`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`SAN JOSE DIVISION
`
`Case No. 15-cv-03295-BLF
`
`
`
`ORDER DENYING BLUE COAT’S
`MOTION FOR JUDGMENT ON THE
`PLEADINGS
`
`
`
`
`
`FINJAN, INC.,
`
`Plaintiff,
`
`v.
`
`BLUE COAT SYSTEMS, LLC,
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`Defendant Blue Coat Systems, LLC (“Blue Coat”) brings this motion for judgment on the
`
`pleadings that U.S. Patent No. 8,677,494 (the “’494 patent”) is invalid for failure to claim patent-
`
`eligible subject matter under 35 U.S.C. § 101. ECF 104. For the reasons discussed below, the
`
`Court DENIES Blue Coat’s motion.
`
`I. BACKGROUND
`
`A. The ’494 Patent
`
`Finjan owns the ’494 patent, which is entitled “Malicious Mobile Code Runtime
`
`Monitoring System and Methods.” The ’494 patent was filed on November 7, 2011 and issued on
`
`March 18, 2014, but belongs to a long line of continuation and continuation-in-part applications
`
`which originated from patent applications filed in 1996. One of these parent applications resulted
`
`in U.S. Patent No. 6,092,194 (the “’194 patent”), which the ’494 patent identifies in its
`
`specification and states is “incorporated by reference.” ’494 patent, col. 1 ll. 33-38.
`
`The ’494 patent generally relates to systems and methods for protecting devices on an
`
`internal network from code, applications, and/or information downloaded from the Internet that
`
`perform malicious operations. Id., Abstract. According to the ’494 patent, at the time of
`
`invention, virus protection strategies for networked computers “met with limited success at best”
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 2 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`because virus scanning was localized and reactive: virus protection programs were installed on
`
`individual computers and only protected against known viruses. Id., col. 2 ll. 11-21. Because of
`
`this, these “program[s] [would] inevitably [be] surmounted by some new virus,” at which point
`
`they would need to be updated or replaced and the cycle would begin again. Id. In addition,
`
`certain types of viruses were “not well recognized or understood, let alone protected against.” Id.,
`
`col. 2 ll. 22-24. This included viruses that were hidden in executable programs such as
`
`“Downloadables.”1 Id., col. 2 ll. 23-30. “Accordingly, there remains a need for efficient, accurate,
`
`and flexible protection of computers and other network connectable devices from malicious
`
`Downloadables.” Id., col. 2 ll. 45-48.
`
`The ’494 patent purports to address this problem by detecting whether downloadable
`
`content contains potentially malicious code before it is allowed to be run on the destination
`
`computer. See id., col. 5 l. 60-col. 6 l. 6. At a high level, the disclosed embodiments describe a
`
`protection engine that generally resides on a network server and inspects incoming downloads for
`
`executable code. See id., col. 2 l. 20-col. 3 l. 4; ’194 patent, col. 3 ll. 10-21. The claims are
`
`directed to a narrow aspect of this, which involve a solution consisting of three basic steps that
`
`appear to be most closely detailed in the ’194 patent:
`
`First, an incoming Downloadable is intercepted. ’494 patent, col. 21 l. 20, col. 22 l. 8. The
`
`’194 specification describes an “Internal Network Security System” which sits in between an
`
`external computer network and the internal computer network and “examines Downloadables
`
`received from external computer network 105, and prevents Downloadables deemed suspicious
`
`from reaching the internal computer network 115.” ’194 patent, col. 3 ll. 10-13.
`
`Second, the Downloadable is scanned and “security profile data,” which includes “a list of
`
`suspicious computer operations that may be attempted by the Downloadable,” is derived. ’494
`
`patent, col. 21 ll. 21-23, col. 22 ll. 10-13. The ’194 specification discloses a “code scanner”
`
`component that scans through a Downloadable and generates the “security profile data” (also
`
`
`1 The parties agree in their Patent Local Rule 4-3 Joint Claim Construction Statement that a
`“Downloadable” is “an executable application program, which is downloaded from a source
`computer and run on the destination computer.” ECF 79 at 1.
