Spa Syspatronic Ag v. United States , 2014 U.S. Claims LEXIS 663 ( 2014 )


Menu:
  •      In the United States Court of Federal Claims
    No. 10-769C
    (Filed: July 18, 2014)
    *******************************
    SPA SYSPATRONIC AG,
    Plaintiff,
    v.
    Patents; Means-plus-function
    THE UNITED STATES,                        limitations; 35 U.S.C. § 112;
    Indefiniteness.
    Defendant,
    and
    GEMALTO, INC.
    Third-Party Defendant.
    *******************************
    Charles P. Kennedy, Washington, DC, for plaintiff.
    David M. Ruddy, United States Department of Justice, Civil Division,
    Commercial Litigation Branch, Washington, DC, with whom were Stuart F.
    Delery, Assistant Attorney General, and John Fargo, Director, for defendant.
    Brian A. Rosenthal, Washington, DC, for third-party defendant.
    OPINION
    BRUGGINK, JUDGE.
    This is a patent infringement action brought pursuant to 28 U.S.C. §
    1498(a) (2012) against the United States for unlicensed use of plaintiff’s
    patent. A third party, Gemalto, Inc., responded to our rule 14(b)(3) notice to
    third parties, and joined the case as a third-party defendant. Defendants
    moved for summary judgment, contending that certain claims of the patent are
    indefinite and thus invalid under 35 U.S.C. § 112. Oral argument was held on
    1
    January 14, 2014, and again after supplemental briefing on May 5, 2014. The
    motion is fully briefed. For the foregoing reasons, defendants’ motion is
    granted in part and denied in part.
    BACKGROUND
    United States Patent No. 4,985,921 (“‘921 Patent”) is held by plaintiff,
    SPA Syspatronic AG, a Swiss company. The patent concerns a “portable
    carrying device containing a control unit and an additional data memory . . .
    as an integrated circuit.” DX 1 at A3 (the ‘921 Patent).1 The main application
    of these devices was intended to be credit cards and other small data-carrying
    cards. 
    Id. The main
    feature of the device is the protection of the data stored
    on the device from unauthorized access. This is achieved primarily through
    the utilization of multiple microchips communicating with one another using
    codes or encryption “without participation of system parts external to the
    carrying device.” 
    Id. at A4
    (claim 1).
    Following proceedings before the European Patent Office concerning
    the corresponding European patent, plaintiff sought reexamination of claim 1
    of the ‘921 patent by the United States Patent and Trademark Office (“PTO”).
    The result of that process was the cancellation of claim 1 and the addition of
    claims 8-13.2 See 
    id. at A5-A7
    (Ex Parte Reexamation Certificate, Oct. 8,
    2008). Plaintiff instituted this action against the United States in November
    of 2010. Plaintiff alleges infringement of claims 2, 3, 4, 7, 8, 9, 10, and 13 by
    the United States.
    As a result of the first patent reexamination and the cancellation of
    claim 1, claim 8 is the only independent claim. It teaches:
    A portable data carrying device comprising a control unit and an
    additional data memory which are each implemented as
    integrated circuits, wherein the control unit is provided with
    1
    The parties attached exhibits in support of their positions for or against
    defendants’ motion for summary judgment. “DX” refers to “defendants’
    exhibit.” “PX” refers to “plaintiff’s exhibit.”
    2
    Gemalto requested a second ex parte reexamination of the ‘921 Patent. This
    second reexamination did not result in any changes. See 
    id. at A8-A9
    (Ex
    Parte Reexamation Certificate, Nov. 20, 2012).
    2
    means for placing it in communication with an external
    read/write device characterized in that entry into the additional
    data memory (5) by the control unit (2) is protected by coding
    means which is in the carrying device and is operative to permit
    entry into the additional data memory (5) without participation
    of system parts external to the carrying device, and wherein the
    control unit and the additional data memory are operative to
    exchange information in encrypted form.
    
    Id. at A7.
    Claim 2 adds that the data memory “contains an access code region and
    the code means includes means within the control unit (2) for producing a code
    signal (C) for entry to the data memory through the access code region.” 
    Id. at A4
    (claim 2). Claim 3 adds that “code means” “includes a processor (8)
    associated with the data memory (5) for a secure (coded or decoded) data
    exchange with the control unit (2a).” 
    Id. (claim 3).
    Claim 4 further explains
    that the “code means includes means within the control unit (2b) for producing
    a secret microcode for communications between the control unit and the data
    memory.” 
    Id. (claim 4).
    Claims 5 and 6 are not at issue in this suit. Claim 7
    limits the device to having the control unit, data memory, and other parts of the
    microchips “in a totally integrated circuit construction on the same carrier.” 
    Id. (claim 7).
    Claim 8 is the new independent claim quoted above. Claim 9 is
    largely duplicative of claim 2 but refers to claim 8 rather than the cancelled
    claim 1. Claim 10 is likewise similar to claim 4. Claims 11 and 12 are not at
    issue. Claim 13 is a slightly reworded version of claim 7: “the control unit, the
    additional data memory and further regions are implemented collectively in an
    integrated circuit construction on a single carrier.” 
    Id. at A7
    (claim 13).
    Paragraph 2 of section 112 of title 35 requires generally that patent
    specifications “conclude with one or more claims particularly pointing out and
    distinctly claiming the subject matter which the applicant regards as his
    invention.” 35 U.S.C. § 112 ¶ 2 (2006).3 This is the “definiteness”
    3
    35 U.S.C. § 112 was amended in 2011,which changed the wording of
    paragraph two slightly. See Leahy-Smith America Invents Act, Pub. L. No.
    112-29, § 4(c), 125 Stat. 284, 296 (Sept. 16, 2011). Those amendments did not
    take effect until after this action was filed and thus do not affect the patent in
    suit. We thus cite to the 2006 code containing the previous version of the
    statute.
    3
    requirement of patents. Paragraph 6 of the same code section allows for a
    special type of patent claiming known as “means-plus-function” claiming:
    An element in a claim for a combination may be expressed as a
    means . . . for performing a specified function without recital of
    structure . . . and such claim shall be construed to cover the
    corresponding structure . . . described in the specification and
    equivalents thereof.
    
    Id. ¶ 6.
    “Means-plus-function” limitations disclose a function in the claim
    language, and the structure to achieve that function (or the “means”) must be
    disclosed in the patent specifications. See Phillips v. AWH Corp., 
    415 F.3d 1303
    , 1311 (Fed. Cir. 2005) (en banc). The ‘921 Patent employs several
    “means-plus-function” elements in its claims.
    Defendants have identified three means-plus-function limitations as to
    which they assert that the ‘921 Patent’s specifications fail to disclose any
    means. They are (1) “coding means which is in the carrying device and is
    operative to permit entry into the additional data memory . . . without
    participation of system parts external to the carrying device,” which is found
    in independent claim 8; (2) “means within the control unit for producing a
    code signal for entry to the data memory through the access code region,”
    which is found in dependent claims 2 and 9; and “means within the control
    unit for producing a secret microcode for communications between the control
    unit and the data memory,” which appears in dependent claims 4 and 10. DX
    1 at A4. Plaintiff does not dispute that these are means-plus-functions
    limitations.
    There are four embodiments of the device contemplated by the patent
    as illustrated in Figures 1-4 of the patent’s specifications. They appear below:
    4
    
    Id. at A2.
    The prose that follows in the patent specifications describe each of the
    embodiments and is comprised of a little over two columns of text. See 
    id. at A3-A4
    (column 2, line 23 through column 4, line 24). The first embodiment
    specifications read:
    5
    In FIG. 1 a plastic card is illustrated as a data carrying device in
    which two integrated semi-conductor - circuit components
    (“chips”) 2 and 4 are set. The component 2 comprises the
    control unit of the data carrying device and is connected to an
    external contact 9 of the card 1 for the purpose of connecting to
    an external (not illustrated) read/write unit of the data exchange
    system. The connections for the external unit can also be
    produced in other manners than the galvanized contact, for
    example, by known means with an inductive coupling and so
    forth. The control unit 2 preferably comprises a microprocessor
    with a computer and RAM - and ROM storage areas as well as
    additionally a data memory region. An additional data memory
    5 exists on the second component 4. The connection between the
    two components 2 and 4 is produced by means of a multiple
    conductor strip 3. For technical assembly reasons, it may be
    useful to combine the components 2 and 4 with the conductor
    strip 3 and if necessary the external contact 9 into a common
    module for the construction in the plastic card 1.
    An external connection to the control unit 2 can only be
    made by means of the contact 9 so that an exchange of sensitive
    data between the card and the system in a known fashion can
    only come about after successful authentication and
    identification, which functions are participated in by the control
    unit. The data exchange is produced also however within the
    card between the components 2 and 4 by means of the conductor
    strip 3. In order to prevent manipulation and unauthorized
    access to the data memory 5, entry to this memory is protected
    by the control unit 2. For example according to FIG. 1, an access
    code region 6 is associated with the data memory 5 for this
    purpose. In this manner the memory is accessible only by means
    of a code signal C which is produced by the control unit 2, that
    is, data exchange D between the components 2 and 4 is only
    possible after successful decoding of the code region 6. Also,
    the data exchange within the component 2 between the control
    unit and a data memory existing there is produced in a similarly
    protected manner, although not further illustrated. Such
    protected data exchange processes are produced within the data
    carrying device 1 with a certain degree of self-sufficiency
    without participation of external system parts (naturally apart
    from the current supplied over the contacts 9). The access in
    6
    particular to the sensitive data in the data memory 5 is thereby
    protected by means of a barrier which can only be overcome by
    means of key codes (key lock) employed within the card. In this
    manner the security can substantially be enhanced so that in the
    microprocessor of the control unit 2 new access codes can
    always be generated, for example after each successful access to
    the additional data memory. . . . The implementation of the
    additional memory 5 is possible as a serial memory with
    comparative logic and with a minimum number of connecting
    conductors 3 between the components 2 and 4.
    DX 1 at A3-A4.
    The second embodiment of the device is explained in this way:
    In the embodiment according to FIG. 2, the general
    construction of the data carrying card 1 with the integrated
    circuit components 2a, 4a interconnected by means of the
    conductor strip 3 is the same as in FIG. 1. The control unit 2a
    connected with the external contacts 9 similarly comprises a
    microprocessor and a data memory region. On the other hand,
    the component 4a contains besides the additional memory 5
    likewise a microprocessor 8 Whereby still further possibilities
    with respect to applications and security are achieved. With the
    help of a microprocessor 8 it is possible not only to secure entry
    to the data memory 5 from the control unit 2 as in FIG. 1 and
    with it the unauthorized reading of data from the memory 5, but
    also beyond this to secure the entire data exchange over the
    conductors 3, that is, to accomplish this in coded or decoded
    form. However, the double-pass entry system is only possible
    after a successful cryptographic authentication from the opposite
    pas which again is only produced, "within the card", that is,
    without participation of external system parts.
    
    Id. at A4
    .
    The third embodiment of the device is described in this way:
    The general construction in the example according to
    FIG. 3 with a control unit 2b and an additional data memory 4b
    in the form of separate integrated circuits corresponds again to
    7
    the foregoing examples. A protected entry to the additional data
    memory 5 is realized in this embodiment again in another
    manner, namely in that the microcode of the control unit 2b,
    designated 10, is secret. Of course, a well known
    microprocessor can be employed in the control unit 2b and this
    microprocessor can be based upon an “uncommon” microcode
    10 only known to the manufacturer and therefore secret. In this
    manner an unauthorized access to the data stored in the data
    carrier or correspondingly a decoding of the information
    exchanged over the conductors 3 is rendered impossible, even
    if there was success in getting through the multiple conductor
    strip 3.
    
    Id. The fourth
    embodiment differs in form from the other three in that the
    microchips in the card are all part of one assembly, a single circuit. It is
    described as containing “one individual semi-conductor component . . . on
    which the control unit . . . , the additional data memory . . . as well as further
    circuit regions are in total implemented in an integrated circuit configuration.”
    
    Id. The specification
    continues:
    In a manner similar to the example according to FIG. 3, the
    microcode l0a in the microprocessor of the control unit 2c is
    secret so that entry to the additional data memory 5 is again
    protected (“mechanical” access on the conductors between the
    regions of the integrated circuit on one and the same carrier
    would naturally however be considerably more difficult than on
    the conductors 3 Which are laid within the plastic card 1 or
    correspondingly Within a module Which consists of the two
    separate components 2 and 4).
    With the computer in the microprocessor of the control
    unit 2c there exists further an additional computer 14 in
    combination With registers 15 which are likewise positioned on
    the carrier 12. As indicated the registers 15 are likewise
    coordinated With the secret microcodes l0a of the control unit
    2c, that is, the signal exchange between the control unit 2c and
    the additional computer 14 is produced likewise on the basis of
    the secret codes. One such additional calculator 14 makes
    possible the execution of especially highly developed
    8
    cryptographic methods within the portable data carrying device,
    that is, without requiring external calculating capacity and
    thereby particular data exchanges with external system parts.
    This means that the application of the secret microcodes l0a
    remains restricted to the integrated circuits of the single carrier
    12 in the data carrying device whereby high level security
    against manipulation and unauthorized access is achieved.
    
    Id. The parties
    have exchanged competing proposed constructions of the
    claim terms cited above, but have not yet presented them to the court for
    resolution at a claim construction hearing. Instead, defendants moved for
    summary judgment, asking the court to hold that, as a matter of law, certain of
    the patent’s means-plus-function claims are indefinite, making the patent
    invalid. The basis of the motion, as will be more fully explained below, is that
    the patent specifications lack sufficient structure corresponding to the
    functions claimed in those means-plus-function claims. Without that
    corresponding structure in the specifications, those claims are, according to
    defendants, indefinite.
    DISCUSSION
    Within the above quoted specifications must reside the structure that
    performs the functions listed in the means-plus-function limitations of the
    claims. The court must be able to “determine the claimed function” and
    “identify the corresponding structure in the written description of the patent
    that performs that function.” Applied Med. Res. Corp. v. U.S. Surgical Corp.,
    
    448 F.3d 1324
    , 1332 (Fed. Cir. 2006). As the Federal Circuit has explained,
    the structure disclosed in the specification is ‘corresponding’
    structure only if the specification or prosecution history clearly
    links or associates that structure to the function recited in the
    claim. This duty to link or associate structure to function is the
    quid pro quo for the convenience of employing [means-plus-
    function claiming].
    Saffran v. Johnson & Johnson, 
    712 F.3d 549
    , 562 (Fed. Cir. 2013) (quoting B.
    Braun Med., Inc. v. Abbot Labs., 
    124 F.3d 1419
    , 1424 (Fed. Cir. 1997)). If
    that structure is missing or not sufficiently linked to the function, those claims
    invoking that function are indefinite. The Supreme Court recently explained
    9
    that patent claims must, “viewed in light of the specification and prosecution
    history, inform those skilled in the art about the scope of the invention with
    reasonable certainty.” Nautilus, Inc. v. Biosig Instruments, Inc., 
    134 S. Ct. 2120
    , 2124 (2014).4 This “mandates clarity, while recognizing that absolute
    precision is unattainable.” 
    Id. When, as
    here, the claim employs a computer or microprocessor to
    accomplish the function, the structure disclosed must be more than just a
    reference to the microprocessor or computer generally. See WMS Gaming Inc.
    v. Int’l Game Tech., 
    184 F.3d 1339
    , 1349 (Fed. Cir. 1999). Likewise, “simply
    disclosing software . . . without providing some detail about the means to
    accomplish the function is not enough.” Noah Sys. Inc. v. Intuit Inc., 
    675 F.3d 1302
    , 1312 (Fed. Cir. 2012) (citing Finisar Corp. v. DirecTV Grp., Inc., 
    523 F.3d 1323
    , 1340-41 (Fed. Cir. 2008)). What must be disclosed then is a
    specific algorithm for accomplishing the function. See, e.g., Ergo Licensing,
    LLC v. CareFusion 303, Inc., 673 F.3d 1361,1364-65 (Fed. Cir. 2012). That
    is to say the specifications must disclose “a series of instructions for the
    computer to follow,” i.e, “a step by step procedure for accomplishing a given
    result.” Typhoon Touch Techs., Inc. v. Dell, Inc., 659 F.3d 1376,1384-85 (Fed.
    Cir. 2011) (internal citations omitted). The law does not require disclosure of
    the actual coding, however. The algorithm can take the form of “any
    understandable terms including as a mathematical formula, in prose . . . or as
    a flow chart, or in any other manner that provides sufficient structure.” Finisar
    
    Corp., 523 F.3d at 1340
    (internal citations omitted). It is important to remain
    conscious of the distinction between whether a structure is disclosed and
    whether it is adequate. In this case, because a microprocessor is employed, the
    first question is whether an algorithm is disclosed at all. If one is disclosed,
    then the court must be satisfied that it is sufficient.
    Definiteness, is a question of law, Eplus, Inc. v. Lawson Software, Inc.,
    
    700 F.3d 509
    , 517 (Fed. Cir. 2012), and can be properly resolved on summary
    judgment, see, e.g., Ibormeith IP, LLC v. Mercedes-Benz USA, LLC, 
    732 F.3d 1376
    (Fed. Cir. 2013) (affirming district court’s grant of summary judgment
    for defendant on the issue of indefiniteness). Although an issue of law, the
    court is often aided by the testimony of persons of ordinary skill in the art.
    4
    The Court went on to explain that “[i]t cannot be sufficient that a court can
    ascribe some meaning to a patent’s claims; the definiteness inquiry trains on
    the understanding of a skilled artisan at the time of the patent application, not
    that of a court viewing matters post hoc.” 
    Nautilus, 134 S. Ct. at 2130
    .
    10
    See, e.g., Intel Corp. v. VIA Techs., 
    319 F.3d 1357
    , 1367 (Fed. Cir. 2003). The
    Federal Circuit has described a test for the adequacy of a disclosed structure
    as whether “a person of ordinary skill in the art would be []able to recognize
    the structure in the specification and associate it with the corresponding
    function in the claim.” Noah 
    Sys., 675 F.3d at 1312
    . The disclosed structure
    cannot be too general, however. The patentee may not claim every possible
    means of accomplishing the claimed function. That is in essence a restatement
    of the function and is known as “purely functional claiming.” See Noah 
    Sys., 675 F.3d at 1318-19
    .
    It is defendant’s burden to prove that “the specification fails to disclose
    sufficient corresponding structure” by clear and convincing evidence. TecSec,
    Inc. v. IBM Corp., 
    731 F.3d 1336
    , 1349 (Fed. Cir. 2013). We grant summary
    judgment only when the “movant shows that there is no genuine dispute as to
    any material fact and the movant is entitled to judgment as a matter of law.”
    Rule 56 of the Rules of the United States Court of Federal Claims (“RCFC”).
    We will draw all justifiable factual inferences in favor of the non-movant.
    Anderson v. Liberty Lobby, Inc., 
    477 U.S. 242
    , 255 (1986).
    Defendants argue that the ‘921 patent fails to disclose a structure for the
    means-plus-function limitations identified.5 Defendants believe that nowhere
    in the specifications is found a step-by-step set of instructions for claim 8’s
    “coding means” limitation, the “access code” limitation of claims 2 and 9, or
    the “secret microcode” limitation of claims 4 and 10. Instead, the government
    and Gemalto argue that the language of the specifications is nothing more than
    a restatement of the function, an example of the prohibited “purely functional
    claiming.” Noah 
    Sys., 675 F.3d at 1318-19
    . Plaintiff answers that the
    requirements of 35 U.S.C. § 112 are “not a high bar” and that all it must do is
    show “some structure corresponding to the means in the specification, as the
    statute states, so that one can readily ascertain what the claim means and
    comply with the particularity requirements of [§ 112], ¶ 2.” Pl.’s Opp’n to
    Defs.’ Mot. for Summ. J. 14 (quoting Biomedino, LLC v. Waters Techs. Corp.,
    
    490 F.3d 946
    , 950 (Fed. Cir. 2007)). Plaintiff provides the court with citation
    to various lines in the specifications that it believes constitute an algorithm and
    testimony from its expert to buttress its position. We turn now to the specifics
    of the claims.
    5
    Defendants state in their reply brief that, even were the court to find an
    algorithm, the specifications are inadequate as overly general. This is not,
    however, the thrust of their motion or their reply in support.
    11
    I. The Coding Means Limitation
    Claim 8 teaches a “portable data carrying device” comprised of a
    “control unit” and “data memory.” DX 1 at A7. The coding means limitation
    adds that access to the data memory by the control unit is protected by a
    “coding means which is in the carrying device and is operative to permit entry
    into the additional data memory . . . without participation of system parts
    external to the carrying device.” 
    Id. It is
    that protection that comprises the
    coding means. Plaintiff identifies what it believes are three structures, or
    algorithms, in the specifications, each corresponding to the first three
    embodiments as shown in the patent figures above. It needs only one
    embodiment to disclose a sufficiently linked structure in order for claim 8 to
    be valid. Cardiac Pacemakers, Inc. v. St. Jude Med., Inc., 
    296 F.3d 1106
    ,
    1113-14 (Fed. Cir. 2002).
    A. The First Embodiment
    For the first embodiment, corresponding to figure 1, plaintiff offers the
    following structure and algorithm:
    A control unit or microprocessor [2] programmed with
    instructions to perform the algorithm of (a) producing an access
    code signal [C], and (b) sending the access code signal [C] to the
    access code region [6], which (c) allows access to the additional
    data memory [5] upon successful decoding of information in the
    access code signal [C].
    Pl’s Opp’n 20.6 This is not a quotation from the ‘921 patent specifications
    themselves but is plaintiff’s summary of portions of the specification relating
    to the first embodiment.
    In its brief and at oral argument, plaintiff presented a paragraph from
    the specifications heavily edited with sections italicized and bolded (in its
    brief) or underlined and highlighted (at oral argument). From those it draws
    6
    Defendants point out in their briefing that plaintiff’s identification of the ‘921
    patent’s structure has not been consistent throughout the history of litigation
    regarding this patent in this case and in district court. We will consider the
    specific structures offered by plaintiff in its briefing on the motion before us.
    12
    the needed algorithm.
    This language is as follows:
    In order to prevent manipulation and unauthorized access to the
    data memory 5, entry to this memory is protected by the control
    unit 2. For example according to FIG. 1, an access code region
    6 is associated with the data memory 5 for this purpose. In this
    manner the memory is accessible only by means of a code signal
    C which is produced by the control unit 2, that is, data exchange
    D between the components 2 and 4 is only possible after
    successful decoding of the code region 6. . . . Such protected
    data exchange processes are produced within the data carrying
    device 1 with a certain degree of self-sufficiency without
    participation of external system parts . . . . The access in
    particular to the sensitive data in the data memory 5 is thereby
    protected by means of a barrier which can only be overcome by
    means of key codes (key lock) employed with the card. . . . in
    the microprocessor each of the control unit 2 new access codes
    can always be generated, for example after each successful
    access to the additional data memory. [(memories)].
    Pl.’s Opp’n 22 (quoting DX 1 at A3-A4) (omitted language is that which was
    not bolded or italicized as it appears in plaintiff’s brief). In sum, these
    specifications instruct that the control unit protects the device’s memory by
    making it “accessible only by means of a code signal” produced by the control
    unit. It then states that data exchange between the control unit and the memory
    is “possible after successful decoding of the code region.” The quoted
    language then repeats the security feature of the access code permitting the
    only access to the device’s memory and states that “new access codes can
    always be generated, for example after each successful access” to the memory.
    Defendants argue that this language does not explain how the code
    region will be decoded or what constitutes the code signal, i.e., what sort of
    code it is, by what means it is produced, and whether it is encrypted. This,
    defendants argue, is tantamount to claiming every possible type of code
    produced by any type of software or hardware and every possible method of
    decoding the code by the access code region, which they argue is prohibited
    pure-functional claiming.
    The specification states that access to the memory is protected by the
    13
    control unit and an access code region associated with the data memory, that
    a “code signal” will be produced by the control unit, and that data exchange
    between the control unit and the memory is possible only after the code region
    is decoded. The corresponding drawing, figure 1, indicates a code signal being
    transmitted between the control unit and the memory by employing a one-way
    arrow and shows a two-way arrow corresponding to the data exchange
    between the control unit and the data memory. We agree with plaintiff that a
    fair reading of the quoted specification and the drawing is that the control unit
    (a microprocessor) is “programmed with instructions to . . . produc[e] an
    access code signal” and send it “to the access code region, which . . . allows
    access to the additional data memory” if the code is correct. Pl.’s Opp’n 20.
    Defendants’ point that the specification discloses no particulars as to
    what form the code signal should take or how the access code region will
    decode itself are inapposite to the general argument on which they rely. Those
    points might be well taken if we were considering whether the disclosed
    structure was adequate. Instead, we have been asked to decide whether the
    patent discloses a structure at all, in this context an algorithm, corresponding
    to the function in claim 8.7 That is a different and more limited inquiry. We
    think it plainly does. Whether it is adequate is a question we leave for another
    day.
    B. The Second Embodiment
    The second embodiment, corresponding to figure 2, is laid out in the
    following language in the specifications:
    In the embodiment according to FIG. 2, the general
    construction of the data carrying card 1 with the integrated
    circuit components 2a, 4a interconnected by means of the
    conductor strip 3 is the same as in FIG. 1. The control unit 2a
    connected with the external contacts 9 similarly comprises a
    microprocessor and a data memory region. On the other hand,
    7
    It is important to remember what the function claimed by the coding means
    limitation of claim 8 is. It claims a means for securing data access without
    participation of parts external to the device. The use of an access code is a
    particular structure disclosed in the specifications to accomplish that function.
    Although brief and devoid of detail, the first embodiment is thus not merely
    a restatement of the function.
    14
    the component 4a contains besides the additional memory 5
    likewise a microprocessor 8 [w]hereby still further possibilities
    with respect to applications and security are achieved. With the
    help of a microprocessor 8 it is possible not only to secure entry
    to the data memory 5 from the control unit 2 as in FIG. 1 and
    with it the unauthorized reading of data from the memory 5, but
    also beyond this to secure the entire data exchange over the
    conductors 3, that is, to accomplish this in coded or decoded
    form. However, the double-pass entry system is only possible
    after a successful cryptographic authentication from the opposite
    pas[s] which again is only produced, “within the card”, that is,
    without participation of external system parts.
    DX 1 at A4. This passage adopts by reference the structure of the first
    embodiment and adds a microprocessor to the memory chip. The feature
    added by the second embodiment is the “securing [of] the data exchange over
    the conductors,” presumably by some form of encryption, though the language
    states it might be in “decoded form,” or the use of “cryptographic
    authentication” and a “double-pass entry system.” 
    Id. The figure
    2 drawing
    is similar to the first but the memory chip now includes a section (8) that
    represents the microprocessor added in this embodiment. The exchange of
    data between the two chips is represented by a bidirectional arrow.
    Plaintiff finds in the above quoted language the following set of
    instructions:
    The second microprocessor 8 is programmed to perform the
    algorithm of (a) encrypting (or encoding) data from the
    additional data memory 5 and (b) sending the encrypted (or
    encoded) data to the first control unit or microprocessor 2a. The
    microprocessor 2a is programmed to perform the algorithm of
    (c) receiving the data from the second microprocessor 8 and
    (d) decrypting (or decoding) data received.
    Pl.’s Opp’n 27.
    Defendants again argue that all this amounts to is a restatement of the
    claimed function–securing access to the data memory without parts external
    to the device–not the means for accomplishing it. They assert again that the
    second embodiment is devoid of any specifics, other than mention of a
    “double-pass entry system” or “cryptographic authentication,” about the
    15
    encryption methods to be employed. This, they believe, is evidence of a
    specification empty of structure and therefore indefinite.
    In response to defendans’ argument that the specifications are fatally
    devoid of structure, plaintiff offered the testimony of its expert, Dr. Steward,
    to provide two ways in which the second embodiment might achieve its
    function:
    In a first manner of operation, data between the control unit and
    the additional data memory is exchanged in encrypted or
    encoded form. In this first manner of operation, one of ordinary
    skill in the art would understand that a first control unit or
    microprocessor is programmed with instructions to encrypt
    and/or decrypt (or encode and/or decode) data, and a second
    microprocessor is programmed with instructions to encrypt
    and/or decrypt (or encode and/or decode) that data.
    In a second manner of operation, the control unit can operate in
    a manner similar to the Figure 1 embodiment described above
    and be used to produce an access code. With this second manner
    of operation, one of ordinary skill in the art would understand
    that the control unit or first microprocessor is programmed with
    instructions to produce an access code, and the second
    microprocessor operates as the access code region.
    PX E ¶¶ 55, 58. As to defendants’ argument that the disclosure of encryption
    without any specifics is insufficient, Dr. Stewart opined that
    [o]ne of ordinary skill in the art would appreciate that many
    different known types of encryption or encoding algorithms
    could be used in accordance with the ‘921 Patent for secure data
    exchange between the controller and the additional memory.
    Many encryption or encoding algorithms were well known and
    used as of 1988, including DES encryption, RSA encryption,
    and Diffie-Hellman encryption.
    
    Id. ¶ 57.
    This testimony, plaintiff argues, is enough to meet the Federal
    Circuit’s test of whether a person of ordinary skill in the art could recognize
    the claimed structure and associate it with the claimed function.
    As to the limited question of whether the second embodiment discloses
    16
    any structure at all, here an algorithm, we answer in the affirmative. In light
    of the incorporation of the first embodiment, and some confusing surplusage
    aside, it is clear that the second embodiment adds a microprocessor to the data
    memory, which is programmed to encrypt the data exchanged between the
    control unit and the memory. This is not, as defendants urge, the claiming of
    all possible ways to secure such a data exchange. It might be overly broad or
    insufficiently detailed, and Dr. Stewart’s opinion might be countervailed by
    other testimony offered by defendants as to why it is insufficient, but we reject
    the notion that it is a mere restatement of the claimed function and the
    associated argument that it is not an algorithm at all. The adequacy of the
    disclosed algorithm will be judged after a hearing on the issue.
    C. The Third Embodiment
    The third structure offered by plaintiff, corresponding to figure 3,
    “includes a control unit or microprocessor 2b that is programmed to perform
    the algorithm of (a) retrieving data from the additional data memory 5 and (b)
    the decrypting or decoding the data received using a secret microcode 10 (i.e.,
    secret or uncommon instructions or codes).” Pl.’s Opp’n 33. The
    corresponding language cited by plaintiff from the specification is as follows:
    The general construction in the example according to
    FIG. 3 with a control unit 2b and an additional data memory 4b
    in the form of separate integrated circuits corresponds again to
    the foregoing examples. A protected entry to the additional data
    memory 5 is realized in this embodiment again in another
    manner, namely in that the microcode of the control unit 2b,
    designated 10, is secret. Of course, a well known
    microprocessor can be employed in the control unit 2b and this
    microprocessor can be based upon an “uncommon” microcode
    10 only known to the manufacturer and therefore secret. In this
    manner an unauthorized access to the data stored in the data
    carrier or correspondingly a decoding of the information
    exchanged over the conductors 3 is rendered impossible, even
    if there was success in getting through the multiple conductor
    strip 3. . . .
    In a manner similar to the example according to FIG. 3, the
    microcode 10a in the microprocessor of the control unit 2c is
    secret so that entry to the additional data memory 5 is again
    protected . . . .
    17
    DX 1 at A4. The element added by embodiment three is the use of a secret
    microcode. The components of the device in figure 3 are arrayed, as in the
    first two embodiments, with a control unit and a separate data memory chip,
    which in the second and third embodiments also includes a microprocessor.
    Access to the memory is protected in this embodiment by use of a secret
    microcode, a code “only known to the manufacturer.” This, according to the
    specification, renders “decoding of the information exchanged over the
    conductors” impossible.
    The details of how the device employs the secret microcode are not
    disclosed other than the statement that, without the microcode, “a decoding of
    the information exchanged over the conductors . . . is rendered impossible.”
    Whether the microcode is used like an access code or whether it is used like
    a cipher to encrypt and decrypt the data exchange, as plaintiff posits, is also
    not specifically disclosed. The specification hints at both: “in this manner an
    unauthorized access to the data stored in the [memory] or corresponding a
    decoding of the information exchanged over the conductor 3 is rendered
    impossible.” 
    Id. Defendants argue
    that this embodiment is wholly devoid of instructions
    that the microchips will be programmed to follow and thus is not a structure.
    We agree to this extent: it is not distinct enough from the previous
    embodiments to be considered an algorithm of its own.
    Although arrayed in a similar way to the first two embodiments and
    employing the same physical makeup as the second–two microprocessors, one
    in the control unit and one in the data memory–the third embodiment’s
    specifications add too little to the previous embodiments to stand on their own.
    These specifications instruct that the data is protected in this embodiment “in
    another manner, namely in that the microcode of the control unit . . . is secret”
    and thus “unauthorized access to the data stored in the data carrier or
    correspondingly a decoding of the information exchanged over the conductors
    3 is rendered impossible.” 
    Id. Figure 3
    adds nothing to the written
    specifications, showing only the two chips and item 10, which is simply the
    existence of a secret microcode in the control unit. Whether the data is meant
    to be protected by a secret access code or, as plaintiff’s argues, by an
    encryption employing a secret cipher, the disclosure of the fact that the device
    employs an uncommon code, one that is secret, is not an algorithm. It does not
    change any of the steps in the instructions for retrieving data from the data
    memory. Simply adding the word “secret” to the structure does not make it
    different structure. We view the third embodiment merely as a restatement of
    18
    the first two with the word “secret” added.
    Unlike the first and second embodiments, in which at least a minimal
    set of instructions was disclosed, the third embodiment raises only
    possibilities. It adds to the first two the use of a secret code but does not
    disclose any set of steps or instructions for the device to follow. That is
    insufficient.
    Even if we viewed the addition of a “secret microcode” as adding
    something meaningful to the third embodiment, it would still be insufficient
    to constitute an algorithm. In Triton Tech of Texas, LLC v. Nintendo of
    America, Inc., No. 2013-1476, 
    2014 WL 2619546
    (Fed. Cir. June 13, 2014),
    the Federal Circuit recently held, in rejecting a means-plus-function claim, that
    “merely using the term ‘numerical integration’ does not disclose an algorithm
    . . . but is instead an entire class of different possible algorithms used to
    perform integration.” 
    Id. at *3.
    Thus the claim at issue did not “limit the
    scope of the claim to the ‘corresponding structure, material, or acts’ that
    perform the function, as required by section 112.” 
    Id. The same
    is true of the
    purported algorithm offered by plaintiff for the third embodiment.
    D. The Fourth Embodiment
    The fourth and final offered structure, corresponding to figure 4,
    “includes a single integrated circuit 12 with a control unit or microprocessor
    2c programmed to perform the algorithm of (a) retrieving data from the
    additional data memory 5 and (b) decrypting or decoding the data received
    from the additional data memory 5 using a secret microcode 10a.” Pl.’s Opp’n
    36. The following is the corresponding language from the specification:
    In contrast to the above described embodiments, the data
    carrying device or correspondingly the plastic card 1 according
    to FIG. 4 contains one individual semi-conductor component 12,
    on which the control unit 2c, the additional data memory 5 as
    well as further circuit regions are in total implemented in an
    integrated circuit configuration. In a manner similar to the
    example according to FIG. 3, the microcode 10a in the
    microprocessor of the control unit 2c is secret so that entry to
    the additional data memory 5 is again protected (“mechanical”
    access on the conductors between the regions of the integrated
    circuit on one and the same carrier would naturally however be
    considerably more difficult than on the conductors 3 [w]hich are
    19
    laid within the plastic card 1 or correspondingly [w]ithin a
    module [w]hich consists of the two separate components 2 and
    4).
    With the computer in the microprocessor of the control
    unit 2c there exists further an additional computer 14 in
    combination [w]ith registers 15 which are likewise positioned
    on the carrier 12. As indicated the registers 15 are likewise
    coordinated [w]ith the secret microcodes 10a of the control unit
    2c, that is, the signal exchange between the control unit 2c and
    the additional computer 14 is produced likewise on the basis of
    the secret codes. One such additional calculator 14 makes
    possible the execution of especially highly developed
    cryptographic methods within the portable data carrying device,
    that is, without requiring external calculating capacity and
    thereby particular data exchanges with external system parts.
    This means that the application of the secret microcodes 10a
    remains restricted to the integrated circuits of the single carrier
    12 in the data carrying device whereby high level security
    against manipulation and unauthorized access is achieved.
    DX 1 at A4.
    In its initial response and opposition to defendants’ motion, plaintiff
    claimed the fourth embodiment as a separate algorithm meeting the
    definiteness requirement. Later in the briefing, in response to specific
    questions posed by the court for supplemental briefing, plaintiff disclaimed the
    fourth embodiment as a separate algorithm and included it as a further example
    of the algorithm it propounded for the third embodiment.
    The difference in the fourth embodiment is that all of the chips are
    arrayed as one single circuit, which, according to the specifications, provides
    additional security. The novelty of this embodiment is not the programming
    of the processors but rather their integration into one circuit, i.e., the data
    exchange is further secured by the physical location of the several processors
    in one circuit. It is thus not a separate algorithm that could meet the
    definiteness requirement for claim 8 and plaintiff has correctly disclaimed it
    as such.
    II. The Dependent Claims: The Access Code Limitation and The Secret
    Microcode Limitation
    20
    Also at issue are two limitations found in four dependent claims.
    Dependant claims 2 and 9 limit the “coding means” of claim 8 by adding the
    following: “the code means includes means within the control unit (2) for
    producing a code signal (C) for entry to the data memory through the access
    code region.” DX 1 at A4. Claim 9 is substantially similar: “coding means
    includes means within the control unit for producing a code signal for entry to
    the data memory through the access code region.” 
    Id. at A7.
    Dependent
    claims 4 and 10 limit the “coding means” of claim 8 through the additional
    language teaching that the “coding means” includes “means within the control
    unit (2b) for producing a secret microcode for communications between the
    control unit and the data memory.” DX 1 at A4 (claim 4) (claim 10 uses
    almost identical language).
    Defendants argue that, irrespective of whether there is any structure
    disclosed in the specifications for independent claim 8, no additional structure
    corresponding to these dependent means-plus-function limitations is disclosed.
    Defendants’ point is that nowhere in the specification are steps or instructions
    disclosed for the microprocessor to follow in choosing, producing, or sending
    an access code signal. Thus the language offered by plaintiff is nothing more
    than a restatement of the function, not an algorithm for achieving the claimed
    function, argue defendants. Likewise, for the secret microcode limitation,
    defendants argue that nothing in the patent specifications discloses how the
    microcode will be used for encrypting or decrypting the data stored in the
    memory as is claimed in claims 4 and 9. Put another way, although claim 8
    may disclose an algorithm for the general operation of the device, no separate
    instructions are disclosed for the “access code” limitation or “secret
    microcode” limitation.
    A. The Access Code Limitation
    For the access code limitation, plaintiff responds that the algorithm,
    limited to the first two embodiments, is “(a) producing an access code signal,
    and (b) sending the access code signal to the access code region, which allows
    access to the additional data memory upon successful decoding of information
    in the access code signal.” Pl.’s Opp’n 38. Plaintiff argues that this is more
    than a restatement of the function because it includes the steps of sending the
    code to the access code region and the decoding of the code by the access code
    region.
    There is no dispute that the function of the access code limitation is the
    production of an access code by the control unit, which will be used by the
    21
    data memory to grant access to it. The programming of the device includes the
    use of a pass code, produced by the control unit, and then sent to and read by
    the memory chip to grant access to the data in the memory chip. The problem
    for plaintiff is that the function and the offered algorithm amount to the same
    thing. Plaintiff is unable to cite to any additional lines in the specification that
    answer any of the questions posed by defendants in their motion for summary
    judgment: how will the device choose, produce, or send the access code. The
    patent simply does not disclose any information other than the fact that an
    access code will be produced and used, which is the function claimed by the
    access code limitation. The structure provided in the specifications for a
    means-plus-function limitation cannot be a simple restatement of the function;
    this is prohibited as purely functional claiming. See Blackboard Inc. v.
    Desire2Learn, Inc., 
    574 F.3d 1371
    , 1384 (Fed. Cir. 2009). The access code
    limitation of claims 2 and 9 is indefinite because the patent specifications do
    not disclose an algorithm for achieving the claimed function of the access code
    limitation.
    B. The Secret Microcode Limitation
    For the secret microcode limitation, plaintiff contends that the following
    algorithm is present in the specifications for the third and fourth embodiments:
    “(a) retrieving data from the additional data memory and (b) decrypting (or
    decoding) data received from the additional data memory with or using a
    secret microcode.” Pl.’s Opp’n 39. Plaintiff argues that this is something
    more than a restatement of the function of producing a secret microcode
    because it includes the steps of retrieving the data from the memory and then
    decoding or decrypting it using the code.
    The function of the limitation is producing a secret microcode to be
    used for the exchange of data between the control unit and the memory chip.
    As we noted in our analysis regarding the third embodiment, the patent does
    not disclose how the microcode will be used; it hints at the use of a pass code
    or cipher for decryption.8 As quoted above, plaintiff’s proposed algorithm
    8
    “[A] well known microprocessor can be employed in the control unit [] and
    . . . can be based on an ‘uncommon’ microcode [] only known to the
    manufacturer . . . . In this manner an unauthorized access to the data stored in
    the data carrier or correspondingly a decoding of the information exchange
    over the conductors [] is rendered impossible . . . .” DX 1 at A4 (quote from
    specifications for the third embodiment).
    22
    would clear that ambiguity by offering that the secret microcode is used for
    decrypting data received from the memory chip. Plaintiff’s algorithim also
    adds to the limitation the steps of retrieving the data from the memory and then
    decoding or decrypting it.
    Setting aside the question of whether the specifications offer even that
    minimal level of clarity,9 beyond producing a secret microcode that will
    protect from unauthorized access to the memory or unauthorized decryption
    of it, nothing further is disclosed by the specifications. The secret microcode
    limitation claims a means for producing and utilizing a secret microcode. The
    specifications add nothing other than that such a code will be produced and
    utilized by the device for preventing unauthorized access or decryption. This
    is merely a restatement of the function and thus cannot constitute the needed
    structure. Each function of a claimed means must have a corresponding
    structure, here an algorithm, in the specifications.10 See Noah 
    Sys., 675 F.3d at 1313-14
    (The court found that the limitation in question contained two
    functions and that the cited specifications did not address the second function.
    Thus, the limitation was held to be indefinite.). Because no structure is
    disclosed, the secret microcode limitation is indefinite.
    C. The Katz Exception Does Not Apply
    For the first time, in its supplemental brief, plaintiff argues that the
    access code and secret microcode limitations do not require separate
    algorithms because the functions associated with these limitations are
    inherently performed by a computer processor or microprocessor. Plaintiff
    relies on the Federal Circuit’s decision in In re Katz Interactive Call
    Processing Patent Litigation, 
    639 F.3d 1303
    , 1316 (Fed. Cir. 2011). We do
    not think Katz controls the outcome here.
    9
    Were we to agree with plaintiff that its algorithm was sufficient, we would
    still be faced with the question of whether it was actually disclosed in the
    specifications. We take no position on that question.
    10
    Plaintiff also makes the novel claim in its supplemental brief that neither the
    access code nor the secret microcode limitations require separate algorithms
    because they “serve to limit the structures and algorithms for the coding means
    of the independent claims.” Pl.’s Supp. Br. 6. Plaintiff does not cite any
    authority for that proposition, and we are unable to find any.
    23
    In Katz, the Federal Circuit reversed the district court’s holding that the
    patent in suit was devoid of an algorithm for general computer functions such
    as “processing, receiving and storing” data. 
    Id. (internal quotations
    omitted).
    The court held that the patentee was only claiming the general purpose
    functions of a computer and thus no disclosure of an algorithm was required.
    The disclosure of a computer processor itself was sufficient structure. 
    Id. A specific
    algorithm for a processor to achieve the claimed function is thus only
    required when the claim involves “specific functions that would need to be
    implemented by programming a general purpose computer to convert it into
    a special purpose computer capable of performing those specified functions.”
    
    Id. (citing Aristocrat
    Techs. PTY Ltd. v. Int’l Game Tech., 
    521 F.3d 1328
    ,
    1333-34 (Fed. Cir. 2008).
    The function of producing an access code by one chip and then the
    utilization of it by another chip to grant access to its stored data goes beyond
    storing or retrieving data. It is the securing of data from unauthorized access
    that is claimed in this case. The patentee clearly intends for the chips to be
    used in a specific way for a special function, unlike in Katz.
    Likewise, the production and use of a secret microcode to limit access
    or for decryption goes beyond a general purpose function of a processor. The
    use of the term “secret” is enough to distinguish from the generic use of a
    processor. The secret microcode limitation requires an algorithm for achieving
    that function. Katz does not save claims 2, 4, 9, and 10 from the definiteness
    requirement of 35 U.S.C. § 112 paragraph 2.
    CONCLUSION
    We find that an algorithm for the coding means limitation of claim 8 is
    disclosed in the first and second embodiments of the specifications. Whether
    these algorithms are sufficient to meet the definiteness requirement will be
    addressed after the court has heard testimony from persons of ordinary skill in
    the art. The third and fourth embodiments do not present an algorithm for
    carrying out the coding means limitation of claim 8. We also find that no
    algorithm is disclosed for the access code and secret microcode limitations of
    claims 2, 4, 9, and 10 because the specifications merely recite the claimed
    function. Those claims are therefore indefinite. Accordingly, defendants’
    motion for summary judgment is granted in part and denied in part. The court
    will convene a status conference to discuss further proceedings.
    24
    s/ Eric G. Bruggink
    ERIC G. BRUGGINK
    Judge
    25