Uniloc USA, Inc. et al v. NATIONAL INSTRUMENTS CORP. et al
Filing
265
Responsive CLAIM CONSTRUCTION BRIEF filed by FileMaker, Inc., Pervasive Software, Inc., Symantec Corp.. (Attachments: # 1 Exhibit 1 - '216 patent, # 2 Exhibit 2 - PTO Amendment, # 3 Exhibit 3 - Reply to PTO, # 4 Exhibit 4 - Response to PTO, # 5 Exhibit 5 - PTO Notice of Reexam, # 6 Exhibit 6 - PTO Dec of Pooch, # 7 Exhibit 7 - PTO Interview Summary, # 8 Exhibit 8 - PTO Dec of Rosenblatt)(Jones, Michael)
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
TYLER DIVISION
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
SONY CORPORATION OF AMERICA,
ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
DISK DOCTORS LABS, INC., ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
NATIONAL INSTRUMENTS CORP., ET
AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
ENGRASP, INC., ET AL.
Defendants.
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-373
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-471
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-472
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-591
PATENT CASE
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
BMC SOFTWARE, INC., ET AL.
Defendants.
UNILOC USA, INC., ET AL.
Plaintiffs,
vs.
FOXIT CORPORATION, ET AL.
Defendants.
SYMANTEC CORPORATION, ET AL.
Plaintiffs,
vs.
UNILOC USA, INC., ET AL.
Defendants.
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-636
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:10-CV-691
PATENT CASE
§
§
§
§
§
§
§
§
CASE NO. 6:11-CV-33
PATENT CASE
DEFENDANTS’ RESPONSIVE BRIEF ON CLAIM CONSTRUCTION
Table of Contents
I.
INTRODUCTION ...............................................................................................................1
II.
BACKGROUND .................................................................................................................1
A.
The ’216 Patent ........................................................................................................1
III.
APPLICABLE LAW ...........................................................................................................2
IV.
ARGUMENT .......................................................................................................................4
A.
Construction of “permits use of said digital data … only if [the local licensee
unique ID] has matched [the remote licensee unique ID].” (Claims 1, 19, 20) ......4
1.
2.
B.
Defendants’ Proposed Construction Should Be Adopted. ...........................5
Clarification is Necessary in Light of Uniloc’s Infringement
Contentions. .................................................................................................8
Reexamination Disclaimer: The Licensee Unique ID/Security Key Cannot Be
Generated by a Checksum, Summation Algorithm, Summer, or Equivalents
Thereof, Used to Test Data Integrity (All Asserted Claims) ...................................9
1.
2.
C.
Uniloc Clearly Disavowed Checksums from the Scope of the ’216
Patent..........................................................................................................11
Defendants’ Proposed Disclaimer Is Narrowly Tailored to the Subject
Matter Disavowed by Uniloc .....................................................................13
Additional Reexamination Disclaimer: The licensee unique ID generated by the
means recited in each of the claims must be derived from at least one piece of
information that is specific to the user, such as name, billing information, or
product information unique to the installation entered by the user. The
information cannot be specific to the computer or independently generated by the
computer (All Asserted Claims).............................................................................16
1.
Uniloc’s Disclaimer was Clear and Unequivocal. .....................................16
2.
The Scope of Uniloc’s Disclaimer is an Issue for the Court to Decide as
a Matter of Claim Construction. ................................................................17
3.
An Input That is “Unique to a Licensee” is Required to Output a
Licensee Unique ID. ..................................................................................19
4.
The Inputs Disclosed by Hellman Cannot be Used to Output a Licensee
Unique ID...................................................................................................20
i
5.
V.
The NIIRC Appropriately Articulates the Scope of Uniloc’s
Disclaimer. .................................................................................................25
CONCLUSION ..................................................................................................................26
ii
Table of Authorities
Cases
ACCO Brands, Inc. v. Micro Sec. Devices, Inc.,
346 F.3d 1075 (Fed. Cir. 2003)................................................................................................ 26
Chimie v. PPG Indus., Inc.,
402 F.3d 1371 (Fed. Cir. 2005).................................................................................................. 4
Gussin v. Nintendo of Am., Inc.,
62 F.3d 1433 (Fed. Cir. Aug. 3, 1995) ..................................................................................... 27
Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc.,
381 F.3d 1111 (Fed. Cir. 2004).................................................................................................. 3
Inverness Medical Switzerland v. Princeton Biomeditech Corp.,
309 F.3d 1365 (Fed. Cir. 2002)................................................................................................ 27
Markman v. Westview Instruments, Inc.,
517 U.S. 370 (1996) ................................................................................................................... 3
O2 Micro Int’l v. Beyond Innovation Tech.Co.,
521 F.3d 1351 (Fed. Cir. 2008)............................................................................................ 5, 10
On Demand Mach. Corp. v. Ingram Indus.,
442 F.3d 1331 (Fed. Cir. 2006).................................................................................................. 3
Ormco Corp. v. Align Tech. Inc.,
498 F.3d 1307 (Fed. Cir. 2007).................................................................................................. 4
Parallel Networks, LLC v. Abercrombie & Fitch,
No. 6:10cv111, 2011 WL 3609292 (E.D. Tex. Aug. 12, 2011) .............................................. 19
Phillips v. AWH Corp.,
415 F.3d 1303 (Fed. Cir. 2005) (en banc).......................................................................... 3, 4, 5
Research Plastics, Inc. v. Fed. Packaging Corp.,
421 F.3d 1290 (Fed. Cir. 2005).............................................................................................. 2, 3
Schindler Elevator Corp. v. Otis Elevator Co.,
593 F.3d 1275 (Fed. Cir. 2010)................................................................................................ 18
Southwall Techs., Inc. v. Cardinal IG Co.,
54 F.3d 1570 (Fed. Cir. 1995).................................................................................................... 4
Uniloc USA, Inc. v. Microsoft Corp.,
290 Fed. Appx. 337 (Fed. Cir. 2008) ................................................................................. 20, 21
iii
Uniloc USA, Inc. v. Microsoft Corp.,
632 F.3d 1292 (Fed. Cir. 2011).......................................................................................... 16, 22
iv
Table of Abbreviations
Uniloc
Plaintiffs Uniloc USA, Inc., Uniloc Singapore Limited and Uniloc
Luxembourg S.A.
OB
Uniloc’s Opening Brief on Claim Construction, Dkt. No. 257.
Docket number references in this brief are made with respect to the
docket for the Uniloc USA, Inc. et al v. National Instruments Corp.
et al., case number 6:10-CV-472. Corresponding filings are found
in each of the Uniloc related cases.
PTO
United States Patent and Trademark Office
The ’216 patent
U.S. Patent No. 5,490,216 (attached at Exhibit 1)
LUID
Local licensee unique ID
RUID
Remote licensee unique ID
NIIRC
Notice of Intent to Issue Ex Parte Reexamination Certificate
(attached as Exhibit 5)
All emphasis in this brief is added unless otherwise indicated.
v
I.
INTRODUCTION
As is evident from Uniloc’s opening brief (Dkt. No. 257, hereinafter “OB”), the parties
have succeeded in greatly narrowing the claim construction issues to be determined by the Court.
Only two issues remain: (1) the proper construction of the “permits use . . . only if” limitation
and (2) the scope of the disclaimers resulting from Uniloc’s statements to the United States
Patent and Trademark Office (“PTO”) during the recently concluded reexamination of the
patent-in-suit. Those issues are fully addressed below.
At the outset, however, Defendants would like to clarify a potentially misleading
contention in Uniloc’s brief. Specifically, Uniloc has stated that different groups of Defendants
assert that different disclaimers of claim scope result from the statements that Uniloc made to the
PTO. In actuality, all Defendants join in the arguments made with respect to the first disclaimer
issue (i.e., that Uniloc clearly and repeatedly disclaimed checksums and equivalent algorithms
used to test data integrity). A subset of Defendants (the group identified by Uniloc as the “Group
B” defendants) further contends that Uniloc is subject to the additional disclaimer regarding the
derivation of the licensee unique ID. None of the Defendants joining this Responsive Brief on
Claim Construction opposes the additional disclaimer.
II.
BACKGROUND
A.
The ’216 Patent
The patent-in-suit is United States Patent No. 5,490,216 (“the ’216 patent”),1 entitled
“System for Software Registration,” issued on February 6, 1996. The ’216 patent is directed to a
registration system to deter copying of software. Specifically, the patent is directed to a software
registration system wherein a particular piece of software may run on a platform in a “use mode”
1
A copy of which is submitted herewith as Exhibit 1.
1
(i.e. without restrictions) if and only if the licensing procedure described in the patent has taken
place. See ’216 patent at Abstract. In a representative embodiment of the claimed invention, a
user attempting to license software enters certain user information when prompted, including, for
example, the user’s name, telephone number, and address. Id. at Fig. 2b. Other information,
such as a locally generated serial number, based for example on the computer’s system time, can
also be used by the activation process. A “local licensee unique ID generating means” adds the
information entered by the user and other information into “a registration number unique to an
intending licensee,” or a “licensee unique ID.” See id. at Abstract. All this information is then
sent to the vendor’s system, which performs the identical algorithm using the same information
through a “remote licensee unique ID generating means,” thereby creating a “remote licensee
unique ID” and providing it to the user. Id. at 3:3-9. When the software is subsequently
initiated, a “mode-switching means” compares the local and remote licensee unique IDs. Id. at
4:30-44. If the two match, the mode switching means permits the user to access the “use mode”
of the software. Id. However if the two codes do not match, the mode switching means confines
the user to a “demo mode” with limited functionality. Id.
III.
APPLICABLE LAW
Claim construction begins with the language of the claims. Research Plastics, Inc. v.
Fed. Packaging Corp., 421 F.3d 1290, 1295 (Fed. Cir. 2005). “The words of a claim are
generally to be accorded their ‘ordinary and customary meaning,’ which is ‘the meaning that the
term would have to a person of ordinary skill in the art in question at the time of the invention.’”
Id. (quoting Phillips v. AWH Corp., 415 F.3d 1303, 1313 (Fed. Cir. 2005) (en banc)). To
properly construe the claims, courts should look to sources that show what a person of skill in the
art would have understood the disputed claim language to mean, including “the words of the
2
claims themselves, the remainder of the specification, the prosecution history, and extrinsic
evidence concerning relevant scientific principles, the meaning of technical terms, and the state
of the art.” Phillips, 415 F.3d at 1314 (quoting Innova/Pure Water, Inc. v. Safari Water
Filtration Sys., Inc., 381 F.3d 1111, 1116 (Fed. Cir. 2004)).
The patent specification is always highly relevant to claim construction. Phillips, 415
F.3d at 1315-17. Every claim term, irrespective of how basic of a term it might be, must be read
in light of the specification. Id. at 1313. Indeed, claim terms can be defined only in ways that
comport with, and are consistent with, the specification as a whole. Id. at 1316 (citing Markman
v. Westview Instruments, Inc., 517 U.S. 370, 389 (1996)). It is axiomatic that “the claims cannot
be of broader scope than the invention that is set forth in the specification.” On Demand Mach.
Corp. v. Ingram Indus., 442 F.3d 1331, 1340 (Fed. Cir. 2006) (reversing district court’s
overbroad construction of “customer” where the specification “repeatedly reinforce[d] its usage
of the term ‘customer’ as the retail consumer”); see also Ormco Corp. v. Align Tech. Inc., 498
F.3d 1307, 1313-16 (Fed. Cir. 2007) (“[T]o attribute to the claims a meaning broader than any
indicated in the patents and their prosecution history would be to ignore the totality of the facts
of the case and exalt slogans over real meaning.”). “The construction that stays true to the claim
language and most naturally aligns with the patent’s description of the invention will be, in the
end, the correct construction.” Phillips, 415 F.3d at 1316.
Like the specification, the prosecution history “can often inform the meaning of the claim
language by demonstrating how the inventor understood the invention and whether the inventor
limited the invention in the course of prosecution, making the claim scope narrower than it
would otherwise be.” Id. at 1317; see also Chimie v. PPG Indus., Inc., 402 F.3d 1371, 1384
(Fed. Cir. 2005). Explicit statements made by a patent applicant during prosecution and
3
reexamination to distinguish a claimed invention over prior art serve to narrow the scope of a
claim. Southwall Techs., Inc. v. Cardinal IG Co., 54 F.3d 1570, 1576 (Fed. Cir. 1995).
While the “[w]ords of a claim are generally given their ordinary and customary
meaning,” a determination “that a claim term ‘needs no construction’ or has the ‘plain and
ordinary meaning’ may be inadequate when a term has more than one ‘ordinary’ meaning or
when reliance on a term’s ‘ordinary’ meaning does not resolve the parties’ dispute.” O2 Micro
Int’l v. Beyond Innovation Tech.Co., 521 F.3d 1351, 1360-61 (Fed. Cir. 2008). Thus, “[w]hen
the parties present a fundamental dispute regarding the scope of a claim term, it is the court’s
duty to resolve it.” Id. at 1362.
IV.
ARGUMENT
A.
Construction of “permits use of said digital data … only if [the local licensee
unique ID] has matched [the remote licensee unique ID].” (Claims 1, 19, 20)
This phrase means that “when [the local and remote licensee unique IDs] have matched
then the use of said digital data is permitted.” In other words, it is the matching of the two
licensee unique IDs that permits or causes the use of the digital data.
While Uniloc takes the position that this phrase should not be construed, its infringement
contentions suggest that Uniloc intends to argue that the matching of the two licensee unique IDs
need not be the condition that permits or causes the use of the digital data. Rather, Uniloc’s
apparent interpretation of this term would only require that such matching precede in time the
use of the digital data without requiring a causal relationship between the matching and
permitting of use. Accordingly, an actual dispute regarding the scope of this term exists and
should be resolved by the Court See O2 Micro Int’l, 521 F.3d at 1362-63.
4
1.
Defendants’ Proposed Construction Should Be Adopted.
Defendants’ proposed construction is consistent with the ordinary and customary
meaning of the claim language – which is “the meaning that the term would have to a person of
ordinary skill in the art in question at the time of the invention.” Phillips, 415 F.3d at 1314. This
ordinary meaning is informed by the context of the claims, the specification and the prosecution
history.
The ’216 patent specification describes a registration system that compares a locally
generated licensee unique ID with a remotely generated licensee unique ID. If the two IDs
match, the software is activated – i.e., the matching of the two IDs is the condition that causes
activation. For example, the specification states that “[i]n broad terms, the system according to
the invention is designed and adapted to allow digital data or software to run in a use mode on a
platform if and only if an appropriate licensing procedure has been followed.” ’216 patent at
col. 2:52-55. As the parties have agreed, the term “has matched” as used in claim 1 was
correctly construed in the prior litigation as “a comparison between the locally generated
licensee unique ID… and the remotely generated licensee unique ID… shows that the two are
the same.” Dkt. No. 247 (Jt. Claim Constr. Stmt. at 8).
The bulk of the description in the specification concerning this matching process appears
in connection with the “First Embodiment” and the “Seventh Embodiment.” The discussion
concerning other embodiments either does not address this matching in detail or states that this
operation takes place as described in the First Embodiment. See, e.g., ’216 patent at col. 10:4244 (“This registration procedure is as previously described with reference to the first
embodiment.”); see also id. at 11:44-46 (“operates in the manner generally described in respect
of previous embodiments”).
5
The First Embodiment describes the matching algorithm with reference to FIG. 2. This
description and FIG. 2 show that the matching of the licensee unique IDs is at the heart of the
registration process disclosed in the ’216 patent:
As a final stage in registration (refer to FIG. 2d [sic – 2c]), the registration
authority 16 provides the registration number generated by the registration
authority PC 15 to the user 11. The user 11 enters the registration number into the
user PC 12 where the registration routine checks to see whether the entered
registration number matches the calculated registration number. If the two
match, then a valid registration has taken place and access is provided by the
registration routine to a full operating version of the software protected by the
registration routine. If there is no match and a preference file (which stores the
user details) does not exist then a dialogue box D (FIG. 2c) appears on the display
13 of user PC 12 providing the prospective new user 11 with the opportunity to
check his/her details or switch to the demonstration version of the software
protected by the registration routine.
’216 patent at col. 7:36-50.
FIG. 2c graphically depicts this process, showing that when the IDs match, the full
version of the software is run. Conversely, if there is no match, the software is run on “Demo”
version:
6
Like Defendants’ construction, this description shows that there is a causal relationship between
the matching of local and remote licensee unique IDs and the valid registration of the software.
The Seventh Embodiment employs this same approach, but describes it in somewhat
different language: “When mode switcher 68 verifies the match, then the mode switcher 68
allows execution on platform 31 of the full user program 39.” ’216 patent at col. 11:63-65.
Defendants’ construction aligns precisely with the specification’s description of the claimed
invention.
Moreover, during the original prosecution of its application, Uniloc explicitly argued that
its invention was distinguishable over the prior art because the simple matching of the local
licensee unique ID (LUID) with the remote licensee unique ID (RUID) caused the activation. In
contrast, the prior art provided for matching, but also had to take into account additional
information added by the remote computer before use of the software was permitted:
Because additional information is added at the remote computer in Grundy, it
follows automatically that a simple comparison or match of the registration code
derived from the local computer and the authorization code derived from the
remote computer is not possible. … Accordingly, Claim 1 of the present
application which requires a match of the local license[e] unique ID with the
remote licensee unique ID is patentably distinguished over the fundamentally
more complex process outlined in Grundy.
’216 file history, Amendment in Response to June 24, 1994 Office Action (dated Dec. 21, 1994)2
at pp. 4-5 (UNI000129-130).
Uniloc itself recognizes that the ’216 patent “describes a system and method for software
activation” in which “[t]he LUID and RUID are compared and if they match, the system will
allow full, unrestricted use of the software.” OB at pp. 1-2. Accordingly, this term should be
construed so as to be consistent with the specification and the prosecution history to mean that
2
A copy of which is submitted herewith as Exhibit 2.
7
when the local and remote licensee unique IDs match, then the use of the digital data permitted.
2.
Clarification Is Necessary in Light of Uniloc’s Infringement Contentions.
Uniloc does not assert that Defendants’ construction is incorrect. Rather, it says that it is
“unnecessary.” OB at pp. 13-14. Yet Uniloc’s infringement contentions as to Defendant Intuit
demonstrate that there is a fundamental dispute between the parties regarding the scope of the
claim term. Uniloc’s contentions state that the “permits use … only if” limitation is satisfied in
circumstances where there is no causal relationship between the matching and the subsequent
permitted use. Instead, all that Uniloc’s infringement contentions state is that “[i]f the two
identifier [sic] (i.e., licensee unique IDs) match, this indicates that the unique licensee
information is legitimate.” See e.g., Exhibit A to Declaration of Hector J. Ribera in Support of
Defendants’ Responsive Brief on Claim Construction, (Uniloc Preliminary Infringement
Contentions, Ex. A: U.S. Patent No. 5,490,216 v. Intuit, at p. 11).
The claims of the ’216 patent at issue here, however, are not about matching to determine
if licensee unique IDs are “legitimate.” Rather, the patent teaches that when the licensee unique
IDs match, “then a valid registration has taken place and access is provided by the registration
routine to a full operating version of the software protected by the registration routine.” ’216
patent at col. 7:43-45. One of the benefits of such a system may be ensuring that the same
details entered by the user are those entered in the remote registration system (see, e.g., id. at col.
7:61-64), but that does not mean Uniloc can eliminate the causal relationship between matching
and providing access and thereby read out the “permits use … only if” limitation. There is
nothing in the ’216 patent that suggests determining “legitimacy” of a licensee unique ID
“permits use” of the software. Simply stated, the ’216 patent does not support the broader scope
of this term that Uniloc apparently intends to pursue for infringement purposes.
8
Uniloc’s refusal to agree to Defendants’ proposed construction provides a clear indication
that it intends to argue to the jury infringement based on a supposed “ordinary meaning” that is
inconsistent with the specification’s disclosure. If, as Uniloc alleges, Defendants’ proposed
construction is nothing more than a rearrangement of the same words (see OB at pp. 13-14), then
Uniloc should have no objection to the adoption of Defendants’ proposal. Yet it has opposed
Defendants’ proposed construction without providing an alternative. Thus, the parties have a
real dispute as to the scope of this claim limitation which should be resolved by the Court. See
O2 Micro Int’l, 521 F.3d at 1362-63 (holding that “[w]hen the parties present a fundamental
dispute regarding the scope of a claim term, it is the court’s duty to resolve it.”).
In the context of the ’216 patent specification, the “permits use … only if” limitation
means that when there is a match between the local and remote licensee unique IDs, then the use
of said digital data is permitted. Uniloc should not be allowed to make arguments to the jury
inconsistent with this construction. Moreover, having failed to even propose an alternative
construction for this term and simply requested that the Court not construe the term, Uniloc
should be precluded from advancing any new proposed construction at this late stage. Therefore,
Defendants request that the Court adopt their proposed construction.
B.
Reexamination Disclaimer: The Licensee Unique ID/Security Key Cannot
Be Generated by a Checksum, Summation Algorithm, Summer, or
Equivalents Thereof, Used to Test Data Integrity (All Asserted Claims)3
In its Opening Brief, Uniloc acknowledges that express disclaimers made to the PTO in
order to overcome prior art rejections are limiting. During the reexamination of the ’216 patent,
the PTO rejected all of the claims in light of the Hellman and Grundy prior art references. To
overcome these rejections, Uniloc made explicit and repeated statements to the PTO regarding
3
As noted above, and contrary to Uniloc’s assertions, all Defendants join in this position.
9
what its claims did and did not cover. While Uniloc now tries to avoid the impact of these
statements by calling them “explanations” rather than “disclaimers,” there is no such distinction
in the patent law. The reality is that Uniloc’s repeated assertions made to overcome the
rejections, whether or not they were “explanations” – and whether or not they were made as part
of a discussion of how two prior art references could work together – operate as disclaimers.
Uniloc’s disclaimers during the reexamination were clear and unmistakable. Uniloc
argued that Grundy does not disclose a feature required in all claims of the patent – i.e., “a
unique identifier associated with a licensee.” Uniloc repeatedly stated that a “checksum” cannot
be a unique identifier associated with a licensee because, inter alia, “a checksum cannot
preserve the uniqueness of the input data,” and thus, “is not a generator of unique identifiers.”
Uniloc’s responses to the PTO’s rejections, including supporting presentation material and two
expert declarations, are replete with similar statements (set forth below) that unequivocally
disclaim checksums.
Faced with these explicit and unconditional statements as to what the claims of the
’216 patent do not cover, Uniloc essentially concedes in its Opening Brief that it disclaimed
checksums. Uniloc argues, however, that any such disclaimer should be limited to “checksum
algorithms such as the one shown in Grundy.” OB at p. 21. Tellingly, Uniloc offers no proposed
language of its own as to the proper scope of the disclaimer. As shown below, Defendants’
proposed disclaimer – that “the licensee unique ID/security key cannot be generated by a
checksum, summation algorithm, summer, or equivalent thereof, used to test data integrity” –
is in fact narrowly tailored to the subject matter clearly and unequivocally disclaimed by Uniloc.
10
1.
Uniloc Clearly Disavowed Checksums From the Scope of the ’216 Patent
In its response to the first office action rejecting all claims of the ’216 patent in light of
Hellman and Grundy, Uniloc first emphasized that each claim of the patent requires “a unique
identifier associated with a licensee”:
The invention implements a unique identifier that is associated with a licensee
as a means for licensing execution (or controlling use) of software to (or by) an
intended licensee. This feature is present in each of the independent claims.
For example, in independent claims 1, 19 and 20, this feature is a “licensee unique
ID.” In claim 12 this feature is a “security key.” In claim 17 this feature is a
“registration key” and an “enabling key.”4
Reply to First Office Action, filed Nov. 29, 2010,5 p. 17 (UNI075102).
Next, Uniloc repeatedly told the PTO that a checksum did not provide this required
feature, as a checksum cannot be, or generate, a “unique identifier that is associated with a
licensee”:
[A] checksum is not unique and therefore cannot be a unique identifier
associated with a licensee.
Id., p. 33 (UNI075118).
Therefore, a checksum cannot preserve the uniqueness of the input data.
Grundy shows the input data to the checksum routine in Fig. 2, 212, “ENTER
NEW USER DETAILS.” This is “new user data, such as the user’s name,
address and telephone number” (Grundy at 12:37-38.) Such data might take up
roughly a hundred bytes of data. A checksum of this data would not preserve its
uniqueness; many different sets of user data could produce the same checksum.
Therefore the checksum is not a generator of unique identifiers.
Id., p. 27 (UNI075112).
[A] checksum cannot preserve the uniqueness of the input data and thus the
checksum is not a generator of unique identifiers.
4
In addition, Uniloc notified the examiner that the district court in Uniloc USA, Inc. et al. v. Microsoft Corp., Case
No. 03-440 (D.R.I.) also construed the terms “licensee unique ID,” “security key,” “registration key,” and “enabling
key” to mean “a unique identifier associated with a licensee,” and that this construction had been affirmed by the
Federal Circuit. Reply to Office Action, filed Nov. 29, 2010.
5
A copy of which is submitted herewith as Exhibit 3.
11
Id., p. 32 (UNI075117).
Uniloc continued making similar statements in its response to the second office action:
Uniloc also argued that Grundy’s checksum did not generate “a licensee unique
ID” because Grundy’s checksum algorithm, by its very nature, destroys any
uniqueness.
Reply to Second Office Action, filed Mar. 18, 2011,6 p. 16 (UNI075203).
However, if these references are combined as the Examiner suggests, with
Grundy’s error-checking checksum replacing Hellman’s cryptographic function
generator, the Examiner can no longer take credit for the ‘uniqueness’ feature
provided by Hellman because the source of that uniqueness, the one-way
compressive hash function having a 100:1 X/Y bit ratio, would also be replaced
by Grundy’s checksum.
Id., p. 34 (UNI075221).
The basis for this determination was that the Requester attempted to rely on
Grundy’s checksums; and, according to the Office, Grundy’s “[c]hecksums are
not unique fields, even if there [sic] are at least in part derived from unique
data.”
Id., p. 43 (UNI075230). These statements and numerous others that Uniloc made in order to
overcome prior art rejections and obtain its patent, compel a finding that the claims are limited
by Defendants’ proposed disclaimer. See generally Exhibits 3 and 4.
Uniloc now attempts to hide its explicit disclaimer behind the guise of “correcting the
Examiner’s technical misunderstanding of the prior art” and explaining why the algorithms
disclosed in one prior art reference could not be combined with another. Uniloc cherry-picks
quotes to make it appear that its efforts in reexamination were focused on picayune distinctions
having to do with the purpose for which checksums were used in particular prior art references.
But that is not all Uniloc was doing. Instead, as the excerpts quoted above reveal, in an effort to
save its patent, Uniloc represented that (1) the claims require something that checksum
algorithms, by virtue of being checksum algorithms, cannot create; and (2) checksum algorithms,
6
A copy of which is submitted herewith as Exhibit 4.
12
by virtue of being checksum algorithms used to test data integrity, cannot generate a unique
identifier associated with a licensee. The effect of this unequivocal disavowal was to limit the
claims to exclude checksums.
That this disavowal was clear and unmistakable is further confirmed by the Examiner.
He relied on Uniloc’s repeated and express disclaimers stating, inter alia:
The Patent Owner has persuasively argued that the summation disclosed in
Grundy is used in the context of merely verifying the correctness of information
related to the user and is not being used to generate an ID per se. Since the
information is not being used for the same purpose, one skilled in the art therefore
would not use the algorithm of Grundy as part of the generation of the claimed
licensee unique ID.
Notice of Intent to Issue Ex Parte Reexamination Certificate (“NIIRC”),7 at p. 6 (UNI076155).
2.
Defendants’ Proposed Disclaimer Is Narrowly Tailored to the Subject
Matter Disavowed by Uniloc
With little other choice, Uniloc essentially admits that it disclaimed checksums, but
focuses on the scope of the proposed disclaimer:
Assuming, arguendo, that the Defendants are correct that some of Uniloc’s
statements about Grundy amount to a disclaimer, at most such an alleged
“disclaimer” should only apply to checksum algorithms such as the one shown in
Grundy and not summation algorithms in general “used to test data integrity” as
urged by Defendants.”
OB at p. 21.
Uniloc attests that the proposed disclaimer is vague and goes too far, arguing that the
’216 patent teaches that the local unique ID (“LUID”) generating means and remote unique ID
(“RUID”) generating means “act as a test of data integrity because if the inputs are not identical
the outputs would not match.” Id. at pp. 22-23.
7
A copy of which is submitted herewith as Exhibit 5.
13
Uniloc’s argument is a red-herring. “Data integrity” is a well-understood term to those of
skill in the art. Indeed, Uniloc’s definition of “checksum” in its Opening Brief conveys the
meaning of “data integrity.” According to Uniloc itself, a checksum is:
[A] calculated value that is used to test data integrity. Errors can occur when
data is transmitted or when it is written to disk. One means of detecting such
errors is use of a checksum, a value calculated for a given chunk of data by
sequentially combining all the bytes of data with a series of arithmetic or logical
operations. After the data is transmitted or stored, a new checksum can be
calculated (using the possibly faulty transmitted or stored data) and compared
with the original one. If the checksums don’t match, an error occurred, and the
data should be transmitted or stored again; if they do match, the transmission
or storage was probably error-free.
Id. at p. 7; Declaration of Dr. Udo W. Pooch Under 37 C.F.R. § 1.132,8 ¶ 37 (UNI075650).
In contrast, the summation algorithm described in the ’216 patent is not being used to
check for data integrity (e.g., to check data after a transmission or storage operation). The ’216
patent teaches that a user who chooses to register software is prompted to enter unique, personal
information of the user – such as name, address, and a credit card number. This information is
passed to a registration number algorithm (i.e., a summation algorithm) which generates the
LUID. The user conveys the same information to a remote registration center which generates
an RUID using the same registration number algorithm. If the LUID and RUID match, the
software becomes registered. In other words, the ’216 patent algorithm is concerned with
creation of an identifier (the LUID) that will become a unique and permanent value for
continuously securing access to the software. This is not the same as merely checking accuracy
of data after transmission or storage. Uniloc’s statement that it did not “disclaim the use of
checksums or algorithms used to test data integrity to generate licensee unique IDs” is thus
8
A copy of which is submitted herewith as Exhibit 6.
14
inaccurate– “testing data integrity” and “generating licensee unique IDs” are different and
largely unrelated functions.
In short, as Uniloc repeatedly argued in attempting to overcome Grundy, and as the PTO
recognized, a checksum (or summation) algorithm used for “merely verifying the correctness of
information” (i.e., to ensure data integrity) does not and cannot generate a licensee unique ID.
See supra at section IV.B.1.
Defendants’ proposed disclaimer adopts the very definition of “checksum” that Uniloc
itself expressly propounded – both during the reexamination in order to overcome the prior art
and in its Opening Brief: “A calculated value used to test data integrity.” If anything,
Defendants’ proposed disclaimer is more limited than Uniloc’s actual disclaimer because it
specifies “checksum, summation algorithm, summer, or equivalent thereof, used to test data
integrity” as opposed to any algorithm used to calculate a value.
Despite the clarity, extent and unambiguous nature of its disclaimer, Uniloc also seeks to
change its scope by arguing that the phrase “used to test data integrity” creates a subjective test.
OB at p. 23. This argument lacks merit. As reflected above, determining whether a checksum,
summation algorithm, summer, or equivalent is used to test data integrity is an objective inquiry
that asks what the algorithm does, and has nothing to do with the state of mind of the
programmer.
Lastly, Uniloc argues that Defendants’ proposed disclaimer would alter the Federal
Circuit’s findings “to conclude that MD5 hash values may infringe under some circumstances
but not others.” OB at p. 23. Uniloc’s argument incorrectly assumes that the Federal Circuit
found that an MD5 hash value must be an LUID in all instances, regardless of its inputs or what
it is used to do. That is demonstrably wrong. In Microsoft, the MD5 hash value calculated on
15
the client was compared to the MD5 hash value calculated on the server, and “if they match, the
software product is activated.” Uniloc USA, Inc. v. Microsoft Corp., 632 F.3d 1292, 1299 (Fed.
Cir. 2011) (“Uniloc II”). Thus, the MD5 algorithm in that case was used to determine whether to
activate the software, not to test data integrity. There is nothing in that finding that says that all
uses of an MD5 hash must infringe. Moreover, now that Uniloc has disclaimed checksums, an
MD5 hash used as a checksum to test data integrity cannot possibly constitute infringement.
Given the clear, repeated, and unmistakable statements by Uniloc that “a checksum is not unique
and therefore cannot be a unique identifier associated with a licensee,” the proposed disclaimer
does not contradict any findings made by the Federal Circuit.
C.
Additional Reexamination Disclaimer: The licensee unique ID generated by
the means recited in each of the claims must be derived from at least one
piece of information that is specific to the user, such as name, billing
information, or product information unique to the installation entered by the
user. The information cannot be specific to the computer or independently
generated by the computer (All Asserted Claims)9
During the reexamination, Uniloc repeatedly distinguished its invention from that
disclosed in the Hellman reference by stating that (1) the licensee unique IDs in the ’216 patent
had to be derived from at least one piece of information that is specific to the user, and (2) none
of the inputs to the hash algorithm disclosed in Hellman satisfies that requirement. The
Examiner expressly relied upon these statements in confirming the patentability of the claims of
the ’216 patent.
1.
Uniloc’s Disclaimer Was Clear and Unequivocal.
Uniloc’s disclaimer of claim scope over the Hellman reference was clear and
unequivocal. Uniloc argued that Hellman does not disclose a feature required in all claims of the
9
Defendants Aspyr Media, Inc., Borland Software Corp., Digital River, Inc., GEAR Software, Inc. and GEAR
Software Holdings, Inc. (the “Group B” defendants) join in this position. They seek this disclaimer in addition to
the disclaimer discussed in the prior section. The disclaimers are directed to different aspects of the claims, and this
Court should adopt both. No Defendants joining this brief oppose this position.
16
patent – i.e., “a unique identifier associated with a licensee.” Uniloc argued that the registration
code generated by the hash algorithm of Hellman cannot be a unique identifier associated with a
licensee because, inter alia, “none of the input signals to Hellman’s cryptographic function
generator 38 (or 23)—namely, K (or SK), N, R, and H—are unique to a licensee and therefore
cannot disclose the ‘local licensee unique ID’ of claim 1.” See, e.g., Exhibit 3 (Reply to First
Office Action, filed Nov. 29, 2010), at p. 21 (UNI07106).
Uniloc repeated this argument throughout its responses to the PTO and throughout the
expert declarations submitted on its behalf. These statements conclusively establish two points.
First, an input that is “unique to a licensee” is required to output a licensee unique ID. Second,
the inputs of Hellman cannot be used to output a licensee unique ID. Uniloc has therefore
disclaimed the inputs disclosed in Hellman as unique to a licensee. The examiner explicitly
relied on Uniloc’s disclaimer of Hellman’s inputs in the Notice of Intent to Issue Ex Parte
Reexamination Certificate (“NIIRC”). The Court should adopt the Examiner’s articulation of
Uniloc’s disclaimer as set forth in the NIIRC:
The licensee unique ID generated by the means recited in each of the claims must
be derived from at least [one] piece of information that is specific to the user, such
as name, billing information, or product information unique to the instantiation
entered by the user. The information cannot be specific to the computer or
independently generated by the computer.
Exhibit 5 (NIIRC) at p. 5 (UNI076154).
2.
The Scope of Uniloc’s Disclaimer Is an Issue for the Court to Decide as a
Matter of Claim Construction.
Claim construction is, of course, an issue for the Court, and the extent of Uniloc’s
disclaimer is one of claim scope. Schindler Elevator Corp. v. Otis Elevator Co., 593 F.3d 1275,
1285 (Fed. Cir. 2010) (stating that disclaimer is disavowal of “any claim interpretation that
would effectively eliminate the limitation or that would otherwise recapture the claim’s original
17
scope”); Parallel Networks, LLC v. Abercrombie & Fitch, No. 6:10cv111, 2011 WL 3609292, at
*5 (E.D. Tex. Aug. 12, 2011) (Davis, J.) (Markman Order) (concluding that patentee disavowed
claim scope when distinguishing prior art to the examiner). Because Uniloc disclaimed certain
inputs to a generating means as not being associated with a user, the parties should not have to
argue to the jury whether these disclaimed inputs are associated with a user.
The construction of “licensee unique ID” from the Microsoft case is not sufficient to
apprise the jury of the proper scope of the asserted claims of the ’216 patent. That
construction—“a unique identifier associated with a licensee”—does not by itself indicate what
types of inputs are required in order for the identifier to be associated with a licensee. Since
originally articulated in the Microsoft case, this construction has been narrowed by the Federal
Circuit and by Uniloc. The jury in this case should be instructed in accordance with this
narrowing.
Moreover, Uniloc agrees with the examiner’s characterization of the disclaimed inputs as
not specific to the user. OB at p. 25 (describing “Federal Circuit’s observation that [the licensee
unique ID] cannot be derived solely from” “information ‘specific to the computer or
independently generated by the computer’”) (emphasis in original). Given this basic agreement
regarding the disclaimed claim scope, the only reason Uniloc would oppose instructing the jury
on the disclaimer is that Uniloc intends to do exactly what the doctrine of prosecution disclaimer
forbids.
The Court should inform the jury (1) that a licensee unique ID or licensee unique ID
generating means requires at least one input that is associated with a licensee and (2) that certain
inputs are not associated with a licensee.
18
3.
An Input That Is “Unique to a Licensee” Is Required to Output a Licensee
Unique ID.
The output of a local or remote licensee unique ID generating means cannot be a licensee
unique ID unless an input to the generating means is unique to a licensee. Each of the Federal
Circuit, the Examiner during reexamination, and Uniloc has recognized that a licensee unique ID
can only be generated from particular kinds of inputs to the generating means.
In Uniloc USA, Inc. v. Microsoft Corp., 290 Fed. Appx. 337 (Fed. Cir. 2008) (“Uniloc
I”), the Federal Circuit affirmed the construction of licensee unique ID as “a unique identifier
associated with a licensee.” Uniloc I, 290 Fed. Appx. at 344. As Uniloc recognizes in its brief,
the Federal Circuit went on to state that inputs that are solely platform-related cannot be used to
output a licensee unique ID: “Microsoft is, however, correct that the licensee unique ID cannot
be based solely on platform-related user information.” Id. at 343. Thus, at least some “nonplatform-related unique user information [is] needed to generate the [licensee unique ID].” Id. at
344.
During reexamination, Uniloc relied on the Federal Circuit’s construction in Uniloc I to
argue that “there must be some input to the means for generating the claimed ‘licensee unique
ID’ that characterizes the intended user.” Exhibit 4 (Reply to Second Office Action, filed
Mar. 18, 2011), at pp. 14-15 (UNI075201-202). Uniloc went on to rely on both the plain
language of the claims and the specification of the ’216 patent to support its argument that an
input that is unique to a licensee must be used to generate a licensee unique ID:
The claim term on its face suggests that the ID be generated with some input that
is unique to an intended licensee. … That is, there must be some input to the
generating means capable of making the resulting “licensee unique ID”
uniquely associated with an intended licensee.
The specification is also clear in this regard—the “licensee unique ID” must be
generated from some information that is unique to the intended licensee. … To
generate a licensee unique ID, there must therefore be some input into the
19
generating means that is uniquely associated with the intended licensee. Absent
such input, the ID could not be uniquely associated with an intended licensee.
Id. at p. 19 (UNI075206); see also Ex Parte Reexamination Interview Summary, mailed on
Nov. 19, 201010 at slide 26 (UNI075062) (quoting ’216 patent specification stating that the
algorithm provides a unique registration number if the inputs to the algorithm are unique and
stating that information unique to the user is passed through the algorithm) (“Interview
Summary”).
In view of Uniloc’s clear disclaimer of any ID generated without an input unique to the
intended licensee, Uniloc’s opening brief contains two statements that are demonstrably wrong.
First, the Federal Circuit has not “said that hash values produced by an MD5 hash algorithm
satisfy the licensee unique ID requirement.” See OB at p. 23. To the contrary, the Uniloc I
decision expressly holds that an MD5 hash algorithm that receives solely platform-related user
information cannot generate a licensee unique ID. 290 Fed.Appx. at 343. Second, Defendants’
proposed disclaimer does not erroneously limit the information which can be used to generate a
licensee unique ID. See OB at p. 14. As set forth above, Uniloc itself argued during the
reexamination – extensively and unequivocally – that “information that is unique to the intended
licensee” must be used to generate a licensee unique ID.
4.
The Inputs Disclosed by Hellman Cannot Be Used to Output a Licensee
Unique ID.
Consistent with its arguments that a licensee unique ID requires an input that is unique to
the user, Uniloc’s primary argument for distinguishing the ’216 patent over Hellman during the
reexamination was that none of Hellman’s inputs is unique to a user. This disclaimer of claim
10
A copy of which is submitted herewith as Exhibit 7.
20
scope is broader than the claim scope at issue in the Microsoft litigation, and the Court should
address this issue on claim construction.
In Uniloc II, the Federal Circuit analyzed the ’216 patent’s validity over the Hellman
reference. Hellman discloses a system “which generates an authorization code from the
following inputs: ‘a secret key identifier of the computer embodied in the hardware (SK), a
random or nonrepeating number (R), the serial number, the software package name (H), the
number of uses (N), and user billing information.’” Uniloc II, 632 F.3d at 1322 (citation
omitted).
Microsoft argued that Hellman disclosed a licensee unique ID because SK and R were
associated with the user. Id. Conversely, Uniloc argued that SK and R were platform-related
because they were generated by the user’s computer. Id. The Federal Circuit agreed with Uniloc
and concluded that because SK and R were generated by the user’s computer, these inputs
identified the machine rather than the user. Id. at 1323. In addition, the court stated: “The ‘user
billing information’ in [Hellman] is not an input into the hash function and is thus irrelevant in
determining whether [Hellman] discloses the ‘licensee unique ID’ and ‘licensee unique ID
generating means’ elements of the ’216 patent.” Id. at 1322 n.3. The Federal Circuit did not
address whether the software package name (H) or the number of uses (N) were sufficiently
associated with the user to be used to generate a licensee unique ID.
During the reexamination, however, Uniloc made abundantly clear that none of the inputs
disclosed in Hellman identified a user and that none of them could be used to generate a licensee
unique ID. From the very first examiner interview, Uniloc argued that the main difference
between the ’216 patent and the cited prior art is that the prior art did not disclose a licensee
unique ID “based on information unique to the user.” Exhibit 7 (Interview Summary) at slide 22
21
(UNI075058); see also id. at slide 33 (UNI075069) (titled “Hellman Does Not Disclose a
Licensee Unique ID” (emphasis in original) and quoting Professor Hellman’s trial testimony that
Hellman reference does not disclose use of user information). Slide 34 from the Interview
Summary, shown below, clearly articulates Uniloc’s arguments that none of inputs to Hellman’s
cryptographic function are associated with the licensee:
See also id. at slide 35 (UNI075071).
In its response to the first office action rejecting all claims of the ’216 patent in light of
Hellman and Grundy, Uniloc repeatedly asserted that Hellman did not disclose a “unique
identifier that is associated with a licensee”:
Rather than describe any unique identifier that is associated with an intended
licensee, Hellman instead describes a “method and apparatus in which use of the
software can be authorized for a particular base unit a specific number of times.”
Exhibit 3 (Reply to First Office Action, filed Nov. 29, 2010), p. 17 (UNI075102) (quoting
Hellman 4:38-40).
22
As described more fully below, the “request” and “authorization” are based upon
information regarding the desired software program to be authorized, the number
of uses the software package is to be authorized, a non-unique random number,
and a serial number unique to the computer base unit. Therefore, Hellman fails to
teach or suggest a unique identifier that is associated with a licensee.
Id., p. 18 (UNI075103).
However, as discussed next, none of the input signals to Hellman's cryptographic
function generator 38 (or 23) – namely, K (or SK), N, R and H – are unique to a
licensee and therefore cannot disclose the “local licensee unique ID” of claim 1.
Id., p. 21 (UNI075106).
Uniloc went on to describe each of Hellman’s inputs and explain why each input was not
uniquely associated with a user. Thus, in addition to the base unit (K) and the random number
(R) discussed by the Federal Circuit, none of Hellman’s inputs can be used to generate a licensee
unique ID.
Nor are inputs H [sic N], R or H. Hellman discloses that the next input “N” is
“the number of additional uses of software requested.” Like K, N is not
uniquely associated with an intended licensee. The next input “R” is “a random
number.” A random number is not uniquely associated with an intended licensee.
The next input “H” is “used as an ‘abbreviation’ or name for describing the
software package 21,” where “any two software packages with the same H
value are considered equivalent.” (Hellman, 5:65 - 6:45.) Input “H,” like N
and R, is also not uniquely associated with an intended licensee.
In sum, the signals representing K, N, R, and H are applied as inputs to
cryptographic function generator 38 which generates a check value C as an output
signal. None of these signals are uniquely associated with the licensee and the
resulting value C therefore cannot be equated to the claimed “licensee unique
ID” of independent claim 1. (Rosenblatt Dec., ¶¶ 36-47.)
Id., pp. 22-23 (UNI075107-108).
Uniloc’s discussion of the Secret Key (SK) in the remote cryptographic function
generator is particularly instructive:
The remaining input signal, SK, is “obtained from authorization and billing unit’s
table of serial numbers and secret keys.” (Hellman 7:1-2.) SK is a base unit’s
secret key where “[a]uthorization and billing unit 13 contains a memory 18
having a table of serial numbers and secret keys which allows authorization
23
and billing unit 13 to determine a based unit’s secret key, SK, from knowledge
of the base unit's public serial number.” (See, Hellman 6:19-21.) (See,
Rosenblatt Dec., ¶ 38.) SK is therefore not uniquely associated with an intended
licensee.
Id., p. 24 (UNI075109). Thus, even though the vendor associates the base unit serial number
with the secret key in a table on the remote authorization and billing unit, this secret key is not
uniquely associated with a user.
In its response to the second office action, Uniloc continued to distinguish Hellman on
the grounds that each of its inputs, including the number of software uses requested (N) and the
software package name (H), is not uniquely associated with the user.
Nor is any user specific information input to Hellman’s cryptographic function
generators that generate A and C. ([See, Hellman FIG. 2; 6:16-30; 7:6-13; FIG. 7;
and 10:14-32.]) Indeed, Hellman explicitly states that authorization A is not
associated with a user, but rather is base unit (e.g., a personal computer)
specific. (Hellman, 12:1-9.)
Exhibit 4 (Reply to Second Office Action, filed Mar. 18, 2011), p. 11 (UNI075198).
Hellman’s main deficiency [is] that it does not use any information uniquely
associated with an intended licensee to generate its authorization A (or check
value C).
Id., p. 12 (UNI075199).
Hellman’s cryptographic function generator receives no input that is uniquely
associated with the intended licensee. (Rosenblatt, ¶¶ 38-39.) Hellman’s
authorization A and check value C are limited to identification of the base unit
or the platform on which the software is to be run. (Hellman, 12:5-8.)
Id., p. 19-20 (UNI075206-207).
[T]he billing information is not used to generate the authorization and check
values (A and C, respectively) in Hellman.
...
There is no input into Hellman’s cryptographic function that is uniquely
associated with an intended licensee. (Rosenblatt, ¶¶ 38-39.)
Id., p. 20 (UNI075207).
24
As shown in the excerpts above, Uniloc relied on the Declaration of William R.
Rosenblatt under 37 C.F.R. §1.132, filed Nov. 29, 2010, to distinguish Hellman. Mr. Rosenblatt
also concluded that the hash function disclosed in Hellman could not generate a licensee unique
ID because none of the Hellman inputs to the hash function is unique to a licensee.
38. First, regarding Hellman and “licensee ID generation”: the process in
Hellman cited by the examiner above shows that the “check value C” (Hellman at
10: 17), which the Examiner equates to LUID, is generated from four inputs,
designated as K, N, R, and H. Of these: K is a key to a cryptographic function,
which is an indicium of the computer on which the software is intended to be run.
N is the number of usages of the software requested by the user (see Hellman at
5:65-66); R is a random number (Hellman at 5:66); H is an indicium of the
software package being authorized for use (Hellman at 6:31-35), which is
computed by means of a hash function. A hash function produces a value that
serves as a mathematical “shorthand” for some data that has properties described
appropriately in Hellman at 6:38-61, including that it is efficient to calculate and
store.
39. None of these four inputs is an indicium of the licensee of the software, i.e.,
the user intending to run the software on the computer. Therefore Hellman does
not teach “licensee ID generation.”
Declaration of William R. Rosenblatt under 37 C.F.R. §1.132,11 filed Nov. 29, 2010, ¶¶ 38, 39
(UNI076172) (emphasis in original).
5.
The NIIRC Appropriately Articulates the Scope of Uniloc’s Disclaimer.
The Examiner’s reliance on Uniloc’s disclaimers during reexamination is important
intrinsic evidence for construing the scope of the claims of the ’216 patent. See ACCO Brands,
Inc. v. Micro Sec. Devices, Inc., 346 F.3d 1075, 1078-1079 (Fed. Cir. 2003) (construing claim in
accordance with Reasons for Allowance where Examiner and applicant had same understanding
of claim scope); Gussin v. Nintendo of Am., Inc., 62 F.3d 1433, 1995 WL 460566, at *5 & n.3
11
A copy of which is submitted herewith as Exhibit 8.
25
(Fed. Cir. Aug. 3, 1995) (same).12 In the NIIRC, the examiner synthesized the Federal Circuit’s
construction of licensee unique ID with Uniloc’s reexamination disclaimers.
The Federal Circuit’s construction eschewed IDs generated solely from platform-related
information, such as information generated by the user’s computer, but recognized the possibility
of vendor-supplied information as a permissible input. Uniloc disclaimed the inputs disclosed in
Hellman, as well as any ID generated without inputs that are uniquely associated with a user.
The Court should do likewise and adopt the following disclaimer applicable to all claims:
The licensee unique ID generated by the means recited in each of the claims must
be derived from at least [one] piece of information that is specific to the user, such
as name, billing information, or product information unique to the instantiation
entered by the user. The information cannot be specific to the computer or
independently generated by the computer.
V.
CONCLUSION
For the foregoing reasons Defendants request that their proposed construction be adopted
by the Court and that the Court adopt the proposed disclaimers applicable to all claims.
Dated: September 26, 2011
Respectfully submitted,
/s/ Mark A. Flagel
(with permission by Michael E. Jones)
Michael E. Jones
State Bar No. 10929400
Allen F. Gardner
State Bar No. 24043679
POTTER MINTON
A Professional Corporation
110 N. College, Suite 500 (75702)
Tyler, Texas 75702
(903) 597-8311
(903) 593-0846 (Facsimile)
12
In addition to ACCO Brands, which supports rather than contradicts defendants’ reliance on the NIIRC, Uniloc
asserts that reference to the NIIRC is improper under Inverness Medical Switzerland v. Princeton Biomeditech
Corp., 309 F.3d 1365, 1372-73 (Fed. Cir. 2002). But Inverness says nothing about the general applicability of a
Reasons for Allowance to claim construction. Rather, Inverness rejected the appellee’s reliance on the Reasons for
Allowance because “[t]he examiner’s statement, however, contradicts the appellee’s position.” Id. at 1373.
26
mikejones@potterminton.com
allengardner@potterminton.com
Mark A. Flagel
Yury Kapgan
Dale Chang
LATHAM &WATKINS LLP
355 S. Grand Avenue
Los Angeles, CA 90071-1560
Tel: (213) 485-1234
Fax: (213) 891-8763
mark.flagel@lw.com
yury.kapgan@lw.com
dale.chang@lw.com
Dean G. Dunlavey
LATHAM &WATKINS LLP
650 Town Center Drive, 20th Floor
Costa Mesa, CA 92626-1925
Tel: (714) 540-1235
Fax: (714) 755-8290
dean.dunlavey@lw.com
ATTORNEYS FOR DEFENDANTS AND
COUNTERCLAIM-PLAINTIFFS SYMANTEC
CORPORATION
By: /s/ Charles D. Huston, with permission by
Michael E. Jones
Charles D. Huston
State Bar No. 10328950
Stacy L. Zoern
State Bar No. 24051565
DAFFER MCDANIEL, LLP
700 Lavaca Street, Suite 720
Austin, TX 78701
Tel. (512) 476-1400
Fax (512) 703-1250
ATTORNEYS FOR PERVASIVE
SOFTWARE INC.
By: /s/ Melissa Richards Smith, with permission by
Michael E. Jones
Melissa Richards Smith
TX Bar No. 24001351
27
GILLAM & SMITH, L.L.P.
303 South Washington Avenue
Marshall, Texas 75670
Telephone: (903) 934-8450
Facsimile: (903) 934-9257
Email: melissa@gillamsmithlaw.com
MORRISON & FOERSTER LLP
Michael A. Jacobs (CA Bar No. 111664)
425 Market Street
San Francisco, California 94105
Telephone: (415) 268-7000
Facsimile: (415) 268-7522
E-mail: mjacobs@mofo.com
MORRISON & FOERSTER LLP
Rudy Y. Kim (CA Bar No. 199426)
Christopher F. Jeu (TX Bar No. 24050823)
755 Page Mill Road
Palo Alto, California 94304
Telephone: (650) 813-5600
Facsimile: (650) 494-0792
E-mail: rudykim@mofo.com
E-mail: cjeu@mofo.com
Attorneys for Defendant FILEMAKER, INC
CERTIFICATE OF SERVICE
The undersigned hereby certifies that all counsel of record who are deemed to have
consented to electronic service are being served with a copy of this document via the Court’s
CM/ECF system per Local Rule CV-5(a)(3) on September 26, 2011.
/s/ Michael E. Jones
28
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?