throbber

`BLACKBERRY LIMITED,
`
`
`Plaintiff,
`
`
`v.
`
`BLU PRODUCTS, INC.,
`
`
`Defendant.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 1 of 31
`
`UNITED STATES DISTRICT COURT
`SOUTHERN DISTRICT OF FLORIDA
`MIAMI DIVISION
`
`Case Number: 16-23535-CIV-MORENO
`
`Hon. John J. O’Sullivan, Magistrate Judge
`
`
`
`
`
`
`
`
`PLAINTIFF BLACKBERRY’S OPPOSITION
`TO DEFENDANT BLU PRODUCTS’ MOTION
`TO DISMISS PURSUANT TO FED. R. CIV. P. 12(b)(6)
`
`
`DM_US 77906111-1.092211.0028
`
`
`GOOGLE EXHIBIT 1011
`
`Page 1 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 2 of 31
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`INTRODUCTION ...............................................................................................................1
`
`LEGAL STANDARD ..........................................................................................................4
`
`III.
`
`BLACKBERRY’S PATENTS ARE PATENT-ELIGIBLE UNDER § 101 .......................6
`
`A.
`
`The ‘868 Claims Are Patent-Eligible Under § 101 ..................................................7
`
`1.
`
`2.
`
`3.
`
`Background of the ‘868 Patent ....................................................................7
`
`The ‘868 Claims Are Not Directed to an Abstract Idea...............................9
`
`The ‘868 Claims Include an Inventive Concept ........................................12
`
`B.
`
`The ‘466 and ‘384 Claims Are Patent-Eligible Under § 101.................................13
`
`1.
`
`2.
`
`3.
`
`Background of The ‘466 and ‘384 Patents ................................................13
`
`The ‘466 and ‘384 Claims Are Not Directed to an Abstract Idea .............15
`
`The ‘466 and ‘384 Claims Include an Inventive Concept .........................17
`
`C.
`
`The ‘149 Claims Are Patent-Eligible Under § 101 ................................................18
`
`1.
`
`2.
`
`3.
`
`Background of the ‘149 Patent ..................................................................18
`
`The ‘149 Claims Are Not Directed to an Abstract Idea.............................20
`
`The ‘149 Claims Include an Inventive Concept ........................................22
`
`IV.
`
`BLACKBERRY’S COMPLAINT PROVIDES SUFFICIENT INFORMATION; IT
`DOES NOT FAIL TO STATE A CLAIM ........................................................................22
`
`V.
`
`CONCLUSION ..................................................................................................................25
`
`REQUEST FOR HEARING ..........................................................................................................25
`
`
`
`
`
`
`
`
`
`DM_US 77906111-1.092211. 0028
`
`i
`
`Page 2 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 3 of 31
`
`
`
`Cases
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`Alice Corp. v. CLS Bank Int’l,
`_ U.S. _, 134 S. Ct. 2347 (2014) ...................................................................................... passim
`
`Amdocs (Israel) Ltd. V. Openet Telecom, Inc. et al.,
`No. 2015-1180, 2016 WL 6440387 (Fed. Cir. Nov. 1, 2016) ......................................... passim
`
`Ashcroft v. Iqbal,
`556 U.S. 662 (2009) ...................................................................................................................4
`
`Atlas IP LLC v. Pac. Gas & Elec. Co.,
`No. 15-CV-05469-EDL, 2016 WL 1719545 (N.D. Cal. Mar. 9, 2016) ..............................3, 23
`
`Avago Techs. General IP v. Asustek Computer Inc.,
`Case Nos. 15-cv-04525, 15-cv-00451-EMC, 2016 WL 1623920 (N.D. Cal.
`Apr. 25, 2016) ......................................................................................................................3, 24
`
`Bancorp Servs., LLC v. Sun Life Assurance Co. of Canada,
`687 F.3d 1266 (Fed. Cir. 2013)..................................................................................................3
`
`Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC,
`827 F.3d 1341 (Fed. Cir. 2016)........................................................................................ passim
`
`Bell Atl. Corp. v. Twombly,
`550 U.S. 544 (2007) .............................................................................................................3, 23
`
`Conley v. Gibson,
`
`355 U.S. 41, 47 (1957) ........................................................................................................3, 23
`
`Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat’l Ass’n,
`776 F.3d 1343 (Fed. Cir. 2014)..................................................................................................6
`
`CyberSource Corp. v. Retail Decisions, Inc.,
`654 F.3d 1366 (Fed. Cir. 2011)....................................................................................12, 21, 22
`
`DDR Holdings, LLC v. Hotels.com, L.P.,
`
`773 F.3d 1245, 1257 (Fed. Cir. 2015)..............................................................................9,11,17
`
`Elec. Power Grp. LLC v. Alstom S.A,
`830 F.3d 1350 (Fed. Cir. 2016)................................................................................................12
`
`DM_US 77906111-1.092211. 0028
`
`ii
`
`Page 3 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 4 of 31
`
`Enfish, LLC v. Microsoft Corp.,
`822 F.3d 1327 (Fed. Cir. 2016)........................................................................................ passim
`
`FairWarning IP, LLC v. Iatric Sys., Inc.,
`839 F.3d 1089 (Fed. Cir. 2016)................................................................................................21
`
`Global Tech LED, LLC v. Every Watt Matters, LLC,
`Case No. 15-cv-61933 (May 27, 2016) ...................................................................................24
`
`Iron Gate Sec. Inc. v. Loew’s Cos. Inc.,
`Case No. 15-cv-8814 (SAS), 2016 WL 1070853 (S.D.N.Y. Mar. 16, 2016) ......................3, 23
`
`Mayo Collaborative Servs. v. Prometheus Labs., Inc.,
`132 S. Ct. 1289 (2012) ...............................................................................................................4
`
`McRo, Inc. v. Bandai Namco Games Am. Inc.,
`837 F.3d 1299 (Fed. Cir. 2016)........................................................................................ passim
`
`Mort. Grader, Inc. v. First Choice Loan Servs., Inc.,
`811 F.3d 1314 (Fed. Cir. 2016)................................................................................................13
`
`Openwave Sys. Inc. v. Apple Inc.,
`808 F.3d 509 (Fed. Cir. 2015)....................................................................................................5
`
`SiRF Tech., Inc. v. ITC,
`601 F.3d 1319 (Fed. Cir. 2010)................................................................................................20
`
`Uniloc USA Inc. v. Avaya Inc.,
`No. 6:15-cv-1168, slip op. (E.D. Tex. May 13, 2016) ...................................................3, 23, 24
`
`Werteks Closed Joint Stock Co. v. GNC Corp.,
`No. 16-60688-CIV-MORENO (S.D. Fla. Aug. 23, 2016) .................................................24, 25
`
`Statutes and Rules
`
`35 U.S.C. § 101 ...................................................................................................................... passim
`
`35 U.S.C. § 103 ..............................................................................................................................12
`
`Fed. R. Civ. P. 8 .........................................................................................................................3, 24
`
`Fed. R. Civ. P. 12 .......................................................................................................................1, 25
`
`L.R. 7.1(b)(2) .................................................................................................................................25
`
`DM_US 77906111-1.092211. 0028
`
`iii
`
`Page 4 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 5 of 31
`
`Plaintiff BlackBerry Limited (“BlackBerry”) hereby opposes Defendant BLU Products,
`
`Inc.’s (“BLU”) November 4, 2016 Motion to Dismiss Pursuant to Fed. R. Civ. P. 12(b)(6) (D.I.
`
`24-25), directed to (1) the patentability under 35 U.S.C. § 101 of four (4) of the 15 asserted
`
`patents: U.S. Patent Nos. 8,402,384 (the “‘384 patent”); 8,489,868 (the “‘868 patent”),
`
`8,713,466 (the “‘466 patent”); and 8,745,149 (the “‘149 patent”) (collectively “BlackBerry’s
`
`Patents”1); and (2) the sufficiency of BlackBerry’s Complaint (D.I. 16).
`
`I.
`
`INTRODUCTION
`
`BlackBerry’s Patents are directed to specific technological inventions that claim
`
`significant advances over prior art technology directed to the usability and security of mobile
`
`devices. These patents are inventive, and the claimed inventions are not well-known, routine, or
`
`conventional. Indeed, BlackBerry’s inventions have been instrumental in making BlackBerry an
`
`innovator and market leader in the mobile communication industry. For over 30 years,
`
`BlackBerry has provided a broad array of transformative, patented technologies in ground-
`
`breaking mobile communication devices and services used by tens of millions of consumers and
`
`organizations around the world, including by over 90% of Fortune 500 companies.
`
`Under the U.S. Supreme Court’s two-step Alice inquiry, a claim is patent-eligible under
`
`§ 101 if it either (1) is directed to a patent-eligible concept, i.e., something other than “laws of
`
`nature, natural phenomena, and abstract ideas,” or (2) includes an “inventive concept” sufficient
`
`to transform any patent-ineligible concept into a patent-eligible claim.2
`
`The most recent Federal Circuit precedent in Bascom3 and Enfish4 has significantly
`
`clarified the § 101 case law landscape, and the Federal Circuit has reinforced these clarifications
`
`
`1 BLU refers to these as the “101 Patents” in its motion.
`2 Alice Corp. v. CLS Bank Int’l, _ U.S. _, 134 S.Ct. 2347, 2354, 2357 (2014).
`3 Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341 (Fed. Cir. 2016).
`4 Enfish, LLC v. Microsoft Corp., 822 F.3d 1327 (Fed. Cir. 2016).
`DM_US 77906111-1.092211.0028
`
`
`Page 5 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 6 of 31
`
`in even more recent cases, including McRo5 and Amdocs6.
`
`In Enfish, the Federal Circuit clarified that step one of the Alice inquiry “cannot simply
`
`ask whether the claims involve a patent-ineligible concept” because “all inventions at some level
`
`embody, use, reflect, rest upon, or apply laws of nature, natural phenomena, or abstract ideas”
`
`(emphasis in original). Instead, the claims must be “considered in light of the specification,
`
`based on whether their character as a whole is directed to excluded subject matter” and courts
`
`may inquire into “the focus of the claimed advance over the prior art.”7 Moreover, just last
`
`month in McRo, the Federal Circuit again “cautioned that courts must be careful to avoid
`
`oversimplifying the claims by looking at them generally and failing to account for the specific
`
`requirements of the claims.”8
`
`Regarding step two of the Alice inquiry, BLU’s arguments regarding inventive concept
`
`are exactly those rejected in the Bascom decision. The Federal Circuit in Bascom held: “The
`
`‘inventive concept’ may arise in one or more of the individual claim limitations or in the ordered
`
`combination of the limitations.”9 It further clarified: “The inventive concept inquiry requires
`
`more than recognizing that each claim element, by itself, was known in the art. As is the case
`
`here, an inventive concept can be found in the non-conventional and non-generic arrangement of
`
`known, conventional pieces.” Id. (emphasis added). BLU, however, provides no rationale or
`
`support (and is unable to do so) for its conclusory argument that the combination of the claimed
`
`elements failed to provide any inventive concept.
`
`Collectively, these recent cases pointedly reject the very same arguments put forward by
`
`
`5 McRo, Inc. v. Bandai Namco Games Am. Inc., 837 F.3d 1299 (Fed. Cir. 2016).
`6 Amdocs (Israel) Ltd. V. Openet Telecom, Inc. et al., No. 2015-1180, 2016 WL 6440387 (Fed.
`Cir. Nov. 1, 2016).
`7 Enfish, 822 F.3d at 1335 (internal quotations and citations omitted).
`8 McRo, 837 F.3d at 1313 (internal citation omitted) (emphasis added).
`9 Bascom, 827 F.3d at 1350 (emphasis added).
`
`DM_US 77906111-1.092211. 0028
`
`2
`
`Page 6 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 7 of 31
`
`BLU—(1) abstracting and oversimplifying claims by ignoring their specific requirements and
`
`their disclosed advantages over the prior art, and (2) arguing that the claims are ineligible based
`
`solely on allegations that their individual elements are well-known and conventional in the art,
`
`without any showing that the character of the claims as a whole or that the claimed combinations
`
`of specific elements are well-known and conventional.
`
`Although satisfying either one of the two Alice steps is sufficient for the Court to find
`
`eligibility, each of BlackBerry’s patent claims (1) is directed to a patent-eligible concept and (2)
`
`includes an “inventive concept.” Accordingly, BLU’s § 101 challenge should be denied for two
`
`independent reasons.10
`
`With respect to BLU’s challenge to the sufficiency of BlackBerry’s Complaint, courts
`
`consistently hold that pleading infringement through the use of exemplary claims, as BlackBerry
`
`has done, satisfies the pleading requirements of the Federal Rules which requires “a short and
`
`plain statement of the claim” that “gives the defendant fair notice of what the . . . claim is and the
`
`grounds upon which it rests.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555 (2007) (quoting
`
`Conley v. Gibson, 355 U.S. 41, 47 (1957)).11 Thus, the remainder of BLU’s challenge also
`
`
`10 The Court also may delay resolution of the § 101 challenge until after claim construction is
`complete. The Federal Circuit has instructed that while “claim construction is not an inviolable
`prerequisite to a validity determination under § 101” courts should still find it “desirable—and
`often necessary—to resolve claim construction disputes prior to a § 101 analysis, for the
`determination of patent eligibility requires a full understanding of the basic character of the
`claimed subject matter.” Bancorp Servs., LLC v. Sun Life Assurance Co. of Canada, 687 F.3d
`1266, 1273 (Fed. Cir. 2013).
`11 See also Uniloc USA Inc. v. Avaya Inc., No. 6:15-cv-1168, slip op. at 7 (E.D. Tex. May 13,
`2016) (finding exemplary claims sufficient); Avago Tech. Gen. IP v. Asustek Comput. Inc., Case
`Nos. 15-cv-04525, 15-cv-00451-EMC, 2016 WL 1623920 (N.D. Cal. Apr. 25, 2016) (finding
`complaint sufficient that alleged infringement of “one or more claims” (see Complaint, Dkt.
`20)); Iron Gate Sec. Inc. v. Loew’s Cos. Inc., Case No. 15-cv-8814 (SAS), 2016 WL 1070853
`(S.D.N.Y. Mar. 16, 2016) (same); Atlas IP LLC v. Pac. Gas & Elec. Co., No. 15-CV-05469-
`EDL, 2016 WL 1719545, at *5 (N.D. Cal. Mar. 9, 2016) (declining to dismiss the complaint
`because it relied on exemplary claim) (dismissed on other grounds).
`
`DM_US 77906111-1.092211. 0028
`
`3
`
`Page 7 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 8 of 31
`
`should be rejected because BlackBerry is not required to provide every detail for every possible
`
`claim of its infringement case within the Complaint.12
`
`II.
`
`LEGAL STANDARD
`
`Section 101 serves to promote scientific and technological advancement by excluding
`
`“[l]aws of nature, natural phenomena, and abstract ideas” from the realm of patentable subject
`
`matter, thus preventing patentees from monopolizing “the basic tools of scientific and
`
`technological work.” Alice, 134 S. Ct. at 2354 (quoting Ass’n for Molecular Pathology v.
`
`Myriad Genetics, Inc., 133 S. Ct. 2107, 2116, (2013)). “[H]owever, too broad an interpretation
`
`of this exclusionary principle could eviscerate patent law. For all inventions at some level
`
`embody, use, reflect, rest upon, or apply laws of nature, natural phenomena, or abstract ideas.”
`
`Mayo Collaborative Servs. v. Prometheus Labs., Inc., 132 S. Ct. 1289, 1293 (2012).
`
`Indeed, the Federal Circuit’s recent guidance on applying step one of the Alice inquiry
`
`cautions against glossing over the question of what the claim is directed to:
`
`The “directed to” inquiry, therefore, cannot simply ask whether the claims involve a
`patent-ineligible concept, because essentially every routinely patent-eligible claim
`involving physical products and actions involves a law of nature or natural
`phenomenon—after all, they take place in the physical world. For all inventions at
`some level embody, use, reflect, rest upon, or apply laws of nature, natural
`phenomena, or abstract ideas. Rather, the “directed to” inquiry applies a stage-one
`filter to claims, considered in light of the specification, based on whether their
`character as a whole is directed to excluded subject matter.
`
`Enfish, 822 F.3d at 1335 (internal citations omitted) (emphasis added). Instead, courts should
`
`inquire into “the focus of the claimed advance over the prior art.” Id. (internal citation omitted).
`
`The Federal Circuit found that the Enfish claims are not directed to an abstract idea but are
`
`“directed to an improvement of an existing technology” based on the specification’s teachings
`
`that the claimed invention achieves other benefits over conventional technology. Id. at 1337; see
`
`
`12 Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009).
`
`DM_US 77906111-1.092211. 0028
`
`4
`
`Page 8 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 9 of 31
`
`also Openwave Sys. Inc. v. Apple Inc., 808 F.3d 509, 513-514 (Fed. Cir. 2015) (finding that a
`
`specification’s disparagement of the prior art is relevant to determine the scope of the invention).
`
`Just last month, the Federal Circuit again “cautioned that courts must be careful to avoid
`
`oversimplifying the claims” because “a court must look to the claims as an ordered combination
`
`without ignoring the requirements of the individual steps.” McRo, 837 F.3d at 1313 (emphasis
`
`added). In addition, courts should consider whether the claims “improve[] the relevant
`
`technology or are instead directed to a result or effect that itself is the abstract idea and merely
`
`invoke generic processes and machinery.” Id. at 1314 (emphasis added).
`
`
`
`For step two, the Federal Circuit in Bascom vacated the district court’s finding of
`
`ineligibility because of the district court’s failure to assess the combination of limitations and
`
`provided the following guidance:
`
`We agree with the district court that the limitations of the claims, taken
`individually, recite generic computer, network and Internet components, none of
`which is inventive by itself. BASCOM does not assert that it invented local
`computers, ISP servers, networks, network accounts, or filtering. Nor does the
`specification describe those elements as inventive.
`
`However, we disagree with the district court’s analysis of the ordered combination
`of limitations. In light of Mayo and Alice, it is of course now standard for a § 101
`inquiry to consider whether various claim element simply recite “well-understood,
`routine, conventional activit[ies].” Alice, 134 S. Ct. at 2359. …. The inventive
`concept requires more than recognizing that each claim element, by itself, was
`known in the art. As is the case here, an inventive concept can be found in the non-
`conventional and non-generic arrangement of known, conventional pieces.
`
`Bascom, 827 F.3d at 1350 (emphasis added). In holding that the claims contain an inventive
`
`concept, the Federal Circuit found that “the patent describes how its particular arrangement of
`
`elements is a technical improvement over prior art ways of filtering such content.” Id.; see also
`
`Amdocs, 2016 WL 6440387, at *15 (Claims are patentable where they “describe a specific,
`
`unconventional technological solution, narrowly drawn to withstand preemption concerns to a
`
`technological problem.”).
`
` Indeed, claims that “involve[] some arguably conventional
`
`DM_US 77906111-1.092211. 0028
`
`5
`
`Page 9 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 10 of 31
`
`components” are patentable when they “also involve[] limitations that when considered
`
`individually and as an ordered combination recite an inventive concept.” Amdocs, 2016 WL
`
`6440387, at *11 (emphasis added).
`
`In applying § 101 at the pleading stage, the court construes the patent claims in a manner
`
`most favorable to the non-moving party. See Content Extraction & Transmission LLC v. Wells
`
`Fargo Bank, Nat’l Ass’n, 776 F.3d 1343, 1349 (Fed. Cir. 2014). For § 101 analysis, the
`
`narrowest proposed construction would be the most favorable to the non-moving party. Id.
`
`(“manner most favorable … necessarily assum[es] that all of [challenged] claims required a
`
`machine, even though several claims do not expressly recite any hardware structures”).
`
`III. BLACKBERRY’S PATENTS ARE PATENT-ELIGIBLE UNDER § 101
`
`Founded in 1984, BlackBerry revolutionized the mobile communication industry. Its
`
`pioneering, cutting-edge products changed the way millions of people around the world connect,
`
`converse, and share digital information. It is an originator of today’s multibillion-dollar modern
`
`smartphone industry. Crucial to this success is BlackBerry’s history of technological innovation.
`
`In the past five years alone BlackBerry has invested more than $5.5 billion in research and
`
`development. Many of BlackBerry’s innovations are embodied in its massive patent portfolio
`
`covering an array of technologies. The challenged BlackBerry patents result from this history of
`
`innovation.
`
`BLU’s motion should be rejected for the very same reason that the Federal Circuit in the
`
`recent Enfish, Bascom, McRo, and Amdocs decisions rejected the lower courts’ analysis of the
`
`“abstract idea” step one and “inventive concept” step two of the Alice inquiry. When analyzed
`
`according to the latest Federal Circuit guidance, BlackBerry’s Patents are specific, inventive, and
`
`do not present preemption concerns.
`
`
`
`DM_US 77906111-1.092211. 0028
`
`6
`
`Page 10 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 11 of 31
`
`A.
`
`The ‘868 Claims Are Patent-Eligible Under § 101
`
`1.
`
`Background of the ‘868 Patent
`
`Security is a paramount concern for mobile devices. The ‘868 patent provides the
`
`groundwork for a secure software architecture and represents a significant advance in the field.
`
`The invention of the ‘868 patent is particularly relevant to a mobile computing platform wherein
`
`various third parties, some untrusted, are allowed to develop and distribute software applications
`
`directly to consumers who may be vulnerable to data theft or other digital risks. Software
`
`applications require access to various hardware resources. (‘868 patent at 3:14-45.) For
`
`example, a photo-taking software application requires access to the device’s camera, and an
`
`application for mapping and navigation will require access to the device’s location data.
`
`Application programming interfaces (“APIs”) are provided to software developers to facilitate
`
`such access and bridge the software application to system resources. (Id. at 3:14-22.)
`
`The claims of the ‘868 patent are directed to a software architecture that employs a
`
`library of APIs wherein certain APIs are restricted, while others are not. Any software
`
`application attempting to access the restricted APIs would be subjected to a digital verification
`
`step before access is granted. For example, a cryptographic verification performed at the end
`
`user device at runtime allows for confirmation that the application is indeed authorized to access
`
`sensitive APIs. Within this framework, mobile device end-users are relieved of the burden of
`
`verifying the trustworthiness of each individual software developer, while software developers
`
`are given appropriate tools to efficiently build new applications.
`
`Contrary to BLU’s assertions, the ‘868 patent does not merely claim “[c]hecking proper
`
`authorization to access certain resources by verifying a signature.” (D.I. 25 at 9.) For example,
`
`the language of Claim 1 of the ‘868 patent shows much more is involved:
`
`DM_US 77906111-1.092211. 0028
`
`7
`
`Page 11 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 12 of 31
`
`A mobile device containing software instruction which when executed on the
`mobile device cause the mobile device to perform operations for controlling
`access to an application platform of the mobile device, the operation comprising:
`
`storing a plurality of application programming interfaces (APIs) at the mobile
`device, wherein at least one API comprises a sensitive API to which access is
`restricted;
`
`receiving, at the mobile device, an indication that a software application on the
`mobile device is requesting access to the sensitive API stored at the mobile
`device;
`
`determining, at the mobile device, whether the software application is signed,
`wherein a signed software application includes a digital signature generated
`using a private key of a private key-public key pair, wherein the private key is
`not accessible to the mobile device;
`
`the mobile device using a public key of the private key-public key pair to verify
`the digital signature of the software application; and
`
`based upon verifying the digital signature at the mobile device, the mobile device
`allowing the software application access to the sensitive API.
`
`As illustrated by claim 1, the claims of the ‘868 patent are directed to a software architecture that
`
`designates only certain APIs as restricted. (‘868 patent at 3:26-29; see also Figure 3.) Any
`
`software application attempting to access the restricted APIs must pass a cryptographic “code
`
`signature” digital verification step using a private key-public key pair. (Id. at 3:50-61.)
`
`The specification of the ‘868 patent makes clear that the specific combination of elements
`
`in the claimed inventions improve upon prior art wherein “the user typically must use his or her
`
`judgment to determine whether or not the software application is reliable, based solely on his or
`
`her knowledge of the software developer’s reputation.” (Id. at 1:33-36.) “Because typical code
`
`signing protocols are not secure and rely solely on the judgment of the user, there is a serious
`
`risk that destructive, ‘Trojan horse’ type software applications may be downloaded and installed
`
`onto a mobile device.” (Id. at 1:39-43.) In one embodiment, a single trusted party (e.g., an
`
`application marketplace provider) may be entrusted with evaluating security risks of third-party
`
`DM_US 77906111-1.092211. 0028
`
`8
`
`Page 12 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 13 of 31
`
`software applications, thereby relieving end-users of this responsibility. (Id. at 3:54-60.) The
`
`claimed inventions further satisfy the needs of network operators to “maintain control over
`
`which software applications are activated on mobile devices” and “control the types of software
`
`on the devices issued to its employees.” (Id. at 1:44-50.)
`
`2.
`
`The ‘868 Claims Are Not Directed to an Abstract Idea13
`
`The ‘868 patent addresses problems unique to computers, and nothing in the brick and
`
`mortar context motivates the claimed inventions. See DDR Holdings, LLC v. Hotels.com, L.P.,
`
`773 F.3d 1245, 1257 (Fed. Cir. 2015) (finding claims not directed to abstract idea because “the
`
`claimed solution is necessarily rooted in computer technology in order to overcome a problem
`
`specifically arising in the realm of computer networks.”) Indeed, there is much more to the ‘868
`
`claims than merely “basic manual tasks traditionally performed by humans as part of an
`
`authorization process for granting access to a ‘sensitive resource’,” as argued by BLU. (D.I. 25
`
`at 9-10.) As an initial matter, “processes that automate tasks that humans are capable of
`
`performing are patent eligible if properly claimed.” McRo, 837 F.3d at 1313. Viewing, for
`
`example, Claim 1’s character as a whole, in light of the specification, it is clear that the claim is
`
`directed to a specific invention that allows for controlled access to sensitive APIs and
`
`uncontrolled access to other APIs through an inventive architecture involving cryptographic
`
`verification of software applications. (‘868 patent at 14:42-63.) It cannot be disputed that this
`
`invention overcomes a problem specifically arising in the technical field of mobile devices.
`
`Like the invention in Enfish, the ‘868 claims are directed to “a specific improvement in
`
`the way computers operate” and “improv[ing] an existing technological process,” which is not an
`
`
`13 After addressing steps 1 and 2 of the Alice inquiry, BLU included a third, separate section for
`each BlackBerry Patent alleging that the Patent does not “improve the functioning of the
`computer itself.” This analysis is more properly addressed as part of step 1 of the Alice inquiry
`and BlackBerry has done so in the ‘step 1’ section for each of the BlackBerry Patents.
`
`DM_US 77906111-1.092211. 0028
`
`9
`
`Page 13 of 31
`
`

`

`Case 1:16-cv-23535-FAM Document 48 Entered on FLSD Docket 11/22/2016 Page 14 of 31
`
`abstract idea. Enfish, 822 F.3d at 1335 (quoting Alice, 134 S. Ct. at 2358-59). The specification
`
`makes clear that the claimed invention is an improvement to prior art security protocols:
`
`Security protocols involving software code signing schemes are known. Typically,
`such security protocols are used to ensure the reliability of software applications
`that are downloaded from the Internet. In a typical software code signing scheme, a
`digital signature is attached to a software application that identifies the software
`developer. Once the software is downloaded by a user, the user typically must use
`his or her judgment to determine whether or not the software application is
`reliable, based solely on his or her knowledge of the software developer's
`reputation. This type of code signing scheme does not ensure that a software
`application written by a third party for a mobile device will properly interact with
`the device's native applications and other resources. Because typical code signing
`protocols are not secure and rely solely on the judgment of the user, there is a
`serious risk that destructive, “Trojan horse” type software applications may be
`downloaded and installed onto a mobile device.
`
`(‘868 patent at 1:27-43 (emphasis added).) The claimed invention further satisfies certain
`
`security-related needs of network operators, such as those that do not trust employees to keep
`
`malicious software off mobile devices:
`
`There also remains a need for network operators to have a system and method to
`maintain control over which software applications are activated on mobile devices.
`
`There remains a further need in 2.5G and 3G networks where corporate clients or
`network operators would like to control the types of software on the devices issued
`to its employees.
`
`For example, a company may wish to prevent its employees from executing any
`software applications onto their devices without first obtaining permission from a
`corporate information technology (IT) or computer services department. All such
`corporate mobile devices may then be configured to require verification of at least
`a global signature before a software application can be executed. Access to
`sensitive device APIs and Libraries, if any, could then be further restricted,
`dependent upon verification of respective corresponding digital signatures.
`
`(Id. at 1:44-50; 4:3-7 (emphasis added).) The claimed system allows the mobile device to check
`
`whether an already-installed and running software application has been digitally signed by an
`
`entity that is known to be trustworthy when the application attempts to access sensitive APIs that
`
`could be used to compromise the employer’s computer network. (See, e.g., 4:24-45; FIG. 1
`
`DM_US 77906111-1.092211. 0

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket