throbber

`
`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 1 of 27
`
`
`
`J. DAVID HADDEN (CSB No. 176148)
`dhadden@fenwick.com
`SAINA S. SHAMILOV (CSB No. 215636)
`sshamilov@fenwick.com
`TODD R. GREGORIAN (CSB No. 236096)
`tgregorian@fenwick.com
`PHILLIP J. HAACK (CSB No. 262060)
`phaack@fenwick.com
`RAVI R. RANGANATH (CSB No. 272981)
`rranganath@fenwick.com
`CHIEH TUNG (CSB No. 318963)
`ctung@fenwick.com
`FENWICK & WEST LLP
`Silicon Valley Center
`801 California Street
`Mountain View, CA 94041
`Telephone:
`650.988.8500
`Facsimile:
`650.938.5200
`
`Attorneys for AMAZON.COM, INC., and
`AMAZON WEB SERVICES, INC.
`
`
`UNITED STATES DISTRICT COURT
`NORTHERN DISTRICT OF CALIFORNIA
`SAN JOSE DIVISION
`
`IN RE: PERSONALWEB TECHNOLOGIES,
`LLC ET AL., PATENT LITIGATION,
`
` Case No.: 5:18-md-02834-BLF
`
`AMAZON.COM, INC., and AMAZON WEB
`SERVICES, INC.,
`Plaintiffs,
`
`v.
`PERSONALWEB TECHNOLOGIES, LLC and
`LEVEL 3 COMMUNICATIONS, LLC,
`Defendants.
`
`
`
`Case No.: 5:18-cv-00767-BLF
`RESPONSIVE CLAIM
`CONSTRUCTION BRIEF OF
`AMAZON.COM INC., AMAZON WEB
`SERVICES, INC. AND TWITCH
`INTERACTIVE, INC.
`
`PERSONALWEB TECHNOLOGIES, LLC and
`LEVEL 3 COMMUNICATIONS, LLC,
`Counterclaimants,
`
`v.
`
`AMAZON.COM, INC., and AMAZON WEB
`SERVICES, INC.,
`
`Counterdefendants.
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`
`
`
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 2 of 27
`
`
`
` Case No. 5:18-cv-05619-BLF
`
`PERSONALWEB TECHNOLOGIES, LLC, A
`Texas limited liability company, and
`LEVEL 3 COMMUNICATIONS, LLC, a
`Delaware limited liability company,
`Plaintiffs,
`
`v.
`TWITCH INTERACTIVE, INC. a Delaware
`corporation,
`
`Defendants.
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`
`
`
`
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 3 of 27
`
`
`
`I.
`II.
`III.
`
`B.
`
`TABLE OF CONTENTS
`INTRODUCTION ------------------------------------------------------------------------------------ 1
`THE TRUE NAME PATENTS --------------------------------------------------------------------- 1
`DISPUTED CONSTRUCTIONS ------------------------------------------------------------------- 3
`A. The Patents-in-Suit treat “authorization” and “licensing” the same and
`disclose no alternate meaning for either concept ------------------------------------------ 3
` “unauthorized or unlicensed” (’310 patent, claim 20) -------------------------------- 3
` “authorization” (’420 patent, claims 25, 166) ------------------------------------------ 3
`In the True Names patents, a request for a data item includes the name for
`that data item ------------------------------------------------------------------------------------ 9
` “the request including at least a content dependent name of a particular
`data item” (’310 patent, claim 20) ------------------------------------------------------- 9
`C. The invention uses “names” to locate and verify access to data items ---------------- 11
` “content-dependent name” (’310 patent, claims 20 and 69; ’420 patent,
`claim 25) ---------------------------------------------------------------------------------- 11
` “name for a data file” (’442 patent, claim 10) --------------------------------------- 11
`D. The names used by the ’544 patent are created by hashing the segments of a
`data item, then hashing the resulting values, creating a “hash of hashes” ----------- 13
` “digital key for the particular file” (’544 patent, claim 46) / “file key for
`each particular file” (’544 patent, claim 52) ...................................................... 13
` “part” (’544 patent claims 46, 52) ----------------------------------------------------- 15
` “being based on a first function of the contents of the specific part” (’544
`patent, claim 46) ------------------------------------------------------------------------- 18
` “part value” (’544 patent, claims 46, 52) --------------------------------------------- 18
` “function of the one or more of part values” (’544 patent, claim 46) ------------ 21
`
`
`
`
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`i
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 4 of 27
`
`
`
`Cases
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`Alloc, Inc. v. Int’l Trade Comm’n,
`342 F.3d 1361 (Fed. Cir. 2003) -------------------------------------------------------------------- 20
`
`Baran v. Med. Device Techs., Inc.,
`616 F.3d 1309 (Fed. Cir. 2010) --------------------------------------------------------------------- 6
`
`EcoNova, Inc. v. DPS Utah,
`No. 1:12-CV-174, 2013 WL 65460 (D. Utah Jan. 4, 2013)------------------------------------- 6
`
`Every Penny Counts, Inc. v. Am. Express Co.,
`563 F.3d 1378 (Fed. Cir. 2009) --------------------------------------------------------------------- 5
`
`Medrad, Inc. v. MRI Devices Corp.,
`401 F.3d 1313 (Fed. Cir. 2005) -------------------------------------------------------------------- 22
`
`MySpace, Inc. v. GraphOn Corp.,
`672 F.3d 1250 (Fed. Cir. 2012.) -------------------------------------------------------------------- 8
`
`O2 Micro Int’l, Ltd. v. Beyond Innovation Tech. Co.,
`521 F.3d 1351 (Fed. Cir. 2008) --------------------------------------------------------------------- 5
`
`PersonalWeb Techs., LLC v. Amazon.com Inc.,
`No. 6:11-cv-00658, Dkt. 140 (E.D. Tex. Aug. 5, 2013) ----------------------------------------- 8
`
`PersonalWeb Techs., LLC v. IBM Corp.,
`No. 6:12-cv-661-JRG, Dkt. 103 (E.D. Tex. Mar. 11, 2016) ----------------------------- 6, 8, 19
`
`Praxair, Inc. v. ATMI, Inc.,
`543 F.3d 1306 (Fed. Cir. 2008) --------------------------------------------------------------- 19, 22
`
`SimpleAir, Inc. v. Sony Ericsson Mobile Commc’ns AB,
`820 F.3d 419 (Fed. Cir. 2016) ----------------------------------------------------------------------- 6
`
`Wi-LAN USA, Inc. v. Apple Inc.,
`830 F.3d 1374 (Fed. Cir. 2016) --------------------------------------------------------------------- 8
`
`Other Authorities:
`
`Microsoft Computer Dictionary (2nd ed. 1994)------------------------------------------------------ 15
`
`Newton’s Telecom Dictionary (1994) ----------------------------------------------------------------- 15
`
`
`
`
`
`
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`ii
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 5 of 27
`
`
`
`I.
`
`INTRODUCTION
`The patents in suit purport to solve the problem of consistently locating files (i.e., “data
`items”) in a computer system, and controlling access to files that contain licensed content to prevent
`unauthorized sharing. To accomplish this, files are identified using “True Names”—names
`computed from the data in the file itself—instead of other less reliable means such as user-provided
`file names. According to the patents, this allows a file to be uniquely identified regardless of its
`context, which in turn allows a system to reliably limit access to the file to authorized or licensed
`users.
`
`In these cases, PersonalWeb accuses the use of ETags in conditional GET requests on the
`Web. But on the Web, URLs with user-provided file names and paths are used to locate and access
`files, not ETags. Nor are ETags used to control access to licensed content. ETags as used in the
`accused conditional GET requests to determine whether a user already has the latest version of a
`requested file stored locally. That determination is anonymous. No authorization or content license
`is checked, and no user requesting a file is denied access to it. If the ETag of the local file matches
`the ETag of the latest version, the user receives a confirmation that the version of the file is current.
`If those ETags don’t match, the user receives the current version of the file. In this scenario, the
`user also still has and can continue to freely access the earlier version of the file.
`PersonalWeb cannot “construe” its patents to cover this basic Web technology that has
`nothing to do with the purported invention of the patents. The claim language, the specification,
`and the prosecution history—including a series of IPRs that were filed during PersonalWeb’s past
`round of litigations—do not allow it.
`
`II.
`
`THE TRUE NAME PATENTS
`The patents address what the inventors saw as a fundamental problem with existing
`computer systems: the use of user-provided names and file system directories to identify and access
`files or other data items. The purported invention replaced these conventional names with True
`Names calculated solely from the data in the data item itself:
`
`This invention provides, in a data processing system, a method and apparatus for
`identifying a data item in the system, where the identity of the data item depends
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`1
`
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 6 of 27
`
`
`
`on all the data in the data item and only on the data in the data item. Thus, the
`identity of a data item is independent of its name, origin, location, address, or
`other information not derivable directly from the data, and depends only on the
`data itself.
`
`(’310 patent at 3:52–58 (emphasis added).)
`The patents emphasize that in the invention True Names are used by every computer,
`whether the user’s local computer or a remote server, to uniquely identify and access every data
`item in the system. (See, e.g., id. at 31:33–37:3 (“The System in Operation”).) The True Names
`are immune to changes in context like differing computer systems, storage locations, software, or
`users: if something other than the content of the file changes (for example, the file name), the True
`Name will not change. (Declaration of J. David Hadden in Support (“Hadden Decl.”), Ex. 1, ’791
`File History, Aug. 29, 1997 Amendment, at 9–10.) In other words, the True Name never changes
`unless the content of the file does. Conversely, if the file itself changes at all (e.g., changing even
`a single character in a document), its True Name will change. (See, e.g., id. at 9.)
`Several of the patents are directed to using the True Name to control access to licensed
`content. (See, e.g., ’442 patent at Title (“Enforcement and policing of licensed content using
`content-based identifiers”), ’310 patent at Abstract (“Access to and delivery of licensed content is
`controlled using content names that were determined based on the content”).) The purported
`benefit of using True Names is that users can’t hide illegal file-sharing by changing the name of
`the file, because the True Name depends only on the file content.
`Many of the True Name patents were successfully challenged in inter partes review
`proceedings filed during PersonalWeb’s earlier litigation campaign. The Patent Trial and Appeal
`Board (“PTAB”) found claim 1 of the ’544 patent and claims 24, 32, 70, 81, 82, and 86 of the ’310
`patent invalid. The Federal Circuit affirmed the invalidity holding on the ’544 patent, and
`PersonalWeb declined to appeal claim 70 of the ’310 patent.1 The Board also found a number of
`claims from related patents invalid: claims 1-4, 29-33 and 41 of U.S. Patent No. 5,978,791 (parent
`
`
`1 The Federal Circuit reversed the PTAB with respect to the other claims of the ’310 patent, and
`the appeal process is still pending.
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`2
`
`
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 7 of 27
`
`
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`to all of the patents-in-suit); claims 36 and 38 of U.S. Patent No. 6,415,280 (parent to all of the
`patents-in-suit); claims 10, 21, and 34 of U.S. Patent No. 7,945,539 (sibling of the ’310 and ’544
`patents); claim 30 of U.S. Patent No. 7,949,662 (divisional of the ’442 patent); claims 1, 2, 81 and
`83 of U.S. Patent No. 8,001,096 (sibling of the ’310 and ’544 patents). All of those invaliding
`determinations were affirmed by the Federal Circuit.
`
`III. DISPUTED CONSTRUCTIONS
`The Patents-in-Suit treat “authorization” and “licensing” the same and
`A.
`disclose no alternate meaning for either concept.
`“unauthorized or unlicensed” (’310 patent, claim 20)
`
`PersonalWeb’s Proposal
`Amazon and Twitch’s Proposal
`Plain and ordinary meaning.
`not compliant with a valid license
`Alternative construction: not permitted or
`not legally permitted
`
`“authorization” (’420 patent, claims 25, 166)
`
`PersonalWeb’s Proposal
`Amazon and Twitch’s Proposal
`plain and ordinary meaning.
`a valid license
`Alternative constructions: permission
`
`Every asserted claim in the ’310, ’442 and ’420 patents requires using a True Name to
`determine who is authorized to receive or access specific licensed content. The shared specification
`describes making this determination using a license table that links the True Name for a data item
`to the name of a valid licensee. (See, e.g., ’310 patent at 31:3–32.) The system provides a copy of
`the file on request, but only to licensed parties. (See, e.g., id., claim 20 (“if it is determined that the
`content is unauthorized or unlicensed, not permitting the content to be provided to or accessed”);
`id., claim 69 (“allow the data item to be provided to or accessed by the second computer if it is not
`determined that access to the data item is unauthorized”); ’420 patent, claim 25 (“wherein a copy
`of the sequence of bits is not to be provided or accessed without authorization”); id., claim 166
`(“wherein the data item is not to be made available for access or provided without authorization”);
`’442 patent, claim 11 (“allowing the file to be provided from one of the computers having an
`authorized or licensed copy of the file”).)
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`3
`
`
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 8 of 27
`
`
`
`PersonalWeb’s infringement theory, however, has nothing to do with licensing or content
`authorization. It accuses “conditional” GET requests using If-None-Match headers on the World
`Wide Web. These requests use ETag values that can be used to determine whether a user already
`has a copy of the current object found at a given web location, or URL. If so, no new object is sent;
`if not, the current object is sent to the browser. The process is anonymous. No user is refused a
`requested object based on whether they have a valid license. And nothing forces the user to discard
`the old object. The process simply has nothing to do with controlling access to content.
`PersonalWeb wants to rewrite its claims to cover determining whether a new version of a file is
`available, not whether a particular user has a valid license and is thus authorized to access it.
`PersonalWeb’s representations during prosecution and in numerous inter partes review
`actions belie its current positions on the scope of the claims. PersonalWeb told both the PTAB and
`the Federal Circuit that the notion that a user is “unauthorized” to access an object already possessed
`because a new version is available was “illogical” and “cannot be done.” (See Hadden Decl., Ex.
`2, Patent Owner Response to IPR2013-00596 (Paper 15) at 19–20; id., Ex. 3, Brief of PersonalWeb,
`Case No. 18-1599, Dkt. 15 at 47 (Fed. Cir. May 31, 2018).) In distinguishing the Woodhill prior
`art reference, PersonalWeb argued that “[g]iven that the local computer 20 already has the most
`recent version of the file, as a matter of common sense there would have been no logical reason
`to . . . check[] whether that same computer is authorized to access the previous version of that same
`file.” (See id., Ex. 2, Patent Owner Response to IPR2013-00596 (Paper 15) at 19–20; see also id.,
`Ex. 3, Brief of PersonalWeb, Case No. 18-1599, Dkt. 15 at 47 (Fed. Cir. May 31, 2018) (“The
`Board never explains how an ‘unauthorized’ user—one without access to the file—could calculate
`the Binary Object Identifiers that are necessary for Woodhill’s backup system to work. For good
`reason: it cannot be done.”).) Most important, PersonalWeb expressly distinguished using an
`identifier to determine whether an object has changed from determining whether access is
`authorized. (Id., Ex. 4, Patent Owner Response to IPR2014-00058 (Paper 19) at 3 (“Francisco
`compares the program identifier with a single value for making sure that the file is authentic (i.e.,
`that it has not changed) . . . . Thus, Francisco’s program identifier . . . is not compared to anything
`for determining whether access is authorized.”).)
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`4
`
`
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 9 of 27
`
`
`
`This is why the Court cannot just leave the jury to apply its own lay understanding of the
`terms. The parties have a clear dispute regarding claim scope, which the Court and not the jury
`must resolve. O2 Micro Int’l, Ltd. v. Beyond Innovation Tech. Co., 521 F.3d 1351, 1362 (Fed. Cir.
`2008) (“When the parties present a fundamental dispute regarding the scope of a claim term, it is
`the court’s duty to resolve it.”); see also Every Penny Counts, Inc. v. Am. Express Co., 563 F.3d
`1378, 1383 (Fed. Cir. 2009) (“[T]he court’s obligation is to ensure that questions of the scope of
`the patent claims are not left to the jury.”) (citing O2 Micro, 521 F.3d at 1361–62).
`Turning to the specifics of the parties’ dispute, the patents treat “unauthorized or
`unlicensed” as a single concept that relates to a fundamental purpose of the claimed invention—
`policing access to licensed content. The Court should construe the terms consistent with the
`patentee’s own use of them, and not supplant the patentee’s meaning with a vague dictionary
`definition tailored for PersonalWeb’s current infringement theory. The very title of the ’442 patent
`describes the invention as the “[e]nforcement and policing of licensed content using content-based
`identifiers.” (’442 patent, Title.) The shared specification of the patents describes how to prohibit
`unauthorized parties from accessing licensed files. (’310 patent at 31:3–32.) In fact, these portions
`of the specification that discuss policing licensing (the “Track for Licensing Purposes” mechanism
`and data structures) are the only places in the specification that use either the terms “licensed” or
`“authorized,” or any variant thereof.
`The specification repeatedly treats the concept of “licensed” use of content as
`interchangeable with whether that use is “authorized.” It describes using a “license table” that
`stores the True Name for a data item and the “licensee,” the “identity of a user authorized to have
`access to it.” (Id. at 11:31–45
`(emphasis added).) The licensing
`table records the True Name of “key
`files” required to use the licensed
`product along with the identity of the
`system or user that is “authorized” to access that file. (Id. at 31:17–23; see also Hadden Decl., Ex.
`5, Memorandum Order, PersonalWeb Techs., LLC v. IBM Corp., No. 6:12-cv-661-JRG, Dkt. 103
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`5
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 10 of 27
`
`
`
`at 24 (E.D. Tex. Mar. 11, 2016) (“Gilstrap Order”).) Both the description of the license table and
`the table itself use “licensed” and “authorized” interchangeably. (Compare ’310 patent, 11:33–35
`(“the license table 136 records a relationship between a licensable data item and the user licensed
`to have access to it”), with id. at 11:43 (“identity of a user authorized to have access”) (above
`right) (emphasis added).)
`As important, the patents disclose the license table as the sole means of controlling access
`to content; there is no separate means disclosed in the patents for determining whether content is
`“unauthorized.” The specification recites that “[t]his mechanism ensures that licensed files are not
`used by unauthorized parties,” and then notes that license enforcement is performed for users “who
`do not have proper authorization.” (Id. at 31:4–5, 9–12.) In the patents, “authorization” refers to
`a valid license, and “unauthorized” and “unlicensed” refer synonymously to behavior that is not
`compliant with a valid license.
`Given this, the Court should adopt Amazon’s constructions despite the general rule that
`“interpretations that render some portion of the claim language superfluous are disfavored.”
`SimpleAir, Inc. v. Sony Ericsson Mobile Commc’ns AB, 820 F.3d 419, 429–30 (Fed. Cir. 2016)
`(citations omitted). “The preference for giving meaning to all terms [] is not an inflexible rule that
`supersedes all other principles of claim construction.” Id. This is because “the construction that
`stays true to the claim language and most naturally aligns with the patent’s description of the
`invention will be, in the end, the correct construction.” Id. at 430 (quoting Phillips v. AWH
`Corp., 415 F.3d 430 1303, 1316 (Fed. Cir. 2005) (en banc)). Here, where the specification so
`repeatedly and consistently describes licensing and authorization as the same concept, the doctrine
`does not apply. See Baran v. Med. Device Techs., Inc., 616 F.3d 1309, 1316 (Fed. Cir. 2010)
`(applying same meaning to terms “detachable” and “releasable” in a single claim because “the
`evidence indicates that the patentee used the two terms interchangeably”); EcoNova, Inc. v. DPS
`Utah, No. 1:12-CV-174, 2013 WL 65460, at *13–14 (D. Utah Jan. 4, 2013) (in construing the
`disjunctive phrase “at or adjacent to the peripheral wall,” “conclud[ing] that ‘at’ is synonymous
`with ‘adjacent’ and means ‘near’ [because] this is simply a case where [patentee] used different
`words to express similar concepts”) (citations omitted).
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`6
`
`
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 11 of 27
`
`
`
`By contrast, “authorized” is not used in the patents to refer only to any “permitted” action,
`as PersonalWeb argues. The two examples of “permissions” PersonalWeb points to in the
`specification in fact do not even use the term “authorized,” and they have nothing to do with
`authorizing access to content. (Op. Br. at 2.) They therefore shed no light on the meaning of
`“authorized” as it is used in the claims. The first example is a “region table” that describes part of
`the file system on which the True Names invention is built. (See ’310 patent at 9:62–10:33.) A
`region table can identify a region or file as “read-only,” which prevents writing changes to it. (Id.)
`The only disclosed example of a read-only file is removable media, such as a CD-ROM. (See id.
`at 27:35–39.) Banning writing changes to a file using the file system is related to neither locating
`or accessing a True Name file, nor determining which users are authorized to access the file’s
`content.
`The second example is a “lock flag,” which, again, has nothing to do with authorizing access
`to content. (Op. Br. at 2.) Instead, it describes a conventional method of handling shared resources
`in a distributed system. The lock flag “indicates whether a file is locked, that is, it is being modified
`by the local processor or a remote processor.” (’310 patent at 9:23–26.) Because “[o]nly one
`processor may modify a file at a time,” the flag lets processors share resources in an orderly fashion.
`(Id.) The specification notes that the use of “appropriate locking techniques” to quarantine access
`to shared resources was “well understood by ordinarily skilled programmers of distributed
`applications.” (Id. at 8:11–18.) What PersonalWeb cites describes conventional techniques for
`preventing computers from making inconsistent changes to the same data at the same time; it has
`nothing to do with “authorizing” access to content.
`PersonalWeb’s reliance on these disclosures highlights another problem with its proposed
`constructions. Not only does it unmoor the concept of “authorized” from its use in the specification,
`it also conflates the step of determining whether access to the licensed content is authorized with
`permitting that content to be accessed or not. These are separate operations in the claims. For
`example, claim 20 of the ’310 patent separately requires “permitting the content to be provided to
`or accessed” based on the determination of whether the content is authorized or licensed. (Id.,
`claim 20 (39:24–28).) Authorized cannot mean “permitted” because permitting access is a separate
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`7
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 12 of 27
`
`
`
`claim step that is performed after, and depends on, first determining whether the content is
`unauthorized or unlicensed.
`Judge Gilstrap recognized that licensing and authorization are the same concept in the
`patents, and provided the correct construction for these terms. (Compare Gilstrap Order at 25
`(construing “licensed” as “valid rights to content”), with id. at 28 (construing “authorized” as
`“compliant with a valid license”); see also id. (“The Court therefore reaches the same conclusions
`[regarding the “authorization” terms] for substantially the same reasons as for the terms ‘licensed’
`and ‘unlicensed.’”).) In his order, Judge Gilstrap quoted the precise language proposed for
`construction here. (Gilstrap Order at 25 (quoting the phrase “unauthorized or unlicensed copies”
`in the ’442 patent).) He also correctly declined to follow Judge Davis’s decision not to construe.
`As he recognized, the dispute before Judge Davis did not address “authorization” at all. (Gilstrap
`Order at 23.) There, with respect to the terms “licensed” and “unlicensed,” the parties disputed
`“whether the license must be to the content of a file or to the system as a whole,” and whether a licensed
`file must be “requested.” (Hadden Decl., Ex. 6, Memorandum Opinion and Order, PersonalWeb
`Techs., LLC v. Amazon.com Inc., No. 6:11-cv-00658, Dkt. 140 at 25–26, 47 (E.D. Tex. Aug. 5,
`2013).)
`PersonalWeb contends that the prosecution history supports its position, but this argument
`fails. PersonalWeb points to claim amendments made to the ’420 patent in 20102 as evidence that
`the applicants intended to treat licensing differently than authorization. (Op. Br. at 5.) Even if the
`claims PersonalWeb identifies were in the issued patent, which they are not, the differences in these
`claims cannot overcome the clear description of the specification. Wi-LAN USA, Inc. v. Apple Inc.,
`830 F.3d 1374, 1391 (Fed. Cir. 2016) (“Claim differentiation cannot ‘overcome . . . a contrary
`construction dictated by the written description or prosecution history.’”) (citing Marine Polymer
`Techs., Inc. v. HemCon, Inc., 672 F.3d 1350, 1359 (Fed. Cir. 2012). “An inventor is entitled to
`claim in a patent what he has invented, but no more.” MySpace, Inc. v. GraphOn Corp., 672 F.3d
`
`
`2 PersonalWeb describes the amendments as relating to the ’442 patent, but the recited excerpts
`are from the file history of the ’420 patent.
`
`RESPONSIVE CLAIM CONSTRUCTION
`BRIEF OF AMAZON AND TWITCH
`
`8
`
`
`
`Case No.: 5:18-md-02834-BLF
`Case No.: 5:18-cv-00767-BLF
`Case No.: 5:18-cv-05619-BLF
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`ATTORNEYS AT LAW
`
`FENWICK & WEST LLP
`
`
`
`

`

`Case 5:18-md-02834-BLF Document 412 Filed 04/22/19 Page 13 of 27
`
`
`
`
`1 1
`
`2 2
`
`3 3
`
`4 4
`
`5 5
`
`6 6
`
`7 7
`
`8 8
`
`9 9
`
`10 10
`
`11 11
`
`12 12
`
`13 13
`
`14 14
`
`15 15
`
`16 16
`
`17 17
`
`18 18
`
`19 19
`
`20 20
`
`21 21
`
`22 22
`
`23 23
`
`24 24
`
`25 25
`
`26 26
`
`27 27
`
`28 28
`
`1250, 1256 (Fed. Cir. 2012.) PersonalWeb cannot expand the scope of its invention 15 years after
`the fact by trying to slice the single concept “unauthorized or unlicensed” into two distinct criteria
`and thereby expand its claims in ways that were not contemplated by the inventors or described in
`their specification.
`In sum, PersonalWeb is trying to rewrite the access control claims that require determining
`whether content is “unauthorized or unlicensed” to cover merely providing updated content if the
`requesting computer does not already have it. The intrinsic record plainly prevents this. But apart
`from that record, PersonalWeb may not do so for another reason. Claims with that precise scope
`were found invalid by the PTAB in a final written decision and affirmed by the Federal Circuit.
`For example, claim 33 of the ’791 patent, now invalid, is directed to using a True Name to
`“determin[e] . . . whether the data item is present at the destination location” and then “based on
`the determining whether the data item is present, providing the destination location with the data
`item only if the data item is not present at the destination.” This is exactly the claim scope that
`PersonalWeb is aiming for here—claim scope that the PTAB and Federal Circuit have already
`concluded PersonalWeb is not entitled to remove from the public domain.
`
`B.
`
`In the True Names patents, a request for a data item includes the name for
`that data item.
`“the request including at least a content dependent name of a
`
`particular data item” (’310 patent, claim 20)
`PersonalWeb’s Proposal
`Amazon and Twitch’s Proposal
`the reque

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket