Blue Spike, LLC v. Huawei Technologies Co., Ltd.

Filing 194

MEMORANDUM OPINION AND ORDER. The Court adopts the constructions as set forth in this Order. Signed by Judge Robert W. Schroeder, III on 05/16/16. (mll, )

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS TYLER DIVISION BLUE SPIKE, LLC, Plaintiff, vs. HUAWEI TECHNOLOGIES CO., LTD, ET AL, Defendants. § § § § § § § § § § CASE NO. 6:13-cv-00679-RWS LEAD CASE MEMORANDUM OPINION AND ORDER This Memorandum Opinion construes the disputed claim terms in United States Patent No. 5,745,569 (“the ’569 Patent”) asserted by Plaintiff Blue Spike, LLC (“Blue Spike”). On February 11, 2016, the parties presented oral arguments on the disputed claim terms at a Markman hearing. For the reasons stated below, the court ADOPTS the following constructions. BACKGROUND The ’569 Patent relates to technology for the protection of computer code copyrights by including “digital watermarks” in the code. ’569 Patent Abstract. Through such digital watermark techniques, “while an application program can be copied in an uninhibited manner, only the licensed user having the license code” can operate the program. Id. The patent describes that in typical programs, certain code resources contain the countermeasures that prevent the unauthorized use of the program and that these resources typically remain in a fixed position. ’569 Patent 7:30–41. However, a skilled hacker could take a “snap-shot” of the code in memory and determine which code resources comprise the countermeasures and then disable those countermeasures. ’569 Patent at 7:41–44. The techniques disclosed in the ‘569 Patent randomly reorganize program memory structure intermittently. ’569 Patent at 2:21–22. The parties discuss this in the context of “shuffling” the memory. Docket No. 143 at 1; Docket No. 148 at 18. Through shuffling, attempts to capture memory by a hacker can be made more difficult. This reorganization prevents attempts at capturing code for analysis which may be used to eliminate licensing information. ’569 Patent at 2:23–32. The only disputed terms appear in Claim 16, which reads in its entirety: A method for copy protecting a software application executed by a computer system, the software application including a plurality of executable code resources loaded in a memory of the computer system, said method comprising the steps of: determining an address within the memory of the computer system associated with each of the plurality of executable code resources; and intermittently relocating each of the plurality of executable code resources to a different address within the memory of the computer during execution of the software application. ’569 Patent at 9–20. APPLICABLE LAW “It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to which the patentee is entitled the right to exclude.’ ” Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (quoting Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). The Court examines a patent’s intrinsic evidence to define the patented invention’s scope. Id. at 1313–1314; Bell Atl. Network Servs., Inc. v. Covad Commc’ns Group, Inc., 262 F.3d 1258, 1267 (Fed. Cir. 2001). Intrinsic evidence includes the claims, the rest of the specification and the prosecution history. Phillips, 415 F.3d at 1312–13; Page 2 of 13 Bell Atl. Network Servs., 262 F.3d at 1267. The Court gives claim terms their ordinary and customary meaning as understood by one of ordinary skill in the art at the time of the invention. Phillips, 415 F.3d at 1312–13; Alloc, Inc. v. Int’l Trade Comm’n, 342 F.3d 1361, 1368 (Fed. Cir. 2003). Claim language guides the Court’s construction of claim terms. Phillips, 415 F.3d at 1314. “[T]he context in which a term is used in the asserted claim can be highly instructive.” Id. Other claims, asserted and unasserted, can provide additional instruction because “terms are normally used consistently throughout the patent.” Id. Differences among claims, such as additional limitations in dependent claims, can provide further guidance. Id. “[C]laims ‘must be read in view of the specification, of which they are a part.’ ” Id. (quoting Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995)). “[T]he specification ‘is always highly relevant to the claim construction analysis. Usually, it is dispositive; it is the single best guide to the meaning of a disputed term.’ ” Id. (quoting Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teleflex, Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1325 (Fed. Cir. 2002). In the specification, a patentee may define his own terms, give a claim term a different meaning that it would otherwise possess, or disclaim or disavow some claim scope. Phillips, 415 F.3d at 1316. Although the Court generally presumes terms possess their ordinary meaning, this presumption can be overcome by statements of clear disclaimer. See SciMed Life Sys., Inc. v. Advanced Cardiovascular Sys., Inc., 242 F.3d 1337, 1343–44 (Fed. Cir. 2001). This presumption does not arise when the patentee acts as his own lexicographer. See Irdeto Access, Inc. v. EchoStar Satellite Corp., 383 F.3d 1295, 1301 (Fed. Cir. 2004). Page 3 of 13 The specification may also resolve ambiguous claim terms “where the ordinary and accustomed meaning of the words used in the claims lack sufficient clarity to permit the scope of the claim to be ascertained from the words alone.” Teleflex, Inc., 299 F.3d at 1325. For example, “[a] claim interpretation that excludes a preferred embodiment from the scope of the claim ‘is rarely, if ever, correct.’ ” Globetrotter Software, Inc. v. Elam Computer Group Inc., 362 F.3d 1367, 1381 (Fed. Cir. 2004) (quoting Vitronics Corp., 90 F.3d at 1583). But, “[a]lthough the specification may aid the court in interpreting the meaning of disputed language in the claims, particular embodiments and examples appearing in the specification will not generally be read into the claims.” Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 1988); see also Phillips, 415 F.3d at 1323. Although “less significant than the intrinsic record in determining the legally operative meaning of claim language,” the Court may rely on extrinsic evidence to “shed useful light on the relevant art.” Phillips, 415 F.3d at 1317 (quotation omitted). Technical dictionaries and treatises may help the Court understand the underlying technology and the manner in which one skilled in the art might use claim terms, but such sources may also provide overly broad definitions or may not be indicative of how terms are used in the patent. Id. at 1318. Similarly, expert testimony may aid the Court in determining the particular meaning of a term in the pertinent field, but “conclusory, unsupported assertions by experts as to the definition of a claim term are not useful.” Id. Generally, extrinsic evidence is “less reliable than the patent and its prosecution history in determining how to read claim terms.” Id. Page 4 of 13 I. Claim Construction of Disputed Terms 1. “copy protecting a software application” (’569 Patent, claim 16) Blue Spike’s Proposed Construction Plain and ordinary meaning Defendants’ Proposed Construction “protecting software from unauthorized copying” The parties’ dispute over this term was narrowed during the briefing and hearing. Blue Spike, relying on the specification, contends that the term would be understood by a person of ordinary skill in the art to include protecting against unauthorized copying, use, unintended use, tampering, attempts at memory capture, object code analysis, unintended modification, and attacks at disabling the system. Docket No. 174 at 5:4–8 (relying on the ’569 Patent at 2:23–32, 3:37–40, 7:16–17). Defendants respond that without construction, a juror could interpret this term to be about general computer security, rather than limiting the invention to aspects of preventing unauthorized copying and use of unauthorized copies. Docket No. 174 at 8:4–21 Given the confusion that the parties had in understanding scope of the term, jurors likely will have similar difficulty, and a construction is warranted. At the hearing, the parties agreed to the construction “protecting a software application from unauthorized copying or the use of unauthorized copies.” Docket No. 174 at 10:22–11:1. Accordingly, the Court construes “copy protecting a software application” as “protecting a software application from unauthorized copying or the use of unauthorized copies.” 2. “during execution of the software application” (’569 Patent, claim 16) Blue Spike’s Proposed Construction Plain and ordinary meaning Defendants’ Proposed Construction “while the software application is running after it has been loaded” The dispute is whether executing software is limited to running the software program (as Defendants argue) or whether executing software can include loading of software program as Page 5 of 13 well (as Blue Spike argues). Defendants argue claim 16 distinguishes between “loading” in the preamble and “executing” in the body. Docket No. 148 at 20. Defendants rely on the preamble to show that the software application is first loaded, and only then the code resources are intermittently relocated during execution of the software. Id. at 20–21. Defendants also argue the specification treats loading and executing differently. Id. at 21 (relying on ’569 Patent at 7:30–34, to argue that the “invention sought to rearrange code resources while the application was running, i.e. during execution time as opposed to system time”). Finally, Defendants cite to extrinsic evidence for the general proposition that loading and executing are separate and that software programs must first be loaded into memory before execution. Id. at 22. To show the difference between execution and loading, Defendants provided an example of launching an app on one’s phone, and then moving that app to the background. Docket No. 174 at 17:20–18:4. Defendants argue that when the app is idle, then it is not running. Id. at 17:17–19 (“In the background there may be a few things happening, but there's no actual execution happening at that point. And then you flip to your active app, and that's the one that's executing.”). Blue Spike argues for the plain and ordinary meaning, relying on the Fifth Edition of the Microsoft Computer Dictionary (2002) for the proposition that “execution implies loading machine code of the program into memory and then performing the instructions.” Docket No. 143 at 11, Ex. 3. Blue Spike also criticizes Defendants for “unnecessarily limit[ing] the term ‘execution’ to exclude the loading phase of execution.” Id. At the hearing, Blue Spike argued that execution should include loading time, and offered the example of double-clicking on a program, which leads to the operating system both loading and executing the program. “THE COURT: So just -- just loading the program without running the program would be encompassed within ‘execution of the software application’? MR. Page 6 of 13 ANDERSON: That's right, Your Honor. Once you click on and execute the software, it loads and then it -- and executes. And so loading is necessarily a part of the execution phase.”). Docket No. 174 at 12:11–24. Defendants are correct that the ’569 Patent treats loading and executing differently, that loading precedes execution, and that the code resources are intermittently relocated during software execution. For example, loading is the act of “transfer[ring] a program from a storage device into a computer’s memory” and executing is “run[ning] a program, carry[ing] out a command, or peform[ing] a function.” Docket No. 148, Ex. D, Dictionary of Computer Words, Am. Heritage Dictionaries Revised Ed., at 94, 160 (1995). However, the claim does not require that loading be completed before a program is executed. Likewise, the ’569 Patent does not exclude “idle” time from “execution time.” That is, referring to Defendants’ app example, just because the application is in the background or waiting for an input from a user does not necessarily mean the app is not executing. As acknowledged by Defendants, there may still be “a few things happening.” Docket No. 174 at 18:1–4. As long as the app has started to perform instructions, it could potentially read onto this term. Accordingly, the Court construes “during execution of the software application” as “while the software application is running.” 3. “intermittently relocating” (’569 Patent, claim 16) Blue Spike’s Proposed Construction Plain and ordinary meaning Defendants’ Proposed Construction “intentionally shuffling at random or pseudorandom intervals” Blue Spike contends that both “intermittently” and “relocating” are readily understood by one of skill in the art. Docket No. 143 at 10. Blue Spike relies on the Oxford Dictionary’s definition of “intermittent” as being “not continuous or steady.” Id. at 9. Blue Spike submits Page 7 of 13 this conforms to Claim 16 which requires the location of a code resource in memory to be determined and then the code resource is “intermittently” relocated to a different location in memory. Id. Blue Spike also argues that Defendants improperly rely upon a single passage of the specification. See ’569 Patent at 8:4–5 (stating that a memory scheduler “can be called periodically, or at random or pseudo-random intervals”). According to Blue Spike, this is an example of how code resources may be intermittently shuffled and there is no indication the inventors intended to limit their invention by those terms. Docket No. 143 at 10. Defendants argue that Blue Spike has failed to identify what the plain and ordinary meaning is. Defendants contend that in prosecution, the examiner questioned what was meant by “intermittently relocating” and, the patentee responded: Applicants respectfully direct the Examiner’s attention to the disclosure at [Col.8:1-19] of the Specification, which describes an embodiment of the present invention wherein the code resources are “shuffled” in memory at periodic, random or pseudo-random intervals. See also [Col. 3:38-41 of the] Specification, (“Attempts to tamper or ‘patch’ substitute code resources can be made highly difficult by randomizing the location of said resources in memory on an intermittent basis . . .”). Given the foregoing, the Applicant respectfully submits that the language of claim[] 28 would be clear to a person of ordinary skill in the art. Docket No. 148 Ex. K, Response to Office Action dated June 26, 1997 at 7. Defendants argue that the patentee, therefore, relied upon the specific portions of the specification to articulate the meaning of the term. Defendants also contend their construction is consistent with an object of the invention that is intended to prevent someone from copying a “snapshot” of the code located in memory by “intentional shuffling” code resources during execution time at “random or pseudo-random intervals”. Docket No. 148 at 19 (citing ’569 Patent at 7:41–44). This also conforms to the specification statement: Page 8 of 13 Under the present invention, the application contains a special code resource which knows about all the other code resources in memory. During execution time, this special code resource, called a “memory scheduler,” can be called periodically, or at random or pseudo random intervals, at which time it intentionally shuffles the other code resources randomly in memory, so that someone trying to analyze snapshots of memory at various intervals cannot be sure if they are looking at the same code or organization from one “break” to the next. ’569 Patent at 8:1–10. As to the prosecution history, Blue Spike notes that the citation states “the code resources are ‘shuffled’ in memory at periodic, random or pseudo-random intervals.” Docket No. 148 Ex. K, Response to Office Action dated June 26, 1997 at 7. Blue Spike argues that the key portion of the passage and the larger passage do not include “intentional,” and Defendants have failed to include in their construction the word “periodic” which is in the passage. At the hearing, it became clear that the primary dispute is whether the code resources must be shuffled more than a single time. Docket No. 174 at 24:8–25:3 and 25:15–18. Looking at the cited prosecution history and specification, there is no clear disclaimer or disavowal that excludes a single shuffle. See Home Diagnostics, Inc. v. LifeScan, Inc., 381 F.3d 1352, 1358 (Fed.Cir.2004) (“Absent a clear disavowal in the specification or the prosecution history, the patentee is entitled to the full scope of its claim language.”). However, the prosecution history does show that “intermittently relocating” has some inherent ambiguity. The patentee addressed that ambiguity by stating the term means “ ‘shuffled’ in memory at periodic, random or pseudorandom intervals.” Docket No. 148 Ex. K, Response to Office Action dated June 26, 1997 at 7. The patentee’s statement could include multiple shuffles but does not necessarily exclude a single shuffle. For example, a shuffle at a random time would be consistent with the patentee’s statement. Defendants further clarified that “intentional” does not require user initiated relocating or shuffling, addressing Blue Spike’s concern on this point. Docket No. 148 at 19. Page 9 of 13 Accordingly, the Court construes “intermittently relocating” as “intentionally shuffling at periodic, random or pseudo-random intervals.” 4. “a software application” ( ’569 Patent, claim 16) Blue Spike’s Proposed Construction Plain and ordinary meaning Defendants’ Proposed Construction “a software program run by an operating system” The parties dispute whether an operating system is a software application. Blue Spike argues that the specification treats the terms “computer program” and “software application” as synonymous. Docket No. 143 at 5 (relying on ’569 Patent, at 3:44–45). According to Blue Spike, this means that operating systems, which no one disputes is an executable computer program, is also a software application. Id. Defendants argue that the patentee used the term “software application” in claim 16, but used the more broad term “computer software” in claim 1. Docket No. 148 at 10. Defendants submit that because “different words or phrases used in separate claims are presumed to have different meanings, the term ‘software application’ cannot encompass all ‘computer software’ as Blue Spike contends.” Docket No. 148 at 10. Defendants also rely on the specification’s disparate treatment of “application code” and “operating system code” to show that “software application” does not encompass operating systems. Docket No. 148 at 11 (citing ’569 Patent at 7:30–34, stating that system time is when the “operating system code, not application code, is running”). The ’569 Patent distinguishes between “application” and “operating system.” 7:30-34, 8:1-4 (and to a lesser extent all of 8:1–11). It also distinguishes between “software applications” and “computer software.” ’569 Patent 8:30 (claim 1 preamble stating “a method for copy protection of computer software”) and 10:9 (claim 16 preamble stating “a method for copy protecting a software application”). Considering the Patent as a whole, it is more accurate to say Page 10 of 13 that the intrinsic record treats applications as a subset of a computer programs rather than equating the two. See Phillips, 415 F.3d at 1314 (the specification is usually “the single best guide to the meaning of a disputed term”). This reading is also consistent with the extrinsic sources cited by both parties. Despite the flaws in these sources—Blue Spike’s citation to a dictionary that predates the patent by 17 years and Defendant’s citation to dictionaries that are several years after the patent was issued—the sources show that though operating systems and software applications are related, operating systems are used to facilitate running software applications. See, e.g., Docket No. 174 at 35:21–36:7 (citing to a 1972 IBM Reference Library that applications are distinct from operating systems); Docket No. 148-7 Ex. G, Douglas A. Downing, Michael A. Covington, Melody Mauldin Covington, Dictionary of Computer and Internet Terms, 22 (Barron’s Educational Series, Inc., 6th ed. 1998) (contrasting applications programs to operating systems); Ex. H, Microsoft Computer Dictionary 378 (Microsoft Press 5th ed. 2002) (“The operating system is the foundation software on which applications depend.”). Accordingly, the Court construes “software application” as “a software program run by an operating system.” 5. “a plurality of executable code resources” / “executable code resources” (’569 Patent, claim 16) Blue Spike’s Proposed Construction Plain and ordinary meaning Defendants’ Proposed Construction “(a plurality of) compiled, indivisible functions or procedures of the software application” At the hearing, the Court proposed “a plurality of one or more compiled functions or procedures.” Defendants agreed to this proposed construction as given. Blue Spike agreed with this construction with a minor change. Blue Spike requested that the Court only construe the term “executable code resources” (as opposed to “a plurality of executable code resources”) to mean “one or more compiled functions or procedures.” Docket No. 174 at 37:4–15. That way, Page 11 of 13 according to Blue Spike, the word “plurality” remains in the claim language rather than in the Court’s construction. The parties do not dispute the ultimate meaning of this term, but only disagree on what would be the least ambiguous to a jury. See Docket No. 174 at 37:20–38:2, 38:21–39:14. The term “plurality” appears in the claim, is readily understood by a jury, and not subject to any dispute from the parties. It does not need to be construed. Accordingly, the Court construes “executable code resources” as “one or more compiled functions or procedures.” 6. “a computer system” / “the computer” (’569 Patent, claim 16) Blue Spike’s Proposed Construction Plain. and ordinary meaning Defendants’ Proposed Construction No construction necessary At the hearing, the parties resolved their primary dispute concerning this term. Docket No. 174 at 39:23–40:2 (Defendants stating they believe the term does encompass the types of devices listed in the specification at 5:31–39). The parties further agreed to the following: “no construction necessary, plain and ordinary meaning.” Accordingly, for “a computer system” / “the computer,” the Court will note “no construction necessary, plain and ordinary meaning.” SIGNED this 16th day of May, 2016. ____________________________________ ROBERT W. SCHROEDER III UNITED STATES DISTRICT JUDGE Page 12 of 13 APPENDIX A United States Patent Number 5,745,569: Claim Term “copy protecting a software application” claim 16 “during execution of the software application” claim 16 “intermittently relocating” claim 16 “a software application” claim 16 “executable code resources” claim 16 “a computer system” / “the computer” claim 16 Court’s Construction “protecting a software application from unauthorized copying or the use of unauthorized copies” “while the software application is running” “intentionally shuffling at periodic, random or pseudo-random intervals” “a software program run by an operating system” “one or more compiled functions or procedures” no construction necessary, plain and ordinary meaning Page 13 of 13

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?