Secure Web Conference Corp. v. Microsoft Corporation

640 F. App'x 910
CourtCourt of Appeals for the Federal Circuit
DecidedFebruary 17, 2016
Docket2015-1321
StatusUnpublished

This text of 640 F. App'x 910 (Secure Web Conference Corp. v. Microsoft Corporation) is published on Counsel Stack Legal Research, covering Court of Appeals for the Federal Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Secure Web Conference Corp. v. Microsoft Corporation, 640 F. App'x 910 (Fed. Cir. 2016).

Opinion

STOLL, Circuit Judge.

Secure Web Conference Corporation (“Secure Web”) appeals the district court’s construction of several patent claim terms in a patent infringement lawsuit it initiated against Microsoft Corporation (“Microsoft”). Secure Web argues that the district court improperly imported limitations from specific embodiments into the challenged constructions. Because the district court correctly construed the terms at issue by considering the language of the claims themselves and by looking to the patent specification for guidance on claim term meaning, we affirm.

Background

Secure Web owns U.S. Patent Nos. 6,856,686 (“'686 patent”) and 6,856,687 (“'687 patent”), which are both directed to providing a method and system for enabling encryption of data in a manner that provides increased security. '686 patent, col. 1, ll. 50-51; '687 patent, col. 1 ll. 34-41. The patents differ little. The '686 patent, issued on February 15, 2005, describes a method for securing communications between two microprocessor devices, such as between two telephones, fax machines, and/or computers. The patent describes achieving secured communications through the use of a “security device,” which has encryption and decryption capa-" bilities and interfaces with each of the microprocessor devices. Figure 1 depicts the system at a high level.

*912 [[Image here]]

Exemplary claim 1, with the- term at issue in this appeal italicized, recites:

1. A method for exchanging data between a plurality of microprocessor based devices over a computer network so as to frustrate unauthorized access to said data, said method comprising: providing a plurality of security devices each being associated with at least one of said plurality of microprocessor based devices;
establishing a point-to-point electronic communications session between a first of said security devices being associated with a first of said microprocessor based devices and a second of said security devices being associated with a second of said microprocessor based devices;
exchanging security data between said first and second security devices using said point-to-point communications session;
encrypting data to be transmitted using said first security device and said security data; and,
transmitting said encrypted data from said first microprocessor based device to said second microprocessor based device over said computer network.

'686 patent col. 14 11. 40-61.

The '687 patent issued on February 15, 2005 as a continuation-in-part of the application that became the '686 patent. The '687 patent further claims a security device operable on both wired and wireless networks and with varying network bandwidths. Claim 29, with the terms at issue in this appeal italicized, is the only asserted claim from the '687 patent:

29. A device for providing secure communications over a network comprising: a communication port for transfer of audio data;
a plurality of communication ports for transfer of digital data;
a keypad;
an encoding/decoding device; a conversion device operable to convert between audio and digital data;
a processor, in communication with a memory, said keypad and said encoding/decoding device, operable to execute code for:
*913 selecting a configuration of a transmission and a reception port from among said communication ports dependent upon the presence of a network communication device and an input/output device in communication with said selected ports;
providing data received from said selected reception port to said encryption/decryption device for encrypting; and
providing said encrypted data to said selected transmission port.

'668 patent col. 101.58-col. 121.6.

Secure Web sued Microsoft in the United States District Court for the Eastern District of New York, accusing Microsoft’s Skype and Lync products of infringing the asserted claims of the '686 and '687 patents. The district court entered a claim construction order largely in Microsoft’s favor, at which point the parties stipulated to a judgment of noninfringement. The stipulation provides that, for each patent, each of the appealed claim constructions constitutes a separate and independent ground for noninfringement, both literally and under the doctrine of equivalents.

Secure Web timely appealed, and we have jurisdiction to review under 28 U.S.C. § 1295(a)(1).

Discussion

The “ultimate interpretation” of a claim term, as well as interpretations of “evidence intrinsic to the patent (the patent claims and specifications, along with the patent’s prosecution history),” are legal conclusions, which this court reviews de novo. Teva Pharm. USA, Inc. v. Sandoz, Inc., — U.S.-, 135 S.Ct. 831, 841, — L.Ed.2d - (2015). Where a district court “make[s] factual findings about ... extrinsic evidenced[, however,] th[e] subsidiary factfinding must be reviewed for clear error on appeal.” Id. Because the district court relied only on intrinsic evidence in this case, our review is de novo.

I. '686 Patent

The district court construed the claim term “security device” as “a standalone telecommunications device, external to and separate from the associated microprocessor based or electronic device, capable of encrypting and decrypting data.” Secure Web Conference Corp. v. Microsoft Corp., No. 13-CV-2642, 2014 WL 4954644, at *2-5 (E.D.N.Y. Oct. 2, 2014) (Dist. Ct. Op.) (emphases added). Secure Web disputes that a person of ordinary skill in the art, having considered the intrinsic record, would understand that a security device is limited to “stand-alone” devices that are “external to and separate from” the underlying microprocessor based devicé(s).

Claim construction seeks to ascribe the “ordinary and customary meaning” to claim terms as they would be understood to a person of ordinary skill in the art at the time of invention. Phillips v. AWH Corp., 415 F.3d 1303, 1312-14 (Fed.Cir. 2005) (en banc) (citing Vitronics Corp. v. Conceptronic, Inc., 90 F.3d 1576, 1582 (Fed.Cir.1996)). “[T]he claims themselves provide substantial guidance as to the meaning of particular claim terms,” id. at 1314, and therefore “the context of the surrounding words of the claim also must be considered in determining the ordinary and customary meaning of those terms,” ACTV, Inc. v. Walt Disney Co.,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
640 F. App'x 910, Counsel Stack Legal Research, https://law.counselstack.com/opinion/secure-web-conference-corp-v-microsoft-corporation-cafc-2016.