PersonalWeb Technologies LLC v. Facebook Inc.

CourtDistrict Court, N.D. California
DecidedJanuary 29, 2020
Docket5:13-cv-01356
StatusUnknown

This text of PersonalWeb Technologies LLC v. Facebook Inc. (PersonalWeb Technologies LLC v. Facebook Inc.) is published on Counsel Stack Legal Research, covering District Court, N.D. California primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
PersonalWeb Technologies LLC v. Facebook Inc., (N.D. Cal. 2020).

Opinion

1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 SAN JOSE DIVISION 7 PERSONALWEB TECHNOLOGIES LLC, Case No. 5:13-cv-01317-EJD 8

Plaintiff, 9 Re: Dkt. No. 361 v. 10 GOOGLE LLC, et al., 11 Defendants. 12

13 PERSONALWEB TECHNOLOGIES LLC, Case No. 5:13-cv-01356-EJD

Plaintiff, 14 Re: Dkt. No. 85 v. 15 FACEBOOK INC., 16

17 Defendant. Case No. 5:13-cv-01358-EJD 18 PERSONALWEB TECHNOLOGIES LLC, et al., Re: Dkt. No. 78 19 Plaintiffs,

20 v.

21 EMC CO RPORATION, et al., ORDER GRANTING DEFENDANTS’ MOTION FOR JUDGMENT ON THE 22 Defendants. PLEADINGS

23 Plaintiff PersonalWeb Technologies LLC owns a family of patents that claim methods for 24 reliably identifying, locating, and processing data in a computer network. Plaintiff alleges that 25 Defendants infringed three of these patents. Defendants argue that Plaintiff’s patents are invalid 26 pursuant to 35 U.S.C. § 101. The Court finds this motion suitable for consideration without oral 27 1 argument. See N.D. Cal. Civ. L.R. 7-1(b). Having considered the Parties’ papers, the Court 2 GRANTS Defendant’s motion for judgment on the pleadings. 3 I. BACKGROUND 4 A. Factual Background 5 Plaintiff argues that Defendants (collectively or separately) infringed U.S. Patent No. (“the 6 ’310 patent”), No. 6,415,280 (“the ’280 patent”), and No. 7,949,662 (“the ’662 patent”). The three 7 patents at issue are part of a larger family of patents that Plaintiff calls the “True Name” patents. 8 The patents are aimed at combatting the problems of data storage on larger networks. As 9 computer networking and storage systems evolve, files can be divided and stored across different 10 devices in dispersed locations. This created problems—different users can unknowingly give 11 identical names to identical files. The inventors of the “True Name” patents patented a solution; 12 they developed a system that replaces conventional file names with unique content-based 13 identifiers. This is done by applying a “hash function” (a mathematical algorithm) to the data in 14 each file. For instance, as described in the ’310 patent, an item’s unique content creates a unique 15 identifier. A myriad of data items can be used to create the unique identifier, which ensures 16 duplicate copies are not created. See, e.g., ’310 patent, (2:18–21) (“[A] data item may be the 17 contents of a file, a portion of a file, a page in memory, an object in an object-oriented program, a 18 digital message, a digital scanned image, a part of a video or audio signal, or any other entity 19 which can be represented by a sequence of bits.”). The three patents acknowledge that the “True 20 Name,” i.e. the assigned identifier, is intended for use with “existing” operating systems and 21 “standard” data-management processes. Id. (6:26). 22 The ’310 Patent. The ’310 patent explains a method and apparatus for creating a unique 23 data-identifier for each file based on the content of the data item. The identifier is independent of 24 the data item’s user-defined name/location, which helps ensure duplicate copies are not created. 25 The identifier for a particular data item is created by applying a cryptographic hash function to the 26 data claim. The output of the hash function is the content-based identifier or “True Name,” which 27 is “virtually guaranteed” to be unique to the data item. PersonalWeb Techs., LLC v. Apple, Inc., 1 917 F.3d 1376, 1377–78 (Fed. Cir. 2019). The system uses the content-based identifier to 2 determine whether a particular data item is present on the system. And, when the data item’s 3 contents are changed, the content-based identifier is also changed. The identifiers are then used to 4 determine if access to a data item is licensed or authorized. See, e.g., ’310 patent (claims 24, 81, 5 86). 6 Five claims of the ’310 patent are at issue. Plaintiff contends Defendant EMC/VMware 7 infringed claims 24 and 31 of the patent. Plaintiff alleges Defendants Google/YouTube, 8 Facebook, and EMC/VMware infringed claims 81, 82, and 86 of the patent. The relevant claims 9 of the ’310 patent are as follows:

10 24. A computer-implemented method implemented at least in part by hardware comprising one or more processors, the method comprising: 11 (a) using a processor, receiving at a first computer from a second computer, a request 12 regarding a particular data item, said request including at least a content-dependent name for the particular data item, the content-dependent name being based, at least in part, on at 13 least a function of the data in the particular data item, wherein the data used by the function to determine the content-dependent name comprises at least some of the contents of the 14 particular data item, wherein the function that was used comprises a message digest function or a hash function, and wherein two identical data items will have the same 15 content-dependent name; and

16 (b) in response to said request: (i) causing the content-dependent name of the particular data item to be compared 17 to a plurality of values;

18 (ii) hardware in combination with software determining whether or not access to the particular data item is unauthorized based on whether the content-dependent 19 name of the particular data item corresponds to at least one of said plurality of values, and 20 (iii) based on said determining in step (ii), not allowing the particular data item to 21 be provided to or accessed by the second computer if it is determined that access to the particular data item is not authorized. 22 31. The method of claim 211 wherein, for each particular data item of the plurality of data 23

24 1 Claim 21 claims: 25 A computer-implemented method implemented at least in part by hardware comprising one or 26 more processors, the method comprising:

27 (a) obtaining a list of content-dependent names, one for each of a plurality of data items, wherein, for each particular data item of the plurality of data items, the corresponding content-dependent items, the corresponding content-dependent name for that particular data item was based 1 on a function of all of the contents of that particular data item.

2 81. A device operable in a network of computers, the device comprising hardware including at least one processor and memory, to: 3 (a) receive, at said device, from another device in the network, a content-based identifier 4 for a particular sequence of bits, the content-based identifier being based at least in part on a function of at least some of the particular sequence of bits, wherein the function 5 comprises a message digest function or a hash function, and wherein two identical sequences of bits will have the same content-based identifier, and to 6 (b) compare the content-based identifier of the particular sequence of bits to a plurality of 7 values; and to

8 (c) selectively allow said particular sequence of bits to be provided to or accessed by other devices depending on whether or not said content-dependent identifier corresponds to one 9 of the plurality of values.

10 82. The device of claim 81 wherein the particular sequence of bits represent data selected from the group comprising: a file, a portion of a file, a page in memory, a digital message, 11 a portion of a digital message, a digital image, a portion of a digital image, a video signal, a portion of a video signal, an audio signal, a portion of an audio signal, a Software 12 product, and a portion of a software product.

13 86.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Diamond v. Diehr
450 U.S. 175 (Supreme Court, 1981)
New. Net, Inc. v. Lavasoft
356 F. Supp. 2d 1090 (C.D. California, 2004)
Ali Hamza Ahmad al Bahlul v. United States
792 F.3d 1 (D.C. Circuit, 2015)
Enfish, LLC v. Microsoft Corporation
822 F.3d 1327 (Federal Circuit, 2016)
Tli Communications LLC v. Av Automotive, L.L.C.
823 F.3d 607 (Federal Circuit, 2016)
Electric Power Group, LLC v. Alstom S.A.
830 F.3d 1350 (Federal Circuit, 2016)
McRO, Inc. v. Bandai Namco Games America Inc.
837 F.3d 1299 (Federal Circuit, 2016)
Affinity Labs of Texas, LLC v. Directv, LLC
838 F.3d 1253 (Federal Circuit, 2016)
Personal Web Technologies, LLC v. Apple, Inc.
848 F.3d 987 (Federal Circuit, 2017)
Prism Technologies LLC v. T-Mobile USA, Inc.
696 F. App'x 1014 (Federal Circuit, 2017)
Visual Memory LLC v. Nvidia Corporation
867 F.3d 1253 (Federal Circuit, 2017)
Secured Mail Solutions LLC v. Universal Wilde, Inc.
873 F.3d 905 (Federal Circuit, 2017)
Finjan, Inc. v. Blue Coat Systems, Inc.
879 F.3d 1299 (Federal Circuit, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
PersonalWeb Technologies LLC v. Facebook Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/personalweb-technologies-llc-v-facebook-inc-cand-2020.