United States Court of Appeals
for the Federal Circuit
______________________
PERSONAL WEB TECHNOLOGIES, LLC,
Appellant
v.
APPLE, INC.,
Appellee
______________________
2018-1599
______________________
Appeal from the United States Patent and Trademark
Office, Patent Trial and Appeal Board in No. IPR2013-
00596.
______________________
Decided: March 8, 2019
______________________
LAWRENCE MILTON HADLEY, Glaser Weil Fink Howard
Avchen & Shapiro LLP, Los Angeles, CA, argued for appel-
lant. Also represented by JOEL LANCE THOLLANDER,
McKool Smith, PC, Austin, TX.
MICHAEL JAY, DLA Piper LLP (US), Los Angeles, CA,
argued for appellee. Also represented by NANDAN
PADMANABHAN.
______________________
Before MOORE, TARANTO, and CHEN, Circuit Judges.
2 PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC.
CHEN, Circuit Judge.
PersonalWeb Technologies, LLC (PersonalWeb) ap-
peals the final written decision of the Patent Trial and Ap-
peal Board (Board) in an inter partes review (IPR)
proceeding concluding that Apple demonstrated by a pre-
ponderance of the evidence that claims 24, 32, 81, 82, and
86 of U.S. Patent No. 7,802,310 (the ’310 patent) are un-
patentable as obvious in view of two prior art references—
U.S. Patent No. 5,649,196 (Woodhill) and U.S. Patent No.
7,359,881 (Stefik). Because one of the Board’s key under-
lying fact findings as to Woodhill’s disclosure is not sup-
ported by substantial evidence, we reverse.
BACKGROUND
A. The ’310 Patent
The ’310 patent explains that in conventional data pro-
cessing systems, data items such as files are typically iden-
tified by their user-created alphanumeric name and/or
pathname or location. J.A. 69 at 1:53–2:5. Certain prob-
lems arise, however, using traditional naming conventions.
For example, if one device transfers a data item to a second
device using just the name associated with the data item,
it is possible that the data item already exists on the second
device, and a duplicate of the data item will be created.
J.A. 69–70 at 2:63–3:9. The ’310 patent contemplates a
method and apparatus for resolving this and other con-
cerns by creating a substantially unique identifier for each
data item in the data processing system that is independ-
ent of the data item’s user-defined name, location, etc., but
rather is dependent on only the content of the data item
itself. J.A. 70 at 3:52–58. The identifier for a particular
data item is created by applying a cryptographic hash func-
tion to the data item. J.A. 74 at 12:21–26. The output of
the hash function is the content-based identifier or “True
Name,” which is “virtually guaranteed” to be unique to the
data item. Id. The system uses the content-based identi-
fier alone to determine whether a particular data item is
PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC. 3
present on the system. J.A. 70 at 3:59–62. When the data
item’s contents are changed, the content-based identifier of
the data item also changes. See J.A. 86 at 35:55–63.
The ’310 patent explains that content-based identifiers
can be used for various purposes in data processing sys-
tems, including, for example, to identify data items in a “li-
cense table.” J.A. 74 at 11:33–43. The patent describes a
license table as a two-field database containing a list of con-
tent-based identifiers and, for each content-based identi-
fier, a list of users authorized to access the data item
associated with the content-based identifier. Id.
Claim 24 is illustrative:
24. A computer-implemented method implemented
at least in part by hardware comprising one or
more processors, the method comprising:
(a) using a processor, receiving at a first computer
from a second computer, a request regarding a par-
ticular data item, said request including at least a
content-dependent name for the particular data
item, the content-dependent name being based, at
least in part, on at least a function of the data in
the particular data item, wherein the data used by
the function to determine the content-dependent
name comprises at least some of the contents of the
particular data item, wherein the function that was
used comprises a message digest function or a hash
function, and wherein two identical data items will
have the same content-dependent name; and
(b) in response to said request:
(i) causing the content-dependent name of
the particular data item to be compared to
a plurality of values;
(ii) hardware in combination with software
determining whether or not access to the
4 PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC.
particular data item is unauthorized based
on whether the content-dependent name of
the particular data item corresponds to at
least one of said plurality of values, and
(iii) based on said determining in step (ii),
not allowing the particular data item to be
provided to or accessed by the second com-
puter if it is determined that access to the
particular data item is not authorized.
J.A. 88.
B. Initial IPR Proceedings
In September 2013, Apple filed a petition requesting an
IPR of claims 24, 32, 70 1, 81, 82, and 86 of the ’310 patent,
asserting multiple grounds of unpatentability. Personal-
Web filed a preliminary patent owner response, and, in
March 2014, the Board instituted review on the ground
that the petition raised a reasonable likelihood that the
challenged claims were unpatentable under 35 U.S.C.
§ 103(a) for obviousness over Woodhill in view of Stefik. Af-
ter PersonalWeb filed a patent owner response and Apple
filed a reply, the Board held a hearing. In March 2015, the
Board issued a final written decision concluding that Apple
had demonstrated by a preponderance of the evidence that
the challenged claims were unpatentable under § 103(a)
over Woodhill in view of Stefik.
C. Woodhill
Woodhill discloses a distributed management system
for backing up and restoring data files. See J.A. 1674 at
1:11–17. In Woodhill, files are apportioned into 1 MB 2
1 Though part of the IPR process, claim 70 is not be-
fore us on appeal.
2 The final binary object in the file may be less than
1 MB in size.
PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC. 5
“binary objects,” which in some instances are apportioned
even further into 1 KB 3 “granules.” J.A. 1675 at 4:21–30,
J.A. 1677 at 7:47–59, J.A. 1680–81 at 14:65–15:4. Woodhill
explains that the system uses “Binary Object Identifiers,”
or for granules, “contents identifiers,” to determine
whether a binary object or granule has changed from one
version of the file to the next. J.A. 1678 at 9:9–27, J.A.
1682 at 17:50–64. Only those binary objects or granules
whose content has changed need to be backed up, thereby
reducing the amount of data that needs to be transmitted
during a backup procedure. Id. at 9:6–9, 9:23–27, J.A.
1680–81 at 14:53–15:8. Woodhill explains that every new
or changed binary object is backed up onto a remote backup
file server, and that a compressed copy of every binary ob-
ject that the system would need in order to restore a cur-
rent version of a file to a previous version of the file is
stored somewhere on the local area network other than on
the local computer. J.A. 1678 at 9:30–44.
Woodhill discloses a File Database containing three
levels of records. J.A. 1675 at 3:45–54. At the highest level,
File Identification Records are stored for each file that has
been backed up by the system. Id. at 3:54–56. Each File
Identification Record includes, inter alia, the file’s name
and location. Id. at 3:57–63. At the second level, each File
Identification Record is associated with one or more
Backup Instance Records, each of which contains infor-
mation about a backup version of the file. Id. at 3:64–4:2.
Each Backup Instance Record includes, inter alia, a link to
the File Identification Record. Id. at 4:2–11. At the third
level, each Backup Instance Record is associated with one
or more Binary Object Identification Records (depending
on the size of the file). Id. at 4:12–47. A Binary Object
Identification Record is created for each binary object of the
3 The final granule in the binary object may be less
than 1 KB in size.
6 PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC.
backup file version. Id. at 4:30–34. Each Binary Object
Identification Record includes, inter alia, a link to the
Backup Instance Record, the Binary Object Size, the Bi-
nary Object Offset, and the Binary Object Hash. Id. at
4:35–43.
The Binary Object Size and the Binary Object Hash,
together with other information not relevant to this appeal,
make up the “Binary Object Identifier” for that version of
the binary object. Id. at 4:43–47. The Binary Object Iden-
tifier is unique to a particular binary object because of the
Binary Object Hash field, which is created by applying a
cryptographic hash algorithm to contents of the binary ob-
ject. J.A. 1677 at 8:22–35. Woodhill explains that the crit-
ical feature of the Binary Object Identifier is that, because
it is based on the contents of the binary object, the identi-
fier changes when the contents of the binary object change.
Id. at 8:58–62. Duplicate binary objects can therefore be
recognized from their identical Binary Object Identifiers
even if they reside on different types of computers in the
same network. Id. at 8:62–65.
D. Stefik
Stefik discloses an authentication system for control-
ling access to digital works. J.A. 1632 at 3:58–4:12. Each
digital work’s unique identifier and associated usage
rights, among other information, are stored in a repository.
J.A. 1635 at 9:15–61. A user accesses a digital work over a
network using a “digital ticket,” which entitles the ticket
holder to exercise usage rights associated with the work
because, for example, the user has paid for access. J.A.
1632 at 3:59–64.
E. First Federal Circuit Appeal
PersonalWeb appealed the 2015 Board unpatentability
decision to our court, and on February 14, 2017, we issued
an opinion affirming the Board’s claim construction and va-
cating and remanding the Board’s obviousness finding for
PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC. 7
further consideration. See Pers. Web Techs., LLC v. Apple,
Inc., 848 F.3d 987 (Fed. Cir. 2017) (PersonalWeb I). We
noted that none of the parties disagreed that Woodhill’s Bi-
nary Object Identifier corresponded to the claimed content-
based identifier4 for a data item of the ’310 patent. Id. at
991. However, we determined that the Board’s analysis
with respect to obviousness—including both whether
Woodhill and Stefik disclosed all of the elements recited in
the challenged claims and whether a skilled artisan would
have been motivated to combine them in the manner re-
cited in the ’310 patent—was inadequate. Id. at 993.
The main claim element in dispute in that appeal, as
in this appeal, was claim 24’s “causing the content-depend-
ent name of the particular data item to be compared to a
plurality of values.” Id. The Board had cited only Stefik as
satisfying this element, but Apple made clear in its petition
that it relied on only Woodhill for this element. Id. We
disagreed with the Board’s use of Stefik and instructed the
Board to evaluate whether column 17 of Woodhill, which
was the only portion of Woodhill cited by Apple in its peti-
tion, taught this element. Id. We also disagreed with the
Board’s motivation-to-combine analysis, which merely af-
firmed Apple’s allegation that a skilled artisan “would have
allowed for the selective access features of Stefik to be used
with Woodhill’s content-dependent identifiers feature.” Id.
(emphasis omitted). We explained that this reasoning said
nothing more than that the two references could be com-
bined, not that there would been a motivation to combine
them, and lacked any explanation as to how the
4 In PersonalWeb I, we used the term “content-based
identifier” to refer to multiple claim terms including “con-
tent-dependent name,” “content-based identifier,” and “dig-
ital identifier,” because no issue before us turned on any
differences between them. Id. at 990. We do the same
here.
8 PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC.
combination of the two references was supposed to work.
Id. at 993–94. We remanded for the Board to reconsider
the merits of the obviousness challenge. Id. at 994.
The Board ordered additional briefing by the parties to
explain where Apple did or did not make a proper case of
obviousness on the instituted ground. J.A. 4.
F. Board’s Remand Analysis
On remand, the Board maintained the same obvious-
ness theory of unpatentability, except that the Board re-
placed its previous reliance on Stefik for teaching the
“compared to a plurality of values” element with reliance
on column 17 of Woodhill. J.A. 13–16. The Board also ex-
panded its analysis of a skilled artisan’s motivation to com-
bine Woodhill and Stefik. J.A. 16–18.
Element (b)(i) of claim 24 is the main point of conten-
tion between the parties. It recites, after “in response to
said request,” “causing the content-dependent name of the
particular data item to be compared to a plurality of val-
ues.” J.A. 88 at 40:15–17. The Board pointed to Apple’s
petition, which cited column 17, lines 40 to 46 of Woodhill:
Program control then continues with step 446
where the Distributed Storage Manager program
448 transmits an “update request” to the remote
backup file server 12 which includes the Binary
Object Identification Record 58 for the previous
version of each binary object as well as the list of
“contents identifiers” calculated in step 444.
J.A. 14. The Board continued to point to Apple’s petition,
which cited Apple’s expert, and stated: “in order to deter-
mine which data needs to be restored by the update re-
quest, the remote backup file server of Woodhill must be
able to reference its local files using the information it re-
ceives - namely the Binary Object Identification Record.”
Id. (emphasis added) (brackets and internal quotation
marks omitted). The Board then adopted Apple’s expert’s
PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC. 9
conclusion that the “referencing necessarily must be accom-
plished” using “the remote backup fileserver,” which
“maintains some sort of file system or other mapping (i.e.,
a database) that allows the Binary Object Identification
Record to serve as a lookup for the requisite file data that
is to be restored.” Id. (emphasis added). The Board there-
fore concluded that Woodhill, without saying so, neces-
sarily compares the content-based identifier (Binary Object
Identifier) of the particular data item (binary object) to a
plurality of values (an unmentioned but necessarily pre-
sent database of Binary Object Identifiers). In other words,
the Board found that Woodhill inherently teaches compar-
ing a Binary Object Identifier to a plurality of Binary Ob-
ject Identifiers.
As to Stefik, the Board described Stefik as “a system
that addresses the problem of preventing unauthorized ac-
cess to digital works with an access request utilizing a
unique identifier for the digital work.” J.A. 15. The Board
stated that it “agree[d] with Apple that access provided in
Stefik would necessarily require a comparison between the
unique identifier and other values to see if a match can be
obtained,” citing Apple’s expert testimony as support. J.A.
15–16. Apple further contended that “a skilled artisan
would have combined the backup and restore system in
Woodhill with the repository in Stefik to add an authoriza-
tion layer to prevent unauthorized users from accessing a
different user’s back up files.” J.A. 16. The Board con-
cluded that this rationale was sufficient, and that Apple
had demonstrated by a preponderance of the evidence that
the challenged claims were unpatentable under § 103(a) as
obvious over Woodhill and Stefik. J.A. 17–18.
PersonalWeb appealed both the Board’s inherency
finding and its motivation-to-combine finding. We have ju-
risdiction under 28 U.S.C. § 1295(a)(4)(A).
10 PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC.
DISCUSSION
“We review the Board’s ultimate determination of obvi-
ousness de novo and its underlying factual determinations
for substantial evidence.” PersonalWeb I, 848 F.3d at 991.
“On the factual components of the inquiry, we ask whether
a reasonable fact finder could have arrived at the agency’s
decision, which requires examination of the record as a
whole, taking into account evidence that both justifies and
detracts from an agency’s decision.” Id. (internal brackets
and quotation marks omitted).
We conclude that the Board’s inherency finding derived
from column 17 of Woodhill for teaching the “compared to
a plurality of values” limitation lacks substantial evidence.
While it is possible that Woodhill’s system utilizes an un-
stated Binary Object Identifier lookup table to locate bi-
nary objects of a previous version of a file that is going to
be restored (column 17 of Woodhill), mere possibility is not
enough. “Inherency . . . may not be established by proba-
bilities or possibilities.” PAR Pharm., Inc. v. TWI Pharm.,
Inc., 773 F.3d 1186, 1195 (Fed. Cir. 2014). “The mere fact
that a certain thing may result from a given set of circum-
stances is not sufficient.” Id. (emphasis added). Rather, a
party must “show that the natural result flowing from the
operation as taught would result in the performance of the
questioned function.” Id. (emphasis in original).
As PersonalWeb suggests, an equally plausible, if not
more plausible, understanding of Woodhill is that
Woodhill’s system uses conventional file names and loca-
tions to locate files and the Binary Object Offset field to
locate a given binary object within a file. Before the pas-
sage relied on by Apple and the Board (lines 40 to 46), col-
umn 17 states that Woodhill’s system “obtains from the
user the identities of the current and previous versions of
the file (comprised of binary objects) which needs to be re-
stored.” J.A. 1682 at 17:28–32 (emphasis added); see also
J.A. 1670 at Fig. 5I (step 442). The next sentence confirms
PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC. 11
that the file is “user-specified.” J.A. 1682 at 17:32–35. The
Board’s proffered look-up table is therefore unnecessary to
locate the current or previous version of the file.
Even if the file was not specified by the user, Woodhill’s
only disclosed method of locating a current or previous file
is by searching for the file using standard file block infor-
mation, including the file name and location. J.A. 1676 at
5:46–6:11. Woodhill does not disclose searching for a file
based on a content-based identifier.
As to locating binary objects within a file, Woodhill ex-
plains that the system compiles a list of these binary ob-
jects using “information . . . obtained from File Database
25” after the identity of the file is obtained. J.A. 1682 at
17:32–36, J.A. 1670 at Fig. 5I (step 443). Although this
portion of Woodhill’s specification does not specify what ex-
actly in the File Database is used to locate a particular bi-
nary object within a given file, Woodhill explains in column
9 that binary objects can be located within a particular file
using the Binary Object Stream Type field and the Binary
Object Offset field of each Binary Object Identification Rec-
ord. J.A. 1678 at 9:14–22. That disclosure, albeit at a dif-
ferent location in Woodhill’s written description than
column 17, suggests that Woodhill contemplated a means
for locating binary objects that would make Apple and the
Board’s proposed look-up table unnecessary for Woodhill’s
restore process described at column 17. As PersonalWeb
correctly points out, the only disclosed use of Woodhill’s Bi-
nary Object Identifier is to perform a one-to-one compari-
son with the Binary Object Identifier associated with the
backed-up version of the binary object, which occurs after
the appropriate binary object has been located, according
12 PERSONAL WEB TECHNOLOGIES, LLC v. APPLE, INC.
to column 9. Neither Apple nor its expert provided any ad-
equate response to this reading of Woodhill. 5
Because we find that the proposed, theoretical Binary
Object Identifier look-up table that Apple and the Board
rely on does not necessarily exist in Woodhill, the Board’s
reliance on inherency for that element in its obviousness
analysis was improper. Apple provided no other basis for
this element of comparing a content-based identifier to a
plurality of values being disclosed or otherwise obvious to
a skilled artisan at the time of the invention. We therefore
reverse the Board’s finding of obviousness over Woodhill in
view of Stefik. We need not reach the question of motiva-
tion to combine. We have considered the parties’ remain-
ing arguments and find them unpersuasive.
REVERSED
5 We also note that the binary object look-up table
proffered by Apple and the Board could lead to a peculiar
design if it contained multiple binary objects for every large
file on the system, as Apple’s counsel alleged at oral argu-
ment, thereby requiring a comparison of a particular Bi-
nary Object Identifier to millions of Binary Object
Identifiers not even associated with the correct file. See
Oral Argument at 14:20–15:50 (acknowledging that there
could be ten million Binary Object Identifiers in the look-
up table for a far smaller number of files).