Hon. Cathy Ann Bencivengo, United States District Judge.
Before the Court is the motion for judgment on the pleadings filed by Bayerische Motoren Werke AG, BMW of North America, LLC and BMW Manufacturing Co., LLC, (collectively, "BMW"). [Doc. No. 89.] BMW argues that United States Patent Nos. 8,301,456 and 8,311,834, which Plaintiff West View Research, LLC ("West View") asserts against BMW, are invalid because they are not directed to patentable subject matter under 35 U.S.C. § 101. West View opposed the motion. [Doc. No.
The `456 patent is titled "Electronic Information Access System and Methods." [Doc. No. 89-1 at 5-44.]
The continuation claims of the `456 and the `834 patents, filed some 13 years after the original parent application, relate to the disclosed user identification subsystem. The asserted claims are directed at an information system that uses electromagnetic energy to identify whether one is an authorized user of the information system. Then, if the system determines that the person is authorized to access information, the system is configured to communicate information, perhaps tailored or specific to the person, to a personal electronic device of the authorized user.
Claim 1 of the `456 patent reads:
[Doc. No. 89-1 at 42, Col. 24:38-55.] The asserted dependent claims add these limitations:
[Doc. No. 89-1 at 42-43, Col. 24:56-25:34.]
West View asserts four independent claims of the `834 patent.
[Doc. No. 89-1 at 85, Col. 27:49-28:9.]
West View asserts that these claimed systems/methods are an advancement to a computer-specific technology problem, specifically an improvement in the operation or functionality of the computer system to prevent electronic fraud, such as "spoofing" or "man-in-the-middle (MITM) attacks" in wireless interface systems. [Doc. No. 90 at 6-7.] According to West View these problems are addressed by the patents through "various mechanisms, including (i) use of a short-range wireless protocol (so as to mitigate interception); (ii) use of e.g.,
BMW argues that the claims of these continuation patents are directed at an abstraction: retrieving data associated with a user and providing relevant information to that user in return. Further, according to BMW: (1) the asserted claims
Ninth Circuit procedural law for Rule 12(c) motions applies here. Imation Corp. v. Koninklijke Philips Electronics N.V., 586 F.3d 980, 984 (Fed. Cir. 2009) ("In reviewing a grant of judgment on the pleadings, this court applies the procedural law of the regional circuit."). In the Ninth Circuit, a "motion for judgment on the pleadings faces the same test as a motion under Rule 12(b)(6)." McGlinchy v. Shell Chem. Co., 845 F.2d 802, 810 (9th Cir. 1988). The standard under Rule 12(b) is a familiar one, and there is no need to address it at length here. In short, "[t]o survive a motion to dismiss, a complaint must contain sufficient factual matter, accepted as true, to `state a claim to relief that is plausible on its face.'" Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009) (quoting Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007)); see also Cafasso, U.S. ex rel. v. Gen. Dynamics C4 Sys., Inc., 637 F.3d 1047, 1055 (9th Cir. 2011) (holding that the Iqbal standard applies to Rule 12(c) motions).
Section 101 defines the subject matter eligible for patent protection as: "any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof." 35 U.S.C. § 101. The Supreme Court has clarified that Section 101 "contains an important implicit exception: Laws of nature, natural phenomena, and abstract ideas are not patentable." Alice Corp. Pty. Ltd. v. CLS Bank Int'l, ___ U.S. ___, 134 S.Ct. 2347, 2354, 189 L.Ed.2d 296 (2014); see also Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 132 S.Ct. 1289, 1293, 182 L.Ed.2d 321 (2012) ("Phenomena of nature, though just discovered, mental processes, and abstract intellectual concepts are not patentable, as they are the basic tools of scientific and technological work.") (quoting Gottschalk v. Benson, 409 U.S. 63, 67, 93 S.Ct. 253, 34 L.Ed.2d 273 (1972)). However, "an invention is not rendered ineligible for patent simply because it involves an abstract concept." Alice, 134 S.Ct. at 2354. Rather, "applications of such concepts to a new and useful end... remain eligible for patent protection." Id. (internal quotations and brackets omitted). "Accordingly, in applying the § 101 exception, [the court] must distinguish between patents that claim the building blocks of human ingenuity and those that integrate the building blocks into something more, thereby transforming them into a patent-eligible invention." Id. (internal quotations, citations, and brackets omitted); see also Potter Voice Tech., LLC v. Apple Inc., No. C 13-1710 CW, 2015 WL 5672598, at *2 (N.D. Cal. Jun. 11, 2015) (same).
At step two, if the claims are directed to a patent-ineligible concept, the Court must "consider the elements of each claim both individually and as an ordered combination to determine whether the additional elements transform the nature of the claim into a patent-eligible application." Alice, 134 S.Ct. at 2355. This second step is also known as "a search for an inventive concept — i.e., an element or combination of elements that is sufficient to ensure that the patent in practice amounts to significantly more than a patent upon the ineligible concept itself." Id. (internal quotations and brackets omitted).
Although novelty, obviousness and enablement, under § 102, § 103 and § 112 are separate considerations from a § 101 analysis, certain questions relevant to those determinations overlap with the "search for an inventive concept." For example: Do the elements of the claim, individually or in combination, and viewed in the context of the specification, disclose and teach advancements to the technology to solve the identified problem? Or, do the claim elements merely use known procedures, or conventional steps, specified at a high level of generality? See Market Track, LLC v. Efficient Collaborative Retail Marketing, LLC, No. 14 C 4957, 2015 WL 3637740, *5 (N.D. Ill. June 12, 2015) citing Content Extraction & Transmission, LLC v. Wells Fargo Bank, Nat'l. Ass'n, 776 F.3d 1343, 1347-48 (Fed. Cir. 2014) (discounting "well-known" or long-practiced procedures and finding no "inventive concept" in claims that "merely recite the use of [ ] existing ... technology").
BMW argues that the claims at issue here are invalid under Section 101 because they are patent-ineligible abstract ideas. "The "abstract ideas" category embodies the longstanding rule that an idea of itself is not patentable." Alice Corp., 134 S.Ct. at 2355 (internal quotations and brackets omitted). "The Federal Circuit has characterized an abstraction as `an idea, having no particular concrete or tangible form.'" Potter Voice Tech., 2015 WL 5672598, at *2 (quoting Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 714 (Fed. Cir. 2014)).
The claim language is result-oriented and functional — requesting a signal from a wireless device; receiving, analyzing and authenticating the response signal; and thereafter providing access to information customized to the user and transmitting that information to that user to be communicated/downloaded to the user's personal electronic device. The physical components of the claims, such as an antenna or interrogator apparatus, a radio frequency device, a processing apparatus, a personal electronic device are generic descriptions of well-known components used to carry out this abstract function. See Affinity Labs of Texas, LLC v. Amazon.com Inc., 838 F.3d 1266, 1270 (Fed. Cir. 2016) (affirming invalidity under § 101 of claims that set forth routine and generic capabilities of computers that the patentee did not invent, and at a level generality known in the art as of the priority date of the patent).
West View describes the asserted claims as inventions that improve the operation or functionality of a computer by "preventing it from being `spoofed' or subjected to MITM attacks and improv[ing] technology in the field of wireless information provision or commerce by enabling secure transactions and preventing release of a user's sensitive data to a malicious third party." [Doc. No. 90 at 7.] Although this description implies inventions that introduce advancements to computer technology addressing a problem specifically arising in the realm of computer networks, it is a fiction. There is nothing in the specification to support this representation that the inventions provide new and improved systems, protocols or methods of securing wireless transactions from interception by unauthorized users. Rather the claims recite known RFID tag and reader systems used to provide authentication of system users for access to information.
The asserted claims are directed at identifying an authorized user and providing information to that user. The concept of identifying a system user and then delivering user-specific content to that user's portable electronic device is an abstract idea.
Having determined that the claims at issue are directed at abstract ideas, the next step is to "examine the elements of the claim to determine whether it contains an `inventive concept' sufficient to `transform' the claimed abstract idea into a patent-eligible application." Alice Corp., 134 S.Ct. at 2357 (internal quotations omitted.) An abstract process could be directed to a patent-eligible subject if it discloses a specific improvement in computer performance designed to implement the process. See McRO, Inc. v. Bandai Namco Games Am. Inc., 837 F.3d 1299, 1314 (Fed. Cir. 2016). However, "the mere recitation of a generic computer cannot transform a patent-ineligible abstract idea into a patent-eligible invention." Alice Corp., 134 S.Ct. at 2358; see also DDR
West View emphasizes that the patents claim systems or methods that are an advancement to a computer-specific technology problem, specifically an improvement in the operation or functionality of a wireless computer system to prevent electronic fraud. West View identifies the following claim elements as the purported advancements to the operation of the claimed information system introduced to frustrate interception by a third party: (1) the use of a short-range wireless protocol; (2) the use of reader authentication; and (3) the optional use of encrypted data.
The asserted claims broadly recite wireless devices to interrogate, receive and transmit signals. When specified in a claim, the only identification and access system disclosed in the patent consists of an RFID tag, a reader and an access database "of the type well known in the art." [Doc. No. 89-1 at 39, Col. 17:49-52.] Independent claim 66 of the `834 patent includes the limitation that the signal sent from the reader/interrogator to the wireless device (i.e., the RFID tag) and the return signal from the wireless device are short-range wireless transmissions.
West View also asserts that the claims introduce the use of reader authentication to the RF system to frustrate third party interception. However, the asserted claims of the `456 patent do not include as a limitation of the system that the RFID tag authenticate the transmission from the interrogator before responding. Therefore, this limitation is not claimed in the `456 patent as a purported advancement in an RF identification system. The asserted method claims of the `834 patent do include the step of the wireless device (i.e., RFID tag) evaluating or authenticating the signal from the interrogating device to determine if it should respond. [Doc. No. 89-1 at 83-86, Col. 24:66-67; Col. 27:59-62; Col. 30:20-25.] The specification discusses this step of the RFID tag authenticating the tag reader before it transmits a response signal as follows:
[Doc. No. 89-1 at 39, Col. 17:54-63.]
The language of the claims reciting this particular step is generic in its description of the function. The RFID tag "evaluates" or "authenticates" the signal received from the interrogator before responding. The specification describes the manner in which such authentication is performed as providing an "appropriate code or password... within the RF signal from the reader for the tag to [identify]." Nothing further is disclosed to explain the operation of this step if such a step was indeed inventive. Nor is there any suggestion that the implementation of this step is a concept introduced in these patents as a security innovation for RF signal transmission systems. To the contrary, the specification represents that there are known methods of defeating this authentication process and therefore suggests the optional implementation of encryption protocols to enhance security. [Id., Col. 17:63-18:7.]
The last claim element West View identifies as an improvement in computer functionality to solve the problem of electronic fraud in wireless systems is the disclosed optional use of encrypted data in the RF signal transmission system. As noted supra, none of the asserted claims include limitations of encrypted data protocols or include a step of encrypting or decrypting data. Even if the Court construes claim language requiring the step of authenticating a transmitted signal configured in a way to frustrate unauthorized access [Doc. No. 89-1 at 86, Col 30:4-25] to implicate the use of encryption protocols, there is no disclosure of any new or improved system or method of doing so. Instead, the specification discloses that "the use of passwords, encrypted data protocols and spread spectrum techniques for security is well known in the art, and accordingly will not be described further herein." [Doc. No. 89-1 at 39, Col. 18:14-17.]
West View does not identify anything else that might constitute an inventive concept. The Court is not persuaded by West View's contention that the claimed systems and methods introduce a security advancement designed to protect the users of portable electronic devices from having their communications intercepted or altered. These wireless communication issues — "spoofing and MITM attacks," asserted by West View as huge computer problems of today
West View's argument blatantly jettisons any relationship to the actual field of the invention stated in the specification: "the field of personnel transport apparatus, and specifically elevators and similar devices for transporting people from one location to another which incorporate various information technologies." [Id., Col 1:37-42.] It ignores the only problems identified in the patent as the issues to which these claims relate: the goal of replacing magnetic striped cards and card readers, prone to wear and unauthorized use, as a means of restricting elevator
Untethered to the problems the patent disclosure identifies, these continuation claims are written at a level of abstraction that purports to claim any system employing a wireless device that sends an identifying signal to a receiver, which upon identifying the signal, accesses and provides information associated with the identified user, which can be downloaded to that user's portable electronic device. Without any reference to actual language in the disclosure required to support its assertions, West View argues that the technological problem being addressed is in the field of wireless information provision or commerce, to enable secure transactions and prevent the release of the user's sensitive data to a malicious third party. [Doc. No. 90 at 7.] This contention only serves to underscore the level of abstraction of these continuation claims and the intention to preempt a field never contemplated in the patent disclosure.
Having considered the submissions of the parties and based on the language of the asserted claims and the specification common to the patents at issue, the Court finds that the asserted claims of U.S. Patent No. 8,301,456 and US. Patent No. 8,311,834 are not drawn to patent-eligible subject matter under 35 U.S.C. § 101 and are invalid. BMW's motion for judgment on the pleadings is therefore
It is