Case: 19-2192 Document: 60 Page: 1 Filed: 10/23/2020
United States Court of Appeals
for the Federal Circuit
______________________
TECSEC, INC.,
Plaintiff-Appellant
v.
ADOBE INC.,
Defendant-Cross-Appellant
SAS INSTITUTE, INC., SAP AMERICA, INC., SAP
AG, CISCO SYSTEMS, INC., SYBASE, INC.,
SOFTWARE AG, SOFTWARE AG, INC., ORACLE
CORPORATION, ORACLE AMERICA, INC.,
Defendants
______________________
2019-2192, 2019-2258
______________________
Appeals from the United States District Court for the
Eastern District of Virginia in No. 1:10-cv-00115-LO-TCB,
Judge Liam O’Grady.
______________________
Decided: October 23, 2020
______________________
MICHAEL OAKES, Hunton Andrews Kurth LLP, Wash-
ington, DC, argued for plaintiff-appellant. Also repre-
sented by OZZIE FARRES, BRIAN L. SAUNDERS, STEVEN
LESLIE WOOD; DAVID PARKER, Richmond, VA.
GABRIEL BELL, Latham & Watkins LLP, Washington,
Case: 19-2192 Document: 60 Page: 2 Filed: 10/23/2020
2 TECSEC, INC. v. ADOBE INC.
DC, argued for defendant-cross-appellant. Also repre-
sented by TARA ELLIOTT, RACHEL WEINER COHEN, MICHAEL
A. MORIN.
______________________
Before PROST, Chief Judge, REYNA and TARANTO, Circuit
Judges.
TARANTO, Circuit Judge.
TecSec, Inc. brought this case in 2010 against several
companies, including Adobe Inc., alleging that the compa-
nies directly and indirectly infringed claims of four TecSec
patents. Aspects of the case have been before this court
three times already. The present appeal involves Adobe
only and several rulings of the district court, of which two
are central. Specifically, before trial, in response to a mo-
tion in limine by Adobe, the court excluded all evidence of
induced infringement from March 3, 2011, through the ex-
piration of the patents at issue in October 2013. Earlier,
the court had rejected Adobe’s challenge to the asserted
claims as ineligible under 35 U.S.C. § 101.
A jury found for TecSec on direct infringement, but not
induced infringement; rejected Adobe’s prior-art validity
challenges; and awarded damages. The district court,
though generally denying Adobe’s post-trial motions, re-
duced the damages award to zero on the ground that there
was no proof of any damages from direct infringement and
the jury had rejected induced infringement.
TecSec appeals. It challenges the district court’s mo-
tion-in-limine ruling, as well as certain jury instructions
and the post-trial damages reduction. Adobe cross-ap-
peals, challenging the district court’s ruling on eligibility.
We reverse the evidentiary ruling that eliminated TecSec’s
inducement case for a substantial period, and we reject
Adobe’s challenge to the district court’s eligibility ruling.
For those reasons, and others stated in this opinion, we
Case: 19-2192 Document: 60 Page: 3 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 3
reverse the judgment in part and remand for further pro-
ceedings on TecSec’s claim of induced infringement.
I
A
TecSec owns U.S. Patent Nos. 5,369,702, 5,680,452,
5,717,755, and 5,898,781, the patents asserted in this case.
The patents are entitled “Distributed Cryptographic Object
Method” (the “DCOM patents”) and claim particular sys-
tems and methods for multi-level security of various kinds
of files being transmitted in a data network. See ’702 pa-
tent, col. 3, lines 12–24; id., col. 12, lines 2–16; id., col. 12,
line 45, through col. 13, line 20. In particular, the DCOM
patents describe a method in which a digital object—e.g., a
document, video, or spreadsheet—is assigned a level of se-
curity that corresponds to a certain combination of access
controls and encryption. Id., col. 3, line 58, through col. 4,
line 2; id., col. 4, lines 18–25; id., col. 5, lines 42–51. The
encrypted object can then be embedded or “nested” within
a “container object,” which, if itself encrypted and access-
controlled, provides a second layer of security. Id., col. 4,
lines 25–34.
Claims 1 and 8 of the ’702 patent are representative of
the asserted claims. Claim 1 recites:
1. A method for providing multi-level multime-
dia security in a data network, comprising the
steps of:
A) accessing an object-oriented key manager;
B) selecting an object to encrypt;
C) selecting a label for the object;
D) selecting an encryption algorithm;
E) encrypting the object according to the en-
cryption algorithm;
Case: 19-2192 Document: 60 Page: 4 Filed: 10/23/2020
4 TECSEC, INC. v. ADOBE INC.
F) labelling the encrypted object;
G) reading the object label;
H) determining access authorization based on
the object label; and
I) decrypting the object if access authorization
is granted.
’702 patent, col. 12, lines 2–15. Whereas the subject of
claim 1 is a method, the subject of claim 8 is a system that
includes components—a “system memory,” “an encryption
algorithm module,” “an object labelling subsystem,” “a de-
cryption algorithm module,” and “an object label identifica-
tion subsystem”—that carry out the steps of claim 1’s
method. Id., col. 12, line 45, through col. 13, line 19.
B
In 2010, TecSec filed a complaint alleging infringement
of the DCOM patents by Adobe, International Business
Machines Corp. (IBM), and several other companies. On
March 3, 2011, after staying the case as to all defendants
except IBM, the district court construed several claim
terms of the DCOM patents, including the term “multime-
dia.” Based on those constructions, the district court
granted IBM summary judgment of noninfringement. In
January 2012, we summarily affirmed that noninfringe-
ment judgment without reaching certain issues, including
the construction of “multimedia.” TecSec, Inc. v. Int’l Busi-
ness Machines Corp., 466 F. App’x 882 (Fed. Cir. 2012).
The case then proceeded in district court against Adobe
and other defendants. As relevant here, on April 23, 2012,
TecSec and Adobe stipulated that, under the claim con-
struction already adopted (which TecSec reserved the right
to appeal), TecSec could not show that Adobe or the users
of its accused Acrobat products infringed the DCOM pa-
tents, as alleged, through their actions involving portable
document format documents (PDFs). The next day, the
Case: 19-2192 Document: 60 Page: 5 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 5
district court entered a judgment of noninfringement for
Adobe. On October 2, 2013, we reversed the district court’s
construction of “multimedia” and remanded for further pro-
ceedings under the correct construction. TecSec, Inc. v.
Int’l Business Machines Corp., 731 F.3d 1336, 1345–49
(Fed. Cir. 2013) (TecSec I), cert. denied sub nom. Cisco Sys-
tems, Inc. v. TecSec, Inc., 572 U.S. 1158 (2014).
The DCOM patents expired on October 18, 2013,
shortly after our TecSec I ruling. In October 2014, Adobe
filed a motion for summary judgment of noninfringement,
J.A. 165, and the district court granted the motion in May
2015, J.A. 27086–127. In August 2016, citing genuine dis-
putes over material facts, we reversed that judgment and
again remanded to the district court. TecSec, Inc. v. Adobe
Systems Inc., 658 F. App’x 570 (Fed. Cir. 2016) (TecSec II).
The case returned to the district court. In March 2017,
Adobe moved for summary judgment of ineligibility under
§ 101. J.A. 1841–71. The district court, noting that the
parties agreed that claims 1 and 8 of the ’702 patent were
representative for § 101 purposes, J.A. 4, denied the motion
in May 2017. J.A. 3–13. In its ruling, the court stated that
its rationale actually warranted “judgment in favor of
[TecSec]” on Adobe’s ineligibility challenge. J.A. 8.
In April 2018, after additional discovery, Adobe filed
another motion for summary judgment of noninfringe-
ment, making at least one argument for lack of provable
inducement of infringement. See ECF 1054 (motion); ECF
1123 at 10–11 (reply supporting motion). The district court
denied the motion in June 2018. J.A. 10298–99. In August
2018, Adobe stipulated that “on at least one occasion,”
“there was direct infringement of the asserted claims” by
an Adobe employee. J.A. 10307–08. It is common ground
on appeal that this stipulation was referring to an occasion
when an Adobe employee performed the steps of the
method claims using an accused version of Adobe’s Acrobat
product, reflected in a February 2009 blog post on
Case: 19-2192 Document: 60 Page: 6 Filed: 10/23/2020
6 TECSEC, INC. v. ADOBE INC.
“packaging options for encrypted PDFs” that he wrote for
an Adobe users’ forum. See J.A. 24459–60.
In October 2018, as trial was approaching, Adobe filed
an omnibus motion in limine, the first heading of which
asked the court to “preclude argument, evidence, or testi-
mony on Adobe’s intent to induce or willfully infringe be-
tween March 3, 2011 and October 18, 2013, unless TecSec
concedes admissibility of the March 3, 2011 Order (DX-28),
Stipulation of Non-infringement (DX-29), and Judgment
(DX-30).” J.A. 10429. Adobe argued that a “judgment or
stipulation of non-infringement is highly relevant to an ac-
cused infringer’s state of mind.” Id. “If TecSec argues that
Adobe had specific intent to induce infringement or will-
fully infringe during this period,” Adobe stated, “TecSec
opens the door to the admissibility of this exculpatory evi-
dence”—which, Adobe asserted (without citing evidence), it
reasonably relied on, so that “there can be no specific intent
to induce infringement during [the] roughly 31-month pe-
riod” from March 2011 to October 2013. Id. TecSec argued
that intent was a fact question for the jury, and it disagreed
with Adobe’s submission that allowing proof of inducement
during the period at issue required admission of the three
documents. J.A. 10849. TecSec did not indicate that it
would decline to proceed with its inducement case for the
period at issue if that evidence was to be admitted.
At an oral argument on the omnibus motion on Friday,
November 9, 2018, the district court indicated that it in-
tended to preclude “any reference” to Adobe’s post-March
2011 conduct, making admission of the three documents
immaterial. ECF 1294, p. 35; id. at pp. 3–4, 34–37. The
court stated its intent in that respect equally for the in-
ducement contention and the willfulness contention. Id.
On November 13, 2018, after the Veterans Day weekend
but before any ruling by the court, TecSec filed a supple-
mental brief stating expressly that even if the district court
allowed Adobe to present evidence of Adobe’s lack of intent,
“the Court should not preclude TecSec from presenting
Case: 19-2192 Document: 60 Page: 7 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 7
evidence on Adobe’s intent to induce infringement.”
TecSec, Inc.’s Suppl. Br. Regarding Def. Adobe Inc.’s Mot.
in Limine #1 at 7, TecSec, Inc. v. Adobe, Inc., No. 1:10-cv-
00115-LO-TCB (E.D. Va. Nov. 13, 2018), ECF 1283-1
(TecSec’s Supp. MIL Br.). The district court, TecSec ar-
gued, could not “resolve a substantive factual dispute
through a limine ruling before the evidence is presented at
trial.” Id.
On November 21, 2018, the district court granted
Adobe’s motion and excluded all evidence of induced in-
fringement after March 3, 2011. J.A. 26–29. The court
based its decision on what Adobe treats as two independent
grounds. First, the court held that, after the favorable
2011 claim construction, which was reasonable even
though it was later reversed, it was impossible as a matter
of law for Adobe to have had the requisite intent to induce
third-party infringement. J.A. 27. Second, the court stated
that, while allowing TecSec to argue inducement of in-
fringement without permitting Adobe to introduce the
three documents at issue would highly prejudice Adobe, ad-
mitting that evidence would be prejudicial to TecSec and
confuse the jury. J.A. 28–29. The court therefore barred
the presentation of all inducement evidence concerning the
period after March 3, 2011. Id.
The case proceeded to a jury trial, which began on De-
cember 10, 2018. 1 On December 12, 2018, TecSec stipu-
lated that, because it had failed to mark its product in
accordance with 35 U.S.C. § 287, it would not seek damages
for any infringement that took place before the filing of its
complaint. J.A. 11998. Accordingly, the trial was limited
1 By December 9, 2018, the only patent claims at is-
sue were the ’702 patent’s claims 1 and 8; the ’755 patent’s
claim 1; the ’781 patent’s claims 1 and 14; and the ’452 pa-
tent’s claim 1. J.A. 11994. Several additional claims had
been at issue at the time of the § 101 ruling. J.A. 1845.
Case: 19-2192 Document: 60 Page: 8 Filed: 10/23/2020
8 TECSEC, INC. v. ADOBE INC.
to TecSec’s ownership of the patents; direct infringement
by Adobe from February 2010 to October 2013; induced in-
fringement by Adobe from February 2010 to March 3, 2011;
Adobe’s anticipation and obviousness challenges; and dam-
ages. See J.A. 38–44.
At trial, TecSec offered the deposition testimony of
George Johnson, an independent technology consultant, as
evidence of direct infringement by third parties allegedly
induced by Adobe. Mr. Johnson had stated that, in April
2011, he provided Acrobat users with guidance on how to
use certain features. The court excluded certain parts of
Mr. Johnson’s testimony, stating that the period for induce-
ment ended on March 3, 2011, and that TecSec could not
submit evidence of later conduct. J.A. 12429–30.
At the conclusion of trial, the court gave the jury two
instructions relevant to this appeal. Jury Instruction No.
25 highlighted Adobe’s stipulation that the 2009 employee
blog post constituted direct infringement, and it noted that
this act had occurred before TecSec filed its complaint in
2010. J.A. 12076; see J.A. 10307–08. Jury Instruction No.
28 stated that “mere inaction, or a failure to stop or prevent
infringement, does not constitute inducement.” J.A. 12079.
On December 19, 2018, the jury, besides confirming
TecSec’s ownership of the patents, J.A. 39, found that
Adobe had directly infringed all asserted claims, but that
Adobe had not committed inducement of infringement, J.A.
40–41. The jury also found that Adobe had failed to estab-
lish that the asserted claims were invalid under the prior
art. J.A. 42–43. The jury awarded TecSec $1.75 million in
damages. J.A. 44.
The district court then ruled on Adobe’s post-trial mo-
tion. It declined to disturb the verdicts on direct infringe-
ment and invalidity, J.A. 53–55, but it vacated the jury’s
damages award and set damages to zero, J.A. 55–60. The
court explained that TecSec’s only evidence of damages re-
lated to sales of Acrobat software to customers and that
Case: 19-2192 Document: 60 Page: 9 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 9
such evidence could support damages only for inducing in-
fringement—which the jury found had not occurred. Id.
The district court thereafter entered a final judgment
as to Adobe under Fed. R. Civ. P. 54(b). J.A. 2. TecSec
timely appealed, and Adobe timely cross-appealed. We
have jurisdiction under 28 U.S.C. § 1295(a)(1).
II
In general, we apply regional-circuit law to evidentiary
determinations and jury instructions. Barry v. Medtronic,
Inc., 914 F.3d 1310, 1320 (Fed. Cir. 2019). The Fourth Cir-
cuit reviews both types of rulings for an abuse of discretion.
See Campbell v. Boston Sci. Corp., 882 F.3d 70, 77 (4th Cir.
2018) (evidentiary determinations); Chaudhry v. Galler-
izzo, 174 F.3d 394, 408 (4th Cir. 1999) (jury instructions).
But “where a district court rules, as a matter of patent law,
that a party is precluded from introducing evidence, we ap-
ply Federal Circuit law and review the district court’s rul-
ing de novo.” Sulzer Textil A.G. v. Picanol N.V., 358 F.3d
1356, 1363 (Fed. Cir. 2004). We review de novo a jury in-
struction that concerns patent law. Bettcher Indus., Inc. v.
Bunzl USA, Inc., 661 F.3d 629, 638 (Fed. Cir. 2011). We
review a judgment as a matter of law de novo. Barry, 914
F.3d at 1320; Huskey v. Ethicon, Inc., 848 F.3d 151, 156
(4th Cir. 2017). Whether a patent claim is eligible for pa-
tenting under 35 U.S.C. § 101 is a question of law, to which
underlying facts may be relevant. Berkheimer v. HP Inc.,
881 F.3d 1360, 1365 (Fed. Cir. 2018).
A
We begin with TecSec’s appeals of the district court’s
motion-in-limine ruling and the court’s related exclusion of
Mr. Johnson’s deposition testimony. We reverse the dis-
trict court’s decision to exclude evidence of inducement of
infringement after March 3, 2011, and the related exclu-
sion of Mr. Johnson’s testimony. We remand for further
Case: 19-2192 Document: 60 Page: 10 Filed: 10/23/2020
10 TECSEC, INC. v. ADOBE INC.
proceedings on TecSec’s inducement claim as to the period
after March 3, 2011.
The district court set forth two reasons for ruling that
there could be no proof of post-March 3, 2011 inducement
of infringement. First, the district court explained that the
March 3, 2011 claim construction and stipulation of nonin-
fringement made it legally impossible for Adobe to have
had, after that date, the knowledge—of the infringing char-
acter of the allegedly induced customer actions—required
for inducement. J.A. 27–28. Because such knowledge was
legally precluded, the district court reasoned, Adobe could
not be liable for induced infringement. Id. Second, the dis-
trict court stated that allowing either party to present evi-
dence would substantially prejudice the other party and
would confuse the jury. J.A. 28–29. We reject both ration-
ales for the motion-in-limine ruling.
1
A defendant is liable for “induced infringement under
§ 271(b)” if the defendant took certain affirmative acts to
bring about the commission by others of acts of infringe-
ment and had “knowledge that the induced acts constitute
patent infringement.” Global-Tech Appliances, Inc. v. SEB
S.A., 563 U.S. 754, 765–66 (2011); see Commil USA, LLC
v. Cisco Systems, Inc., 135 S. Ct. 1920, 1928 (2015); Power
Integrations, Inc. v. Fairchild Semiconductor Int’l, Inc., 843
F.3d 1315, 1331 (Fed. Cir. 2016). The intent element re-
quires “knowledge that the induced acts constitute patent
infringement,” which can be established by a proper find-
ing of “willful blindness.” Global-Tech, 563 U.S. at 766–71;
see Commil, 135 S. Ct. at 1926–28 (reiterating requirement
of knowledge of infringing character of induced conduct,
not just knowledge of patent). This intent element was the
basis for the district court’s primary rationale for its mo-
tion-in-limine ruling, a ruling that assumed that the in-
duced conduct was in fact infringing.
Case: 19-2192 Document: 60 Page: 11 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 11
The intent standard focuses on, and can be met by proof
of, the defendant’s subjective state of mind, whether actual
knowledge or the subjective beliefs (coupled with action to
avoid learning more) that characterizes willful blindness.
Global-Tech, 563 U.S. at 769. As a logical matter, a defend-
ant may have the liability-supporting subjective state of
mind even if a person could believe, with objective reason-
ableness (though wrongly), that the induced conduct was
not infringing. To make the point in terms of this case,
Adobe may have had the requisite knowledge of infringe-
ment if it believed (as we ultimately held in 2013) that the
March 3, 2011 claim construction was incorrect, even if
that construction was objectively reasonable.
We have so ruled as to willfulness—an issue that
Adobe, in its motion, and the district court, in its ruling,
treated together with inducement. Specifically, we have
held that, under Halo Electronics, Inc. v. Pulse Electronics,
Inc., 136 S. Ct. 1923, 1933 (2016), a finding of willfulness
may rest on the subjective bad faith of the infringer even if
it would be objectively reasonable to view the conduct at
issue as non-infringing. WesternGeco LLC v. ION Geophys-
ical Corp., 837 F.3d 1358, 1362 (Fed. Cir. 2016), reinstated
913 F.3d 1067, 1075 (Fed. Cir. 2019). That logic applies
equally to the intent element of inducement, as we con-
cluded in our non-precedential decision in Smith & Nephew
Inc. v. Arthrex, Inc., 603 F. App’x 981 (Fed Cir. 2015),
where we explained that a district court’s prior judgment
of noninfringement, and statement to the parties that the
plaintiff’s inducement claim was objectively weak, did not
prevent the plaintiff, as a matter of law, from proving the
subjective intent element of induced infringement, which
is a fact issue. Id. at 989–90; see also Sanofi v. Watson
Labs. Inc., 875 F.3d 636, 645 (Fed. Cir. 2017) (factual is-
sue); AstraZeneca LP v. Apotex, Inc., 633 F.3d 1042, 1056,
1059–60 (Fed. Cir. 2010) (same).
The Supreme Court’s conclusion about subjective be-
liefs and legal reasonableness in another context supports
Case: 19-2192 Document: 60 Page: 12 Filed: 10/23/2020
12 TECSEC, INC. v. ADOBE INC.
this conclusion. In Cheek v. United States, 498 U.S. 192
(1991), the Court reviewed the conviction of a taxpayer
charged with willful failure to pay taxes, which requires
“knowing” that the law required the payment not made. Id.
at 194 n.2, 199–201. The Court held that, even though it
would be not just incorrect but unreasonable as a matter of
law for the taxpayer to believe that the statute did not re-
quire payment, the jury had to be permitted to decide
whether the taxpayer in good faith believed the incorrect,
legally unreasonable view that no tax was due. Id. at 202–
04. Thus, the legally material question of what the defend-
ant subjectively believed was not answered as a matter of
law even by the objective unreasonableness of that belief.
Likewise, the question whether the defendant subjectively
had what turned out to be the correct belief (here, that
Adobe believed that the claims meant what we eventually
held in 2013) is not answered as a matter of law by the ob-
jective reasonableness of a contrary belief.
The district court in this case erred when it concluded
as a matter of law that, after the district court’s (later re-
versed) claim construction on March 3, 2011, Adobe “lacked
the requisite intent to induce infringement.” J.A. 27. The
court explained that it had “reasonably, though errone-
ously, ruled in Adobe’s favor on infringement,” and, accord-
ingly, Adobe was entitled to rely on that ruling as proof
that the relevant induced acts were non-infringing. Id.
That reasoning makes dispositive what Adobe, with objec-
tive reasonableness, could have believed. The Global-Tech
inducement standard, however, can be met by proof of what
Adobe in fact subjectively believed. For example, Adobe
might have believed that the March 2011 claim-construc-
tion ruling was erroneous (though reasonable) and would
likely be reversed (as it was in 2013). Thus, the district
court’s March 2011 ruling “could, at most, create a factual
question, not an entitlement to a no-knowledge finding as
a matter of law.” Smith & Nephew, 603 F. App’x at 989–
90.
Case: 19-2192 Document: 60 Page: 13 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 13
For those reasons, we conclude that the district court
legally erred in its primary rationale for ruling out induce-
ment after March 3, 2011, namely, that the claim-construc-
tion ruling of that date furnished an objectively reasonable
basis for a belief that use of the accused products did not
infringe, even if Adobe did not have such a belief.
2
The district court’s second ground for its motion-in-
limine ruling was that “allowing TecSec to argue [post-
March 3, 2011] induced or willful infringement . . . would
taint the trial and any verdict with undue prejudice and
juror confusion.” J.A. 28. Whether we review that ruling
de novo or for an abuse of discretion, we conclude that the
district court erred in relying on this rationale to preclude
TecSec from proving inducement after March 3, 2011.
In defending the district court’s rationale, Adobe in-
vokes Rule 403 of the Federal Rules of Evidence, which pro-
vides that a court “may exclude relevant evidence if its
probative value is substantially outweighed by a danger
of,” among other factors, “unfair prejudice” or “confusing
the issues.” But the district court in this case went beyond
excluding a single piece, or even a fixed set, of evidence and
leaving TecSec to present such other relevant, admissible
evidence as it may have on inducement in the period at is-
sue. Instead, the court foreclosed the introduction of any
evidence on the issue of post-March 3, 2011 inducement of
infringement. This is materially different from any appli-
cation of Rule 403 Adobe has identified. Cf. General Dy-
namics Corp. v. United States, 563 U.S. 478, 484–85 (2011)
(distinguishing case involving “purely evidentiary dispute”
over state-secret privilege, where “the privileged infor-
mation is excluded and the trial goes on without it,” from
case involving foreclosure of a claim).
The district court reasoned that if TecSec was allowed
to argue inducement of infringement after that date, Adobe
would be prejudiced were it not allowed to introduce the
Case: 19-2192 Document: 60 Page: 14 Filed: 10/23/2020
14 TECSEC, INC. v. ADOBE INC.
March 3, 2011 claim construction and the stipulation by
TecSec that, under that construction, Adobe’s customers
did not directly infringe. J.A. 28. The court then concluded
that “it would also be substantially and unduly prejudicial
and confusing for the jury to see a prior ruling in this case
and TecSec’s stipulation that Adobe’s products did not in-
fringe.” J.A. 28–29. On that basis, the district court pre-
cluded TecSec from offering any proof of post-March 3,
2011 inducement.
Adobe has not cited any authority that supports such
foreclosure of liability for a given period in the circum-
stances present here. Any conclusion that post-March 3,
2011 inducement could not be fairly tried would have re-
quired consideration of what other admissible evidence
TecSec had that was relevant to the intent element of in-
ducement, as well as of the possible measures for effec-
tively but fairly reducing jury confusion. But the district
court did not undertake, and because of the limited scope
of Adobe’s motion in limine was in no position to undertake,
that required consideration.
Adobe’s motion, besides what it suggested on the legal-
impossibility point, was limited to arguing for Adobe’s abil-
ity to introduce the claim-construction ruling and TecSec’s
stipulation. It did not call for TecSec to identify all evi-
dence of intent—as a motion for summary judgment would
have done—so that the district court could determine if
there was a triable issue of post-March 3, 2011 inducement
of infringement. See J.A. 10429. TecSec therefore properly
limited its response to arguing against the admission of the
construction and stipulation. See J.A. 10849. On the mo-
tion as framed, the district court lacked the basis to con-
sider the totality of TecSec’s post-March 3, 2011
inducement evidence to determine whether that issue
could fairly be tried. And the court did not consider the
totality of such evidence. Nor, in taking the extraordinary
action of foreclosing liability for a substantial period, did
the district court set forth an analysis of potential means,
Case: 19-2192 Document: 60 Page: 15 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 15
such as cautionary jury instructions, that could reduce jury
confusion and allow a fair trial considering the totality of
relevant evidence.
Adobe cites several cases to support the proposition
that “there are circumstances where, for willfulness or in-
equitable conduct, there can be no intent as a matter of
law.” Appellant’s Br. at 28. None of those cases support
the ruling in this case. The cited cases all involved ordi-
nary motions for summary judgment that, with proper pro-
cedural protections, duly enabled the court to consider all
evidence relevant to the particular liability issue. See Fer-
ring B.V. v. Barr Labs., Inc., 437 F.3d 1181, 1190–94 (Fed.
Cir. 2006) (finding lack of intent for inequitable conduct af-
ter consideration of evidence on summary judgment); In-
tercontinental Great Brands LLC v. Kellogg N. America
Co., 869 F.3d 1336, 1352 (Fed. Cir. 2017) (same). By con-
trast, Adobe’s motion in limine did not call for, or provide a
basis for, consideration of all relevant material evidence.
Without such consideration, the district court could not
properly resolve the issue as a matter of law. 2
As Adobe acknowledges in this court, see Cross-Appel-
lant’s Principal and Response Br. at 15, 20, when the dis-
trict court stated that it would be “substantially and
unduly prejudicial and confusing for the jury to see” the
claim-construction ruling and TecSec’s stipulation, J.A.
28–29, the court was determining that the evidence Adobe
was entitled to introduce would be “unduly prejudicial” to
TecSec. But TecSec never stated that, if that evidence had
to be admitted at Adobe’s behest, TecSec would drop its in-
ducement claim for the post-March 3, 2011 period. To the
2 Adobe has not argued in its briefing in this court
that any error in the motion-in-limine ruling was harmless
because TecSec lacked sufficient evidence of intent to cre-
ate a triable issue. See Cross-Appellant’s Principal and Re-
sponse Br. at 19–34.
Case: 19-2192 Document: 60 Page: 16 Filed: 10/23/2020
16 TECSEC, INC. v. ADOBE INC.
contrary, after the district court opined at the oral argu-
ment that admitting that evidence would be “far too preju-
dicial,” ECF 1294 at 36, TecSec reiterated its intent to
present the inducement case even if that evidence were ad-
mitted. TecSec’s Supp. MIL Br. (ECF 1283-1) at 7. The
court furnished no justification for making that determina-
tion itself instead of leaving to TecSec the determination
that the prejudice to TecSec was too severe for the issue to
be tried at all.
Accordingly, we reverse the district court’s decision to
preclude TecSec from introducing evidence of post-March
3, 2011 inducement of infringement.
3
TecSec’s appeal of the exclusion of certain aspects of
Mr. Johnson’s deposition testimony is closely tied to the
motion-in-limine ruling. In the testimony at issue, Mr.
Johnson stated that, in April 2011, he had posted responses
on an Adobe forum explaining how to use Acrobat products
in ways that TecSec alleged were infringing. At trial,
Adobe objected to the introduction of that testimony, argu-
ing that the testimony “runs afoul of the Court’s [motion-
in-limine] ruling on eliciting alleged infringement [post-
March 3, 2011].” J.A. 12427. The district court agreed with
Adobe, excluding the testimony because “it’s outside of the
timeframe and it is clearly inducement evidence.” J.A.
12429–30. Because we conclude that the district court
erred in its motion-in-limine ruling that was the basis for
the exclusion of the Johnson testimony at issue, we reverse
that evidentiary exclusion as well.
B
TecSec challenges Jury Instruction Nos. 25 and 28. We
find no reversible error in either instruction, asking
whether TecSec has “establish[ed] that the instructions
were legally erroneous and that the errors had a prejudicial
effect.” Bettcher, 661 F.3d at 638.
Case: 19-2192 Document: 60 Page: 17 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 17
1
In Jury Instruction No. 25, the district court told the
jury that Adobe had admitted that a certain sequence of
steps (“create” a file, “attach” it to a second file, “encrypt”
the second file, “decrypt” the first file) constituted direct in-
fringement, that Adobe had admitted that “this occurred on
at least one occasion, by Adobe itself,” and that the “parties
agree that the one time for which Adobe has admitted in-
fringement—that is Adobe’s use in connection with creat-
ing a February 2009 blog post—occurred before TecSec
filed its lawsuit in February 2010.” J.A. 12076 (emphases
added). That instruction mirrors Adobe’s pre-trial stipula-
tion, differing only in its specific reference to the February
2009 blog post. See J.A. 10307.
TecSec challenges the district court’s inclusion of the
reference to the February 2009 blog post, stating that
“TecSec never agreed that Adobe only admitted to a single
act of infringement” and that the “instruction is misleading
because it implies that, in the context of the district court’s
narrow damages window, Adobe’s 2009 blog is irrelevant.”
Appellant’s Br. at 43–44. We reject the challenge.
TecSec relies on a single piece of evidence as showing a
broader Adobe admission, namely, Adobe’s stipulation that
it had “installed for its own internal use at least one copy
of each version of the accused products on a computer hav-
ing system memory.” J.A. 11994 (emphasis added). But
Jury Instruction No. 25 is best understood to tie “the one
time” language, to which TecSec objects, to what the imme-
diately preceding two sentences discuss, which is on its face
performance of a method. Installation, by contrast, could
constitute infringement only of the system claims. See J.A.
12769 (Trial Tr. at 534:4–5). The installation action thus
is simply outside the scope of, and does not contradict, Jury
Instruction No. 25—which left TecSec free to argue that
there were instances of Adobe-admitted infringement of
the system claims. Moreover, the reference to the timing
Case: 19-2192 Document: 60 Page: 18 Filed: 10/23/2020
18 TECSEC, INC. v. ADOBE INC.
of the blog post is accurate and does not itself imply any-
thing about the legal relevance of the timing. We therefore
find no reversible error in Jury Instruction No. 25, without
foreclosing the district court, in any new trial on induce-
ment after March 3, 2011, from considering whether the
instruction should be modified.
2
In Jury Instruction No. 28, the district court told the
jury that inducement of infringement requires “an affirm-
ative act to encourage infringement” and that “[e]vidence
of mere inaction, or a failure to stop or prevent infringe-
ment, does not constitute inducement.” J.A. 12079. That
language mirrors our statement in Tegal Corp. v. Tokyo
Electron Co. that “[a]ctively inducing . . . requires an af-
firmative act of some kind.” 248 F.3d 1376, 1378 (Fed. Cir.
2001) (internal quotation marks omitted).
TecSec challenges the instruction on the ground that it
opened the door for Adobe to imply that TecSec had accused
Adobe of inaction only. Specifically, TecSec argues, Adobe
“exploited the improper instruction during closing” argu-
ments when Adobe characterized its failure to remove the
2009 blog post as mere inaction. Appellant’s Br. at 45; see
J.A. 13544. We reject this challenge.
TecSec does not contest the accuracy of Jury Instruc-
tion No. 28 as a statement of the law, and it has not shown
that instruction was misleading. TecSec believes that
Adobe’s conduct to have been more than mere inaction, but
the instruction left TecSec free to so argue. As for Adobe’s
closing argument, TecSec forfeited a challenge to the argu-
ment by failing to object contemporaneously. See United
States v. Cone, 714 F.3d 197, 217 (4th Cir. 2013).
C
TecSec challenges the district court’s reduction of the
jury’s damages award to zero. We reject this challenge.
Case: 19-2192 Document: 60 Page: 19 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 19
TecSec argues that because the jury found direct in-
fringement of each asserted claim, 35 U.S.C. § 284 entitles
TecSec to a non-zero reasonable royalty. Specifically,
TecSec highlights § 284’s statements that “[u]pon finding
for the claimant the court shall award the claimant dam-
ages adequate to compensate for the infringement, but in
no event less than a reasonable royalty” and that “[w]hen
the damages are not found by a jury, the court shall assess
them.” 35 U.S.C. § 284. Taken together, TecSec contends,
those statements require an award of damages greater
than zero in all cases where the jury finds infringement.
The statute does not require an award of damages if
none are proven that adequately tie a dollar amount to the
infringing acts. We have explained that “a patent owner
may waive its right to a damages award when it deliber-
ately abandons valid theories of recovery in a singular pur-
suit of an ultimately invalid damages theory.” Promega
Corp. v. Life Techs. Corp., 875 F.3d 651, 666 (Fed. Cir.
2017). More generally, we have observed that there can be
an award of no damages where “none were proven.” Gus-
tafson, Inc. v. Intersystems Indus. Prods., Inc., 897 F.2d
508, 509–10 (Fed. Cir. 1990); cf. Gadsden Indus. Park, LLC
v. United States, 956 F.3d 1362, 1372 (Fed. Cir. 2020) (Tak-
ings Clause does not require an award of compensation
without adequate proof). Although we have not upheld a
zero royalty rate in a case with an affirmative infringement
finding—and have stated that it is “unlikely” that a hypo-
thetical negotiation would result in a zero royalty rate—we
have previously stated that “in a case completely lacking
any evidence on which to base a damages award, the record
may well support a zero royalty award.” Apple, Inc v.
Motorola, Inc., 757 F.3d 1286, 1328 n.7 (Fed. Cir. 2014).
In this case, TecSec presented no evidence of damages
caused by Adobe’s direct infringement, which was the only
form of infringement that the jury found Adobe to have
committed. J.A. 58. TecSec did not, for example, provide
Case: 19-2192 Document: 60 Page: 20 Filed: 10/23/2020
20 TECSEC, INC. v. ADOBE INC.
any evidence regarding the number of Adobe employees in
the United States or the number of times that Adobe em-
ployees installed Acrobat. Id. TecSec’s only damages evi-
dence relied on “sales of accused products.” E.g., J.A.
12840, 12842–44, 12854–56, 12866; see also J.A. 13499–
500 (TecSec’s closing argument, stating, “all that TecSec is
asking for here, a reasonable royalty based on [Adobe’s]
sales of Acrobat products”). But the district court found,
and TecSec does not dispute, that direct infringement oc-
curs only after Acrobat is installed. J.A. 57. Sales of Acro-
bat, therefore, cannot be a measure of damages for direct
infringement by Adobe—sales could serve here as a meas-
ure of damages only for TecSec’s indirect infringement the-
ory, which relies on infringement by Adobe customers. But
the jury found no indirect infringement.
On appeal, TecSec tries to rationalize the jury’s award
by theorizing ways the jury could have used sales data to
derive a value for Adobe’s conduct. For instance, TecSec
argues that the jury could have decided that sales were a
good proxy for the value of TecSec’s patented invention to
Adobe’s development of Acrobat. Appellant’s Opening Br.
at 59–60. But this theory, like the others that TecSec of-
fers, is ultimately speculative and insufficiently grounded
in evidence. The district court therefore committed no er-
ror in concluding that the jury’s damages award was not
supported by the evidence. J.A. 57–58.
III
The district court denied Adobe’s motion for summary
judgment that the asserted claims are ineligible under 35
U.S.C. § 101, and in its opinion, the court stated that its
conclusion required judgment for TecSec rejecting the eli-
gibility challenge. Adobe now cross-appeals that ruling. It
does not object to the district court’s turning the denial of
summary judgment for Adobe into summary judgment for
TecSec. Adobe thus accepts that the dispositive ruling
against its eligibility challenge should be judged on the
Case: 19-2192 Document: 60 Page: 21 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 21
record made on its motion for summary judgment. We af-
firm the district court’s § 101 ruling.
A
Section 101 provides that “[w]hoever invents or discov-
ers any new and useful process, machine, manufacture, or
composition of matter, or any new and useful improvement
thereof, may obtain a patent therefor, subject to the condi-
tions and requirements of this title.” 35 U.S.C. § 101. But
this provision “contains an important implicit exception:
Laws of nature, natural phenomena, and abstract ideas are
not patentable.” Alice Corp. Pty. Ltd. v. CLS Bank Int’l,
573 U.S. 208, 216 (2014). In Alice, the Supreme Court ex-
plained that a “claim falls outside § 101 where (1) it is ‘di-
rected to’ a patent-ineligible concept, i.e., a law of nature,
natural phenomenon, or abstract idea, and (2), if so, the
particular elements of the claim, considered ‘both individ-
ually and “as an ordered combination,”’ do not add enough
to ‘“transform the nature of the claim” into a patent-eligible
application.’” SAP America, Inc. v. InvestPic, LLC, 898
F.3d 1161, 1166–67 (Fed. Cir. 2018) (citing Alice, 573 U.S.
at 217).
We have approached the Step 1 “directed to” inquiry by
asking “what the patent asserts to be the ‘focus of the
claimed advance over the prior art.’” Solutran, Inc. v. Ela-
von, Inc., 931 F.3d 1161, 1168 (Fed. Cir. 2019) (quoting Af-
finity Labs of Texas, LLC v. DIRECTV, LLC, 838 F.3d
1253, 1257 (Fed. Cir. 2016)); see Trading Techs. Int’l Inc. v.
IBG LLC, 921 F.3d 1378, 1384 (Fed. Cir. 2019). In conduct-
ing that inquiry, we “must focus on the language of the As-
serted Claims themselves,” Synopsis, Inc. v. Mentor
Graphics Corp., 839 F.3d 1138, 1149 (Fed. Cir. 2016), “con-
sidered in light of the specification,” Enfish, LLC v. Mi-
crosoft Corp., 822 F.3d 1327, 1335 (Fed. Cir. 2016). See also
Chamberlain Group, Inc. v. Techtronic Indus. Co., 935 F.3d
1341, 1346 (Fed. Cir. 2019); ChargePoint, Inc. v. SemaCon-
nect, Inc., 920 F.3d 759, 766 (Fed. Cir. 2019); In re TLI
Case: 19-2192 Document: 60 Page: 22 Filed: 10/23/2020
22 TECSEC, INC. v. ADOBE INC.
Communications LLC Patent Litigation, 823 F.3d 607,
611–12 (Fed. Cir. 2016); Ariosa Diagnostics, Inc. v. Se-
quenom, Inc., 788 F.3d 1371, 1376 (Fed. Cir. 2015). And
we have reiterated the Supreme Court’s caution against
“overgeneralizing claims” in the § 101 analysis, explaining
that characterizing the claims at “a high level of abstrac-
tion” that is “untethered from the language of the claims
all but ensures that the exceptions to § 101 swallow the
rule.” Enfish, 822 F.3d at 1337; see Solutran, 931 F.3d at
1167–68; McRO, Inc. v. Bandai Namco Games America,
Inc., 837 F.3d 1299, 1313 (Fed. Cir. 2016) (explaining that
courts “‘must be careful to avoid oversimplifying the claims’
by looking at them generally and failing to account for the
specific requirements of the claims”).
“In cases involving software innovations, this inquiry
often turns on whether the claims focus on specific asserted
improvements in computer capabilities or instead on a pro-
cess or system that qualifies an abstract idea for which
computers are invoked merely as a tool.” Uniloc USA, Inc.
v. LG Electronics USA, Inc., 957 F.3d 1303, 1306–07 (Fed.
Cir. 2020) (citing Customedia Techs., LLC v. Dish Network
Corp., 951 F.3d 1359, 1364 (Fed. Cir. 2020), and Finjan,
Inc. v. Blue Coat Systems, Inc., 879 F.3d 1299, 1303 (Fed.
Cir. 2018)); see also BSG Tech LLC v. Buyseasons, Inc., 899
F.3d 1281, 1285–86 (Fed. Cir. 2018); Core Wireless Licens-
ing S.A.R.L. v. LG Electronics, Inc., 880 F.3d 1356, 1361–
62 (Fed. Cir. 2018). “[S]oftware can make patent-eligible
improvements to computer technology, and related claims
are eligible as long as they are directed to non-abstract im-
provements to the functionality of a computer or network
platform itself.” Uniloc, 957 F.3d at 1309; see Customedia
Techs., 951 F.3d at 1364 (collecting cases); Enfish, 822 F.3d
at 1335. We have found claims directed to such eligible
matter in a number of cases where we have made two in-
quiries of significance here: whether the focus of the
claimed advance is on a solution to “a problem specifically
arising in the realm of computer networks” or computers,
Case: 19-2192 Document: 60 Page: 23 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 23
DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245,
1257–58 (Fed. Cir. 2014); and whether the claim is properly
characterized as identifying a “specific” improvement in
computer capabilities or network functionality, rather than
only claiming a desirable result or function, Uniloc, 957
F.3d at 1306, 1308–09; see Enfish, 822 F.3d at 1135–36; see
also, e.g., Packet Intelligence LLC v. NetScout Systems,
Inc., 965 F.3d 1299, 1309–10 (Fed. Cir. 2020); Ericsson Inc.
v. TCL Communication Tech. Holdings Ltd., 955 F.3d
1317, 1328 (Fed. Cir. 2020); Koninklijke KPN N.V. v. Ge-
malto M2M GmbH, 942 F.3d 1143, 1150 (Fed. Cir. 2019);
SRI Int’l, Inc. v. Cisco Systems, Inc., 930 F.3d 1295, 1303–
04 (Fed. Cir. 2019); Ancora Techs., Inc. v. HTC America,
Inc., 908 F.3d 1343, 1347–49 (Fed. Cir. 2018); Visual
Memory LLC v. NVIDIA Corp., 867 F.3d 1253, 1258–59
(Fed. Cir. 2017); Intellectual Ventures I, LLC v. Capital One
Financial Corp., 850 F.3d 1332, 1342 (Fed. Cir. 2017);
McRO, 837 F.3d at 1313–16.
For example, in SRI, we found to be eligible claims di-
rected to “a specific technique—using a plurality of net-
work monitors that each analyze specific types of data on
the network and integrating reports from the monitors—to
solve a technological problem arising in computer net-
works: identifying hackers or potential intruders into the
network.” 930 F.3d at 1303. The claims focused on a solu-
tion to a computer-specific problem—uniquely difficult-to-
track, large-scale attacks caused by the decentralized na-
ture of computer networks—and a concrete improvement
to network functionality—the deployment of specific moni-
tors to collect specific types of data. Id. In Ancora, we up-
held claims requiring use of a modifiable portion of
particular computer capacity to prevent running software
on an unauthorized computer. 908 F.3d at 1345. We noted
that “[i]mproving security . . . can be a non-abstract com-
puter-functionality improvement if done by a specific tech-
nique that departs from earlier approaches to solve a
specific computer problem”—there, the particular difficulty
Case: 19-2192 Document: 60 Page: 24 Filed: 10/23/2020
24 TECSEC, INC. v. ADOBE INC.
of controlling unauthorized use of software. Id. at 1348. In
Data Engine Technologies LLC v. Google LLC, we held that
claims reciting “a specific method for navigating through
three-dimensional electronic spreadsheets” were patent el-
igible because the claimed advance “improv[ed] computers’
functionality as a tool able to instantly access all parts of
complex three-dimensional electronic spreadsheets”—a
form of information-organization unique to computers. 906
F.3d 999, 1007–08 (Fed. Cir. 2018). And in Finjan, we held
to be eligible claims directed to a specific “behavior-based
virus scan” that provided a “flexible and nuanced virus fil-
tering” to help solve the problem of security on networked
computers. 879 F.3d at 1304–05.
Other illustrative cases lie on the ineligibility side of
the line. In Ericsson, we held to be ineligible claims de-
scribing “a system and method for controlling access to a
platform for a mobile terminal for a wireless telecommuni-
cations system.” 955 F.3d at 1325–26. The claims, we ex-
plained, “merely make generic functional recitations that
requests are made and then granted.” Id. at 1328. In In-
tellectual Ventures I LLC v. Symantec Corp., we held ineli-
gible claims directed to using computers to screen
telephone calls for viruses. 838 F.3d 1307, 1319 (Fed. Cir.
2016). The claims did not “claim a new method of virus
screening or improvements thereto” and merely claimed
use of conventional virus-screening software to carry out
the abstract virus-screening idea. Id. And in RecogniCorp,
LLC v. Nintendo Co., we held that claims to encoding and
decoding image data were ineligible. 855 F.3d 1322, 1326
(Fed. Cir. 2017). The claims did nothing more than use
computers to perform standard encoding and decoding
practices. Id. at 1326–27.
The Step 1 “directed to” analysis called for by our cases
depends on an accurate characterization of what the claims
require and of what the patent asserts to be the claimed
advance. The accuracy of those characterizations is crucial
to the sound conduct of the inquiries into the problem being
Case: 19-2192 Document: 60 Page: 25 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 25
addressed and whether the line of specificity of solution has
been crossed.
B
Adobe argued to the district court that “the claims are
directed to the impermissibly abstract idea of managing ac-
cess to objects using multiple levels of encryption.” J.A.
1845; see J.A. 1857 (heading: “The Asserted Claims of the
DCOM Patents Are Directed to the Impermissibly Abstract
Idea of Managing Access to Objects Using Multiple Levels
of Encryption”); id. (“The asserted claims of the DCOM pa-
tents are directed to the abstract idea of managing access
to objects using multiple levels of encryption, and fail to
provide any specific solution for accomplishing that
claimed result.”). But that characterization of the two rep-
resentative claims is materially inaccurate. To arrive at it,
Adobe had to disregard elements of the claims at issue that
the specification makes clear are important parts of the
claimed advance in the combination of elements.
It suffices to discuss claim 1. 3 Adobe’s characterization
of what claim 1 as a whole is directed to does not go beyond
what is required simply by the claim term “multi-level . . .
security,” which means “‘security achieved when encrypted
objects are nested within other objects which are also en-
crypted, possibly within other objects, resulting in multiple
layers of encryption.’” J.A. 1853 (Adobe’s motion quoting
construction) (citing TecSec I, 731 F.3d at 1345). But claim
3 Adobe has stated that system claim 8, the other
representative claim, merely claims a system for perform-
ing the functions recited in method claim 1 and is not rele-
vantly different from claim 1 in substance for § 101
purposes. Principal and Response Br. of Cross-Appellant
at 62, 65. Adobe has not argued, even as a fallback posi-
tion, that the two claims could call for different § 101 re-
sults.
Case: 19-2192 Document: 60 Page: 26 Filed: 10/23/2020
26 TECSEC, INC. v. ADOBE INC.
1 requires more. It goes beyond managing access to objects
using multiple levels of encryption, as required by “multi-
level . . . security.” Notably, it expressly requires, as well,
accessing an “object-oriented key manager” and specified
uses of a “label” as well as encryption for the access man-
agement. ’702 patent, col. 12, lines 4–16. To disregard
those express claim elements is to proceed at “a high level
of abstraction” that is “untethered from the claim lan-
guage” and that “overgeneraliz[es] the claim.” Enfish, 822
F.3d at 1337; see id. at 1338.
As to the key-manager requirement, we explained in
TecSec II that the requirement was important during pros-
ecution. Specifically, rather than deleting the claim limi-
tation after an indefiniteness rejection, TecSec amended
the specification to provide the required clarity by adding
what now appears at ’702 patent, col. 1, line 61, to col. 2,
line 4, which provided the definition that this court even-
tually relied on in construing “object-oriented key man-
ager.” TecSec II, 658 F. App’x at 582 (construing the term
as “a software component that manages the encryption of
an object by performing one or more of the functions of gen-
erating, distributing, changing, replacing, storing, check-
ing on, and destroying cryptographic keys”). As to the
combination of labeling with the required encryption, the
specification makes clear that this is part of the focus of the
claimed advance. The specification expressly identifies a
deficiency of using only multilevel security through encryp-
tion requiring keys at more than one level: that approach,
the specification says, “is quite unwieldy, inflexible, and
difficult to manage by a security officer or key administra-
tor.” ’702 patent, col. 2, lines 25–29. The specification then
explains that it proposes a solution in which “[a] secure
method of labelling files or messages that are sent from a
sending user to a receiving user over a network” is used “in
addition to cryptographic protection.” Id., col. 2, lines 30–
33 (emphasis added). Adobe has not shown how it could
properly disregard these claim requirements in
Case: 19-2192 Document: 60 Page: 27 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 27
determining “what the patent asserts to be the focus of the
claimed advance over the prior art.” Solutran, 931 F.3d at
1167–68 (internal quotation marks omitted). The focus of
the claimed advance cannot ignore all but the multilevel
encryption.
The specification elaborates in a way that simultane-
ously shows that the claims at issue are directed at solving
a problem specific to computer data networks. The patent
focuses on allowing for the simultaneous transmission of
secure information to a large group of recipients connected
to a decentralized network—an important feature of data
networks—but without uniform access to all data by all re-
cipients. See ’702 patent at col. 11, lines 40–48. The pro-
posed improvement involves, among other things, labeling
together with encryption. “Using a secure labelling regi-
men, a network manager or user can be assured that only
those messages meant for a certain person, group of per-
sons, and/or location(s) are in fact received, decrypted, and
read by the intended receiver.” Id., col. 2, lines 39–43.
“[M]any people within a company may have the key neces-
sary to read a data file” that is encrypted and sent to many
terminals, but the sender may not want all such people to
read the file. Id., col. 2, lines 45–51. “By employing a se-
cure labelling technique in addition to encryption, the
sender can be assured that people having the correct key to
decrypt the message but working at different terminals
will not receive or be allowed to access the communication.”
Id., col. 2, lines 51–55 (emphasis added).
In light of what the claim language and specification
establish, we conclude that the claims are directed to im-
proving a basic function of a computer data-distribution
network, namely, network security. See SRI, 930 F.3d at
1703; Ancora, 908 F.3d at 1348–49. The patent makes
clear that the focus of the claimed advance is on improving
such a data network used for broadcasting a file to a large
audience, with the improvement assertedly being an effi-
cient way for the sender to permit different parts of the
Case: 19-2192 Document: 60 Page: 28 Filed: 10/23/2020
28 TECSEC, INC. v. ADOBE INC.
audience to see different parts of the file. ’702 patent, col.
2, lines 44–57. While non-computer settings may have se-
curity issues addressed by multilevel security, it does not
follow that all patents relating to multilevel security are
necessarily ineligible for patenting. Here, although the pa-
tent involves multilevel security, that does not negate the
conclusion that the patent is aimed at solving a particular
problem of multicasting computer networks.
By way of comparison, in Uniloc, we held the claims at
issue to be directed to solving a problem of reducing com-
munication time by using otherwise-unused space in a par-
ticular protocol-based system, 957 F.3d at 1305, 1307–09,
even though reducing communication time by using such
available blank space (or, generally, reducing resource use
by using otherwise-unused available resources) is a goal in
many settings. Similarly, in Ancora, we held the claims at
issue to be directed to solving a problem presented by par-
ticularly easy unauthorized use of software by placing the
software in an especially secure computer location, 908
F.3d at 1349, even though placing items in especially se-
cure locations to prevent unauthorized access is a goal in
many settings. The patent claims at issue here are directed
to improving a data network’s basic functioning by ena-
bling secure and efficient transmission to intended recipi-
ents when use is made of the basic multicasting
functionality of such a data network. As the district court
said, the claims address the data-network problem pre-
sented by “multiple users in multiple locations accessing
information at different security levels from a central re-
pository.” J.A. 10.
A second inquiry significant in our case law remains—
whether the claims provide a “specific” solution in the way
our cases discuss. For similar reasons to those mentioned
above, Adobe has not persuaded us that the claims fail to
do so, because its arguments ignore what plainly are im-
portant aspects of the claims and the focus of the claimed
advance in the combination. See, e.g., J.A. 1857 (arguing
Case: 19-2192 Document: 60 Page: 29 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 29
that the “asserted claims of the DCOM patents are directed
to the abstract idea of managing access to objects using
multiple levels of encryption, and fail to provide any spe-
cific solution for accomplishing that claimed result”).
In these circumstances, we conclude that the district
court correctly rejected Adobe’s ineligibility challenge as
Adobe presented it to that court.
C
On appeal, Adobe seeks to modify its definition of what
the asserted claims are directed to, now contending that
“[t]he representative claims are directed to the abstract
idea of managing access to objects using multiple layers of
encryption and labels.” Cross-Appellant Principal and Re-
sponse Br. at 61 (emphasis added). This is a new formula-
tion on appeal. Adobe cites J.A. 1853 and 1857 following
the just-quoted sentence, but neither those pages nor any
others in Adobe’s summary-judgment motion identify the
encryption/labeling combination as the abstract idea to
which the claims are directed. As recited above, Adobe
omitted labeling—as well as the object-oriented key man-
ager—from its characterization of the purported abstract
idea in the district court.
For the reasons we have set forth, Adobe’s change in its
“articulation of the purported abstract idea” is substan-
tively significant. Core Wireless Licensing S.A.R.L. v. LG
Electronics, Inc., 880 F.3d 1356, 1362 n.3 (Fed. Cir. 2018)
(declining to decide waiver where the appellant’s “articula-
tion of the purported abstract idea was advanced for the
first time on appeal”). Adobe’s analysis on appeal is still
deficient.
When Adobe discusses what is now in its formulation
of the asserted abstract idea, it does not meaningfully ad-
dress the combination. Rather, it asserts the “common-
place” character of the individual component techniques
generally, see Cross-Appellant Principal and Response Br.
Case: 19-2192 Document: 60 Page: 30 Filed: 10/23/2020
30 TECSEC, INC. v. ADOBE INC.
at 62 (encryption and labeling); id. at 63 (“[t]he only pur-
ported contribution is nesting encrypted objects within
other encrypted objects, thereby providing ‘multi-level’ en-
cryption”), or speaks at an even higher level of generality
of “encoding, converting, encrypting, and controlling access
to data,” id. at 66. But that approach is insufficient where,
as is true here for the reasons we have explained, it is the
combination of techniques that is “what the patent asserts
to be the focus of the claimed advance over the prior art.”
Solutran, 931 F.3d at 1168. Moreover, to the extent, if any,
that extrinsic evidence is relevant to the summary-judg-
ment analysis at Step 1, the evidence is one-sided. TecSec
submitted an expert declaration asserting that the combi-
nation of techniques we have discussed was a specific, un-
conventional improvement in computer network
functionality. J.A. 1960–72; see also J.A. 13 (denying
Adobe’s motion to strike portions of TecSec’s declaration).
Adobe has pointed to no evidence of its own that it submit-
ted in support of its § 101 motion. 4
For those reasons, even apart from its departure from
the theory presented in the district court, the analysis
Adobe has presented on appeal is insufficient to make the
showing required for ineligibility.
IV
For the foregoing reasons, the judgment of the district
court is reversed in part and affirmed in part, and the case
is remanded for further proceedings on TecSec’s claim of
inducement of infringement.
4 In this court, Adobe has cited a statement con-
tained in an expert report from its expert, J.A. 7980, but
TecSec notes, without contradiction from Adobe, that
Adobe did not present the statement in the summary-judg-
ment proceedings regarding § 101 eligibility, see Plaintiff-
Appellant Corrected Response and Reply Brief at 54 n.16.
Case: 19-2192 Document: 60 Page: 31 Filed: 10/23/2020
TECSEC, INC. v. ADOBE INC. 31
Costs awarded to TecSec.
REVERSED IN PART, AFFIRMED IN PART, AND
REMANDED