`2
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 3 of 21
`
`
`
`referred to as “Downloadable Security Profile (DSP) data,” ’194 patent, col. 4 ll. 17-18). ’194
`
`patent, col. 5 ll. 41-42. Figure 7 of the ’194 specification illustrates this process:
`
`
`
`Id., Fig. 7. At the beginning of the process, the code scanner “disassemble[s] the machine code of
`
`the Downloadable.” Id., col. 9 ll. 23-24. Next, the code scanner iterates through the machine
`
`code, (1) resolving the next command in the machine code, (2) “determin[ing] whether the
`
`resolved command is suspicious,” and, if so, (3) “decod[ing] and register[ing] the suspicious
`
`command and its command parameters as DSP data.” Id., col. 9 ll. 20-42. The format of the DSP
`
`data is “based on command class (e.g., file operations, network operations, registry operations,
`
`operating system operations, resource usage thresholds).” Id., col. 9 ll. 38-42. Examples of
`
`operations deemed potentially hostile include:
`
`File operations: READ a file, WRITE a file;
`Network operations: LISTEN on a socket, CONNECT to a socket,
`SEND data, RECEIVE data, VIEW INTRANET;
`Registry operations: READ a registry item, WRITE a registry item;
`Operating system operations: EXIT WINDOWS, EXIT BROWSER,
`
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 4 of 21
`
`
`
`START PROCESS/THREAD, KILL PROCESS/THREAD,
`CHANGE PROCESS/THREAD PRIORITY, DYNAMICALLY
`LOAD A CLASS/LIBRARY, etc.; and
`Resource usage thresholds: memory, CPU, graphics, etc.
`
`Id., col. 5 l. 59-col. 6 l. 4.
`
`Third, the “security profile data” is stored in a database. ’494 patent, col. 21 ll. 24-25, col.
`
`22 ll. 14-16. The’194 specification discloses that, after DSP data is generated, it is stored in a
`
`“DSP data” data object according to the Downloadable’s ID. ’194 patent, col. 6 ll. 9-10 (“[t]he
`
`code scanner 325 then stores the DSP data into DSP data 310 (corresponding to its Downloadable
`
`ID)”). The DSP data is then stored in “security database 240,” along with other data such as
`
`security policies, a list of known Downloadables, and a list of known Certificates. See id., col. 3
`
`ll. 47-50, col. 4 ll. 15-18.
`
`The ’194 specification discloses that DSP data stored in the database can be compared,
`
`along with other information, against a security policy to determine whether the Downloadable
`
`should be permitted to be run on the destination computer. See id., col. 6 ll. 13-20. However, the
`
`claims themselves do not recite this, nor any subsequent use of the security profile data, after it
`
`gets stored in the database. ’494 patent, col. 21 ll. 22-23, col. 22 ll. 8-17.
`
`Finjan currently asserts claims 1, 10, 14, 15, and 18. Mot. 2, ECF 104. Independent
`
`claims 1 and 10 recite:
`
`1. A computer-based method, comprising the steps of:
`receiving an incoming Downloadable;
`deriving security profile data for the Downloadable, including a list
`of suspicious computer operations that may be attempted by the
`Downloadable; and
`storing the Downloadable security profile data in a database.
`
`10. A system for managing Downloadables, comprising:
`a receiver for receiving an incoming Downloadable;
`a Downloadable scanner coupled with said receiver, for deriving
`security profile data for the Downloadable, including a list of
`suspicious computer operations that may be attempted by the
`Downloadable; and
`a database manager coupled with said Downloadable scanner, for
`storing the Downloadable security profile data in a database.
`
`Id., col. 21 ll. 22-23, col. 22 ll. 8-17. Claim 14 additionally requires that the Downloadable
`
`include a program script. Id., col. 22 ll. 26-27. Claim 15 specifically names suspicious computer
`
`operations. Id., col. 22 ll. 28-30. Claim 18 requires that the Downloadable scanner comprise a
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 5 of 21
`
`
`
`disassembler. Id., col. 22 ll. 37-39.
`
`B. Procedural History
`
`The parties’ dispute predates the instant case. On August 28, 2013, Finjan initiated a first
`
`patent infringement action, Case No. 5:13-CV-03999-BLF (“Finjan I”), against Blue Coat,
`
`alleging that Blue Coat infringed U.S. Patent Nos. 6,154,844 (the “’844 patent”), 6,965,968 (the
`
`“’968 patent”), 7,418,731 (the “’731 patent”), 6,804,780 (the “’780 patent”), 7,058,822 (the “’822
`
`patent”), and 7,647,633 (the “’663 patent”). The parties tried all six patents before a jury who, on
`
`August 4, 2015, found that Blue Coat infringed the ’844, ’968,’731,’780, and ’633 patents. Finjan
`
`I, ECF 438 at 2-3. The Court upheld these findings in its post-trial rulings. Finjan I, ECF 543. In
`
`addition, the Court held a bench trial where it decided, among other things, that the ’844 patent
`
`was not patent-ineligible under 35 U.S.C. § 101. Finjan I, ECF 486 at 13-18. The Court entered
`
`final judgment on July 18, 2016. Finjan I, ECF 556.
`
`On July 7, 2015, five days before the beginning of trial in Finjan I, Finjan initiated the
`
`instant suit. ECF 1. Here it asserts three patents from Finjan I (the ’844 patent, the ’968 patent,
`
`and the ’731 patent), the ’494 patent, and six others (U.S. Patent Nos. 8,566,580 (the “’580
`
`patent”); 8,079,086 (the “’086 patent”); 8,225,408 (the “’408 patent”); 9,141,786 (the “’786
`
`patent”); 9,189,621 (the “’621 patent”); and 9,219,755 (the “’755 patent”)). On September 16,
`
`2016, Blue Coat filed a motion for judgment on the pleadings that the asserted claims of the ’494
`
`patent are invalid for failure to claim patent-eligible subject matter under 35 U.S.C. § 101. ECF
`
`104.
`
`II. LEGAL STANDARD
`
`A. Motion for Judgment on the Pleadings Under Fed. R. Civ. P. 12(c)
`
`Rule 12(c) provides that “[a]fter the pleadings are closed—but early enough not to delay
`
`trial—a party may move for judgment on the pleadings.” Fed. R. Civ. P. 12(c). “A judgment on
`
`the pleadings is properly granted when, taking all allegations in the pleadings as true, the moving
`
`party is entitled to judgment as a matter of law.” Enron Oil Trading & Transp. Co. v. Walbrook
`
`Ins. Co., 132 F.3d 526, 528 (9th Cir. 1997) (citing McGann v. Ernst & Young, 102 F.3d 390, 392
`
`(9th Cir. 1996)). When ruling on a Rule 12(c) motion, the Court must “accept factual allegations
`
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 6 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`in the complaint as true and construe the pleadings in the light most favorable to the nonmoving
`
`party.” Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). Any
`
`existing ambiguities must be resolved in favor of the pleading. Walling v. Beverly Enters., 476
`
`F.2d 393, 396 (9th Cir. 1973).
`
`“If, on a motion under Rule 12(b)(6) or 12(c), matters outside the pleadings are presented
`
`to and not excluded by the court, the motion must be treated as one for summary judgment under
`
`Rule 56.” Fed. R. Civ. P. 12(d). A court, however, may “consider certain materials—documents
`
`attached to the complaint, documents incorporated by reference in the complaint, or matters of
`
`judicial notice—without converting the motion to dismiss into a motion for summary judgment.”
`
`United States v. Ritchie, 342 F.3d 903, 908 (9th Cir. 2003).
`
`B. Patent Validity Challenges Under 35 U.S.C. § 101
`
`35 U.S.C. § 101 provides that “[w]hoever invents or discovers any new and useful process,
`
`machine, or composition of matter, or any new and useful improvement thereof, may obtain a
`
`patent therefor, subject to the conditions and requirements of this title.” However, the Supreme
`
`Court has recognized that these broad categories contain an implicit exception: “[l]aws of nature,
`
`natural phenomena, and abstract ideas are not patentable.” Ass’n for Molecular Pathology v.
`
`Myriad Genetics, Inc., 133 S. Ct. 2107, 2116, 186 L. Ed. 2d 124 (2013) (internal quotation marks
`
`and citation omitted).
`
`To determine whether a claim falls outside this exception, the Supreme Court has
`
`established a two-step framework: First, the court must “determine whether the claims at issue are
`
`directed to a patent-ineligible concept.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, ––– U.S. ––––,
`
`134 S.Ct. 2347, 189 L.Ed.2d 296 (2014). Second, if the claims are directed to patent-ineligible
`
`subject matter, the Court must “consider the elements of each claim both individually and ‘as an
`
`ordered combination’ to determine whether the additional elements ‘transform the nature of the
`
`claim’ into a patent-eligible application.” Id. (quoting Mayo Collaborative Servs. v. Prometheus
`
`Laboratories, Inc., 132 S.Ct. 1289, 1298, 1297, 182 L. Ed. 2d 321 (2012)). The Supreme Court
`
`has described this as a “search for an ‘inventive concept’—i.e., an element or combination of
`
`elements that is ‘sufficient to ensure that the patent in practice amounts to significantly more than
`
`6
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 7 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`a patent upon the [ineligible concept] itself.’” Id.
`
`In evaluating step one, “the ‘directed to’ inquiry applies a stage-one filter to claims,
`
`considered in light of the specification, based on whether ‘their character as a whole is directed to
`
`excluded subject matter.’” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335 (Fed. Cir. 2016)
`
`(quoting Internet Patents Corp. v. Active Network, Inc., 790 F.3d 1343, 1346 (Fed. Cir. 2015)). In
`
`the software context, claims may fail step one because they are directed to an abstract idea. The
`
`Federal Circuit has found this to be true in a number of cases, and some commonalities have
`
`emerged. For example, fundamental economic activities and business practices, even if performed
`
`on a computer, are often abstract. OIP Techs., Inc. v. Amazon.com, Inc., 788 F.3d 1359, 1362
`
`(Fed. Cir. 2015), cert. denied, 136 S. Ct. 701, 193 L. Ed. 2d 522 (2015) (collecting cases). In
`
`addition, “we have treated collecting information, including when limited to particular content
`
`(which does not change its character as information), as within the realm of abstract ideas.” Elec.
`
`Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1353 (Fed. Cir. 2016) (collecting cases); see also,
`
`e.g., In re TLI Commc’ns LLC Patent Litig., 823 F.3d 607, 611 (Fed. Cir. 2016); FairWarning IP,
`
`LLC v. Iatric Sys., Inc., 839 F.3d 1089, 1095 (Fed. Cir. 2016). Mental steps, including
`
`mathematical algorithms, are also generally considered abstract ideas. Elec. Power Grp., 830 F.3d
`
`at 1353 (collecting cases); see, e.g., Parker v. Flook, 437 U.S. 584, 589-90, 98 S.Ct. 2522, 57
`
`L.Ed.2d 451 (1978); Gottschalk v. Benson, 409 U.S. 63, 67, 93 S.Ct. 253, 34 L.Ed.2d 273 (1972).
`
`However, the Federal Circuit has recognized that “precision has been elusive in defining an all-
`
`purpose boundary between the abstract and the concrete.” Internet Patents, 790 F.3d at 1345.
`
`Courts must tow the fine line between assessing a claim’s “character as a whole” and “describing
`
`the claims at such a high level of abstraction and untethered from the language of the claims [such
`
`that it] all but ensures that the exceptions to § 101 swallow the rule.” Enfish, 822 F.3d at 1335,
`
`1337.
`
`To date, the Federal Circuit has provided two examples of software claims that are not
`
`directed to an abstract idea. First, in Enfish, the Federal Circuit determined that claims directed to
`
`a specific type of self-referential table constituted a specific “solution to a problem in the software
`
`arts” such that they were “non-abstract improvements to computer technology.” 822 F.3d at 1339.
`
`7
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 8 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`The court noted that “[t]he Supreme Court has suggested that claims ‘purport[ing] to improve the
`
`functioning of the computer itself,’ or ‘improv[ing] an existing technological process’ might not
`
`succumb to the abstract idea exception.” Id. at 1335. The court found that because the claims
`
`focused “on the specific asserted improvement in computer capabilities (i.e., the self-referential
`
`table for a computer database)” instead of “a process that qualifies as an ‘abstract idea’ for which
`
`computers are invoked merely as a tool,” they were not directed to an abstract idea. Id. at 1335-
`
`36, 1339.
`
`Second, in McRO, Inc. v. Bandai Namco Games Am. Inc., the Federal Circuit found that
`
`patents that automated part of a preexisting method for 3-D facial expression animation were not
`
`abstract because they “focused on a specific asserted improvement in computer animation, i.e., the
`
`automatic use of rules of a particular type.” 837 F.3d 1299, 1314 (Fed. Cir. 2016). Here too the
`
`court found that this was not the case of using a computer as a tool to implement an abstract idea;
`
`instead, the claims set forth a process of following a distinct set of rules, which was different from
`
`the process used by human animators, to improve animation technology. Id. at 1314 (“It is the
`
`incorporation of the claimed rules, not the use of the computer, that ‘improved [the] existing
`
`technological process’ by allowing the automation of further tasks.”). This moved the clams
`
`beyond the realm of the abstract. Id.
`
`However, not all claims relating to computer technologies are not abstract. Where the
`
`focus of the claims is on “certain independently abstract ideas that use computers as tools” instead
`
`of “an improvement in computers as tools,” claims may fail step one. See, e.g., Elec. Power Grp.,
`
`830 F.3d at 1354; see, e.g., Affinity Labs of Texas, LLC v. DIRECTV, LLC, 838 F.3d 1253, 1262
`
`(Fed. Cir. 2016) (claims relating to “deliver[ing] content to a handheld wireless electronic device”
`
`were directed to an abstract idea because they claimed “the general concept of out-of-region
`
`delivery of broadcast content through the use of conventional devices, without offering any
`
`technological means of effecting that concept”); Synopsys, Inc. v. Mentor Graphics Corp., 839
`
`F.3d 1138, 1140 (Fed. Cir. 2016) (claims related to logic circuit design in computer hardware were
`
`“drawn to the abstract idea of: translating a functional description of a logic circuit into a hardware
`
`component description of the logic circuit”); Tranxition, Inc. v. Lenovo (United States) Inc., No.
`
`8
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 9 of 21
`
`
`
`2015-1907, 2016 WL 6775967, at *3 (Fed. Cir. Nov. 16, 2016) (claims relating to migration of
`
`computer settings were directed to an abstract idea because “manual migration is an abstract idea”
`
`and the claims merely “automate[d] the migration of data between two computers”). This has
`
`proven true for patents in the computer security space. For example, in BASCOM Glob. Internet
`
`Servs., Inc. v. AT&T Mobility LLC, the Federal Circuit found that claims2 reciting an Internet
`
`content filtering system were directed to an abstract idea because “filtering content . . . is a
`
`longstanding, well-known method of organizing human behavior, similar to concepts previously
`
`found to be abstract.” 827 F.3d 1341, 1348 (Fed. Cir. 2016). In Intellectual Ventures I LLC v.
`
`Symantec Corp., the Federal Circuit found claims3 related to filtering unwanted content from
`
`email were directed to an abstract idea because “it was long-prevalent practice for people
`
`receiving paper mail to look at an envelope and discard certain letters, without opening them, from
`
`sources from which they did not wish to receive mail based on characteristics of the mail” and
`
`
`2 One of the asserted claims, claim 1 of U.S. Patent No. 5,987,606 , recited:
`1. A content filtering system for filtering content retrieved from an
`Internet computer network by individual controlled access
`network accounts, said filtering system comprising:
`a local client computer generating network access requests for said
`individual controlled access network accounts;
`at least one filtering scheme;
`a plurality of sets of logical filtering elements; and
`a remote ISP server coupled to said client computer and said Internet
`computer network, said ISP server associating each said network
`account to at least one filtering scheme and at least one set of
`filtering elements, said ISP server further receiving said network
`access requests from said client computer and executing said
`associated filtering scheme utilizing said associated set of logical
`filtering elements.
`827 F.3d at 1345 (quoting U.S. Patent No. 5,987,606 at col. 6 l. 62-col. 7 l. 10).
`
` 3
`
` One of the asserted claims, claim 9 of U.S. Patent No. 6,460,050, recited:
`9. A method for identifying characteristics of data files, comprising:
`receiving, on a processing system, file content identifiers for data
`files from a plurality of file content identifier generator agents,
`each agent provided on a source system and creating file content
`IDs using a mathematical algorithm, via a network;
`determining, on the processing system, whether each received
`content identifier matches a characteristic of other identifiers;
`and
`outputting, to at least one of the source systems responsive to a
`request from said source system, an
`indication of
`the
`characteristic of the data file based on said step of determining.
`838 F.3d at 1313 (quoting U.S. Patent No. 6,460,050 at col. 8, ll. 13-26).
`9
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 10 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`“[c]haracterizing e-mail based on a known list of identifiers is no less abstract.” 838 F.3d 1307,
`
`1314 (Fed. Cir. 2016). The court found these claims distinguishable from those in Enfish and
`
`McRO because there was no “specific or limiting recitation of . . . improved computer
`
`technology;” instead, they merely “use[d] generic computers to perform generic computer
`
`functions.” Id. at 1315, 1316. Thus, non-abstract claims that “improve the functioning of the
`
`computer itself,” Alice, 134 S.Ct. at 2359, such as those in Enfish and McRO, remain a narrow
`
`class.
`
`In assessing step two, courts must “consider the elements of each claim both individually
`
`and ‘as an ordered combination’” and assess whether there are any “additional features” in the
`
`claims that constitute an “inventive concept.” Alice, 134 S.Ct. at 2357. This inventive concept
`
`“must be significantly more than the abstract idea itself,” BASCOM, 827 F.3d at 1349, “must be
`
`more than well-understood, routine, conventional activity,” Affinity, 838 F.3d at 1262, “and cannot
`
`simply be an instruction to implement or apply the abstract idea on a computer.” BASCOM, 827
`
`F.3d at 1349. For example, it may be found in an “inventive set of components or methods,”
`
`“inventive programming,” or an inventive approach in “how the desired result is achieved.” Elec.
`
`Power Grp., 830 F.3d at 1355.
`
`To date, the Federal Circuit has found an inventive concept in three cases. First, in DDR
`
`Holdings, LLC v. Hotels.com, L.P., the Federal Circuit found that claims that addressed the
`
`“Internet-centric problem” of third-party merchant advertisements that would “lure . . . visitor
`
`traffic away” from a host website (because clicking on the advertisement would redirect the visitor
`
`to the merchant’s website) amounted to an inventive concept. 773 F.3d 1245, 1248, 1259 (Fed.
`
`Cir. 2014). The claims solved this problem by generating composite websites that combined the
`
`visual elements of the host’s webpage with the content of the third-party merchant. Id. at 1248.
`
`The Federal Circuit reasoned that the claims “specify how interactions with the Internet are
`
`manipulated to yield a desired result” such that the interactions are “not merely the routine or
`
`conventional use of the Internet.” Id. at 1259. Accordingly, there was sufficient transformation
`
`for the claims to not be patent-ineligible. Id.
`
`Second, in BASCOM, the Federal Circuit found that the claims directed to Internet content
`
`10
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 11 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`filtering recited the inventive concept of “install[ing] a filtering tool at a specific location, remote
`
`from the end-users, with customizable filtering features specific to each end user.” 827 F.3d at
`
`1350. The court reasoned that “an inventive concept can be found in the non-conventional and
`
`non-generic arrangement of known, conventional pieces.” Id. The court found this to be the case
`
`there because the patents claimed a specific type of content filtering that took advantage of an ISP
`
`server’s ability to associate internet requests with user accounts. Id. Thus, they “harnesse[d] [a]
`
`technical feature of the network” to claim a “specific method of filtering Internet content cannot
`
`be said, as a matter of law, to have been conventional or generic.” Id.
`
`Third, in Amdocs (Israel) Ltd. v. Openet Telecom, Inc., the Federal Circuit found that
`
`claims relating to solutions for managing accounting and billing data over large, disparate
`
`networks recited an inventive concept because they contained “specific enhancing limitation[s]
`
`that necessarily incorporates the invention’s distributed architecture—an architecture providing a
`
`technological solution to a technological problem.” No. 2015-1180, 2016 WL 6440387, at *11
`
`(Fed. Cir. Nov. 1, 2016). Use of this “distributed architecture” transformed the claims into
`
`patentable subject matter. Id.
`
`Nevertheless, not all technological aspects of how a patented invention is implemented
`
`supply a basis for finding an “inventive concept.” A claim that simply takes an abstract idea and
`
`adds “the requirement to perform it on the Internet, or to perform it on a set of generic computer
`
`components . . . would not contain an inventive concept.” BASCOM, 827 F.3d at 1350. For
`
`example, in Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat. Ass’n, the Federal
`
`Circuit found that claims directed to the abstract ideas of extracting data and recognizing patterns
`
`did not recite an inventive concept because they simply recited “generic scanner and computer to
`
`perform well-understood, routine, and conventional activities commonly used in industry.” 776
`
`F.3d 1343, 1348 (Fed. Cir. 2014), cert. denied, 136 S. Ct. 119, 193 L. Ed. 2d 208 (2015). In
`
`Affinity Labs, the court found there was no inventive concept because “[t]he claim simply recites
`
`the use of generic features of cellular telephones, such as a storage medium and a graphical user
`
`interface, as well as routine functions, such as transmitting and receiving signals, to implement the
`
`underlying idea.” 838 F.3d at 1262. In Intellectual Ventures I, the court found that the claimed
`
`11
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 12 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`email filtering methods and systems did not recite an inventive concept because “the asserted
`
`claims describe only generic computer elements” or “generic computers that use generic virus
`
`screening technology.” 838 F.3d at 1316, 1320. Accordingly, the search for an inventive
`
`concept remains one that court must approach cautiously, “scrutiniz[ing] the claim elements more
`
`microscopically” than in step one. Elec. Power Grp., 830 F.3d at 1354.
`
`In addition to these principles, several other considerations may be helpful in conducting a
`
`§ 101 analysis: First, the Supreme Court has recognized that the “concern that undergirds [the]
`
`§ 101 jurisprudence” is preemption. Alice, 134 S. Ct. at 2358. If a claim is so abstract so as to
`
`“pre-empt use of [the claimed] approach in all fields, and would effectively grant a monopoly over
`
`an abstract idea” is not patent-eligible. Bilski v. Kappos, 561 U.S. 593, 612, 130 S. Ct. 3218,
`
`3231, 177 L. Ed. 2d 792 (2010). However, the inverse is not true: “[w]hile preemption may signal
`
`patent ineligible subject matter, the absence of complete preemption does not demonstrate patent
`
`eligibility.” FairWarning, 839 F.3d at 1098 (internal quotation marks and citation omitted).
`
`Second (and relatedly), “claims that are ‘so result-focused, so functional, as to effectively
`
`cover any solution to an identified problem’ are frequently held ineligible under section 101.”
`
`Affinity Labs, 838 F.3d at 1265. For example, in Elec. Power Grp., the Federal Circuit found that
`
`claims directed to “any way of effectively monitoring multiple sources on a power grid” instead of
`
`“some specific way of enabling a computer to monitor data from multiple sources across an
`
`electric power grid” did not contain an inventive concept. 830 F.3d at 1356. The Federal Circuit
`
`has noted that this framework “is one helpful way of double-checking the application of the
`
`Supreme Court's framework to particular claims—specifically, when determining whether the
`
`claims meet the requirement of an inventive concept in application.” Id.
`
`III. DISCUSSION
`
`With these principles in mind, the Court turns to the claims at issue. As set forth below,
`
`the Court finds that the asserted claims of the ’494 patent are not patent-ineligible because,
`
`although they are directed to an abstract idea, they recite an inventive concept. 134 S. Ct. at 2355.
`
`A. Relevance of ’194 Patent
`
`Before turning to the merits, this case requires the Court to clarify the scope of materials
`
`12
`
`Northern District of California
`
`United States District Court
`
`
`
`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 13 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`relevant to its analysis. This case presents an interesting scenario where the claims themselves are
`
`basic and broad, but significant clarifying detail is provided in a specification that belongs not to
`
`the ’494 patent itself, but to a parent patent (the ’194 patent), which the ’494 patent identifies and
`
`declares to be “hereby incorporated by reference.” ’494 patent, col. 1 ll. 37-38. Finjan,
`
`unsurprisingly, urges the Court to pay particul