T.S. ELLIS, III, District Judge.
In this patent infringement case, N5 Technologies LLC ("N5"), the owner of
Following full briefing and oral argument on the claim term disputes, an Order issued on August 16, 2013 selling forth, for reasons stated from the bench, the claim construction determinations. N5 Techs, v. Capital One, 1:13-cv-386 (E.D.Va., Aug. 16, 2013) (Order); N5 Techs, v. Capital One, 1:13-cv-386 (E.D.Va., Aug. 16, 2013) (Tr.). Thereafter, on September 27, 2013 plaintiff's motion for reconsideration of the claim construction determination was denied. N5 Techs, v. Capital One, 1:13-cv-386 (E.D.Va., Sept. 27, 2013) (Order). This memorandum opinion records the reasoning in support of the claim construction determinations.
Plaintiff N5, a Virginia limited liability company with its principal place of business in Manassas, Virginia, is the sole owner of the '297 patent, issued in 2007, titled "Authentication Method for Enabling a User of a Mobile Station to Access to Private Data or Services." N5, in the current vernacular, is a non-practicing entity claiming, without opposition, to own all right, title, and interest in the '297 patent.
Defendants Capital One, N.A. and Capital One Bank (USA), N.A. are federally-chartered banking institutions with their principal places of business in McLean, Virginia. Defendant Capital One Services, LLC is a Delaware corporation with its principal place of business in McLean, Virginia. Capital One, N.A., Capital One Bank (USA), N.A., and Capital One Services, LLC are sued collectively for infringement and are referred to collectively herein as "defendants."
The '297 patent, which consists of 18 claims, recites a method for authenticating the user of a mobile station, i.e. a cell phone, to allow that user to access private information stored on a private server by sending a text message request from the user's mobile station. Plaintiff alleges that defendants' mobile banking service infringes on the claimed method of the '297 patent. Defendants' mobile banking service allows customers to access account information, such as their balance or the last transaction posted to their account, by sending a text message from an authenticated mobile station. On October 25, 2012, plaintiff filed a complaint in the United States District Court for the Eastern District of Texas, alleging that defendants' mobile banking services infringe independent Claim 1, and dependent claims 2, 3, 4, 6, 8, 9, and 10 of the '297 patent. On March 25, 2013, the case was transferred to this district.
The sole independent claim and the claim in which all disputed claim terms appear is Claim 1, which "provides a method for accessing private data or services
The parties dispute the meaning of two claim terms and the order in which certain steps are to be performed. The disputed portions of Claim 1, in bold above, are:
Over the nearly two decades since Markman, the elucidation of claim construction principles has become well-plowed ground, although the plowed furrows have not always been straight lines. Nonetheless, the claim construction principles pertinent here are now well-settled. They are as follows:
First, and importantly, "the claim construction analysis must begin and remain centered on the claim language itself because a "bedrock principle" of patent law is that "the claims of a patent define the invention to which the patentee
Importantly, the claim construction effort should focus first on the intrinsic evidence, and only if that evidence does not yield the answer should a court proceed to extrinsic evidence. Vitronics, 90 F.3d at 1583. Of course, courts may always use extrinsic evidence to aid their understanding of the patent technology. See Markman v. Westview Instruments, Inc., 52 F.3d 967, 980 (Fed.Cir.1995) affd, 517 U.S. 370, 116 S.Ct. 1384, 134 L.Ed.2d 577 (1996) ("The court may, in its discretion, receive extrinsic evidence in order to aid the court in coming to a correct conclusion as to the true meaning of the language employed in the patent.") (internal quotation marks omitted). With respect to intrinsic evidence, the Federal Circuit has recognized that the specification is "the single best guide to the meaning of a disputed term" and is often "dispositive." Phillips, 415 F.3d at 1315. Yet, courts must be cautious in using the specification to avoid limiting the scope of the claims by importing limitations of such embodiments into the scope of the claims. In this respect, there is "a fine line between reading a claim in light of the specification, and reading a limitation into the claim from the specification." Id. at 1323. Indeed, to read "a limitation from the written description into the claims" is a "cardinal sin" of patent claim construction. SciMed Life Sys., Inc. v. Advanced Cardiovascular Sys., Inc., 242 F.3d 1337, 1340-41 (Fed. Cir.2001).
It is true, of course, that "a patentee is free to be his own lexicographer" and to give claim terms his own specific meaning. Markman, 52 F.3d at 980. When a patentee acts as his own lexicographer, he may "use terms in a manner other than their ordinary meaning[.]" Vitronics, 90 F.3d at 1582. Importantly, a patentee acting as his own lexi-cographer
Thus, the claim construction analysis here begins with the application of these principles to the disputed claim terms. But importantly, as the Federal Circuit has noted, these "axioms themselves seldom provide an answer, but instead merely frame the question to be resolved." Liebel-Flarsheim Co. v. Medrad, Inc., 358 F.3d 898, 904 (Fed.Cir.2004). Indeed, the Federal Circuit's guidance on claim construction does "not attempt to provide a rigid algorithm, but simply attempt[s] to explain why, in general, certain types of evidence are more valuable than others." Phillips, 415 F.3d at 1324. It remains now to apply these principles to the three portions of Claim 1 in dispute here.
The first disputed claim term is the phrase "user unique identifier." Col. 6, ll. 55-56. The parties' proposed constructions are:
The parties' competing constructions make clear that three aspects of this phrase are at issue: (i) whether it is "data" or "a combination of characters" that must be used to identify a user; (ii) whether a "user" must necessarily be an "individual mobile station user;" and (iii) whether the phrase "including a user alias or any other uniquely identifying field allocated to a particular user in a directory/database" should be included in the definition of "user unique identifier."
Plaintiff argues that the term should be defined as "data" that identify a user uniquely, while defendants argue that the term should be defined as "a combination of characters" that identifies a user uniquely. In their briefs, defendants assert that "a combination of characters" is the proper definition because the user unique identifier constitutes part of the text-based request message, which consists solely of characters. Yet, the specification explicitly defines the user unique identifier as "data": "the user unique identifier is a data [sic] that identify the user uniquely." Col. 6, 11. 13-14. Moreover, at oral argument, it became evident that there is no genuine dispute regarding use of "data" vs. "a combination of characters." When asked if defendants have any problem with replacing "a combination of characters" with "data," counsel for defendants responded, "[n]one whatsoever." N5 Techs, v. Capital One, 1:13-cv-386 (E.D.Va., Aug. 16, 2013) (Tr.) at 18. Likewise, when asked to explain the difference between the two terms, plaintiffs counsel asserted
The next component that requires definition is whether "user" specifically references an "individual mobile station user" as defendants propose. Plaintiff argues that "user" should not be accompanied by any modifiers. Once again, the specification provides a clear resolution to the dispute. The specification states that "the authentication part comprises a unique identifier of the mobile station number." Col. 3, 11. 26-28. The specification provides further support as it explains that the authentication portion of the request message contains "a unique mobile station user identifier for the authentication of the mobile station user." Col. 5, 11. 30-32. Thus, the specification makes clear that a "user" is a "mobile station user."
Significantly, there is no support in the patent for defendants' contention that the user unique identifier necessarily pertains to an individual mobile station user, as opposed to a group of individuals or an entity. When questioned on this point during oral argument, defendants admitted that the patent "doesn't say the word "individual" and that no intrinsic evidence directly supports importing the word "individual" into the definition of "user unique identifier." N5 Techs, v. Capital One, 1:13-cv-386 (E.D.Va., Aug. 16, 2013) (Tr.) at 29. Accordingly, "user" in the context of "user unique identifier" is properly construed simply as "mobile station user."
The final portion of the disputed phrase that must be considered is plaintiffs addition of "including a user alias or any other uniquely identifying field allocated to a particular user in a directory/database." Plaintiff proposes this addition based on language in the specification, which reads: "The user unique identifier can be the user alias, or any other uniquely identifying field allocated to this particular user in the ldap directory." Col. 6, ll. 13-16.
Yet, importing this language from the specification into the claim, as plaintiff suggests, poses two problems. First, the language in the specification provides two examples of what could constitute a "user unique identifier," but the specification itself does not define the term. Thus, reading this specification language into the claim would impermissibly constitute "reading a limitation from the written description into the claims," which is "one of the cardinal sins of patent law." SciMed Life, 242 F.3d at 1340. And second, any argument that the patentee is acting as his own lexicographer is unavailing. To act as his own lexicographer, the patentee must state clearly in the specification that a definition is provided for a claim term that is outside the term's ordinary meaning. Vitronics, 90 F.3d at 1582. The specification of the '297 patent fails to do so. Furthermore, even if the patentee were acting as his own lexicographer, plaintiff would not be free to modify the patentee's definition as plaintiff has done here. Plaintiff does not propose to import the relevant language verbatim from the specification, but rather broadens the language to reference "a particular user in a directory/database" rather than the narrower specification language "this particular user in the ldap directory." Accordingly, plaintiff's
In sum, "user unique identifier" is defined as "data that uniquely identifies a mobile station user."
The parties next dispute the meaning of the term "checking the authenticity of the user." Col. 6, l. 46. The parties' proposed constructions are:
Plaintiffs proposed construction, which repeats, nearly verbatim, steps that appear just a few lines later in Claim 1, would result in a redundant construction wherein the same language is first used to define the term and then again in the steps required to performed the defined term.
The Federal Circuit has established that a district court may decline to construe a term beyond its plain and ordinary meaning when doing so does not leave unresolved questions of meaning and/or scope. See Finjan, Inc. v. Secure Computing Corp., 626 F.3d 1197, 1207 (Fed.Cir.2010). Finjan held that although a district court must construe a term when there is more than one ordinary meaning or where there is an unresolved dispute as to scope,
Analysis next proceeds to the most consequential dispute at issue here; namely, whether the two steps enumerated in Claim 1 must be performed in the order in which they are written. Plaintiff argues that the steps may be performed in any order, while defendants contend that the steps must be performed in the order stated in the claim.
The Federal Circuit has developed a two-step analysis to determine whether the steps of a method claim must be performed in a particular order where, as here, the claim does not explicitly require that order:
If neither logic or grammar nor the specification requires that the steps be performed in the order written, "the sequence in which [the] steps are written is not a requirement." Altiris, 318 F.3d at 1370. Here, grammar, logic, and the specification all point persuasively to the conclusion that the steps of Claim 1 must be performed in the order stated in the claim.
It is settled Federal Circuit law that when a past participle used in one step of a method claim references an action that occurred in a previous step, those steps must be performed in the order written. See Tuna Processors, Inc. v. Hawaii Intern. Seafood, Inc., 327 Fed.Appx. 204, 209 (Fed.Cir.2009) (holding that because "[i]n each step of the method, the smoke is
It is clear that the use of the past participle "stored" to refer to the user unique identifier "stored in the private directory database" in step 2 describes the checking that occurred in step 1. Furthermore, while step 1 references
Logic also dictates that the steps must be performed in the order written. If the two steps, as written, were reversed so that step 2 were performed before step 1, step 1 would effectively be read out of the patent because the system would necessarily end up performing step 1 in the course of performing step 2. If the order of the steps were reversed, they would be written as follows:
It is apparent from stating the steps in reverse that the result is illogical; checking whether the user unique identifier is stored in a private directory database logically must come first. In the process of checking whether the appended user mobile station number matches with the mobile station number allocated to the user unique identifier stored in the private database, the system must necessarily first check whether the user unique identifier is stored in the database. In other words, the system cannot cross reference the stored user unique identifier without first finding the user unique identifier in the database. Reversing the order of step 1 and step 2, therefore, would create an illogical construction.
Furthermore, Claim 1 provides that the system checks the authenticity of the user "based on the request message received by the server." Col. 6, 1. 46. Pursuant to the claimed system, the user unique identifier is part of the request message. The mobile station number, on the other hand, is appended to the request message but is not part of the message itself. Defendants correctly argue that for the system to check the authenticity of the user "based on the request message," the system must perform its initial authenticity check based on information that is contained in the request message itself (the user unique identifier), rather than information that is
Plaintiff's argument that the steps may be performed in any order, distilled to its essence, is that it would be logically possible to design a system that performs the mobile station number check before the user unique identifier check. The function of the claimed system, plaintiff contends, is to perform a crosscheck between the user unique identifier and the mobile station number, and so the fact that that Claim 1 provides for checking of the user unique identifier before checking of the mobile station number is a "mere design choice." Pl.'s Mot. For Recons. Br. at 8. The fatal flaw in this argument is that although it may be entirely possible that a system that checks the mobile station number before the user unique identifier functions nearly identically to the system recited by the '297 patent, the '297 patent itself explicitly recites a system that first checks the user unique identifier and then verifies that against the mobile station number. And, "in accord with settled practice [courts] construe the claim as written." Chef Am., Inc. v. Lamb-Weston, Inc., 358 F.3d 1371, 1374 (Fed.Cir.2004). Accordingly, logic dictates that the steps of Claim 1 must be performed in the order written. See Altiris, 318 F.3d at 1369-70 (holding that logic may determine that steps must be performed in the order stated in the claim).
As the Federal Circuit has made clear, in addition to the logic and grammar of a claim, the specification must be reviewed to ascertain whether it "directly or implicitly requires" that the steps be performed in the order recited. Interactive Gift, 256 F.3d at 1343. Here, the specification lends additional support for the conclusion that step 1 must be performed before step 2. In this regard, the specification explains that "[i]f the user unique identifier is not present in the private directory database DB, then an error sequence is generated by the processing server . . . and access to private data or services is denied." Col. 4, ll. 19-22. Thus, the specification explicitly provides that if the system does not successfully complete step 1, it stops and fails to complete step 2. Moreover, the specification continues: "After this successful private directory look-up, a second checking is performed. . . . This second check consists in comparing the user mobile station number attached to the request message with the user mobile station number assigned to the user unique identifier and stored in the private directory database DB." Col. 4, ll. 37-42 (emphasis added). The specification thus directly requires that the steps in Claim 1 be performed in the order written, and indeed provides that if the system fails to complete step 1, it generates an error message and fails to proceed to step 2.
Defendants assert that, in addition to the language of the claim and specification, the doctrine of prosecution disclaimer bars plaintiff from arguing that the order of the steps in Claim 1 may be reversed. See Biogen Idee, Inc. v. GlaxoSmithKline LLC, 713 F.3d 1090, 1095 (Fed.Cir.2013) ("[W]hen the patentee unequivocally and unambiguously disavows a certain meaning to obtain a patent, the doctrine of prosecution history disclaimer narrows the meaning of the claim consistent with the scope of the claim surrendered.").
During the prosecution of the '297 patent, the inventors distinguished the
Although defendants' prosecution disclaimer argument is unavailing, this does not alter the conclusion that the grammar and logic of Claim 1, coupled with the teaching of the specification, clearly establish that the steps of Claim 1 must be completed in the order written.
In summary, for the reasons stated, the disputed portions of Claim 1 are determined to have the following constructions:
An Order issued on August 16, 2013 setting forth these claim construction determinations. N5 Techs, v. Capital One, 1:13-cv-386 (E.D.Va., Aug. 16, 2013) (Order).
Plaintiff's proposed construction for "checking the authenticity of the user" (emphasis added):
steps comprising: