throbber
Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 1 of 13 PageID #: 21936
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`Case No. 2:13-CV-1112-JRG
`
`Case No. 2:14-CV-61-JRG
`









`
`§§
`









`
`CONTENTGUARD HOLDINGS, INC.,
`
`Plaintiff,
`
`
`
`v.
`
`AMAZON.COM, INC., et al.,
`
`Defendants.
`
`CONTENT GUARD HOLDINGS, INC.,
`
`Plaintiff,
`
`
`
`v.
`
`GOOGLE, INC.,
`
`Defendant.
`
`MEMORANDUM OPINION AND ORDER
`
`Before the Court is the Joint Renewed Motion for Judgment on the Pleadings Declaring
`
`All Asserted Patent Claims Invalid Pursuant to 35 U.S.C. § 101 (Dkt. No. 539 in the -1112 case;
`
`Dkt. No. 191 in the -61 case) (“Mot.”) filed by Defendants Motorola Mobility, LLC,
`
`Amazon.com, Inc., Apple Inc., Google, Inc., Huawei Technologies Co., Ltd., Huawei Device
`
`USA, Inc., HTC Corp., HTC America, Inc., Samsung Electronics Co., Ltd., Samsung Electronics
`
`America, Inc., and Samsung Telecommunications America, LLC (collectively, “Defendants”).
`
`Plaintiff ContentGuard Holdings, Inc. (“ContentGuard”) filed a Response in Opposition to the
`
`Motion (Dkt. No. 597 in the -1112 case) (“Resp.”). Previously, the Court entered an order
`
`denying the Motion and expressly reserving the right to supplement that order with more detailed
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 2 of 13 PageID #: 21937
`
`analysis. (Dkt. No. 826 in the -1112 case; Dkt. No. 299 in the -61 case.) This Order
`
`supersedes and replaces that prior Order. For the reasons stated below, the motion is DENIED.
`
`I.
`
`Background
`
`On December 18, 2013, ContentGuard filed suit against Amazon, Apple, Blackberry,
`
`Huawei, and Motorola Mobility asserting claims of patent infringement of the patents in this suit.
`
`(Dkt. No. 1 in the -1112 case.) On January 17, 2014, ContentGuard filed an amended complaint
`
`also bringing suit on the same patents against HTC and Samsung. (Dkt. No. 22 in the -1112
`
`case.)
`
`Defendants Motorola and Amazon each separately filed motions requesting dismissal
`
`pursuant to 35 U.S.C. § 101. (Dkt. Nos. 298 and 390 in the -1112 case). The Court held a
`
`Markman hearing on February 6, 2015, and issued a 144-page Claim Construction Order (Dkt.
`
`No. 459 in the -1112 case) (“Claim Construction Order”) on March 20, 2015. On April 9, 2015,
`
`the Court denied Defendants’ pending § 101 motions without prejudice to re-filing, and directed
`
`that the parties re-brief the issue in accordance with the Court’s Claim Construction Order. (Dkt.
`
`No. 482 in the -1112 case.) On April 24, 2015, Defendants filed this Joint Motion to Dismiss on
`
`the Pleadings Under Federal Rule of Civil Procedure (“F.R.C.P.”) 12(c) re-raising the § 101
`
`issue. (Mot.) Since both Defendants and Plaintiff submitted evidence outside the scope of what
`
`can properly be considered under F.R.C.P. 12(c)1, pursuant to Rule 12(d), the Court converted
`
`the motion to a motion for summary judgment under F.R.C.P. 56. (Dkt. No. 669 in the -1112
`
`case.) The Court heard oral argument from the parties on July 29, 2015.
`
`ContentGuard has asserted the following twenty claims from six related patents issued to
`
`Mark Stefik: Claims 1, 3, 6, 8, 11, and 13 from U.S. Patent No. 8,393,007 (“the ’007 patent”);
`
`Claims 1, 7, and 13 from U.S. Patent No. 8,370,956 (“the ’956 patent”); Claims 1 and 8 from
`
`1 See, e.g., (Mot., Ex. 3, Dkt. No. 539-3 in the -1112 case; Resp., Ex. 6, Dkt. No. 597-6 in the -1112 case.)
`2
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 3 of 13 PageID #: 21938
`
`U.S. Patent No. 7,523,072 (“the ’072 patent”); Claims 18, 21, and 34 from U.S. Patent No.
`
`7,269,576 (“the ’576 patent”); and Claims 1, 21, and 58 from U.S. Patent No. 6,963,859 (“the
`
`’859 patent”) (collectively, the “Stefik Patents”). ContentGuard has also asserted the following
`
`five claims from two related patents issued to Mai Nguyen: Claims 1 and 5 of U.S. Patent No.
`
`7,774,280 (“the ’280 patent”); and Claims 1, 3, and 5 from U.S. Patent No. 8,001,053 (“the ’053
`
`patent”) (collectively, the “Nguyen Patents”).
`
`At a high level, the Stefik Patents are generally directed toward systems and methods for
`
`controlling the use and distribution of digital works in accordance with “usage rights” through
`
`the use of “trusted” systems. See claim 1 of the ’007 Patent (“sending the digital content . . . to
`
`the at least one recipient computing device only if the at least one recipient device has been
`
`determined to be trusted”). The Court construed “trusted” to require that three types of
`
`“integrities”—physical, communication, and behavioral—be maintained.
`
` See
`
`(Claim
`
`Construction Order at 15.) Similarly, the Nguyen Patents are generally directed toward systems
`
`and methods for controlling the use and distribution of digital works in accordance with “usage
`
`rights”—and more particularly, “meta-rights”—through the use of “trusted” systems. The claim
`
`language of the ’007 Patent is informative in this regard:
`
`
`
`For example, Claim 1 of the ’007 Patent recites:
`
`1. A computer-implemented method of distributing digital content to at least one
`recipient computing device to be rendered by the at least one recipient computing
`device in accordance with usage rights information, the method comprising:
`
`determining, by at least one sending computing device, if the at least one
`recipient computing device is trusted to receive the digital content from
`the at least one sending computing device;
`
`
`
`3
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 4 of 13 PageID #: 21939
`
`sending the digital content, by the at least one sending computing device,
`to the at least one recipient computing device only if the at least one
`recipient computing device has been determined to be trusted to receive
`the digital content from the at least one sending computing device; and
`
`sending usage rights information indicating how the digital content may be
`rendered by the at least one recipient computing device, the usage rights
`information being enforceable by the at least on recipient computing
`device.
`
`Defendants contend that the claims are directed to patent-ineligible subject matter and
`
`therefore are invalid under 35 U.S.C. § 101. Specifically, Defendants argue that the Stefik
`
`Patents address nothing more than the “abstract idea of enforcing usage rights and restrictions on
`
`digital content.” (Mot. at 8.) Similarly, Defendants argue that the Nguyen Patents address
`
`nothing more than the “abstract idea of enforcing sublicensing rights and restrictions (which the
`
`patents name ‘meta-rights’) on digital content.” (Id. at 28.)
`
`II.
`
`LEGAL STANDARD
`
`A.
`
`Summary Judgment Under Rule 56
`
`Federal Rule of Civil Procedure 56(c) authorizes a Court to grant summary judgment
`
`where “there is no genuine issue as to any material fact and . . . the moving party is entitled to a
`
`judgment as a matter of law.” A party moving for summary judgment must satisfy its initial
`
`burden by showing that “there is an absence of evidence to support the nonmoving party’s case.”
`
`Celotex Corp. v. Catrett, 477 U.S. 317, 323–25 (1986).
`
`B.
`
`Patent Eligibility Under 35 U.S.C. § 101
`
`Section 101 of the Patent Act defines what is eligible for patent protection. It says:
`
`“Whoever invents or discovers any new and useful process, machine, manufacture or
`
`composition of matter, or any new and useful improvement thereof, may obtain a patent therefor,
`
`4
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 5 of 13 PageID #: 21940
`
`subject to the conditions and requirements of this title.” 35 U.S.C. § 101.
`
`The Supreme Court has held that there are three specific exceptions to patent eligibility
`
`under § 101: laws of nature, natural phenomena, and abstract ideas. Bilski v. Kappos, 561 U.S.
`
`593, 601 (2010). In Mayo, the Supreme Court articulated a two-step test for “distinguishing
`
`patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim
`
`patent eligible applications of those concepts.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 134 S. Ct.
`
`2347, 2355 (2014) (citing Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S. Ct. 1289,
`
`1296–97 (2012)).
`
`The first step of Mayo requires a court to determine if the claims are directed to a law of
`
`nature, natural phenomenon, or abstract idea. Alice, 134 S. Ct. at 2355. “If not, the claims pass
`
`muster under § 101.” Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 714 (Fed. Cir. 2014). In
`
`making this determination, the court looks at what the claims cover. Ultramercial, 772 F.3d at
`
`714–15 (“We first examine the claims because claims are the definition of what a patent is
`
`intended to cover.”); Intellectual Ventures I LLC v. Capital One Bank (USA), 792 F.3d 1363,
`
`1369 (Fed. Cir. 2015) (“At step one of the Alice framework, it is often useful to determine the
`
`breadth of the claims in order to determine whether the claims extend to cover a
`
`‘fundamental . . . practice long prevalent in our system . . . .’”).
`
`For example, in Bilski, the Supreme Court rejected as a patent-ineligible “Claims 1 and 4
`
`in petitioners’ application” because the claims simply “explain[ed] the basic concept of hedging,
`
`or protecting against risk.” Bilski, 561 U.S. at 611. Similarly, in Ultramercial, the Federal Circuit
`
`rejected as patent-ineligible a claim that included “eleven steps for displaying an advertisement
`
`in exchange for access to copyrighted media.” Ultramercial, 772 F.3d at 714. In Intellectual
`
`Ventures, the Federal Circuit rejected as patent-ineligible a claim that contained steps
`
`5
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 6 of 13 PageID #: 21941
`
`“relat[ing]to customizing information based on (1) information known about the user and (2)
`
`navigation data.” Intellectual Ventures, 792 F.3d at 1369.
`
`A court applies the second step of Mayo only if it finds in the first step that the claims are
`
`directed to a law of nature, natural phenomenon, or abstract idea. Alice, 134 S. Ct. at 2355. The
`
`second step requires the court to determine if the elements of the claim individually, or as an
`
`ordered combination, “transform the nature of the claim” into a patent-eligible application. Alice,
`
`134 S. Ct. at 2355. In determining if the claim is transformed, “[t]he cases most directly on point
`
`are Diehr and Flook, two cases in which the [Supreme] Court reached opposite conclusions
`
`about the patent eligibility of a process that embodied the equivalent of natural laws.” Mayo, 132
`
`S. Ct. at 1298; see also Alice, 134 S. Ct. at 2355 (“We have described step two of this analysis as
`
`a search for an ‘inventive concept.’”).
`
`In Diehr, the Court “found [that] the overall process [was] patent eligible because of the
`
`way the additional steps of the process integrated the equation into the process as a whole.”
`
`Mayo, 132 S. Ct. at 1298 (citing Diamond v. Diehr, 450 U.S. 175, 187 (1981)); see also Mayo,
`
`132 S. Ct. at 1300 (“It nowhere suggested that all these steps, or at least the combination of those
`
`steps, were in context obvious, already in use, or purely conventional.”). In Flook, the Court
`
`found that a process was patent-ineligible because the additional steps of the process amounted
`
`to nothing more than “insignificant post-solution activity.” Diehr, 450 U.S. at 191–92 (citing
`
`Parker v. Flook, 437 U.S. 584 (1978)).
`
`A claim may become patent-eligible when the “claimed process include[s] not only a law
`
`of nature but also several unconventional steps . . . that confine[] the claims to a particular, useful
`
`application of the principle.” Mayo, 132 S. Ct. at 1300; see also DDR Holdings, LLC v.
`
`Hotels.com, L.P., 773 F.3d 1245, 1257 (Fed. Cir. 2014) (“In particular, the ’399 patent’s claims
`
`6
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 7 of 13 PageID #: 21942
`
`address the problem of retaining website visitors that, if adhering to the routine, conventional
`
`functioning of Internet hyperlink protocol, would be instantly transported away from a host’s
`
`website after ‘clicking’ on an advertisement and activating a hyperlink.”). A claim, however,
`
`remains patent-ineligible if it describes only “‘post-solution activity’ that is purely ‘conventional
`
`or obvious.’” Mayo, 132 S. Ct. at 1299.
`
`III. DISCUSSION
`
`In order to prevail on a § 101 challenge, the movant must show that the challenged claims
`
`first fail the “ineligible concept” step and then also fail the “inventive concept” step of the Alice
`
`test. In this case, Defendants contend the Patents-in-Suit fail both steps.
`
`A.
`
`Alice Step One: The Ineligible Concept Step2
`
`Defendants argue that the claims of the Patents-in-Suit are directed to the abstract idea of
`
`enforcing usage rights and restrictions on digital content. (Mot. at 8.) For example, Defendants
`
`contend claim 1 of the ’007 Patent fails the first step of the Alice test because it is directed to an
`
`abstract idea and “recites elements of a process that can be, and has been, performed by humans
`
`without computers.” See, e.g., (id.) Defendants point to the example of a “basic library loan” to
`
`illustrate the abstract and common nature of the invention. (Id. at 8–9.)
`
`Plaintiff responds by arguing that “[n]owhere do Defendants explain how a bricks-and-
`
`mortar library, coupled with a generic computer, meets the three ‘integrities’ taught by the
`
`[Stefik] Patents.” (Resp. at 8.) Plaintiff further argues that “Defendants’ inability to demonstrate
`
`how and why the actual claims of [the Stefik Patents] meaningfully resemble a trip to the library
`
`is fatal.” (Id. at 10.) In particular, Plaintiff argues that the “honor-based code practiced for
`
`
`2 Because all of the Patents-in-Suit are substantially similar in including the limitations of “trusted repositories” and
`“usage rights,” the Court will only substantively address the ’007 Patent in its analysis.
`7
`
`
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 8 of 13 PageID #: 21943
`
`centuries by libraries and their patrons” is not analogous to the actual enforcement of usage
`
`rights taught by the Patents-in-Suit. (Id. at 10–12.)
`
`Defendants also argue that, because “the Stefik patent specifications make very clear that
`
`the integrities/‘security levels’ for the referenced ‘trusted’ systems/‘repositories’ are not fixed or
`
`specifically defined,” the “‘trusted’ systems do not require any specific computer programming.”
`
`(Dkt. No. 605 in the -1112 case (“Repl.”), at 6.) Defendants further argue that the “‘technology-
`
`based solution’ purportedly suggested by the asserted claims utilizes only the most conventional
`
`and routine of computer actions and functions” and that the “Stefik specifications . . . recognize
`
`the prevalence in the prior art of the very techniques purportedly used by the patent claims to
`
`maintain the three integrities.” (Id. at 6–7.)
`
`After consideration of all the evidence and the arguments presented, the Court finds that
`
`the Patents-in-Suit are directed toward patent-eligible subject matter. In particular, the Patents-
`
`in-Suit are not directed toward an abstract idea, at least because they are directed toward patent-
`
`eligible methods and systems of managing digital rights using specific and non-generic “trusted”
`
`devices and systems. See, e.g., (Resp. at 13 (“This is significant because it underscores that the
`
`subject matter of the Trusted Repository Patents is narrow, i.e., limited to devices that maintain
`
`physical, communications, and behavioral integrity, rather than all devices that are capable to
`
`receive content via the Internet.”).) Though the Patents-in-Suit address problems associated with
`
`creating and enforcing usage rights with content, they are directed to non-abstract solutions
`
`through the use of trusted systems.
`
`Further, the Court finds Defendants’ analogy to library loans unpersuasive. A library
`
`cannot effectively enforce usage restrictions on a book once that book has left the library’s
`
`premises. Though a library may be able to punish a patron for an unauthorized usage pattern
`
`
`
`8
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 9 of 13 PageID #: 21944
`
`after the fact, it cannot prevent such unauthorized usage by a patron. Moreover, a library cannot
`
`ensure that its patrons maintain the three integrities required to be considered a “trusted system.”
`
`Finally, the Court finds Defendants’ arguments regarding whether the Patents-in-Suit
`
`required “specific computer programming” and whether the Patents-in-Suit used “conventional”
`
`techniques unavailing. Defendants essentially argue that the Patents-in-Suit must disclose
`
`detailed levels of security in order to require “specific computer programming.” However, the
`
`implementation of the invention disclosed in the Patents-in-Suit may require “specific computer
`
`programming,” even though the Patents-in-Suit may not disclose the particular security levels of
`
`that implementation.
`
`Defendants further argue that the Patents-in-Suit used “conventional” techniques. While
`
`this question is more appropriately addressed in the Inventive Concept Step of the Alice inquiry,
`
`the Court is not asked to determine whether the steps or limitations can be performed or
`
`implemented using standard or well-known technologies. Instead, the Court considers whether
`
`“the function performed by the computer at each step of the process is ‘[p]urely conventional.’”
`
`See Alice, 134 S. Ct. at 2359. The Court does not find that all the steps or limitations in the
`
`Patents-in-Suit are purely conventional, even though they may be performed using conventional
`
`technology.
`
`Accordingly, the Court finds that the Patents-in-Suit are not directed to an abstract idea.
`
`B.
`
`Alice Step Two: The Inventive Concept Step
`
`Defendants argue that claim 1 of the ’007 Patent fails the second, “inventive concept”
`
`step because “[t]here is no inventive element that renders [it] patentable.” See, e.g., (Mot. at 18.)
`
`In particular, Defendants argue that the terms in the ’007 Patent “merely invoke general and
`
`unspecified computer programming that permits the use of common computer functionality.”
`
`(Id. at 9 (emphasis in original).) Defendants further argue that the “Stefik patent specification
`9
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 10 of 13 PageID #: 21945
`
`makes clear that the integrities/‘security levels’ for a ‘trusted’ system . . . are not even fixed or
`
`specifically defined.” (Id. at 10.) Defendants argue that the Patents-in-Suit do not require “any
`
`specific technological or inventive way of maintaining” the three integrities. (Id. at 10–13.)
`
`Plaintiff responds by arguing that the “three integrities required to implement a ‘trusted
`
`repository’ are not merely the routine or conventional use of a general-purpose computer.”
`
`(Resp. at 14.) Plaintiff further argues that “there is no evidence in the record that the ‘trusted
`
`repository’ inventions taught by the Stefik patents are a feat of ‘routine,’ ‘prosaic’ engineering,
`
`such that they are devoid of an ‘inventive’ concept.” (Id. at 15.) Plaintiffs also point to the
`
`PTAB’s decisions affirming the validity of four of the Patents-in-Suit and “numerous ‘objective
`
`indicia of non-obviousness’ that exist” with regard to the Patents-in-Suit.” (Id. at 15–16.)
`
`As an initial matter, the Court does not consider the PTAB’s decisions or the “objective
`
`indicia of non-obviousness” particularly relevant or helpful to the patent-eligibility inquiry.
`
`First, the PTAB did not consider the patent-eligibility of the Patents-in-Suit under Section 101.
`
`Thus, any relevance to the question currently before the Court is minimal at best. Second, the
`
`obviousness and eligibility question require separate and distinct analyses.
`
`However, even if the Court were to find that the Stefik Patents are simply directed to the
`
`“abstract idea of enforcing usage rights and restrictions on digital content” as Defendants
`
`suggest, which it does not, the claim limitations, individually and “as an ordered combination,”
`
`are sufficient to ensure that the Patents-in-Suit amount to “significantly more” than a patent
`
`simply on that abstract idea. See Alice, 134 S. Ct. at 2355.
`
`Similarly, even if the Court were to find that the Nguyen Patents are simply directed to
`
`the “abstract idea of enforcing sublicensing rights and restrictions (which the patents name
`
`‘meta-rights’) on digital content,” which it does not, they also contain an “inventive concept.”
`
`
`
`10
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 11 of 13 PageID #: 21946
`
`For example, the claims require that the “repository” be a “trusted system” that “maintains . . .
`
`behavioral integrity in the support of usage rights” through the use of “digital certificates.” See
`
`(Claim Construction Order at 18–19.) Further, the claims require that “usage rights” are
`
`“attached or treated as attached” to the “content” such that the invented methods and systems,
`
`through the use of the “trusted systems,” enable the creation and effective enforcement of usage
`
`permissions. See (Resp. at 12.) Without commenting on whether such a solution is novel or
`
`obvious, the Court finds that, at the very least, the Patents-in-Suit disclose particular solutions for
`
`the problem of “enforcing usage rights and restrictions on digital content” that “(1) [do] not
`
`foreclose other ways of solving the problem, and (2) recite[] a specific series of steps that result[]
`
`in a departure from the routine and conventional” way of managing digital rights. Internet
`
`Patents Corp. v. Active Network, Inc., No. 2014-1048, 2015 WL 3852975, at *6 (Fed. Cir. June
`
`23, 2015).
`
`Finally, as previously stated, the Court does not find that all the steps or limitations in the
`
`Patents-in-Suit are conventional, even though they may be performed using conventional
`
`technology. Accordingly, the Court finds that the claim limitations of the Patents-in-Suit,
`
`individually and as an ordered combination, provide an “inventive concept” sufficient to
`
`“transform the nature of the claim” into a patent-eligible application. Alice, 134 S. Ct. at 2355.
`
`IV.
`
`CONCLUSION
`
`The Court finds that Defendants have failed to meet their burden to show that the Patents-
`
`in-Suit are directed toward an abstract idea and violate “the longstanding rule that ‘[a]n idea of
`
`itself is not patentable.’” See Alice, 134 S. Ct. at 2355 (quoting Gottschalk v. Benson, 409 U.S.
`
`63, 67 (1972)). The Court further finds that, even if the Patents-in-Suit were directed to an
`
`abstract idea, Defendants have failed to meet their burden to show that the additional elements of
`
`11
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 12 of 13 PageID #: 21947
`
`the claims do not “transform the nature of the claim” into patent-eligible subject matter. See
`
`Alice, 134 S. Ct. at 2355 (quoting Mayo, 132 S. Ct. 1298).
`
`Accordingly, Defendants’ Motion for Judgment on the Pleadings (Dkt. No. 539 in the -
`
`1112 case; Dkt. No. 191 in the -61 case), having been converted into a motion for summary
`
`judgment, is in all things DENIED.
`
`12
`
`

`
`Case 2:14-cv-00061-JRG Document 381 Filed 10/05/15 Page 13 of 13 PageID #: 21948
`Case 2:14—cv—00061—JRG Document 381 Filed 10/05/15 Page 13 of 13 Page|D #: 21948
`
`So ORDERED and SIGNED this 5th day of October, 2015.
`
` RODNEY GE RAP
`
`UNITED STAT
`
`DISTRICT JUDGE
`
`13

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket