E-Pass Technologies v. Microsoft Corporation

NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit 2006-1604 E-PASS TECHNOLOGIES, INC., Plaintiff-Appellant, v. MICROSOFT CORPORATION, Defendant-Appellee, and COMPAQ COMPUTER CORPORATION (now known as Hewlett-Packard Company), Defendant-Appellee. Stephen N. Weiss, Moses & Singer LLP, of New York, New York, argued for plaintiff-appellant. With him on the brief were Gregory J. Fleesler, Michael J. Pospis, and Amanda J. Schaffer. George F. Pappas, Covington & Burling LLP, of Washington, DC, argued for defendant-appellee, Microsoft Corporation. With him on the brief were Richard L. Rainey and Andrea G. Reister. Of counsel, on the brief was Isabella E. Fu, Microsoft Corporation, of Redmond, Washington. Stanley J. Panikowski, DLA Piper US LLP, of San Diego, California, argued for defendant-appellee, Hewlett-Packard Company. With him on the brief were John Allcock, Edward H. Sikorski, and Brian M. Fogarty. Appealed from: United States District Court for the Southern District of Texas Judge Kenneth M. Hoyt NOTE: This disposition is nonprecedential. United States Court of Appeals for the Federal Circuit 2006-1604 E-PASS TECHNOLOGIES, INC., Plaintiff-Appellant, v. MICROSOFT CORPORATION, Defendant- Appellee, and COMPAQ COMPUTER CORPORATION (now known as Hewlett-Packard Company), Defendant-Appellee. ___________________________ DECIDED: May 2, 2007 ___________________________ Before LOURIE, SCHALL, and BRYSON, Circuit Judges. BRYSON, Circuit Judge. E-Pass brought this patent infringement action in the United States District Court for the Southern District of Texas, No. 4:02-00439, alleging that both Microsoft Corporation and Hewlett-Packard Company are liable for infringement of U.S. Patent No. 5,276,311 (“the ’311 patent”). The district court granted summary judgment to both defendants, finding that neither defendant directly or indirectly infringed the ’311 patent. E-Pass appeals, challenging the district court’s claim construction. We affirm. I The ’311 patent is entitled “Method and Device for Simplifying the Use of a Plurality of Credit Cards, or the Like.” It is directed to providing a method and device for storing information from various sources, such as credit cards, on one multi-function card. According to the specification, the invention “provid[es] the advantage of considerable simplification for the individual user and enormous advantages as regards safety against forgery and, generally, abusive use.” ’311 patent, col. 2, ll. 38-41. Claim 1 of the patent reads as follows: A method for enabling a user of an electronic multi-function card to select data from a plurality of data sources such as credit cards, check cards, customer cards, identity cards, documents, keys, access information and master keys comprising the steps of: transferring a data set from each of the plurality of data sources to the multi-function card; storing said transferred data set from each of the plurality of data sources in the multi-function card; assigning a secret code to activate the multi-function card; entering said secret code into the multi-function card to activate the same; selecting with said activated multi-function card a select one of said data sets; and displaying on the multi-function card in at least one predetermined display area the data of said selected data set. Claim 19, the only claim now asserted, is dependent on claim 1 and further requires the step of “storing a personal signature of the user on a central computer of the party issuing the data source and comparing the personal signature produced by the user with said stored personal signature to verify use of said card.” 2006-1604 2 E-Pass asserts infringement of claim 19 by certain Personal Digital Assistants (“PDAs”) sold by Hewlett-Packard as well as the Microsoft software that allegedly enables the PDA to perform the method of claim 19. Specifically, E-Pass asserts that claim 19 is infringed when a PDA is used to access data in an account on a central server that verifies a personal signature for entry into the user’s account. E-Pass alleges that the PDA satisfies the “card” limitation in the claims. E-Pass has made the same assertion in other cases that have come before this court. E-Pass Techs. v. 3Com, 473 F.3d 1213 (Fed. Cir. 2007); E-Pass Techs. v. 3Com, 343 F.3d 1364 (Fed. Cir. 2003). The district court granted summary judgment of noninfringement to Hewlett- Packard and Microsoft based on its construction of one of the claim limitations. Claim 19 requires a comparison of the personal signature of the user with a remotely stored signature to “verify use of said card.” After examining the language of the claims and the specification, the district court construed that requirement to mean that the signatures must be compared for the purpose of verifying that it is the user’s card that is being used when the personal data is being accessed. The court further found that the third-party servers that interact with Hewlett-Packard’s PDAs when the accused actions are being performed do not differentiate among the devices that are being used to access the data. The servers verify only the user’s identity, not whether the user is accessing the data on a PDA, a laptop, or some other device. Accordingly, the district court held that E-Pass could not show infringement of claim 19 by either Hewlett- Packard or Microsoft. 2006-1604 3 II On appeal, E-Pass argues that the district court misconstrued the requirements of claim 19 when it found that the claim required the entity that compares signatures to verify the use of the card. Instead, according to E-Pass, the signature comparison is meant to verify the identity of the user, and the “verify use of said card” limitation of claim 19 should be treated as completely independent of whether the card is being used. The plain language of the claim supports the district court’s construction, not E- Pass’s. The phrase “verify use of said card” indicates that the signature comparison is performed so as to verify that the card is being used. Sometimes claim construction “involves little more than the application of the widely accepted meaning of commonly understood words.” Phillips v. AWH Corp., 415 F.3d 1303, 1314 (Fed. Cir. 2005). This is such a case. E-Pass argues that the signature comparison is meant to verify “the user’s use of the [card],” and not the use of the card itself. In other words, E-Pass argues that it is the use to which the card is being put that is verified in claim 19, and that since the function of the card is to display the user’s data at the request of the user, verification of that use involves verification of the user’s identity. The problem with that argument is that to “verify use of said card” does not mean the same thing as to verify the identity of the user. To hold otherwise would be to rewrite the claim. E-Pass also argues that verification through signatures personal to the user indicates that it is the identity of the user that is verified in the method step of claim 19. While it is true that verification of personal signatures effectively verifies the user’s 2006-1604 4 identity, that does not mean the claim does not require the use of the card to be verified as well. Indeed, both the patent claims and the specification indicate that claim 19 includes the card verification requirement. The other claims of the patent indicate that verifying “use of the card” means something other than simply verifying signatures, which is all claim 19 would require under E-Pass’s construction. Claims 2, 3, 7, 8, and 9 discuss “verifying the personal signature[s]” or “verifying said stored signature” by comparing a live signature with a stored signature. In contrast, claim 10 refers to “verifying proper use of said card” by comparing signatures while claim 19 refers to “verify[ing] use of said card.” The difference in text between claims 2, 3, 7, 8, and 9 on the one hand, and claims 10 and 19 on the other, suggests that claims 10 and 19 should be construed to require verification that the card is being used. The only difference between those two groups of claims appears to be that the first group of claims requires the stored signature to be stored on the card. Accordingly, verifying the signatures in those claims necessarily verifies the use of the card and the identity of the user simultaneously; without the card there would be no stored signature against which the live signature could be compared. Claims 10 and 19, on the other hand, do not require the signature to be stored on the card. Verification of signatures alone would not necessarily verify the use and presence of the card, as required by those claims, although it would still verify the user’s identity. 1 Accordingly, a terminology change would be required if and only if the patentee wanted 1 Claim 10 reads as follows: “The method of claim 1, including the further step of verifying proper use of said card by comparing the personal signature of the user with a stored signature.” Claim 10 is indifferent regarding where the signature is stored; it therefore appears to include the embodiment recited in claim 19, in which the signature is stored with a third party.  2006-1604 5 to ensure that the use of the card was verified. Claims 10 and 19 contain such a terminology change, confirming the district court’s construction of claim 19. The specification provides further evidence that the language of claim 19 requires verification that the card itself is used, and not just verification of the identity of the user. As the district court noted, every embodiment in the specification requires that the card be used to complete the desired transaction. The patent describes three embodiments related to signatures: one in which the signature is stored on the card and verified by hand; one in which the signature is stored on a remote server and electronically or mechanically verified; and one in which the signature is stored on the card and electronically or mechanically verified. ’311 patent, col. 5, ll. 11-14; col. 9, ll. 26-31; col. 9, ll. 48-50. In the first and third embodiments, the card must be present at the time of use to enable the signature comparison, and verification of the signatures necessarily verifies both the user and the use of the card. The description of the second embodiment, the embodiment captured by claim 19, also requires the card to be present before the signatures can be verified. As described in the specification, the card itself, in conjunction with a customized point-of-sale terminal, is used to “call up” the central database and retrieve the signature. Since the card is needed to retrieve the signature, comparing the signatures will verify both the use of the card and the identity of the user. Additionally, in the description of the second embodiment—the only embodiment in which it might be possible to verify signatures without verifying the use of the card— the patent specifically indicates that the described process “verify[s] the inserted card.” ’311 patent, col. 9, ll. 30-31. Again, the card is verified in that case because the only 2006-1604 6 way to retrieve the signature stored by the third party is by using the card in the customized point-of-sale terminal. That singular description bolsters the pattern evidenced by the differences between those claims that “verify the card” and those that “verify the signatures.” Throughout the patent, whenever the signature is not necessarily stored on the card the patent specifically indicates that the claimed method verifies the use of the card. A requirement that the presence of the card be verified also makes sense in the context of the specification’s description of the invention. One of the objects of the invention is “safety against forgery and, generally, abusive use.” ’311 patent, col. 2, ll. 38-41. Ensuring that the card is physically present and being used to access the user’s data provides an extra measure of fraud prevention. Since both the claims and the specification would lead a person of skill in the art to conclude that the language of claim 19 requires the party comparing the signatures to verify the use of the card itself, and not just the identity of the user, we hold that the district court correctly construed the disputed claim term. We therefore affirm the court’s judgment. 2006-1604 7