Lead Opinion
Dissenting opinion filed by Circuit Judge REYNA.
TecSec, Inc. appeals from the district court’s entry of judgment that the defendant-appellees (the “defendants”) do not infringe various claims of three TecSec patents: U.S. Patent Nos. 5,369,702 (the “'702 Patent”); No. 5,680,452 (the “'452 Patent”); and No. 5,898,781 (the “'781 Patent”). Because the district court incorrectly construed the claims, this court affirms-in-part, reverses-in-part, and remands for further proceedings.
BACKGROUND
This case relates to methods and systems that secure computer data. The '702, '452, and '781 Patents derive from a common parent application and disclose a method and a system for providing security in a data network by nesting encrypted objects into other objects which are also encrypted. '702 Patent col. 4. 11. 25-28. This allows a system to employ different security levels to restrict access to specific compartments of data. Id.
Claim 8 of the '702 Patent is representative of the system claims at issue:
A system for providing multi-level multimedia security in a data network, comprising:
A) digital logic means, the digital logic means comprising:
1) a system memory means for storing data;
2) an encryption algorithm module, comprising logic for converting unencrypted objects into encrypted objects, the encryption algorithm module being electronically connected to the system memory means for accessing data stored in the first system memory;
3) an object labelling subsystem, comprising logic means for limiting object access, subject to label conditions, the object labelling subsystem being electronically connected to the system memory means for accessing data stored in the system memory means and the object labelling subsystem being further electronically connected to the encryption algorithm module to accept inputs from the encryption algorithm module;
4) a decryption algorithm module, comprising logic for converting encrypted objects into unencrypted objects, the decryption algorithm module being electronically connected to the system memory means for accessing data stored in the system memory means; and
5) an object label identification subsystem, comprising logic for limiting object access, subject to label conditions, the object label identification subsystem being electronically connected to the system memory means for accessing data stored in the system memory means and the object label identification subsystem being further electronically connected to the decryption algorithm module to accept inputs from the decryption algorithm module;
B) the encryption algorithm module working in conjunction with the object labelling subsystem to create an encrypted object such that the object label identification subsystem limits access to an encrypted object.
'702 Patent col. 12 1. 45-col. 13 1. 13 (emphases added). The parties dispute the construction of the phrase “multilevel multimedia security,” which appears in every asserted claim. The parties also dispute a number of limitations in the '702 Patent drafted in means-plus-function format, including the terms “digital logic means” and
TecSec filed suit in the Eastern District of Virginia, alleging that the defendants’ internet servers and related software products infringed. In addition to the defendants, TecSec also alleged infringement by International Business Machines Corp. (“IBM”). Early in the case, the district court severed TecSec’s claims against IBM and stayed proceedings against the defendants. It considered the cross-motions relating to infringement, ultimately granting IBM’s motion for summary judgment of noninfringement. See TecSec, Inc. v. Int’l Bus. Machs. Corp.,
TecSec appealed, challenging the district court’s claim construction as well as its conclusion that TecSec failed to prove infringement by IBM. This court affirmed the district court’s judgment without opinion pursuant to Federal Circuit Rule 36. TecSec, Inc. v. Int’l Bus. Machs. Corp.,
On remand, proceedings resumed as to the defendants that remained. TecSec then stipulated that it could not prove infringement by defendants under the claim construction adopted by the district court during the proceedings with IBM. Based on TecSec’s stipulation, the district court entered judgment of noninfringement as to the defendants. TecSec, Inc. v. Int’l Bus. Machs. Corp., No. 1:10-cv-00115-LMB/ TCB (E.D.Va. Apr. 24, 2012). TecSec appeals. This court has jurisdiction under 28 U.S.C. § 1295(a)(1).
Discussion
The parties agree that claim construction is a legal issue that this court reviews de novo on appeal. Cybor Corp. v. FAS Techs., Inc.,
Whether claim language invokes § 112, ¶ 6 is an exercise of claim construction and is therefore a question of law, subject to de novo review. Personalized Media Commc’ns, LLC v. Int’l Trade Comm’n,
We interpret our own mandate de novo. Laitram Corp. v. NEC Corp.,
I. Claim Construction
On appeal, the parties dispute whether TecSec may reargue the claim constructions arrived at by the district court during the proceeding with IBM and that were at issue, inter alia, in the IBM appeal. The parties did not raise this issue below, and the district court did not pass on the issue.
The district court made several rulings in granting IBM’s motion for summary judgment. First, the court construed a number of claim terms. Summary Judgment Order,
A. Mandate Rule
The defendants argue that the mandate rule applies because: (1) the district court’s constructions were within the scope of its judgment; (2) that judgment was affirmed in the IBM appeal; and (3) no issues were reserved for further consideration in the decision in the prior appeal. TecSec responds that the mandate rule does not apply because it is impossible to glean which issues this court decided when we issued the Rule 36 judgment.
This court agrees with TecSec that the mandate rule does not bar it from challenging the district court’s claim construction. After our mandate issues, the mandate rule “forecloses reconsideration
The Rule 36 judgment in the IBM appeal summarily affirmed the district court’s judgment that IBM did not directly or indirectly infringe TecSec’s patents. The district court’s judgment was based on two independent grounds. The district court first ruled as a matter of law that TecSec’s direct and indirect infringement claims failed for failure of proof that IBM itself or any of its customers performed every claimed step or made, used, sold, offered for sale, or imported any system containing all of the limitations of the asserted claims. As the district court stated in its opinion, without questioning Tec-Sec’s construction of the terms now at issue, “TecSec has utterly failed to come forward with any evidence that IBM itself performed any of the steps of the method claims,” and “even if some user-implemented system were to meet all of the asserted claim limitations — which, as explained below it cannot ... — TecSec has provided no evidence that IBM ever made, used, sold, offered to sell, or imported that entire claimed system....” Summary Judgment Order,
Similarly, our Rule 36 judgments only affirm the judgment of the lower tribunal. “[A] Rule 36 judgment simply confirms that the trial court entered the correct judgment. It does not endorse or reject any specific part of the trial court’s reasoning.” Rates Tech., Inc. v. Mediatrix Telecom, Inc.,
B. Collateral Estoppel
The defendants also argue that collateral estoppel precludes TecSec from re-litigating claim construction. They point out that the district court construed claim terms that it considered “strictly necessary” to the grant of summary judgment. See Summary Judgment Order,
TecSec responds by arguing that collateral estoppel does not apply because the district court’s claim constructions were not necessary to the final judgment, which rested on multiple, independent grounds. TecSec argues that, because this court could have affirmed on any ground, claim construction was not actually determined in the IBM appeal and was not necessary to this court’s Rule 36 affirmance.
We agree with TecSec that the defendants have failed to show that collateral estoppel applies in this case. Among other elements, the party that seeks to invoke collateral estoppel must show that the litigated issue was “actually determined in the prior proceeding” and was a “critical and necessary part of the decision in the prior proceeding.” Collins v. Pond Creek Mining Co.,
Here, we affirmed without opinion the district court’s judgment of noninfringement. As recounted above, the district court’s judgment was independently predicated on alternative grounds: TecSec’s failure of proof as to IBM’s and its custom
The Defendants contend, however, that TecSec still should not be heard because it is re-raising the same claim construction arguments in the same proceeding. Relying on Ritter, they argue that collateral estoppel applies to the district court’s alternative holdings in this circumstance because otherwise the district court’s rulings would become irrelevancies.
We disagree. In Ritter, the district court issued two factual findings, and the plaintiff appealed.
The plaintiffs civil-rights claims required proof of the same underlying facts that were at issue in the first trial. Id. at 993-94. On remand, the district court held that the plaintiff could not re-litigate both fact findings, and the court of appeals affirmed. Id. The court held that even though its prior decision only mentioned the first fact finding, to allow re-litigation of the second fact finding in the same case against the same defendant “would constitute an abandonment of serious judicial reasoning and decision-making in exchange for the wooden application of judge-made rules designed to protect litigants in circumstances where they need protection.” Id. at 994.
We decline to extend Ritter to the facts of this case. The Fourth Circuit has recognized that Ritter “essentially applied] a law-of-the-case principle” to hold that collateral estoppel should apply in that case. In re Microsoft Antitrust Litig.,
II. Construction of “Multi-Level Multimedia Security”
The parties dispute the construction of the term “multi-level multimedia security.” That term appears in every asserted claim.
The district court ruled that the term requires “multiple layers of encryption” because TecSec defined the term during prosecution and the specification repeated
A. Multiple Layers of Encryption
TecSec argues that the district court erroneously required multiple layers of encryption because the term “security” is broader than “encryption” and encompasses access control. TecSec specifically asserts that the claim language does not require multiple layers of encryption because claim 1 recites encrypting a single object, not multiple objects, and dependent claim 3 recites encrypting multiple objects. TecSec argues that the specification discloses embodiments in which the method utilizes one layer of encryption to secure data.
The defendants respond that the district court correctly required multiple layers of encryption. They contend that the inventors explained in prosecution that “multilevel security” refers to encrypted objects that may be “nested within other objects which are also encrypted.” J.A. 427, 436; '702 Patent col. 4 ll. 25-28. They argue that TecSec’s claim differentiation argument fails because the court’s construction does not render any claims superfluous— the dependent claims that require two levels of encryption also require selecting a second label. They assert that the specification only discloses encrypted data contained within an encrypted container.
We are not persuaded by TecSec’s arguments. It may be true that the ordinary meaning of “multi-level” security is not limited to two layers of encryption but can encompass one level of encryption coupled with a second layer of security, such as access control. And TecSec is correct that the asserted patents disclose encryption and password protection as different types of security. E.g., '702 Patent col. 1 ll. 32-35, ll. 46-48 (disclosing encryption and password protection).
But the prosecution history mandates a narrower construction. During prosecution, the PTO rejected the claims because the term “multi-level multimedia security” was “unclear.” J.A. 434. In response, the inventor amended the specification and explained that the invention achieves “multilevel multimedia security” in two ways: (1) it achieves “multi-level security” because “encrypted objects may be nested within other objects which are also encrypted”; and (2) it achieves “multimedia security” because the “objects are encrypted.” J.A. 427; see also '702 Patent col. 4 ll. 25-34. “Thus, the nesting of individually encrypted objects provides security that is multilevel and multimedia.” J.A. 427; see also '702 Patent col. 4 ll. 32-34. Through these statements the inventor defined the term “multi-level multimedia security” to require multiple layers of encryption.
This definition of the term “multi-level multimedia security” is sufficient to overcome TecSec’s claim differentiation argument. Claim differentiation is not a rigid rule and it cannot overcome a construction required by the prosecution history. Regents of Univ. of Cal. v. Dakocytomation Cal., Inc.,
B. Multimedia Objects
TecSec argues that the court erroneously construed “multimedia” as a noun identifying the types of objects that may be encrypted, rather than an adjective describing the type of security that the invention employs. It contends that the claims and specification show that security can be applied to any “object,” regardless of the media type.
The defendants assert that the inventor defined the term during prosecution when he referred to a dictionary definition of “multimedia.” Thus, the defendants contend that the district court correctly construed the claims when it simply adopted the inventor’s definition.
We agree with TecSec that the court erred when it limited the encrypted data to objects in multimedia form. The ordinary meaning of “multi-level multimedia security” relates to the type of “security” employed and does not limit the type of data that may be encrypted. Indeed, the claims and specification convey that any type of data may be encrypted, not just multimedia. E.g., '702 Patent claim 1, col. 3 l. 42-col. 4 l. 34. For example, the specification describes the encrypting and decrypting of text, memos, letters, spreadsheets, and sound. Id. col. 3 l. 58-col. 4 l. 22, col. 71. 63-col. 11 l.11.
The prosecution history of the '702 Patent does not limit the claims to the encryption and decryption of multimedia data. “[F]or prosecution disclaimer to attach, our precedent requires that the alleged disavowing actions or statements made during prosecution be both clear and unmistakable.” Omega Eng’g, Inc. v. Raytek Corp.,
During prosecution, the inventor explained that the portion he added to the specification relating to multilevel encryption described “multi-level multimedia security.” J.A. 435. He also cited to a dictionary for the proposition that those terms — “multi-level,” “multimedia,” and “security” — were well known in the art. Id. He did not argue that the dictionary definition showed that “multi-media security” required encryption of multimedia objects. Nor did the inventor characterize his claims as limited to encrypting multimedia objects. He did not distinguish his invention from the prior art on that basis. In these circumstances, we cannot say that the inventor clearly and unmistakably limited his claims to encrypting multimedia objects. Thus, we hold that the district court erred when it limited the term “multi-level multimedia security” to require that secured data be multimedia data.
The term “multi-level multimedia security” requires multiple levels of encryption but is not limited to securing only multimedia objects. Based on the parties’ stipulation, TecSec may be able to prove infringement against every defendant except PayPal. J.A. 2640, 2645-46. Thus, we affirm the court’s noninfringement judgment as to PayPal but otherwise reverse the court’s summary judgment of noninfringement and remand for further proceedings.
III. Construction of Means-Plus-Function Limitations
The parties’ dispute relates to sixteen claim limitations that employ the term “means.” The district court treated these limitations as 35 U.S.C. § 112, ¶ 6 expressions and held that TecSec failed to identify corresponding structure for any of these
A. System Memory Means and Digital Logic Means
TecSec argues that the district court erred when it concluded that the terms “system memory means” and “digital logic means” were means-plus-function limitations. It argues that both terms recite sufficient structure to avoid treatment under § 112, ¶ 6 because “system memory” is a structural element and the claim provides that the “digital logic means” comprises specific structures, including “a system memory means,” two “subsystems,” and two “modules.”
The defendants argue that the district court correctly concluded that the “system memory means” and the “digital logic means” are means-plus-funetion limitations. They argue that a “system memory means” invokes § 112, ¶ 6 because a “system memory” is insufficient structure to overcome the presumption that the term is a means-plus-function limitation. Similarly, they argue that the “digital logic means” is a means-plus-function limitation because the “modules,” “systems,” and “means” recited in the claim are generic structures.
We agree with TecSec that the “system memory means” and the “digital memory means” do not invoke § 112, ¶ 6. The use of the term “means” triggers a rebuttable presumption that § 112, ¶ 6 applies. TriMed, Inc. v. Stryker Corp.,
A “system memory” is sufficient structure to perform the “storing data” function. To those skilled in the art, a system memory is a specific structure that stores data. Consistent with this understanding, for example, the specification discloses a computer that contains random access memory (RAM) to store data. '720 Patent col. 7 l. 37 (disclosing a “486 50 MHz DX” computer system with “16 megabytes of RAM”).
The defendants rely on Chicago Board Options Exchange v. International Securities Exchange,
First, we did not hold in Chicago Board that a “system memory means” was a means-plus-funetion limitation. Instead, we held that the patentee had waived its right to argue that a “system memory” was sufficient structure to avoid the application of § 112, ¶ 6 because “[t]he parties expressly agreed during claim construction that ‘system memory means’ is a means-plus-funetion limitation.” Chicago Board,
Second, the “system memory means” at issue in Chicago Board performed a more specific function than simply storing data. It required the system memory means to “stor[e] allocating parameters for allocating trades between the incoming order or quotation and the previously received orders and quotations.” Chicago Board,
The term “digital logic means” is also not subject to § 112, ¶ 6. As an initial matter, the claims do not recite a function for the digital logic means to perform. Claim 8 of the '702 Patent simply recites a “digital logic means, the digital logic means comprising” a number of claim elements. In addition, the term “digital logic” designates structure to skilled artisans — namely digital circuits that perform Boolean algebra. The claim also recites that the digital logic means is comprised of structural elements, including a system memory and specific modules and subsystems. While the defendants assert that those elements are purely generic, we see no reason to hold that those elements are so devoid of structure as to implicate § 112, ¶ 6. Thus, the district court erred when it held that the term “digital logic means” was a means-plus-function limitation.
B. Computer-Implemented Means-Plus-Function Terms
TecSec argues that the district court erred when it concluded that the fourteen other means-plus-function terms in the asserted claims of the '702 Patent lacked sufficient corresponding structure in the specification. These terms all recite computer-implemented functions in the overall claimed system. For example, claim 12 requires a “means for selecting an object to encrypt.” TecSec contends that Examples 1-3 in the specification disclose specific software applications and describe how these software applications operate to perform the recited functions.
The defendants respond that the district court correctly concluded that the computer-implemented means-plus-function terms lack corresponding structure in the specification. They contend that the software programs recited in the specification are not sufficient to perform the recited functions because they are generic disclosures of software, not specific algorithms to implement the claimed functions.
We agree with TecSec that the specification discloses sufficient corresponding structure for the computer-implemented means-plus-function limitations. The parties agree that for these limitations to avoid indefiniteness, the specification must disclose a special purpose computer as corresponding structure — ie., a computer programmed to perform a disclosed algorithm. Ergo Licensing, LLC v. CareFusion 303, Inc.,
The defendants have failed to show by clear and convincing evidence that the '702 Patent specification fails to disclose corresponding structure for the fourteen computer-implemented means-plus-function limitations. The specification discloses the specific software products and how to use those products to implement the claimed functions, which include “selecting an object to encrypt,” “selecting an encryption algorithm,” and “encrypting the object,” among others.
The specification provides three examples of using the software to perform these functions. The first example describes securing an object in a word processor application such as WordPerfect® or Microsoft Word® using an Object-Oriented Key Manager (OOKeyMan), which is a specific stand-alone application in Microsoft Windows®. '702 Patent col. 6 ll. 40-46, col. 7 l. 62-col. 9 l. 4. The example describes how a user interacts with the software applications to cause them to select an object to encrypt, select a label for the object, select an encryption algorithm, encrypt the object, and label the encrypted object. Id. col. 7 l. 63-col. 8 l. 37. The example then details how the software determines if the user is authorized to view the object and, if so, decrypts the object. Id. col. 8 l. 37-col. 9 l. 3. While the details of the example focus on the encryption and labeling of a single object, the specification explains that the example “shows the ability for OOKeyMan to securely manage and track single or multiple embedded encrypted objects within other encrypted objects.” Id. col. 7 ll. 50-52. The second and third examples show how the OOKeyMan software manages and tracks encrypted objects that may be transmitted between different applications, such as between WordPerfect® and Microsoft Word®. Id. col. 7 ll. 54-61, col. 9 l. 4-col. 11 l. 11.
The defendants contend that these examples only disclose generic software and not a specific algorithm. We disagree. It is true that “black box” disclosures of software are often too generic to provide corresponding structure for computer-implemented means-plus-function limitations. E.g., Blackboard, Inc. v. Desire2Learn Inc.,
Conclusion
We have considered the parties’ remaining arguments and have found them unpersuasive. For the foregoing reasons, the district court’s judgment is
AFFIRMED-IN-PART, REVERSED-IN-PART, AND REMANDED.
Each party shall bear its own costs.
Notes
. The dissent boldly contends that '‘[c]laim construction and sufficiency of the evidence showing an act of infringement are not alternative grounds on which to find noninfringement,” Dissent at 1351, both: (a) ignoring the distinctions between failures of proof and conventional rules of infringement, and (b) overlooking the actual rulings of the district
Dissenting Opinion
dissenting.
This case raises an important issue concerning the court’s practice of issuing judgments pursuant to Federal Circuit Rule 36 (“Rule 36”).
The majority concludes that the district court misconstrued various claim terms from three TecSec, Inc. patents. It reaches this conclusion notwithstanding that the same claim terms, same constructions, same arguments, and same summary judgment order were previously before this court and reviewed on January 9, 2012. See TecSec, Inc. v. Int’l Bus. Mach. Corp. (“TecSec I ”),
I.
Rule 36 allows this court to “enter a judgment of affirmance without opinion” under specific circumstances.
Rule 36 is premised, in part, on the recognition that “[t]he workload of the appellate courts precludes preparation of precedential opinions in all cases.” Fed. Cir. Internal Operating Procedure 10 ¶ 1 (Jul. 7, 2010). Indeed, unnecessary non-precedential dispositions with full opinions only impede the rendering of decisions and delay the preparation of precedential opinions in cases that merit such effort. See id.
This is not to say that there is no value in a Rule 36 judgment. “Appeals whose judgments are entered under Rule 36 receive the full consideration of the court, and are no less carefully decided than the cases in which we issue full opinions.”
The majority reasons that the district court’s judgment in TecSec I could have been affirmed on multiple grounds — failure of proof of an act of infringement by IBM or its customers or, alternatively, failure to show that IBM’s accused machines meet the claim limitations as construed. The majority therefore reasons that this court’s Rule 36 affirmance in TecSec I has no preclusive effect, either under the mandate rule or collateral estoppel and, in so concluding, it ignores that implicit in its reasoning is the false premise that claim construction is not a necessary part of a noninfringement determination.
An act of infringement occurs when all the elements of a claimed product or method are met by the accused device or process. See Akamai Techs., Inc. v. Limelight Networks, Inc.,
In this case, the district court’s summary judgment opinion follows the proper infringement analysis. First, the court construed the claims of TecSec’s patents to determine their meaning and scope. TecSec, Inc. v. Int’l Bus. Mach. Corp.,
Despite the district court’s two-step infringement analysis, the majority suggests that the district court could have found either a failure of proof of an act of infringement, or alternatively, no infringement under “conventional rules of infringement” where the properly construed claims are compared to the accused products. Maj. Op. 1342-43 n. 1. In order to find a failure of proof of an act of infringement, the district court, under the “all elements” rule, needed to identify a missing element or elements from the accused products.
This court previously refused to affirm summary judgment of noninfringement where the district court did not perform a “traditional infringement analysis” when it “did not conduct the first step of that
II.
Having concluded that the district court’s claim construction was critical and necessary to our prior Rule 36 affirmance, it is a straightforward step for me to conclude that TecSec is precluded from relit-igating those issues it lost on in TecSec I. This outcome holds true under either the mandate rule or collateral estoppel.
According to the mandate rule, “[u]nless remanded by this court, all issues within the scope of the appealed judgment are deemed incorporated within the mandate and thus are precluded from further adjudication.” Engel Indus., Inc. v. Lockformer Co.,
Here, the majority reasons that the claim construction issues were not “actually decided” because the TecSec I panel could have affirmed on the “independent” ground of failure of proof without “implicitly or explicitly” reaching the claim construction issues. This reasoning is contrary to our precedent that claim construction and evaluation of the evidence to determine a failure of proof are not independent grounds; they are two steps necessary to reach a single noninfringement judgment. E.g., Abbott Labs.,
For collateral estoppel, the majority disputes whether the claim construction issues were “actually determined” and “critical and necessary to the judgment.” Yet, there is no question that the district court actually determined the claim construction issues in TecSec I. See TecSec,
As a practitioner, I once bore distaste for Rule 36 affirmances.' I accepted that under a Rule 36 judgment, one party lost and another won, and that the decision of the district court was deemed not erroneous. What bothered me was that the “how” and the “why” behind the affir-mance, the actual reasoning that would enable me to assist and guide a client, was lacking. The court’s silence on its analysis and reasoning thundered loudly.
As a judge on this court, I fully understand and appreciate the role of Rule 36 judgments in the overall process of our work. And it is precisely this understanding that triggers my dissent in this case. When we explicitly or implicitly assume that a prior panel of this court overlooked
. Rule 36 is as effective as it is simple:
ENTRY OF JUDGMENT — JUDGMENT OF AFFIRMANCE WITHOUT OPINION The court may enter a judgment of affir-mance without opinion, citing this rule, when it determines that any of the following conditions exist and an opinion would have no precedential value:
(a) the judgment, decision, or order of the trial court appealed from is based on findings that are not clearly erroneous;
(b) the evidence supporting the jury’s verdict is sufficient;
(c) the record supports summary judgment, directed verdict, or judgment on the pleadings;
(d) the decision of an administrative agency warrants affirmance under the standard of review in the statute authorizing the petition for review; or
(e) a judgment or decision has been entered without an error of law.
Fed. Cir. R. 36.
. Under the "all elements” rule, the accused device must contain each limitation of the claim, either literally or by an equivalent, to . be infringing. TIP Sys., LLC v. Phillips & Brooks/Gladwin, Inc.,
. This is not a case in which the district court intimated that there had been a failure of proof irrespective of which constructions it adopted. Instead, the district court rejected TecSec's proposed constructions initially and made no mention of them in its failure of proof analysis.
