Prior Art Based on Inherency Does Not Extend to “Probably” Existing Subject Matter, but Is Limited to “Necessarily” Existing Subject Matter.
| March 21, 2019
Personal Web Technologies, LLC v. Apple, Inc.
March 12, 2019
Before Moore, Taranto and Chen. Opinion by Chen.
Summary
In September, 2013, Apple, Inc. (Apple) filed an inter parties review (IPR) proceeding before the U.S. Patent Trial and Appeal Board (PTAB) against Personal Web Technologies, LLC (Personal Web) asserting unpatentability of U.S. Patent No. 7,802,310. The PTAB held that the ‘310 patent was obvious. On appeal, the Federal Circuit overturned the Board’s holding of obviousness on the basis that the Board had relied upon purported “inherent” subject matter in a prior art document without sufficient evidence that the purportedly inherent subject matter “necessarily exists” based on the teachings of the reference.
Details
Procedural Background
In September, 2013, Apple, Inc. (Apple) filed an inter parties review (IPR) proceeding before the U.S. Patent Trial and Appeal Board (PTAB) asserting multiple grounds of unpatentability of U.S. Patent No. 7,802,310 owned by Personal Web Technologies, LLC (Personal-Web). The PTAB held that the ‘310 patent was obvious over U.S. Patent No. 5,649,196 (Woodhill) in view of 7,359,881 (Stefik). Personal-Web appealed the PTAB’s ultimate determination of obviousness.
Factual Background
The ‘310 patent is directed to “Controlling Access to Data in a Data Processing System.” In the prior art, problems arose due to conventional naming techniques in which data files are typically identified by a name and/or pathname or location. In particular, with convention systems, when a data item is transferred from a first device to a second device, if the same data item exists in the second device a duplicate copy will be created on the second device.
According to the invention of the ‘310 patent, a data file or element is given a unique name by creating a “unique identifier” that is added to the data item’s identification along with its user-defined name, location, etc. In particular, this unique identifier is created by applying a cryptograph hash function to the data item, but creates a unique identifier for the specific data item. Accordingly, if the data item is different (e.g., modified), it will have a different unique identifier. However, if the data item is the same (e.g., not modified), it will have the same unique identifier.
The key patent claim at issue – independent claim 24 – is set forth below for reference. And, a key element of this claim at issue in this litigation is highlighted below.
24. A computer-implemented method implemented at least in part by hardware comprising one or more processors, the method comprising:
(a) using a processor, receiving at a first computer from a second computer, a request regarding a particular data item, said request including at least a content-dependent name for the particular data item, the content-dependent name being based, at least in part, on at least a function of the data in the particular data item, wherein the data used by the function to determine the content-dependent name comprises at least some of the contents of the particular data item, wherein the function that was used comprises a message digest function or a hash function, and wherein two identical data items will have the same content-dependent name; and
(b) in response to said request:
(i) causing the content-dependent name of the particular data item to be compared to a plurality of values;
(ii) hardware in combination with software determining whether or not access to the particular data item is unauthorized based on whether the content-dependent name of the particular data item corresponds to at least one of said plurality of values, and
(iii) based on said determining in step (ii), not allowing the particular data item to be provided to or accessed by the second computer if it is determined that access to the particular data item is not authorized.
In holding that the claim was obvious over U.S. Patent No. 5,649,196 (Woodhill) in view of 7,359,881 (Stefik), the PTAB held that the Woodhill reference inherently taught the highlighted features above.
Discussion
The Federal Circuit reversed the Board’s decision on the basis that the Board’s inherency finding determination of the above-noted highlighted feature lacked substantial evidence.
- The Federal Circuit’s Discussion of the Law
The Federal Circuit explained that “[w]hile it is possible that Woodhill’s system utilizes an un-stated Binary Object Identifier lookup table to locate binary objects of a previous version of a file that is going to be restored …, mere possibility is not enough.” The Court further indicated that “[i]nherency . . . may not be established by probabilities or possibilities” and that “[t]he mere fact that a certain thing may result from a given set of circumstances is not sufficient.”
The Federal Circuit explained that for inherency “a party must ‘show that the natural result flowing from the [disclosure] as taught would result in [the claimed subject matter]” – i.e., in this case that the “natural result flowing from the operation as taught would result in the performance of the questioned function.”
The Federal Circuit held that because the claimed subject matter “does not necessarily exist in the” Woodhill reference, reliance on inherency for that feature in the obviousness analysis was improper.
2. The Federal Circuit’s Discussion of the Evidence
In concluding that the Board’s inherency finding determination was not based on substantial evidence, the Federal Circuit explained that the Woodhill reference did not inherently include “causing the content-dependent name of the particular data item to be compared to a plurality of values” for the following reasons.
The Woodhill reference teaches a distributed management system in which files are apportioned into binary objects. The system uses binary object identifiers to determine whether a binary object has changed from one version of a file to the next, and only those binary objects whose content has changed needs to be backed up, thereby reducing the amount of data being backed up. In Woodhill, the binary object identifier is based on the contents of the binary object, such that the binary object identifier changes when the contents is changed.
At the PTAB, the Board had agreed with Apple’s argument that in order to determine which data needs to be restored in Woodhill by an update request, the system “must be able to” reference local data files using the binary object identification information received and, thus, that Woodhill must maintain some sort of file system or other mapping that allows the binary object identification record to serve as a lookup for the requisite file data that is to be restored. Thus, the Board asserted that Woodhill must inherently teach the disputed feature.
However, the Federal Circuit explained that “an equally plausible” understanding of Woodhill is that the system uses conventional file names and locations to locate files and the binary object information to locate a given binary object within the file. The Federal Circuit further explained that the only disclosed use of the binary object identifier in Woodhill is to perform a one-to-one comparison with the binary object identifier in the backed-up version of the object, which occurs after the object has been identified.
Takeaways
- This case emphasizes that inherency requires the “necessary” existence of subject matter that is not expressly shown or described in a reference. Accordingly, this case may be helpful in contesting rejections where asserted subject matter is not emphatically necessarily present, but deemed to be probable or likely by the Patent Office.
- This case also demonstrates that one way to
argue against a finding of inherency is to set forth an “equally plausible”
alternative that is supported by the reference.
That is, by demonstrating that an “equally plausible” alternative
subject matter may exist, it can be argued that the Patent Office cannot
conclude that the asserted subject matter inherently exist.