throbber
Patent No. 7,774,280
`Issued: August 10, 2010
`Filed: October 4, 2004
`Inventors: Nguyen, et al.
`Title: System and Method for Managing Transfer of Rights Using Shared State
`Variables
`
`Inter Partes Review No. IPR2015-00354
`__________________________________________________________________
`
`PETITIONER’S REQUEST FOR REHEARING
`UNDER 37 C.F.R. §42.71
`
`
`
`
`
`Paper No. 13
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`
`
`
`APPLE INC.
`Petitioner,
`
`v.
`
`CONTENTGUARD HOLDINGS, INC.,
`Patent Owner
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`I.
`
`
`INTRODUCTION
`
`On July 1, 2015, the Board issued a Decision under 35 U.S.C. § 312(a)(4),
`
`denying institution of inter partes review of claims 1–5, 8, 11–16, 19, 22, 24–28,
`
`31, and 34 of U.S. Patent No. 7,774,280 (“the ’280 patent”). Pursuant to 37
`
`C.F.R. §42.71(d), Petitioner Apple Inc. (“Apple”) requests rehearing.
`
`
`
`Rehearing is warranted because the Board misapprehended and/or
`
`overlooked arguments clearly presented in the Petition (as well as supporting
`
`evidence) which explained that it would have been obvious to modify the Ginter
`
`DRM system to employ digital certificates when installing software on the devices
`
`used in Ginter’s scheme. Pet. at 47-49. Doing so would cause the Ginter devices
`
`to possess behavioral integrity under the Board’s construction of “repository.”
`
`The Board appeared to have overlooked this explanation and evidence, as it is
`
`nowhere referenced or discussed in the Decision. Because the “repository”
`
`limitation was the sole basis identified by the Board as to why it did not institute
`
`trial on the grounds based on Ginter, rehearing is warranted.
`
`II. RELIEF REQUESTED
`Apple requests that the Board withdraw the Decision and institute inter
`
`
`partes review of claim 1 of the ’280 patent as being unpatentable under 35 U.S.C.
`
`§103(a) over U.S. Patent No. 5,892,900 to Ginter et al. (“Ginter”) (Ex. 1007).
`
`Petitioner requests rehearing of only claim 1 and only on the basis of Ginter.
`
`
`
`1
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`Claim 1 is the only claim still being asserted in the district court. As the second
`
`ground advanced in the Petition (i.e., Ginter in combination with Wiggins) does
`
`not concern this claim, Petitioner is not seeking review of the institution decision
`
`on that ground. Petitioner’s decision to not seek review of these ground(s) and/or
`
`other claims does not imply a belief that the denial of those grounds was proper.
`
`III. LEGAL STANDARDS
`
`“When rehearing a decision on petition, a panel will review the decision for
`
`an abuse of discretion.” (emphasis added) 37 C.F.R. § 42.71(c). The abuse of
`
`discretion standard of review is the same heightened standard federal appeals
`
`courts use to review district court factual findings. See, e.g., PNY Techs. Inc. v.
`
`Phison Elecs. Corp., IPR2013-00472, Paper 16 at 2 (Apr. 23, 2014) (citing Star
`
`Fruits S.N.C. v. United States, 393 F.3d 1277, 1281 (Fed. Cir. 2005)); Advanced
`
`Software Design Corp. v. Fiserv, Inc., 641 F.3d 1368, 1380 (Fed. Cir. 2011) (“An
`
`abuse of discretion occurs where the district court fails to consider an important
`
`factor, gives significant weight to an irrelevant or improper factor, or commits a
`
`clear error of judgment in weighing those factors.”)(citing Gen. Motors Corp. v.
`
`Harry Brown’s, LLC, 563 F.3d 312, 316 (8th Cir.2009)).
`
`IV. MATTERS MISAPPREHENDED OR OVERLOOKED
`
`In accordance with 37 C.F.R. §42.71(d), Apple identifies the following
`
`matters which the Board misapprehended and/or overlooked in its Decision and the
`
`
`
`2
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`place in the Petition and evidence where each matter was addressed.
`
`A. The Board Overlooked the Explanations in the Petition that Using
`Digital Certificates to Install Software on the Ginter Devices
`Would Have Been Obvious to A Person of Ordinary Skill
`
`
`
`The Board overlooked and/or misapprehended arguments presented in the
`
`Petition at pages 47-49, which explained that modifying the Ginter devices to
`
`possess “behavioral” integrity would have been an obvious variation of the Ginter
`
`DRM scheme to a person of ordinary skill. As the Petition stated:
`
`A person of ordinary skill in the field of digital rights management
`systems would recognize the examples of “trusted systems” in Ginter
`could be modified to possess additional capabilities, including those
`that would confer greater security or control over the electronic
`appliances used in its scheme. For example, a person of ordinary skill
`would have recognized the electronic appliances in Ginter
`(“repositories”) could be readily modified to include “new hardware
`such as a secure processor, secure storage and securing rendering
`devices” and that security of the devices could be improved by
`requiring all software applications used on the device to be
`“certified to be trusted” (e.g., by requiring a digital certificate to
`install or execute the software). See Ex. 1003 at ¶¶ 388-393; Ex. 1001
`at 1:60-64. Indeed, the ’280 patent acknowledges doing so was
`known in the prior art. Ex. 1001 at 1:43-44, 1:58-2:21. Adapting the
`Ginter schemes to use additional well known techniques to increase
`the security and integrity of the electronic appliances used in its
`scheme would have been obvious to a person of ordinary skill. See Ex.
`1003 at ¶¶ 388-393.
`
`
`3
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`Pet. at 48-49 (emphasis added). The Petition also explained that Ginter expressly
`
`teaches that a key benefit of its disclosed DRM system is that it is highly
`
`configurable and can be implemented in a wide variety of ways, with citations
`
`directly to Ginter for support. See Pet. at 28 (“VDE components together comprise
`
`a configurable, consistent, secure and ‘trusted’ architecture for distributed,
`
`asynchronous control of electronic content and/or appliance usage.”)[citing Ex.
`
`1007 at 13:20-23]; Id. at 45 (“Indeed, Ginter teaches that is [sic] scheme is highly
`
`configurable, due to its modular, ‘atomic’ architecture, and its identification of a
`
`wide variety of design options and available technologies that can be used to
`
`implement it.”); Id. at 35.
`
`
`
`The Petition likewise identified and explained passages within Ginter that
`
`explain that its scheme is designed to be a highly secure and “trusted” scheme for
`
`distributing content. See, e.g., Pet. at 35 (quoting Ginter at Abstract) (“Electronic
`
`appliances such as computers employed in accordance with the present invention
`
`help to ensure that information is accessed and used only in authorized ways, and
`
`maintain the integrity, availability, and/or confidentiality of the information.
`
`Secure subsystems used with such electronic appliances . . . enforce a secure chain
`
`of handling and control”) (emphasis added).
`
`
`
`The Petition also presented a detailed explanation of the secure devices used
`
`in the Ginter DRM scheme, and explained that Ginter teaches that these devices
`
`
`
`4
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`were “trusted” and physically secure devices, which communicate with other
`
`“trusted” VDE devices in a secure manner. Pet. at 28-29. As the Petition
`
`explained, Ginter teaches: (i) “VDE components [that] together comprise a
`
`configurable, consistent, secure and ‘trusted’ architecture for distributed,
`
`asynchronous control of electronic content and/or appliance usage” [Pet. at 28]; (ii)
`
`that electronic devices used in the Ginter scheme typically include a secure
`
`processing unit that “processes information in a secure processing environment and
`
`stores information securely” [Pet. at 28-29], and (iii) that these devices have a
`
`“rights operating system” that enforces the rights to digital content using a “trusted
`
`environment of generating decrypting keys … [and] managing the secure
`
`communication of keys and other information between electronic appliances.” [Pet.
`
`29]. See also Pet. at 35-36.
`
`
`
`In short, the Petition not only identified numerous passages within Ginter
`
`that pointed to the criticality of the Ginter devices possessing attributes
`
`corresponding to the physical, communications and behavioral integrity attributes
`
`of “repositories,” but also that Ginter expressly teaches that these devices can be
`
`adapted to incorporate other known technologies that enhance these attributes.
`
`
`
`The Petition also explained that a parent of the application that issued as the
`
`‘280 patent had presented claims closely analogous to the claims of the ‘280 patent
`
`which had been rejected by the Office as being anticipated by Ginter’s scheme, in
`
`
`
`5
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`response to which the Patent Owner abandoned the application. Pet. at 24-25. The
`
`Petition then presented a detailed comparison of Ginter to the claims, explaining
`
`how features of Ginter corresponded to each element of the claims. Pet. at 29-41.
`
`
`
`Critically, the Petition expressly acknowledged that Ginter could be read as
`
`not disclosing certain aspects of the ‘280 Patent claims. Pet. at 42. One specific
`
`variation the Petition identified was “(iii) system components with varying security
`
`capabilities, including those capable of functioning as ‘trusted systems.’” Id. The
`
`Petition explained, however, that Ginter itself suggests changing various aspects of
`
`its scheme to include additional known security features and capabilities, which a
`
`person of ordinary skill in the art would have recognized as suggesting a range of
`
`obvious variations of the Ginter scheme. Id. The Petition also explained the ‘280
`
`patent itself “acknowledges that ‘trusted systems’ were well-known in 2001,”
`
`when the ‘280 patent was filed. Pet. at 47-49. In particular, the Petition explained:
`
`…the ‘280 patent discusses and incorporates by reference the ‘012
`patent. Id. at 1:40-42, 2:9-21. The Board, in IPR proceedings
`addressing the ‘012 patent, found the term ‘repository’ as used therein
`to mean a ‘trusted system, which maintains physical, communications
`and behavioral integrity, and supports usage rights.’ See IPR2013-
`00133, Paper 15 (July 1, 2013) at 9-16. “Repositories” having these
`properties are also described in Ginter, and are shown as being used as
`part of a “trusted” digital rights management system. See Ex. 1003 at
`¶¶ 375-376, 381-387.
`
`
`
`6
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`Pet. at 47-48. At this point, the Petition clearly explained that Ginter’s “trusted
`
`devices” could be altered to possess additional capabilities, including those that
`
`would confer greater security or control over the electronic appliances used in its
`
`scheme. One of these was the precise modification which the Board identified as
`
`the sole distinction between the Ginter DRM scheme and the ‘280 claimed
`
`repositories; namely, use of a digital certificate to verify the operating system
`
`software when it is installed on the Ginter devices. As the Petition stated:
`
`…security of the devices could be improved by requiring all software
`applications used on the device to be “certified to be trusted” (e.g., by
`requiring a digital certificate to install or execute the software). See
`Ex. 1003 at ¶¶ 388-393; Ex. 1001 at 1:60-64. Indeed, the ’280 patent
`acknowledges doing so was known in the prior art. Ex. 1001 at 1:43-
`44, 1:58-2:21
`
`Pet. at 48 (emphasis added). The petition pointed out not only that this technique
`
`was admitted in the ‘280 patent to be an old and well known technique used in
`
`other “repository”/ “trusted system” DRM schemes, but that “[a]dapting the Ginter
`
`to use additional well-known techniques to increase the security and integrity of
`
`the electronic appliances used in its scheme would have been obvious to a person
`
`of ordinary skill,” citing as support for this proposition testimony from Dr. Atul
`
`Prakash, an eminently qualified expert. Pet. at 48-49. Indeed the Petition pointed
`
`out that the ‘280 Patent itself admits that repositories, and in particular, repositories
`
`
`
`7
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`that possess behavioral integrity because software is installed on them using digital
`
`certificates, were admitted to be known in the prior art to the ‘280 Patent. See Pet.
`
`at 48. (“Indeed, the ’280 patent acknowledges doing so was known in the prior art.
`
`Ex. 1001 at 1:43-44, 1:58-2:21.”). Indeed, in advancing its position on the proper
`
`construction of “repositories” and “behavioral integrity,” Patent Owner actually
`
`relied on a description of repositories not in the ‘280 patent, but in admitted prior
`
`art patents dating back to 1994 that had been incorporated by reference into the
`
`‘280 patent. See PO Preliminary Response (Paper No. 10) at 15-16 (referring to
`
`U.S. Patent Nos. 5,634,012 and 6,963,859 to Stefik et al.).
`
`
`
`The Petition also provided evidence in the form of expert testimony from Dr.
`
`Atul Prakash to support its explanation in the Petition why a person of ordinary
`
`skill would have considered it obvious to modify the Ginter scheme by configuring
`
`its devices to have additional, known security features, such as the admittedly old
`
`technique of using digital certificates to install repository software. This
`
`testimony, found at ¶¶ 388-393 of Ex. 1003, consists of approximately two pages
`
`of 14 point, double spaced text. There, Dr. Prakash explained why a person of
`
`ordinary skill would have found incorporating admittedly old and well known
`
`security techniques into the Ginter devices to have been obvious. He explains that
`
`based on that person’s skills and training, and in view of the specific guidance in
`
`Ginter indicating the Ginter DRM scheme (including its devices) were highly
`
`
`
`8
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`customizable and envisioned modifying or replacing these modules as needed, the
`
`person would find it obvious to alter the devices used in the Ginter scheme to have
`
`varying levels of flexibility and security. Id.
`
`
`
`Despite these explanations in the Petition, which were supported by precise
`
`citations to specific portions of Ginter, the ‘280 patent and five precisely identified
`
`paragraphs of Dr. Prakash’s declaration, the Board held:
`
`Petitioner does not direct us to, nor can we find, a disclosure in Ginter
`that associates a digital certificate with the rights operating system and
`software that authenticates the source of the software prior to
`downloading it on the trusted architecture that is the secure electronic
`appliances. Rather, Ginter merely refers to a rights operating system
`that can “securely handle tasks” and has “rights and auditing operating
`system functions” without offering an adequate explanation as to how
`these tasks or functions involve the use of a digital certificate. See,
`e.g., Pet. 36–37.
`
`Dec. at 16. Likewise, the Board held:
`
`In summary, we are not persuaded that Petitioner has presented
`sufficient evidence to support a finding that Ginter’s trusted
`architecture including secure electronic appliances does not constitute
`a claimed “repository” that exhibits “behavioral integrity” because
`there is no indication Ginter’s rights operating system that securely
`handling tasks, including rights and auditing operating system
`functions, involves the use of a digital certificate.
`
`Dec. at 18.
`
`
`
`9
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`
`
`The Board, thus, did not appreciate that the grounds in the Petition had
`
`contended it would have been obvious to modify the scheme described in Ginter,
`
`not simply that Ginter in its unmodified form met the “behavioral integrity”
`
`feature of “repositories.” The Decision, notably, makes no reference to pages 48-
`
`49 of the Petition. That portion of the Petition, as explained above, makes clear
`
`that one of the grounds being proposed in the Petition was that a person of ordinary
`
`skill would have found it obvious to modify the Ginter scheme to use the
`
`admittedly known and old technique of using digital certificates when installing
`
`software on Ginter “trusted” devices to assure the integrity and security of those
`
`devices. 1 The Petition supported this ground with both specific reasoning and
`
`evidence – including specific citations to Ginter and identification of admitted
`
`facts (i.e., that both repositories and the technique of providing “behavioral
`
`integrity” by using digital certificates to install “repository” software were old and
`
`conventional). The analysis of Ginter also was supported by focused (i.e., 2
`
`
`
`1
`
`Petitioner independently advanced the proposition that the Ginter devices
`
`were “repositories” without further modification because they were “trusted
`
`devices” with physical, communications and behavioral integrity and thus met the
`
`precise functional attributes of “repositories.” Pet. at 28-29; see also 35-37.
`
`
`
`10
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`pages), competent and credible expert testimony.
`
`
`
`In its preliminary response, the Patent Owner presented nothing to suggest
`
`the arguments or evidence presented by Petitioner were in any way inaccurate.
`
`Rather, Patent Owner presented a series of baseless or irrelevant assertions about
`
`the Petition and evidence presented.2 Patent Owner then sought to defend the non-
`
`obviousness of its claims by relying on the legally rejected premise that the prior
`
`art must provide a “motivation” to make changes that were well known and
`
`accepted techniques in the prior art that address identified needs in the field (e.g.,
`
`enhanced security of the devices used in Ginter). See PO Preliminary Response at
`
`56 (“While providing no evidence of any motivation to implement Ginter in
`
`different ways…”). Likewise, Patent Owner, despite the admissions in the ‘280
`
`patent, asserted “[t]he Petition provides no basis for the Board to fully evaluate
`
`
`
`2
`
`See, e.g., PO Preliminary Response (Paper 10) at 55 (“No citation to Ginter
`
`is offered as evidence that it actually suggests any need or specific techniques for
`
`providing greater security”); Id. (“Apple was required to come forward with
`
`evidence and a rational explanation of it why it would have been obvious, at the
`
`time of the ‘280 invention, to modify Ginter’s system to implement repositories
`
`having behavioral integrity. It has not done so.”).
`
`
`
`11
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`each proposed modification to Ginter, including whether the modification would
`
`have been known or routine…” Id. Patent Owner also vaguely contended a
`
`person of skill would find some challenge in making this one change to the Ginter
`
`scheme, but did not identify any actual impediment in doing so. Id.
`
`
`
`None of these assertions, if they were considered by the Board, would have
`
`been sufficient to justify a decision to not institute trial on the basis of the grounds
`
`and evidence presented in and with the Petition. Simply put, arguments that
`
`contest admitted facts, mischaracterize the petition and the evidence, and rest on
`
`legally rejected theories of non-obviousness cannot be given any weight in a
`
`determination whether to institute trial or not. Doing so would be the epitome of
`
`an abuse of discretion. Advanced Software Design Corp., 641 F.3d at 1380.
`
`
`
`Because the Petition fully satisfied the requirements of 35 U.S.C. § 311 and
`
`37 CFR § 42.108 that there was a reasonable likelihood that the Petitioner would
`
`prevail with respect to at least one of the claims challenged in the petition, and trial
`
`should have been instituted on the basis of the grounds presented.
`
`B. The Board Misapprehended the Expert Testimony and Its
`Relevance to the Grounds Presented
`
`
`
`As noted in § A, the Board overlooked the arguments and evidence in the
`
`Petition explaining why a person of ordinary skill would have found it obvious to
`
`modify Ginter’s “trusted” devices to use digital certificates when installing
`
`software on those devices. The Board compounded its error by placing improper
`
`
`
`12
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`reliance on Patent Owner’s contentions about the relevance and probity of the
`
`opinions of Dr. Prakash. Here, the Board appeared to adopt Patent Owner’s
`
`misleading assertion that Dr. Prakash’s opinions in ¶¶ 383-392 of his Declaration
`
`rest on an “incorrect” interpretation of “behavioral integrity” and, thus, his
`
`testimony about the teachings of Ginter and his descriptions of known security
`
`techniques should, for some reason, not be entitled to any weight. See PO
`
`Preliminary Response at 47-48; Dec. at 17 (“We also agree with Patent Owner
`
`that, when attesting to the teachings of Ginter, Dr. Prakash applies a new definition
`
`of “behavioral integrity” that is different from the Board’s previous definition, the
`
`definition adopted by the district court, and the definition adopted for purposes of
`
`this proceeding. See Prelim. Resp. 47–48.”)
`
`
`
`Initially, the Board, at Patent Owner’s urging, appears to employ a standard
`
`that is on its face impossible to meet – that an expert must somehow know the
`
`precise constructions both the Board and a district court will adopt in the future
`
`when he or she authors a declaration. Dec. at 17 (“Dr. Prakash does not explain
`
`why he deviated from the Board’s previous definition of “behavioral integrity”
`
`(see, e.g., Ex. 1041, 13), which eventually was adopted by the district court (Ex.
`
`2001, 19–21) and adopted for purposes of this proceeding (see supra Section
`
`II.A.1.)”). The Board did not appear to appreciate that neither the district court nor
`
`the Board had actually adopted constructions of “repositories” or “behavioral
`
`
`
`13
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`integrity” in the ‘280 patent at the time Dr. Prakash authored his opinion. The
`
`Board did not seem to appreciate that ‘280 Patent has never been involved in an
`
`IPR proceeding, and is not directly related to any Stefik patent – it does not claim
`
`benefit under § 120 to any Stefik patent. Instead, it simply incorporates by
`
`reference portions of two prior art Stefik patents. Disregarding qualified,
`
`competent and probative expert testimony because it does not adhere to
`
`constructions the PTAB or a court may adopt after the expert’s declaration has
`
`been filed cannot be defended as a reasonable agency action, and finds no support
`
`anywhere in the statute or rules governing IPR proceedings.
`
`
`
`More directly, this criticism is entirely irrelevant. The portions of Dr.
`
`Prakash’s testimony at issue (i.e., ¶¶ 383-392) are simply describing what is being
`
`taught in Ginter or known in the art, and how the skilled person would interpret
`
`those teachings and known techniques. None of Dr. Prakash’s testimony turns on
`
`the construction of “behavioral integrity.” Rather, in these paragraphs, Dr. Prakash
`
`explained why modifications to the Ginter scheme to incorporate well-known
`
`security techniques would have been obvious based on the guidance within Ginter
`
`itself.” Notably, Patent Owner levies no criticism of Dr. Prakash’s actual
`
`description of Ginter’s teachings, the knowledge in the prior art or the views and
`
`expectations of the skilled person. See PO Preliminary Response at 47-48
`
`(criticizing use of different construction of “behavioral integrity” but not otherwise
`
`
`
`14
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`disputing ¶¶ 383-393 of Prakash Declaration). Patent Owner logically could not –
`
`the ‘280 patent admits this particular technique was publicly known at least by
`
`1994. It was thus clear legal error for the Board to not give this probative expert
`
`testimony about what Ginter teaches and suggests any weight based on its
`
`supposed inconsistency between Dr. Prakash’s understanding of “behavioral
`
`integrity” with a construction the Board later adopted.
`
`V. CONCLUSION
`
`Because the Board overlooked or failed to appreciate the arguments and
`
`evidence presented in the Petition, and employed a legally impermissible standard
`
`for evaluating expert testimony in support of the Petition, the Decision denying
`
`institution of trial represents an abuse of discretion. Petitioner thus respectfully
`
`requests that the Decision be set aside, and trial instituted on claim 1 of the ‘280
`
`Patent.
`
`Dated: July 31, 2015
`
`
`
`
`
`
`
`
`
`
`
`
`Respectfully Submitted,
`
`/Jeffrey P. Kushan/
`Jeffrey P. Kushan
`Registration No. 43,401
`Sidley Austin LLP
`1501 K Street NW
`Washington, DC 20005
`Attorney for Petitioner
`
`
`
`15
`
`
`
`

`
`IPR2015-00354 – Petitioner’s Request for Rehearing
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on this 31st day of July, 2015, a copy of the foregoing
`
`has been served in its entirety by E-mail on the following addresses for Patent
`
`Owner:
`
`Timothy P. Maloney
`Email: tpmalo@fitcheven.com
`
`Nicholas T. Peters
`Email: ntpete@fitcheven.com
`
`Robert A. Cote
`Email: rcote@mckoolsmith.com
`
`
`
`
`
`/Jeffrey P. Kushan/
`Jeffrey P. Kushan
`Reg. No. 43,401
`Attorney for Petitioner
`
`
`
`16

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket