CLAUDIA WILKEN, District Judge.
In this patent infringement case, Plaintiff Digital Reg of Texas, LLC has sued Defendants Adobe Systems, Inc., Symantec Corporation, and Ubisoft Entertainment, Inc. The parties originally identified about twenty-nine terms for construction, but eventually narrowed the dispute to nine terms. The three Defendants jointly brought a motion for summary judgment of non-infringement. On May 15, 2014, the parties appeared for a hearing. Having considered the papers and arguments of counsel, the Court construes the disputed terms as follows and GRANTS Defendants' summary judgment motion in part.
Digital rights management (DRM) is a generic term in the art which describes the control technologies that allow copyright holders, publishers, and hardware manufacturers to restrict access to digital content.
Digital Reg asserts six patents covering different aspects of DRM, which are organized into four families: "regulating" ___ U.S. Patent No. 6,389,541 (the `541 patent); "tracking" ___ U.S. Patent No. 6,751,670 (the `670 patent) and U.S. Patent No. 7,673,059 (the `059 patent); "delivering"
The "regulating" patent describes a computer-implemented method of regulating access to digital content stored on a personal home computer. `541 patent, Abstract. When the user attempts to access protected content, the user must first satisfy an authorization process by entering account or use data at the client computer.
The "tracking" patents aim to maintain contact with digital content after it is distributed. Content owners may package computer code with the protected content, which collects notification information from each user or recipient of the content, then communicates the information back to the content owner when triggered by an event. `670 patent, Abstract. The content owner can therefore restrict access to the content regardless of how each user acquires the copy of the content.
The "delivering" patents are directed at managing delivery of digital content. Users request content from a web page. `655 patent, 3:16-33. The claimed method provides instructions that cause the user's computer to collect identifying information from the user, such as an email address, IP address, or other identifier, and provide it to a second (remote) computer.
The "securing" patent involves encrypting digital content and locking it to a particular user or device. The patented method secures the digital content with a symmetric-key technique. `741 patent, Abstract. Symmetric key encryption uses "a secret or hidden key that is shared by both the sender and recipient of the encrypted data."
The claimed invention of the "securing" patent uses the symmetric key encryption to secure content, but protects the symmetric decryption keys by inserting them into a header associated with the digital content container and encrypting the header using an asymmetric encryption technique.
"To construe a claim term, the trial court must determine the meaning of any disputed words from the perspective of one of ordinary skill in the pertinent art at the time of filing."
This term appears in several claims of the `541 patent. For example, claim 1 reads:
Defendants point to the specification, which explicitly defines "token": "The token is a file indicating whether the transaction has been approved; i.e. whether the object should be installed and access granted." `541 patent, 5:1-3. Defendants urge the Court to adopt the first part of this passage as the definition of "token," or "a file indicating whether the transaction has been approved. Viewing the same passage, Plaintiff contends that the Court should instead define the function of a "token" according to the second part of the passage, or "a file indicating whether the access to the content should be granted." Both parties adopt one half of the passage while ignoring the other half. At the hearing, the parties consented to the Court's suggested construction integrating both proposals: "a file indicating whether the transaction has been approved and access should be granted."
The Court's construction makes clear that a token does not indicate simply that access should be granted, but also contains a yes/no indication. The specification states, "If the token indicates approval, the token causes the client computer to execute the install process . . . If the token indicates rejection, the install process will not be initiated and access is denied."
In its brief, Plaintiff argues that Defendants' proposed construction is inaccurate because it uses the term "transaction." A financial transaction is not necessary to initiate a token; the `541 patent makes clear that either payment or use authorization can result in access. The `541 patent Abstract states, "The content is inaccessible to a user until a payment or use authorization occurs."
This term appears in claim 13 of the `541 patent:
The parties' dispute over construction of this term mirrors that of the previous term. Plaintiff contends that an authorization procedure is a "process which determines whether access should be granted," while Defendants counter that it should "approve or reject a payment transaction or use information."
The Abstract describes the authorization procedure: "The payment authorization center approves or rejects the payment transaction, and bills the corresponding account. The authorization center then transmits an authorization signal to the payment server computer indicating whether the transaction was approved, and if not, which information was deficient." `541 patent, Abstract.
Defendants argue that as with the term "token," the specification establishes that the authorization procedure is based upon either approval or rejection of the payment or use information received. `541 patent, 4:30-31. In the case of a payment transaction, if it is approved, an authorization code is sent indicating acceptance and authorization.
Plaintiff again takes issue with Defendants' construction as improperly limited to a "transaction," which is necessarily a payment transaction. Plaintiff cites the same parts of the specification indicating that both payment information and other use information can be used to authorize access to the content. Authorization is not limited to a financial transaction. But Defendants explicitly recognize this point in their definition, which notes that the authorization procedure "approves or rejects a payment transaction or use information."
However, as pointed out by Plaintiff, Defendants' definition is a verb rather than a noun like the term to be construed. The Court therefore adopts the following construction for "an authorization procedure": "a process which approves or rejects a payment transaction or use information to determine whether access should be granted." This definition recognizes that the authorization procedure can result in either approval or rejection. It also notes that the underlying object of the authorization procedure is to determine whether access to the content should be granted.
These substantially similar terms appear in claim 32 of the `670 patent (a "tracking" patent) and several claims of the `515, `655, and `150 patents (the "delivering" patents). Claim 32 of the `670 patent states: selectively granting access to the electronic content
Claim 33 of the `515 patent, claim 1 of the `655 patent, and claim 1 of the `150 patent are similar:
Plaintiff states that no construction is necessary because these terms can be understood according to their plain and ordinary meanings. Defendants disagree, proposing that the terms should be defined as "based on whether or not notification information is sent."
Plaintiff contends that Defendants' construction ignores the "result" aspect of the phrase. It argues that the claim language plainly indicates that the result of the attempt to transmit matters, i.e., that notification information must be sent and received, not merely sent. Plaintiff argues that the specification supports this point. The `670 patent specification explains that an attempt to transmit the notification information may result in either a return acknowledgment (success) or a timeout error code (failure). `670 patent, 8:9-15. Thus, notification information must be both sent and received.
Defendants contend that Plaintiff's construction requiring successful transmission is contrary to both the specification and prosecution history. Scrutinizing the same passage of the specification indicating that the attempt to transmit can be either successful or unsuccessful, Defendants argue that the grant or denial of access does not depend on successful receipt of the transmission, but only attempted transmission. The prosecution history too indicates that the attempt to transmit can be either successful or not — the patentee referred to the attempt to transmit as "the act of trying." Lang Decl., Ex. 14 at 20-21 (12/14/2003 Response to Office Action for `670 patent). Defendants argue that "trying" to transmit the notification information is enough to trigger the selective grant or denial of access to the content. Although the claim language indicates "result" of the attempted transmission, a result does not necessarily indicate a response from the recipient.
Defendants further contend that the patentee disavowed claim scope during prosecution of the `515 patent. In distinguishing the Venkatraman reference, the patentee noted in an examiner interview that "the invention as claimed grants access immediately upon attempted transmission of the notification, without waiting for a response from the server to grant access. In other words, the transmission of the notification is the triggering event for granting access, not an authorization from the server." Lang Decl., Ex. 15 (03/05/05 examiner interview summary from `515 patent). The patentee further noted, "One of ordinary skill in the art would recognize that in the instance of an `attempt' to transmit a message in a network (for example), the transmission may, in situations, not succeed."
After the interview, the patentee amended the term "transmit" in the claims to read "attempting to transmit," and further added that the function of selective granting or denying of access was "based on results of the attempt to transmit." Plaintiff argues that this amendment occurred after the examiner interview put forth by Defendants, and therefore the statements made in the examiner interview have no bearing on the interpretation of claim language inserted later. However, it appears that the patentee amended the claim language in response to statements made at the examiner interview. The patentee stated that its reasons for amendment were to "more clearly distinguish these claimed inventions which now recite with variations in part that the executable instructions selectively grants or denies access to the electronic content based on results of an attempt to transmit." Beebe Decl., Ex. 29. By amending the claims to avoid prior art that disclosed a server granting access only if the contents of the notification information were deemed appropriate, the patentee disavowed that claim scope. The patentee is limited to an invention that grants access immediately upon the attempt to transmit the notification, without waiting for a response from the server. Lang Decl., Ex. 15.
The next question is whether this disavowal regarding the subject matter of the `515 patent should be imputed to the `655, `150, and `670 patents. The `655 and `150 patents are continuations of the `515 patent, but the application of a disavowal in the parent patent to child patents is not automatic.
This term appears in claim 32 of the `670 patent:
Further, Defendants' proposal deletes "selectively" from the term and adds in "parts," which appears nowhere in the plain claim language.
Defendants explain the reasoning behind their proposed construction. The patentee described this function in detail in addressing a patentability rejection under 35 U.S.C. § 101. Beebe Decl., Ex. 29 at 11-12. The patentee stated that, before notification information is transmitted successfully, the invention may deny access to "at least certain operations such as, for example, viewing, listing, saving, printing, or the like," or alternatively, access may be denied to certain parts of the data.
The Court adopts Defendants' definition with the slight alteration that includes the second part of the prosecution history excerpt, which explains that "selectively" may also include restricting certain operations of accessing the content. The term is construed as "granting or denying access to the select parts or operations of the electronic content."
This term appears in claim 32 of the `670 patent:
Plaintiff argues that no construction is necessary, as follows. The context of claim 32 already states that the recipient receives the electronic content, so Defendants' definition of "user that receives the electronic content" would be redundant. Further, the claim language says nothing about a "user" or "use of the electronic content." The recipient's role is about access, not use.
But even if the claim language itself does not contain the term "user," the specification and prosecution history are replete with the term. The claims must be read in light of the specification, of which they are a part.
As Defendants note, if "recipient" is construed too broadly to include any entity that can receive electronic content, it could encompass a server computer, which would be contrary to the apparent intent of the patentee. Because the specification and prosecution history make clear that the recipient of electronic content is an end-user, the Court adopts Defendants' definition and construes "recipient" as "a user that receives the electronic content."
This term appears in claims 32 and 45 of the `670 patent.
For example, in claim 32:
The parties' dispute over this limitation centers on whether it requires serial succession (Defendants) or succession only in time (Plaintiff).
Plaintiff argues that nothing in the plain and ordinary reading of the term precludes a "successive recipient" from receiving the content from the same server as the first recipient, but later in time than the first recipient. For example, claim 74 states that an envelope from one computer can be sent from the server to "one or more successive recipients." This allows for server A to send content to recipient B, then server A to send content to "successive recipient" C. Plaintiff's expert, Dr. Wicker, agrees that the patent does not preclude such a possibility.
On the other hand, Defendants advocate that "successive recipient" is limited to a recipient who receives the content from a previous recipient, not directly from the server. Fig. 2B in the specification shows a second recipient receiving content from the first recipient.
Plaintiff may not now recapture exactly what was disclaimed to distinguish Venkatraman.
This term appears in all asserted claims (16, 17, 19) of the `059 patent. The parties agree that it is substantially similar to the term "successive recipient" discussed previously. As with the previous term, the disagreement is over whether the term requires serial succession.
The prosecution history of the `059 patent suggests that the same disclaimer of scope applies here. In a June 2005 Response to Office Action, the patentee again argued that "the term `successive' has a specific meaning which includes `consecutive,' for example." Smith Decl., Ex. 7 at 10. This indicates that "successive" means one who receives the content, not from the server, but from a previous similar entity. In this context, "successive computer" means "user's computer that receives electronic content from a previous user's computer."
The parties dispute the meaning of the term "encrypting a header," which is in claim 1 of the `741 patent. Both parties' definitions begin with no change to the term "encrypting," which means that what they are trying to define is actually "header." This definition of header shall apply to all disputed terms containing "header."
