TecSec, Incorporated v. International Business Machines Corporation et al

Filing 879

MEMORANDUM OPINION re: Adobe Systems Inc.'s Motion for Summary Judgment, (Dkt. No. 864), and Motion to Strike Portions of the Declaration of Mark Jones, (Dkt. No. 871). Signed by District Judge Liam O'Grady on 05/23/17. (pmil, )

Download PDF
IE 1 r J MAY 23 2017 IN THE UNITED STATES DISTRICT COUR||p FOR THE EASTERN DISTRICT OF VIRC Alexandria Division n'\ i i ..J Tecsec, Inc., Ai FXANDRIA.V:' 3iN;A Plaintiff, Civil Action No. 1:10-cv-l 15 Hon. Liam O'Grady V. Hon. Theresa Buchanan Adobe Systems Inc., et al. Defendants. MEMORANDUM OPINION This matter comes before the Court on Defendant Adobe Systems Inc.'s Motion for Summary Judgment, (Dkt. No. 864), and Motion to Strike portions ofthe Declaration ofMark Jones. (Dkt. No. 871). Defendant seeks judgment as amatter oflaw that Plaintiff's asserted claims are invalid under 35 U.S.C. § 101. For the reasons discussed below, the Court DENIES the Motions. I. Background^ Plaintiff TecSec, Inc. accuses the Defendant of infringing onfour ofPlaintiffs related patents: U.S. Patent Nos. 5,369,702 (the "'702 Patent"); 5,680,452 (the "'452 Patent"); 5,717,755 (the "'755 Patent"); and 5,898,781 (the "'781 Patent") (collectively, the "DCOM Patents"). The DCOM Patents articulate a multi-level encryption method and system that allows encrypted files to be nested within other encrypted files. See Dkt. No. 869, Exh. 1("'702 Patent") at4:25-28. "In addition to multi-level encryption, the DCOM Patents further limit ^The history ofthis case is well known to the parties and well-articulated in the prior decisions ofthe Court and the Federal Circuit Court ofAppeals. See, e.g., TecSec, Inc. v. Adobe Sys. Inc., 658 F. App'x 570, 572-75 (Fed. Cir. 2016) (^'TecSec IF). Accordingly, the Court limits its background to the issue presented in the present Motion. 1 access by using labels inthe form ofa field ofcharacters attached tothe encrypted files." Dkt. No. 869, at 11. The parties agree that claims 1and 8 inthe '702Patent are representative of the asserted method and system claims, respectively, for purposes of an analysis under 35 U.S.C. § 101. Claim 1 of the '702 Patent describes: A method for providing multi-level multimedia security in a datanetwork, comprising the steps of: A) accessing an object-oriented key manager; B) selecting an object to encrypt; C) selecting a label for the object; D) selecting an encryption algorithm; E) encrypting the object according to the encryption algorithm; F) labellmg the encrypted object; G) reading the object label; H) determining access authorization based on the object label; and I) decrypting the objectif access authorization is granted. '702 Patent at 12:1. Claim 8 of the '702 Patent describes: A system for providing multi-level multimedia security in a datanetwork, comprising: A) digital logic means, the digital logic means comprising: 1) a system memory means for storing data; 2) an encryption algorithm module, comprising logic for converting unencrypted objects into encrypted objects,the encryption algoritto module being electronically connected to the system memory means for accessing data stored in the first system memory; 3) an objectlabelling subsystem, comprising logic means for limiting object access, subject to label conditions, the object labelling subsystem being electronicallyconnected to the system memory means for accessing data stored in the system memory means and the object labelling subsystem being further electronically connected to the encryption algorithm module to accept inputs from the encryption algorithm module; 4) a decryption algorithm module, comprising logic for converting encrypted objects into unencrypted objects, the decryption algorithm module being electronically connected to the system memory means for accessing data storedin the system memory means; and 5) an object label identification subsystem, comprising logic for limiting object access, subject to label conditions, the object label identification subsystem being electronically connected to the system memory means for accessing datastored in the system memory means and the object label identification subsystem being further electronically connected to the decryption algorithm module to accept inputs from the decryption algorithm module; B) the encryption algorithm module working inconjunction with the object labelling subsystem to create anencrypted object such that the object label identification subsystem limits access to an encrypted object. '702 Patent at 12:8. The matter has been extensively litigated before this Court and the Court ofAppeals for the Federal Circuit. Through these appeals, many ofthe claims inthe representative patents have been construed. In 2013, the Federal Circuit Court of Appeals construed a number of theterms inthe context ofa 35 U.S.C. § 112 challenge. TecSec, Inc. v. Int'lBus. Mack Corp., 731 F.3d 1336 (2013) CTecSec F). The Federal Circuit construed the terms "multi-level multimedia security", "system memory means", "digital logic means", as