throbber
Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 1 of 21
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`SAN JOSE DIVISION
`
`Case No. 15-cv-03295-BLF
`
`
`
`ORDER DENYING BLUE COAT’S
`MOTION FOR JUDGMENT ON THE
`PLEADINGS
`
`
`
`
`
`FINJAN, INC.,
`
`Plaintiff,
`
`v.
`
`BLUE COAT SYSTEMS, LLC,
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`Defendant Blue Coat Systems, LLC (“Blue Coat”) brings this motion for judgment on the
`
`pleadings that U.S. Patent No. 8,677,494 (the “’494 patent”) is invalid for failure to claim patent-
`
`eligible subject matter under 35 U.S.C. § 101. ECF 104. For the reasons discussed below, the
`
`Court DENIES Blue Coat’s motion.
`
`I. BACKGROUND
`
`A. The ’494 Patent
`
`Finjan owns the ’494 patent, which is entitled “Malicious Mobile Code Runtime
`
`Monitoring System and Methods.” The ’494 patent was filed on November 7, 2011 and issued on
`
`March 18, 2014, but belongs to a long line of continuation and continuation-in-part applications
`
`which originated from patent applications filed in 1996. One of these parent applications resulted
`
`in U.S. Patent No. 6,092,194 (the “’194 patent”), which the ’494 patent identifies in its
`
`specification and states is “incorporated by reference.” ’494 patent, col. 1 ll. 33-38.
`
`The ’494 patent generally relates to systems and methods for protecting devices on an
`
`internal network from code, applications, and/or information downloaded from the Internet that
`
`perform malicious operations. Id., Abstract. According to the ’494 patent, at the time of
`
`invention, virus protection strategies for networked computers “met with limited success at best”
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 2 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`because virus scanning was localized and reactive: virus protection programs were installed on
`
`individual computers and only protected against known viruses. Id., col. 2 ll. 11-21. Because of
`
`this, these “program[s] [would] inevitably [be] surmounted by some new virus,” at which point
`
`they would need to be updated or replaced and the cycle would begin again. Id. In addition,
`
`certain types of viruses were “not well recognized or understood, let alone protected against.” Id.,
`
`col. 2 ll. 22-24. This included viruses that were hidden in executable programs such as
`
`“Downloadables.”1 Id., col. 2 ll. 23-30. “Accordingly, there remains a need for efficient, accurate,
`
`and flexible protection of computers and other network connectable devices from malicious
`
`Downloadables.” Id., col. 2 ll. 45-48.
`
`The ’494 patent purports to address this problem by detecting whether downloadable
`
`content contains potentially malicious code before it is allowed to be run on the destination
`
`computer. See id., col. 5 l. 60-col. 6 l. 6. At a high level, the disclosed embodiments describe a
`
`protection engine that generally resides on a network server and inspects incoming downloads for
`
`executable code. See id., col. 2 l. 20-col. 3 l. 4; ’194 patent, col. 3 ll. 10-21. The claims are
`
`directed to a narrow aspect of this, which involve a solution consisting of three basic steps that
`
`appear to be most closely detailed in the ’194 patent:
`
`First, an incoming Downloadable is intercepted. ’494 patent, col. 21 l. 20, col. 22 l. 8. The
`
`’194 specification describes an “Internal Network Security System” which sits in between an
`
`external computer network and the internal computer network and “examines Downloadables
`
`received from external computer network 105, and prevents Downloadables deemed suspicious
`
`from reaching the internal computer network 115.” ’194 patent, col. 3 ll. 10-13.
`
`Second, the Downloadable is scanned and “security profile data,” which includes “a list of
`
`suspicious computer operations that may be attempted by the Downloadable,” is derived. ’494
`
`patent, col. 21 ll. 21-23, col. 22 ll. 10-13. The ’194 specification discloses a “code scanner”
`
`component that scans through a Downloadable and generates the “security profile data” (also
`
`
`1 The parties agree in their Patent Local Rule 4-3 Joint Claim Construction Statement that a
`“Downloadable” is “an executable application program, which is downloaded from a source
`computer and run on the destination computer.” ECF 79 at 1.
`2
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 3 of 21
`
`
`
`referred to as “Downloadable Security Profile (DSP) data,” ’194 patent, col. 4 ll. 17-18). ’194
`
`patent, col. 5 ll. 41-42. Figure 7 of the ’194 specification illustrates this process:
`
`
`
`Id., Fig. 7. At the beginning of the process, the code scanner “disassemble[s] the machine code of
`
`the Downloadable.” Id., col. 9 ll. 23-24. Next, the code scanner iterates through the machine
`
`code, (1) resolving the next command in the machine code, (2) “determin[ing] whether the
`
`resolved command is suspicious,” and, if so, (3) “decod[ing] and register[ing] the suspicious
`
`command and its command parameters as DSP data.” Id., col. 9 ll. 20-42. The format of the DSP
`
`data is “based on command class (e.g., file operations, network operations, registry operations,
`
`operating system operations, resource usage thresholds).” Id., col. 9 ll. 38-42. Examples of
`
`operations deemed potentially hostile include:
`
`File operations: READ a file, WRITE a file;
`Network operations: LISTEN on a socket, CONNECT to a socket,
`SEND data, RECEIVE data, VIEW INTRANET;
`Registry operations: READ a registry item, WRITE a registry item;
`Operating system operations: EXIT WINDOWS, EXIT BROWSER,
`
`3
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 4 of 21
`
`
`
`START PROCESS/THREAD, KILL PROCESS/THREAD,
`CHANGE PROCESS/THREAD PRIORITY, DYNAMICALLY
`LOAD A CLASS/LIBRARY, etc.; and
`Resource usage thresholds: memory, CPU, graphics, etc.
`
`Id., col. 5 l. 59-col. 6 l. 4.
`
`Third, the “security profile data” is stored in a database. ’494 patent, col. 21 ll. 24-25, col.
`
`22 ll. 14-16. The’194 specification discloses that, after DSP data is generated, it is stored in a
`
`“DSP data” data object according to the Downloadable’s ID. ’194 patent, col. 6 ll. 9-10 (“[t]he
`
`code scanner 325 then stores the DSP data into DSP data 310 (corresponding to its Downloadable
`
`ID)”). The DSP data is then stored in “security database 240,” along with other data such as
`
`security policies, a list of known Downloadables, and a list of known Certificates. See id., col. 3
`
`ll. 47-50, col. 4 ll. 15-18.
`
`The ’194 specification discloses that DSP data stored in the database can be compared,
`
`along with other information, against a security policy to determine whether the Downloadable
`
`should be permitted to be run on the destination computer. See id., col. 6 ll. 13-20. However, the
`
`claims themselves do not recite this, nor any subsequent use of the security profile data, after it
`
`gets stored in the database. ’494 patent, col. 21 ll. 22-23, col. 22 ll. 8-17.
`
`Finjan currently asserts claims 1, 10, 14, 15, and 18. Mot. 2, ECF 104. Independent
`
`claims 1 and 10 recite:
`
`1. A computer-based method, comprising the steps of:
`receiving an incoming Downloadable;
`deriving security profile data for the Downloadable, including a list
`of suspicious computer operations that may be attempted by the
`Downloadable; and
`storing the Downloadable security profile data in a database.
`
`10. A system for managing Downloadables, comprising:
`a receiver for receiving an incoming Downloadable;
`a Downloadable scanner coupled with said receiver, for deriving
`security profile data for the Downloadable, including a list of
`suspicious computer operations that may be attempted by the
`Downloadable; and
`a database manager coupled with said Downloadable scanner, for
`storing the Downloadable security profile data in a database.
`
`Id., col. 21 ll. 22-23, col. 22 ll. 8-17. Claim 14 additionally requires that the Downloadable
`
`include a program script. Id., col. 22 ll. 26-27. Claim 15 specifically names suspicious computer
`
`operations. Id., col. 22 ll. 28-30. Claim 18 requires that the Downloadable scanner comprise a
`
`4
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 5 of 21
`
`
`
`disassembler. Id., col. 22 ll. 37-39.
`
`B. Procedural History
`
`The parties’ dispute predates the instant case. On August 28, 2013, Finjan initiated a first
`
`patent infringement action, Case No. 5:13-CV-03999-BLF (“Finjan I”), against Blue Coat,
`
`alleging that Blue Coat infringed U.S. Patent Nos. 6,154,844 (the “’844 patent”), 6,965,968 (the
`
`“’968 patent”), 7,418,731 (the “’731 patent”), 6,804,780 (the “’780 patent”), 7,058,822 (the “’822
`
`patent”), and 7,647,633 (the “’663 patent”). The parties tried all six patents before a jury who, on
`
`August 4, 2015, found that Blue Coat infringed the ’844, ’968,’731,’780, and ’633 patents. Finjan
`
`I, ECF 438 at 2-3. The Court upheld these findings in its post-trial rulings. Finjan I, ECF 543. In
`
`addition, the Court held a bench trial where it decided, among other things, that the ’844 patent
`
`was not patent-ineligible under 35 U.S.C. § 101. Finjan I, ECF 486 at 13-18. The Court entered
`
`final judgment on July 18, 2016. Finjan I, ECF 556.
`
`On July 7, 2015, five days before the beginning of trial in Finjan I, Finjan initiated the
`
`instant suit. ECF 1. Here it asserts three patents from Finjan I (the ’844 patent, the ’968 patent,
`
`and the ’731 patent), the ’494 patent, and six others (U.S. Patent Nos. 8,566,580 (the “’580
`
`patent”); 8,079,086 (the “’086 patent”); 8,225,408 (the “’408 patent”); 9,141,786 (the “’786
`
`patent”); 9,189,621 (the “’621 patent”); and 9,219,755 (the “’755 patent”)). On September 16,
`
`2016, Blue Coat filed a motion for judgment on the pleadings that the asserted claims of the ’494
`
`patent are invalid for failure to claim patent-eligible subject matter under 35 U.S.C. § 101. ECF
`
`104.
`
`II. LEGAL STANDARD
`
`A. Motion for Judgment on the Pleadings Under Fed. R. Civ. P. 12(c)
`
`Rule 12(c) provides that “[a]fter the pleadings are closed—but early enough not to delay
`
`trial—a party may move for judgment on the pleadings.” Fed. R. Civ. P. 12(c). “A judgment on
`
`the pleadings is properly granted when, taking all allegations in the pleadings as true, the moving
`
`party is entitled to judgment as a matter of law.” Enron Oil Trading & Transp. Co. v. Walbrook
`
`Ins. Co., 132 F.3d 526, 528 (9th Cir. 1997) (citing McGann v. Ernst & Young, 102 F.3d 390, 392
`
`(9th Cir. 1996)). When ruling on a Rule 12(c) motion, the Court must “accept factual allegations
`
`5
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 6 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`in the complaint as true and construe the pleadings in the light most favorable to the nonmoving
`
`party.” Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). Any
`
`existing ambiguities must be resolved in favor of the pleading. Walling v. Beverly Enters., 476
`
`F.2d 393, 396 (9th Cir. 1973).
`
`“If, on a motion under Rule 12(b)(6) or 12(c), matters outside the pleadings are presented
`
`to and not excluded by the court, the motion must be treated as one for summary judgment under
`
`Rule 56.” Fed. R. Civ. P. 12(d). A court, however, may “consider certain materials—documents
`
`attached to the complaint, documents incorporated by reference in the complaint, or matters of
`
`judicial notice—without converting the motion to dismiss into a motion for summary judgment.”
`
`United States v. Ritchie, 342 F.3d 903, 908 (9th Cir. 2003).
`
`B. Patent Validity Challenges Under 35 U.S.C. § 101
`
`35 U.S.C. § 101 provides that “[w]hoever invents or discovers any new and useful process,
`
`machine, or composition of matter, or any new and useful improvement thereof, may obtain a
`
`patent therefor, subject to the conditions and requirements of this title.” However, the Supreme
`
`Court has recognized that these broad categories contain an implicit exception: “[l]aws of nature,
`
`natural phenomena, and abstract ideas are not patentable.” Ass’n for Molecular Pathology v.
`
`Myriad Genetics, Inc., 133 S. Ct. 2107, 2116, 186 L. Ed. 2d 124 (2013) (internal quotation marks
`
`and citation omitted).
`
`To determine whether a claim falls outside this exception, the Supreme Court has
`
`established a two-step framework: First, the court must “determine whether the claims at issue are
`
`directed to a patent-ineligible concept.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, ––– U.S. ––––,
`
`134 S.Ct. 2347, 189 L.Ed.2d 296 (2014). Second, if the claims are directed to patent-ineligible
`
`subject matter, the Court must “consider the elements of each claim both individually and ‘as an
`
`ordered combination’ to determine whether the additional elements ‘transform the nature of the
`
`claim’ into a patent-eligible application.” Id. (quoting Mayo Collaborative Servs. v. Prometheus
`
`Laboratories, Inc., 132 S.Ct. 1289, 1298, 1297, 182 L. Ed. 2d 321 (2012)). The Supreme Court
`
`has described this as a “search for an ‘inventive concept’—i.e., an element or combination of
`
`elements that is ‘sufficient to ensure that the patent in practice amounts to significantly more than
`
`6
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 7 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`a patent upon the [ineligible concept] itself.’” Id.
`
`In evaluating step one, “the ‘directed to’ inquiry applies a stage-one filter to claims,
`
`considered in light of the specification, based on whether ‘their character as a whole is directed to
`
`excluded subject matter.’” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335 (Fed. Cir. 2016)
`
`(quoting Internet Patents Corp. v. Active Network, Inc., 790 F.3d 1343, 1346 (Fed. Cir. 2015)). In
`
`the software context, claims may fail step one because they are directed to an abstract idea. The
`
`Federal Circuit has found this to be true in a number of cases, and some commonalities have
`
`emerged. For example, fundamental economic activities and business practices, even if performed
`
`on a computer, are often abstract. OIP Techs., Inc. v. Amazon.com, Inc., 788 F.3d 1359, 1362
`
`(Fed. Cir. 2015), cert. denied, 136 S. Ct. 701, 193 L. Ed. 2d 522 (2015) (collecting cases). In
`
`addition, “we have treated collecting information, including when limited to particular content
`
`(which does not change its character as information), as within the realm of abstract ideas.” Elec.
`
`Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1353 (Fed. Cir. 2016) (collecting cases); see also,
`
`e.g., In re TLI Commc’ns LLC Patent Litig., 823 F.3d 607, 611 (Fed. Cir. 2016); FairWarning IP,
`
`LLC v. Iatric Sys., Inc., 839 F.3d 1089, 1095 (Fed. Cir. 2016). Mental steps, including
`
`mathematical algorithms, are also generally considered abstract ideas. Elec. Power Grp., 830 F.3d
`
`at 1353 (collecting cases); see, e.g., Parker v. Flook, 437 U.S. 584, 589-90, 98 S.Ct. 2522, 57
`
`L.Ed.2d 451 (1978); Gottschalk v. Benson, 409 U.S. 63, 67, 93 S.Ct. 253, 34 L.Ed.2d 273 (1972).
`
`However, the Federal Circuit has recognized that “precision has been elusive in defining an all-
`
`purpose boundary between the abstract and the concrete.” Internet Patents, 790 F.3d at 1345.
`
`Courts must tow the fine line between assessing a claim’s “character as a whole” and “describing
`
`the claims at such a high level of abstraction and untethered from the language of the claims [such
`
`that it] all but ensures that the exceptions to § 101 swallow the rule.” Enfish, 822 F.3d at 1335,
`
`1337.
`
`To date, the Federal Circuit has provided two examples of software claims that are not
`
`directed to an abstract idea. First, in Enfish, the Federal Circuit determined that claims directed to
`
`a specific type of self-referential table constituted a specific “solution to a problem in the software
`
`arts” such that they were “non-abstract improvements to computer technology.” 822 F.3d at 1339.
`
`7
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 8 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`The court noted that “[t]he Supreme Court has suggested that claims ‘purport[ing] to improve the
`
`functioning of the computer itself,’ or ‘improv[ing] an existing technological process’ might not
`
`succumb to the abstract idea exception.” Id. at 1335. The court found that because the claims
`
`focused “on the specific asserted improvement in computer capabilities (i.e., the self-referential
`
`table for a computer database)” instead of “a process that qualifies as an ‘abstract idea’ for which
`
`computers are invoked merely as a tool,” they were not directed to an abstract idea. Id. at 1335-
`
`36, 1339.
`
`Second, in McRO, Inc. v. Bandai Namco Games Am. Inc., the Federal Circuit found that
`
`patents that automated part of a preexisting method for 3-D facial expression animation were not
`
`abstract because they “focused on a specific asserted improvement in computer animation, i.e., the
`
`automatic use of rules of a particular type.” 837 F.3d 1299, 1314 (Fed. Cir. 2016). Here too the
`
`court found that this was not the case of using a computer as a tool to implement an abstract idea;
`
`instead, the claims set forth a process of following a distinct set of rules, which was different from
`
`the process used by human animators, to improve animation technology. Id. at 1314 (“It is the
`
`incorporation of the claimed rules, not the use of the computer, that ‘improved [the] existing
`
`technological process’ by allowing the automation of further tasks.”). This moved the clams
`
`beyond the realm of the abstract. Id.
`
`However, not all claims relating to computer technologies are not abstract. Where the
`
`focus of the claims is on “certain independently abstract ideas that use computers as tools” instead
`
`of “an improvement in computers as tools,” claims may fail step one. See, e.g., Elec. Power Grp.,
`
`830 F.3d at 1354; see, e.g., Affinity Labs of Texas, LLC v. DIRECTV, LLC, 838 F.3d 1253, 1262
`
`(Fed. Cir. 2016) (claims relating to “deliver[ing] content to a handheld wireless electronic device”
`
`were directed to an abstract idea because they claimed “the general concept of out-of-region
`
`delivery of broadcast content through the use of conventional devices, without offering any
`
`technological means of effecting that concept”); Synopsys, Inc. v. Mentor Graphics Corp., 839
`
`F.3d 1138, 1140 (Fed. Cir. 2016) (claims related to logic circuit design in computer hardware were
`
`“drawn to the abstract idea of: translating a functional description of a logic circuit into a hardware
`
`component description of the logic circuit”); Tranxition, Inc. v. Lenovo (United States) Inc., No.
`
`8
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 9 of 21
`
`
`
`2015-1907, 2016 WL 6775967, at *3 (Fed. Cir. Nov. 16, 2016) (claims relating to migration of
`
`computer settings were directed to an abstract idea because “manual migration is an abstract idea”
`
`and the claims merely “automate[d] the migration of data between two computers”). This has
`
`proven true for patents in the computer security space. For example, in BASCOM Glob. Internet
`
`Servs., Inc. v. AT&T Mobility LLC, the Federal Circuit found that claims2 reciting an Internet
`
`content filtering system were directed to an abstract idea because “filtering content . . . is a
`
`longstanding, well-known method of organizing human behavior, similar to concepts previously
`
`found to be abstract.” 827 F.3d 1341, 1348 (Fed. Cir. 2016). In Intellectual Ventures I LLC v.
`
`Symantec Corp., the Federal Circuit found claims3 related to filtering unwanted content from
`
`email were directed to an abstract idea because “it was long-prevalent practice for people
`
`receiving paper mail to look at an envelope and discard certain letters, without opening them, from
`
`sources from which they did not wish to receive mail based on characteristics of the mail” and
`
`
`2 One of the asserted claims, claim 1 of U.S. Patent No. 5,987,606 , recited:
`1. A content filtering system for filtering content retrieved from an
`Internet computer network by individual controlled access
`network accounts, said filtering system comprising:
`a local client computer generating network access requests for said
`individual controlled access network accounts;
`at least one filtering scheme;
`a plurality of sets of logical filtering elements; and
`a remote ISP server coupled to said client computer and said Internet
`computer network, said ISP server associating each said network
`account to at least one filtering scheme and at least one set of
`filtering elements, said ISP server further receiving said network
`access requests from said client computer and executing said
`associated filtering scheme utilizing said associated set of logical
`filtering elements.
`827 F.3d at 1345 (quoting U.S. Patent No. 5,987,606 at col. 6 l. 62-col. 7 l. 10).
`
` 3
`
` One of the asserted claims, claim 9 of U.S. Patent No. 6,460,050, recited:
`9. A method for identifying characteristics of data files, comprising:
`receiving, on a processing system, file content identifiers for data
`files from a plurality of file content identifier generator agents,
`each agent provided on a source system and creating file content
`IDs using a mathematical algorithm, via a network;
`determining, on the processing system, whether each received
`content identifier matches a characteristic of other identifiers;
`and
`outputting, to at least one of the source systems responsive to a
`request from said source system, an
`indication of
`the
`characteristic of the data file based on said step of determining.
`838 F.3d at 1313 (quoting U.S. Patent No. 6,460,050 at col. 8, ll. 13-26).
`9
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 10 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`“[c]haracterizing e-mail based on a known list of identifiers is no less abstract.” 838 F.3d 1307,
`
`1314 (Fed. Cir. 2016). The court found these claims distinguishable from those in Enfish and
`
`McRO because there was no “specific or limiting recitation of . . . improved computer
`
`technology;” instead, they merely “use[d] generic computers to perform generic computer
`
`functions.” Id. at 1315, 1316. Thus, non-abstract claims that “improve the functioning of the
`
`computer itself,” Alice, 134 S.Ct. at 2359, such as those in Enfish and McRO, remain a narrow
`
`class.
`
`In assessing step two, courts must “consider the elements of each claim both individually
`
`and ‘as an ordered combination’” and assess whether there are any “additional features” in the
`
`claims that constitute an “inventive concept.” Alice, 134 S.Ct. at 2357. This inventive concept
`
`“must be significantly more than the abstract idea itself,” BASCOM, 827 F.3d at 1349, “must be
`
`more than well-understood, routine, conventional activity,” Affinity, 838 F.3d at 1262, “and cannot
`
`simply be an instruction to implement or apply the abstract idea on a computer.” BASCOM, 827
`
`F.3d at 1349. For example, it may be found in an “inventive set of components or methods,”
`
`“inventive programming,” or an inventive approach in “how the desired result is achieved.” Elec.
`
`Power Grp., 830 F.3d at 1355.
`
`To date, the Federal Circuit has found an inventive concept in three cases. First, in DDR
`
`Holdings, LLC v. Hotels.com, L.P., the Federal Circuit found that claims that addressed the
`
`“Internet-centric problem” of third-party merchant advertisements that would “lure . . . visitor
`
`traffic away” from a host website (because clicking on the advertisement would redirect the visitor
`
`to the merchant’s website) amounted to an inventive concept. 773 F.3d 1245, 1248, 1259 (Fed.
`
`Cir. 2014). The claims solved this problem by generating composite websites that combined the
`
`visual elements of the host’s webpage with the content of the third-party merchant. Id. at 1248.
`
`The Federal Circuit reasoned that the claims “specify how interactions with the Internet are
`
`manipulated to yield a desired result” such that the interactions are “not merely the routine or
`
`conventional use of the Internet.” Id. at 1259. Accordingly, there was sufficient transformation
`
`for the claims to not be patent-ineligible. Id.
`
`Second, in BASCOM, the Federal Circuit found that the claims directed to Internet content
`
`10
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 11 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`filtering recited the inventive concept of “install[ing] a filtering tool at a specific location, remote
`
`from the end-users, with customizable filtering features specific to each end user.” 827 F.3d at
`
`1350. The court reasoned that “an inventive concept can be found in the non-conventional and
`
`non-generic arrangement of known, conventional pieces.” Id. The court found this to be the case
`
`there because the patents claimed a specific type of content filtering that took advantage of an ISP
`
`server’s ability to associate internet requests with user accounts. Id. Thus, they “harnesse[d] [a]
`
`technical feature of the network” to claim a “specific method of filtering Internet content cannot
`
`be said, as a matter of law, to have been conventional or generic.” Id.
`
`Third, in Amdocs (Israel) Ltd. v. Openet Telecom, Inc., the Federal Circuit found that
`
`claims relating to solutions for managing accounting and billing data over large, disparate
`
`networks recited an inventive concept because they contained “specific enhancing limitation[s]
`
`that necessarily incorporates the invention’s distributed architecture—an architecture providing a
`
`technological solution to a technological problem.” No. 2015-1180, 2016 WL 6440387, at *11
`
`(Fed. Cir. Nov. 1, 2016). Use of this “distributed architecture” transformed the claims into
`
`patentable subject matter. Id.
`
`Nevertheless, not all technological aspects of how a patented invention is implemented
`
`supply a basis for finding an “inventive concept.” A claim that simply takes an abstract idea and
`
`adds “the requirement to perform it on the Internet, or to perform it on a set of generic computer
`
`components . . . would not contain an inventive concept.” BASCOM, 827 F.3d at 1350. For
`
`example, in Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat. Ass’n, the Federal
`
`Circuit found that claims directed to the abstract ideas of extracting data and recognizing patterns
`
`did not recite an inventive concept because they simply recited “generic scanner and computer to
`
`perform well-understood, routine, and conventional activities commonly used in industry.” 776
`
`F.3d 1343, 1348 (Fed. Cir. 2014), cert. denied, 136 S. Ct. 119, 193 L. Ed. 2d 208 (2015). In
`
`Affinity Labs, the court found there was no inventive concept because “[t]he claim simply recites
`
`the use of generic features of cellular telephones, such as a storage medium and a graphical user
`
`interface, as well as routine functions, such as transmitting and receiving signals, to implement the
`
`underlying idea.” 838 F.3d at 1262. In Intellectual Ventures I, the court found that the claimed
`
`11
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 12 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`email filtering methods and systems did not recite an inventive concept because “the asserted
`
`claims describe only generic computer elements” or “generic computers that use generic virus
`
`screening technology.” 838 F.3d at 1316, 1320. Accordingly, the search for an inventive
`
`concept remains one that court must approach cautiously, “scrutiniz[ing] the claim elements more
`
`microscopically” than in step one. Elec. Power Grp., 830 F.3d at 1354.
`
`In addition to these principles, several other considerations may be helpful in conducting a
`
`§ 101 analysis: First, the Supreme Court has recognized that the “concern that undergirds [the]
`
`§ 101 jurisprudence” is preemption. Alice, 134 S. Ct. at 2358. If a claim is so abstract so as to
`
`“pre-empt use of [the claimed] approach in all fields, and would effectively grant a monopoly over
`
`an abstract idea” is not patent-eligible. Bilski v. Kappos, 561 U.S. 593, 612, 130 S. Ct. 3218,
`
`3231, 177 L. Ed. 2d 792 (2010). However, the inverse is not true: “[w]hile preemption may signal
`
`patent ineligible subject matter, the absence of complete preemption does not demonstrate patent
`
`eligibility.” FairWarning, 839 F.3d at 1098 (internal quotation marks and citation omitted).
`
`Second (and relatedly), “claims that are ‘so result-focused, so functional, as to effectively
`
`cover any solution to an identified problem’ are frequently held ineligible under section 101.”
`
`Affinity Labs, 838 F.3d at 1265. For example, in Elec. Power Grp., the Federal Circuit found that
`
`claims directed to “any way of effectively monitoring multiple sources on a power grid” instead of
`
`“some specific way of enabling a computer to monitor data from multiple sources across an
`
`electric power grid” did not contain an inventive concept. 830 F.3d at 1356. The Federal Circuit
`
`has noted that this framework “is one helpful way of double-checking the application of the
`
`Supreme Court's framework to particular claims—specifically, when determining whether the
`
`claims meet the requirement of an inventive concept in application.” Id.
`
`III. DISCUSSION
`
`With these principles in mind, the Court turns to the claims at issue. As set forth below,
`
`the Court finds that the asserted claims of the ’494 patent are not patent-ineligible because,
`
`although they are directed to an abstract idea, they recite an inventive concept. 134 S. Ct. at 2355.
`
`A. Relevance of ’194 Patent
`
`Before turning to the merits, this case requires the Court to clarify the scope of materials
`
`12
`
`Northern District of California
`
`United States District Court
`
`

`

`Case 5:15-cv-03295-BLF Document 156 Filed 12/13/16 Page 13 of 21
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`relevant to its analysis. This case presents an interesting scenario where the claims themselves are
`
`basic and broad, but significant clarifying detail is provided in a specification that belongs not to
`
`the ’494 patent itself, but to a parent patent (the ’194 patent), which the ’494 patent identifies and
`
`declares to be “hereby incorporated by reference.” ’494 patent, col. 1 ll. 37-38. Finjan,
`
`unsurprisingly, urges the Court to pay particul

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket