LYLE E. STROM, Senior District Judge.
This matter is before the Court to construe patent claim terms pursuant to Markman v. Westview Instruments, Inc., 517 U.S. 370 (1996). Plaintiff Prism Technologies, LLC ("Prism") has alleged infringement of its patent, United States Patent No. 7,290,288 ("`288 Patent", Ex. 1, Filing No. 1), by defendants Adobe Systems, Incorporated, Autodesk, Inc., McAfee, Inc., National Instruments Corporation, Sage Software, Inc., Symantec Corp., and Trend Micro, Incorporated (collectively, "Defendants").
The `288 Patent, entitled "Method and System for Controlling Access, by an Authentication Server, to Protected Computer Resources Provided via an Internet Protocol Network," issued on October 30, 2007, from an application filed August 29, 2002. Prism contends that the `288 Patent is a continuation-in-part of another Prism patent, U.S. Patent No. 6,516,416 ("`416 Patent"), entitled "Subscription Access System for Use with an Untrusted Network," which issued on February 4, 2003, from an application filed June 11, 1997 (Ex. 6, Filing No.
The claims of the `416 Patent include several of the same terms whose construction is presently disputed in the `288 Patent. In previous litigation initiated in 2005 by Prism against other defendants (the "Delaware Case"), the United States District Court for the District of Delaware (the "Delaware Court") construed the term "hardware key" in the context of the `416 Patent to mean "external hardware device or object from which the predetermined digital identification can be read" (Prism Tech. LLC v. Verisign, Inc., No. 05-214-JJF, Filing No. 449 (D. Del. Apr. 2, 2007), Ex. 6, Filing No.
Prism appealed the Delaware Order, which the Federal Circuit affirmed without comment. Prism Tech. LLC v. Verisign, Inc., 263 F. App'x 878 (Fed. Cir. 2008). However, Prism did not appeal all of the claim constructions of the Delaware Order, and the constructions that it did appeal are not at issue in this case.
On April 6, 2007, Prism disclosed the Delaware Memorandum and the Delaware Order to the U.S. Patent and Trademark Office ("PTO") in connection with Prism's then pending application for the `288 Patent (Information Disclosure Statement, Ex. 17, Filing No.
Prism filed its complaint in the present action on June 8, 2010 (Filing No.
On April 11, 2011, the Court conducted the initial Markman hearing for the purpose of construing "hardware key." Subsequently, this Court construed "
(Filing No.
After another hearing with the parties on July 21, 2011, it was determined that the construction of "hardware key" did not dispose of the issues in the case and that other terms in the `288 Patent were still disputed. After the parties submitted claim construction briefs, the Court conducted a second Markman hearing on January 12, 2012, for the purpose of construing the additional disputed terms.
On January 20, 2012, after the second Markman hearing, the parties submitted a joint stipulation on claim construction, including an agreement as to the significance of claim preambles and as to the definitions of five claim terms (Filing No. 440). The Court will adopt the jointly stipulated agreement regarding the significance of the preambles and the construction of the five terms. The Court construes the eight remaining disputed terms as indicated herein.
"It is a `bedrock principle' of patent law that `the claims of a patent define the invention to which the patentee is entitled the right to exclude.'" Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (en banc) (quoting Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). In construing a claim term, the court must give each term its "ordinary and customary meaning, as [it] would be understood by one of ordinary skill in the art in question at the time of the invention." Intervet Inc. v. Merial Ltd., 617 F.3d 1282, 1287 (Fed. Cir. 2010) (citing Phillips, 415 F.3d at 1312-13).
"Because the meaning of a claim term as understood by persons of skill in the art is often not immediately apparent, and because patentees frequently use terms idiosyncratically, the court looks to `those sources available to the public that show what a person of skill in the art would have understood disputed claim language to mean.'" Phillips, 415 F.3d at 1314 (quoting Innova/Pure Water, 381 F.3d at 1116). "Sources available to the public" include: (1) the patent claims' words; (2) the remainder of the patent's specification; (3) the patent's prosecution history; and (4) extrinsic evidence pertaining to relevant scientific principles, such as a technical term's meaning and the state of the art. Phillips, 415 F.3d at 1314; Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996).
"First, we look to the words of the claims themselves, both asserted and nonasserted, to define the scope of the patented invention." Vitronics, 90 F.3d at 1582. "The written description part of the specification itself does not delimit the right to exclude. That is the function and purpose of claims." Markman v. Westview Instruments, Inc., 52 F.3d 967, 980 (Fed. Cir. 1995) aff'd, 517 U.S. 370 (1996).
Because claim terms are typically used consistently throughout a patent, a term's usage in one claim can provide insight to the meaning of the same term in another claim. Phillips, 415 F.3d at 1314. In addition, when "patents all derive from the same parent application and share many common terms, we must interpret the claims consistently across all asserted patents." NTP, Inc. v. Research in Motion, Ltd., 418 F.3d 1282, 1293 (Fed. Cir. 2005). "[W]e presume, unless otherwise compelled, that the same claim term in the same patent or related patents carries the same construed meaning." Omega Eng'g, Inc. v. Raytek Corp., 334 F.3d 1314, 1334 (Fed. Cir. 2003)
In addition to the language of the claims, the patent specification "`is always highly relevant to the claim construction analysis. Usually, it is dispositive; it is the single best guide to the meaning of a disputed term." Phillips, 415 F.3d at 1315 (quoting Vitronics, 90 F.3d at 1582). However, "[t]he longstanding difficulty is the contrasting nature of the axioms that (a) a claim must be read in view of the specification and (b) a court may not read a limitation into a claim from the specification." Innova, 381 F.3d at 1117. "[A]lthough the specification often describes very specific embodiments of the invention, we have repeatedly warned against confining the claims to those embodiments." Phillips, 415 F.3d at 1323.
"The court has broad power to look as a matter of law to the prosecution history of the patent in order to ascertain the true meaning of language used in the patent claims. . . ." Markman, 52 F.3d at 980. "This history contains the complete record of all the proceedings before the [PTO], including any express representations made by the applicant regarding the scope of the claims. As such, the record before the [PTO] is often of critical significance in determining the meaning of the claims." Vitronics, 90 F.3d at 1582.
The parties offer differing proposed constructions for the following terms. In arriving at a construction of each term, the Court looks first to the language of the claims themselves in the `288 Patent; second, to the specification of the `288 Patent; third, to the prosecution history, if applicable; and, finally, to relevant extrinsic evidence, if any.
Prism argues that its proposed construction of "digital identification" is correct because it is identical to the Delaware district court's construction of the same term in the `416 Patent. Prism also contends that its proposed construction is consistent with the `288 Patent's other intrinsic evidence. For example, none of the claims that include the term "digital identification" refers to an "account holder."
Meanwhile, Defendants point out that several embodiments listed in the `288 Patent specification identify an "account holder" who uses a hardware key that contains digital identification. However, Prism alleges that not all embodiments in the specification include such a description of an account holder. Prism argues that the claims must not be restricted by an embodiment listed in the specification when the embodiment "is by no means the only way in which the invention can be practiced" (Filing No.
Because some of the terms presently disputed were construed in the Delaware Case in the context of the parent `416 Patent, the Delaware Court's constructions are directly relevant. NTP, Inc., 418 F.3d at 1293. The Delaware district court construed the term "predetermined digital identification" exactly as Prism now proposes for the term "digital identification." (Delaware Order, at 2). Yet, Defendants quote Prism's descriptions of the `416 Patent, based on its specification, to support their contention that Prism itself previously argued to the Delaware Court that digital identification must uniquely identify an account holder (or user). But Defendants' quotations would appear to support Prism's contention that the digital identification need not identify an account holder, but is a more general term that could also identify a machine or a device: "The hardware key's main function is to uniquely identify a user (and/or a device) . . ." (Filing No.
The prosecution history also supports Prism's definition of "digital identification." During the prosecution of the `288 Patent, Prism provided the PTO with copies of the Delaware Memorandum and the Delaware Order, making those items part of the `288 Patent's prosecution history and making those items available to a person of skill in the art in question.
Notably, the defendants in the Delaware Case (none of whom are Defendants here) had proposed the following construction for "predetermined digital information:" "A data string that is preassigned and unique to the hardware key and that cannot be shared with other users" (Ex. 7, Filing No.
Defendants also argue that the Delaware Memorandum does not address the Delaware Court's construction per se, because "[t]he dispute between the parties in [the Delaware Case] concerning the digital identification was whether it had to be `known in advance' (the Defendants' position) or whether it could also be `calculated at the moment' (Prism's position)" (Filing No.
As this Court noted in its previous claim construction order regarding the term "hardware key," "given that the `288 Patent and `416 Patent are related patents sharing identical terms, the Delaware district court's . . . construction of `hardware key' lends substantial support to making an identical construction in this case" (Filing No.
The Delaware Court construed the term "`Identity Data' as it relates to the Subscriber Client Computer" in the `416 Patent to mean "data sufficient for the patented system to determine whether a person, organization, and/or computer is authentic and/or is entitle[d] to a[cc]ess said selected computer resources" (Delaware Order at 3). Prism "proposes that the Delaware construction . . . be adopted for the asserted claims of the `288 Patent as well, with only slight modification so that the construction comports with the language of the `288 claims (which refer to `protected resources' rather than `selected computer resources')" (Filing No.
Prism objects to Defendants' proposed construction because it states that "additional data (e.g., a username and/or a password)" is part of the identity data, in addition to the digital identification, which Prism states is not required by claim 1. However, Prism notes that "at least one of a username and a password" is included in claim 3, which is dependent on and differentiates claim 1 (Filing No.
As with the term "digital identification" above, the Court will not import the terms "account holder" and "uniquely" into the claim construction for "identity data." In addition, the Court declines to construe "identity data of [the] client computer device," because a construction of the term "identity data" will serve to construe the other phrases in which it appears. For the same reasons stated above with regard to "digital identification," the Court adopts substantially the same construction as construed in the Delaware Order. The Court construes
The term "authenticate" was construed in the Delaware Case to mean "determine that something is, in fact, what it purports to be" (Delaware Order, at 6). However, unlike "digital identification" and "identity data," for the term "authenticate," the Delaware Court accepted the joint stipulation of the parties as to the construction and did not discuss the construction beyond the fact of the stipulation (Delaware Memorandum, at 10).
As a result, Defendants state that "the Delaware court's adoption of a construction for the word "authenticating" is irrelevant because the parties
Prism urges the Court to adopt the grammatically correct counterpart of the construction in the Delaware Case for the term "authenticating." In addition, Prism urges the Court to decline to specifically define the remaining phrases wherein "authenticating" appears. Defendants prefer a separate construction for each of the phrases where the term "authenticating" appears, without a separate construction for the term "authenticating" by itself. As with "identity data," the Court declines to separately construe each of the phrases in which the word "authenticating" appears.
Prism objects to Defendants' proposed construction for two reasons. First of all, Prism states that Defendants "seek to improperly import the specification's language of identifying `account holders' into the claims, when the claims on their face clearly do not mention anything about `account holders'" (Filing No. 309, at 32). Defendants claim that their proposed construction is supported by the specification of the `288 Patent. Defendants claim that "the specification explains, `[t]he reader converts the biometric into a digital identification that is
Defendants also quote the specification as to the inventor's intent, where the words "account holders" appear, namely, "`[t]he
(Filing No.
In addition, Prism objects to the use of the word "match" as "unduly restrictive" because "it requires the system to determine whether the digital identification has perfect correspondence to a digital identification stored in the clearinghouse or authentication server" (Filing No.
Prism states that its proposed construction is supported by extrinsic evidence in the form of the IEEE Standard Dictionary of Electrical and Electronics Terms, which defines "authentication" as "`[t]he process of validating a user or process to verify that the user or process is not a counterfeit'" (Filing No.
After review of the parties' submissions, the Court finds that it has not been "otherwise compelled" to veer from the presumption that "the same claim term in the same patent or related patents carries the same construed meaning." Omega Eng'g, Inc., 334 F.3d at 1334. The Court finds that the intrinsic evidence justifies the adoption of Prism's proposed construction. Accordingly, the Court construes
The term "clearinghouse" was not construed in the Delaware Case. The parties agree that the clearinghouse controls "access to protected resources." However, the parties' proposed constructions have two major differences.
First, Defendants' construction proposes that the clearinghouse is independent of the server computer. In contrast, Prism claims that the clearinghouse is only independent in certain embodiments, such as that delineated in claim 6, which reads as follows: "The system of claim
Defendants point out that Prism's claim construction presumption "will be overcome by a contrary construction dictated by the written description or prosecution history." Retractable Techs., Inc. v. Becton, Dickinson & Co., 653 F.3d 1296, 1305 (Fed. Cir. 2011). First, Defendants cite Prism's own depiction of its invention, produced on page 10 of Prism's slide deck for its Power Point presentation during the 2012 Markman hearing, which clearly shows that the clearinghouse resides on a separate physical computer from the server computer. In addition, Defendants claim that Prism made statements to the PTO during the prosecution of the `288 Patent, intending to distinguish the `288 Patent from prior art "Tabuki," whereby Prism established that the clearinghouse must act independently from the server computer (Filing No.
Prism claims that the statements to the PTO were not a clear and unmistakable disavowal, because the statements do not mention a "server computer." Defendants claim that Prism's "server computer" is the same as Tabuki's "application server," as illustrated by Prism's own contentions to the PTO. For example, Prism stated, "Tabuki does not teach a verification server [Tabuki's term] or clearinghouse [Prism's term] that performs user authentication independently from the application server as claimed by [Prism]" (Ex. 14, Filing No.
In addition, Prism stated to the PTO that "[Prism's] claimed application server and clearinghouse function in a fundamentally different way from the application server and verification server of Tabuki. The challenge of [Prism's] application server to the clearinghouse is:
The second difference in the parties' proposed constructions is that Defendants claim that the clearinghouse construction must indicate that the clearinghouse also "authenticates account holders." In response, Prism maintains that the language of the claims themselves describes what the clearinghouse does. For example, Claim 1 states that the clearinghouse stores data of the server computer and the client computer device, not of an account holder. In addition, Prism quotes other claims using the term "clearinghouse" and concludes, "As the language of these claims makes clear, the clearinghouse performs the function of authenticating the identity of various physical devices, not `account holders'" (Filing No.
After a review of the parties' briefs and accompanying evidence, the Court construes
"Access server" was not construed in the Delaware Case. The sole difference in the parties' proposed constructions is whether the access server is "server software" or "a computer."
Prism maintains that the access server could refer to software, rather than to a particular computer or device. Prism notes that when the inventors intended to refer to a computer in the claims, they used the word "computer," as in the term "server computer" in claims 1, 31, 62, and 87 of the `288 Patent (Filing No.
Prism also cites the language of the specification in support of this contention. Prism claims that the parties are in agreement that the term "secure transaction server 34" in the specification refers to the "access server" as recited in the claims that were added later in the prosecution history (Filing No.
`288 Patent 4:14-19. Prism argues that the secure transaction server 34 (or access server) cannot be a computer, because it "resides on [a] machine." Therefore, the access server must be a software program. Prism also cites extrinsic evidence in the form of technical dictionaries to support its thesis that the term "server," generally speaking, could be a "computer or program" (Ex. 9, Filing No.
Defendants note that claim 118 discloses, "wherein said at least said portion of said protected computer resources are stored on said at least one access server." `288 Patent 45:37-39. Defendants argue that the access server must be a computer, or it would not be capable of storing the protected computer resources. Defendants state that the access server should be construed in the same way as "server computer" (one of the jointly stipulated terms) because Prism substituted the term "access server" for "server computer" in the amendment to the `288 Patent filed on March 2, 2007, adding claims 117-187. Defendants claim,
(Filing No.
After careful review of the briefs and the submitted evidence, the Court finds that Defendants have not established that the "access server" of the later claims of the `288 Patent must be the same entity as the "server computer" of the earlier claims, nor have they established that an access server must be computer hardware. The Court construes
"Authentication server" was not construed in the Delaware Case. The parties' proposed constructions are largely aligned with the proposed constructions for the terms "clearinghouse" and "access server," in that the same issues arise here as did for those terms. For the same reasons given above for "clearinghouse" and "access server," the Court construes
The phrase "requiring . . . to forward" was construed in the Delaware Case to mean "requiring that certain information be transmitted" (Delaware Order, at 7). As with the term "authenticate," the Delaware Court adopted without comment the joint stipulation of the parties as to this construction.
Unlike the Delaware construction, this Court's construction must also take into account the word "selectively." Prism's proposed construction adds the concept of "choosing to require" in response to the word "selectively," whereas Defendants propose the word "periodically." Prism states that Defendants' use of the word "periodically" implies that the transmission must happen more than once, which it says is not necessarily indicated in all of the claims.
Prism also points out that dependent claim 9 adds the limitation of "intermittently" to the act of requiring to forward. Since "intermittently" is a synonym of "periodically," Prism argues, then dependent claim 9 would not add anything to independent claim 1 because that concept would already be included in independent claim 1. Defendants state that Prism's phrase "choose to require" does not mean the same thing as "selectively require." Prism refutes this argument with evidence from the prosecution history suggesting that the PTO examiner interpreted "selectively" as differentiating from prior art where the information was required to be forwarded "automatically," so that introducing the concept of choice would properly account for that distinction.
Otherwise, Prism's proposed construction tracks the Delaware Case construction, defining the verb to "forward" as to "transmit certain information." Prism claims that this translation of the word "forward" is evident from the language of the claims themselves, because, for example, the digital identification is transmitted from a client computer device to a server computer. Defendants claim that the meaning of the word "forward" is commonly understood, and does not need to be translated as "transmit."
Finally, Prism claims that Defendants' proposed temporal phrase, "during an operating session," improperly narrows the construction and is not required by the claims. Defendants state that the phrase "during an operating session" is important because this phrase would illustrate the fact that the "selective requiring" happens after an initial authorization of the client computer.
After review of the parties' submissions, the Court finds that the intrinsic evidence justifies the adoption of Prism's proposed construction. Accordingly, the Court construes
The term "adapted to forward" was construed in the Delaware Case to mean "capable of transmitting" (Delaware Order, at 6). As with the terms "authenticate" and "requiring . . . to forward," the Delaware Court adopted without comment the joint stipulation of the parties as to this construction.
Prism argues that "capable of transmitting" is an appropriate construction because there is little difference between the use of the phrase in the `288 Patent and in the parent `416 Patent. Defendants, on the other hand, cite patent construction decisions in other cases that they claim support their construction. First, in Boston Scientific Corp. v. Cordis Corp., No. C 02-01474 JW, 2006 WL 3782840 (N.D. Cal. Dec. 20, 2006), the court construed "adapted to" to mean "configured to," as opposed to "suitable for." Boston Scientific, at *3. In that case, after citing several common dictionaries, the court stated, "Plaintiffs' proposed definition of `configured to' embraces the concept of a device intentionally and specifically made to act in a certain way." Id. at *2. On the other hand, "suitable for" was not the correct construction because it did not account for the device in question to be "intentionally and specifically made," which follows from the words "adapted to." Id. at *2. The court's decision was partly informed by the fact that the inventors had used the phrase "capable of" in some instances, and "adapted to" in others, implying that the two phrases must have different meanings. In any event, the court concluded that "`capable of' is a broader term than `adapted to.'" Id.
Likewise, in Agilent Techs., Inc. v. Affymetrix, Inc., 567 F.3d 1366 (Fed. Cir. 2009), the Federal Circuit rejected the construction of a closed chamber "adapted to . . ." as meaning "capable of . . ." because "the closed chamber is not merely capable of being set apart from its surroundings — it is in fact set apart." Agilent, 567 F.3d at 1378.
In Sta-Rite Indus., LLC v. ITT Corp., 682 F.Supp.2d 738 (E.D. Tex. 2010), the court rejected "having the capacity to" as too broad a construction for "adapted to." Sta-Rite, 682 F.Supp.2d at 753. The court stated that "in view of the specification, simple capacity does not reflect the intended meaning of `adapted to.'" Id. Also rejecting the other party's construction as too narrow, the court construed the term "`adapted to' to mean `designed or configured to.'" Id. Defendants here argue that this supports their construction of "configured to," while Prism claims that the addition of "designed" broadens the construction to be more akin to Prism's preferred "capable of."
At oral argument, Prism emphasized the fact that the claims wherein "adapted to" appears are "system claims." "So in that context, it makes sense that `adapted to forward' means capable of forwarding, not that you have to — you're absolutely required to be doing that action because that doesn't make sense in the . . . context of a system claim where you need to have components, not particular steps" (Transcript of Proceedings — January 12, 2012, Filing No.
Id. at 109.
After review of the parties' submissions with respect to the term "adapted to," the Court finds that it has been "otherwise compelled" to veer from the presumption that "the same claim term in the same patent or related patents carries the same construed meaning," because "adapted to" does not mean the same thing as "capable of." However, consistent with the construction above, the Court will construe "forward" to mean "transmit." Thus, the Court construes
IT IS ORDERED: As to United States Patent No. 7,290,288,
1) As jointly stipulated by the parties (Filing No. 440),
2) As jointly stipulated by the parties, the following terms are construed as indicated:
3) The Court construes the remaining disputed terms as follows: