STARK, District Judge:
Pending before the Court are Defendant Symantec Corporation's ("Symantec") motion for patent invalidity under 35 U.S.C. § 101 (C.A. No. 10-1067 ("Symantec case") D.I. 698) and Defendants Trend Micro Incorporated and Trend Micro, Inc. (USA)'s ("Trend Micro") motion for judgment of invalidity under 35 U.S.C. § 101 (C.A. No. 12-1581 ("Trend Micro case") D.I. 175) of certain claims of U.S. Patent Nos. 6,460,050 (the "'050 patent"), 6,073,142 (the "'142 patent"), and 5,987,610 (the "'610 patent") (collectively, "patents-in-suit") asserted by Intellectual Ventures ILLC ("IV").
For the reasons discussed below, the Court will grant in part and deny in part Symantec's and Trend Micro's motions. Specifically, the Court concludes that Symantec and Trend Micro ("Defendants") have proven that IV's '050 and '142 patents are not patent eligible but have failed to prove that IV's '610 patent is not patent eligible.
IV sued Symantec, Trend Micro, Check Point Software Technologies Inc., Check Point Software Technologies Ltd., and McAfee, Inc. on December 8, 2010 alleging infringement of the '050, '142, and '610 patents, as well as U.S. Patent No. 7,506,155 (the "'155 patent"). (D.I.I)
Symantec filed an answer and counterclaims against IV on January 31, 2011. (D.I.23) Trend Micro filed an answer and counterclaims against IV on February 14, 2011. (D.I.28)
On November 21, 2012, the Court severed the Trend Micro case from the Symantec case. (D.I.412) The Court construed disputed claim terms on December 12, 2012. (D.I.425, 426)
On February 6, 2015, the jury returned a verdict finding IV had failed to prove that Symantec infringes the asserted claims of the '050 patent and had proven that Symantec infringes the asserted claims of the '142 and '610 patents. (D.I.676) The jury found that Symantec had failed to prove that any of the asserted claims were invalid due to anticipation or obviousness. (Id.) The jury awarded IV $17 million in damages. (Id.)
IV has asserted the following claims against Trend Micro:
(C.A. 12-1581 D.I. 176 at 4, 17, 23)
On January 6, 2015, the Court issued a pretrial order in the Symantec case stating that it would "resolve any § 101 issues in connection with post-trial motions and briefing, including hearing any testimony that must be presented[,] only after the conclusion of the forthcoming trial." (D.I. 615 at 3)
On March 4, 2015, the Court issued a schedule for briefing and oral argument on the § 101 issues in both cases. (D.I.692) The parties completed briefing on April 2, 2015. The Court heard oral argument on April 10, 2015. (See Tr.)
The '050 patent, entitled "Distributed content identification system," generally discloses a method for classifying content of received files by creating a content identifier and then comparing that content identifier to a database of other identifiers. It was filed on December 22, 1999 and issued on October 1, 2002. The patent is directed to filtering e-mail messages, and particularly spam and viruses, by generating a digital identifier for a message, forwarding that identifier to a processing system, determining whether the forwarded identifier matches a characteristic of other identifiers, and then processing the message based on the results of that determination. (See '050 patent at 2:37-43)
The '142 patent, entitled "Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments," was filed on June 23, 1997 and issued on June 6, 2000. It relates generally to providing an efficient way for business organizations to control the handling of emails and other data objects. Pursuant to business rules, messages are gated, then reviewed by an administrator, and eventually (if safe) directed to their intended recipients. (See '142 patent at 3:3-20, 4:40-54)
"Under Fed.R.Civ.P. 52(c), the court has discretion to enter judgment on any issue after hearing the evidence." In re Brimonidine Patent Litig., 666 F.Supp.2d 429, 453 (D.Del.2009) (internal citations omitted), aff'd in part, rev'd in part, 643 F.3d 1366 (Fed.Cir.2011). Rule 52(c) provides that "[i]f a party has been fully heard on an issue during a nonjury trial and the court finds against the party on that issue, the court may enter judgment against the party on a claim or defense that, under the controlling law, can be maintained or defeated only with a favorable finding on that issue." "[T]he court weighs the evidence and assesses the credibility of witnesses to determine whether or not the [movant] has demonstrated a factual and legal right to relief by a preponderance of the evidence." In re Brimonidine, 666 F.Supp.2d at 453.
Trend Micro filed its motion pursuant to the Court's oral order of March 4, 2015. (C.A. No. 12-1581 D.I. 171)
To defeat a motion for summary judgment, the nonmoving party must "do more than simply show that there is some metaphysical doubt as to the material facts."
Under 35 U.S.C. § 101, "[w]hoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title." There are three exceptions to § 101's broad patent-eligibility principles: "laws of nature, physical phenomena, and abstract ideas." Diamond v. Chakrabarty, 447 U.S. 303, 309, 100 S.Ct. 2204, 65 L.Ed.2d 144 (1980). Pertinent here is the third category, "abstract ideas," which "embodies the longstanding rule that an idea of itself is not patentable." Alice Corp. Pty. Ltd. v. CLS Bank Int'l, ___ U.S. ___, 134 S.Ct. 2347, 2355, 189 L.Ed.2d 296 (2014) (internal quotation marks omitted). "As early as Le Roy v. Tatham, 55 U.S. 14 How. 156, 175, 14 L.Ed. 367 (1852), the Supreme Court explained that [a] principle, in the abstract, is a fundamental truth; an original cause; a motive; these cannot be patented, as no one can claim in either of them an exclusive right.' Since then, the unpatentable nature of abstract ideas has repeatedly been confirmed." In re Comiskey, 554 F.3d 967, 977-78 (Fed.Cir.2009).
In Mayo Collaborative Servs. v. Prometheus Labs., Inc., ___ U.S. ___, 132 S.Ct. 1289, 182 L.Ed.2d 321 (2012), the Supreme Court set out a two-step "framework for distinguishing patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim patent-eligible applications of those concepts." Alice, 134 S.Ct. at 2355. First, courts must determine if the claims at issue are directed at a patent-ineligible concept. See id. If so, the next step is to look for an "`inventive concept' — i.e., an element or combination of elements that is sufficient to ensure that the patent in practice amounts to significantly more than a patent upon the [ineligible concept] itself." Id.
"Simply appending conventional steps, specified at a high level of generality, [is] not enough to supply an inventive concept." Id. at 2357 (internal quotation marks omitted; emphasis in original). In Bilski v. Kappos, 561 U.S. 593, 130 S.Ct. 3218, 3231, 177 L.Ed.2d 792 (2010), for example, the Supreme Court held that the claims involved were drawn to the patent-ineligible
In determining, at the second step, if a patent embodies an inventive concept, courts may consider whether the process "is tied to a particular machine or apparatus" or "transforms a particular article into a different state or thing." Bilski, 130 S.Ct. at 3225. "[T]o impart patent-eligibility to an otherwise unpatentable process under the theory that the process is linked to a machine, the use of the machine must impose meaningful limits on the claim's scope." CyberSource Corp. v. Retail Decisions, Inc., 654 F.3d 1366, 1375 (Fed.Cir.2011) (internal quotation marks omitted). To be "a meaningful limit on the scope of the claims," the addition of a machine "must play a significant part in permitting the claimed method to be performed, rather than function solely as an obvious mechanism for permitting a solution to be achieved more quickly." SiRF Tech., Inc. v. Int'l Trade Comm'n, 601 F.3d 1319, 1332-33 (Fed.Cir.2010). Hence, the "mere recitation of a generic computer cannot transform a patent-ineligible abstract idea into a patent-eligible invention." Alice, 134 S.Ct. at 2358. "Given the ubiquity of computers, wholly generic computer implementation is not generally the sort of additional feature that provides any practical assurance that the process is more than a drafting effort designed to monopolize the abstract idea itself." Id.
"[T]he machine-or-transformation test is a useful and important clue, an investigative tool, for determining whether some claimed inventions are processes under § 101." Bilski, 130 S.Ct. at 3227. However, it is "not the sole test for deciding whether an invention is a patent-eligible `process.'" Id. "[I]n applying the § 101 exception, [courts] must distinguish between patents that claim the building blocks of human, ingenuity and those that integrate the building blocks into something more, thereby transforming them into a patent-eligible invention." Alice, 134 S.Ct. at 2354 (internal citation and quotation marks omitted). The "concern that drives the exclusionary principle [i]s one of pre-emption." Id. That is, where a patent would pre-empt use of basic tools of scientific and technological work, i.e., laws of nature, natural phenomena, and abstract ideas, the patent would "impede innovation more than it would tend to promote it, thereby thwarting the primary object of the patent laws." Id. (internal quotation marks omitted).
"Whether a claim is drawn to patent-eligible subject matter under § 101 is an issue of law...." In re Bilski, 545 F.3d 943, 951 (Fed.Cir.2008), aff'd 561 U.S. 593, 130 S.Ct. 3218, 177 L.Ed.2d 792 (2010). Beyond this principle, however, there is no clarity at this time as to the standard of proof that must be applied to factual disputes that may be intertwined with the issue of eligibility of a particular patent or claim.
Symantec and Trend Micro contend that because patent eligibility is a question of law, they are not obligated to persuade the Court by clear and convincing evidence of the ineligibility of the patents-in-suit. (See D.I. 724 at 2; C.A. No. 12-1581 D.I. 190 at
The Supreme Court, in its recent § 101 opinions — Alice, Bilski, Mayo, and Ass'n for Molecular Pathology v. Myriad Genetics, Inc., ___ U.S. ___, 133 S.Ct. 2107, 186 L.Ed.2d 124 (2013) — did not cite any standard of proof to be applied. Nor is there any binding precedent from the Federal Circuit deciding whether patent ineligibility must be proven by clear and convincing evidence. In the en banc opinion in CLS Bank International v. Alice Corp. Pty. Ltd., 717 F.3d 1269, 1284 (Fed.Cir.2013) (en banc), the per curiam plurality opinion for five judges mentioned that the presumption of validity applied to a section 101 ineligibility challenge, but did not address the evidentiary standard. Judge Rader, in a dissenting opinion for five judges, explained that the clear and convincing evidence standard applied, along with the presumption of validity. See id. at 1304-05 (Rader, J., dissenting). The Supreme Court did not address this issue in its opinion in Alice and, plainly, the dissenting opinion from the Federal Circuit is not controlling.
In Ultramercial, Inc. v. Hulu, LLC, 722 F.3d 1335, 1338-39 (Fed.Cir.2013) ("Ultramercial I"), vacated sub nom. Wild-Tangent, Inc. v. Ultramercial, LLC, ___ U.S. ___, 134 S.Ct. 2870, 189 L.Ed.2d 828 (2014), the Federal Circuit held that the presumption of validity applied and, therefore, the clear and convincing evidentiary burden also applied to challenges to patent eligibility under § 101. This opinion was later vacated. See 134 S.Ct. at 2870. Thereafter, on remand, the majority did not address either the presumption or standard of proof issues, although Judge Mayer, in a concurring opinion, stated his view that "while a presumption of validity attaches in many contexts, ... no equivalent presumption of eligibility applies in the section 101 calculus." Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 720-21 (Fed.Cir.2014) ("Ultramercial II") (Mayer, J., concurring). The concurring opinion from the Federal Circuit is not controlling.
In these circumstances, District Courts, including this District, have taken varying approaches. See, e.g., In re TLI Communications LLC Patent Litigation, 87 F.Supp.3d 773, 797, 2015 WL 627858, at *19 n. 48 (E.D.Va. Feb. 6, 2015) (citing sample of District Court views); see also Cal. Inst. of Tech. v. Hughes Commc'ns Inc., 59 F.Supp.3d 974, 979, 2014 WL 5661290, at *2 n. 6 (C.D.Cal. Nov. 3, 2014) (explaining that "[e]ligibility questions mostly involve general historical observations, the sorts of findings routinely made
Given the Court's conclusions on the merits of the pending motions, it is unnecessary to resolve the parties' dispute over the standard of proof. For the reasons explained below, the Court would find the '050 and '142 patents are patent ineligible even assuming it must impose on Defendants a burden of clear and convincing evidence. Similarly, the Court would conclude that the '610 patent is not patent ineligible even if this issue must be resolved as a question of law on which Defendants confront, at most, a burden of a preponderance of the evidence.
Symantec and Trend Micro argue that the asserted claims are patent-ineligible under the analytical framework set forth in Mayo and Alice. (See D.I. 699 at 2; C.A. No. 12-1581 D.I. 176 at 2) Symantec contends that "[e]ach of IV's asserted claims [in the Symantec case] covers generic computer implementation of abstract ideas" and "do[es] not provide an `inventive concept'" that would satisfy the Mayo test for subject-matter eligibility. (D.I. 699 at 2, 5) Trend Micro similarly argues that "[b]ecause the asserted claims of the patents-in-suit are directed to abstract ideas, and because the added computer-related limitations are merely generic and do not add inventive concepts beyond the abstract ideas themselves, none of the asserted claims of the three patents-in-suit are eligible for patent protection." (C.A. No. 12-1581 D.I. 176 at 29)
IV responds that "[t]he Court should reject Symantec's sweeping indictment of software patentability, especially when it comes to the Patents-in-Suit, which pass every test the Supreme Court and the Federal Circuit have articulated for patent eligibility." (D.I. 722 at 1 (emphasis in original)) IV focuses on the Federal Circuit's post-Alice opinion in DDR Holdings, LLC v. Hotels.com, 773 F.3d 1245 (Fed. Cir.2014), which IV contends gives the most "relevant guidance." (D.I. 722 at 6)
With this general description of the parties' positions, the Court will now address the specific challenges to the eligibility of each of the three patents-in-suit.
The asserted claims (9, 13, 16, 22, and 24) of the '050 patent are method claims. Claims 9, 16, and 22 are independent. Claim 13 depends from claim 9. Claim 24 depends from claim 23, which depends from claim 22.
Independent claim 9 recites as follows:
Dependent claim 13 recites:
Independent claim 16 recites:
Independent claim 22 recites:
Dependent claim 23 (referenced in claim 24) recites:
Dependent claim 24 recites:
"First, given the nature of the invention in this case, we determine whether the claims at issue are directed to a patent-ineligible abstract idea." DDR Holdings, 773 F.3d at 1255 (citing Alice, 134 S.Ct. at 2355). Independent claims 9, 16, and 22 cover the following concepts:
(See generally D.I. 425 (construing relevant claim terms))
Symantec argues that the '050 patent is a "classic example" of solving a problem "by using a computer to perform a general-purpose method in the same manner `as a person would do it by head and hand' or `by using a pen and paper.'" (D.I. 699 at 15 (citing CyberSource, 654 F.3d at 1372)) "[C]omputational methods which can be performed entirely in the human mind are the types of methods that embody the `basic tools of scientific and technological work' that are free to all men and reserved exclusively to none." CyberSource, 654 F.3d at 1373 (quoting Gottschalk v. Benson, 409 U.S. 63, 93 S.Ct. 253, 255, 34 L.Ed.2d 273 (1972)). Trend Micro argues that the asserted claims are similar to those found to be patent-ineligible in CyberSource and other cases. (C.A. No. 12-1581 D.I. 176 at 5-10 (citing, e.g., Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat. Ass'n, 776 F.3d 1343, 1347 (Fed.Cir.2014) (finding claims directed to collecting data, recognizing data, and storing data to be abstract)))
The asserted claims of the '050 patent are also similar to the claims found to be abstract in Content Extraction. (See C.A. No. 12-1581 D.I. 176 at 6-10) The '050 patent covers the steps of collecting, recognizing, and storing data, like the claims at issue in Content Extraction. The only additional step in the '050 patent is communicating a result of the "recognizing" step back to a querying computer, but this step, too, is abstract. See buySAFE, Inc. v. Google, Inc., 765 F.3d 1350, 1355 (Fed.Cir.2014) (holding that "receiving a request" and "transmitting an offer in return" were abstract concepts).
IV relies on DDR Holdings as the most analogous precedent, asserting, "As in DDR Holdings, the '050 Patent does not `generically claim `use of the Internet' to perform an abstract business practice' and does provide solutions necessarily rooted in computer technology to problems specifically arising in the realm of computer networks. DDR Holdings, 773 F.3d at 1258-59. No analog to the '050 claims exists absent computers." (D.I. 722 at 15) (emphasis in original) Even accepting, arguendo, IV's proposition that DDR Holdings stands for the premise that "claims providing a solution `necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks'" are always patent eligible (D.I. 722 at 8 (citing DDR Holdings, 773 F.3d at 1258-59)), the underlying ideas in the asserted claims of the '050 patent are not "necessarily rooted in computer technology." Instead, in the Court's view, the '050 patent is directed to a generic computer implementation of abstract ideas: receiving identity information, comparing it to other information, and communicating results based on the identifying information.
Another helpful way of assessing whether the claims of the patent are directed to an abstract idea is to consider if all of the steps of the claim could be performed by human beings in a non-computerized "brick and mortar" context. See, e.g., buySAFE, 765 F.3d at 1353 ("[§ 101] also excludes the subject matter of certain claims that by their terms read on ... a human-controlled series of physical acts ...."). With respect to the '050 patent, Defendants persuasively analogize the steps of the asserted claims to two such hypothetical scenarios: police officers looking for stolen cars or parking enforcement officers determining how many unpaid tickets belong to owners of illegally parked cars. These analogies are depicted in the table below:
Limitations of '050 Patent Routine Steps Performed Routine Steps Performed to Claim 9 when Looking for Stolen Cars Determine Number of Unpaid Tickets Associated with Car "receiving, on a processing Jones, a dispatch officer, A parking enforcement system, file content receives a call from Smith, dispatcher in Wilmington identifiers for data files one of several officers receives a radio call from one from a plurality of file patrolling for stolen cars, of several parking content identifier generator asking whether a car with enforcement officers, asking agents, each agent provided license plate number "24680" about an illegally-parked car on a source system and has been reported stolen. with license plate number creating file content IDs "12345." using a mathematical algorithm, via a network" "determining, on the Jones looks at a list of cars The dispatcher looks down a processing system, whether reported stolen to the police, list of license plate numbers each received content generated by all patrol having unpaid tickets, identifier matches a officers, and finds that a car generated from all the city characteristic of other with license plate number enforcement officers, and identifiers" "24680" has been reported as finds that four unpaid tickets stolen. show up for the entry "12345." "outputting, to at least one Jones tells Smith that the The dispatcher replies, "That of the source systems license plate number "24680" vehicle has four outstanding responsive to a request indicates that car has been tickets." from said source system, an reported stolen. indication of the characteristic of the data file based on said step of determining."
(D.I. 699 at 18-19; C.A. No. 12-1581 D.I. 176 at 6-7) The above examples illustrate that the concepts of the '050 patent are directed to an abstract idea and are not necessarily rooted in computer technology.
The analysis above is based solely on the claims, specification, and file history of the '050 patent; what is referred to in the context of claim construction as intrinsic evidence. See Teva Pharms. USA, Inc. v. Sandoz, Inc., ___ U.S. ___, ___, 135 S.Ct. 831, 841, L.Ed.2d (2015). Thus, the Court determines that the asserted claims of the '050 patent are directed to an abstract idea as a matter of law.
The parties have also put extrinsic evidence before the Court. When this additional evidence is considered, it bolsters the conclusions the Court has already reached based solely on the intrinsic evidence: that the asserted claims of the '050 patent are directed to an abstract idea.
The inventors of the '050 patent admitted in deposition testimony that the invention of the '050 patent could be implemented by humans, albeit more slowly and less accurately than it is performed by a conventional computer:
(D.I. 700 Ex. E at 47)
(D.I. 700 Ex. F at 131-32) IV has not identified any contradictory evidence from the patent's inventors.
Instead, as part of its effort to counter the conclusion that the asserted claims of the '050 patent are directed to an abstract idea, IV analogizes its claims to those discussed in recent guidance from the PTO. Specifically, IV cites a hypothetical claim the PTO indicated would be deemed patent eligible by an examiner. See Interim Eligibility Guidance, supra note 6. The PTO's hypothetical claim is directed to creating "sanitized" versions of computer files by "extracting, via file parsing, the malicious code" from computer files. Id. The PTO's example is necessarily rooted in computer technology because malicious code or "viruses" have no significance outside the realm of computer technology. The '050 patent, by contrast, is directed to abstract steps that could generally be performed outside of a computing context.
Thus, the Court disagrees with IV's contention that the asserted claims of the '050 patent are "inextricably tied to computer technology and distinct from the types of concepts found by the courts to be abstract." (D.I. 723-2 at 2) Instead, the Court concludes that — regardless of the standard of proof — the asserted claims of the '050 patent are directed to an abstract idea of receiving identifying information, comparing it to other information, and out-putting an indication based on the identifying information. Thus, it is necessary to proceed to the second step of the analysis.
The asserted claims of the '050 patent may still be patent-eligible if they include an "inventive concept" sufficient to "ensure that the patent in practice amounts to significantly more" than a patent upon an ineligible concept. Alice, 134 S.Ct. at 2355. A "generic computer implementation" recited in the asserted claims, however, will "fail to transform [an] abstract idea into a patent-eligible invention." Id. at 2357. Thus, something other than a generic computer implementation must be identified in order for there to be an inventive concept.
The non-computer limitations common to all of the independent, asserted claims cover the abstract idea of "receiving an identifier for a data file, matching it against previously-received identifiers to ascertain a characteristic of the data file, and outputting a result." (See C.A. No. 12-1581 D.I. 176 at 4-7) "Simply appending conventional steps, specified at a high level of generality, [is] not enough to supply an inventive concept." Alice, 134 S.Ct. at 2357 (internal quotation marks omitted; emphasis in original). At bottom, however, that is all that the limitations of the '050 patent claims do. Thus, the claim limitations common to all independent claims of the '050 patent, including all limitations of independent claim 9, do not include an "inventive concept" under Mayo.
IV points to other limitations found just in certain asserted claims as demonstrating
With respect to claim 16, IV contends that the word "unique" (the "uniqueness limitation") relates to the "hashing" functionality covered by the '050 patent. (C.A. No. 12-1581 D.I. 183 at 22) IV touts the uniqueness limitation as part of an "innovative combination" of limitations that comprise an inventive concept. Id. at 22. But hashing is just one of many mathematical algorithms that could be used to implement the uniqueness limitation of claim 16. According to DDR Holdings, the very case on which IV places such heavy reliance, "[w]e know that mathematical algorithms, including those executed on a generic computer, are abstract ideas." 773 F.3d at 1256; see also '050 patent at 4:2-3; U.S. Pat. No. 5,884,033 (cited in file history of '050 patent and describing use of hashing as early as 1996). The uniqueness limitation does not add an "inventive concept" that would make claim 16 patent-eligible under Mayo.
Similarly, the "characterizing" limitation in claim 22 does not add an inventive concept necessary to save claim 22 from ineligibility. The Court construed the characterizing limitation in claim 22 to mean "classifying the files on the server system by comparing their digital content identifiers to other digital identifiers collected in the database." (D.I. 425 at 13) This is similar to a limitation at issue in CyberSource — reciting "utilizing the map of credit card numbers to determine if the credit card transaction is valid" — which was part of a claim found to be patent-ineligible. See 654 F.3d at 1373. Thus, the characterizing limitation does not qualify as an inventive concept.
Likewise, none of the asserted claims are made patent eligible by the set of alternative steps for outputting either (a) a descriptor of the content (claim 9), (b) an identification of whether or not the message is of a certain type/classification (claim 16), or (c) an indication of the presence or absence of a characteristic (claim 22). Each of these limitations is essentially the same for purposes of the § 101 analysis as each covers communicating descriptive information about content or a message using a generic computer implementation. These limitations are part of the same abstract idea, and none add any inventive concept to the asserted claims.
Nor do the limitations in dependent claims 13, 23, or 24, which limit the independent claims on which they depend to the particular technological environment of SPAM email detection, render these three claims patent eligible. In Alice, the Supreme Court noted that "limiting the use of an abstract idea `to a particular technological environment'" is "not enough for patent eligibility." 134 S.Ct. at 2358. As discussed above, all of the independent claims are directed to an abstract idea. The limitations added in dependent claims 13, 23, and 24 do nothing other than limit the use of the abstract idea to the field of SPAM email detection. These limitations, then, do not add any "inventive concept" and claims 13, 23, and 24 are not patent eligible.
IV argues, "Taken as a whole, these claimed steps [in the asserted claims of the '050 patent] narrowly define a set of actions tied to a specific way of describing file content and classifying computer files." (D.I. 722 at 22 (emphasis added)) However, the combination of limitations pointed to by IV is nothing more than a generic computer implementation of the human-executable abstract idea discussed above. The Court broadly construed key phrases in the '050 patent — including, for example, construing "file content identifier" as anything "reflecting at least a portion of the content of a data file, but not constituting merely an excised portion of that data
IV argues that the asserted claims satisfy the machine-or-transformation test because they use a generic computer for implementation, the "computer (the machine) is critical for implementing the claims of the Patents-in-Suit," and "`none of these limitations could be performed by a human alone.'" (D.I. 183 at 30 (citing Helios Software, LLC v. SpectorSoft Corp., 2014 WL 4796111, at *17 (D.Del. Sept. 25, 2014))
Regarding exclusion of certain patents from eligibility under § 101, the Supreme Court stated in Alice, 134 S.Ct. at 2354, "We have described the concern that drives this exclusionary principle as one of pre-emption." Here, "limiting the abstract concept [of the '050 patent] to a computer implementation and to a specific industry... do[es] not provide additional substantive limitations to avoid preempting the abstract idea." Accenture Global Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 1336, 1345 (Fed.Cir.2013), cert. denied, ___ U.S. ___, 134 S.Ct. 2871, 189 L.Ed.2d 833 (2014). IV has pointed to nothing in the claims or specification of the '050 patent that would adequately alleviate the preemption concerns that arise if the '050 patent claims are deemed patent eligible.
The Court's conclusion that the claims of the '050 patent lack an inventive concept is based solely on the intrinsic evidence, as described above. The extrinsic evidence provides further support for this conclusion. Specifically, the inventors of the '050 patent admitted that hashing was well known at the time of invention of the '050 patent. (See D.I. 700, Ex. E, deposition of Brooks Talley, at 34-37 ("Q .... Do you agree that it's fair to say that prior to the conception of the '050 patent it was well known to use hashing as a way to reduce a large amount of data to a small amount of data to confirm that two data objects were
In light of the foregoing, the Court determines that the asserted claims of the '050 patent are ineligible under § 101.
Asserted claims 1, 17, 21, 22, 24, and 26 are independent; asserted claim 7 depends from claim 1. Claims 1, 7, and 24 are directed to "post office" apparatuses. Claims 17, 21, 22, and 26 are process claims directed to the same basic functionality performed by the components of the asserted apparatus claims.
Independent claim 1 recites as follows:
Independent claims 17 recites:
Independent claim 21 recites:
Independent claim 22 recites:
Independent claim 24 recites:
Independent claim 26 recites:
The asserted claims of the '142 patent cover the following concepts:
Symantec contends that "[t]he asserted claims of the '142 patent represent a classic case of merely `[s]tating an abstract idea while adding the words `apply it with a computer.'" (D.I. 699 at 6 (citing Alice, 134 S.Ct. at 2358)) According to Symantec, "[t]he specification itself discloses that the `invention' consists of applying known methods of reviewing and routing paper documents within a company to email communications." (Id. (citing '142 patent at 1:15-34, 65-67)) The Court concludes that the asserted claims of the '142 patent are directed to human-practicable concepts, which could be implemented in, for example, a brick-and-mortar post office. See generally Walker Digital, 66 F.Supp.3d at 513, 2014 WL 4365245, at *9 (D.Del. Sept. 3, 2014) (finding claims directed to concepts that have "long been practiced by human headhunters and matchmakers" as patent-ineligible under § 101).
IV argues that the '142 patent addresses a problem "specifically arising in the realm of computer networks." (D.I. 722 at 13 (citing DDR Holdings, 773 F.3d at 1257)) Specifically, IV argues that the '142 patent overrides the "fundamental operating paradigm" — of expeditious delivery of messages to their intended recipients — by gating and deferring delivery of email messages based on business rules. (Id.) IV argues that email is meaningfully distinguishable from "snail mail" for purposes of § 101 because email is "done on a computer." (Id.) (emphasis omitted) IV adds that the claim limitations are "necessarily rooted in computer technology," particularly calling out the claim limitations that require "automatically" performing certain actions as purportedly showing that the claims are patent eligible under DDR Holdings. (Id.)
The Court disagrees. Instead, the claims of the '142 patent are in essence directed to generic computer implementation of an abstract idea, which does not make the abstract idea patent eligible.
Addressing each of the asserted claims of the '142 patent individually is unnecessary since "all the claims are `substantially similar and linked to the same abstract idea.'" Content Extraction, 776 F.3d at 1348 (quoting and approving district court's analysis of representative claim limitations). Each of the limitations summarized above is directed to an abstract idea previously implemented in brick-and-mortar post offices. Moreover, each of the collections of human-executable concepts in the asserted claims is directed to the same abstract idea of implementing post office functionality via a computer.
Limitations of '142 Patent Claim 17 Routine Steps Performed in a Corporate [language from claim 21 inserted in Mailroom brackets] "providing to a post office a set of business The central corporate mailroom at Acme rules derived from business communication Corporation has a set of business rules for policies, each business rule defining an action handling correspondence addressed to people applied to an email message based on the in the company. The rules are posted on the attribute of the message" mailroom wall for mailroom employees to consult. "receiving messages at the post office" The mailroom receives correspondence addressed to the corporation or its employees. "to at least one message received at the post One of the business rules of the corporation is office, applying the business rules to the that correspondence addressed to the CEO is attributes of the message to determine at least always sent to an administrator for review one action of deferring delivery to be applied unless it has been marked as "Personal" on to the message" the front of the envelope. In one instance, the mailroom receives an incoming letter without such a marking. "automatically combining the e-mail message A mailroom employee tasked with stamping with a new distribution list specifying at least incoming mail stamps the envelope, "Deliver one destination post office for receiving the to Administrator: CEO, Not Personal" email message for review by an administrator associated with the destination post office and a rule history specifying at least one business rule determined to be applicable to the e-mail message; and" "automatically delivering the [] message to a In the next round of hourly deliveries, destination post office on the distribution list mailroom staff delivers the letter to the instead of a specified recipient of the [] administrator's mail drop instead of the CEO message." suite. ["delivering each non-selected e-mail The mailroom staff delivers messages message to its specified recipients"] (claim directly, without any deferral, to other Acme 21) employees.
(C.A. No. 12-1581 D.I. 176 at 19-20)
"receiving the e-mail message at a first post All letters addressed to ABC Manufacturing office, the email message having at least one are directed to company's mail room. The specified recipient" mailroom receives a letter addressed to ABC Mfg.'s CEO. "deferring the e-mail message by: ABC Mfg. has a rule that any letters automatically combining the selected e-mail addressed to the CEO should be opened and message with a new distribution list scanned for content. If the letter is from a specifying at least one second post office for potential customer requesting a price quote, it receiving the email message for review by is to be delivered to the shop foreperson. an administrator associated with the second Other letters are to be delivered to the CEO's post office and a rule history specifying assistant. The clerk in the mail room opens a at least one business rule determined to be letter and determines it is a request for a price applicable to the e-mail message; and" quote. He attaches a routing slip to the letter that specifies (1) it should be directed to the shop foreperson and (2) it requests a price quote. "automatically delivering the selected e-mail The letter is delivered to the shop message to an administrator at the second foreperson, not to the CEO. post office on the distribution list instead of a specified recipient of the e-mail message" "persistently storing the e-mail message at the The foreperson places the letter in a file that second post office until the e-mail message is will remind him to review the letter in two reviewed" days. "automatically reviewing the e-mail message Two days later, the shop foreperson reviews after a specified time interval to determine an the request for a price quote to determine action to be applied to the e-mail message; whether the proposal is one that ABC wants and" to respond to. He determines that it is. "automatically applying the action to the e-mail ABC prepares a price quote and sends to the message." prospective customer. ["delivering each non-selected e-mail Letters addressed to other ABC employees message to its specified recipients"] (claim are delivered directly, without any deferral, to 21) addressees.
(D.I. 699 at 10-11)
IV argues that these analogies are inaccurate, as the analogies — unlike the asserted patent claims — are not limited to "email" messages. But the suggestion that this makes the claims patent eligible is unavailing. As Defendants observe, in Alice the Supreme Court found ineligible patent claims that were purely computer oriented, as did the Federal Circuit in Ultramercial and Content Extraction. (See, e.g., Tr. at 56) Aside from the limitations
As with the '050 patent, the Court's conclusion that the asserted claims of the '142 patent fail Mayo's step 1 is derived solely from the claims, specification, and file history. Additionally, as with the '050 patent, the parties have provided extrinsic evidence. Again, this extrinsic evidence confirms the Court's conclusion that the asserted claims are directed to an abstract idea.
In particular, Trend Micro quotes from IV's technology tutorial, submitted June 5, 2012 (C.A. No. 12-1581 D.I. 177, Ex. E at 49), to show that even IV believes that, conceptually, the "post office" components, which are central to implementing the asserted claims, are "not much different" from brick-and-mortar U.S. Post Offices. In the tutorial, IV told the Court:
(Id.) (emphasis added) IV has no convincing response to Defendants' argument, nor does it supply any persuasive countervailing extrinsic evidence.
Thus, the Court concludes that the asserted claims of the '142 patent are directed to an abstract idea of implementing well-known post office functionality using a computer. The Court will turn its attention to step 2.
Symantec argues that "[t]he asserted claims of the '142 patent do not clear the § 101 hurdle by including an `inventive concept' that transforms them into something significantly more than the abstract concept itself." (D.I. 699 at 12) "To the contrary," Symantec continues, "the specification emphasizes that the asserted claims can be implemented on a conventional network, using conventional computers that run conventional operating systems and conventional e-mail clients." (Id. at 12 (citing '142 patent at 3:25-26, 5:46-47, 5:49, 9:51-58)) Echoing these contentions, Trend Micro argues that "the asserted claims add no more than well-understood, conventional computer processing to practice the claimed abstract ideas in an automated setting." (C.A. No. 12-1581 D.I. 176 at 22) IV responds by focusing on the fact that the '142 patent "does not preempt every application of filtering email" (D.I. 722 at 19) and asserting that the '142 patent's limitations are quite detailed.
"A patent need not ... preempt an entire field to run afoul of § 101." Gametek LLC v. Zynga, Inc., 2014 WL 1665090, at *5 (N.D.Cal. Apr. 25, 2014). "[A]lthough courts have framed the `second-step' analysis in terms of preemption, there is no rule that ideas that do not preempt an entire field are per se patent eligible. Rather, the test as articulated by Alice is that there must be an inventive contribution on top of the underlying abstract idea."
Applying these legal principles here, the Court agrees with Symantec and Trend Micro that the asserted claims of the '142 patent disproportionately tie up use of the patent's underlying ideas. The fact that the '142 patent does not preempt the entire field of email filtering does not render the claims per se patent eligible.
Alluding to DDR Holdings, IV argues that the specificity of the "ordered combination of elements ... overrides email's conventional `unabated delivery' paradigm." (D.I. 722 at 19) But DDR Holdings is distinguishable at least because the claims at issue in that case were "necessarily rooted in computer technology ... to overcome a problem specifically arising in the realm of computer networks." 773 F.3d at 1257. The asserted claims of the '142 patent are not "necessarily rooted" in computer networks. Instead, as explained above, the steps of the asserted claims may be performed by humans, with the exception of generic computer-implemented steps that cannot serve as an inventive concept. Stating an abstract idea while adding the limitation "apply it with a computer," which is what is essentially done in the asserted claims, is insufficient.
IV cites DDR Holdings also to argue that the claims "do not merely recite the performance of some business practice known from the pre-Internet world along with a requirement to perform it on the Internet." Id. at 1257. But the core problem addressed by the '142 patent is the need to intercept and defer delivery of messages. This problem existed long before the Internet or the '142 patent. "[T]he basic character of a process claim drawn to an abstract idea is not changed by claiming only its performance by computers...." CyberSource, 654 F.3d at 1375.
IV points to the "rule engine" in some of the asserted claims as evidence that the '142 patent cannot be implemented on a "conventional" computer. (D.I. 722 at 20-21) But the rule engine and all other components listed in the claims may be implemented purely in software and executed on any generic computer. (See, e.g., '142 patent at 5:43-62, 6:51-55 (reciting "conventional" computer implementation)) Unlike with the sample PTO claims on which IV relies (see D.I. 723-2 at 2), the '142 patent's implementation is not "inextricably tied to computer technology and distinct from the types of concepts found by the courts to be abstract." Nor does the '142 patent's implementation supply an inventive concept under part two of the Mayo test.
IV also argues that the claims satisfy the machine-or-transformation test. But IV does not, and cannot, point to any specific machine used to implement any of the asserted claims. The claims are drawn only to a generic computer implementation of an abstract idea. Thus, again, the Court concludes that the asserted claims of the '142 patent lack an inventive concept.
In light of the foregoing analysis, the Court finds that the asserted claims of the '142 patent are ineligible under § 101.
Asserted claim 7 of the '610 patent is a method claim that depends from claim 1.
Dependent claim 7 recites as follows:
Symantec and Trend Micro argue that the '610 patent is directed to "screening data" and "screening information." (D.I. 699 at 25; C.A. No. 12-1581 D.I. 176 at 24) Symantec states that the "key idea of the '610 patent is the business concept of providing conventional virus screening as a subscription service to customers." (D.I. 699 at 23) IV counters Defendants' arguments by again alluding to DDR Holdings, stating that Symantec and Trend Micro "cannot legitimately dispute that computer viruses are `a problem specifically arising in the realm of computer networks' and computers." (C.A. No. 12-1581 D.I. 183 at 19) IV insists, "The human mind cannot screen for computer viruses within the telephone network or elsewhere." (Id. at 20) (emphasis added)
The Court agrees with IV. The '610 patent is not directed to screening generic "data" or "information." Instead, the asserted claim specifically recites a computer virus, which has computer-centric implications that cannot be abstracted away so broadly. Furthermore, the human mind cannot perform the steps described in the specification for implementing virus screening functionality in a telephone network. For these and other reasons, as explained below, the Court is unpersuaded by Defendants' analysis.
The specification of the '610 patent describes how implementing claim 7 requires at least three computers configured in a specific manner, as depicted (for example) in the flowcharts (and accompanying text) shown as Figures 3, 4, and 5 (excerpted below). ('610 patent at 5:12-9:22)
Figure 3 is "an embodiment of a virus screening method in accordance with the present invention." (Id. at 5:12-13) Figure 3 shows that "computer data" is received from a "first party" ("calling" or "sending" party). The computer data is destined for a "second party" ("called," "client," or "receiving" party). It is inherent that this disclosure includes a computer for both the first and second parties. In block 102, the method of the patent determines whether or not virus screening should be applied to the computer data based on, for example, whether or not "the called party is a subscriber
Figure 4 is a "preferred embodiment of a method of screening the computer data" that performs some initial processing of the data (i.e., removing transmission-specific data from the computer data, decompressing, and decrypting the data). (Id. at 6:15-17, Fig. 4) The method in Figure 4 then "create[s] a model of a computer," as indicated in block 206. (Id. at Fig. 4) "The model is provided by a virus screening computer other than the client computer." (Id. at 7:66-67) This virus screening computer is a third computer; it could not be the sending computer (since virus detection takes place "within the telephone network" but the sending computer is not within the telephone network. (Id. at 3:14-16; see also D.I. 425 at 24-25 (construing "within the telephone network" to mean "in the voice or data network connecting the calling party and called party, exclusive of the networks and gateway nodes of the called party and calling party"))
"An embodiment of a method of creating the model is described with reference to FIG. 5" (shown above). (Id. at 8:9-10) As shown in Figure 5, block 210 determines certain parameters of the receiving computer, including "operating system, a hardware type, registry information, configuration information, and information from initialization files," in order to create an accurate model of the receiving computer in the virus screening computer's memory. (Id. at 8:14-17) If the computer data includes "an executable program such as an installation program or a plug-in program for a Web browser, the executable program is installed" on the virus screening computer. (Id. at 8:5-7) During installation, "a step of intercepting read requests generated by the installation program is performed." (Id. at 8:29-30) The virus screening computer analyzes the model computer in order to reply to these read requests appropriately. "The reply message is generated by gathering information from the model of the client computer[] and passing the information to the installation program." (Id. at 8:35-38) Similarly, the virus screening computer intercepts write requests from the executable program and modifies the model
The result of the steps described above is a model of the client computer stored in the virus screening computer's memory. The model reflects the general state that the client computer would have been in had it executed the potentially virus-laden code. Virus screening techniques can then be applied to the model computer, as shown in block 220 in Figure 4, in order to determine whether the model computer has been infected.
Although the embodiment described in the specification with respect to Figures 3, 4, and 5 is not the only way to implement claim 7, it is necessary in practicing the claim to in some way imitate the receiving computer's configuration in order to properly detect whether a harmful virus in an executable file may infect the receiving computer. The coordination between a virus detecting computer, a sending computer, and a receiving computer is something "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks." DDR Holdings, 773 F.3d at 1258-59.
Further, the specification confirms that the '610 patent is directed to solving the problem of individual computer users having periodically to update their virus detection software locally on their computers in order to ensure adequate protection from computer viruses. (See '610 patent at 1:10-23) The patent is also directed to problems of users having to be concerned about viruses getting downloaded onto their computers via the Internet. As the specification of the '610 patent describes:
(Id. at 1:59-67)
The Federal Circuit in DDR Holdings, 773 F.3d at 1259, held that the "Internet-centric" claims at issue there were patent eligible. Claim 7 of the '610 patent is "Internet-centric." In fact, the key idea of the patent is that virus detection can take place remotely between two entities in a telephone network. This is advantageous because it saves resources on the local caller and calling machines and more efficiently executes virus detection at a centralized location in the telephone network. Claims that "purport to improve the functioning of the computer itself' or "effect an improvement in any other technology or technical field" may be patentable under § 101. Alice, 134 S.Ct. at 2359.
As with the other patents, Defendants provide hypothetical showing why they believe the asserted claim of the '610 patent is patent-ineligible. Unlike with respect to the '050 and '142 patents, however, the analogies are not persuasive. Nonetheless, the Court reproduces them below:
Limitations of '610 Patent Claim 1 Routine Steps Performed by a World War [language from claim 7 inserted in II Post Office brackets] "routing a call between a calling party and a The Postal Service determines the best path for called party of a telephone network" delivering a letter sent by Adam, a U.S. Army soldier stationed in Great Britain during 1944, to Beth, who lives in Wilmington. "receiving, within the telephone network, The Postal Service receives a letter from Adam computer data from a first party selected addressed to Beth. from the group consisting of the calling party and the called party" "[determining that virus screening is to be The Postal Service determines that because applied to the call based upon at least one of Adam's letter is not "diplomatic mail," the an identification code of the calling party and letter is to be screened to ensure that it does an identification code of the called party]" not disclose military secrets. "detecting, within the telephone network, a The postal inspector opens the letter and virus in the computer data; and" concludes that a reference to "a trip to Paris in June" must be censored. "in response to detecting the virus, inhibiting The post office redacts the reference and communication of at least a portion of the forwards the rest of the letter to Beth. computer data from the telephone network to a second party selected from the group consisting of the calling party and the called party."
(D.I. 699 at 25-26)
Limitations of '610 Patent Claim 1 Routine Steps Performed by Phone [language from claim 7 inserted in Answering Service brackets] "routing a call between a calling party and a Bob is a subscriber to Acme Answering called party of a telephone network" Service ("Acme"), which connects telephone calls through to Bob's various phone lines or takes messages pursuant to his instructions. "receiving, within the telephone network, Bob's patient Mary places a call to Bob; Acme computer data from a first party selected receives the call. from the group consisting of the calling party and the called party" "[determining that virus screening is to be Acme confirms that the called party is Bob applied to the call based upon at least one of prior to screening the call. an identification code of the calling party and an identification code of the called party]" "detecting, within the telephone network, a The operator on duty at Acme asks Mary if she virus in the computer data; and" has an emergency; she says no. "in response to detecting the virus, inhibiting Acme does not forward the call to Bob, but communication of at least a portion of the instead takes down Mary's number and computer data from the telephone network to indicates that her call will be returned. a second party selected from the group consisting of the calling party and the called party."
(C.A. No. 12-1581 D.I. 176 at 26-27)
Trend Micro further analogizes the asserted claims to the claims at issue in Vehicle Intelligence and Safety LLC v. Mercedes-Benz USA, LLC, 78 F.Supp.3d 884, 893-94, 2015 WL 394273, at *8 (N.D.Ill. Jan. 29, 2015). In Vehicle Intelligence, the claims were directed to "methods for screening equipment operators for impairment (e.g., intoxication, physical impairment, medical impairment, or emotional impairment) to prevent their operation of moving equipment" and were found to be directed to an abstract idea. (C.A. No. 12-1581 D.I. 176 at 27)
The Court finds all of Defendants' hypotheticals unpersuasive. The Court did not construe the phrase "detecting ... a virus in the computer data" from claim 7, as no party asked the Court to do so. (See D.I. 425) Nevertheless, it is evident from the specification that the steps for detecting a computer virus in a telephone network are not as straightforward as observing individuals for signs of intoxication, reading wartime correspondence, or asking someone if she is having an emergency. For example, the specification of the '610 patent describes, in one embodiment, "installing downloaded data using the virus-screening processor" such that "viruses can be detected in installed data (which may differ from the downloaded data)." ('610 patent at 14:18-21) This is, of course, merely one possible implementation of claim 7 and does not limit the plain and ordinary meaning of the claim language, but it is also the type of functionality that is "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks." DDR Holdings, 773 F.3d at 1257. The concept of detecting a computer
For the reasons stated above, and particularly in light of DDR Holdings, Defendants have failed to prove that claim 7 is directed to an abstract idea.
It is not necessary for the Court to consider step two of the Mayo test, since the asserted claim of the '610 patent is not directed to an abstract idea. However, the Court notes that the specification of the '610 patent recites a specific machine configured in a specific way to implement claim 7, as discussed above with regard to Figure 3, 4, and 5 of the '610 patent and accompanying sections of the specification. Thus, the '610 patent satisfies the machine-or-transformation test, which is an important clue that the claim includes an inventive concept and is not directed to patent-ineligible subject matter.
IV states that "virus detection `within the telephone network' would not be preempted if a call were not routed between the calling party and the called party or if computer data were not received within the telephone network, as required by the claim language." (C.A. No. 12-1581 D.I. 183 at 27) IV continues: "[T]he '610 Patent captures only one form of virus detection, and its continued eligibility will not preclude the use of other virus detection techniques — even if they occur `within the telephone network.'" (Id.) The Court agrees with IV that the asserted claim of the '610 patent does not disproportionately preempt virus detection.
Additionally, claim 7 recites "inhibiting communication of at least a portion of the computer data," which indicates that the claim covers situations where the virus detecting computer is excising virus-infected code. This is similar to the PTO's patent eligible sample claim directed to excising malignant software code, which the PTO described as "inextricably tied to computer technology and distinct from the types of concepts found by the courts to be abstract." (See D.I. 723-2 at 2) Excising virus-infected code is something that requires a machine that "play[s] a significant part in permitting the claimed method to be performed, rather than function[ing] solely as an obvious mechanism for permitting a solution to be achieved more quickly." SiRF Tech., 601 F.3d at 1333.
Hence, again, the Court concludes that Defendants have failed to prove by even a preponderance of the evidence that the asserted claim of the '610 patent is patent-ineligible under § 101. The Court will deny Defendants' motions with respect to IV's '610 patent.
For the reasons given above, the asserted claims of the '050 and '142 patents are directed to patent-ineligible subject matter under 35 U.S.C. § 101. The Court will grant Symantec and Trend Micro's motions to the extent that it will order that
Appropriate orders follow.
At Wilmington this
For the reasons set forth in the Memorandum Opinion issued this same date,
IT IS HEREBY ORDERED that:
1. Defendant Symantec Corporation's ("Symantec") Motion for Patent Invalidity Under 35 U.S.C. § 101 of U.S. Patent Nos. 6,460,050 (the "'050 patent"), 6,073,142 (the "'142 patent"), and 5,987,610 (the "'610 patent") (D.I.698) is
2. The parties shall meet and confer and submit a joint status report, including their proposal(s) for further proceedings and/or order(s), no later than
At Wilmington this
For the reasons set forth in the Memorandum Opinion issued this same date,
IT IS HEREBY ORDERED that:
1. Trend Micro Incorporated and Trend Micro, Inc. (USA)'s ("Trend Micro") Motion for Judgment of Invalidity Under 35 U.S.C. § 101 of U.S. Patent Nos. 6,460,050 (the "'050 patent"), 6,073,142 (the "'142 patent"), and 5,987,610 (the "'610 patent") (D.I. 175) is
2. In light of the fact that a pretrial conference is scheduled for Friday, April 24, and trial is scheduled to begin on May 11, the parties shall meet and confer and advise the Court, by joint letter, no later than