Kara Technology Inc. v. stamps.com Inc. ( 2009 )


Menu:
  •  United States Court of Appeals for the Federal Circuit
    2009-1027, -1028
    KARA TECHNOLOGY INCORPORATED,
    Plaintiff-Appellant,
    v.
    STAMPS.COM INC.,
    Defendant-Cross Appellant.
    Eliot D. Williams, Baker Botts L.L.P., of New York, New York, argued for plaintiff-
    appellant. With him on the brief was Robert C. Scheinfeld.
    Philip J. Graves, Graves Law Office, P.C., argued for defendant-cross appellant.
    Appealed from: United States District Court for the Central District of California
    Judge Consuelo B. Marshall
    United States Court of Appeals for the Federal Circuit
    2009-1027, -1028
    KARA TECHNOLOGY INCORPORATED.,
    Plaintiff-Appellant,
    v.
    STAMPS.COM, INC.,
    Defendant-Cross Appellant.
    On appeal from the United States District Court for the Central District of California in
    Case No. 05-CV-1890, Judge Consuelo B. Marshall.
    ___________________________
    DECIDED: September 24, 2009
    ___________________________
    Before SCHALL, PLAGER, and MOORE, Circuit Judges.
    MOORE, Circuit Judge.
    Kara Technology (Kara) appeals from the final judgment of the United States
    District Court for the Central District of California, following a jury trial, that Stamps.com
    did not infringe various claims of U.S. Patent Nos. 6,505,179 (the ’179 patent) and
    6,735,575 (the ’575 patent) with its Pre-Version 5 (Pre-V5) or Versions 5 and later (V5)
    products. Kara also appeals from the district court’s grant of summary judgment in
    favor of Stamps.com on its breach of contract claim. The court ruled, as a matter of
    law, that Stamps.com did not breach its nondisclosure agreement (NDA) with Kara. For
    its part, Stamps.com cross appeals the determination of the district court that it was not
    a prevailing party in the litigation, and that it thus was not entitled to costs under 28
    U.S.C. § 1920 or attorney’s fees under the NDA. For the following reasons, we vacate-
    in-part, reverse-in-part, and remand.
    BACKGROUND
    Kara owns the ’179 and ’575 patents. Salim Kara is the sole inventor listed on
    both patents. The ’179 patent is a continuation-in-part of the ’575 patent. The ’179 and
    ’575 patents are directed toward apparatuses and methods of creating and verifying the
    authenticity of documents such as postage. The patents concern technology that allows
    a customer to print a secured document (such as a stamp or an airline ticket) at home
    using preprinted label sheets. Data contained in the preprinted label sheets are used to
    both create the final document and later validate its authenticity.      Figures 1 and 2
    (identical in both the ’179 and ’575 patents) illustrate one embodiment of the invention.
    2009-1027, -1028                            2
    Figure 1 depicts a label sheet preprinted with a bar code (16a) and a serial
    number (16b). The patent refers to this preprinted information as “preestablished data.”
    A consumer communicates information contained in the preprinted sheet to a
    processor, which then uses the information to create a security indicia (21).         The
    consumer may then print out the final document at home. As shown in figure 2, the final
    document contains both the preprinted information and the security indicia. A seller
    (e.g., the post office or an airline) later verifies the authenticity of the document using
    both the preprinted information and the security indicia.
    Stamps.com offers Internet-based shipping and postage services.          In May of
    2000, Stamps.com approached Kara to collaborate on Kara’s Personal Computer-
    based (PC-based) stamp technology.         On May 9, 2000, the two signed an NDA,
    requiring Stamps.com to “keep secret and not disclose . . . and not use for its own use
    in any capacity whatsoever any Confidential Information for any purpose other than for
    the purpose for which such information was disclosed” (i.e., to facilitate “business
    2009-1027, -1028                             3
    discussions”). NDA, ¶¶ 1, 3. Further, the NDA specifically provided that Stamps.com
    was not permitted to “make written, electronic, or photostatic copies or excerpts of or
    summaries of Confidential Information” without prior written consent from Kara. 
    Id. ¶ 5.
    In July of 2000, Stamps.com indicated it was no longer interested in pursuing a
    business relationship with Kara. On October 24, 2001, Stamps.com announced that the
    U.S. Postal Service had approved beta testing of its PC-based postage product. The
    Pre-V5 product was launched commercially on July 17, 2002, while the V5 line was
    launched on June 28, 2005.
    Kara brought suit against Stamps.com, alleging infringement and breach of
    contract (among other claims not on appeal) on October 22, 2004, in the United States
    District Court for the Southern District of New York.         Eventually, the case was
    transferred to the Central District of California, at which point Stamps.com
    counterclaimed for patent invalidity and unenforceability, and, relevant to this appeal,
    moved for summary judgment on Kara’s breach of contract claim. The district court
    granted the summary judgment motion on August 23, 2006, finding that the statute of
    limitations for the contract claim had run. Furthermore, assuming arguendo that the
    statute of limitations had not run, the court found all alleged “confidential” information
    was in the public domain, and thus Stamps.com could not have breached the NDA by
    copying and retaining the information learned through its business dealings with Kara.
    Thereafter, following a Markman hearing, the district court construed the relevant
    patent terms and entered a Markman Order on September 10, 2007. Stamps.com then
    moved for summary judgment of noninfringement and invalidity, which was denied by
    the court. Infringement of claims 1, 4, 5, 7, and 42 of the ’575 patent and of claims 24,
    2009-1027, -1028                            4
    27–31, 36–39, 42, 44, and 54, as well as Stamps.com’s invalidity counterclaims, were
    then tried before a jury. After the close of evidence, Kara moved for judgment as a
    matter of law (JMOL) that Stamps.com’s Pre-V5 product infringed claim 42 of the ’575
    patent and claims 36, 38, and 42 of the ’179 patent. Upon denial of this motion, the
    court submitted the infringement and invalidity issues to a jury. The jury found that
    neither the Pre-V5 nor the V5 line of products infringed the asserted claims. For that
    reason, it did not address any of the invalidity counterclaims.
    The court entered judgment on July 16, 2008, holding that Stamps.com was the
    prevailing party. Kara subsequently filed a renewed JMOL motion that Stamps.com’s
    Pre-V5 product infringed claim 42 of the ’575 patent and claims 36, 38, and 42 of the
    ’179 patent; a motion for a new trial; a motion to strike the part of the July 16 judgment
    stating that Stamps.com was the prevailing party; and a motion to dismiss
    Stamps.com’s invalidity and unenforceability counterclaims. On September 10, 2008,
    the district court denied the motions for a new trial and renewed JMOL, but granted the
    motion to strike the reference to Stamps.com as a prevailing party, entered judgment for
    Kara on the counterclaim of unenforceability, and dismissed the invalidity counterclaims
    without prejudice. Both parties timely appealed; we have jurisdiction under 28 U.S.C.
    § 1295(a)(1).
    DISCUSSION
    I.     Claim Construction
    We review claim construction de novo. Cybor Corp. v. FAS Techs., Inc., 
    138 F.3d 1448
    , 1455-56 (Fed. Cir. 1998) (en banc). The words of a claim are generally
    given their ordinary and customary meaning as understood by a person of ordinary skill
    2009-1027, -1028                             5
    in the art in question at the time of the invention. Phillips v. AWH Corp., 
    415 F.3d 1303
    ,
    1312-13 (Fed. Cir. 2005) (en banc). “[A]lthough the specification often describes very
    specific embodiments of the invention, we have repeatedly warned against confining the
    claims to those embodiments.” 
    Id. at 1323.
    “In particular, we have expressly rejected
    the contention that if a patent describes only a single embodiment, the claims of the
    patent must be construed as being limited to that embodiment.” 
    Id. Claim 36
    of the ’179 patent is representative of the claims at issue on appeal: 1
    36.   A method for establishing the validity of a display created by a non-
    secure printer, said method comprising the steps of:
    placing in said printer paper upon which information may be
    created, said paper containing preestablished data which is
    unique to said paper;
    communicating at least a portion of said preestablished data to a
    location independent from said printer, said independent
    location operable to send to said printer a security indicia, as
    part of a human readable display, said security indicia created in
    part by information contained in said preestablished media data
    and whereby said security indicia is validatable at a subsequent
    time partially under control of data contained in said
    preestablished paper data, said unique data being created on
    said paper defining one or more from the group consisting of:
    postage stamps, money orders, bank drafts, letters of credit, legal
    documents, legal certificates, diplomas, passports, birth
    certificates, visas, drivers licenses, social security cards,
    medical insurance cards, vacation packages, travel vouchers,
    car rental vouchers, hotel vouchers, meal vouchers, drink
    vouchers, food stamps, tickets, baggage tags, prescriptions
    (Rx), vehicle licenses, vehicle titles;
    wherein said paper is divided into sections each section adapted for
    printing thereon information pertaining to a different display,
    1
    The independent claims (claims 24 and 36 of the ’179 patent and claims 1
    and 42 of the ’575 patent) all contain similar language describing the creation and
    validation of the security indicia. Claims 1 and 42 of the ’575 contain different language
    concerning the operation of the “independent location,” but these differences do not
    affect this appeal.
    2009-1027, -1028                            6
    each such display having associated therewith a security
    indicia.
    The central dispute concerns the meaning of the underlined language describing the
    creation and validation of the security indicia. The claim construction dispute pertains to
    three separate terms or phrases:
    (1) “security indicia”
    (2) “said independent location operable to send to said printer a security
    indicia, as part of a human readable display, said security indicia
    created in part by information contained in said preestablished media
    data” (the creation limitation)
    (3) “and whereby said security indicia is validatable at a subsequent time
    partially under control of data contained in said preestablished paper
    data” (the validation limitation)
    The construction of all three terms, however, turns on the same issue: whether the
    security indicia must be created and validated under control of a key contained in the
    preestablished data. In its Markman Order, the district court construed “security indicia”
    by stating that the indicia must “be created under control of a key” and stated that the
    “information contained in” the preestablished data must be a “key.” Kara Tech. Inc. v.
    Stamps.com, Inc., No. 05-1890, slip op. at 18 (C.D. Cal. Sept. 10, 2007) (Claim
    Construction Order). The district court further construed the creation limitation as “said
    independent location having a computer programmed to create a security indicia under
    control of a key contained in the preestablished data that is capable of sending to the
    printer a security indicia, and that the security indicia is part of a human readable
    display.” 
    Id. at 19.
    Finally, the court construed the validation limitation as “and by which
    it may be established at a subsequent time, under control of the key contained in the
    preetablished [media or] paper data, that the security indicia is authentic.” 
    Id. at 19-20.
    In doing so, the district court explained that “the history of secure systems design
    2009-1027, -1028                             7
    supports that this invention requires a key.” 
    Id. at 17.
    It also referred to the detailed
    embodiment in the specification describing the use of a key in the preprinted data to
    support its construction. 
    Id. Kara argues
    that the term security indicia should be construed as “any distinctive
    mark that can be used to establish the validity of a document or display.” It further
    argues that these claims do not require that the security indicia be created or validated
    by a key contained in the preestablished data. In response, Stamps.com argues that
    only a cryptographic key embedded in the preestablished data allows for the creation,
    control, and validation of the security indicia, as required by the patent claims. We
    agree with Kara that the preestablished data does not have to contain a key, and, as
    logically follows, that the security indicia does not have to be created or validated by a
    key in that data.
    The claims at issue do not state that the preestablished data contain a key; they
    state that the data contain “information.” Specifically, the plain language of the claims
    requires that the security indicia be “created in part by information contained in
    preestablished media data.” See, e.g., ’179 patent col.12 ll.14-15. This language does
    not require that the preprinted data contain a key, and certainly not a cryptographic key
    (as argued by Stamps.com), from which the security indicia would be generated. The
    preestablished data must, as the claim requires, simply contain information that will be
    used to create the security indicia—the information will be part of what creates the
    security indicia. Similarly, the claim requires that “security indicia is validatable at a
    subsequent time partially under control of data contained in said preestablished paper
    data.” This merely requires that the data in the preestablished paper data (in this case
    2009-1027, -1028                            8
    the serial number on the preprinted label) is part of what must be used to validate the
    security indicia. It in no way requires a key in the preestablished paper data.
    Moreover, when all of the claims of the ’179 and ’575 patents are viewed
    together, it is clear that the claims at issue on appeal do not require a key in the
    preprinted data. “Differences among claims can . . . be a useful guide in understanding
    the meaning of particular claim terms.” 
    Phillips, 415 F.3d at 1314
    . Here, when the
    inventor wanted to restrict the claims to require the use of a key, he did so explicitly.
    None of the claims at issue on appeal recite the term “key.” By contrast, all of the other
    independent claims require either an “encryption key” or “key data.” ’179 patent claims
    1, 14, 47, 54, 59, 66; ’575 patent claims 52, 60. In addition, dependent claim 2 of the
    ’575 patent explicitly adds the limitation to claim 1 of the ’575 patent that the security
    indicia “is validated by key information contained in at least a portion of said
    preestablished data.” This further indicates that the claims at issue on appeal do not
    require the use of a key in the preprinted paper. See 
    Phillips, 415 F.3d at 1314
    -15
    (“[T]he presence of a dependent claim that adds a particular limitation gives rise to a
    presumption that the limitation in question is not present in the independent claim.”).
    To be sure, the specification repeatedly discusses a key embedded in the
    preestablished data. See, e.g., ’179 patent col.2 ll.11-15, col.4 ll.52-59, col.5 ll.57-60,
    65-67. In the only detailed embodiments in the patent, the key is embedded in the
    preestablished data. 
    Id. This is
    not enough, however, to limit the patentee’s clear,
    broader claims. The claim language read in the context of the specification does not
    require that a key be contained in the preestablished data, the patentee did not act as
    his own lexicographer or disavow claim scope. It is the claims that define the metes
    2009-1027, -1028                             9
    and bounds of the patentee’s invention. See Corning Glass Works v. Sumitomo Elec.
    U.S.C., Inc., 
    868 F.2d 1251
    , 1257 (Fed. Cir. 1989).           The claims, not specification
    embodiments, define the scope of patent protection. The patentee is entitled to the full
    scope of his claims, and we will not limit him to his preferred embodiment or import a
    limitation from the specification into the claims. See 
    Phillips, 415 F.3d at 1323
    .
    Thus, in the context of these patents, a security indicia is “a mark printed on a
    document that can be used to verify the authenticity of the document.” The disputed
    terms and phrases require that the information or data contained in the preestablished
    data be used to create and validate the security indicia, but contrary to the district
    court’s determination and Stamps.com’s arguments, they do not require a key or
    cryptographic key in the preestablished data.
    The expert testimony presented below does not compel a different result. The
    claims recite “security indicia created in part by information . . . and . . . validatable at a
    subsequent time partially under control of data.” See, e.g., ’179 patent col.12 ll.14-17.
    Stamps.com’s expert, Professor McDaniels, testified that the terms “by” and “under
    control of” are terms of art that would indicate to one skilled in the art of secure systems
    design that the preprinted information must contain a cryptographic key, which he
    defined as “a very large number (e.g., 500 to 1,000 digits long).”           Kara presented
    competing testimony by Professor Keromytis, who opined that the terms would indicate
    to one skilled in the art that while the preprinted information must be used for both
    creation and validation, it “need not ‘contain’ a ‘key.’” It is not uncommon in patent
    cases to have such dueling experts. When construing claims, however, the intrinsic
    evidence and particularly the claim language are the primary resources. We have held
    2009-1027, -1028                              10
    that extrinsic evidence such as expert testimony is “less significant than the intrinsic
    record in determining the legally operative meaning of claim language.” 
    Phillips, 415 F.3d at 1317
    (internal quotation marks omitted). While helpful, extrinsic sources like
    expert testimony cannot overcome more persuasive intrinsic evidence. A “court should
    discount any expert testimony that is clearly at odds with the claim construction
    mandated by the claims themselves, the written description, and the prosecution
    history, in other words, with the written record of the patent.” 
    Id. at 1318
    (internal
    quotation marks omitted).
    Here, the testimony of Stamps.com’s expert cannot overcome the plain language
    of the claims, which requires only that the security indicia be created “in part” by and
    validatable “partially” under control of the preprinted information and which does not
    require a key in the preestablished data. See, e.g., ’179 patent col.12 ll.14-17. The
    asserted claims, in contrast to other claims in these patents, do not contain a limitation
    to a key embedded in the preestablished data, and we decline to read such a limitation
    into them.
    Because the district court erred in construing the claims, we vacate the judgment
    of noninfringement. It is undisputed that versions of Stamps.com’s accused Netstamps
    Pre-V5 products contain serial numbers that are used at least in part to create and
    partially validate the security indicia. See J.A. 4848-52, 4856-57 (testimony of Jeffrey
    Bussell, Stamps.com’s Software and Development Manager); see also Memorandum in
    Support of Defendant Stamps.com’s Motion for Summary Judgment on the Ground that
    the Patents Are Not Infringed at 6-8, Kara Technology Inc. v. Stamps.com, Inc., No. 05-
    1890 (C.D. Cal. Oct. 19, 2007). We do not, however, believe it would be appropriate to
    2009-1027, -1028                           11
    rule as a matter of law on the issue of the Pre-V5 infringement in the first instance in
    light of alternative arguments of noninfringement that Stamps.com presented to the
    jury. 2 We therefore remand to the district court for further proceedings consistent with
    this opinion.
    II.    Breach of the NDA
    The district court granted summary judgment dismissing Kara’s claim for breach
    of the NDA after concluding that the claim was barred by the four-year statute of
    limitations under the applicable state law and, as an alternative grounds for dismissal,
    that the NDA did not protect Kara’s trade secrets because Kara had publicly disclosed
    them.       Kara alleges two separate breaches of the NDA.        The first is based on
    Stamps.com’s admitted note-taking during a May 15, 2000 business meeting, in
    violation of Paragraph 5 of the NDA. The second is based on Stamps.com’s alleged
    use of Kara’s confidential information to develop Stamps.com’s PC-based postage
    products, in violation of Paragraph 3 of the NDA. The district court focused solely on
    the note-taking and subsequent failure of Stamps.com to destroy the notes, stating that
    the October 2004 complaint clearly fell outside the four-year statute of limitations and
    thus there was no issue of material fact as to the breach of contract claim.
    We give plenary review to a district court’s grant of summary judgment, applying
    the same standard as the district court. Immunocept, LLC v. Fulbright & Jaworski, LLP,
    
    504 F.3d 1281
    , 1286 (Fed. Cir. 2007). “Summary judgment is appropriate when there is
    2
    For example, Stamps.com offered testimony that the Pre-V5 product did
    not contain the “independent location” limitation referred to in the claims. We see no
    error in the district court’s construction of this limitation as an “independent location
    having a computer programmed to create a security indicia . . . capable of sending to
    the printer a security indicia.” See Claim Construction Order at 19.
    2009-1027, -1028                            12
    no genuine issue as to any material fact and the moving party is entitled to judgment as
    a matter of law.” 
    Id. (internal citation
    omitted); see also Anderson v. Liberty Lobby, Inc.,
    
    477 U.S. 242
    , 247–48 (1986). “Summary judgment must be granted against a party
    who has not introduced evidence sufficient to establish the existence of an essential
    element of that party’s case, on which the party would bear the burden of proof at trial.”
    Univ. of W. Va., Bd. of Trs. v. VanVoorhies, 
    278 F.3d 1288
    , 1295 (Fed. Cir. 2002).
    Because this is a contract claim, we apply state law. 
    Id., 278 F.3d
    at 1296. Per
    the terms of Paragraph 12 of the NDA, and as agreed on by the parties, Texas law
    governs. Appellant’s Br. 22; Appellee’s Br. 63. In Texas, the statute of limitations for
    breach of contract is four years.     Enterprise-Laredo Assocs. v. Hachar’s, Inc., 
    839 S.W.2d 822
    , 837 (Tex. App. 1992) (citing Tex. Civ. Prac. & Rem. Code Ann. § 16.004
    (Vernon 1986)). This period tolls until the injured party discovers or through the use of
    reasonable care and diligence should have discovered the breach.            
    Id. The party
    asserting the statute of limitations defense (Stamps.com) bears the burden of
    establishing when Kara discovered or should have discovered its breach. Geraghty &
    Miller, Inc. v. Conoco Inc., 
    234 F.3d 917
    , 932 (5th Cir. 2000).
    As stated above, Kara alleges two separate breaches of the NDA. The first
    occurred when at least two Stamps.com employees took notes at a meeting between
    the parties on May 15, 2000. There is no real dispute that Kara knew or should have
    known of this breach at the time it occurred, as the meeting was attended by several of
    Kara’s employees, including its President and Chief Operating Officer. Kara did not file
    its complaint until October 22, 2004, and therefore any claim based on this breach is
    barred by Texas’s four-year statute of limitations. While we agree with the district court
    2009-1027, -1028                            13
    that this note-taking breach is barred by the statute of limitations, Kara alleged a second
    breach that was not addressed in the district court’s summary judgment order—that
    Stamps.com misused the information it learned at the May 15, 2000 meeting to develop
    its PC-based postage products, which allowed consumers to print stamps from home.
    Kara asserts that it did not become aware of this separate breach until October
    24, 2001 (less than four years before it filed its complaint), at the time Stamps.com
    publicly disclosed that the U.S. Postal Service had approved beta testing of its product.
    Stamps.com did not carry its burden of establishing no material fact as to the date Kara
    discovered this misuse. Although Stamps.com offered testimony that it intended to
    circulate the summaries from the May 15, 2000, Kara argues it had no such knowledge
    Stamps.com was using the confidential information to develop a PC-based postage
    product. Drawing all inferences and resolving all doubts in favor of the non-moving
    party, as we are required to do, we must conclude there is a genuine issue of material
    fact as to the date Kara discovered Stamps.com’s use of Kara’s “confidential”
    information.
    If, however, Kara publicly disclosed all of its information prior to sharing it with
    Stamps.com, then Kara would not be entitled to relief under the NDA (because Kara
    would not have shared any confidential information).           Paragraph 2 of the NDA
    specifically provides that “[c]onfidential information shall not include . . . [i]nformation
    which becomes part of the public knowledge through no breach of this Agreement or
    any similar obligations known by [Stamps.com].”         Kara shared its information with
    Stamps.com on May 15, 2000. In ruling on summary judgment, the district court relied
    on two potential public disclosures: (1) a presentation by Kara in Finland from May 23-
    2009-1027, -1028                            14
    25, 2000, and (2) an exhibit by Kara at the World Stamp Expo from July 7-16, 2000.
    Both of these disclosures post-date the May 15, 2000 meeting, during which Kara
    shared its information with Stamps.com. Thus, based on the dates of these disclosures
    alone, a genuine issue of material fact exists as to the amount of time Stamps.com
    potentially misused Kara’s confidential information.   For example, if it is found that
    Stamps.com did misuse the information (a fact on which we offer no opinion), and
    moreover immediately misused the confidential information after the May 15, 2000
    meeting, Stamps.com still could be liable for a breach of contract claim based on the
    eight days before the May 23 presentation.
    Furthermore, material factual disputes exist concerning what was disclosed at
    the Finland presentation and what one skilled in the art would have understood from
    Kara’s exhibit at the World Stamp Expo. It is unclear from Kara’s slides from its Finland
    presentation whether the public would understand how to create a secure document, or
    how those documents are later validated. Further, although there was testimony Kara’s
    exhibit at the World Stamp Expo included a full demonstration, there was also testimony
    that Kara struggled to get its demonstration to work. Finally, it is unclear if Kara’s
    system was fully explained during the demonstration, and whether a person of skill in
    the art would understand the technology based on the demonstration. Because there
    are material issues of fact in dispute regarding breach of the NDA due to misuse of the
    confidential information, we reverse the district court’s grant of summary judgment on
    the breach of contract claim and remand for further proceedings consistent with this
    decision.
    2009-1027, -1028                           15
    CONCLUSION
    Because we conclude that the district court erred when construing the claims, we
    vacate the judgment of noninfringement and remand. Because the district court erred
    by granting summary judgment on the breach of contract claim when there exist
    disputes of material fact on Stamps.com’s alleged misuse of information, we reverse
    and remand. 3
    VACATED-IN-PART, REVERSED-IN-PART, and REMANDED
    3
    We have considered and have found to be without merit Kara’s challenge
    to the district court’s jury instructions regarding infringement and willfulness. In addition,
    given the disposition of this appeal, we need not address Stamps.com’s cross-appeal of
    the district court’s denial of attorneys’ fees and costs. However, we note that the district
    court’s declaration that Stamps.com was not the prevailing party because it lost on the
    counterclaim of unenforceability conflicts with our precedent. See Brooks Furniture Mfg.
    v. Dutailier Int’l, Inc., 
    393 F.3d 1378
    (Fed. Cir. 2008); Manildra Milling Corp. v. Ogilvie
    Mills, Inc., 
    76 F.3d 1178
    (Fed. Cir. 1996).
    2009-1027, -1028                             16