throbber
Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 1 of 21 PageID #: 6318
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`











`
`MEMORANDUM OPINION AND ORDER
`
`Civil Action No. 18-160-WCB
`
`
`
`KOM SOFTWARE INC.,
`
`
`Plaintiff,
`
`
`
`
`NETAPP, INC.,
`
`
`v.
`
`Defendant.
`
`
`
`In this patent infringement action, defendant NetApp, Inc., has moved for judgment on the
`
`pleadings under Federal Rule of Civil Procedure 12(c). Dkt. No. 145. NetApp argues that the
`
`patent claims asserted by plaintiff KOM Software Inc. are invalid under 35 U.S.C. § 101 for being
`
`directed to patent-ineligible subject matter. For the reasons set forth below, the motion is
`
`GRANTED IN PART and DENIED IN PART.
`
`I.
`
`Background
`
`
`
`In its first amended complaint, KOM originally asserted claims from seven patents against
`
`NetApp and two other defendants who have since been dismissed from the case. Five of those
`
`seven patents are no longer asserted in this case. The remaining asserted claims are claims 5, 6,
`
`and 9 of U.S. Patent No. 6,654,864 (“the ’864 patent”) and claims 4, 34, 69, and 103 of U.S. Patent
`
`No. 9,361,243 (“the ’243 patent”). Both patents are generally directed to restricting access to files
`
`contained within a computer data storage medium.
`
`As explained in the specification of the ’864 patent, a software application may seek to
`
`access and modify various files stored in a storage medium, such as a hard drive or CD-ROM,
`
`
`
`1
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 2 of 21 PageID #: 6319
`
`while the medium is running. ’864 patent, col. 1, ll. 15–41. In many operating systems, including
`
`“Windows NT,” the drivers for the storage devices are “hidden from applications by a protected
`
`subsystem.” Id. at col. 1, ll. 30–34. That is, the applications and the storage devices do not
`
`communicate directly with one another; instead, “[e]ach communicates with the operating system
`
`independently.” Id. at col. 1, ll. 43–47.
`
`In a typical operating system, a software application will submit a request to open a file
`
`through the application’s protected subsystem. The request is sent to the “IO [input/output] system
`
`services,” which in turn direct the “IO Manager” to communicate with the device drivers. Id. at
`
`col. 4, ll. 25–42. As the specification of the ’864 patent notes, prior art systems would require the
`
`device drivers to “deal[] with file system commands which cannot be completed,” because all
`
`access requests were sent through the IO manager to the device drivers. See id. at col. 7, line 53,
`
`through col. 8, line 5.
`
`The ’864 and ’243 patents disclose implementing a “trap layer” between the application
`
`layer and the file system layer of the computer system. See ’864 patent, col. 7, ll. 53–58. The trap
`
`layer prevents invalid requests from being passed to the device drivers. Based on the capabilities
`
`of the storage device that is being accessed, the trap layer can block some requests and modify
`
`other requests. Id. at col. 7, ll. 60–64. For example, a particular storage device may permit files
`
`to be read and written but not deleted. Id. at col. 8, ll. 8–10. In such a device, the trap layer that
`
`is disclosed in the asserted patents would “intercept” a request to delete a file and would return an
`
`error message to the application that was trying to access the device. Id. at col. 8, ll. 14–21.
`
`Similarly, if the device supports “read access” but not “write access,” the trap layer could modify
`
`a request to open a file with “read/write access” by converting that request into one seeking “read-
`
`only access.” See id. at col. 7, ll. 44–46.
`
`
`
`2
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 3 of 21 PageID #: 6320
`
`Claim 5 of the ’864 patent is generally representative of the asserted claims of the ’864
`
`patent for purposes of the present motion. That claim recites as follows:
`
`5. A method of restricting access by a computer to a storage medium other than a
`write once medium in communication with the computer, the method comprising
`the steps of:
`
`providing an indication of a data write access privilege for the entire logical storage
`medium indicating a disabled operation relating to alteration of a portion of each
`file stored within the logical storage medium, the indication other than a read only
`indication; and
`
`restricting file access to each file within the logical storage medium in accordance
`with the same indication while allowing access to free space portions of the same
`logical storage medium.
`
`’864 patent, cl. 5.
`
`
`
`Claim 66 of the ’243 patent, from which asserted claims 69 and 103 depend, is generally
`
`representative of the asserted claims of the ’243 patent for purposes of the present motion. That
`
`claim recites as follows:
`
`66. A data processing system configured to apply a computer file system operation
`access privilege to a computer storage medium, comprises:
`
`at least one computer processor configured to associate the computer file system
`operation access privilege with at least a portion of the computer storage medium;
`
`said at least one computer processor configured to intercept, by at least one
`computer file system trap layer or at least one computer file system filter layer, an
`attempted operation on said at least a portion of the computer storage medium,
`
`wherein said interception occurs regardless of an identity of a user
`that attempts the attempted operation;
`
`said at least one computer processor configured to compare the
`attempted operation to the computer file system operation access
`privilege; and
`
`said at least one computer processor configured to allow, or deny
`the attempted operation based on the comparison of the attempted
`operation to the computer file system operation access privilege.
`
`’243 patent, cl. 66.
`
`
`
`3
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 4 of 21 PageID #: 6321
`
`
`
`NetApp contends that all the asserted claims of the ’864 and ’243 patents are invalid under
`
`35 U.S.C. § 101 because, in NetApp’s view, they are directed to an abstract idea and do not contain
`
`an inventive concept sufficient to render the claims patent-eligible.
`
`II.
`
`Legal Standard
`
`Under Federal Rule of Civil Procedure 12(c), “[a]fter the pleadings are closed—but early
`
`enough not to delay trial—a party may move for judgment on the pleadings.” A Rule 12(c) motion
`
`“will not be granted unless the movant clearly establishes that no material issue of fact remains to
`
`be resolved and that [it] is entitled to judgment as a matter of law.” Jablonski v. Pan Am. World
`
`Airways, Inc., 863 F.2d 289, 290 (3d Cir. 1988) (internal quotation marks and citation omitted).
`
`The standard that applies to a Rule 12(b)(6) motion to dismiss for failure to state a claim also
`
`applies to motions brought under Rule 12(c); that is, in the common situation in which the
`
`defendant moves to dismiss the complaint, the court “must accept the truth of all factual allegations
`
`in the complaint and must draw all reasonable inferences in favor of the non-movant.” Revell v.
`
`Port Auth. of New York & New Jersey, 598 F.3d 128, 134 (3d Cir. 2010). More generally, “[t]he
`
`purpose of judgment on the pleadings is to dispose of claims where the material facts are
`
`undisputed and judgment can be entered on the competing pleadings and exhibits thereto, and
`
`documents incorporated by reference.” Venetec Int’l, Inc. v. Nexus Med., LLC, 541 F. Supp. 2d
`
`612, 617 (D. Del. 2008).
`
`Patent eligibility under 35 U.S.C. § 101 is a question of law, based on underlying facts.
`
`See Aatrix Software, Inc. v. Green Shades Software, Inc., 882 F.3d 1121, 1125 (Fed. Cir. 2018);
`
`Berkheimer v. HP Inc., 881 F.3d 1360, 1364–65 (Fed. Cir. 2018). Disputes over eligibility can be,
`
`and frequently are, resolved on a Rule 12(b)(6) or Rule 12(c) motion “where the undisputed facts,
`
`considered under the standards required by that Rule, require a holding of ineligibility under the
`
`
`
`4
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 5 of 21 PageID #: 6322
`
`substantive standards of law.” SAP Am., Inc. v. InvestPic, LLC, 898 F.3d 1161, 1166 (Fed. Cir.
`
`2018) (citing cases).
`
`III.
`
`Patent Eligibility Under 35 U.S.C § 101
`
`A. Principles
`
`
`
`Section 101 of the Patent Act defines patent-eligible subject matter. It states: “Whoever
`
`invents or discovers any new and useful process, machine, manufacture or composition of matter,
`
`or any new and useful improvement thereof, may obtain a patent therefore, subject to the
`
`conditions and requirements of this title.” 35 U.S.C. § 101. The Supreme Court has interpreted
`
`that provision to carve out exceptions to that broad characterization of patentable subject matter
`
`for “[l]aws of nature, natural phenomena, and abstract ideas.” Alice Corp. Pty. v. CLS Bank Int’l,
`
`573 U.S. 208, 216 (2014) (quoting Ass’n for Molecular Pathology v. Myriad Genetics, Inc., 569
`
`U.S. 576, 589 (2013)).
`
`The framework for determining whether a patent is directed to an unpatentable abstract
`
`idea is well settled. The Supreme Court’s decision in Alice established the now-familiar two-step
`
`test for patentability in that context. The first step entails determining whether the claim at issue
`
`is directed to an “abstract idea.” The second step entails determining whether the claim contains
`
`an “inventive concept” that removes the claimed subject matter from the realm of abstraction.
`
`Alice, 573 U.S. at 217–18; see also Mayo Collaborative Servs. v. Prometheus Lab’ys, Inc., 566
`
`U.S. 66, 72–73 (2012).
`
`1. Abstract Idea
`
`Neither the Supreme Court nor the Federal Circuit has ventured a single, comprehensive
`
`definition of an “abstract idea.” See id. at 221 (“[W]e need not labor to delimit the precise contours
`
`of the ‘abstract ideas’ category in this case.”); Bilski v. Kappos, 561 U.S. 593, 621 (Stevens, J.,
`
`
`
`5
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 6 of 21 PageID #: 6323
`
`concurring in the judgment) (“The Court . . . never provides a satisfying account of what constitutes
`
`an abstract idea.”); Elec. Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1354 (Fed. Cir. 2018)
`
`(“We need not define the outer limits of ‘abstract idea . . . .’”); Enfish, LLC v. Microsoft Corp.,
`
`822 F.3d 1337, 1334 (Fed. Cir. 2018) (“The Supreme Court has not established a definitive rule to
`
`determine what constitutes an ‘abstract idea’ sufficient to satisfy the first step of the Mayo/Alice
`
`inquiry . . . .”). Rather than a unitary test, what has emerged from the cases applying section 101
`
`is a group of related principles that can be applied in gauging whether a patent claim is directed to
`
`an abstract idea. Those general principles that most directly apply to this case are the following:
`
`First, the courts have characterized “method[s] of organizing human activity” as abstract.
`
`See Alice, 573 U.S. at 220; BSG Tech LLC v. BuySeasons, Inc., 899 F.3d 1281, 1285 (Fed. Cir.
`
`2018). For example, the courts have identified fundamental economic and business practices as
`
`abstract ideas. See SAP Am., 898 F.3d at 1166; Intell. Ventures I LLC v. Symantec Corp., 838 F.3d
`
`1307, 1313 (Fed. Cir. 2016). Such business practices can include relatively specific functions such
`
`as disseminating regionally broadcasted content to users outside the region, see Affinity Labs of
`
`Tex., LLC v. DIRECTV, LLC, 838 F.3d 1253, 1261–62 (Fed. Cir. 2016); classifying an image and
`
`storing the image based on its classification, see In re TLI Commc’ns LLC Pat. Litig., 823 F.3d
`
`607, 611 (Fed. Cir. 2016); or managing a bingo game, see Planet Bingo, LLC v. VKGS LLC, 576
`
`F. App’x 1005, 1008 (Fed. Cir. 2014).
`
`Applying that principle to patents that claim the use of computers in performing particular
`
`activities, courts have held that simply implementing particular economic practices on a computer
`
`does not make those practices patent-eligible. See BSG Tech, 899 F.3d at 1285 (“If a claimed
`
`invention only performs an abstract idea on a generic computer, the invention is directed to an
`
`
`
`6
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 7 of 21 PageID #: 6324
`
`abstract idea at step one” of Alice.”); Fair Warning IP, LLC v. Iatric Sys., Inc., 839 F.3d 1089,
`
`1093 (Fed. Cir. 2016); TLI, 823 F.3d at 612; Enfish, 822 F.3d at 1338.
`
`Second, as applied to computer-related applications, the courts have looked to whether the
`
`claim in question is directed to an improvement in computer technology as opposed to simply
`
`providing for the use of a computer to perform “economic or other tasks for which a computer is
`
`used in its ordinary capacity.” Enfish, 822 F.3d at 1336; see also Universal Secure Registry LLC
`
`v. Apple Inc., 10 F.4th 1342, 1357 (Fed. Cir. 2021); Yu v. Apple Inc., 1 F.4th 1040, 1044 (Fed. Cir.
`
`2021); McRO, Inc. v. Bandai Namco Games Am. Inc., 837 F.3d 1299, 1316 (Fed. Cir. 2016).
`
`Where the claims at issue provide for an improvement in the operation of a computer, such as a
`
`new memory system, a new type of virus scan, or a new type of interface that makes a computer
`
`function more accessible, the Federal Circuit has found the claims patent-eligible. See Data
`
`Engine Techs. LLC v. Google LLC, 906 F.3d 999, 1007–11 (Fed. Cir. 2018) (methods for making
`
`electronic spreadsheets more accessible); Core Wireless Licensing S.A.R.L. v. LG Elecs., Inc., 880
`
`F.3d 1356, 1361–63 (Fed. Cir. 2018) (improved display devices); Finjan, Inc. v. Blue Coat Sys.,
`
`Inc., 879 F.3d 1299, 1303–06 (Fed. Cir. 2018) (novel method of virus scanning); Visual Memory
`
`LLC v. NVIDIA Corp., 867 F.3d 1253, 1258–60 (Fed. Cir. 2017) (improved computer memory
`
`system).
`
`Third, again in the field of computer-related applications, the Federal Circuit has held that
`
`claims are directed to an abstract idea if they are “directed to collection of information,
`
`comprehending the meaning of that collected information, and indication of the results, all on a
`
`generic computer network operating in its normal, expected manner.” Int’l Bus. Machines Corp.
`
`v. Zillow Grp., Inc., 50 F.4th 1371, 1378 (Fed. Cir. 2022) (quoting In re Killian, 45 F.4th 1373,
`
`1380 (Fed. Cir. 2022)); see also SAP Am., 898 F.3d at 1167 (“[C]laims focused on ‘collecting
`
`
`
`7
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 8 of 21 PageID #: 6325
`
`information, analyzing it, and displaying certain results of the collection and analysis’ are directed
`
`to an abstract idea.”) (quoting Elec. Power Grp., 830 F.3d at 1353–54); Trading Techs. Int’l, Inc.
`
`v. IBG, LLC, 921 F.3d 1378, 1385 (Fed. Cir. 2019); Interval Licensing LLC v. AOL, Inc., 896 F.3d
`
`1335, 1345 (Fed. Cir. 2018); Fair Warning IP, 839 F.3d at 1093.
`
`Fourth, and more generally, in determining whether a method claim is directed to an
`
`abstract idea, the Federal Circuit has focused on whether the claim is purely functional in nature
`
`or is sufficiently concrete or specific to be directed to a patent-eligible process rather than a patent-
`
`ineligible result. For example, in SAP America, 898 F.3d at 1167, the court asked whether the
`
`claim had “the specificity required to transform [it] from one claiming only a result to one claiming
`
`a way of achieving it.” To answer that question, the Federal Circuit has directed courts to “look
`
`to whether the claims focus on a specific means or method, or are instead directed to a result or
`
`effect that itself is the abstract idea and merely invokes generic processes and machinery.” See
`
`also Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC, 874 F.3d 1329, 1337 (Fed. Cir.
`
`2017); McRO, 837 F.3d at 1314 (“We . . . look to whether the claims in these patents focus on a
`
`specific means or method that improves the relevant technology or are instead directed to a result
`
`or effect that itself is the abstract idea and merely invoke generic processes and machinery.”);
`
`Apple, Inc. v. Ameranth, Inc., 842 F.3d 1229, 1244 (Fed. Cir. 2016) (claim that “calls for the
`
`desired result of associating a customer’s order with said customer, and does not attempt to claim
`
`any method for achieving that result,” is abstract, and thus ineligible for patenting); see generally
`
`Diamond v. Diehr, 450 U.S. 175, 182 n.7 (1981) (A patent may issue “for the means or method of
`
`producing a certain result or effect, and not for the result or effect produced.” (citation omitted));
`
`Le Roy v. Tatham, 55 U.S. 156, 175 (1853) (“A patent is not good for an effect, or the result of a
`
`
`
`8
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 9 of 21 PageID #: 6326
`
`certain process” because such patents “would prohibit all other persons from making the same
`
`thing by any means whatsoever.”).
`
`Fifth, and relatedly, “the concern that drives” the judicial exceptions to patentability is “one
`
`of preemption.” Alice, 573 U.S. at 216; see also ChargePoint, Inc. v. SemaConnect, Inc., 920 F.3d
`
`759, 766 (Fed. Cir. 2019); Ariosa Diagnostics, Inc. v. Sequenom, Inc., 788 F.3d 1371, 1379 (Fed.
`
`Cir. 2015). In determining whether a particular invention is directed to an abstract idea, it is
`
`therefore important to ask whether according patent protection to the claimed subject matter would
`
`have a broad preemptive effect on future innovation in the same field. See Accenture Glob. Servs.,
`
`GmbH v. Guidewire Software, Inc., 728 F.3d 1336, 1341 (Fed. Cir. 2013).
`
`2. Inventive Concept
`
`If the court determines that a claim is directed to an abstract idea, the court proceeds to
`
`Alice step two. That step requires the court “to examine the elements of the claim to determine
`
`whether it contains an ‘inventive concept’ sufficient to ‘transform’ the claimed abstract idea into
`
`a patent-eligible application.” Alice, 573 U.S. at 221 (quoting Mayo, 566 U.S. at 72, 78–79).
`
`The “inventive concept” is “an element or combination of elements that is ‘sufficient to
`
`ensure that the patent in practice amounts to significantly more than a patent upon the [ineligible
`
`concept] itself.’” Alice, 573 U.S. at 217–18 (quoting Mayo, 566 U.S. at 72). That step serves to
`
`ensure that the claim is directed to more than merely implementing an abstract idea using “well-
`
`understood, routine, [and] conventional activities previously known in the industry.” Coop. Ent.,
`
`Inc. v. Kollective Tech., Inc., 50 F.4th 127, 130 (Fed. Cir. 2022) (quoting Alice, 573 U.S. at 225).
`
`That is, Alice step two requires the claimed invention to do more than combine known techniques
`
`that “yield[] only expected results,” Universal Secure Registry, 10 F.4th at 1353; instead, it must
`
`“focus on a specific means or method that improves the relevant technology,” Weisner v. Google
`
`
`
`9
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 10 of 21 PageID #: 6327
`
`LLC, 51 F.4th 1073, 1083 (Fed. Cir. 2022) (citation omitted). In particular, the Federal Circuit has
`
`asked whether the claim or claims at issue are “directed to a technological solution to a
`
`technological problem.” cxLoyalty, Inc. v. Maritz Holdings Inc., 986 F.3d 1367, 1378 (Fed. Cir.
`
`2021); see also BASCOM Glob. Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1350–
`
`51 (Fed. Cir. 2016); DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1257–58 (Fed. Cir.
`
`2014).1
`
`The preemptive effect of the asserted claims is also a relevant consideration at Alice step
`
`two. In a recent case, the Federal Circuit explained the relationship between preemption and the
`
`existence of an inventive concept:
`
`We have explained that claims for methods that “improve[] an existing
`technological process” include an inventive concept at step two. BASCOM, 827
`F.3d at 1350–51 (quoting Alice, 573 U.S. at 221, 223). And claims that “recite a
`specific, discrete implementation of the abstract idea” rather than “preempt[ing] all
`ways of” achieving an abstract idea using a computer may include an inventive
`concept. Id. at 1350. But claims to “an abstract idea implemented on generic
`computer components, without providing a specific technical solution beyond
`simply using generic computer concepts in a conventional way” do not pass muster
`at step two. Id. at 1352.
`
`Killian, 45 F.4th at 1382 (cleaned up). Thus, whether the claims recite “a specific, discrete
`
`implementation of the abstract idea” rather than preempting all implementations of that idea is an
`
`appropriate consideration in the step two inquiry. See id.
`
`
`1 The question whether the claims recite a “technological solution to a technological
`problem” may also be considered at step one of the Alice test. See, e.g., Packet Intel. LLC v.
`NetScout Sys., Inc., 965 F.3d 1299, 1309 (Fed. Cir. 2020); Universal Secure Registry, 10 F.4th at
`1352; CosmoKey Sols. GmbH & Co. KG v. Duo Sec. LLC, 15 F.4th 1091, 1100 (Fed. Cir. 2021)
`(Reyna, J., concurring). Other cases, such as cxLoyalty, BASCOM, and DDR Holdings, make clear
`that the existence of a technological solution to a technological problem is also an appropriate
`consideration at step two of Alice. The dual role of that factor is not anomalous, as the Federal
`Circuit has recognized that there is some doctrinal overlap between the two steps. See CareDx,
`Inc. v. Natera, Inc., 40 F.4th 1371, 1379 (Fed. Cir. 2022) (citing Elec. Power Grp., 830 F.3d at
`1353).
`
`
`
`10
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 11 of 21 PageID #: 6328
`
`B. Application
`
`1. Alice Step One
`
`The Alice step one inquiry considers “what the patent asserts to be the focus of the claimed
`
`advance over the prior art.” Yu, 1 F.4th at 1043 (citation omitted). NetApp argues that the claims
`
`are directed to the abstract idea of “restricting access to a storage medium” or “controlling access
`
`to a storage medium.” Dkt. No. 146 at 4, 12. KOM asserts that the claims are not directed to an
`
`abstract idea, but are directed to patent-eligible improvements in computer technology.
`
`
`
`As noted above, in cases involving computer technology, the Federal Circuit has frequently
`
`framed the inquiry at Alice step one as asking “whether the focus of the claims is on the specific
`
`asserted improvement in computer capabilities . . . or, instead, on a process that qualifies as an
`
`‘abstract idea’ for which computers are invoked merely as a tool.” Enfish, 822 F.3d at 1335–36;
`
`see also TecSec, Inc. v. Adobe Inc., 978 F.3d 1278, 1293 (Fed. Cir. 2020); Uniloc USA, Inc. v. LG
`
`Elecs. USA, Inc., 957 F.3d 1303, 1306–07 (Fed. Cir. 2020); Customedia Techs., LLC v. Dish
`
`Network Corp., 951 F.3d 1359, 1364–65 (Fed. Cir. 2020); McRO, Inc. v. Bandai Namco Games
`
`Am. Inc., 837 F.3d 1299, 1316 (Fed. Cir. 2016); DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d
`
`1245, 1257–58 (Fed. Cir. 2014).
`
`
`
`The Federal Circuit’s decision in Visual Memory is instructive in this regard. There, the
`
`Federal Circuit held that patent claims directed to an improved computer memory system were
`
`patent-eligible and not directed to an abstract idea. The memory system disclosed in the patent at
`
`issue in that case contained three separate caches, each of which was “programmable based on the
`
`type of processor connected to the memory system.” 867 F.3d at 1256. The patented system
`
`“separat[ed] the functionality for the caches and defin[ed] those functions based on the type of
`
`processor” being used with the memory system. Id. For that reason, the court held that the claims
`
`
`
`11
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 12 of 21 PageID #: 6329
`
`were directed to “a technological improvement.” The court noted that the concrete nature of the
`
`claimed innovation was confirmed by the specification, which “discusse[d] the advantages offered
`
`by the technological improvement.” Id. at 1259–60.
`
`
`
`In this case, the specifications of the ’864 and ’243 patents explain that the inventions are
`
`directed to improving various shortcomings in prior art storage devices. For example, the
`
`specifications explain that in certain prior art systems, errors may occur when an application
`
`attempts to write to a storage device but the device is “unavailable or fails to support write
`
`operations.” ’864 patent, col. 1, ll. 53–54; ’243 patent, col. 2, ll. 7–8. In some instances, “[a]n error
`
`message may result, but will not be directed to the application since it is not known to the device
`
`driver or inaccessible.” ’864 patent, col. 1, ll. 55–57; ’243 patent, col. 2, ll. 8–11. In other instances,
`
`“no error message results” when the error occurs, and the data is lost “when the buffer is flushed or
`
`when the system is rebooted.” ’864 patent, col. 1, ll. 58–60; ’243 patent, col. 2, ll. 13–15. As the
`
`specifications explain, “[n]either of those results is acceptable in normal computer use.” ’864
`
`patent, col. 1, ll. 60–61; ’243 patent, col. 2, ll. 15–16.
`
`
`
`To take another example, the specifications explain that many operating systems update
`
`certain information relating to a file, such as the “last access date,” when that file is accessed. ’864
`
`patent, col. 2, ll. 2–4; ’243 patent, col. 2, ll. 24–26. That action is referred to by the patents as
`
`“journaling.” However, when the storage device being accessed is an “archive data store,” the
`
`specifications explain that “it is often desirable that [the archive data store] not be written to,” i.e.,
`
`“journaling is not performed.” ’864 patent, col. 2, ll. 11–15; ’243 patent, col. 2, ll. 32–36. When
`
`accessing an archive data store, the specifications note, prior art systems often altered the data store
`
`by performing journaling “even when this [was] not desired.” ’864 patent, col. 2, ll. 19–20; ’243
`
`
`
`12
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 13 of 21 PageID #: 6330
`
`patent, col. 2, ll. 39–40. The inventors observed that in the prior art there was “no adequate solution
`
`to overcome this problem.” ’864 patent, col. 2, ll. 25–26; ’243 patent, col. 2, ll. 45–46.
`
`
`
`The patent specifications explain that “an object of the present invention” is to “provide a
`
`method of limiting access privileges for a storage medium” in order to “overcome these and other
`
`limitations of the prior art.” ’864 patent, col. 2, ll. 27–30; ’243 patent, ll. 47–50. As discussed
`
`above, the principal advance disclosed in the asserted patents is to use a “trap layer” to block certain
`
`requests from reaching a storage device and to modify other requests before they are sent to the
`
`storage device.
`
`i. The ’243 Patent Claims
`
`
`
`The trap layer is expressly recited in the asserted claims of the ’243 patent. For example,
`
`the system recited in claim 69 requires, inter alia, a “computer processor configured to intercept,
`
`by at least one computer file system trap layer . . . an attempted operation on said at least a portion
`
`of the computer storage medium.” ’243 patent, cl. 66 (from which asserted system claim 69
`
`depends). The asserted method claims of the ’243 patent are similar, as they require the method
`
`step of “intercepting by at least one trap layer an attempted operation on said at least a portion of
`
`the storage medium.” ’243 patent, cl. 1 (from which asserted method claims 4 and 34 depend).
`
`
`
`Put simply, the claims of the ’243 patent recite the use of a trap layer, which the specification
`
`of that patent discloses as the principal means for solving the problems associated with prior art
`
`storage devices. Thus, the claims are plainly “directed to an improvement in the functioning of a
`
`computer,” Enfish, 822 F.3d at 1338, and not to an “independently abstract” process that merely
`
`invokes computers as a tool, Elec. Power Grp., 830 F.3d at 1354.
`
`
`
`In support of its position that the claims of the ’243 patent are directed to an abstract idea,
`
`NetApp relies on the Federal Circuit’s decisions in Ericsson Inc. v. TCL Communication
`
`
`
`13
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 14 of 21 PageID #: 6331
`
`Technology Holdings Ltd., 955 F.3d 1317 (Fed. Cir. 2020), and Prism Technologies LLC v. T-
`
`Mobile USA, Inc., 696 F. App’x 1014 (Fed. Cir. 2017), both of which dealt with systems for
`
`controlling access to a computer component. Neither case, however, supports NetApp’s argument.
`
`The asserted claims of the ’243 patent are directed to specific mechanisms for performing the
`
`recited function (employing a trap layer to intercept an attempted operation and doing so regardless
`
`of the identity of a user attempting the operation). The claims at issue in Prism and Ericsson, by
`
`contrast, did not recite the mechanics of an authentication process.
`
`
`
`Ericsson involved a system “for controlling access to a platform,” consisting of (1) a
`
`platform having an interface for providing access to the platform’s software services component,
`
`(2) an “access controller for controlling access’ to the software services component, (3) an
`
`interception module for receiving a request for access to the software services component; and a
`
`“decision entity” for determining if the request should be granted. After analyzing the language of
`
`the asserted claims, the Federal Circuit determined that the four recited computer components
`
`“collapse into simply ‘an access controller for controlling access’ by ‘receiving a request’ and then
`
`‘determining if the request should be granted.’” 955 F.3d at 1326. Neither that function nor either
`
`of the remaining limitations altered the court’s conclusion that the claims were directed to “the
`
`abstract idea of controlling access to resources,” using “standard components that are put to use via
`
`the ‘access controller’ limitation.” Id. The claims were essentially functional in nature, the court
`
`ruled, lacking “the specificity required to transform a claim from one claiming only a result to one
`
`claiming a way of achieving it.” Id. at 1328.
`
`
`
`Prism similarly claimed a method for controlling access to protected computer resources.
`
`The representative asserted claim in Prism recited a method consisting of an authentication server
`
`(1) receiving identity data from a client computer making a request for resources, (2) authenticating
`
`
`
`14
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 15 of 21 PageID #: 6332
`
`that identity data, (3) authorizing the requested access and (4) then permitting access to the protected
`
`computer resources. That is to say, Prism claimed the function of a computer permitting access to
`
`resources by any means that determined that the request for resources was permitted. The court
`
`unsurprisingly concluded that the asserted claims were directed to the abstract idea of “control[ling]
`
`access to protected computer resources by authenticating identity data,” id. at 1016, in which
`
`computers were “invoked merely as a tool.” See Enfish, 822 F.3d at 1335–36.
`
`
`
`A case that presents a useful contrast to Ericsson and Prism is TecSec, Inc. v. Adobe, Inc.,
`
`978 F.3d 1278 (Fed. Cir. 2020). In that case, the Federal Circuit held that claims directed to methods
`
`for providing multi-level security in a data network were not directed to an abstract idea. TecSec,
`
`978 F.3d at 1296. The court noted that in prior cases involving software innovations, the Federal
`
`Circuit asked two questions: whether the focus of the claimed advance was on a solution “to a
`
`problem specifically arising in the realm of computer networks or computers,” and whether the
`
`claim was “properly characterized as identifying a specific improvement in computer capabilities
`
`or network functionality, rather than only claiming a desirable result or function.” Id. at 1293
`
`(cleaned up). The TecSec court answered both of those questions in the affirmative with regard to
`
`the claims before it.
`
`
`
`As the court in TecSec explained, the patents at issue in that case described and claimed a
`
`method in which a digital object “is assigned a level of security that corresponds to a certain
`
`combination of access controls and encryption.” Id. at 1282. “The encrypted object can then be
`
`embedded or ‘nested’ within a ‘container object,’ which, if itself encrypted and access-controlled,
`
`provides a second layer of security.” Id. (citation omitted). The invention in TecSec provided a
`
`software-based mechanism for enhancing the security of information sent over a network, while
`
`
`
`15
`
`

`

`Case 1:18-cv-00160-WCB Document 217 Filed 10/04/23 Page 16 of 21 PageID #: 6333
`
`providing

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket