Uniloc Luxembourg S.A. et al v. Corel Inc., No. 6:2012cv00968 - Document 115 (E.D. Tex. 2014)

Court Description: MEMORANDUM OPINION AND ORDER. The Court adopts the claim constructions for the patent-in-suit. Signed by Magistrate Judge K. Nicole Mitchell on 12/15/14. (mll, )

Download PDF
Uniloc Luxembourg S.A. et al v. Corel Inc. Doc. 115 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS TYLER DIVISION UNILOC LUXEMBOURG S.A., et al., Plaintiffs, v. COREL INC., et al., Defendants. § § § § § § § § § CIVIL ACTION NO. 6:12-cv-968 JURY TRIAL DEMANDED MEMORANDUM OPINION AND ORDER This Memorandum Opinion construes the disputed claim terms in United States Patent No. 7,024,696 (the ’696 Patent). On September 18, 2014, the parties presented arguments on the disputed claim terms at the Markman hearing. The Court resolves the claim term disputes as stated and for the reasons discussed below. BACKGROUND On December 21, 2012, Plaintiffs Uniloc Luxembourg S.A. and Uniloc USA, Inc. (collectively “Uniloc”) filed the lead action captioned above and its action (6:12-cv-972) against PerkinElmer, Inc. (“PerkinElmer”), the only remaining Defendant in the consolidated case. Uniloc alleges that Defendant infringes the ’696 Patent, entitled “Method and System for Prevention of Piracy of a Given Software Application Via a Communications Network.” The patented technology relates to techniques for preventing piracy of software applications, such as limiting the application’s functionality until it is activated by a remote service provider. Dockets.Justia.com APPLICABLE LAW “It is a ‘bedrock principle’ of patent law that ‘the claims of a patent define the invention to which the patentee is entitled the right to exclude.” Phillips v. AWH Corp., 415 F.3d 1303, 1312 (Fed. Cir. 2005) (quoting Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1115 (Fed. Cir. 2004)). The Court examines a patent’s intrinsic evidence to define the patented invention’s scope. Id. at 1313–14; Bell Atl. Network Servs., Inc. v. Covad Commc’ns Group, Inc., 262 F.3d 1258, 1267 (Fed. Cir. 2001). Intrinsic evidence includes the claims, the rest of the specification, and the prosecution history. Phillips, 415 F.3d at 1312–13; Bell Atl. Network Servs., 262 F.3d at 1267. The Court gives claim terms their ordinary and customary meaning as understood by one of ordinary skill in the art at the time of the invention. Phillips, 415 F.3d at 1312–13; Alloc, Inc. v. Int’l Trade Comm’n, 342 F.3d 1361, 1368 (Fed. Cir. 2003). Claim language guides the Court’s construction of claim terms. Phillips, 415 F.3d at 1314. “[T]he context in which a term is used in the asserted claim can be highly instructive.” Id. Other claims, asserted and unasserted, can provide additional instruction because “terms are normally used consistently throughout the patent.” Id. Differences among claims, such as additional limitations in dependent claims, can provide further guidance. Id. “[C]laims ‘must be read in view of the specification, of which they are a part.’” Id. (quoting Markman v. Westview Instruments, Inc., 52 F.3d 967, 979 (Fed. Cir. 1995)). “[T]he specification ‘is always highly relevant to the claim construction analysis. Usually, it is dispositive; it is the single best guide to the meaning of a disputed term.’” Id. (quoting Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed. Cir. 1996)); Teleflex. Inc. v. Ficosa N. Am. Corp., 299 F.3d 1313, 1325 (Fed. Cir. 2002). In the specification, a patentee may define his own terms, give a claim term a different meaning than it would otherwise possess, or disclaim or 2 disavow some claim scope. Phillips, 415 F.3d at 1316. Although the Court generally presumes terms possess their ordinary meaning, this presumption can be overcome by statements of clear disclaimer. See SciMed Life Sys., Inc. v. Advanced Cardiovascular Sys., Inc., 242 F.3d 1337, 1343–44 (Fed. Cir. 2001). This presumption does not arise when the patentee acts as his own lexicographer. See Irdeto Access, Inc. v. EchoStar Satellite Corp., 383 F.3d 1295, 1301 (Fed. Cir. 2004). The specification may also resolve ambiguous claim terms “where the ordinary and accustomed meaning of the words used in the claims lack sufficient clarity to permit the scope of the claim to be ascertained from the words alone.” Teleflex, Inc., 299 F.3d at 1325. For example, “[a] claim interpretation that excludes a preferred embodiment from the scope of the claim ‘is rarely, if ever, correct.’” Globetrotter Software, Inc. v. Elam Computer Group Inc., 362 F.3d 1367, 1381 (Fed. Cir. 2004) (quoting Vitronics Corp., 90 F.3d at 1583). But, “[a]lthough the specification may aid the court in interpreting the meaning of disputed language in the claims, particular embodiments and examples appearing in the specification will not generally be read into the claims.” Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560, 1571 (Fed. Cir. 1988); see also Phillips, 415 F.3d at 1323. The prosecution history is another tool to supply the proper context for claim construction because a patentee may define a term during prosecution of the patent. Home Diagnostics Inc. v. LifeScan, Inc., 381 F.3d 1352, 1356 (Fed. Cir. 2004) (“As in the case of the specification, a patent applicant may define a term in prosecuting a patent.”). The well- established doctrine of prosecution disclaimer “preclud[es] patentees from recapturing through claim interpretation specific meanings disclaimed during prosecution.” Omega Eng’g Inc. v. Raytek Corp., 334 F.3d 1314, 1323 (Fed. Cir. 2003). The prosecution history must show that the 3 patentee clearly and unambiguously disclaimed or disavowed the proposed interpretation during prosecution to obtain claim allowance. Middleton Inc. v. 3M Co., 311 F.3d 1384, 1388 (Fed. Cir. 2002); see also Springs Window Fashions, LP v. Novo Indus., L.P., 323 F.3d 989, 994 (“The disclaimer . . . must be effected with ‘reasonable clarity and deliberateness.’”) (citations omitted)). “Indeed, by distinguishing the claimed invention over the prior art, an applicant is indicating what the claims do not cover.” Spectrum Int’l v. Sterilite Corp., 164 F.3d 1372, 1378– 79 (Fed. Cir. 1988) (internal quotation omitted). “As a basic principle of claim interpretation, prosecution disclaimer promotes the public notice function of the intrinsic evidence and protects the public’s reliance on definitive statements made during prosecution.” Omega Eng’g, Inc., 334 F.3d at 1324. Although, “less significant than the intrinsic record in determining the legally operative meaning of claim language,” the Court may rely on extrinsic evidence to “shed useful light on the relevant art.” Phillips, 415 F.3d at 1317 (internal quotation omitted). Technical dictionaries and treatises may help the Court understand the underlying technology and the manner in which one skilled in the art might use claim terms, but such sources may also provide overly broad definitions or may not be indicative of how terms are used in the patent. Id. at 1318. Similarly, expert testimony may aid the Court in determining the particular meaning of a term in the pertinent field, but “conclusory, unsupported assertions by experts as to the definition of a claim term are not useful.” Id. Generally, extrinsic evidence is “less reliable than the patent and its prosecution history in determining how to read claim terms.” Id. 4 CLAIM CONSTRUCTION A. Disputed Terms 1. “unique identification code” Uniloc’s Proposed Construction Defendant’s Proposed Construction “an alphanumeric sequence that identifies “a program code sequence comprised of specific software” alphanumeric characters, that serves to identify individual software application” The parties’ dispute turns on whether the specification provided an explicit definition of this term and inclusion of “program code sequence” in the definition. Uniloc argues the patent teaches that the identification code is an alphanumeric sequence, and “unique” relates to identification of “each individual software sold.” Open. Br., Doc. No. 95 at 8 (citing ’696 Patent col. 5:38–39). Uniloc asserts that its construction is consistent with the specification as a whole. Id. Additionally, Uniloc asserts that Defendant’s inclusion of “program code sequence” is not helpful because that term itself requires further construction. Id. To refute Defendant’s argument that a computer must generate the code, Uniloc points to a disclosed embodiment where a user manually enters the unique identification code. Reply Br., Doc. No. 101 at 2 (citing ’696 Patent col. 3:37–63). Defendant responds that its construction matches the explicit definition provided in the specification: “[i]t is worthy to mention that the software should preferably contain an identification code, which is a program code sequence comprised of alphanumeric characters, that serves to identify individual software application.” Resp. Br., Doc. No. 97 at 6 (quoting ’696 Patent col. 3:65–4:1) 1 (internal quotation omitted). Defendant contends that the patent 1 Defendants purport to quote the language of the specification but it actually states “[i]t is worthy to mention that the software should preferably contain an identification code, which is a program code sequence comprised of alphanumeric characters, that would serve to identify each individual software application.” ’696 Patent col. 3:65–4:1 (emphasis added). 5 limits the code to a “program code sequence” generated by a computer rather than a code manually created or designated by a human. Id. at 7 To support this contention, Defendant cites the surrounding language of Claim 15 and this passage regarding two anti-piracy measures: “[t]he first measure is a program code sequence that identifies the specific software (hereinafter ‘identification code’), while the second is an additional program code sequence that would be needed to activate the software (hereinafter ‘activation code’).” Id. (quoting ’696 Patent col. 2:59–66). Defendant further argues that a computer would necessarily have to generate a long program code sequence that would be harder to replicate. Id. at 8. Therefore, Defendant asserts, the specification supports its construction because a long code is the preferred form of an activation code. Id. (citing ’696 Patent col. 5:57–6:5). Both parties agree that the code is composed of alphanumeric characters that identify specific software. Reply Br. at 1. As Defendant points out, the specification provides definitional language for “unique identification code.” The provided definition fits in the context of both the asserted and nonasserted claims. Therefore, there is no reason to give the term a meaning different from the one the patentee explicitly intended. However, the intrinsic evidence does not support the additional limitation that Defendant proposes by its construction of “program code sequence”—one that must be generated by a computer or program. The passage describing the two-anti-piracy measures quoted by Defendant provides no support for this limitation because it does not specify: (1) that the program code sequence must be a long code; or (2) that the code must be generated by a computer. Although the additional passage cited by Defendant in support of this construction does refer to long code sequences as “program files,” it also describes and gives an example of a short code sequence of only eleven characters. ’696 Patent col. 5:57–6:5. Moreover, the specification states that the preferred embodiment is a 6 unique identification code that consists of a short code sequence. ’696 Patent col. 4:2–14. For example, a short code sequence may merely be a product’s distinct serial number or a sequence of twelve characters. Id. Accordingly, Defendant’s reliance on a long code sequence, which Defendant asserts must be generated by a computer, fails. The patentee provided an explicit definition for “unique identification code,” but Defendant’s narrow construction of “program code sequence” is unsupported. Thus, the Court construes “unique identification code” to mean “a program code sequence comprised of alphanumeric characters, that would serve to identify each individual software application.” 2. “software application having unique identification code associated therewith,” “said software application assigned to such unique identification code,” and “assign” Uniloc’s Proposed Construction software application having an alphanumeric sequence that identifies specific software associated therewith software application assigned to an alphanumeric sequence that identifies specific software The word “assign” does not appear in the claims and requires no construction Defendant’s Proposed Construction software application uniquely assigned to a [unique identification code] said software application uniquely allocated to an existing [unique identification code] designated for the software application to allocate The Court construes these three terms together because they all relate to how the unique identification code is assigned. The parties dispute two issues: (1) whether the specification supports using the same identification code for multiple copies of software; and (2) whether the code must preexist the software assigned to it. Uniloc argues that no additional construction of these terms is needed after the Court’s construction of “unique identification code.” Open. Br. at 9–10. It objects to the Defendant’s 7 insertion of the term “uniquely” because it creates confusion given that the claims use “unique” in a different sense. Id. Uniloc asserts that Defendant proposes to describe the manner in which an event occurs. Id. Uniloc asserts that Defendant’s own extrinsic evidence shows that “assign” and “allocate” are synonymous, yet Defendant ascribes those words different meanings in its proposed construction. Id. at 10. Uniloc disputes Defendant’s contention that the manner in which the code is assigned matters. Id. at 11. It asserts that none of the claims hinge on how the code is assigned and points to two examples of different manners of assignment in the specification. Id.; Reply Br. at 3 (citing ’696 Patent col. 5:29–39). Uniloc further asserts that the cited passage shows a single code could be assigned to more than one software application. Reply Br. at 2–3; .” Tr. Markman Hr’g 28–30, Sept. 18, 2014. Additionally, Uniloc disputes the chronological limitation asserted by Defendant, requiring the code to pre-exist the software. Reply Br. at 3. Defendant asserts that the claims terms require an explanation of how the software becomes associated with a code, and that the manner of assignment determines the role played by the identification code. Resp. Br. at 9. Defendant contends that the first term—“software application having unique identification code associated therewith”—is vague but “essentially” construes it synonymously with the second term—said software application assigned to such unique identification code. Id. at 10. Defendant argues that “assigned to” requires clarification. Id. at 11. Defendant points to Webster’s Dictionary that defines “assign” as “to allocate.” Id. (citing Random House Webster’s Dictionary 125 (2001) (hereinafter “Webster’s Dict.”)). In Defendant’s view, an item allocated to another “must preexist the latter,” meaning that the identification code must preexist the software application. Id. Additionally, Defendant asserts that the term “unique” requires identification code to “be unique to the software application.” Id. 8 As a first point of clarification, the passage cited by Uniloc to support its assertion that a code could be associated with a group of software, actually refers to an activation code, not an identification code. ’696 Patent col. 5:32–37 (“The activation code may either be unique to each individual software sold or unique to a group of software . . . .”) (internal parentheses omitted). The specification does not provide similar support for associating the unique identification code with a group of software. To the contrary, the specification supports Defendant’s view that the unique identification code is unique to “each individual software application.” ’696 Patent col. 3:66–4:1. It provides further support by describing an embodiment where an identification code is unique to each software sold and disclosed to the remote service system such that the system keeps track of each software application sold. ’696 Patent col. 4:3–8. At the Markman Hearing, Plaintiffs acknowledged that the ’696 Patent teaches a one-to-one correlation between the software application and the unique identification code. Tr. Markman Hr’g 30, Sept. 18, 2014. The language of asserted Claim 15 itself also makes such a requirement clear. See ’696 Patent col. 10:38–59. The claim describes the given software application as “said software application having a unique identification code associated therewith” and later refers to “said software application assigned to such unique identification code.” Id. However, the intrinsic evidence does not support Defendant’s temporal limitation that the identification code must preexist the software application. Defendant does not cite anywhere in the specification that supports that limitation. Instead, it cites a dictionary definition that does not even support that limitation. “To allocate,” as Defendant contends “assign” should be construed, is explained by Webster’s Dictionary: “To allocate is to earmark or set aside parts of things available or expected in the future . . . .” Webster’s Dict. at 126 (emphasis added). Even 9 Defendant’s own extrinsic evidence, does not support that the identification code must pre-exist the software. As mentioned above, the explicit claim language itself indicates that the identification code is unique for each given software application. Further, the Court rejects Defendant’s addition of a chronological limitation. Having resolved the disputes presented, no further construction is needed. See O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co., 521 F.3d 1351, 1362 (Fed. Cir. 2008). Therefore, the Court will not provide additional construction of these terms. The Court construes “software application having unique identification code associated therewith,” “said software application assigned to such unique identification code,” and “assign” to have plain meaning. These terms implicitly mean that identification codes are assigned to each individual software application. 3. “communications network” Uniloc’s Proposed Construction construction is not necessary, but if construed: Defendant’s Proposed Construction “an interconnected computer system capable of transmitting and receiving data, which allows “a group of links and associated equipment that users of the network to communicate” facilitates data communication, such as the internet” The parties dispute whether the specification provides an explicit definition of this term and whether it limits the term to mean only “interconnected computer systems.” Uniloc acknowledges that the specification states that a communications network “is equally applicable to all interconnected computer systems capable of transmitting and receiving data, preferably digital data, which allows users of the network to communicate.” Open. Br. at 21 (citing ’696 Patent col. 3:25–27). Uniloc asserts that the specification also discloses at least six other types of communications networks in addition to interconnected computer systems: (1) 10 telecommunication networks, such as the Internet; (2) hard-wire telephony; (3) cellular networks; (4) PCS systems; (5) satellite networks; and (6) localized and regional networks such as intranets and local area networks (LANs). Id. (citing ’696 Patent, col. 3:28–36). Uniloc contends that this term should be construed broadly, which is consistent with the specification given the breadth of network examples it discloses. Id. Further, it argues that what Defendant identifies as a lexicographic disavowel is actually just another example of one of the forms of communications networks intended to be included in the invention. Reply Br. at 10 (citing ’696 Patent col. 3:22– 24). Defendant responds that the patentee intended to define the term explicitly in the specification. Resp. Br. at 22–23 (citing ’696 Patent col. 3:22–27). It argues that this construction captures the meaning of a communications network in the ’696 Patent because all claims are directed toward software applications on computer systems. Id. Defendant contends that the patent claims should not be construed as broadly as Uniloc proposes. Id. Despite Defendant’s argument to the contrary, the patent expressly states “the present invention is intended to include all forms of communications network environments.” ’696 Patent col. 3:22–23. The specification gives many examples of communications networks, which are all included by the term. Not all examples, however, require interconnected computer systems, such as hard wired telephony or cellular networks. Thus, the additional limitations proposed by Defendant conflict with the specification. Having resolved the present dispute, the Court will not provide additional construction of this term. See O2 Micro, 521 F.3d at 1362. Therefore, the Court construes “communications network” to have plain meaning. 11 4. “service data” Uniloc’s Proposed Construction Defendant’s Proposed Construction “data that the remote service provider transmits “any data that the remote service system may to the user’s computer during activation of the legitimately transmit to the user system during software application” the online activation process for the software” The dispute again centers around whether the specification included an explicit definition for this term, and if so, the meaning of “legitimately transmit” and “online activation.” Uniloc asserts that the specification describes the function of service data as information transmitted by the remote service provider to the user, which enables a user to access a fully functioning version of the software upon receipt. Open. Br. at 11 (citing ’696 Patent col. 5:19– 30). It further asserts that its construction is a straightforward definition of the term that conforms to the described function. Id. Uniloc argues that including “legitimately” would require further construction or otherwise cause confusion. Id. at 12. Moreover, Uniloc asserts that inserting it is improper under the claim differentiation doctrine because Claim 1 recites “selectively” as a qualifier for “transmitted” while Claim 15 does not. Reply Br. at 5 (citing Digital Vending Servs. Int’l. LLC v Univ. of Phoenix, Inc., 672 F.3d 1270, 1274 (Fed. Cir. 2012)). Additionally, Uniloc contends that “online activation” is just one embodiment taught by the specification and inclusion of that term would exclude other embodiments, such as using a local area network (LAN) for activation. Open. Br. at 13 (citing ’696 Patent col. 3:20–25). Uniloc contends that Defendant’s argument that the claim language requires a network connection establishes that “online” is unnecessary. Reply Br. at 4. In response, Defendant again asserts that the specification provided explicit definitional language for this term: “as used in this invention, service data is defined and understood herein and in all the claims to mean any data that the remote service system may legitimately transmit 12 to the user system during the online activation process for the software.” Resp. Br. at 12 (quoting ’696 Patent col. 5:19–23). Further, Defendant points out that Claim 15 introduces the function of “service data”: “said user system being connected to a communications network to transmit user data and to receive said service data” and “a remote service computer system connected to said communications network . . . said remote service computer system transmitting said service data . . . .” Id. (quoting ’696 Patent col. 10:45–59). Defendant argues this language shows that service data is required to activate the software application and is transmitted over a “connected activation system.” Id. at 12–13. Defendant asserts that “legitimately transferred” makes sense because the transmission of data is required to activate the software, it must be permitted and therefore, legitimate. Id. at 13. Additionally, Defendant notes that the claim language requires a connection between the user system, communications network, and the remote service system to transmit the service data. Id. Thus, it contends this requirement supports its construction that includes “online.” Id. As Defendant points out, the specification provides an explicit definition of service data. ’696 Patent col. 5:20–22. However, the ’696 Patent uses “online” in the context of the plain meaning of “communications network.” “Online” simply means that the systems are connected through a communications network. As previously discussed, “communications network” includes all forms of communications network environments. For example, “online activation” may take place either with a user and remote service system connected through the Internet or over a LAN connection. 2 See ’696 Patent col. 3:20–36. Regarding “legitimately,” the definitional language of the specification includes it. ’696 Patent col. 5:22. Although the 2 At the Markman hearing, Uniloc stated that they could accept Defendant’s construction in light of the Court’s clarification that “online” included the communications networks disclosed in the specification. Tr. Markman Hr’g 62–63, Sept. 18, 2014. 13 specification refers to legitimate users in other instances, here it refers to data transmitted by the remote service system to activate the software. Therefore, it is unclear what the term adds to the construction of “service data” because the patent teaches that the remote service system authenticates the software, not the other way around. Presumably, the remote service system would always transmit legitimate data. Although the exact purpose of “legitimately” may be unclear, the patentee’s definition governs. 3 See Phillips, 415 F.3d at 1316 (Fed. Cir. 2005). Accordingly, the Court will adopt Defendant’s proposed construction. 4 The Court construes “service data” to mean “any data that the remote service system may legitimately transmit to the user system during the online activation process for the software” 5. “user data” Uniloc’s Proposed Construction Defendant’s Proposed Construction “any information originating from and/or “any information originating from and/or available to the user and/or the user computer available to the user of the software” system” This dispute focuses on whether “user data” must be accessible to the user and includes information about the user’s system. Uniloc recognizes the definitional language provided in the specification: “any information originating from and/or available to the user of the software.” Open. Br. at 13 (quoting ’696 Patent col. 3:54–56). However, Uniloc asserts that the construction must include user data that is automatically detected. Id. 13–14. For support, Uniloc points to a few lines above in the specification where it states “the user data may be automatically detected by element for detecting user data of the remote service system.” Id. 3 At the Markman hearing, the parties represented that they had no significant issues with including “legitimately” and could not articulate a strong reason why it need to be included or excluded. Tr. Markman Hr’g 57, 60–61, Sept. 18, 2014. 4 Uniloc argues that Defendant erroneously includes “any” in its proposed construction because it is not included in the cited language of the specification. Reply Br. at 4. However, upon the Court’s review, “any” does appear in the cited language. ’696 Patent col. 5:21. 14 (quoting ’696 Patent col. 3:47–49). Additionally, Uniloc cites the specification following the definitional language where it clarifies that “user data” may include information identifying the user’s software, such as serial number or identification code, or system, such as “such as serial and model number as well as the type, function, and performance of the various system hardware components.” Id. at 14 (quoting ’696 Patent col. 3:58–64, 4:14–18). Uniloc contends that Defendant’s construction improperly excludes examples disclosed in the specification by limiting it to data concerning or input by the users themselves. Id. 14–15; Reply Br. at 5. Defendant responds that Uniloc attempts to insert additional language into the explicit definition provided by the patentee. Resp. Br. at 14. According to Defendant, the definition clearly states that “‘user data’ is information from or available to a user of the software application.” Id. Defendant argues that any additional features about the data, such as those in the examples cited by Uniloc, are incorporated in the claims themselves rather than the concise definition in the specification. Id. Defendant objects that Uniloc interprets “user” to also mean “user computer system.” Id. at 15. Moreover, Defendant asserts that prosecution history estoppel precludes Uniloc from including this meaning. It argues that the patentee differentiated the ’696 Patent in order to overcome a rejection in light of U.S. Patent No. 6,243,468 (“Pearce”): Pearce discloses that the software application installed on the user’s computer generates a hardware ID based upon hardware components installed in the computer running such software. This hardware ID is not derived from personal information that identifies the user; rather it is based upon characteristics of hardware components that are installed in the user’s machine . . . . Thus, in Pearce, the user obtains the registration ID from the registration authority without submitting any personal user data. Moreover, in Pearce, the software application on the user’s computer runs a test each time the software is launched. In contrast, the method of claim 1, the user must submit personal identifying data to the remote service computer . . . .” 15 Resp. Br. at 15 (quoting Ex. D at 9–10, Amendment, U.S. Patent Application No. 09/594,004 (September 2, 2004)) (emphasis added). Defendant asserts that the patentee similarly explained that Pearce does not use personal data to distinguish now-issued Claim 15 in the same Amendment. Id. at 16. Uniloc argues that Defendant takes the patentee’s statements in the prosecution history out of context. Reply Br. at 6 (citing Read Corp. v. Portec, Inc., 970 F.2d 816, 824 (Fed. Cir. 1992), abrogated on other grounds, Markman v. Westview Inst., Inc., 52 F.3d 967 (Fed.Cir.1995) (en banc ) aff'd, 517 U.S. 370 (1996) (“Every statement made by a patentee during prosecution to distinguish a prior art reference does not create a separate estoppel. Arguments must be viewed in context.”)). It further argues that prosecution history estoppel does not apply because the amended and issued version of Claim 15 actually broadened the claim by removing the personal data limitations. Id. (citing Ex. A at 5, 14, Amendment, U.S. Patent Application No. 09/594,004 (November 19, 2004); Ex. F to Resp. Br. at 7, Amendment, U.S. Patent Application No. 09/594,004 (June 21, 2005)). The explicit definition of “user data” in the specification conforms to the various examples provided. At the Markman hearing, Defendant argued that “available” means the user can actually access and see the data. Tr. Markman Hr’g 41, 49, Sept. 18, 2014. In Defendant’s view, an identification code that the user cannot actually read, such as an encrypted identification code, does not qualify as available, even though the user may be able to transmit such data. Defendant also argued that the data must personally identify or originate from the user and not the user’s system. Tr. Markman Hr’g 39–40, Sept. 18, 2014. In Defendant’s view, a user’s system’s serial and model number would not fit the definition of user data. However, the specification expressly includes a user’s system’s model and serial number in its examples of 16 user data. ’696 Patent col 4:14–18. It provides additional examples of user data as including “identification code,” “product serial number,” and “information identifying the user system such as serial and model number as well as the type, function, and performance of the various system hardware components.” ’696 Patent col. 3:62–65, 4:15-18. The Court rejects Defendant’s argument that this information may not be accessible to the user and therefore not “available” or “originating” from the user. Additionally, in light of the context of all amendments during prosecution and the final version of Claim 15, Defendant’s prosecution history estoppel argument lacks support. The claim limitations on user data—requiring it to derive at least in part from personal data entered by the user—added in the September 2004 Amendment were later removed by broadening amendments. See Ex. F to Resp. Br. at 5, 7, Amendment, U.S. Patent Application No. 09/594,004 (June 21, 2005). At the Markman hearing, Defendant itself noted that an Examiner previously rejected the ’696 Patent in view of U.S. Patent No. 6,725,260 to Philyaw because “user data” included information about the user’s software or hardware. Tr. Markman Hr’g 40– 41, Sept. 18, 2014. The patentee did not disavow the Examiner’s interpretation, but instead distinguished the invention by adding other patentable limitations, such as tracking the number of times a user attempts to activate the software. See id. at 5–6, 19–20 (noting the amendments made the invention distinguishable from Philyaw). Therefore, the Court construes “user data” to mean “any information originating from and/or available to the user of the software.” “Available” includes information the user can transmit even if the user not cannot access or read it. 17 6. “user data being derived at least in part from said unique identification code;” and “derived” Uniloc’s Proposed Construction Defendant’s Proposed Construction construction not necessary, but if construed: “[user data] being processed at least in part from said [unique identification code]” “[user data] obtained at least partially from [unique identification code]” construction not necessary, but if construed: “processed” “obtained at least partially from” The Count considers these two terms together because the dispute over both turns on the meaning of “derived.” Uniloc asserts that no construction is necessary because of the Court’s construction of surrounding terms. Open. Br. at 17 (citing Internet Machs. LLC. v. Alienware Corp., No. 6:10-cv-23, 2011 WL 2551295, at *7 (E.D. Tex. June 24, 2011)). Uniloc objects to replacing “derived” with “processing” because the words are not synonymous. Id. at 17–18 (citing Webster’s Encyclopedic Unabridged Dictionary of the English Language 536 (1996); Microsoft Computer Dictionary 5th Ed. (1999) (“to manipulate data a program”)). Uniloc argues that Defendant attempts to argue that derived, processed, and transformed all mean the same thing. Reply Br. at 7. Uniloc points out that Defendant’s construction would exclude a disclosed embodiment where the user data is identical to the identification code. Open. Br. at 18. Uniloc also points to the specification’s teaching that the unique identification code “may also be synonymous to a product’s distinct serial number.” Reply Br. at 7 (citing ’696 Patent col 4:2–3). Uniloc contends that such embodiments would not require “processing.” Open. Br. at 18. Uniloc further asserts that the plain meaning conveys that at least part of the user data is obtained from the unique identification code as taught by the patent. Id. (citing ‘696 Patent col. 3:59–64). 18 Defendant responds that the patentee’s use of “derived” suggests a derivation or transformation. Resp. Br. at 16. Defendant argues that Uniloc attempts to rewrite the language of the claim by asserting that “user data” could simply “include” the identification code. Id. at 17. Defendant cites a technical dictionary to support its position that “derived” means “processed”: [a] derived class, in the context of C#, is a class created, or derived from another existing class. The existing class from which the derived class gets created through inheritance is known as a base or super class. While inheriting from the base class, the derived class implicitly inherits all the members (except constructors and destructors) which it reuses, extends, or modifies the behavior of the base class. Id. at 18 (quoting Ex. E, Techopedia, available at http://www.techopedia.com/definition/27363/derived-class-net (last visited 5/22/2014)). “[C]laim terms carry their full ordinary and customary meaning, unless the patentee unequivocally imparted a novel meaning to those terms or expressly relinquished claim scope during prosecution.” Omega Eng’g, Inc., v. Raytek Corp., 334 F.3d 1314, 1323 (Fed. Cir. 2003) (internal citation omitted). Although the patentee repeatedly acted as his own lexicographer in the ’696 Patent specification by providing explicit definitions of claim terms, the patentee did not unequivocally impart a novel meaning for “derived.” Intrinsic evidence does not support equating “derived,” “transformed,” and “processed,” as Defendant attempts. Instead, the claim language and examples given in the specification support the commonly understood meaning that at least some part of the user data is obtained from the unique identification code. The user data may also be identical to the unique identification code. ’696 Patent col. 3:60–65. Moreover, Defendant’s own extrinsic evidence undercuts its argument that “derived” requires a transformation. As previously quoted, Techopedia states that members of the “base class” can be simply reused for the “derived class.” 19 Accordingly, the Court construes “user data being derived at least in part from said unique identification code;” and “derived” to have plain meaning. 7. “predetermined threshold” Uniloc’s Proposed Construction construction is not necessary, but if construed: Defendant’s Proposed Construction “a predetermined number limit” “an established limit” At the Markman hearing, the Parties agreed to the Court’s suggested construction of “a numerical based limit.” The only remaining issue is whether the term encompasses a temporal element to the limit, such as a limit of three times per day. Uniloc argues that Defendant’s proposed construction requires a lifetime maximum number and improperly excludes a temporal element to the limit. Open. Br. at 19. It asserts that the claim language supports a limit associated with a timeframe. Id. Uniloc acknowledges that the specification does not expressly disclose an associated timeframe, but points out that Federal Circuit precedent does not require a patentee to describe every conceivable embodiment. Reply Br. at 9 (citing CCS Fitness, Inc. v. Brunswick Corp., 288 F.3d 1359, 1366 (Fed. Cir. 2002)). Defendant argues that the ’696 Patent does not support Uniloc’s suggestion that “the claim requires or the specification explains that there is a timeframe under which the ‘predetermined threshold’ would expire.” Resp. Br. at 20 n.4. However, at the Markman hearing, Defendant stated that the term does not exclude a timeframe associated with a number limit. Tr. Markman Hr’g 82, Sept. 18, 2014. Essentially, the Parties agree that the limit may be associated with a timeframe, although the ’696 Patent does not require a timeframe. Accordingly, the Court construes “predetermined 20 threshold” to mean “a numerical based limit.” A numerical based limit with a temporal element is included within the meaning of this term, but a temporal element is not required. 8. “activation code sequence” Uniloc’s Proposed Construction construction is not necessary, but if construed: “a known code sequence needed to activate software” Defendant’s Proposed Construction “a program code sequence that serves to activate each individual software application, which, absent the activation code, would be dysfunctional” The dispute over this term focused on Defendant’s use of “dysfunctional” in its proposed construction, but the Court resolved the dispute at the hearing. Uniloc argued that “dysfunctional” could be interpreted to mean “completely dysfunctional,” which would exclude disclosed embodiments that “allow partial[ly] functional software even before activation.” Open. Br. at 16. Defendant’s proposed construction comes from the specification. Defendant asserted the patentee provided another explicit definition: “[t]he activation code, as noted earlier, is a program code sequence that serves to activate each individual software application, which, absent the activation code, would be dysfunctional.” Resp. Br. at 20 (quoting ’696 Patent col. 5:29–32). Defendant contended that whether the software is completely or partially dysfunctional must be determined from the claim language. Id. at 21. To address this dispute, the Court suggested replacing “dysfunctional” with “either partially or completely dysfunctional.” 5 Both parties agreed to the Court’s suggestion. Tr. Markman Hr’g 88–89, Sept. 18, 2014. Accordingly, the Court construes “activation code sequence” to mean “a program code sequence that serves to activate each individual 5 The specification describes “either partially or completely dysfunctional.” ’696 Patent col. 3:66. 21 software application, which, absent the activation code, would be either partially or completely dysfunctional.” 6 CONCLUSION The Court hereby ADOPTS the above claim constructions for the patent-in-suit. For ease of reference, the Court’s claim interpretations are set forth in a table in Appendix A. Dec 15, 2014 6 As in the Court’s construction of “unique identification code,” “program code sequence” includes long or short code. It is not limited to codes generated by a computer. 22 APPENDIX A Claim Term Court’s Construction “unique identification code” “a program code sequence comprised of alphanumeric characters, that would serve to identify each individual software application.” “software application having unique plain meaning identification code associated therewith,” “said software application assigned to such unique identification code,” and “assign” “communications network” plain meaning “service data” “any data that the remote service system may legitimately transmit to the user system during the online activation process for the software” “user data” “any information originating from and/or available to the user of the software” “user data being derived at least in part from plain meaning said unique identification code”; “derived” “predetermined threshold” “a numerical based limit” “activation code sequence” “a program code sequence that serves to activate each individual software application, which, absent the activation code, would be either partially or completely dysfunctional” 23

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.