throbber
Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 1 of 22
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`Case No. 6:21-cv-00331-ADA
`
`JURY TRIAL DEMANDED
`
`§§§§§§§§§§
`
`IGT and IGT CANADA SOLUTIONS ULC,
`
`Plaintiffs
`
`v.
`
`Zynga Inc.,
`
`Defendant.
`
`ZYNGA INC.’S MOTION FOR SUMMARY JUDGMENT ON THE ’089 PATENT
`
`PUBLIC VERSION
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 2 of 22
`
`TABLE OF CONTENTS
`
`Page
`
`TABLE OF AUTHORITIES ......................................................................................................... ii
`TABLE OF EXHIBITS ................................................................................................................ iv
`I.
`INTRODUCTION ............................................................................................................. 1
`II.
`BACKGROUND ............................................................................................................... 1
`III.
`LEGAL STANDARD ........................................................................................................ 3
`IV. ARGUMENT ..................................................................................................................... 3
`A.
`Zynga Does Not Infringe Any Asserted Claim Of The ’089 Patent. ..................... 3
`1.
`Zynga Does Not Authorize Transfers Of “Gaming Software.” ................. 3
`2.
`The Court Should Reject IGT’s Equivalents Theory. ................................ 6
`The Asserted Claims of the ’089 Patent Are Invalid Under § 101. ....................... 8
`1.
`The Asserted Claims Are Directed To The Abstract Idea Of
`Controlling Access To Information. .......................................................... 8
`The Asserted Claims Do Not Contain Any Inventive Concept. .............. 12
`2.
`CONCLUSION ................................................................................................................ 14
`
`V.
`
`B.
`
`-i-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 3 of 22
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Cases
`
`Abbott Labs. v. Sandoz, Inc.,
`566 F.3d 1282 (Fed. Cir. 2009)..................................................................................................3
`
`Alice Corp. Pty. Ltd. v. CLS Bank Int’l,
`573 U.S. 208 (2014) .................................................................................................3, 10, 12, 14
`
`Berkheimer v. HP Inc.,
`890 F.3d 1369 (Fed. Cir. 2018)................................................................................................13
`
`BSG Tech LLC v. Buyseasons, Inc.,
`899 F.3d 1281 (Fed. Cir. 2018)................................................................................................14
`
`buySAFE, Inc. v. Google, Inc.,
`765 F.3d 1350 (Fed. Cir. 2014)................................................................................................13
`
`Data Scape Ltd. v. W. Digit. Corp.,
`816 F. App’x 461 (Fed. Cir. 2020) ............................................................................................5
`
`DDR Holdings, LLC v. Hotels.com, L.P.,
`773 F.3d 1245 (Fed. Cir. 2014)................................................................................................10
`
`Dropbox, Inc. v. Synchronoss Techs., Inc.,
`815 F. App’x 529 (Fed. Cir. 2020) ..........................................................................................11
`
`Elec. Power Grp., LLC v. Alstom S.A.,
`830 F.3d 1350 (Fed. Cir. 2016)................................................................................................12
`
`Elekta Instrument S.A. v. O.U.R. Sci. Int’l, Inc.,
`214 F.3d 1302 (Fed. Cir. 2000)..................................................................................................3
`
`Enfish, LLC v. Microsoft Corp.,
`822 F.3d 1327 (Fed. Cir. 2016)..........................................................................................10, 11
`
`Ericsson Inc. v. TCL Commc’n Tech. Holdings Ltd.,
`955 F.3d 1317 (Fed. Cir. 2020)........................................................................................8, 9, 10
`
`FairWarning IP, LLC v. Iatric Sys., Inc.,
`839 F.3d 1089 (Fed. Cir. 2016)..................................................................................................9
`
`Lockheed Martin Corp. v. Space Sys./Loral, Inc.,
`324 F.3d 1308 (Fed. Cir. 2003)..................................................................................................6
`
`-ii-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 4 of 22
`
`Mortg. Grader, Inc. v. First Choice Loan Servs., Inc.,
`811 F.3d 1314 (Fed. Cir. 2016)................................................................................................12
`
`OIP Techs., Inc. v. Amazon.com, Inc.,
`788 F.3d 1359 (Fed. Cir. 2015)................................................................................................13
`
`PersonalWeb Techs. LLC v. Google LLC,
`8 F.4th 1310 (Fed. Cir. 2021) ..............................................................................................9, 10
`
`Pharma Tech Sols., Inc. v. LifeScan, Inc.,
`942 F.3d 1372 (Fed. Cir. 2019)..................................................................................................7
`
`Prism Techs. LLC v. T-Mobile USA, Inc.,
`696 F. App’x 1014 (Fed. Cir. 2017) ..........................................................................................9
`
`SAP Am., Inc. v. InvestPic, LLC,
`898 F.3d 1161 (Fed. Cir. 2018)................................................................................................11
`
`In re TLI Commc’ns LLC Patent Litig.,
`823 F.3d 607 (Fed. Cir. 2016)..................................................................................................10
`
`Trading Techs. Int’l, Inc. v. Open E Cry, LLC,
`728 F.3d 1309 (Fed. Cir. 2013)..................................................................................................7
`
`Zafer Taahhut Insaat ve Ticaret A.S. v. United States,
`833 F.3d 1356 (Fed. Cir. 2016)..................................................................................................3
`
`-iii-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 5 of 22
`
`TABLE OF EXHIBITS
`
`Exhibit No.
`Exhibit 1
`Exhibit 2
`
`Exhibit 3
`
`Exhibit 4
`
`Exhibit 5
`Exhibit 6
`
`Exhibit 7
`
`Exhibit 8
`
`Description.
`U.S. Patent No. 7,168,089 (IGT_0000045)
`Relevant excerpts from Expert Report of Dr. Craig E. Wills Regarding
`Zynga’s Infringement of U.S. Patent Nos. 7,168,089 and 8,266,212
`Relevant excerpts from IGT Substantive Motion 1 (For Judgment Based On
`No Interference-In-Fact) as filed on June 4, 2010 in Patent Interference No.
`105,747 and produced by Zynga (ZYNGA00006207-266)
`Relevant excerpts from the January 10, 2023 deposition transcript of Craig
`E. Wills
`Relevant excerpts from U.S. Patent Application No. 10/658,836
`Relevant excerpts from the January 11, 2023 deposition transcript of Craig
`E. Wills
`Relevant excerpts from the Rebuttal Expert Report of Dr. Craig E. Wills
`Regarding the Validity of U.S. Patent Nos. 7,168,089 and 8,266,212
`Relevant excerpts from the Expert Report of David Crane Regarding
`Invalidity
`
`-iv-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 6 of 22
`
`I.
`
`INTRODUCTION
`
`IGT’s U.S. Patent No 7,168,089 (the “’089 patent”) is neither valid nor infringed. First,
`
`each asserted claim of the ’089 patent requires authorizing transfers of “gaming software,” which
`
`the Court has construed to exclude “data alone.” But there is no dispute that the information that
`
`IGT accuses of being “gaming software” here is only data and nothing else.
`
`Second, like many claims that have been invalidated by the Federal Circuit, the claims of
`
`the ’089 patent are directed to an abstract idea for controlling access to resources. The ’089 patent
`
`applies this abstract idea in the field of gaming machines using generic computer components and
`
`methods, and includes no inventive concept.
`
`II.
`
`BACKGROUND
`
`IGT’s ’089 patent describes and claims methods for securely transferring gaming software
`
`between networked gaming machines. The patent explains that, in prior-art systems, machines
`
`within a casino could be networked together “via local dedicated networks” that, for security
`
`reasons, did not allow communication “with devices located outside of the casino.” Ex. 1 (’089
`
`patent) at 3:36-40. The patent also explains that for locations “such as bars, convenience stores,
`
`and supermarkets” that had only “a small number of gaming machines,” the expense of providing
`
`“a dedicated communication network” for those machines “[was] usually not justified.” Id. at
`
`3:17-28. To update software on gaming machines that were not connected to a dedicated network,
`
`technicians would have to travel to the machine’s location and perform manual updates. Id. at 4:9-
`
`18. This was expensive and time-consuming. Id. The ’089 patent sought to solve this problem
`
`through a “software authorization agent” capable of: (1) “receiving a gaming software transaction
`
`request” from a gaming device; (2) authenticating that device’s identity; and then (3) “approv[ing]
`
`or reject[ing] the transfer of gaming software from a second gaming device” to the first gaming
`
`device. Id. at 4:41-56. The patent asserts that this approach would create “secure communication
`
`-1-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 7 of 22
`
`methods” for the “transfer [of] gaming software and gaming information between two gaming
`
`devices.” Id. at 4:34-36. IGT asserts claims 29, 84, and 90. Claim 84 is independent and recites:
`
`84. In a first gaming device, a method of transferring gaming software to a
`second gaming device, said method comprising:
`
`[a] receiving a gaming software transaction request from the second gaming
`device;
`
`[b] sending the gaming software transaction request to a gaming software
`authorization agent that approves or rejects the transfer of gaming software;
`
`[c] receiving an authorization message from the gaming software
`authorization agent wherein the authorization message includes information
`indicating whether the first gaming device is authorized to transfer the
`gaming software to the second gaming device; and
`
`[d] transferring the gaming software to the second gaming device;
`
`[e] wherein the gaming software is for at least one of a) a game of chance
`played on a gaming machine, b) a bonus game of chance played on a gaming
`machine, c) a device driver for a device installed on a gaming machine, d)
`a player tracking service on a gaming machine and e) an operating system
`installed on a gaming machine.
`
`Claim 29 depends from independent claim 28, and recites essentially the same method as
`
`claim 84 but from the perspective of the software authorization agent. Claim 29 also adds that the
`
`second gaming device is “at least one of a game server and a gaming machine.” Id. at 43:44-46.
`
`Claim 90, which depends from claims 89 and 84, adds more detail about the information contained
`
`within the “gaming software transaction request.” Id. at 48:27-36.
`
`At claim construction, this Court construed “gaming machine” and “gaming software” to
`
`have their plain meaning, and held, based on statements IGT made during prosecution, that “data
`
`alone is not gaming software.” Dkt. 64 at 1. The Court construed “software authorization agent”
`
`as “a device that authorizes (that is approves or rejects) specific transfers of gaming software based
`
`on applicable rules, and monitors (that is tracks) these transfers.” Id.
`
`IGT accuses Zynga of infringement insofar as Zynga’s devices allegedly authorize
`
`-2-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 8 of 22
`
`transfers of “account and game state information” from a Zynga server to a customer device that
`
`already has a Zynga game running on it. Ex. 2 (Wills Inf. Rpt.) ¶ 115.
`
`III.
`
`LEGAL STANDARD
`
`“[A]n entry of summary judgment is appropriate against” a plaintiff “who fails to make a
`
`showing sufficient to establish the existence of an essential element to its case, and on which it
`
`will bear the burden of proof at trial.” Zafer Taahhut Insaat ve Ticaret A.S. v. United States, 833
`
`F.3d 1356, 1362-63 (Fed. Cir. 2016) (citation omitted).
`
`For noninfringement, a court first construes the claims, and then “compar[es] … the
`
`properly construed claims to the accused” product or process. Abbott Labs. v. Sandoz, Inc., 566
`
`F.3d 1282, 1288 (Fed. Cir. 2009). IGT, as the patentee, “must show the presence of every element”
`
`of a claim, “or its substantial equivalent in the accused device.” Elekta Instrument S.A. v. O.U.R.
`
`Sci. Int’l, Inc., 214 F.3d 1302, 1306 (Fed. Cir. 2000) (citation omitted).
`
`For patent ineligibility, courts apply a two-step test. Alice Corp. Pty. Ltd. v. CLS Bank
`
`Int’l, 573 U.S. 208, 217-18 (2014). At step one, a court asks if the asserted claims are “directed
`
`to” an abstract idea. Id. at 217. If so, the court then determines whether the elements of the claim,
`
`“both individually and as an ordered combination,” contain an “inventive concept” that
`
`“transform[s]” the claim “into a patent-eligible application.” Id. at 217.
`
`IV.
`
`ARGUMENT
`
`A.
`
`Zynga Does Not Infringe Any Asserted Claim Of The ’089 Patent.
`
`1.
`
`Zynga Does Not Authorize Transfers Of “Gaming Software.”
`
`Zynga does not infringe the limitations in all asserted claims requiring approval of transfers
`
`of “gaming software”—e.g., steps [b] and [d] in claim 84. The Court ruled “gaming software” has
`
`its plain and ordinary meaning, and that “data alone is not gaming software.” Dkt. 64.
`
`The Court reached the latter conclusion, at least in part, based on IGT’s statements during
`
`-3-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 9 of 22
`
`prosecution. The ’089 patent was the subject of an interference proceeding against a patent
`
`application filed by Legal iGaming, Inc. (“iGaming”). In that proceeding, IGT explicitly
`
`distinguished transfers of the “gaming information” allegedly described in iGaming’s application
`
`from the transfers of “gaming software” as claimed by the ’089 patent. In particular, IGT told the
`
`Patent Office that “one of ordinary skill in the art would understand that ‘gaming information’ as
`
`recited in iGaming’s claims describes the ‘information generated or exchanged during play of a
`
`gaming machine,’ not the underlying software code that is executed on the gaming machine to
`
`play the game.” Ex. 3 (ZYNGA00006207) at 6216. Thus, IGT made clear that its claims do not
`
`pertain to authorizations for or transfer of “data alone.”
`
`IGT is now taking the opposite position—i.e., that its claims cover the transfer of data that
`
`does not contain anything else (e.g., executable software code) and instead consists of “data alone.”
`
`Specifically, the only thing that IGT has accused of being the required gaming software in Zynga’s
`
`systems is the
`
`
`
` And he does not
`
`1
`
`-4-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 10 of 22
`
`identify anything else (such as any executable software code) that accompanies this data. Id.
`
`IGT and Dr. Wills nonetheless contend that the accused
`
`
`
` qualifies as “gaming software” and is not “data alone.” In particular, they argue that
`
`because
`
` are not, for example, isolated
`
`data resting in memory,” but must be “loaded by the client software and processed in some way,”
`
`it is not data alone.2 Ex. 2 (Wills Inf. Rpt.) ¶ 116. Dr. Wills further expressed the view that while
`
`the
`
` is data while it is being transferred, it becomes part of
`
`the software at runtime when the data is ingested and processed by the software resident on the
`
`receiving device. Ex. 4 (Wills Dep. Tr.) at 105:20-109:11.
`
`First, the fact that data is processed by software once it is received does not help IGT. As
`
`an initial matter, all computer data is processed after it is received because at a basic level, that’s
`
`what computers are for—processing data. E.g., Data Scape Ltd. v. W. Digit. Corp., 816 F. App’x
`
`461, 464 (Fed. Cir. 2020) (explaining that “storing, transferring, and processing data” are the
`
`“standard functions” of a computer). Put differently, if merely processing data after it is
`
`transmitted meant that it was not “data alone,” the Court’s construction (and the distinction that
`
`IGT made between gaming information and gaming software) would have no meaning. Indeed,
`
`Dr. Wills acknowledged that, under his interpretation, even the transmission of images, movies, or
`
`text would qualify as the transfer of software because they are processed after they are received.
`
`Ex. 4 (Wills Dep. Tr.) at 105:20-109:11 (testifying that even the novel “Moby Dick” could be
`
`“gaming software” if it was displayed by an application after transmission).
`
`Second, the relevant claim limitations use the term “gaming software” to refer to the files
`
`2 This mirrors the position that IGT advanced, and the Court apparently rejected during claim
`construction. See Dkt. 33 (IGT Responsive Claim Construction Brief) at 9-11 (arguing that
`“gaming software” should not be construed to exclude data).
`
`-5-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 11 of 22
`
`or information that is authorized for transfer (in step [b]) and transferred (in step [d]). Therefore,
`
`it is the specific files or information that are requested, authorized and sent between the two
`
`gaming machines that must be more than “data alone.” IGT cannot point to other software that
`
`the data is later combined with to show that what was transferred is software. In other words, IGT
`
`has to point to something that is authorized for transfer and transferred that (1) consists of more
`
`than just data and (2) qualifies as gaming software. But even Dr. Wills acknowledges that what is
`
`actually transferred—
`
`—is only data. In
`
`particular, Dr. Wills admitted that the accused information “is simply data that is transferred over
`
`the network and received by the client device.” Ex. 4 (Wills Dep. Tr.) at 109:5-11. And,
`
`conversely, he acknowledged it did not contain executable instructions. Id. at 89:7-21.
`
`The bottom line is that there is no factual dispute about how this part of Zynga’s system
`
`works. Both parties agree that the transferred
`
` (i) is data
`
`provided in a data interchange format and (ii) does not contain anything else (such as executable
`
`instructions). The only dispute is whether this data file qualifies as “data alone” under the Court’s
`
`construction or whether, because that data is ultimately processed after it is received, it is not data
`
`alone and instead qualifies as software. That dispute does not require a trial, and the Court should
`
`therefore rule that Zynga does not literally infringe the asserted claims of the ’089 patent.
`
`2.
`
`The Court Should Reject IGT’s Equivalents Theory.
`
`As a backup argument, IGT attempts to invoke the doctrine of equivalents (“DOE”).
`
`Specifically, IGT seeks to offer a doctrine of equivalents theory that “[a]ny differences between
`
`transferring data alone from the Poker server to the user’s client device, as opposed to transferring
`
`other software components along with such data, would be insubstantial.” Ex. 2 (Wills Inf. Rpt.)
`
`¶ 117. This theory fails as a matter of law for two reasons.
`
`First, IGT’s DOE theory vitiates the “data alone” limitation. See Lockheed Martin Corp.
`
`-6-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 12 of 22
`
`v. Space Sys./Loral, Inc., 324 F.3d 1308, 1321 (Fed. Cir. 2003) (rejecting a DOE theory that would
`
`vitiate a limitation required under the proper claim construction). IGT’s assertion that
`
`“transferring data alone” is equivalent to “not transferring data alone” would be directly contrary
`
`to the Court’s construction. Ex. 2 (Wills Inf. Rpt.) ¶ 117.
`
`Second, IGT’s DOE argument is barred by the doctrine of prosecution history estoppel.
`
`That doctrine “applies as part of an infringement analysis to prevent a patentee from using the
`
`doctrine of equivalents to recapture subject matter surrendered from the literal scope of a claim
`
`during prosecution.” Trading Techs. Int’l, Inc. v. Open E Cry, LLC, 728 F.3d 1309, 1322 (Fed.
`
`Cir. 2013). “Clear assertions made during prosecution in support of patentability,” will cause
`
`estoppel, even when those assertions are not “required to secure allowance of the claim.” See
`
`Pharma Tech Sols., Inc. v. LifeScan, Inc., 942 F.3d 1372, 1380 (Fed. Cir. 2019) (citations omitted).
`
`The statements that IGT made regarding the scope of the “gaming software” limitation
`
`during the interference proceeding trigger prosecution history estoppel here. In particular, during
`
`the interference proceedings against iGaming, IGT argued that iGaming’s competing application
`
`did not disclose “a request for … the transfer of ‘gaming software’ (i.e., ‘one or more software
`
`components executed on a gaming machine to play a game’), as recited in all of IGT’s independent
`
`claims.” Ex. 3 (ZYNGA00006207) at 6216. IGT argued that iGaming’s application instead
`
`disclosed a request for the transfer of “gaming information.” Id. Notably, IGT pointed to passages
`
`in the iGaming application that described “a plurality of player records of information” being sent
`
`over the network, and information reflecting “the state of the game that is being played,” and
`
`argued that “gaming information” should be construed to mean “information generated or
`
`exchanged during play of a gaming machine.” See Ex. 3 (ZYNGA00006207) at 6214-15 (citing
`
`Ex. 5 (U.S. Pat. App. No. 10/658,836) ¶¶ [0056], [0102]). Then, IGT specifically argued that
`
`-7-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 13 of 22
`
`because iGaming’s claims only transferred “gaming information,” “a transfer of ‘gaming software’
`
`cannot lie within the scope of iGaming’s involved claims.” Ex. 3 (ZYNGA00006207) at 6216.
`
`This is fatal to IGT’s DOE argument because the types of information described in
`
`iGaming’s application, (i.e., “player records” and “the state of the game that is being played”), are
`
`the same types of information that IGT now asserts are “gaming software.” Ex. 2 (Wills Inf. Rpt.)
`
`¶ 115. Because IGT specifically distinguished these types of data from “gaming software” during
`
`the interference, it cannot use the DOE to recapture that subject matter.
`
`B.
`
`The Asserted Claims of the ’089 Patent Are Invalid Under § 101.
`
`1.
`
`The Asserted Claims Are Directed To The Abstract Idea Of
`Controlling Access To Information.
`
`The Asserted Claims are directed to the abstract idea of controlling access to resources via
`
`software. In particular, they are directed to authorizing and monitoring the transfer of gaming
`
`software between a first and second gaming device using a software authorization agent.
`
`Independent claim 84 recites a four-step process of [a] receiving a request for a software transfer,
`
`[b] sending the request to a “software authorization agent” for approval, [c] receiving a response,
`
`and then [d] transferring the software. Ex. 1 (’089 patent) at 47:53-48:7. To this basic process the
`
`claims add only [e] that the transferred software falls into at least one of several broad types or is
`
`used for one of several purposes. Independent Claim 28 (from which asserted claim 29 depends)
`
`recites the same process, but from the perspective of the software authorization agent.
`
`The Federal Circuit has “repeatedly found the concept of controlling access to resources
`
`via software to be an abstract idea.” See Ericsson Inc. v. TCL Commc’n Tech. Holdings Ltd., 955
`
`F.3d 1317, 1327 (Fed. Cir. 2020) (collecting cases). In Ericsson, the court held that claims were
`
`directed to the abstract idea of controlling access to resources because they focused on a “controller
`
`for controlling [apps’] access” to services on a platform such as a smartphone; the controller would
`
`-8-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 14 of 22
`
`“receiv[e] a request” and then “determin[e] if the request … should be granted.” Id. at 1326. The
`
`Asserted Claims are highly analogous. Indeed, the function of the claimed software authorization
`
`agent is identical, with the added function that it monitors or “tracks” the approved transfers. Of
`
`course, tracking is just another abstract idea. See FairWarning IP, LLC v. Iatric Sys., Inc., 839
`
`F.3d 1089, 1097 (Fed. Cir. 2016) (finding claims directed to “monitoring audit log data” were
`
`abstract and ineligible). Other Federal Circuit cases in the same vein include PersonalWeb Techs.
`
`LLC v. Google LLC, 8 F.4th 1310, 1316 (Fed. Cir. 2021), where the court found that claims were
`
`directed to “controlling access to data items,” and Prism Techs. LLC v. T-Mobile USA, Inc., 696
`
`F. App’x 1014, 1016 (Fed. Cir. 2017), where the court found that claims were directed to
`
`“control[ling] access to protected computer resources by authenticating identity data.”
`
`Because the idea of controlling access to resources “is pervasive in human activity,”
`
`Ericsson, 955 F.3d at 1327, it is easy to analogize the asserted claims to real-world activity. For
`
`example, a librarian could (a) receive a request for a software transfer (e.g., a library patron asking
`
`to check out a video game, or a copy of Microsoft Windows), (b) forward the request to an
`
`“authorization agent” for approval (by asking a supervisor, or—for a “software authorization
`
`agent”—looking up the patron’s credentials on a computer), (c) receive a response (such as a
`
`message telling the librarian that the user is authorized to borrow the software) and then (d)
`
`transferring the software and tracking that transfer (by passing a CD with the software on it to the
`
`patron and ensuring they received it). This analogy is especially apt because (as the ’089 patent
`
`acknowledges) the purpose of the invention was to use computer networks to replace a task that
`
`was traditionally performed by humans. See Ex. 1 (’089 patent) at 4:9-18.
`
`The analogy set forth in the previous paragraph also closely resembles analogies that the
`
`Federal Circuit has used for other claims directed to the abstract idea of controlling access to
`
`-9-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 15 of 22
`
`resources using software. For example, in both Ericsson and PersonalWeb, the Federal Circuit
`
`analogized the challenged claims to a library receiving requests for access to books and other
`
`materials, evaluating the requests, and “loaning materials only to card-holding members.”
`
`Ericsson, 955 F.3d at 1327; PersonalWeb, 8 F.4th at 1317. Similarly, office buildings “allow[]
`
`certain employees entrance to only certain floors,” while banks “offer[] or deny[] loans to
`
`applicants based on suitability and intended use.” Ericsson, 955 F.3d at 1327. And the Postal
`
`Service receives requests to send mail, evaluates whether the mail has sufficient postage
`
`(depending on the type of mail and sender), and delivers only properly paid mail. Thus, the
`
`software authorization agent’s function here merely computerizes an unpatentable method of
`
`organizing human activity. Alice, 573 U.S. at 219-20.
`
`Nothing in the Asserted Claims changes this result. First, “limit[ing] the abstract idea to
`
`[the] particular environment” of gaming machines “does not make the[m] any less abstract.” In re
`
`TLI Commc’ns LLC Patent Litig., 823 F.3d 607, 613 (Fed. Cir. 2016). Inventors cannot evade the
`
`“prohibition against patenting abstract ideas” by cabining the application of an abstract idea “to a
`
`particular technological environment.” Alice, 573 U.S. at 222 (citation omitted). That is especially
`
`true here because IGT asserts that “gaming machines” are not specialized devices but can instead
`
`be any general-purpose computer used to play a game. Ex. 6 (Wills Dep Tr.) at 316:3-317:11
`
`(admitting that a conventional laptop could be any of the three claimed devices).
`
`Second, the claims here do not “overcome a problem specifically arising in the realm of
`
`computer networks,” DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1257 (Fed. Cir.
`
`2014), or “improv[e] … computer capabilities,” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327,
`
`1336 (Fed. Cir. 2016). Again, the specification explains that transferring gaming software to
`
`gaming machines was a task that was previously performed by humans, and not a task that is
`
`-10-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 16 of 22
`
`specific to computer networks. See Ex. 1 (’089 patent) at 4:9-18. In fact, the problem that the
`
`’089 patent purports to solve is the drudgery of relying on a human to upload new gaming software.
`
`Id. The patent purports to solve this problem by having computers distribute and approve software,
`
`so that a person does not need to drive around to different locations to perform them. Id. at 4:18-
`
`24. That process is just using computer networks “merely as a tool” for their intended purposes,
`
`not providing any “improvement in computer [or network] capabilities.” Enfish, 822 F.3d at 1336.
`
`The claims also do not recite any improvement to network functionality—indeed, the word
`
`“network” does not even appear in the claims. Dropbox, Inc. v. Synchronoss Techs., Inc., 815 F.
`
`App’x 529, 533 (Fed. Cir. 2020) (rejecting proposed technological solution when it was not evident
`
`in the claims). But even assuming that a network is required, the ’089 patent does not claim any
`
`new way of transferring software over a network or require any special kind of network. Instead,
`
`the patent, at best, purports to make use of generic networks——such as “the Internet” and “local
`
`area network[s]”—and generic computers—such as a “network interface” and a “processor”—to
`
`implement the recited functions. Ex. 1 (’089 patent) at 5:8-12, 10:48-55, 24:32-36. Where “the
`
`specification makes clear that off-the-shelf computer technology is usable” to perform the process,
`
`the claims are not “directed to improvements in the way computers and networks carry out their
`
`basic functions.” SAP Am., Inc. v. InvestPic, LLC, 898 F.3d 1161, 1168 (Fed. Cir. 2018).
`
`Similarly, that the claims are structured such that the gaming device that receives the
`
`transfer request gets permission from a separate “authorization agent” does not make the idea any
`
`less abstract. Asking for permission before you take an action is, in itself, an abstract concept.
`
`Counsel asks for permission from the Court before providing a document to a witness. Put
`
`differently, claiming the idea of asking another entity for permission to provide a resource does
`
`make the claims any less directed to an abstract idea. At most, it simply adds another abstract idea
`
`-11-
`
`

`

`Case 6:21-cv-00331-ADA Document 146 Filed 02/09/23 Page 17 of 22
`
`to the claims. And “combin[ing]” multiple abstract ideas does not save claims from abstraction at
`
`step one. Elec. Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1354 (Fed. Cir. 2016).
`
`2.
`
`The Asserted Claims Do Not Contain Any Inventive Concept.
`
`The claims fail Alice step two because nothing in them either individually or as a whole
`
`“transform[s] them into patent-eligible applications of the abstract idea at their core.” Id.
`
`First, the Asserted Claims rely on generic computer components to carry out the abstract
`
`idea. In particular, the “software authorization agent” does not have any specific physical
`
`structure, nor does it require the use of a particular data structure. Neither side argued for such a
`
`limitation during claim construction, and the specification makes clear that the software
`
`authorization agent (and the gaming devices) consist of generic and conventional components such
`
`as “a network interface” and “a processor.” Ex. 1 (’089 patent) at 9:53-60, 10:48-55; see also id.
`
`at 24:32-35 (the software authorization agent may consist of “conventional data server[s],” such
`
`as “a router” or “a network interface,”), 10:35-36 (the gaming device might consist of “a hand-
`
`held computing device” or “a portable memory device.”).
`
`Similarly, the specification does not purport to require any kind of new or specialized
`
`network, but instead purports to work over generic and conventional networks such as “the
`
`Internet.” Ex. 1 (’089 patent) at 5:8-12. And there can be no argument that the various categories
`
`of software that might b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket