Suffolk Technologies LLC v. AOL Inc.

942 F. Supp. 2d 600, 2013 WL 1700938, 2013 U.S. Dist. LEXIS 57186
CourtDistrict Court, E.D. Virginia
DecidedApril 18, 2013
DocketCase No. 1:12cv625
StatusPublished
Cited by3 cases

This text of 942 F. Supp. 2d 600 (Suffolk Technologies LLC v. AOL Inc.) is published on Counsel Stack Legal Research, covering District Court, E.D. Virginia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Suffolk Technologies LLC v. AOL Inc., 942 F. Supp. 2d 600, 2013 WL 1700938, 2013 U.S. Dist. LEXIS 57186 (E.D. Va. 2013).

Opinion

MEMORANDUM OPINION

T.S. ELLIS, III, District Judge.

In this patent infringement case, Suffolk Technologies LLC (“Suffolk”), the sole owner of U.S. Patent No. 6,081,835 (“the '835 patent”), sues defendant Google, Inc. (“Google”)1 for infringement and will-[603]*603fill infringement of the '835 patent, which purports to cover several methods for controlling a server in response to requests for files from web pages. As is typical in a patent infringement suit, the parties dispute the meaning of several material claim terms and phrases, necessitating Mark-man2 claim construction determinations.

On February 25, 2013, an Order issued setting forth the claim construction determinations.3 This memorandum opinion sets forth the reasoning in support of the claim construction determinations.

I.

The genesis of the '835 patent is not in dispute. In September 1995, British Telecommunications, pic (“BT”) learned that a webpage that disparaged BT was using a BT logo obtained from a BT server. It appears that the operator of the disparaging webpage was able to obtain the BT logo from the BT server simply by directing internet browsers accessing the disparaging website to obtain the BT logo from the BT server and then to display the BT logo as part of the disparaging webpage on the user’s computer screen. The BT server was not capable of controlling access to the BT logo based on the source of the request for the BT logo and the disparaging webpage took advantage of this weakness.

To remedy this situation, the inventors, BT employees, devised the method that is claimed in the '835 patent. In essence, the '835 patent teaches a method for operating a file server that entails using information about a requesting webpage to decide whether the server should send the requested file to the requesting webpage. The first step in the method begins with a file, such as an HTML file for a webpage, requesting a file from a server. The method goes on to provide that the server looks at the identification signal of the requesting file, compares this received identification signal with a set of predetermined identification signals, and then decides whether or not to fulfill the request for a file. In addition to sending the requested file, the second server may also, based on the received identification signal, (i) send a ‘dummy’ file in place of the requested file or (ii) send a newly generated file — that is a file newly created, or an existing file that is tailored, based on the identification signal. Thus, the '835 patent solved BT’s problem, as the BT server would be able to determine whether the request for the BT logo originated from a non-approved webpage and could either refuse to provide the BT logo or provide a dummy file instead.

The inventors, Stuart Anteliff, John Regnault, and Laurence Bradley, filed the original application for the '835 patent with the United States Patent and Trademark Office (“PTO”) on July 19, 1996. The inventors claim priority based on an April 4, 1996 United Kingdom application for the same method.4 On March 11,1997, the inventors filed a continuation-in-part application with the PTO. On March 29, [604]*6041999, the'first Office Action issued, wherein the Examiner (i) rejected application claims 1, 2, 6, and 8-10 as having been anticipated by a patent to Graber, U.S. Patent No. 5,712,979, and (ii) rejected application claims 3-5 and 11-28 as being obvious over the Graber patents, in view of Weinman, “The CGI Book.”

On July 28, 1999, the applicants responded to the Office Action by (i) cancel-ling claims 1-28 and, in place of those, (ii) adding application claims 29-46. More specifically, where application claim 1 required that the signal identify the ‘origin’ of the request, application claim 29 requires an identification signal to identify “an originating file from which said request originated.” In addition to the new claims, the inventors argued that the obviousness rejection over the combination of Graber and the “CGI Book” was now addressed by the amended claims. In particular, the inventors argued that the “CGI Book” did not use identification signals; instead, it used an authorization process that required the manual entry of a user ID and password and, therefore, the “CGI Book” did not provide the identification element missing from the Graber patent.

On October 12, 1999, the Examiner allowed all of the pending claims of the amended application and, as a result, application claim 29 issued as independent claim 1 of the '835 patent. The remaining 17 claims are dependent on claim 1.

The '835 patent consists of eighteen claims. The claims in issue at the time of the issuance of the Order setting forth the Markman determinations read as follows:

1. A method of operating a file server, said method comprising the steps of: receiving a request for a file;
determining if the request includes a received identification signal identifying an originating file from which said request originated;
comparing any said received identification signal with one or more predetermined identification signals; and
deciding which file, if any, is to be supplied in dependence upon said determining and comparing steps, and if in the deciding step it is decided that a file is to be supplied, supplying said file.
Claims 2, and 6 through 9 depend on claim 1:
2. A method as in claim 1 wherein said supplied file is supplied only if said identification signal matches a said predetermined identification signal.
6. A method as in claim 1 wherein said deciding step further comprises generating said supplied file.
7. A method as in claim 1 wherein said request conforms to a hypertext transfer protocol.
8. A method as in claim 7 wherein said received identification signal includes a universal resource location address for said origination from which the request originated.
9. A method as in claim 1 in which said file server is connected to the internet and wherein said request is received via the internet.

The parties dispute the meaning of three claim terms, in bold above, as used in independent claim 1 and dependent claim 6. They are:

(i) “file,” as used in claim 1;
(ii) “identification signal,” as used in claims 1 and 2; and,
(iii) “generating said supplied file,” as used in claim 6.

Further, Google argues that “identification signal” should be construed as used in two separate phrases. Specifically, Google argues that the following phrases require construction:

(i) “received identification signal identifying an originating file from which [605]*605said request originated,” as used in claim 1; and,
(ii) “predetermined identification signal” as used in claims 1 and 2.

As explained below, the uniform construction of the term “identification signal” obviates the need to construct these additional terms.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
942 F. Supp. 2d 600, 2013 WL 1700938, 2013 U.S. Dist. LEXIS 57186, Counsel Stack Legal Research, https://law.counselstack.com/opinion/suffolk-technologies-llc-v-aol-inc-vaed-2013.