Plaintiff proposes "control information including at least a key associated with a data block." Plaintiff cites the specification, which demonstrates that the header does indeed include a key for encryption. `741 patent, 3:27-35, 3:15-18. ("The computer program product . . . using a symmetric encryption technique and to encrypt a header associated with a first data block of the electronic content using an asymmetric encryption technique, the header including a symmetric decryption key."). However, Plaintiff cites no evidence, either intrinsic or extrinsic, to support the contention that a header is "control information." When asked at the hearing, Plaintiff could provide no persuasive reasoning for construing a "header" as "control information."
Defendants suggest that a "header" is well-known as "the beginning of a block of data." For example, a header of a document implies the beginning of the document. This interpretation is supported by the `741 patent specification.
Defendants also contend that, during prosecution, the patentee expressly disclaimed systems sending a key separately from the content. The patentee distinguished the Downs reference because the symmetric key and electronic content "are never together in the same container," while in the claimed invention, "the electronic content and symmetric decryption key are associated with the same container." Beebe Decl., Ex. 20 at 9. The patentee derided the method disclosed by the Downs reference, stating that the claimed method had a "significant advantage [because] multiple containers are not necessary as is the case in Downs."
Because the ordinary meaning of header is information at the beginning of the data, and all of the intrinsic evidence supports Defendants' proposal, the Court construes "header" as "the beginning of a block of data."
As with the last term, this term appears in claim 1 of the `741 patent. The Court's construction of "header" applies here. The parties further dispute the meaning of "re-keying the header."
Both parties appear to agree that re-keying the header has to do with re-encrypting the key in the header. The specification explains repeatedly that re-keying the header is "re-encrypting." `741 patent, 4:46-55, 14:12-21 (if access is not permitted, then "it may be assumed that the digital container is now present on another or different device from the original device from which the client footprint was originally created and for which a re-keying (i.e., re-encrypting) . . . may occur for establishing the new device or user").
Where the parties disagree is over how to express that concept. Plaintiff merely suggests "re-encrypting the key." Defendants counter that this rewrites the claim language so that the key, rather than the header, is being re-encrypted. The Court agrees. The more thorough construction here is "re-encrypting the header using a different encryption key."
Regarding this term, which appears in claims 1 and 7 of the `741 patent, Plaintiff claims that no construction is necessary. Defendants offer that the term should be construed as "data at the beginning of the first block of the electronic content," reasserting many of the same arguments as for the term "encrypting a header." The Court has already construed "header" to mean "the beginning of a block of data;" there is no need to construe the rest of this term, which can be understood according to its plain and ordinary meaning.
Summary judgment is appropriate only where the moving party demonstrates there is no genuine dispute as to any material fact such that judgment as a matter of law is warranted. Fed. R. Civ. P. 56(a);
The moving party bears the initial burden of informing the district court of the basis for its motion and identifying those portions of the pleadings, discovery, and affidavits that demonstrate the absence of a disputed issue of material fact.
To infringe a claim, each claim limitation must be present in the accused product, literally or equivalently.
The Adobe accused products are: Adobe Flash Platform; Adobe LiveCycle; Adobe Software Delivery, Licensing, and Activation; and Adobe Digital Publishing Tools. The Adobe accused products allow content providers to deliver digital content (such as PDFs, Flash, eBooks, and other documents) to end-users.
Regarding Symantec, Plaintiff accuses a number of features of the Norton Antivirus consumer software. An end-user may freely download, install, and use Norton software from third-party websites. Smith Decl., Ex. 3 at 25:21-26:4. During a trial period and a subsequent grace period, the Norton software repeatedly asks the end-user whether she wishes to purchase an annual subscription.
The Ubisoft accused product is the Uplay PC platform. It is a stand-alone PC desktop client that allows users to log into their Uplay account to gain access to their library of games through an Ubisoft authentication server. Uplay PC is free to download and is distributed separately from the Uplay video games.
Users can purchase games through the Uplay Express shop, a store embedded in the Uplay PC client, and Ubishop, which is a stand-alone game store website. Both stores are operated by third party Digital River. When a game is purchased, Digital River sends a CD key for a purchased game to Ubisoft servers, which are located outside of the United States. Lang Decl., Ex. 5 at 20:20-21:9, 68:4-11, 130:17-25. A different third party, Limelight Networks, distributes games purchased through Ubishop and Uplay Express shop.
Because all the asserted claims are method claims, in order to prove infringement, Plaintiff must prove that each Defendant practices each step of the asserted claims. "It is well established that a patent for a method or process is not infringed unless all steps or stages of the claimed process are utilized" within the United States.
Defendants first contend that Plaintiff cannot prove direct infringement because Plaintiff has admitted that each claim requires multiple actors. In the context of direct infringement of a method claim, all of the claimed steps must be "attributable to the same defendant."
Plaintiff's expert conceded that multiple actors are necessary to practice each of the method claims:
Smith Decl., Ex. 11 at 718:7-13.
Defendants have not shown that there is no genuine dispute as to whether they direct or control third parties to perform some of the steps. The primary purpose of Defendants' software is to maintain control over the user's operation of and access to the provided content. Wicker Depo. at 120:2-5 (admitting that Adobe's licensing-related code is "intended to maintain some level of control over the user's operation and use of the software."). Defendants all have software licensing agreements which aim to prevent unauthorized use and reproduction of their software — in other words, to direct or control users to use the software as Defendants intended.
Ubisoft makes a separate but related argument that, because its Uplay PC platform uploads video games to third party CDNs from a third party in Malmö, Sweden, and many of its servers and data centers are abroad, it cannot perform every step of the method within the United States.
Defendants next assert that Plaintiff cannot prove indirect infringement because there is no evidence of the underlying direct infringement, nor does it have evidence of each Defendant's specific intent to cause infringement. Plaintiff's indirect infringement theories include both contributory and induced infringement. For contributory infringement, Plaintiff must prove (1) direct infringement, (2) the alleged infringer knew that the accused products were especially made to practice the patented method, and (3) the accused products have no substantial non-infringing uses.
Defendants argue that Plaintiff has not pointed to specific instances of direct infringement by customers. "[A] patentee must either point to specific instances of direct infringement or show that the accused device necessarily infringes the patent in suit."
Defendants also challenge that Plaintiff cannot prove there are no substantial non-infringing uses. If a product has substantial non-infringing uses, it does not contributorily infringe.
The same is true for Defendants' arguments that they did not have the requisite intent or specific intent to encourage the direct infringement. Defendants contend that they never intended users to allow their licenses to elapse. But there is at least a disputed issue that Defendants intended that the overarching process would occur — if the user did not at first initiate payment or other authorization, the client computer would deny access to the digital content and prompt the user to submit authenticating information. As evidenced by Defendants' technical documentation and licensing agreements, the accused products were designed to anticipate and address the circumstance of the user trying to avoid digital content control.
The Court turns next to the Adobe-specific summary judgment arguments. Adobe asserts that its accused products do not infringe based on either the agreed-upon constructions or its proposed constructions, if the Court chooses to adopt those constructions. Adobe also renews its previous summary judgment motion that Microsoft's license with Plaintiff regarding Windows shields Adobe from liability.
Adobe asserts that, because Microsoft holds a license at least regarding the `541 patent with Plaintiff and the accused products run at least sometimes in a Windows environment, in those instances the accused products are shielded from infringement. Adobe previously brought a summary judgment motion on this issue, which the Court denied because it found that "Defendants have not shown as a matter of law that the Microsoft License extends to any product when used in combination with a Microsoft product. The Microsoft License may only extend to Microsoft products that perform any claim of any Licensed Patent, whether used alone or in combination with other things." Docket No. 438 at 7. Adobe now reasserts its argument based on Plaintiff's expert's statement that at least three steps of the `541 patent must be performed on a computer. But these steps — "requesting permission from an external source for the resource to access the digital content"; "receiving from an external source a token"; and "executing an access checking process" — are not executed by the Microsoft product, or the Windows operating system. The fact that the accused product allegedly executes the infringing code on the Windows operating system is not enough to say that the Windows operating system is performing these steps. Accordingly, Adobe's renewed motion for summary judgment on this point is denied.
The Court construed "token" to include Defendants' proposed definition: "a file indicating whether the transaction has been approved and access should be granted." This construction indicates that the token is capable of exhibiting either approval or rejection of the payment or use information. Adobe's expert opines that none of the accused products practice a "token" under this definition. Beebe Decl., Ex. 8 at ¶¶ 98-101. Plaintiff's expert, who reviewed the source code and technical literature related to the accused products, asserts the opposite, identifying a token for each product. Docket No. 560, Ex. 3.
The parties agreed that this term should be construed as "running an installation program that creates a permission locally, which permission is (1) locked uniquely to the client and (2) capable of being found locally by a later execution of the access checking process."
Adobe contends that Plaintiff has asserted irreconcilable positions on infringement and validity regarding this term. For infringement, Plaintiff states that the object accused as the permission is created remotely and then passed to the local machine. Beebe Decl., Ex. 13 at 619:4-8. For validity, Plaintiff has distinguished the `541 patent from the prior art on the basis that, for the `541 patent, the permission cannot be created at the remote server and passed to the local machine. Beebe Decl., Ex. 14. Adobe argues that the permission must be generated locally, as the agreed-upon construction requires.
Plaintiff responds that its expert, Dr. Devanbu, has opined that the input of the permission comes from the remote server. This is required by the claim in question, which states before the phrase identified by Adobe, "based on the received token . . ." `541 patent, claim 1. Claim 1 therefore allows for the input of the permission, generated locally, to be received from an external source. According to Dr. Devanbu, the permission itself however is a decryption key that is produced at the client.
As for Adobe's validity argument, Adobe has not proven by clear and convincing evidence that the patent is obvious or anticipated.
Adobe contends that Dr. Keller, Plaintiff's expert, distinguished Adobe's Digital Content system by adopting a different claim construction of the term "container identifier." Dr. Keller stated that a container identifier must be container specific, not content specific, such that each transmission of a container (such as a copy of a downloaded book) must use a unique identifier, instead of unique identifiers for the book itself. Beebe Decl., Ex. 15 at 193:15-20. Dr. Keller used this aspect to distinguish the `741 patent from the prior art. In analyzing infringement, however, Plaintiff asserted that Adobe's products use a content-specific identifier, not a container-specific identifier. Beebe Decl., Ex. 22 at 4. Because these definitions are "irreconcilable," Adobe argues that it is entitled to summary judgment, either of non-infringement or invalidity.
Adobe, however, must carry its burden of persuasion at the summary judgment stage. To prove invalidity, it must prove with clear and convincing evidence that the patent is obvious or anticipated.
Nor has Adobe shown that Dr. Keller's container specific, not content specific, interpretation of "container identifier" is the correct one as supported by the intrinsic and extrinsic evidence. Accordingly, summary judgment is not warranted.
Adobe argues regarding the "header" terms that if Defendants' proposed constructions are adopted, then Adobe is entitled to summary judgment of non-infringement of all terms of the `741 patent because Dr. Devanbu did not opine as to infringement under those constructions. Plaintiff produces no evidence in response and does not even attempt to explain why the accused products infringe these limitations.
The Court adopted Defendants' construction of this term: "based on whether or not notification information is sent."
Adobe asserts that, because Plaintiff's infringement analysis was based on an application-level response and its invalidity analysis was based on a network-level response, they are contradictory and summary judgment is warranted. But Adobe does not explain whether a network-level response or an application-level response would be inconsistent with the Court's constructions of this term.
Neither side proposed this term for construction. Dr. Keller, Plaintiff's validity expert, discussed the term and referred to it as used in the `670 patent as "to identify and track the recipient." Beebe Decl., Ex. 14 ¶ 140. Adobe claims that Plaintiff has no support for this "construction," and, if adopted, Adobe is entitled to summary judgment with respect to Digital Publishing Tools, Flash, and its Software Delivery, Licensing, and Activation services because Plaintiff has no evidence that those products track or use content. But even assuming the "construction" in Plaintiff's expert report is a binding limitation, it is not content that is being tracked, but the recipient. Adobe has not provided any legal basis for summary judgment on this contention.
Symantec, whose products are charged with infringing various claims of the "tracking" patents, has moved for summary judgment based on Plaintiff's lack of evidence and the Court's constructions.
The Court granted Symantec's motion to strike portions of Dr. Devanbu's expert report relating to claim 16 of the `059 patent as asserted against the Consumer Licensing Technologies (CLT) products because they were not properly disclosed in Plaintiff's infringement contentions. Docket No. 509 at 2:10-18. Claim 16 of the `059 patent is therefore not asserted against the CLT products. To the extent that other Norton features, such as SOS/SCSS or ACT-WEB, are properly disclosed in Plaintiff's infringement contentions, Plaintiff may continue to pursue infringement claims against Symantec. Symantec has not shown that Plaintiff's infringement theories asserting claim 16 of the `059 patent should be stricken as to any other Symantec feature or product.
Claim 32 of the `670 patent requires executable instructions that "selectively deny access to the electronic content until the notification is transmitted." Similarly, claim 45 of the `670 patent requires a "file that includes electronic content and causes access to the electronic content to be denied until notification information collected by executable instructions has been successfully transmitted." In other words, both claims of the `670 patent asserted against Symantec require access to electronic content to be denied, at least in part, until notification information is transmitted.
Symantec alleges that its products do not infringe because it is undisputed that they allow access to the content before the alleged notification information is transmitted.
Plaintiff responds that Symantec has only pointed to an instance where it does not infringe, but ignores instances of where it does infringe. Plaintiff accuses the steps that occur once the CLT product expires. At that point, access to the electronic content is denied until notification information is sent. Plaintiff's seat transfer theory regarding the Norton products provides another possible example of infringement. A license allows for a limited number of "seats," or slots for installation. If a license only permits three seats, but the user attempts to install the product on a fourth computer, access to content is immediately denied. Docket No. 560, Ex. 25 at 29:22-30:5. A reasonable jury might find that either of these theories fulfills the requirement that access is denied until notification information is sent. Therefore, summary judgment on this point would be improper.
The Court adopted Defendants' proposed construction of "successive recipient" and "successive computer," which require a "user that receives electronic content from a previous recipient" and a "user's computer that receives electronic content from a previous user's computer," respectively. These terms appear in all of the asserted claims.
Plaintiff's theory as to Symantec's infringement under this construction is that the first recipient would be Symantec's server, whereas the second recipient is the end-user and the end-user's computer. However, this theory ignores the Court's claim construction. Plaintiff's XLok theory is similar — "Additionally, each Symantec product binary is `wrapped' with an XLok wrapper before being transmitted to a distribution server. These binaries are then downloaded by Symantec customers, therefore the customers themselves are also successive recipients even upon their first installation of a Symantec product." Docket No. 560, Ex. 26 at 91. This theory is again contrary to the Court's construction requiring a user of the electronic content because a server cannot be such a user.
Plaintiff lastly offers a seat transfer theory, where a license is transferred from one end user customer's computer to another end-user's computer. Docket No. 560, Ex. 27 at 36-37. This theory is the only one that conforms to the Court's construction and survives summary judgment.
Ubisoft's UPlay platform is accused of infringing claims of the "tracking" and "delivering" patents. Ubisoft moves for summary judgment based on the application of the Valve license and on the Court's claim construction.
Valve, previously a Defendant in this action, entered into a Settlement Agreement with Plaintiff which included licensing the patents-in-suit. The language of the Agreement provides that any third party "use" of a Valve licensed product is also licensed, to the extent of such use. Lang Decl., Ex. 18 § 2.7. Covered third parties include "users," "developers," and "partners" of Valve.
Ubisoft contends that Plaintiff has disclosed no expert opinion nor evidence that would support a finding of infringement under the Court's construction. The Court adopted Defendants' construction of this term, which requires that the grant or denial of access occur upon the attempted transmission of the notification information, not its authentication. Plaintiff's infringement expert testified that access to Ubisoft's products depends on the server authenticating the login information and "sending a message back." Lang Decl., Ex. 7 at 462:1-464:21. By the expert's own admission, access to Ubisoft's products depends on server authentication (i.e. successful transmission and approval of notification information) rather than the act of transmitting the notification information itself.
In its response, Plaintiff fails to provide any evidence in support of an infringement theory utilizing the Court's construction, but instead confirms its infringement expert's view. Plaintiff explains that, regarding "Ubisoft's Uplay-enabled games, without a successful transmission of notification information, no access granting message would be received by the transmitting computer." Plaintiff's Reply at 20. In other words, access to the Uplay game content is predicated on the server receiving the successful transmission and sending an access granting message in return.
Ubisoft contends that Plaintiff has no evidence supporting an infringement theory that conforms to the Court's construction of this term, which requires that both the first and the successive recipient/computer be that of an end-user, and that the successive recipient/computer receive the content from a previous end-user. Plaintiff offers in response a couple of theories that do not meet this limitation: where a CDN server is the first recipient and sends it to an end-user; and where a CDN server sends one end-user a game, then sends the game to another end-user at a later time. Both of these theories were rejected by the Court's construction. Plaintiff then asserts, without citation to any evidence, that an end-user "receives a Uplay-enabled game from a CDN server and then sends that game on to another end user/end user computer (`successive recipient')." Plaintiff's Reply at 27. Plaintiff provides no expert opinion or other evidence showing that this scenario occurs with Ubisoft's products. Ubisoft confirms that this theory has never been espoused by Plaintiff before and that there is no expert testimony or other evidence to support this notion. Defendants' Reply at 14 (citing Lang Decl., Ex. 7 at 456:21-457:23). Summary judgment in favor of Ubisoft is therefore warranted on this point, which covers all asserted claims of the `670 and `059 patents.
Ubisoft argues that summary judgment is warranted regarding a limitation which appears in independent claim 16 of the `059 patent:
(emphasis added). Ubisoft interprets this claim to mean that access is granted once the authorized user identifier is transmitted, as opposed to being granted only after the server authenticates the authorized user data. Ubisoft alleges that Plaintiff's theory of infringement relies on granting access upon server authentication, not upon transmission. Plaintiff's theory is that, when the user logs in to the Ubisoft server and provides the authorized user identifier and "the authorized user identifier has been transmitted and processed successfully, a user is granted access to game content." Lang Decl., Ex. 9 at 34-35. Ubisoft argues that it is therefore undisputed that its accused products provide access only after both transmission of authorized user identifier and successful processing of that identifier, which is contrary to the limitation.
Plaintiff responds that nothing precludes the account credential and CD keys that enable a user to access the games to be the authorized user identifier. Docket No. 560, Ex. 2 at 2:41-47, 1:63-67. Even if Plaintiff is correct that the account credential and CD keys can act as the authorized user identifier, Plaintiff's response does not answer the issue raised by Ubisoft, which is that the claim requires access to be granted "upon transmission" of said authorized user identifier. A plain reading of the claim language reveals that access is granted "upon transmission" of the user information, which is distinct from Plaintiff's infringement theory that Uplay grants access only upon successful processing of that information. Summary judgment for Ubisoft is appropriate on all asserted claims of the `059 patent.
Adobe is entitled to partial summary judgment of non-infringement of the `741 patent based on the header limitations. Claims of the `541 and `670 patents remain asserted against Adobe.
Symantec is entitled to partial summary judgment of non-infringement of all asserted claims of the `670 and `059 patents, on all theories except for the seat transfer theory, based on the limitations "successive recipient" and "successive computer."
Ubisoft is entitled to summary judgment of non-infringement on all the claims asserted against it for several reasons. First, Plaintiff is precluded from bringing any theories that require Valve's Steam Platform to perform any limitation or step. Second, all claims of the `670 and `059 patents are barred as to Ubisoft for failure to satisfy the limitations "successive recipients/computers." Third, because Ubisoft does not infringe the "based on a result of the attempted transmission"/"based on the results of the attempt to transmit" terms contained in the claims of the `655, `150, and `670 patents, the Court grants summary judgment on all asserted claims of those patents as well. Fourth, Ubisoft is entitled to summary judgment of non-infringement of the limitation requiring access to be granted "upon transmission" of an authorized user identifier, which appears in claims of the `059 patent.