LEONIE M. BRINKEMA, District Judge.
Before the Court are the parties' cross-motions for summary judgment concerning the defendant's affirmative defenses of invalidity and inequitable conduct [Dkt. Nos. 392 and 399]. For the reasons explained below, defendant IBM's Motion for Summary Judgment of Inequitable Conduct and Invalidity [Dkt. No. 392] will be denied in all respects by an Order to be issued with this Memorandum Opinion. The Court will defer ruling on the majority of plaintiff TecSec's Motion for Summary Judgment on Defendant's Affirmative Defenses of Invalidity and Inequitable Conduct [Dkt. No. 399], but will deny TecSec's Motion for Summary Judgment to the extent that TecSec seeks summary judgment that Roy Follendore is not an inventor of the '702 (DCOM) family of patents, or that IBM cannot prove inequitable conduct with respect to the '702 patent family. Those issues present genuine disputes of material fact between the parties, and must therefore be resolved at trial.
The plaintiff in this patent infringement case, TecSec, Inc. ("TecSec"), is a Virginia corporation with its principal place of business in McLean, Virginia. TecSec's primary business is the development of encryption and security techniques; it has designed, developed, and sold a number of cryptography and security-related products since its founding in 1990, and has been awarded more than thirty United States patents in the field of encryption. See Second Amend. Compl. ¶¶ 20-25.
In this civil action, TecSec asserts that defendant International Business Machines Corporation ("IBM") and several other named defendants have infringed one or more of the claims of six of its patents, in violation of 35 U.S.C. § 271 et seq.
Id. ¶ 1. Plaintiff seeks relief in the form of a permanent injunction enjoining the defendants and all of their affiliates from infringing the patents-in-suit, along with an award of all appropriate damages, including treble damages for defendants' alleged willful infringement, and attorneys' fees and costs pursuant to 35 U.S.C. § 285.
On August 16, 2010, IBM filed its First Amended Answer, which includes a number of affirmative defenses. IBM asserts, inter alia, that the four DCOM patents are unenforceable due to inequitable conduct committed by the applicant, M. Greg Shanton ("Shanton"), and his attorneys before the United States Patent and Trademark Office ("PTO") in failing to disclose the alleged role of a former TecSec employee, Roy D. Follendore, III ("Follendore"), in inventing the DCOM encryption methods set forth in the '702 patent family. See IBM's First Amend. Answer and Affirmative Defenses to Pl. TecSec's Second Amend. Compl. ("Def.'s First Amend. Answer") at 34-41. IBM also contends that the patentee and his attorneys engaged in inequitable conduct in connection with the '433 (XML) patent by failing to disclose prior art regarding XML digital signature technology, and that they engaged in inequitable conduct relating to the '488 (Parallel Processor) patent by failing to disclose prior art references concerning a Motorola AIM chip to the PTO, and by falsely claiming small entity status to avoid paying the required fees. See id. at 41-49. Additionally, IBM asserts that the '433 patent and the '448 patent are invalid because they were anticipated by various prior art, and that certain claims in the '433 patent do not comply with the written description requirement of 35 U.S.C. § 112. See id. at 32-34. Accordingly, IBM argues that all of the patents-in-suit in this case are invalid and unenforceable.
On November 15, 2010, the parties filed their cross-motions for summary judgment solely on the issue of defendant's asserted defenses of inequitable conduct and invalidity. This Memorandum Opinion will primarily address the issues raised in IBM's
For the reasons explained below, the Court will deny defendant IBM's Motion for Summary Judgment in all respects, and will in fact grant summary judgment in TecSec's favor on the issues raised by IBM with regard to the '433 and '448 patents. The Court will deny summary judgment for either party on the matter of the alleged unenforceability of the '702 family of patents due to inequitable conduct, and that issue will proceed to trial so that the jury may resolve the genuine and material factual disputes between the parties.
Summary judgment is appropriate where the record demonstrates "that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law." Fed. R.Civ.P. 56(c). A genuine issue of material fact exists "if the evidence is such that a reasonable jury could return a verdict for
Thus, if a nonmoving party bears the burden of proof on a claim at trial, the moving party may prevail on its Rule 56 motion by showing that there is a lack of evidence to carry the other party's burden as to any essential element of the cause of action. See Celotex Corp. v. Catrett, 477 U.S. 317, 322-23, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986); Cray Commc'ns Inc. v. Novatel Computer Sys., Inc., 33 F.3d 390, 393-94 (4th Cir.1994). Once the moving party has met its burden of demonstrating the absence of an issue of material fact, the party opposing summary judgment may not rest on mere allegations or inferences, but must instead proffer specific facts or objective evidence showing that a genuine issue of material fact exists requiring further proceedings. Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 586, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986).
In the briefing on their cross-motions for summary judgment, the parties raised the issue of the proper construction of the term "object" as it is used in the '702 (DCOM) patents. In particular, the parties offer different interpretations of that term as it relates to "object encryption" and the "object-oriented key managers" described in those patents. Specifically, IBM argues that "object" means "any distinct, separate entity," while TecSec proposes a definition of "object" as "necessarily sub-file level data" that must be "nested in other data." Compare IBM's Opp. to PI. TecSec's Mot. for Partial Summ. J. at 5-13 to Br. in Supp. of PI. TecSec's Mot. for Partial Summ. J. on Def.'s Affirmative Defenses of Invalidity and Inequitable Conduct at 18 (emphasis added).
The district court has the "power and obligation to construe as a matter of law the meaning of language used in the patent claim." Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed.Cir. 1995), aff'd, 517 U.S. 370, 116 S.Ct. 1384, 134 L.Ed.2d 577 (1996). As a starting point, a claim term is to be given the "ordinary and customary meaning" it would have had to a person of ordinary skill in the art at the time of the invention. Phillips v. AWH Corp., 415 F.3d 1303, 1312-13 (Fed.Cir.2005) (en banc); see also Dow Chemical Co. v. Sumitomo Chem. Co., Ltd., 257 F.3d 1364, 1372 (Fed.Cir. 2001). To determine that meaning, the court must first look to how the words of the claims themselves define the scope of the patented invention, and then look to "those sources available to the public that show what a person of skill in the art would have understood [the] disputed claim language to mean." Phillips, 415 F.3d at 1314; see also Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582-83 (Fed.Cir. 1996). The court must construe the entire claim, including any preamble, so long as it gives life and meaning to the invention claimed. See Pitney Bowes, Inc. v. Hewlett-Packard Co., 182 F.3d 1298, 1305 (Fed.Cir.1999).
For some claim terms, the ordinary meaning may be readily apparent, and construction of those terms therefore "involves little more than the application of the widely accepted meaning of commonly
The parties in this case dispute the meaning of "object" in claim 1 of the '702 patent, which describes:
Ex. A3 ('702 patent) at 12:2-15. For the reasons explained below, the term "object" will be construed to mean "any distinct, separate entity." That definition includes, but is not limited to, files, sub-files, documents, text, and other types of data entities, some of which maybe nested in other data.
This interpretation is fully consistent with how the patentee defined "object" in the '702 patent specification and during patent prosecution. It is well established that "[t]he patentee is free to act as his own lexicographer, and may set forth any special definitions of the claim terms in the patent specification or file history, either expressly or impliedly." Schoenhaus v. Genesco, Inc., 440 F.3d 1354, 1358 (Fed. Cir.2006); see also Irdeto Access, Inc. v. Echostar Satellite Corp., 383 F.3d 1295, 1300 (Fed.Cir.2004); Home Diagnostics, Inc. v. LifeScan, Inc., 381 F.3d 1352, 1356 (Fed.Cir.2004). In this case, as part of the "Summary of the Invention" section of the patent specification, the patentee explained that "[i]n the context of the present invention, an object can come in a vast number of forms, shapes, or sizes." Ex. A3 at 3:43-44. By way of specific example, the patentee stated that:
Id. at 3:47-57. In light of the breadth of the examples provided, the '702 patent specification defines the term "object" as "any distinct, separate entity," indicating that:
Id. at 3:58-4:2.
Construing "object" to mean "any distinct, separate entity" is also consistent with the prosecution history of the '702 patent. To obtain allowance of the claims during patent prosecution, the patentee specifically referred to relevant technical dictionaries defining "object" as "any distinct, separate entity." For example, the PTO originally rejected claim 1 as indefinite because the examiner noted that "it is unclear what is meant by each use of the word `object.'" Ex. D3 at IBMTS002635653. To overcome this objection, the '702 patentee amended the specification to define the claimed "object" as "any distinct, separate entity," explaining that that definition was "well known to those of ordinary skill in the art." Id. at IBMTS002635672. In support of that argument, the patentee expressly cited to Peter Dyson's The PC User's Essential Accessible Pocket Dictionary (hereinafter "Dyson dictionary"). Id.; see also Ex. D2 at 374 (Dyson dictionary definition of "object" as "[a]ny distinct, separate entity"). In view of the supplemented definition, the PTO withdrew its rejection of claim 1 of the '702 patent. Ex. D3 at IBMTS002635680.
The patentee's stated definition of "object" thus constitutes an express definition for purposes of claim construction, and it is black-letter law that the patentee's definition conclusively governs. See Medrad, Inc. v. MRI Devices Corp., 401 F.3d 1313, 1318 (Fed.Cir.2005) ("A patentee may define a particular term in a particular way, and in that event the term will be defined in that fashion for purposes of that particular patent, no matter what its meaning in other contexts.") (citation omitted); see also Honeywell Int'l. Inc. v. Universal Avionics Sys. Corp., 493 F.3d 1358, 1361 (Fed.Cir.2007) ("When a patentee defines a claim term, the patentee's definition governs.").
Finally, that definition is consistent with how TecSec itself defined "object" in prior litigation relating to the '702 patent. For example, in the Protegrity infringement case, TecSec argued in its claim construction brief that:
Ex. D5 (TecSec's Claim Construction Brief in TecSec Inc. v. Protegrity, Inc., No. 2:01cv233 (E.D.Va.)) at 10. For all those reasons, the Court will construe the term "object" to mean "any distinct, separate entity."
That definition can thus embrace a broad range of distinct digital entities, including files, folders, sub-files, images, and even single lines of text. The Court rejects, however, TecSec's suggested definition that an object is "necessarily sub-file level data" that must be "nested in other data." See Br. in Supp. of PI. TecSec's Mot. for Partial Summ. J. on Def.'s Affirmative Defenses of Invalidity and Inequitable Conduct at 18 (emphasis added). TecSec's narrow definition is inconsistent with the intrinsic evidence discussed above, and with the many examples of "objects" provided in the patent specification, which includes numerous examples of documents and other complete files, in addition to some sub-file level data. See Ex. A3 at 3:51-53 (describing "executable files, video files, binary files, text files, data files, container files, graphic files, application file(s), [and] Library files" as examples of "objects"); see also id. at 5:3-7 (distinguishing between "container" and "non-container" objects). It also contradicts the deposition testimony of the named inventor, Shanton, who confirmed during questioning that a file can qualify as an object in accordance with the DCOM invention. See Ex. D4 at 114:13-14 ("Q: Is a file an object? A: Yes."). TecSec's definition of "object" thus does not square with the record and must be rejected. See, e.g., Oatey Co. v. IPS Corp., 514 F.3d 1271, 1276-77 (Fed.Cir.2008) ("We normally do not interpret claims in a way that excludes embodiments disclosed in the specification.... At least where claims can reasonably [be] interpreted to include a specific embodiment, it is incorrect to construe the claims to exclude that embodiment, absent probative evidence [to] the contrary.") (citations omitted).
The primary argument that IBM advances in its Motion for Summary Judgment
To prevail on an affirmative defense of inequitable conduct, IBM must meet a very high burden. The Federal Circuit has repeatedly indicated that inequitable conduct defenses are disfavored, particularly at the summary judgment stage. See Leviton Mfg. Co. v. Universal Sec. Instruments, Inc., 606 F.3d 1353, 1358 (Fed.Cir.2010) ("We rarely affirm a grant of summary judgment of inequitable conduct, and in those cases where we have affirmed, the applicants did something other than fail to disclose a commonly owned application or related litigation."); see also Burlington Indus. Inc. v. Dayco Corp., 849 F.2d 1418, 1422 (Fed.Cir.1988) (declaring that "the habit of charging inequitable conduct in almost every major patent case has become an absolute plague"). Accordingly, a party asserting inequitable conduct must prove by clear and convincing evidence that the applicant or his attorneys breached a duty of candor and good faith by failing to disclose material information or submitting materially false information to the PTO, and that the failure to disclose or the submission of materially false statements was done with an intent to mislead or deceive the patent examiner. Advanced Magnetic Closures, Inc. v. Rome Fastener Corp., 607 F.3d 817, 829 (Fed.Cir.2010).
In the context of an inequitable conduct claim, intent to deceive can sometimes be "inferred from the facts and circumstances surrounding the conduct at issue." Cargill, Inc. v. Canbra Foods, Ltd., 476 F.3d 1359, 1364 (Fed.Cir.2007) (citations omitted). However, summary judgment on an allegation of inequitable conduct is only available if there is clear and convincing evidence of "a failure to supply highly material information and if the summary judgment record establishes that (1) the applicant knew of the information; (2) the applicant knew or should have known of the materiality of the information; and (3) the applicant has not provided a credible explanation for the withholding." Ferring B.V. v. Barr Labs. Inc., 437 F.3d 1181, 1191 (Fed.Cir.2006) (emphasis added). Moreover, at the summary judgment phase, intent to deceive the PTO cannot simply be one inference that can be drawn from the facts. Rather, it must be "the single most reasonable inference able to be drawn from the evidence to meet the clear and convincing standard." Star Scientific, Inc. v. R.J. Reynolds Tobacco Co., 537 F.3d 1357, 1366-67 (Fed.Cir.2008).
In this case, IBM has presented evidence raising several significant questions as to whether Shanton and his attorneys were fully forthcoming during prosecution of the '702 family of patents. According to IBM, Follendore was one of the pioneering developers of an "object-oriented key management" software
Moreover, Follendore's '707 patent, like the '702 family of patents, deals with a "method and apparatus for ensuring the security of messages communicated on a network" by labeling, encrypting, and storing digital data "to ensure that communication integrity is. not breached." Ex. Al (Abstract). Although the parties dispute the nuances of the various similarities and differences in the encryption methods disclosed by the '707 patent and the '702 patent family, the patents do contain some strikingly similar language in several of their claims. For example, claim 1 of Follendore's '707 patent claims, inter alia;
Ex. Al at 15:39-16:42; see also Ex. All (matching those elements to the '702 patent in respective highlighted colors). Similarly, claim 8 of the '702 patent claims:
Ex. A3 at 12:47-13:19; see also Ex. All (matching those elements to Follendore's '707 patent in respective highlighted colors).
Despite those and other similarities, Shanton and his attorneys did not specifically disclose Follendore's '707 patent application as material prior art during their prosecution of the '702 family of patents, nor did they ever indicate to the PTO that Follendore might later raise a claim to inventorship or co-inventorship of the subject matter described in the '702 DCOM patents. Rather, Shanton represented that he was the sole inventor of the technology claimed in the '702 family of patents. See Ex. A7 at IBMTS-0000219-20; Ex. A9 at IBMTS-002635789-90 (Shanton's sworn declarations to the PTO stating that he believed himself to be the "original, first, and sole inventor" of the DCOM technology described in the '702 family of patents). Indeed, Shanton's attorneys, Jon L. Roberts and Thomas Champagne, represented Shanton to be the sole inventor of those patents throughout the '702 patent prosecution process, despite the fact that they had previously prosecuted Follendore's '707 patent application, see Exs. A1-A2, and had received some communications from Follendore indicating that he might be claiming joint inventorship of the '702 patent family, see, e.g., Ex. A34 at HK2025682-83 (letter from Follendore's attorney to Roberts disputing inventorship and ownership rights).
Taken together, IBM's evidence regarding TecSec's conduct during its '702 patent prosecution raises significant concerns. The proper inventorship of a claimed invention is highly material to patentability, and misrepresentations regarding inventorship, if true, could easily render a patent unenforceable due to inequitable conduct. See Advanced Magnetic, 607 F.3d at 830 (citing PerSeptive Biosystems, Inc. v. Pharmacia Biotech, Inc., 225 F.3d 1315, 1321 (Fed.Cir.2000)); see also Leviton, 606 F.3d at 1360 (holding that representations regarding inventorship can be material). Likewise, the copying of claims from another's patent application without disclosing that to the PTO Examiner raises significant suspicions of invalidity or inequitable conduct. See Leviton, 606 F.3d at 1360 ("Had the examiner been aware that different Leviton employees each claimed to be first inventors of the same subject matter recited in the same claims, it would have raised serious questions regarding
However, at this stage of the litigation, IBM cannot carry its burden to establish inequitable conduct by clear and convincing evidence. The Federal Circuit has consistently held that "without some type of corroborating evidence, an alleged inventor's testimony cannot satisfy the `clear and convincing evidence' standard." Price v. Symsek, 988 F.2d 1187, 1194 (Fed.Cir. 1993); see also Hess v. Advanced Cardiovascular Sys., Inc., 106 F.3d 976, 980 (Fed. Cir.1997). In this case, IBM's arguments rest to a considerable degree on the testimony of Follendore himself, who alleges that he invented the DCOM technology and should have been credited as an inventor of the '702 DCOM patents. See Ex. A23 (Follendore deposition). Follendore, however, is a former TecSec employee who was previously involved in litigation against TecSec over the rights to another product TecSec was developing, called "NetShield"; in fact, TecSec alleges that in the course of that dispute, Follendore unlawfully removed the NetShield software code from various TecSec computers in an effort to obtain leverage over TecSec and to improve his bargaining position during settlement negotiations. See Pl.'s Br. in Opp. at 28-29; see also Ex. B-7 at 182:21-183:20 (testimony from Follendore admitting that he cleared software code from Shanton's computer). Follendore thus comes to this case with potentially serious credibility baggage.
Moreover, IBM's efforts to rely on the contemporaneous documentary evidence in this case also fail to establish inequitable conduct by clear and convincing evidence, at least at the summary judgment stage. IBM argues that various documents, such as a "2020 Paper" authored by Follendore, a PowerPoint presentation regarding NetShield, a NetShield Feasibility Study, and e-mails to and from Follendore describing a technological development called "OOKeyMan" conclusively demonstrate that Follendore invented the DCOM technology claimed in the '702 patent application before that application was filed. See Def.'s Mot. for Summ. J. at 13-19. The core of IBM's argument reduces to the following set of assertions: because many of the contemporaneous documents that Follendore authored contain references to "OOKeyMan," an acronym which stands for "object-oriented key management" encryption, and because the patents in the '702 patent family also refer to "object-oriented key managers," it necessarily follows that Follendore invented the technology claimed in the '702 patents.
However, as TecSec responds, those arguments may very well be based upon a flawed factual premise. Specifically, the documentary evidence suggests that "OOKeyMan" and the DCOM ("Distributed Cryptographic Object Method") system of encryption are not always synonymous. Rather, the term "OOKeyMan" was a trademark registered by TecSec in 1996, which TecSec then used to identify multiple "computer programs" for "security and privacy of files and data on a computer system or network." Ex. A-9 at HK0025529-30 (emphasis added); see also Ex. B-4 at 268:5-21 (explaining the many different ways in which TecSec used the term "OOKeyMan"). OOKeyMan thus appears to be a generic, umbrella acronym that was employed by TecSec to describe its products in various marketing schemes; indeed, TecSec even developed a caveman-type cartoon character called "OOKey-Man," which it used as an image in TecSec presentations and as a figurine that it left behind after those presentations concluded. See Ex. B-8 at 86:19-88:6; Ex. C-4 at ¶ 2. Under these circumstances, the documentary evidence submitted by the parties regarding inventorship is far from conclusive.
Ex. A3 at 2:58-61. The Federal Circuit has consistently held that disclosure of a reference to the PTO within the specification of a patent application is indicative of lack of intent to deceive. See, e.g., Bayer A.G. v. Housey Pharm., Inc., 128 Fed. Appx. 767, 771 (Fed.Cir.2005); Andrew Corp. v. Gabriel Elecs., Inc., 847 F.2d 819, 823-24 (Fed.Cir.1988); Vandenberg v. Dairy Equip. Co., 740 F.2d 1560, 1568 (Fed.Cir.1984). And while the disclosure of Follendore in the '702 patent application could perhaps have been more prominent, it did not go unnoticed by the PTO Examiner. Rather, the Examiner's handwritten initials and notations suggest that he actually looked up and reviewed the Follendore patent application (which eventually became the '707 patent) before taking action on the '702 patent application. See Ex. A-7 at IBMTS00000200 (showing Examiner's initials and his handwritten insertion of the Jan. 27, 1993 filing date of Follendore's patent application).
Finally, TecSec has at least a plausible argument that Shanton and his attorneys did not fail to disclose Follendore out of a desire to deceive the PTO, but rather because they genuinely believed that Follendore's patent application described different technology and thus was not invalidating prior art. In fact, the '702 patent application identifies several important distinctions between the technology described therein and Follendore's '707 patent. Specifically, the '702 patent application states that in contrast to the '707 patent invention, it provides "a system that can limit access on an object level," such that "[a]ccess could be specified on an object-by-object basis, and objects could be embedded within other objects, providing an access hierarchy for users." Ex. A-1 at 2:58-66 (emphasis added). By contrast, the '707 patent appears to provide only for secure encryption at the file or document level, and does not claim the ability to encrypt, label, or control data "objects," which could include both files and sub-files.
Accordingly, intent to deceive the PTO Examiner is not the "single most reasonable inference able to be drawn from the evidence" on the record at this time, and summary judgment for IBM on its affirmative defense of inequitable conduct is therefore inappropriate. Star Scientific, 537 F.3d at 1366-67; see also Leviton, 606 F.3d at 1353 (concluding that "inequitable conduct cannot be found where the patentee offers a plausible, good faith explanation for why the nondisclosed information was not cited to the PTO." (internal citations and quotations omitted)). At the very least, genuine factual issues preclude a grant of summary judgment here, where credibility determinations must be made to determine the proper weight to accord to the "he said; he said" testimony of Follendore and Shanton, both of whom claim exclusive inventorship of the same invention. For those reasons, both IBM's and TecSec's motions for summary judgment regarding IBM's allegations of inequitable conduct in the prosecution of the '702 family of patents will be denied, and that issue will proceed to trial.
IBM next moves for summary judgment of invalidity with respect to the '433 (XML) patent. Specifically, IBM argues that claims 1-8 and 10-11 of that patent are anticipated by U.S. Patent No. 7,010,681 ("Fletcher"), and that claims 9 and 12 of the XML patent are invalid for failure to comply with the written description requirement of 35 U.S.C. § 112. See Def.'s Mot. for Summ. J. at 31-40. Neither argument is persuasive, and IBM's Motion for Summary Judgment on the '433 patent will therefore be denied.
To meet the requirements of patentability, an alleged invention must be new. See C.R. Bard, Inc. v. M3 Sys., Inc., 157 F.3d 1340, 1349 (Fed.Cir.1998). In fact, under the plain text of 35 U.S.C. § 102(e), an applicant is not entitled to a patent for an invention if "the invention was described in... a patent granted on an application ... filed in the United States before the invention by the applicant." Accordingly, if a prior art reference discloses the same invention as a challenged patent, the challenged patent may be held invalid because of that prior art. See Celeritas Tech., Ltd. v. Rockwell Int'l Corp., 150 F.3d 1354, 1361 (Fed.Cir.1998).
A patent will only be declared invalid due to anticipation if "each and every limitation" of the patent is found "either expressly or inherently in a single prior art reference." IPXL Holdings, L.L.C. v. Amazon.com. Inc., 430 F.3d 1377, 1381 (Fed.Cir.2005) (citation omitted). The prior art reference must disclose all of the claim elements arranged or combined in the same way as recited in the challenged patent. See Net MoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359, 1369 (Fed. Cir.2008). Moreover, the prior art reference must "clearly and unequivocally disclose the claimed [invention] ... without any need for picking, choosing, and combining various disclosures not directly related to each other by the teachings of the cited reference." Sanofi-Synthelabo v. Apotex, Inc., 550 F.3d 1075, 89 U.S.P.Q.2d 1370, 1375 (Fed.Cir.2008) (emphasis in original). Finally, issued patents are entitled to a presumption of validity by virtue of their approval by the PTO, and a challenger thus bears a heavy burden of proving invalidity by clear and convincing evidence. See Nat'l Presto Indus., Inc. v. West Bend, Co., 76 F.3d 1185, 1188 (Fed. Cir.1996).
In this case, IBM asserts that TecSec's '433 patent is invalid because claims 1-8 and 10-11 are anticipated by the prior art disclosed in U.S. Patent No. 7,010,681 ("Fletcher"). As a threshold matter, Fletcher does pre-date the '433 patent. The '433 patent was issued on February 17, 2004, from an initial application filed on October 20, 1999. See Ex. Bl. TecSec contends, however, that the invention described in the '433 patent was first conceived in or about April 1999. See Ex. B3 at 4. The earliest possible date for the identification of invalidating prior art is therefore April 1999. The patent application that led to Fletcher was filed on January 29, 1999, see Ex. B2, meaning that it qualifies as potential prior art under 35 U.S.C. § 102(e), regardless of whether the Court accepts the April 1999 or the October 20, 1999 date of invention for the '433 patent.
IBM cannot, however, carry its weighty burden to demonstrate by clear and convincing evidence that Fletcher anticipates each of the challenged claims of the '433 patent. Like the '433 patent, Fletcher deals, in a general sense, with the interrelation between encryption and Extensible Markup Language ("XML") tags.
TecSec's '433 patent describes "[a] secure accounting and operational method," designed to address the situation that "[a]s more businesses adopt electronic systems and interact electronically with vendors and customers, the ability to reliably audit... transactions is greatly diminished." Ex. Bl at Abstract, 2:50-53. The '433 patent provides one solution to that problem by allowing for the recording of input and output data as encrypted objects, thereby "ensur[ing] data integrity." Id. at 1:42-44. To achieve that goal, the '433 patent teaches formatting data objects with an Extensible Markup Language, which "uses tags to label data objects as to meaning." Id. at 5:13-27. The '433 patent uses those tags, at least in part, to select a security level or cryptographic scheme for the system's output objects, which can then be encrypted according to the schemes determined by each object's XML tag. See id. at 5:61-67; 6:16-21. The final encrypted objects are then either passed to, or stored for, appropriate persons, devices, or other systems to which access has been granted. Id. at 5:67-6:3; 6:20-24. According to TecSec, the XML-based selection process disclosed in the '433 patent thereby provides the flexibility needed to encrypt objects using tailored, element-specific encryption algorithms for different data objects. See PI. TecSec's Brief in Opp. to IBM's Mot. for Summ. J. of Invalidity and Inequitable Conduct ("Pl.'s Br. in Opp.") at 40.
Fletcher is also directed to a method or system for using XML tags, in part, to select encryption levels applied to a document. See Ex. B2 (Abstract). However, in Fletcher, unlike in the '433 patent, those tags are used to delimit certain sections of a file or document for filtering or removal based on defined security parameters.
Fletcher and the '433 patent are thus different from one another in important ways. The method described in Fletcher achieves the desired level of data security at the file or document level, by creating a new, but incomplete, version of the original file or document based upon the types of information that the user is entitled to access, and then encrypting that new file or document as a whole for transmission or storage. In contrast, the asserted claims of the '433 patent require the selection and labeling of individual objects with XML tags, such that different portions of a file or document can be encrypted and decrypted at various hierarchical levels, while the underlying file or document itself remains intact. In sum, the '433 patent selects XML elements and encrypts at
IBM also argues that claims 9 and 12 of the '433 patent are invalid for failure to comply with the written description requirement of 35 U.S.C. § 112. Specifically, paragraph 1 of 35 U.S.C. § 112 requires that "[t]he specification shall contain a written description of the invention," such that a person of ordinary skill in the art would recognize that the inventor possessed the claimed invention at the time of the original filing. 35 U.S.C. § 112 at ¶ 1; see also Moba, B.V. v. Diamond Automation, Inc., 325 F.3d 1306, 1320-21 (Fed.Cir.2003).
The purpose of the written description requirement is to prevent overreaching by the applicant, and to ensure that the public and future inventors have meaningful notice of the scope of the claimed invention. See Univ. of Rochester v. G.D. Searle & Co., 358 F.3d 916, 920 (Fed.Cir.2004); see also ICU Med. Inc. v. Alaris Med. Sys., Inc., 558 F.3d 1368, 1377 (Fed.Cir.2009). However, upon issuance, a patent is presumed to be valid and to comply with the written description requirement. See Intirtool, Ltd. v. Texar Corp., 369 F.3d 1289, 1294 (Fed.Cir.2004). Accordingly, a challenger has the burden of proving by clear and convincing evidence that a patent does not contain an adequate written description to support its claims. Id.; see also Invitrogen Corp. v. Clontech Labs., Inc., 429 F.3d 1052, 1072 (Fed.Cir.2005).
In this case, IBM devotes a mere two paragraphs of its 60-page Motion for Summary Judgment to the argument that the '433 patent specification lacks a sufficient written description of claims 9 and 12. IBM's argument rests exclusively on the fact that claims 9 and 12 refer, inter alia, to "another Extensible Markup Language," Ex. B1 at 8:34-35; 8:58-59 (emphasis added), but "nothing in the '433 patent application, as filed, disclosed or suggested more than one Extensible Markup Language." See Def.'s Mot. for Summ. J. at 40-41.
In the context of the '433 patent, however, IBM's argument reduces to mere semantic quibbling. In fact, the evidence in this case, particularly when viewed in the light most favorable to TecSec, indicates that the '433 patent fully complies with the written description requirement. After
The precise XML languages are therefore immaterial to the invention claimed by the '433 patent, as is IBM's manufactured distinction between the phrases "another Extensible Markup Language" and "the Extensible Markup Language." See Def.'s Mot. for Summ. J. at 40 (comparing Ex. B1 at 8:34-35; 8:58-59 to Ex. B1 at 5:14-16). The crucial point is that the '433 patent claims the ability to migrate between languages and syntaxes, and a person of ordinary skill in the art would therefore have understood the '433 patent to provide ample written description of the invention. Significantly, the PTO examiner evidently agreed that claims 9 and 12 provided sufficient written description, and therefore approved the patent. IBM's half-hearted efforts to undermine the validity of claims 9 and 12 therefore fail, and summary judgment will in fact be granted in TecSec's favor because IBM cannot meet its burden of showing insufficient support for claims 9 and 12 by clear and convincing evidence.
IBM's final argument in its Motion for Summary Judgment is that claims 1-18 of TecSec's '448 (Parallel Processor) patent are invalid due to prior art. Specifically, IBM moves for summary judgment that U.S. Patent No. 7,600,131 ("Krishna") discloses or anticipates all of the limitations of claims 1-18 in the '448 patent, and that the '448 patent is therefore invalid and unenforceable pursuant to 35 U.S.C. § 102(e).
The Krishna patent application was filed on July 6, 2000, meaning that it pre-dates the '448 patent, which was issued on June 27, 2006, based upon an application filed on December 5, 2001. See Ex. CI; Ex. C2. TecSec contends that the subject matter of the '448 patent was invented in or about September 2001. See Ex. B3 at 4. However, even using TecSec's alleged invention date of September 2001, Krishna could potentially qualify as invalidating prior art under 35 U.S.C. § 102(e).
Additionally, there are some superficial similarities between the two patents. The '448 patent is directed to "context-oriented cryptographic processing in a parallel processing environment." Ex. C1 at 1:38-40. In particular, claims 1-18 of the '448 patent describe and claim a specific method for cryptographic processing of input data in a parallel processing environment to increase the speed of the encryption or decryption process. The '448 patent thus claims that its method meets "a need for an efficient manner of effectuating cryptographic processing." Id. at 2:2-3. Similarly, the Krishna patent describes an "architecture for a cryptography accelerator chip" that "enables parallel processing of packets through a plurality of cryptography engines." Ex. C2 at 2:12-18. Krishna also claims that its architecture "allows significant performance improvements over previous prior art designs," and that it is configured "to efficiently process encryption/decryption of data packets." Id. (Abstract).
First, the '448 patent discloses a system and method that uses something called a "format filter" to extract "control data," such as a document header, and "main data," such as document text, from the original "input data" (which includes both the control and main data), and then uses cryptographic parameters that were set based on the control data to direct the distribution of the main data to each of a number of different processors for encryption or decryption. See Ex. C1 at 2:20-42; 3:48-4:52; Fig. 1, claim 1. The simultaneous processing of the main data in separate processors allows for more efficient encryption and decryption of large amounts of data, and at the conclusion of the process, the data output from each processor is then recombined to provide the integrated "output data." Id. As described by TecSec, the separation of the control and main data enables the processors to work with a relatively lightened load as they encrypt or decrypt the main data, without sacrificing data content or security. See Pl.'s Br. in Opp. at 49-50. The "format filter" that performs that separation function is thus crucial to the operation of the '448 patent, which is why claims 1-18 all require a "format filter adapted to extract control data and main data from the input data." See Ex. C1.
Like the '448 patent, the Krishna patent also describes a system for using multiple processors to encrypt or decrypt data simultaneously. However, in contrast to the '448 patent, Krishna does not utilize a format filter, nor does it extract control data and main data from the original input data. IBM claims that something called an "Input FIFO 302" functions as a "format filter," and that it is adapted to extract header information from packets of data, just as the '448 patent extracts control and main data from input data. See Def.'s Mot. for Summ. J. at 46-48. However, the method disclosed in Krishna in fact merely uses the "input FIFO" as a buffer, which holds data in place until a processor is available to begin processing it. In short, as Krishna receives packets of data, it simply sends the next packet to the next available processor, in a "round-robin fashion," without regard to what is in the packet. See Ex. C2 at 6:21-41 (describing the "round-robin" and "per flow ordering" system used by Krishna). Indeed, far from functioning as a system for extraction of various types of data, the record evidence indicates that the term "FIFO" in Krishna's "Input FIFO 302" means nothing other than "First In, First Out." See Ex. B-9 at 206:21-24 ("Q: What is a FIFO? A: FIFO is a hardware term for `first in, first out' buffer."). The "input FIFO" in Krishna therefore does not perform the functionality that IBM claims; instead, it just ensures that the data packets remain in order, and that the first packet of data that enters the buffer is the first packet to be sent out of the buffer for processing.
Moreover, the independent claims of the '448 patent also require the presence of something called a "control unit," which must forward a "control parameter" and a "cryptographic parameter" to each of the plurality of processors. See, e.g., Ex. C1 at 6:32-35. Specifically, the '448 patent repeatedly refers to the step of "forwarding, based at least in part on the control data, at least one respective control parameter and at least one respective cryptographic parameter to each of the plurality of processors." Id. at 7:8-11. Claims 1-9 of the '448 patent specifically require that
For all these reasons, the term "object" in the '702 (DCOM) family of patents will be construed to mean "any distinct, separate entity." Defendant IBM's Motion for Summary Judgment of Inequitable Conduct and Invalidity [Dkt. No. 392] will be denied in all respects by an Order to be issued with this Memorandum Opinion, and plaintiff TecSec's Motion for Summary Judgment on Defendant's Affirmative Defenses of Invalidity and Inequitable Conduct [Dkt. No. 399] will be denied in part as to the issues of the inventorship dispute regarding the '702 (DCOM) patents and the alleged inequitable conduct in the prosecution of the '702 patent family. The Court will rule on the remaining issues raised in TecSec's Motion for Summary Judgment in a later Memorandum Opinion.
Finally, although TecSec did not affirmatively move for summary judgment in its favor regarding IBM's affirmative defenses of invalidity of the '433 patent due to anticipation by Fletcher and failure to comply with the written description requirement, or IBM's affirmative defense of invalidity of the '448 patent due to anticipation by Krishna, the Court finds as a matter of law that IBM cannot meet its burden of proof on those affirmative defenses, and summary judgment will therefore be granted in TecSec's favor on those matters.