Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al
Filing
257
CLAIM CONSTRUCTION BRIEF filed by Uniloc Singapore Private Limited, Uniloc USA, Inc.. (Attachments: # 1 Exhibit Declaration of Steven W. Hartsell, # 2 Exhibit A, # 3 Exhibit B, # 4 Exhibit C, # 5 Exhibit D1, # 6 Exhibit D2, # 7 Exhibit D3, # 8 Exhibit D4, # 9 Exhibit D5, # 10 Exhibit D6, # 11 Exhibit D7, part 1, # 12 Exhibit D7, part 2, # 13 Exhibit D8, # 14 Exhibit D9, # 15 Exhibit E, # 16 Exhibit F)(Bumgardner, Barry) (Additional attachment(s) added on 9/15/2011: # 17 Exhibit E Searchable, # 18 Exhibit F Searchable) (mjc, ).
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
TYLER DIVISION
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
SONY CORPORATION OF AMERICA,
ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
DISK DOCTORS LABS, INC., ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
NATIONAL INSTRUMENTS CORP., ET
AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
ENGRASP, INC., ET AL.
Defendants.
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-373
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-471
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-472
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-591
PATENT CASE
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
BMC SOFTWARE, INC., ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
FOXIT CORPORATION, ET AL.
Defendants.
SYMANTEC CORPORATION, ET AL.
Plaintiffs,
vs.
UNILOC USA, INC., ET AL.
Defendants.
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-636
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-691
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:11-CV-33
PATENT CASE
PLAINTIFF’S OPENING BRIEF ON CLAIM CONSTRUCTION
ii
TABLE OF CONTENTS
I.
INTRODUCTION ............................................................................................................... 1
II.
BACKGROUND ................................................................................................................. 1
A. Overview of the Claimed Invention ............................................................................... 1
B. Prior Litigation .............................................................................................................. 2
C. Ex Parte Reexamination ................................................................................................ 3
1. Overview of Hellman ................................................................................................ 4
2. Overview of Grundy.................................................................................................. 6
III.
APPLICABLE LAW......................................................................................................... 10
A. Claim Construction...................................................................................................... 10
B. Doctrine of Prosecution History Disclaimer ............................................................... 12
IV.
THE PROPER CONSTRUCTION OF “PERMITS USE OF SAID DIGITAL
DATA…ONLY IF…HAS MATCHED…”...................................................................... 13
V.
UNILOC‟S EXPLANATION OF THE PRIOR ART DURING THE
REEXAMINATION DOES NOT GIVE RISE TO ANY DISCLAIMER ....................... 14
A. A Review of the Reexamination History Reveals That There is No Support for an
Exclusion Related to Data Integrity Testing ............................................................... 15
1. The statements in response to the first office action do not constitute a
disclaimer ................................................................................................................ 16
2. Statements in response to the second office action also fall short of a
disclaimer ................................................................................................................ 20
3. Grundy dealt with a checksum, not a licensee unique ID ....................................... 21
4. Defendants‟ alleged disclaimer conflicts with the disclosed invention and creates
a subjective test ....................................................................................................... 22
B. Group B Defendants‟ Attempt to Limit the Types of Information Used to Generate
a “Licensee Unique ID” Should be Rejected .............................................................. 23
VI.
CONCLUSION ................................................................................................................. 26
iii
TABLE OF AUTHORITIES
CASES
ACCO Brands, Inc. v. Micro Sec. Devices, Inc.
346 F.3d 1075 (Fed. Cir. 2003) ......................................................................................... 24
Alloc, Inc. v. Int’l Trade Comm’n,
342 F.3d 1361 (Fed. Cir. 2003) ......................................................................................... 11
Bayer AG v. Elan Pharm. Research Corp.
212 F.3d 1241 (Fed. Cir. 2000) ......................................................................................... 12
Bell Atl. Network Servs., Inc. v. Covad Commc’ns Group, Inc.
262 F.3d 1258 (Fed. Cir. 2001) ......................................................................................... 11
C.R. Bard, Inc. v. U.S. Surgical Corp.
388 F.3d 858 (Fed. Cir. 2004) ...................................................................................... 10-11
Comark Communs. v. Harris Corp.
156 F.3d 1182 (Fed. Cir. 1998) ......................................................................................... 12
Computer Docking Station Corp. v. Dell, Inc.
519 F.3d 1366 (Fed. Cir. 2008) ........................................................................ 12-13, 15, 26
Constant v. Advanced Micro-Devices, Inc.
848 F.2d 1560 (Fed. Cir. 1988) ......................................................................................... 12
Cordis Corp. v. Boston Sci. Corp.
561 F.3d 1319 (Fed. Cir. 2009) ......................................................................................... 12
Ecolab, Inc. v. FMC Corp.
569 F.3d 1335 (Fed. Cir. 2009) ......................................................................................... 12
Home Diagnostics, Inc., v. Lifescan, Inc.
381 F.3d 1352 (Fed. Cir. 2004) ......................................................................................... 12
Honeywell Int’l, Inc. v. Universal Avionics Sys. Corp.
493 F.3d 1358 (Fed. Cir. 2007) ......................................................................................... 20
In re Yamamoto
740 F.2d 1569, 222 USPQ 934 (Fed. Cir. 1984) ............................................................... 25
Innova/Pure Water Inc. v. Safari Water Filtration Sys., Inc.
381 F.3d 1111 (Fed. Cir. 2004) ......................................................................................... 10
iv
Inverness Medical Switzerland v. Princeton Biomeditech Corp.
309 F.3d 1365 (Fed. Cir. 2002) ......................................................................................... 25
Markman v. Westview Instruments, Inc.
52 F.3d 967 (Fed. Cir. 1995) ............................................................................................. 11
O2 Micro Int'l Ltd. v. Beyond Innovation Tech. Co.
521 F.3d 1351 (Fed. Cir. 2008) ......................................................................................... 14
Omega Eng’g, Inc. v. Raytek Corp.
334 F.3d 1314 (Fed. Cir. 2003) ......................................................................................... 12
Orion IP, LLC v. Staples, Inc.
406 F. Supp. 2d 717 (E.D. Tex. 2005) .............................................................................. 13
Phillips v. AWH Corp.
415 F.3d 1303 (Fed. Cir. 2005) ................................................................................... 10-13
Teleflex, Inc. v. Ficosa N. Am. Corp.
299 F.3d 1313 (Fed. Cir. 2002) ......................................................................................... 11
Uniloc USA, Inc. v. Microsoft Corp.
290 Fed. App‟x 337 (Fed. Cir. 2008) .................................................................................. 2
Uniloc USA, Inc. v. Microsoft Corp.
447 F. Supp. 2d 177 (D.R.I. 2006) ...................................................................................... 2
Uniloc USA, Inc. v. Microsoft Corp.
632 F.3d 1292 (Fed. Cir. 2011) ........................................................................................... 3
Uniloc USA, Inc. v. Microsoft Corp.
640 F. Supp. 2d 150 (D.R.I. 2009) ................................................................................... 2-3
Vitronics Corp. v. Conceptronic, Inc.
90 F.3d 1576 (Fed. Cir. 1996) ........................................................................................... 11
OTHER
35 U.S.C. § 103(a) ............................................................................................................... 4, 16, 26
v
I.
INTRODUCTION
Pursuant to the Court‟s Scheduling Order and P.R. 4-5(a), Plaintiffs Uniloc USA, Inc. and
Uniloc Singapore Limited (“Uniloc”) hereby submit their opening brief on claim construction for
the disputed terms and phrases in United States Patent No. 5,490,216 (the “„216 Patent”).
As a preliminary matter, the Court should be aware that since the filing of the P.R. 4-3 Joint
Claim Construction and Prehearing Statement, all 41 parties have agreed to the constructions of (1)
“„Local‟ (in the phrase „local licensee unique ID generating means‟)” as “on the computer on which
the digital data is executing or is to be executed”1 and (2) “comprises part of said digital data when
executed on said platform” as “contained in said digital data when executed on said platform.”2
This leaves only one disputed phrase, “permits use of said digital data . . . only if . . . has matched . .
. .,”3 and Defendants‟ alleged disclaimer arguments as the subject of this brief.4
II.
BACKGROUND
A. Overview of the Claimed Invention
The „216 Patent5 describes a system and method for software activation to help prevent
piracy. It does so by generating a local licensee unique ID (“LUID”) on the local computer where
the software is installed and a remote licensee unique ID (“RUID”) at a remote registration
authority.
The LUID is generated for an intended licensee by inputting certain pieces of
information into a local licensee unique ID generating means, which is generally a summer or a
summation algorithm.
1
The summer or summation algorithm preferably combines information
Exh. A (partial email string between Steven Hartsell and Patrick Lujin dated September 1, 2011). Unless otherwise
noted, all exhibits are attached to the supporting declaration of Steven W. Hartsell (“Hartsell Decl.”).
2
Exh. B (email string between Jamie Olin and Patrick Lujin dated September 7-8, 2011).
3
Uniloc notes that while it was able to reach agreement with the 40 remaining defendants, a lone defendant, Pervasive
Software, Inc. (“Pervasive”), continues to seek leave to re-construe an additional term, namely the previously construed
term “licensee unique ID.” Pervasive filed its Motion for Leave to Construe Previously Construed Term on August 29,
2011 (Dkt. No. 243 in Case No. 6:10-cv-00472). Uniloc has not addressed this term as the Court has not granted leave
as of the filing of this opening brief.
4
The defendants have broken into two groups, each seeking a different alleged disclaimer. The Group A defendants
consist of all defendants except those found in Group B. The Group B defendants consist of Aspyr Media, Inc., Borland
Software Corp., Digital River, Inc., GEAR Software, Inc. and GEAR Software Holdings, Inc.
5
Exh. C (copy of the „216 Patent).
entered by a prospective user that is associated with that user, along with information provided by
the environment on which the protected software is to run. These pieces of information are
processed through the summer or summation algorithm to produce the LUID, which is a unique
identifier associated with the user.
The algorithm that generates the LUID is duplicated at a remotely located registration
authority, generally under the control of the licensor. The algorithm on the remotely located
registration authority then uses the same pieces of information to generate a RUID. The LUID and
RUID are compared and if they match, the system will allow full, unrestricted use of the software.
B. Prior Litigation
The „216 Patent has a long litigation history, including a jury trial and multiple trips to the
Federal Circuit. In September 2003, Uniloc sued Microsoft Corporation for infringement in the
District Court for the District of Rhode Island. See Uniloc USA, Inc. v. Microsoft Corp., 640 F.
Supp. 2d 150, 159 (D.R.I. 2009). The District Court conducted a Markman hearing and issued an
order in August 2006 construing twenty-three terms and phrases. Uniloc USA, Inc. v. Microsoft
Corp., 447 F. Supp. 2d 177 (D.R.I. 2006).
In October 2007, the District Court granted Microsoft‟s motion for summary judgment of
non-infringement. Uniloc appealed, and the Federal Circuit reversed the summary judgment. In
reversing, the Federal Circuit considered and rejected “several alternative grounds for affirming the
summary judgment beyond those which were reached by the district court” and concluded that they
were without merit. The Federal Circuit also affirmed the construction of the term “licensee unique
ID,” and explained that vendor-supplied information, such as Microsoft‟s Product Key, could
provide the basis for a “licensee unique ID.” Uniloc USA, Inc. v. Microsoft Corp., 290 Fed. App‟x
337, 343-44 (Fed. Cir. 2008) (“Uniloc I”).
After a ten-day trial in April 2009, the jury found the „216 Patent valid and infringed, and
2
awarded Uniloc $388 million. Uniloc, 640 F. Supp. 2d at 160. Notwithstanding the jury verdict,
the District Court granted Microsoft‟s post-trial motions for judgment as a matter of law of noninfringement and for a new trial on damages. Id. at 165-76, 183-85. The District Court also
determined that: (1) U.S. Patent No. 4,658,093 (“Hellman”) did not anticipate the „216 Patent; and
(2) the „216 Patent is not obvious in light of Hellman combined with U.S. Patent No. 4,796,220
(“Wolfe”). Id. at 180-183. Both Uniloc and Microsoft appealed to the Federal Circuit.
On January 4, 2011, the Federal Circuit reversed the District Court a second time on the
issue of infringement, reinstating the jury‟s finding, but upheld the District Court‟s grant of a new
trial on damages. Uniloc USA, Inc. v. Microsoft Corp., 632 F.3d 1292, 1323 (Fed. Cir. 2011)
(“Uniloc II”). Characterizing the District Court‟s opinion as “comprehensive and well-reasoned,”
the Federal Circuit also explicitly rejected Microsoft‟s arguments that the „216 Patent was
anticipated by Hellman, noting that in accordance with the Federal Circuit‟s prior construction,
Hellman failed to teach a “licensee unique ID” as claimed in the „216 Patent. Id. at 1301.
The mandate of the Federal Circuit issued on May 23, 2011. The final pretrial conference
for the new trial on damages is set for December 2011, with the trial expected to occur in early
January 2012.
C. Ex Parte Reexamination
On January 22, 2010, a reexamination of the „216 Patent was instigated by Microsoft based
primarily on United States Patent Nos. 4,658,093 to Hellman (“Hellman”) and 5,291,598 to Grundy
(“Grundy”).6 The Patent Office granted the reexamination request on April 9, 2010.7 Ultimately,
6
The Examiner also cited United States Patent No. 4,796,220 to Wolfe but did not issue any substantive rejections
based on Wolfe. See UNI075102 at n. 1. All references to UNIXXXXXX are found in Hartsell Decl. at Exh. D.
Additionally, Uniloc also notes that Grundy was considered in the original prosecution and is found on the face of the
„216 Patent. See Exh. C. Hellman was considered and rejected by the District of Rhode Island in the Microsoft
litigation, see Uniloc USA, Inc. v. Microsoft Corp., 640 F. Supp. 2d 150, 179-183 (D.R.I. 2009), and that decision was
affirmed by the Federal Circuit, see Uniloc II, 632 F.3d 1292, 1321-1323 (Fed. Cir. 2011). The Patent Office has
recently confirmed all of the claims of the „216 Patent over both Hellman and Grundy. See UNI0076148-57.
7
UNI074468-69.
3
the Patent Office confirmed all claims of the ‟216 Patent and issued a Notice of Intent to Issue
Reexamination Certificate (“NIIRC”) on August 5, 2011.8
The primary focus of the Patent Office‟s reexamination was a 35 U.S.C. § 103(a)
obviousness rejection based on Hellman in view of Grundy.9 Uniloc disagreed with the Examiner‟s
technical interpretations of how the disclosed systems in Hellman and Grundy operated. Uniloc‟s
responses in the reexamination focused on correcting the Examiner‟s technical misunderstanding of
the prior art. Ultimately, Uniloc was successful in explaining the technology of Hellman and
Grundy to the Examiner and why these references could not properly be combined under § 103.
Prior to addressing Defendants‟ constructions/disclaimers, Uniloc presents a summary of the
substance of Hellman and Grundy. Having a high-level technical understanding of these two
references will allow the Court to appreciate logical deficiencies in the Defendants‟ positions.
1. Overview of Hellman10
Hellman discloses a system that prevents software misuse by limiting the number of times
that a base unit, e.g., a personal computer, is authorized to use a software program.11 To that end,
authorizations are made to be specific to individual base units “so that an authorization for one base
unit cannot be transferred to another base unit.”12
An authorization unit at the software manufacturer (e.g., a server) uses a cryptographic
function generator 23 to generate an authorization A.13
An identical cryptographic function
generator 38 at the personal computer‟s cryptographic check unit 34 is used to generate a check
8
UNI076148-57.
UNI075022-30.
10
The explanation of Hellman is derived from paragraphs 13-24 of the March 17, 2011 declaration of Dr. Udo Pooch
that was submitted in connection with the reexamination. See UNI075642-720. The Patent Office stated that Dr.
Pooch‟s declaration was “sufficient to overcome the rejection of claims 1-20 based upon Dr. Pooch‟s argument that it
would be improper to combine the references in the manner of the claimed invention.” UNI076156 (Notice of Intent to
Issue Reexamination Certificate).
11
Exh. E at Abstract (Hellman patent); see also UNI075644 at ¶ 14.
12
Id.; see also UNI075644 at ¶ 14.
13
Id. at Figs. 1 and 2; see also UNI075644 at ¶ 15.
9
4
value C that must match the authorization A at comparator 39. 14 If the check value C does not
match Authorization A, A is not considered to be a proper authorization.15
The cryptographic function generators 23 or 38 are an essential and critical element of
Hellman‟s system. Hellman‟s cryptographic function generators are designed to be highly secure
and to prevent would-be copiers from generating their own authorizations.16 Hellman describes
three possible types of cryptographic functions that can serve as function generator 23 or 38, and
unequivocally states that one of these cryptographic functions is “required to carry out the present
invention.”17
The first cryptographic function, described in FIG. 4 of Hellman, uses a modified Data
Encryption Standard (“DES”).18 According to Hellman, “[t]he DES would have to be modified…to
have its key length equal to the length of SK” so that it would work in the cryptographic function
generator.19 Hellman teaches that this embodiment “would also inherently have the property that
the new authorizations could not be predicted from old authorizations because, in a conventional
cryptographic system, given past plaintext-ciphertext pairs, it must be difficult to determine the
plaintext which goes with a new ciphertext.”20 The DES embodiment thus uses a robust and highly
secure, cryptographic algorithm to generate an authorization code sufficiently secure to meet the
rigorous needs of Hellman‟s system. At the time of Hellman, DES was considered a “militarygrade” encryption technique.
The second cryptographic function is shown in FIG. 9 and described as follows: “[s]ignals
representing H, R and N are presented as a message to be signed by a public key cryptosystem 43
14
Id. at Figs. 6 and 7; see also UNI075644 at ¶ 15.
Id at Col. 10:24-26; see also UNI075644 at ¶ 15.
16
Id. at Col. 7:4-16; UNI075644-45 at ¶ 16.
17
Id. at Col. 2:61-65 (emphasis added); UNI075644-45 at ¶ 16.
18
Id. at Col. 8:23-26; UNI075645 at ¶ 17.
19
Id. at Col. 8:23-26; UNI075645 at ¶ 17.
20
Id. at Col. 8:46-51; UNI075645 at ¶ 17.
15
5
using secret key SK to produce the digital signature,” which becomes authorization A.21 Like the
DES embodiment, a public key cryptosystem is a highly secure, robust, cryptographic algorithm
that meets the rigorous needs of Hellman‟s system. It is still in wide use today.
The third cryptographic function is a one-way hash function. Hellman discloses that “[o]ne
implementation of the cryptographic function generator 23 of FIG. 2 would also involve a one-way
hash function . . . .”22 Again, a cryptographic one-way hash function is a robust, highly secure,
cryptographic algorithm that meets the rigorous needs of Hellman‟s system. “One-Way” means
that it is impossible to recreate the input of the hash function using the output of the function.
Each of the alternative embodiments that Hellman describes to implement its cryptographic
function generators 38 (i.e., DES, public/private key encryption, or cryptographic one-way hash
algorithms) are sophisticated cryptographic algorithms. As noted earlier, Hellman unambiguously
states that such cryptographic functions are “required to carry out the present invention.”23
2. Overview of Grundy24
Grundy is directed to a method and system for decentralized manufacture of copy-controlled
software. As part of Grundy‟s system, Grundy describes the generation of a “registration code” that
is used for communication between a new software user and what Grundy describes as a
Manufacturing Control Agency.25
As it relates to the „216 Patent reexamination, Grundy‟s use of “checksums” is of interest.
A checksum is a value that (a) is computed by a function that is dependent on the contents of a data
object and (b) is stored or transmitted together with the object, for detecting changes in data. A
21
Id. at Col. 11:42-47; see also UNI075646 at ¶ 19.
Id. at Col. 8:13-15; see also UNI075646 at ¶ 22.
23
Id. at Col. 2:61-65 (emphasis added); see also UNI075647 at ¶ 24.
24
The explanation of Grundy is derived from paragraphs 25-39 of the March 17, 2011 declaration of Dr. Udo Pooch
that was submitted in connection with the reexamination. See UNI075642-720. The Patent Office stated that Dr.
Pooch‟s declaration was “sufficient to overcome the rejection of claims 1-20 based upon Dr. Pooch‟s argument that it
would be improper to combine the references in the manner of the claimed invention.” UNI076156 (Notice of Intent to
Issue Reexamination Certificate).
25
Exh. F at Col. 14:31-60 (Grundy patent); see also UNI075647 at ¶ 25.
22
6
checksum algorithm is a signature algorithm that does not attempt to provide cryptographic
protection against inversion. The term “checksum” originally referred to checking algorithms that
summed the bytes, but is now generally used to refer to any non-cryptographic checking
algorithm.26 This is consistent with a contemporaneous definition of “checksum” from the filing of
the „216 Patent and Grundy, which defines a “checksum” as:
[A] calculated value that is used to test data integrity. Errors can occur when data is
transmitted or when it is written to disk. One means of detecting such errors is use
of a checksum, a value calculated for a given chunk of data by sequentially
combining all the bytes of data with a series of arithmetic or logical operations.
After the data is transmitted or stored, a new checksum can be calculated (using the
possibly faulty transmitted or stored data) and compared with the original one. If the
checksums don‟t match, an error occurred, and the data should be transmitted or
stored again; if they do match, the transmission or storage was probably error-free.
Checksums are a simple validation mechanism, and they cannot be used to correct
erroneous data.27
For example, prior to transmitting a 1000 character set of data, the sending computer may
add each character together to form a checksum. The checksum may be only four characters long
(undoubtedly, the true sum of a 1000 character data set would result in a number greater than four
characters, but checksums typically only make use of a few digits of the total sum). The sending
computer would then send the 1000 character set along with the four-character checksum to a
receiving computer. The receiving computer would then use the same checksum algorithm used by
the sending computer to sum up the 1000 character set and recreate the four-character checksum. If
the checksum computed by the receiving computer matched the checksum it received from the
transmitting computer, the receiving computer would assume that there were no errors in the
transmission.
If, however, the two checksum did not match, the receiving computer would
conclude that the 1000 character set of data had not been transmitted accurately and would typically
26
27
UNI075650 at ¶ 36.
UNI075650 at ¶ 37; UNI075720.
7
request the transmitting computer to resend the data. Almost all Internet communications involve
the exchange of checksums to help ensure data accuracy.
Of importance to the reexamination, Grundy describes the use of checksum algorithms in
the generation of certain data fields that ultimately make up the “registration code.” Specifically,
Grundy teaches that the registration code consists of a packed bit array “with each field of the
record occupying no more bits than is necessary to encode the information content of the field.” 28
There are six fields concatenated to form the registration code bit array.
The first four fields are (1) a user data checksum, (2) a hardware ID code, (3) an anti-virus
checksum, and (4) a previous owner‟s ID number. After these four fields are packed into the bit
array, the array is encrypted, then (5) a Product/Version ID code is added, then (6) a data entry
checksum is generated for the entire array and added to the array. Finally, the packed bit array is
converted to an alphanumeric form to produce the registration code.29 The block diagram in Figure
1 below represents how Grundy generates its registration code, which is a packed bit array:
Figure 1: Block diagram of Grundy's concatenated registration code30
28
Id. at Col. 18:61-64; see also UNI075647-48 at ¶ 27.
Id. at Col. 18:58-64, 19:13-18; see also UNI075648 at ¶ 29.
30
UNI075648.
29
8
As illustrated in the block labeled “X” in the upper-left hand corner of the above Figure, the
operation that comprises the checksum of the user data component fields is a preliminary step for
generating only the data that will later occupy the USER DATA CHECKSUM field of the packed
bit array.
During the reexamination, the Examiner erroneously asserted that Grundy produces a
registration code by “performing a checksum of the user data component fields.”31 However, the
Examiner‟s technical understanding of Grundy was flawed because, as discussed below, the
checksum function does not create the registration code. Rather, the checksum function is a
preliminary step to the creation of Grundy‟s “registration code.” Further, the checksums described
in Grundy are not cryptographic functions, but rather appear to be used to check for typographical
data entry errors or transmission errors.
While the typical checksums are useful in detecting accidental modification such as
corruption of stored data or errors in a communication channel, they provide no security against a
malicious agent because their simple mathematical structure makes them trivial to circumvent. To
provide a reliable level of security, the use of a cryptographic hash function is necessary.
In one example, Grundy states for one of the checksums that “[t]his checksum will be used
by the Manufacture Control Agency to avoid operator data-entry errors 304.”32
For another
checksum, Grundy states that “[i]f the user data validity check 502 passes, a checksum of the user
data is created 505. This checksum will be used during the Authorization process as a crossreference to validate the user data as communicated to the Manufacture Control Agency 310 FIG.
3.”33
31
UNI075172.
Exh. F at Col. 19:6-8, 15:3-24; see also UNI075649 at ¶ 34.
33
Id. at Col. 18:25-29; see also UNI075649 at ¶ 34.
32
9
Grundy‟s checksums are quite distinct from cryptographic functions, which are used for
different applications. If Grundy‟s checksums were to be used for security applications (as the
Examiner asserted during the reexamination) they would be vulnerable to attack. For example, a
checksum‟s linearity may be exploited by a malicious adversary.
One of the Examiner‟s primary misconceptions in the reexamination was the role of
checksum functions in Grundy. The Examiner mistakenly believed that the checksum in Grundy
was used to generate the Grundy “registration code.” Grundy however, uses a checksum function
for data entry error checking as a preliminary step to creating Grundy‟s “registration code.”
Importantly, the checksum function does not produce the Grundy “registration code.” Rather, the
checksum produces a value that is ultimately combined along with several other data items,
encrypted and packed into a bit array, which is Grundy‟s “registration code.”
Operating under this misconception, the Examiner substituted the checksum algorithm
disclosed in Grundy in place of the sophisticated encryption algorithms disclosed in Hellman to
arrive at a combination that the Examiner initially believed rendered obvious the claims of the „216
Patent. But, after Uniloc educated the Examiner on the nature of Grundy‟s checksum and how/why
it was used, the Patent Office reversed itself and concluded that such a combination did not render
obvious any of the claims of the „216 Patent.
III.
APPLICABLE LAW
A. Claim Construction
“It is a „bedrock principle‟ of patent law that „the claims of a patent define the invention to
which the patentee is entitled the right to exclude.‟” Phillips v. AWH Corp., 415 F.3d 1303, 1312
(Fed. Cir. 2005) (en banc) (quoting Innova/Pure Water Inc. v. Safari Water Filtration Sys., Inc., 381
F.3d 1111, 1115 (Fed. Cir. 2004)). In claim construction, courts examine the patent‟s intrinsic
evidence to define the patented invention‟s scope. See id.; C.R. Bard, Inc. v. U.S. Surgical Corp.,
10
388 F.3d 858, 861 (Fed. Cir. 2004); Bell Atl. Network Servs., Inc. v. Covad Commc’ns Group, Inc.,
262 F.3d 1258, 1267 (Fed. Cir. 2001). This intrinsic evidence includes the claims themselves, the
specification, and the prosecution history. See Phillips, 415 F.3d at 1314; C.R. Bard, Inc., 388 F.3d
at 861. Courts give claim terms their ordinary and accustomed meaning as understood by one of
ordinary skill in the art at the time of the invention in the context of the entire patent. Phillips, 415
F.3d at 1312-13; Alloc, Inc. v. Int’l Trade Comm’n, 342 F.3d 1361, 1368 (Fed. Cir. 2003).
The claims themselves provide substantial guidance in determining the meaning of
particular claim terms. Phillips, 415 F.3d at 1314. First, a term‟s context in the asserted claim can
be very instructive. Id. Other asserted or unasserted claims can also aid in determining the claim‟s
meaning because claim terms are typically used consistently throughout the patent. Id. Differences
among the claim terms can also assist in understanding a term‟s meaning. Id. For example, when a
dependent claim adds a limitation to an independent claim, it is presumed that the independent
claim does not include the limitation. Id. at 1314-15.
“[C]laims „must be read in view of the specification, of which they are a part.‟” Id. (quoting
Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995) (en banc)). “[T]he
specification is always highly relevant to the claim construction analysis. Usually, it is dispositive;
it is the single best guide to the meaning of a disputed term.” Id. (quoting Vitronics Corp. v.
Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teleflex, Inc. v. Ficosa N. Am. Corp., 299
F.3d 1313, 1325 (Fed. Cir. 2002). This is true because a patentee may define his own terms, give a
claim term a different meaning than the term would otherwise possess, or disclaim or disavow the
claim scope. Phillips, 415 F.3d at 1316. In these situations, the inventor‟s lexicography governs.
Id. Also, the specification may resolve ambiguous claim terms “where the ordinary and accustomed
meaning of the words used in the claims lack sufficient clarity to permit the scope of the claim to be
ascertained from the words alone.”
Teleflex, Inc., 299 F.3d at 1325.
11
But, “[a]lthough the
specification may aid the court in interpreting the meaning of disputed claim language, particular
embodiments and examples appearing in the specification will not generally be read into the
claims.” Comark Communs. v. Harris Corp., 156 F.3d 1182, 1187 (Fed. Cir. 1998) (quoting
Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 1988)); see also Phillips,
415 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim
construction because a patent applicant may define a term in prosecuting the patent.
Home
Diagnostics, Inc., v. Lifescan, Inc., 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the
specification, a patent applicant may define a term in prosecuting a patent.”).
B. Doctrine of Prosecution History Disclaimer
The doctrine of prosecution history disclaimer “limits the interpretation of claims so as to
exclude any interpretation that may have been disclaimed or disavowed during prosecution in order
to obtain claim allowance.” Omega Eng’g, Inc. v. Raytek Corp., 334 F.3d 1314, 1323 (Fed. Cir.
2003). For the doctrine to apply, the disclaimer must be clear and unmistakable. Computer
Docking Station Corp. v. Dell, Inc., 519 F.3d 1366, 1374 (Fed. Cir. 2008). Indeed, the Federal
Circuit has stated, “we will find that the applicant disclaimed protection during prosecution only if
the allegedly disclaiming statements constitute a clear and unmistakable surrender of subject
matter.” Ecolab, Inc. v. FMC Corp., 569 F.3d 1335, 1342 (Fed. Cir. 2009) (quoting Bayer AG v.
Elan Pharm. Research Corp., 212 F.3d 1241, 1251 (Fed. Cir. 2000)).
In other words, the doctrine is limited in that “prosecution disclaimer does not apply to an
ambiguous disavowal.” Computer Docking Station, 519 F.3d at 1375; Cordis Corp. v. Boston Sci.
Corp., 561 F.3d 1319, 1329 (Fed. Cir. 2009) (“A disclaimer must be „clear and unmistakable,‟ and
unclear prosecution history cannot be used to limit claims.”) “Prosecution disclaimer does not
apply, for example, if the applicant simply describes features of the prior art and does not
12
distinguish the claimed invention based on those features.” Computer Docking Station, 519 F.3d at
1375.
IV.
THE PROPER CONSTRUCTION OF “PERMITS USE OF SAID DIGITAL
DATA...ONLY IF...HAS MATCHED . . .”
Uniloc’s Proposed Construction
The ordinary meaning of the phrase is
clear and unambiguous. Thus, the phrase
does not require construction.
Defendants’ Proposed Construction
When . . . has matched then the use of said
digital data is permitted
This disputed phrase is found in claim 1 of the „216 Patent where the relevant clause reads
as follows:
said system further including [mode switching means] operable on said platform
which permits use of said digital data in said [use mode] on said platform only if a
[licensee unique ID] first generated by said [local licensee unique ID generating
means] [has matched] a [licensee unique ID] subsequently generated by said [remote
licensee unique ID generating means];34
No construction of this phrase is necessary because it consists of basic English words that
enjoy frequent use and therefore will be easily understood and applied by a jury. Phillips, 415 F.3d
at 1314 (Fed. Cir. 2005) (“In some cases, the ordinary meaning of claim language as understood by
a person of skill in the art may be readily apparent even to lay judges, and claim construction in
such cases involves little more than the application of the widely accepted meaning of commonly
understood words.”); see also Orion IP, LLC v. Staples, Inc., 406 F. Supp. 2d 717, 738 (E.D. Tex.
2005) (stating that “although every word used in a claim has meaning, not every word requires
construction” in declining to construe claim terms).
Defendants‟ proposed construction is unnecessary because there is no ambiguity in the
disputed phrase that requires clarification, nor are there terms of art that need explanation. This
observation is confirmed by examining Defendants‟ proposed construction, which appears to do
34
Exh. C at Col. 13:54-14:1. Items in brackets denote claim terms/phrases that have been previously construed and are
found in the Agreed Constructions section of the parties‟ P.R. 4-3 Joint Claim Construction and Prehearing statement.
13
nothing more than rearrange the words of the disputed phrase. O2 Micro Int’l Ltd. v. Beyond
Innovation Tech. Co., 521 F.3d 1351, 1362 (Fed. Cir. 2008) (“We, however, recognize that district
courts are not (and should not be) required to construe every limitation present in a patent‟s asserted
claims . . . . Claim construction is not an obligatory exercise in redundancy.” (internal quotations
and citations omitted)). The disputed phrase should be accorded its plain and ordinary meaning,
which is best recognized by the express words of the claim term.
V.
UNILOC’S EXPLANATION OF THE PRIOR ART DURING THE
REEXAMINATION DOES NOT GIVE RISE TO ANY DISCLAIMER
As explained in the introduction, there are two competing arguments advanced by two
different groups of defendants, both of which require the Court to find that Uniloc unambiguously
disavowed claim scope during reexamination. Uniloc‟s and Defendants‟ competing positions are
set forth in the table below.
Uniloc’s Position
There is no disclaimer
in the reexamination
file history.
Group A Defendants’
Position
The licensee unique
ID/security key cannot be
generated by a checksum,
summation algorithm,
summer, or equivalent
thereof, used to test data
integrity
Group B Defendants’ Position
The licensee unique ID generated by
the means recited in each of the claims
must be derived from at least one piece
of information that is specific to the
user, such as name, billing information,
or product information unique to the
installation entered by the user. The
information cannot be specific to the
computer or independently generated
by the computer.
The Group A Defendants‟ would erroneously narrow the term licensee unique ID generating
means whereas the Group B Defendants‟ proposed disclaimer erroneously limits the information
which can be used to generate a licensee unique ID. As explained below, neither position can be
sustained. Because Uniloc did not disclaim any subject matter during reexamination, there should
be no manipulation or limitation of the established constructions - constructions that the Patent
Office and Uniloc relied upon during the reexamination.
14
A. A Review of the Reexamination History Reveals That There is No Support
for an Exclusion Related to Data Integrity Testing
Not having seen Defendants‟ arguments, Uniloc is now forced to prove a negative, i.e., that
there is no disclaimer. But, based on the excerpts listed in the Group A Defendants‟ portion of the
P.R. 4-3 Statement, it appears Defendants are attempting to select a number of unrelated
reexamination statements, from different sources, and then string them together out of context in an
attempt to manufacture a disclaimer argument (yet, even these out-of-context statements do not rise
to the level of a disclaimer). A close review of the portions of the reexamination history cited by
Defendants, however, demonstrates nothing more than Uniloc‟s efforts to correct the Examiner‟s
technical misinterpretation of the prior art. Namely, the Examiner‟s attempts to incorrectly combine
the Hellman and Grundy references by substituting the simple typo checking checksum disclosed in
Grundy for the more sophisticated cryptographic functions used in Hellman‟s system, as discussed
above in sections II(C)(1)-(2).
Based on the portions of the reexamination cited by Defendants in the P.R. 4-3 Statement as
allegedly supporting their “checksum” and “used to test data integrity” exclusions, Defendants
appear to be laboring under the same flawed technical understanding of Grundy that the Examiner
ultimately abandoned. Uniloc did not distinguish its invention, nor amend any of the original
claims, to overcome Grundy‟s checksums. Rather, Uniloc merely demonstrated to the Examiner
that he was operating under a flawed understanding regarding Grundy‟s disclosure and that under a
correct understanding, Grundy and Hellman could not be combined in the manner suggested. The
Examiner then correctly withdrew the rejections based on the combination of Hellman and Grundy.
The Court should recognize that Uniloc‟s arguments were not an attempt to distinguish the
claimed invention, but instead were a demonstration of the technical infeasibility of combining
Hellman and Grundy. Such an explanation does not amount to a disavowal of claim scope under
Computer Docking Station, 519 F.3d at 1375. The Court should thus reject the Defendants attempts
15
to narrow the scope of the claims based on Uniloc arguments related to combining Hellman and
Grundy.
1. The statements in response to the first office action do not constitute
a disclaimer
None of the statements made in Uniloc‟s reply to the first office action constitute a clear,
unambiguous disavowal of claim scope. Instead, these statements were made to show why it was
technically unworkable (and thus legally improper) for the Examiner to combine Hellman and
Grundy under § 103.
Uniloc pointed out to the Examiner that Grundy‟s checksum could not be combined with
Hellman to somehow cure Hellman‟s lack of a licensee unique ID because Grundy‟s checksum was
not being used to generate a licensee unique ID. For example, in two statements cited to by
Defendants, Uniloc merely points out to the Examiner that Grundy could not properly be combined
under § 103 because Grundy‟s checksum was used to verify that user entered information is entered
correctly. In other words, the checksum in the case of Grundy is used as a typographical error
checker and not to generate a unique identifier associated with the licensee.
Statement #1: “Grundy does not cure this deficiency of Hellman. The Office argues
that the unique identifier associated with the licensee is disclosed by Grundy‟s
„checksum.‟ But Grundy’s checksum is solely used to verify the accuracy of userentered information - it is not a unique identifier associated with a licensee.”35
Statement #2: “Thus, Grundy‟s „checksum‟ is not uniquely associated with an
intended licensee. Rather, Grundy’s checksum can only be used to indicate whether
the user (i.e., the intended licensee) correctly entered the requested data.”36
Contrary to the Defendants‟ apparent position, the above statements do not demonstrate that
Uniloc disclaimed the use of checksums or algorithms used to test data integrity, but rather that
Grundy was using its checksum for a fundamentally different function - as a typo checker, and not
to generate a licensee unique ID. If fact, the above statements are found at the beginning and
35
36
UNI075103 (emphasis added).
UNI075103-4 (emphasis added).
16
ending, respectively, of one paragraph and thus are cited out of context. The rest of the paragraph
clearly shows that Uniloc was attempting to explain to the Examiner that the checksum in Grundy
was not being used to generate a licensee unique ID and provides:
More specifically, Grundy describes a “method and apparatus that monitors and
controls the use of information stored on a storage medium.” (Grundy, 4:21-24.)
As part of that method, Grundy teaches generating a checksum of the user data
upon entry of the user data, and then packing and encoding the checksummed user
data along with other data (i.e., hardware ID, anti-virus checksum, and previous
owner ID number) to generate a “registration code.” (See, Grundy 18:10-33 and
18:58-64.) Grundy discloses that the “registration code is decrypted and then
unpacked into its component fields 308.” (Grundy, 15:4-6.) Grundy discloses that
once the data is unpacked the “user data cross-reference code and the second
checksum 309 are compared 310,” and “[i]f these do not match it is an indication
that the User Data as entered by the Manufacturer Control Agency operator 301
does not match the User Details as originally entered by the new user.”37
As explained in the above paragraph, Grundy discloses generating a “registration code”
which has a one of its parts, a checksum of the user‟s information. The checksum, however, is not
being used to generate the registration code.
When the two statements relied upon by the
Defendants are viewed in context, it is clear that Uniloc was explaining to the Examiner that the
Grundy checksums were being used for error checking and not generating of a licensee unique ID.
Additional statements cited by Defendants further show that Uniloc was attempting to explain that
Grundy‟s checksum was not being used to generate a licensee unique ID.
Statement #3: “However, Grundy‟s checksum cannot meet these limitations as it
cannot be equated to claim l‟s „licensee unique ID.‟ As explained more fully
below, Grundy’s checksum is used for nothing more than verifying that the licensee
correctly entered data. It is not uniquely associated with any intended licensee and
cannot be used to identify any intended licensee.”38
Statement #4: “Thus, Grundy uses the checksum of the user data as an indicator
that the user data has been correctly entered. Grundy does not teach or suggest
that the checksum, or the registration code that includes the checksum as one of the
fields, represents a unique Identifier associated with intended registered user.”39
37
UNI075103.
UNI075111 (emphasis added).
39
UNI075112 (emphasis added).
38
17
Even though the above statements are again taken out of context, by themselves they show
that Uniloc was not disclaiming the use of checksums. This fact is even clearer when viewed in
light of the surrounding materials where Uniloc specifically told the Examiner:
Furthermore, the registration code is not „produced by performing a checksum of the
user data component fields,‟ as alleged by the Office Action. Rather, the registration
code is produced by encrypting multiple fields, of which one of those fields is a
checksum of user data, none of which produces a unique value. The Office’s
interpretation of Grundy is thus incorrect.40
When read in context, it is evident that Uniloc is explaining to the Examiner that Grundy‟s
checksum does not generate a licensee unique ID because that is not the purpose for which it is
being used. Indeed, it is clear that this was the argument Uniloc made because the Examiner
explained that he was confirming all claims of the „216 Patent over his initial rejection of them
because:
[Uniloc] has persuasively argued that the summation [i.e., the checksum] disclosed
by Grundy is used in the context of merely verifying the correctness of information
related to the user and is not being used to generate an ID per se. Since the
information is not being used for the same purpose, one skilled in the art therefore
would not use the algorithm of Grundy as part of the generation of the claimed
licensee unique ID.41
Uniloc did not, however, disclaim the use of checksums or algorithms used to test data integrity to
generate licensee unique IDs.
The remaining statements from the first office cited by Defendants likewise do not show any
disclaimer by Uniloc. These statements include the following:
Statement #5: “A person of ordinary skill in the art would understand „checksum‟ to
represent a small number of check digits that are typically appended to data in order
to ensure the data‟s integrity when it is stored or transmitted. To calculate a
checksum of some data, the data is added up (e.g., broken up into C-byte chunks,
where C is a small number such as 1,2,4, or 8, and summed); the sum is chopped to
a fixed length (e.g., a byte or C bytes) and appended to the data before storage or
transmission. Checksum algorithms used in practice are variations on this scheme.
When the data is received or retrieved later, the checksum is re-calculated to ensure
40
41
UNI075111 (emphasis added).
UNI076155.
18
that the result is the same as the original checksum; if the result differs then the data
must have been corrupted. (See, Rosenblatt Dec., ¶52.)”42
Statement #6: “A checksum is therefore much smaller in length than its input data.
For example, a 16-bit (2-byte) or 64-bit (8-byte) checksum may be calculated on
thousands, millions, or billions of bytes of data. This fulfills the checksum‟s
intended purpose well, given that most errors in data storage or transmission are
small and localized, making it highly likely that the resulting checksum will differ
from the one originally calculated, and extremely unlikely that corrupted data will
produce the same checksum as the original one. For example, if one or two bits are
altered, the checksum will differ. (See, Rosenblatt Dec., ¶56.)”43
Statement #7: “Therefore, a checksum cannot preserve the uniqueness of the input
data. Grundy shows the input data to the checksum routine in Fig. 2, 212, „ENTER
NEW USER DETAILS.‟ This is „new user data, such as the user‟s name, address
and telephone number‟ (Grundy at 12:37-38.) Such data might take up roughly a
hundred bytes of data. A checksum of this data would not preserve its uniqueness;
many different sets of user data could produce the same checksum. Therefore the
checksum is not a generator of unique identifiers. (See, Rosenblatt Dec., ¶62.)”44
Statement #8: “As previously discussed, a checksum cannot preserve the
uniqueness of the input data and thus the checksum is not a generator of unique
identifiers. (See, Rosenblatt Dec., 62.)”45
As an initial matter, each of the above statements was based on statements made in
connection with the November 23, 2010 declaration of William Rosenblatt submitted by Uniloc.46
However, the Patent Office explicitly stated that it did not rely on Mr. Rosenblatt‟s declaration47:
42
UNI075112; see also UNI76176 at ¶ 52.
UNI075112; see also UNI76177 at ¶ 56.
44
UNI075112; see also UNI76180 at ¶ 62.
45
UNI075117; see also UNI76180 at ¶ 62.
46
UNI076163-86.
47
UNI075163.
43
19
Thus, any reliance on any of these statements by Defendants should be weighed accordingly.
Furthermore, even if the Examiner had not rejected the Mr. Rosenblatt‟s declaration, none of the
statements can be read as anything more than a primer of checksums. There is no attempt to
distinguish the „216 Patent in these statements. Instead, these statements were provided to show
another reason why the Hellman and Grundy references could not be combined. Specifically, these
statements demonstrate that checksums are not the same as the cryptographic hash functions
disclosed in Hellman and thus it would be improper to combine the references, by substituting
Grundy‟s simple checksum for the more complicated cryptographic hash functions of Hellman.
Thus, these statements do not contain a “clear and deliberate statement” that meets the high
standard Defendants must prove to show a disclaimer of claim scope. Honeywell Int’l, Inc. v.
Universal Avionics Sys. Corp., 493 F.3d 1358, 1365 (Fed. Cir. 2007).
2. Statements in response to the second office action also fall short of a
disclaimer
Defendants have also indicated that the following statements support their contention that
Uniloc disclaimed the use of checksums and algorithms used to test data integrity:
Statement #9: “Uniloc submits that based on the Examiner‟s statement in the Order,
Grundy‟s data validation checksums do not produce a unique ID that could be used
by Hellman.”48
Statement #10: “Uniloc also argued that Grundy‟s checksum did not generate „a
licensee unique ID‟ because Grundy‟s checksum algorithm, by its very nature,
destroys any uniqueness.”49
Statement #11: “The simple checksums described in Grundy are an entirely
different class of algorithm and cannot provide the security required by Hellman.
(Pooch Dec. ¶¶ 32-39). As Dr. Pooch explains that „Grundy…describes several
conventional for checksums.‟ (Pooch Dec. ¶ 8.) For example, „the checksums
described in Grundy are not cryptographic functions, but rather appear to be used to
check, for example, for typographical data entry errors or transmission errors.‟
(Pooch Dec., ¶ 32.)”50
48
UNI075202.
UNI075203.
50
UNI075218.
49
20
Statement #12: “In the rejection of claim 1 on page 14, on the other hand, the
Examiner proposes to replace Hellman‟s cryptographic function generator 38 with
the checksum of Grundy to provide the summation algorithm limitation absent from
the teachings of Hellman. (Second Action, p. 15; bottom) However, if these
references are combined as the Examiner suggests, with Grundy‟s error-checking
checksum replacing Hellman‟s cryptographic function generator, the Examiner can
no longer take credit for the „uniqueness‟ feature provided by Hellman because the
source of that uniqueness, the one-way compressive hash function having a 100:1
X/Y bit ratio, would be replaced by Grundy‟s checksum. Uniloc therefore requests
that the obviousness rejection of claims 2, 12, and 17 be considered and
withdrawn.”51
As with the statements made in the first office action, these statements simply point out that
the Grundy checksums are not used to generate Grundy‟s “registration code” and could not be
combined with Hellman because checksums are not sophisticated cryptographic functions. Also
worth noting is that these statements do not mention “data integrity” nor do they appear to be
germane to such a subject.
In sum, a review of Uniloc‟s statements in the reexamination prosecution history
demonstrates there was no disclaimer of subject matter. Uniloc simply made factual statements
about what was (and was not) contained in the Grundy reference and why it was technically
infeasible, and therefore legally improper, to combine Grundy and Hellman as suggested by the
examiner. Uniloc never made statements to the effect that “the claims are allowable over Grundy
because Grundy‟s X does not meet the claimed feature Y” and that are typically associated with a
disclaimer.
3. Grundy dealt with a checksum, not a licensee unique ID
Assuming, arguendo, that the Defendants are correct that some of Uniloc‟s statements about
Grundy amount to a disclaimer, at most such an alleged “disclaimer” should only apply to
checksum algorithms such as the one shown in Grundy and not summation algorithms in general
“used to test data integrity” as urged by the Defendants. As shown from the portions of the intrinsic
51
UNI075221.
21
record identified by the Defendants above, most, if not all, of the identified portions deal with the
subject of Grundy‟s checksum algorithm. As noted by the Patent Office in the NIIRC, Grundy‟s
checksum algorithm is distinct from the algorithms used to create licensee unique IDs (“unique
licensee ID generating means”). Again, on this subject the Examiner explained:
[Uniloc] has persuasively argued that the summation [i.e., the checksum] disclosed
by Grundy is used in the context of merely verifying the correctness of information
related to the user and is not being used to generate an ID per se. Since the
information is not being used for the same purpose, one skilled in the art therefore
would not use the algorithm of Grundy as part of the generation of the claimed
licensee unique ID.52
In other words, the Patent Office found that Grundy‟s checksum algorithm is different than the
unique licensee generating means claimed in the „216 Patent. In light of this recognized distinction,
if there was a disclaimer of subject matter (and Uniloc is adamant that there was not), the Court
should limit such a disclaimer to checksums like the one shown in Grundy and decline Defendants‟
invitation to apply such a disclaimer to summation algorithms “used to test data integrity” as that
was never at issue in the cited portions of the reexamination file history.
4. Defendants’ alleged disclaimer conflicts with the disclosed invention
and creates a subjective test
Defendants would have the Court adopt a disclaimer excluding a licensee unique ID/security
key generated by a checksum, summation algorithm, summer, or equivalent thereof, used to test
data integrity.
Defendants‟ data integrity exclusion is nonsensical in light of the patent
specification, which teaches that the LUID and the RUID are supposed to be compared and if they
match, allow full access to the software.53 Since the local unique ID generating means and the
remote unique ID generating means are the same algorithm (located on different computers), the
inputs to those algorithms need to be the same in order for the outputs to match.
The term “data integrity” is hopelessly vague and does nothing to serve the purpose of claim
52
53
UNI076155.
See Exh. C at claims 1 and 19.
22
construction. Under Defendants‟ “data integrity” limitation, an alleged infringer could always
argue that the local and remote generating means act as a test of data integrity because if the inputs
are not identical the outputs would not match. Thus, under Defendants‟ proposed limitation, any
generating means algorithm would be disclaimed.
Such an interpretation would effectively
eviscerate the entire „216 Patent.
Further, the “used to test data integrity” limitation creates a subjective test that would not aid
in objectively determining infringement. Under Defendants‟ proposal, a given algorithm may or
may not infringe depending on its intended purpose. In order to ascertain such a purpose, it would
be necessary to determine why a particular algorithm was implemented.
The Federal Circuit has said that hash values produced by an MD5 hash algorithm satisfy
the licensee unique ID requirement. See Uniloc II, 632 F.3d at 1304 (“As this court held in Uniloc
I, 290 Fed. App'x at 342, there was substantial evidence for a jury to conclude that the output of the
MD5 and SHA1 algorithms was a licensee unique ID.”). Defendants would have the Court alter the
Federal Circuit‟s findings to conclude that MD5 hash values may infringe under some
circumstances but not others. In fact, Defendants would require the fact finder to determine the
state of mind of the software programmer to ascertain why the programmer used a particular hash
algorithm, such as MD5. Such a test would lead to inconsistent results and should be rejected. In
addition, the Patent Office does not appear to have adopted Defendants‟ view as evidenced by the
NIIRC, which states: “[a]s the Federal Circuit has pointed out, the MD5 algorithm (described in
RFC 1321, attached to this action) could be such a means.”54
B. Group B Defendants’ Attempt to Limit the Types of Information Used to
Generate a “Licensee Unique ID” Should be Rejected
During the reexamination, the Examiner mistakenly asserted that Hellman discloses a
“licensee unique ID” (i.e., “a unique identifier associated with a licensee” per the Federal Circuit).
54
UNI076155.
23
As with Grundy, Uniloc had to correct the Examiner‟s technical misunderstanding of Hellman.
When read in context, all of the statements listed by Defendants are consistent with Uniloc‟s efforts
to educate the Examiner that Hellman did not disclose a “unique licensee ID” consistent with the
Federal Circuit‟s holdings. Importantly, there are no “clear” or “unmistakable” statements that meet
the Federal Circuit‟s high burden for disclaimer, much less one that supports Defendants‟ lengthy
proposal.
The District of Rhode Island construed the phrases “licensee unique ID” and “security key”
to mean “a unique identifier associated with a licensee.” Uniloc, 447 F.Supp. 2d at 183-89. In
Uniloc I, the Federal Circuit discussed at length the proper construction of “licensee unique ID” and
ultimately affirmed the district court‟s concise construction stating “the district court correctly
construed the „licensee unique ID‟ as a unique identifier associated with a licensee that can be, but
is not limited to, personally identifiable information about the licensee or user.” Uniloc I, 290 Fed.
App‟x at 344. In its opinion, the Federal Circuit acknowledged, “Microsoft is, however, correct that
the licensee unique ID cannot be based solely on platform-related user information.” Id. at 343.
Further, the Court also stated “[w]e do not read these limitations as requiring that this information
be uniquely about the user instead of just unique to the user.” Id. at 344 (emphasis in original).
Despite these various remarks, at the end of the day the Federal Circuit decided that a succinct
construction was proper and decided not to alter the construction of “licensee unique ID” beyond “a
unique identifier associated with a licensee.” See Uniloc II, 632 F.3d at 1299-1300.
The Group B Defendants‟ alleged disclaimer appears to be derived from the NIIRC. 55 To
the extent Defendants intend to argue that the Examiner‟s “Reasons for Allowance” 56 mandate their
alleged disclaimer, Federal Circuit precedent is not on their side. See ACCO Brands, Inc. v. Micro
55
UNI076154.
The Examiner‟s statements are actually contained in the section of the NIIRC entitled “STATEMENT OF
REASONS FOR PATENTABILITY AND/OR CONFIRMATION.” See UNI076154. Uniloc contends that this
section is the same as a “Reasons for Allowance” section.
56
24
Sec. Devices, Inc., 346 F.3d 1075, 1079 (Fed. Cir. 2003) (“there is no obligation to respond to an
examiner‟s statement of Reasons for Allowance, and the statement of an examiner will not
necessarily limit a claim.”); Inverness Medical Switzerland v. Princeton Biomeditech Corp., 309
F.3d 1365, 1372-73 (Fed. Cir. 2002) (rejecting contention that statement in examiner‟s Reasons for
Allowance governed construction of disputed claim term).
Moreover, the Examiner‟s Reasons for Allowance are internally inconsistent and conflict
with the Federal Circuit‟s construction. The Reasons for Allowance specifically provide:
During reexamination, claims are given the broadest reasonable interpretation
consistent with the specification and limitations in the specification are not read into
the claims (In re Yamamoto, 740 F.2d 1569, 222 USPQ 934 (Fed. Cir. 1984)).
Where there exists a final decision by the Court of Appeals for the Federal Circuit
regarding the construction of claims, an interpretation is not reasonable where it is
inconsistent with that decision.57
Despite having acknowledged that his claim construction must be consistent with the Federal
Circuit‟s, the Examiner went on to state:
The licensee unique ID generated by the means recited in each of the claims must
be derived from at least [sic] piece of information that is specific to the user, such as
name, billing information, or product information unique to the instantiation [sic]58
entered by the user. The information cannot be specific to the computer or
independently generated by the computer.59
As noted above, this is not how the Federal Circuit construed “licensee unique ID.” The
Federal Circuit explained that “the licensee unique ID cannot be based solely on platform related
user information” and that licensee unique ID is a “unique identifier associated with the licensee
that can be, but is not limited to, personally identifiable information about the user of licensee.”
The Examiner‟s statement that the licensee unique ID cannot be derived from information “specific
to the computer or independently generated by the computer” conflicts with the Federal Circuit‟s
observation that it cannot be derived solely from such information. Additionally, the difference in
57
UNI076154 (emphasis added).
It is believed that the Examiner meant to state “installation.”
59
UNI076154.
58
25
using information associated with a user as opposed to information specific to a user in generating a
“licensee unique ID” was heavily contested in the Microsoft litigation.
The Federal Circuit
ultimately concluded that information “associated with the user” is the proper standard.
Having acknowledged that his construction must be consistent with the Federal Circuit‟s,
Uniloc believes that the Examiner did not purposefully depart from the Federal Circuit‟s wellestablished construction, but was unfortunately imprecise in his choice of words. The Group B
Defendants appear to be seizing on the Examiner’s inexact articulation of the Federal Circuit‟s prior
holdings as a basis to adopt a disclaimer that (1) neither the Federal Circuit nor Uniloc have
embraced and (2) that conflicts with that Court‟s own construction. As noted above, the Federal
Circuit has examined the construction of “licensee unique ID” at length. Uniloc asserts that there is
no reason to depart from the Federal Circuit‟s established construction, especially when the
Examiner himself has indicated no intention or reason to do so. Accordingly, the Court should
reject the Group B Defendants‟ attempt to re-construe and narrow this term because neither the
Examiner‟s Reasons for Allowance nor his inconsistent statements made therein provide a basis to
do so.
VI.
CONCLUSION
For the foregoing reasons, Uniloc requests that the Court adopt its proposed constructions
and reject those proffered by the Defendants. Furthermore, Uniloc submits that a close reading of
the reexamination file history demonstrates that Uniloc only described features of the prior art in an
effort to demonstrate why, from a technical perspective, the Examiner would not be able to
successfully maintain a §103 rejection. Computer Docking Station, 519 F.3d at 1375. Importantly,
Uniloc did not make limiting distinctions over either Grundy or Hellman and Defendants cannot
show that the high threshold for prosecution history disclaimer is satisfied. Therefore, Uniloc
respectfully requests that the previous constructions remain unaltered.
26
Dated: September 12, 2011.
Respectfully Submitted:
/s/ Barry J. Bumgardner
Edward R. Nelson, III
Texas State Bar No. 00797142
Barry J. Bumgardner
Texas State Bar No. 24041918
Steven W. Hartsell
Texas State Bar No. 24040199
S. Brannon Latimer
Texas State Bar No. 24060137
Jaime K. Olin
Texas State Bar No. 24070363
NELSON BUMGARDNER CASTO, P.C.
3131 West 7th Street, Suite 300
Fort Worth, Texas 76107
(817) 377-9111
(817) 377-3485 (fax)
enelson@nbclaw.net
barry@nbclaw.net
shartsell@nbclaw.net
blatimer@nbclaw.net
jolin@nbclaw.net
T. John Ward, Jr.
Texas State Bar No. 00794818
J. Wesley Hill
Texas State Bar No. 24032294
WARD & SMITH LAW FIRM
111 West Tyler St.
Longview, Texas 75601
Tel: (903) 757-6400
Fax: (903) 757-2323
jw@wsfirm.com
wh@wsfirm.com
ATTORNEYS FOR PLAINTIFFS
UNILOC USA, INC. AND
UNILOC SINGAPORE PRIVATE LIMITED
27
CERTIFICATE OF SERVICE
I hereby certify that on the 12th day of September 2011, I electronically filed the foregoing
document with the clerk of the court for the U.S. District Court, Eastern District of Texas, Tyler
Division, using the electronic case filing system of the court. The electronic case filing system sent
a “Notice of Electronic Filing” to the attorneys of record who have consented in writing to accept
this Notice as service of this document by electronic means.
/s/ Barry J. Bumgardner
28
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?