required, no such
proposals appear in Defendants’ submission in the Joint Claim Construction and Pre-Hearing
Statement (Dkt. No. 61, Ex. B at 1, 5–6, 12–13, 17, 23 & 28). Further, although the specification
discloses that “[f]or example, association of a user identification code with a computing device
can be an embedded association (e.g., hard-wired) or it can be based on a user log-in at the
computing device” (’931 Patent at 2:18–21; see id. at 6:64–7:2; see also id. at 7:29–31, 7:50–52
& 9:63–67), this is a specific feature of particular disclosed embodiments that should not be
imported into the claims. See Comark, 156 F.3d at 1187; see also Phillips, 415 F.3d at 1323.
The Court therefore expressly rejects Defendants’ proposed construction. No further
construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521 F.3d at
1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d at 1291.
The Court hereby construes these disputed terms to have their plain meaning.
J. “information access code” associated with, comprises, or specifies a “user identification
code”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary.
(Dkt. No. 61, Ex. A at 48, 50, 51, 52); (id., Ex. B at 7, 8 & 24); (Dkt. No. 91 at 29); see, e.g.,
(Dkt. No. 97, App’x A at 3). Defendants submit that these disputed terms appear in Claims 6, 9,
- 87 -
10, and 12 of the ’012 Patent and Claims 1, 4, 5, 12, and 17 of the ’499 Patent. (Dkt. No. 61, Ex.
B at 7–8 & 24).
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument.”
(1) The Parties’ Positions
Defendants argue that “[a] POSA [(person of ordinary skill in the art)] would understand
each of these terms to mean ‘information access codes’ corresponding with and designating
certain ‘user identification codes’ or ‘group identification codes’ stored in a database, but the
‘user identification codes’ themselves are not the ‘information access code.’” (Dkt. No. 91 at
29).
Plaintiff replies that “Dr. Heppe [Defendants’ expert] offered these alternative
constructions in his declaration, but Defendants never adopted them in their 4-2 disclosures or
the Joint Claim Construction Statement.” (Dkt. No. 94 at 10).
At the April 21, 2016 hearing, Defendants reiterated their argument that “information
access code” must have a meaning different from “user identification code.”
(2) Analysis
Defendants’ response brief refers to these terms in a section titled “Indefinite Terms with
Alternative Construction,” but Defendants have presented no indefiniteness argument as to these
terms aside from their arguments as to the terms “user identification codes” and “information
access code,” which are addressed above.
As to Defendants’ proposal that “the ‘user identification codes’ themselves are not the
‘information access code’” (Dkt. No. 91 at 29), no such proposals appear in Defendants’
- 88 -
submission in the Joint Claim Construction and Pre-Hearing Statement (Dkt. No. 61, Ex. B at 7,
8 & 24). Further, although the specification distinguishes between information access codes and
user identification codes (see ’931 Patent at 7:46–60 (“[i]n one arrangement,” “an access code
would typically include specific user identification codes and/or group codes”)), this is a specific
feature of particular disclosed embodiments that should not be imported into the claims. See
Comark, 156 F.3d at 1187; see also Phillips, 415 F.3d at 1323. The specification explains that
usage of particular access codes is implementation-specific and may involve layers of access
control. See ’931 Patent at 10:30–39.
The Court therefore hereby expressly rejects Defendants’ proposed construction. No
further construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521
F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d
at 1291.
The Court accordingly hereby construes these disputed terms to have their plain
meaning.
K. “based on the information access code”
Plaintiff’s Proposed Construction
Defendants’ Proposed Construction
Not indefinite.
Indefinite
No construction necessary.
(Dkt. No. 61, Ex. A at 55); (id., Ex. B at 8); (Dkt. No. 91 at 30); (Dkt. No. 97, App’x A at 4).
Defendants submit that this disputed term appears in Claims 6, 9, 10, and 12 of the ’012 Patent.
(Dkt. No. 61, Ex. B at 8–9).
- 89 -
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “Plain and ordinary meaning. / Expressly rejecting
Defendants’ indefiniteness argument.”
(1) The Parties’ Positions
Defendants argue that “a POSA [(person of ordinary skill in the art)] would understand
these terms to mean conveyance contingent on the entry of an ‘information access code’ into a
specific ‘access code’ field in the user interface of a computer program.” (Dkt. No. 91 at 30).
Plaintiff replies that “Dr. Heppe [Defendants’ expert] offered th[is] alternative
construction[] in his declaration, but Defendants never adopted [it] in their 4-2 disclosures or the
Joint Claim Construction Statement.” (Dkt. No. 94 at 10).
At the April 21, 2016 hearing, the parties did not present any oral argument as to this
term.
(2) Analysis
Defendants’ response brief refers to these terms in a section titled “Indefinite Terms with
Alternative Construction,” but Defendants have presented no indefiniteness argument as to these
terms aside from their arguments as to the terms “user identification codes” and “information
access code,” which are addressed above.
As to Defendants’ proposal that a “specific ‘access code’ field” must be used (Dkt.
No. 91 at 30), no such proposal appears in Defendants’ submission in the Joint Claim
Construction and Pre-Hearing Statement (Dkt. No. 61, Ex. B at 8). Further, although the
specification discloses a user entering an access code into a device (see ’931 Patent at 7:64–8:3
& 20:16–24 (“Configuration Screen 1000 provides fields for entering a user data access code,
user phone number, log file name, and a user domain or IP address.”)), this is a specific feature
- 90 -
of particular disclosed embodiments that should not be imported into the claims. See Comark,
156 F.3d at 1187; see also Phillips, 415 F.3d at 1323.
The Court therefore hereby expressly rejects Defendants’ proposed construction. No
further construction is necessary. See U.S. Surgical, 103 F.3d at 1568; see also O2 Micro, 521
F.3d at 1362; Finjan, 626 F.3d at 1207; ActiveVideo, 694 F.3d at 1326; Summit 6, 802 F.3d
at 1291.
The Court accordingly hereby construes “based on the information access code” to
have its plain meaning.
L. Hybrid Claims
Shortly before the start of the April 21, 2016 hearing, the Court provided the parties with
the following preliminary construction: “The Court rejects Defendants’ indefiniteness arguments
regarding purported hybrid claiming. No further construction is necessary.”
(1) The Parties’ Positions
Defendants argue:
Certain apparatus/system claims (012:7–12; 207:17, 19; 166:5, 8–10, 15, 16;
499:1, 3–6, 11, 12, 16, and 17) improperly require method steps which “create
confusion as to when direct infringement occurs because [the claim is] directed
both to systems and to actions” and render those claims indefinite. In re Katz
Interactive Call Processing Patent Lit., 639 F.3d 1303, 1318 (Fed. Cir. 2011)
(wherein clause in system claim signified a method step directed to user action
which rendered claim indefinite); IPX[L] Holdings, LLC v. Amazon.com, Inc., 430
F.3d 1377 (Fed. Cir. 2005). Appendix E sets forth the pertinent language for
asserted claims which raise this issue, along with an explanation of the context.
(Dkt. No. 91 at 30).
Plaintiff replies that the claims at issue “merely recite the functional capabilities of the
claimed system/apparatus, by stating that certain types of information be ‘associated’ with
- 91 -
certain elements or stating the criteria that the system/apparatus employs for ‘conveying’
information.” (Dkt. No. 94 at 9).
(2) Analysis
Defendants’ response brief contains 30 pages of argument, which is the usual maximum
number of pages permitted under the Court’s Local Rules. See P.R. 4-5(e) & L.R. CV-7(a).
Because Defendants’ arguments as to these purported hybrid claims appear in a nine-page
Appendix E, which is outside of the 30-page limit, the Court need not consider these arguments.
Alternatively, on the merits, Defendants have not demonstrated that any of the claims at
issue recite active method steps. Instead, the limitations at issue set forth functional capabilities
or configurations. In particular, the principles set forth in Yodlee, Inc. v. CashEdge, Inc., No. 0501550, 2006 WL 3456610, at *4–*6 (N.D. Cal. Nov. 29, 2006) (Illston, J.), are applicable:
A simple analogy would be a claim which physically describes a pair of scissors
designed to cut paper, then states, “upon opening and closing the sharp edges of
the scissors on a piece of paper, the paper is cut.” The language describes the
capability of the scissors; it is function language. Infringement occurs upon the
manufacturing and sale of scissors that are capable of cutting paper. The IPXL
rule would apply only if the patent claimed the physical description of the
scissors, then stated within the same claim: “and the method of using said scissors
to cut a piece of paper.” The claims at issue here are analogous to the former
example. They describe what the apparatuses do, when used a certain way. They
do not claim use of the apparatuses. Thus, they do not “recit[e] both an apparatus
and a method of using that apparatus.” IPXL, 430 F.3d at 1384.
Yodlee, 2006 WL 3456610, at *5. Although Yodlee is not binding authority upon this Court, the
reasoning is persuasive here.
The Court therefore hereby expressly rejects Defendants’ indefiniteness arguments
regarding purported hybrid claiming. No further construction is necessary in this regard.
- 92 -
V. CONCLUSION
.
The Court adopts the constructions set forth in this opinion for the disputed terms of the
patents-in-suit.
The parties are ordered to not refer to each other’s claim construction positions in the
presence of the jury. Likewise, in the presence of the jury, the parties are ordered to refrain from
mentioning any portion of this opinion, other than the actual definitions adopted by the Court.
The Court’s reasoning in this order binds the testimony of any witnesses, but any reference to the
claim construction proceedings is limited to informing the jury of the definitions adopted by the
Court.
SIGNED this 3rd day of January, 2012.
SIGNED this 7th day of July, 2016.
____________________________________
ROY S. PAYNE
UNITED STATES MAGISTRATE JUDGE
- 93 -
APPENDIX A
Parties’ Agreement
Term
“second information-sharing environment”
“second information-sharing environments”
(’166 Patent, Claims 5, 9, 10, 16)
“based a plurality”
“based on a plurality”
(’166 Patent, Claims 5, 9, 10, 16, 19)
“mobile devices”
“mobile device”
(’166 Patent, Claim 16)
“different the first user identification code”
“different from the first user identification
code”
(’166 Patent, Claim 16)
“different the first and second user
identification codes”
“different from the first and second user
identification codes”
(’166 Patent, Claim 16)
“based a first level of administrative privilege”
“based on a first level of administrative
privilege”
(’166 Patent, Claim 24)
“first user identification”
“first user identification code”
(’166 Patent, Claim 24)
“first identification code”
“first user identification code”
(’166 Patent, Claim 24)
“communicates”
“communicate”
(’499 Patent, Claims 1, 4, 5, 12, 17)
“second levels”
“second level”
(’499 Patent, Claims 1, 4, 5, 12, 17)
- 94 -
“related a”
“related to a”
(’499 Patent, Claim 17)
(Dkt. No. 61 at 2).
- 95 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?