Personal Web Technologies, LLC v. Apple, Inc.

917 F.3d 1376
CourtCourt of Appeals for the Federal Circuit
DecidedMarch 8, 2019
Docket2018-1599
StatusPublished
Cited by34 cases

This text of 917 F.3d 1376 (Personal Web Technologies, LLC v. Apple, Inc.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Federal Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Personal Web Technologies, LLC v. Apple, Inc., 917 F.3d 1376 (Fed. Cir. 2019).

Opinion

Chen, Circuit Judge.

PersonalWeb Technologies, LLC (PersonalWeb) appeals the final written decision of the Patent Trial and Appeal Board (Board) in an inter partes review (IPR) proceeding concluding that Apple demonstrated by a preponderance of the evidence that claims 24, 32, 81, 82, and 86 of U.S. Patent No. 7,802,310 (the '310 patent) are unpatentable as obvious in view of two prior art references- U.S. Patent No. 5,649,196 (Woodhill) and U.S. Patent No. 7,359,881 (Stefik). Because one of the Board's key underlying fact findings as to Woodhill's disclosure is not supported by substantial evidence, we reverse.

BACKGROUND

A. The '310 Patent

The '310 patent explains that in conventional data processing systems, data items such as files are typically identified by their user-created alphanumeric name and/or pathname or location. J.A. 69 at 1:53-2:5. Certain problems arise, however, using traditional naming conventions. For example, if one device transfers a data item to a second device using just the name associated with the data item, it is possible that the data item already exists on the second device, and a duplicate of the data item will be created. J.A. 69-70 at 2:63-3:9. The '310 patent contemplates a method and apparatus for resolving this and other concerns by creating a substantially unique identifier for each data item in the data processing system that is independent of the data item's user-defined name, location, etc., but rather is dependent on only the content of the data item itself. J.A. 70 at 3:52-58. The identifier for a particular data item is created by applying a cryptographic hash function to the *1378 data item. J.A. 74 at 12:21-26. The output of the hash function is the content-based identifier or "True Name," which is "virtually guaranteed" to be unique to the data item. Id. The system uses the content-based identifier alone to determine whether a particular data item is present on the system. J.A. 70 at 3:59-62. When the data item's contents are changed, the content-based identifier of the data item also changes. See J.A. 86 at 35:55-63.

The '310 patent explains that content-based identifiers can be used for various purposes in data processing systems, including, for example, to identify data items in a "license table." J.A. 74 at 11:33-43. The patent describes a license table as a two-field database containing a list of content-based identifiers and, for each content-based identifier, a list of users authorized to access the data item associated with the content-based identifier. Id.

Claim 24 is illustrative:

24. A computer-implemented method implemented at least in part by hardware comprising one or more processors, the method comprising:
(a) using a processor, receiving at a first computer from a second computer, a request regarding a particular data item, said request including at least a content-dependent name for the particular data item, the content-dependent name being based, at least in part, on at least a function of the data in the particular data item, wherein the data used by the function to determine the content-dependent name comprises at least some of the contents of the particular data item, wherein the function that was used comprises a message digest function or a hash function, and wherein two identical data items will have the same content-dependent name; and
(b) in response to said request:
(i) causing the content-dependent name of the particular data item to be compared to a plurality of values;
(ii) hardware in combination with software determining whether or not access to the particular data item is unauthorized based on whether the content-dependent name of the particular data item corresponds to at least one of said plurality of values, and
(iii) based on said determining in step (ii), not allowing the particular data item to be provided to or accessed by the second computer if it is determined that access to the particular data item is not authorized.

J.A. 88.

B. Initial IPR Proceedings

In September 2013, Apple filed a petition requesting an IPR of claims 24, 32, 70 1 , 81, 82, and 86 of the '310 patent, asserting multiple grounds of unpatentability. PersonalWeb filed a preliminary patent owner response, and, in March 2014, the Board instituted review on the ground that the petition raised a reasonable likelihood that the challenged claims were unpatentable under 35 U.S.C. § 103 (a) for obviousness over Woodhill in view of Stefik. After PersonalWeb filed a patent owner response and Apple filed a reply, the Board held a hearing. In March 2015, the Board issued a final written decision concluding that Apple had demonstrated by a preponderance of the evidence that the challenged claims were unpatentable under § 103(a) over Woodhill in view of Stefik.

*1379 C. Woodhill

Woodhill discloses a distributed management system for backing up and restoring data files. See J.A. 1674 at 1:11-17. In Woodhill, files are apportioned into 1 MB 2 "binary objects," which in some instances are apportioned even further into 1 KB 3 "granules." J.A. 1675 at 4:21-30, J.A. 1677 at 7:47-59, J.A. 1680-81 at 14:65-15:4. Woodhill explains that the system uses "Binary Object Identifiers," or for granules, "contents identifiers," to determine whether a binary object or granule has changed from one version of the file to the next. J.A. 1678 at 9:9-27, J.A. 1682 at 17:50-64. Only those binary objects or granules whose content has changed need to be backed up, thereby reducing the amount of data that needs to be transmitted during a backup procedure. Id. at 9:6-9, 9:23-27 , J.A. 1680-81 at 14:53-15:8.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
917 F.3d 1376, Counsel Stack Legal Research, https://law.counselstack.com/opinion/personal-web-technologies-llc-v-apple-inc-cafc-2019.