well as other "means-plusfimction" terms. Id. at 1344-1350. With respect to the "means" terms, theFederal Circuit found that § 112 was not implicated because the "[t]he defendants have failed to show by clear and convincing evidence that the #702 Patent specification fails to disclose corresponding structure for the fourteen computer-implemented means-plus-fimction limitations." Id. at 1349. Rather, the "specification disclose[d] the specific software products and how to use those products to implement the claimed functions[.]" Id Rejecting the notion that the examples amounted to "black box" software disclosures, the Federal Circuit found that "the examples here provide detailed prose that shows how the specific software products operate to implement the claimed functions." Id. In2016, the Federal Circuit construed a number ofadditional terms inthe representative patents in an appeal from the district court's grant ofsummary judgment on non-infiingement. TecSec, Inc. v. Adobe Systems Inc., 658 Fed. App'x 570 (2016) Q^'TecSec IF). The Fourth Circuit construed terms for "selecting alabel", "label", and "object-oriented key manager".^ The Federal Circuit determined that "'selecting a label for the object' inthe DCOM patents should be given its plain meaning, without arequirement that the label exist prior to being selected." Id. at 578. The Federal Circuit construed the word "label" consistent withthe express definition of that term set forth inthe specification ofthe '702 Patent. Id. at 579. Further, the Federal Circuit found that "[t]he district court's construction of'label,' with which we agree, isbroad enough to encompass a label which identifies different classes or groups ofusers authorized to access the object." Id. at 580. TheFederal Circuit also "construe[d] the term 'object-oriented key manager' to mean 'a software component that manages the encryption ofan object by performing one ormore ofthe fimctions ofgenerating, distributing, changing, replacing, storing, checking on, and destroying cryptographic keys.'" Id. at 582. The Federal Circuit rejected Defendant-Appellee's argument that it did not infnnge the "object-oriented key manager." Id. The court found that it could not "conclude as a matter of law that Adobe is entitled to summaryjudgment of non-infringement" because "Adobe's Acrobat products include a security handler inthe form ofa software module ^The Federal Circuitdid not disturb the districtcourt's construction of "object","accessauthorization", or "display header". which implements various aspects ofthe encryption process and controls access to the contents of encrypted documents." Id. Following the Federal Circuits remand tothis Court in TecSec //, Defendant moved under 35 U.S.C. § 101 for a finding that the DCOM Patents are directed to impermissibly abstract subject matter, do not contain an inventive concept, and are therefore invalid as a matter oflaw. II. Legal Standard 35 U.S.C. § 101, states that "[w]hoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvements thereof, may obtain a patent therefor, subject tothe conditions and requirements ofthis title." Courts have read this provision to contain implicit exceptions for abstract ideas, laws ofnature, and natural phenomena. Alice Corp. Pty. Ltd. v. CLS Bank Int'l, 134 S.Ct. 2347,2354 (2014) (citation omitted). These three exceptions are the "basic tools ofscientific and technological work... [and] monopolization ofthose tools through the grant ofa patent might tend to impede innovation more than it would tend to promote it..." Id. (quoting Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S. Ct. 1289,1293 (2012)). The § 101 eligibility inquiry proceeds intwo steps. Id. at 2355. First, the court determines whether the patents at issue are directed to an abstract idea, law ofnature, ornatural phenomenon. Id. Ifthey are not directed to one ofthese excepted classes ofsubject matter, the inquiry ends. Id. Iftheir focus ison one ofthese categories, however, the court proceeds to the second step, where it "consider[s] the elements ofeach claim both individually and asanordered combinationto detennine whether the additional elements provide an 'inventive concept' that ensures the patent "in practice amounts to significantly more than a patent upon the [abstract idea] itself." Id. (quotations and citations omitted). Ifthe claims do not sufficiently narrow the scope ofthe patent by providing this "inventive concept," then the patent is rendered ineligible. Id. Patent eligibility under 35 U.S.C. § 101 is a question of law. OIP Techs., Inc. v. Amazon.com, Inc., lU F.3d 1359,1362 (Fed. Cir. 2015). Patent eligibility may be decided on a motion for summary judgment. See, e.g., Elec. Power Grp., LLC v. Alstom S.A., 830 F.3d 1350 (Fed. Cir. 2016) (affirming grant ofsummary judgment on § 101 eligibility determination). A "plausible claim for relief ina patent infringement case necessarily requires a valid patent. [Without one,] there can be no infringement." Intellectual Ventures I LLC v. Erie Indem. Co., No. 2:14-CV-220, 2016 WL4147300, at *3 (W.D. Pa. Aug. 4, 2016) (citing In re Bilski, 545 F. 3d 943, 851 (Fed. Cir. 2008), aff'dsub nom Bilski v. Kappos, 561 U.S. 593 (2010)). HI. Discussion For the reasons discussed below, the Courtfinds that the DCOM Patents are not directed to an abstract idea, lawof nature, or natural phenomenon. Thisfinding ends the § 101 analysis and merits judgment in favor of the Plaintiff. See Alice, 134 S.Ct. at 2354 (2014). Defendant contends that the claims of the DCOM Patents recite functions, such as encrypting/decrypting, labelling, embedding, and determining access authorization, along with generic computing and programming components. InDefendant's view "the claims are disembodied from any particular, letalone new, manner of achieving theresults of these functions." Dkt. No. 865 at 15. Specifically, Defendant argues that multi-level.,. security" term, as construed bythe Federal Circuit, impermissibly provides no restriction onhow the result ofthatsecurity and nesting of files is accomplished. Id. Defendant also argues thattheclaims fail to specify how labels are selected, applied, or how the"object-oriented key manager" performs itsfunctions. Id. at 17. Defendant highlights that thedistrict court previously remarked that theDCOM Patents are "exceptionally broad, and provide little detail regarding how a person ofordinary skill inthe art would implement the claimed invention." Dkt. No. 772 at 12 n. 10. Finally, Defendant argues that the claims are not targeted to a computer-specific problem. Rather, they are analogous to placing a document in two different sealed envelopes in order to produce multi-level security. Plaintiff counters thatDefendant has grossly generalized theDCOM Patents. Plaintiff contends that the express language ofthe claims, the detailed specification, and the Federal Circuit's claim constructions evince the specific and concrete nature of the DCOM Patents. Specifically, Plaintiffavers that the DCOM Patents describe a specific way ofperforming encryption and the nesting ofmultiple encryptions which is both patent-eligible and not addressed by prior art. Furthermore, Plaintiffnotes that the DCOM Patents do not preempt the entire field of managing objects using multiple levels of encryption. Rather, the DCOM Patents include limitations such as the use of an "object-oriented keymanager." Plaintiffargues that there are other ways to achieve multiple levels of encryption without resort to the method represented in the DCOM Patents. The Court recently conducted a detailed § 101 analysis in Virginia Innovation Scis. Inc. V. Amazon.com, Inc.,2017 WL 64147, at *1 (E.D. Va. Jan. 5, 2017). In that case, the Court found that a family ofpatents that cover a method, system, and apparatus for transferring video signals firom a network to a mobile device and then converting those signals ina manner that allows them to be reproduced onan "alternative display terminal" were notdirected to patent- eligible subject matter. Id. The Court noted that "[ajrticulating the scope ofa patent's subject matter is not a precise science. Courts must becareful not to overgeneralize claims because, 'if carried to its extreme, [itwould make] all inventions un-patentable because all inventions can be reduced to underlying principles of nature.'" Id. at *5 (quoting Diamond v. Diehr, 450 U.S. 175, 189 n.l2 (1981)). TheCourt further observed that"courts have held repeatedly that a patentholder 'must do morethan merely show... an unconventional idea,they must show an unconventional embodiment of that idea.'" Id. at *8 (quotingNetflix, Inc. v. Rovi Corp., 114 F.Supp.Sd 927, 940 (N.D. Cal. 2015), affd'^o. 2015-1917, Fed.Appx. , 2016 WL 6575091 at *1 (Fed. Cir. Nov. 7,2016) (emphasis in original)). Finally, the Court recognized that"[p]reemption is the touchstone of the § 101 inquiry." Id. The Court applied these principles and found thatthe family of patents in Virginia Innovation Sciences was targeted to an abstract idea. The Court reasoned that because the "claims encompass every mobile telephone, every video signal received bythat phone, and every HD display terminal sold onthe market" they impermissibly preempted anentire field ofideas. Id. at *10. Furthermore, the Court found thatthe patents were not targeted to an inherently digital fimction: "One could imagine performing the same function through a projection or magnification device." Id. Thus, the patents amounted to"performing abstract ideas ina digital medium ratherthan creating solutions to computer-centric problems." Id. By contrast, Plaintiffhas adequately pleaded inthis case that the patents create a solution to a computer-centric problem which isnot addressed by the prior art. Despite Defendant's assertions, theclaims are not reducible to putting a sealed envelope (single-level encryption) into a second sealed envelope (multi-level encryption) for extra security. Rather, theclaims provide a specific solution to implementing the multiple levels ofnested security through the "objectoriented key manager." They offer a solution to a problem, multiple users inmultiple locations accessing information atdifferent security levels from a central repository, which would not exist butfortheubiquity of computer technology. This difference distinguishes the DCOM Patents from the family ofpatents at issue in Virginia Innovation Sciences which the Court found analogous to physical projection or magnification. See Virginia Innovation Scis. Inc., 2017 WL 64147, at *10 (finding patents invalid which "are akin to performing abstract ideas in adigital medium rather than creating solutions to computer-centric problems."). With respect to preemption, the DCOM Patents are again readily distinguishable from the overbroad patents in Virginia Innovation Sciences. There, the holder ofthe patent offered no information about the specific flmctions ofthe terminal toconvert digital information from one medium to another. Thus, the broad language ofthepatent swept up"[p]ast, present, and future models" ofthe idea. Id. Here, Plaintiff does not allege that their patents foreclose all forms of multi-level security. Rather, the DCOM Patents preempt systems which make use ofthe specific method ofan "object-oriented key manager." Defendant has also previously argued that the patent term does not preempt all multi-level encryption methods. Defendant represented to the Federal Circuitthat its Acrobat software did not infringe the "object-oriented key manager" term because "Acrobat does not store or distribute anykeys" in its multi-level encryption system. TecSec //, 658 Fed. App'x at 581. The Federal Circuitand district court claim construction reinforces the distinctions with Virginia Innovation Sciences. See Synopsys, Inc. v. Mentor Graphics Corp., 839 F.3d 1138, 1149 (Fed. Cir. 2016) ("The § 101 inquiry must focus on the language ofthe Asserted Claims themselves."). While the district court previously opined thattheDCOM Patents are "exceptionally broad, and provide little detail regarding how aperson ofordinary skill in the art would implement the claimed invention[,]" see Dkt. No. 772 at 12 n. 10, the Federal Circuit vacated and remanded that decision. See TecSec //, 658 F. App'x at 585. In the sameopinion, the Federal Circuitfound that fact issuesexistedas to whether Defendant's use of a software "security handler" to control the encryption process constituted an "object-oriented key manager" encryption system. Id. at 582. To reach this conclusion, the Federal Circuit not only had to construe "object-oriented key manager" in order to compare itto the technology employed by the Defendant, but also had to recognize that some, but not all, multi-level encryption methods could infringe the DCOM Patents. The Federal Circuit's findings in 2013 are stronger evidence still that theDCOM Patents are not abstract. In construing the claim limitations thatemploy the term "means" thecourt found that "the specification discloses the specific software products and how touse those products to implement the claimed fimctions ...." TecSec /, 731 F.3d at 1349.^ The Federal Circuit favorably cited three examples ofthe precise implementation ofthe "object-oriented key manager" software with respect to word-processing applications. Id The Court also rejected the argument that these examples only disclosed generic software. Rather, the Court found that "short ofproviding source code, it isdifficult to envision a more detailed disclosure" than the examples provided by the Plaintiff Id. The decisions ofthe Federal Circuit confirm that the DCOM Patents are addressed to a computer-specific problem. Furthermore, the particular method ofencryption identified in the patents is manifest in some computer application examples but does not foreclose the entire field ofcomputer encryption. For these reasons, the DCOM Patents are directed to an inventive concept and are not impermissibly abstract. Consequently, summary judgment pursuant to 35 U.S.C. § 101 is not warranted. ^While the relevant portion of TecSec I addressed indefiniteness pursuant to35 U.S.C. § 112, the analysis is germane to the § 101 inquuy. Pursuant to § 112, "[c]omputer-implemented means-plus-function claims are indefinite unless the specification discloses an algorithm toperform the flmction associated with the limitation." Noah Sys., 675 F.3d at 1319. [SJimply disclosing ablack box that performs the recited fimction "is not a sufficient explanation ofthe algorithm required to render the means-plus-fiinction term definite." Inre TLI Commc'm LLC Patent Litig., 87 F.Supp. 3d773, 800 (E.D. Va. 2015), qff*d, 823 F.3d 607 (Fed. Cir. 2016) (quoting ^«gwe, 755 F.3d at 1338). Similarly, this Court has held that a "black box" patent for video technology was abstract under § 101. See Virginia Innovation Scis. Inc., 2017 WL 64147, at *10. IV. Conclusion For the foregomg reasons, the Court DENIES the Motion for Summary Judgment. (Dkt. No. 864). The Court further DENIES Defendant's Motion to Strike portions ofthe Declaration of Mark Jones. (Dkt. No. 871). Liam O'Siady Ma)^S, 2017 Alexandria, Virginia United St^s District Judge

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?