Claim chart

A claim chart is a widely used device in US patent infringement litigation.[1] It is a convenient and effective means for analyzing and presenting information regarding a patent claim. In each, typically, there are two columns: the left column contains the language of the patent claim under analysis, separated into the successive limitations (e.g. elements or steps, integers, parts) of the claim; the right column contains the information relating to the claim element at its left.


Types of claim chart

There are three principal types of claim chart:

Other claim chart types include initial or preliminary infringement contentions (PICs); domestic industry (DI) charts employed in International Trade Commission (ITC) importation actions; expert claim charts; "parts list" charts used for example as demonstrative exhibits; claim charts presented during licensing or settlement negotiations; and design patent charts.

Illustrative example of claim chart

The following illustrative chart of references to show the invalidity of a hypothetical patent is based on a chart that was prepared by the US Patent and Trademark Office (PTO) and is found[3] in its Manual of Patent Examining Procedure (MPEP), § 2214:

U.S. Patent No. 9,999,999 Smith [Patent]
Claim 1. A filter comprising a housing, Smith teaches "the filter housing
the housing having an outer wall, having an outer wall 1,
a closed end, a closed end 2,
an open end, and an open end 3,
a lid and a hinged lid 4
attachable to the open end... that is securable to the open end 3 via clamp 5." (col. 6, lines 2-3; Figure 3). The hinged lid 4 of Smith is attachable to the outer rim of the open end 3 via clamp 5.
wherein the housing contains a filter material, "the filter housing containing filter materials"
the filter material comprising activated carbon.... Smith teaches activated carbon as a filter material: "wherein the filter materials include any mixture of known filter materials such as clay, activated carbon, and any other known filter materials." (col. 12, lines 1-3).

Alice and Bob chart

There is an additional type of chart similar to a claim chart but recently come in to use only in cases involving computer-implemented business methods or other methods or system for organizing human activity or conduct. An Alice and Bob chart is somewhat similar to the PTO's chart shown above, but its purpose is to show that the subject matter of the patent in suit is a familiar and commonplace human or business activity, such as headhunting, matchmaking, shopping in a store—this is in aid of an argument that the patent is directed to a patent-ineligible abstract idea.

The left column of this type of chart is the same as that of the claim charts described above. In the right column, the steps or elements of a well known business expedient or way of organizing human activity are listed (in an anecdote performed by a notional Alice and Bob).[4] The purpose is to show that the claimed process or system is well known with the addition only of "do it with a computer" (or something similar). Under the Supreme Court's decision in Alice v. CLS Bank such a patent claim is usually invalidated as a mere abstract idea (unless implemented in an inventive manner).[5]

The first recorded use of an Alice and Bob table appears to have been in Google's briefs in Walker Digital, LLC v. Google, Inc.[6] The court said that the chart showed: "As the following hypothetical [case] (articulated by Google, and not meaningfully distinguished by Walker) shows, these steps can and routinely are performed by, for example, human job headhunters." This is the chart from the Walker Digital case:

Limitations of ’270 Patent Claim 1 Routine Steps Performed when Headhunting
receiving from a first party first data including an identity of said first party Carol receives a resume from Alice, which lists Alice’s college degree, 8 years of sales experience, interests, and other information, including Alice’s name
receiving from said first party at least two first-party rules for releasing said first data including a rule for releasing the identity of said first party Alice instructs Carol to disclose her education and sales experience to companies with open sales positions but not to disclose her name unless the company is offering a salary of at least $75,000
receiving from a second party a search request comprising at least one search criterion Bob asks Carol to find an employee with sales experience for his company
receiving from said second party second data including an identity of said second party Bob tells Carol that the job at his company is a sales position that pays $100,000 in salary and that the name of his company is Bob’s Software
receiving from said second party at least two second-party rules for releasing said second party data including a rule for releasing said identity of said second party Bob instructs Carol that she can disclose information about the job opening to any applicant with sales experience and that she can provide the salary offer to any applicant with a college degree but not to disclose the name of his company unless the applicant has more than 5 years of sales experience
processing said search request to determine if said first data satisfies said search criterion Carol checks to see if Alice has the necessary sales experience requested by Bob
if said first data satisfies said search criterion, then exchanging said first and second data, except said identities of said first and second parties, between said first and second parties in accordance with said first-party and second-party rules Once Carol determines that Alice has the necessary sales experience for Bob, Carol provides Alice's college degree and years of sales experience to Bob, but not Alice's name, and provides information to Alice about the sales position available at Bob's company and the salary information, but not the name of Bob's company, in accordance with Alice's instructions and Bob's instructions
after said exchanging step, upon satisfying said first-party rule for releasing said identity of said first party, transmitting said identity of said first party to said second party, and after said exchanging step, upon satisfying said second-party rule for releasing said identity of said second party, transmitting said identity of said second party to said first party After Carol provides Alice’s sales experience and college degree to Bob and provides Bob&rsq;s salary offer and sales position available at Bob’s company to Alice, Carol gives Alice’s name to Bob upon determining that Bob’s company is offering at least $75,000 in salary and tells Alice the name of Bob’s company upon determining that Alice has more than 5 years of sales experience

As a result of its review of the chart, the Walker Digital court concluded:

Even after carefully reviewing the parties’ briefs and the patents, and questioning the parties about Google’s hypothetical at the hearing, the Court is unable to discern any reason why, in Google’s hypothetical, Carol would not be liable for infringement of Walker’s ’270 patent. Based on the undisputed evidence, and drawing all reasonable inferences in Walker’s favor, the Court concludes that every step of claim 1 of the ’270 patent is performed in Google’s routine headhunting hypothetical. It follows that all the steps of the ’270 patent are routine and []conventional. To allow the claim to survive would disproportionately risk preempting a building block of human interaction, retarding rather than promoting progress, contrary to the very purpose patents are granted.

Accordingly, the court held the patent invalid.

Here is another example, taken from commentary[7] on a business-method patent claim at issue in Intellectual Ventures I LLC v. Manufacturers & Traders Trust Co.[8]

Language of Claim 21 A haberdashery store where Ms. Alice waits on crusty old Mr. Bob
A method comprising:  
receiving data from a user profile associated with a user; Ms. Alice remembers having waited on Mr. Bob before, and recalls that he is a conservative and stodgy old customer
in response to a request associated with the user, sending a data stream that is selected based at least in part on the received data from the user profile; and Bob says that he needs to buy a necktie. Alice listens to Bob’s request and decides to show him some ties based on her recollection of his taste
displaying the data stream via an interactive interface, the interactive interface comprising: Alice thinks about Bob’s previous visits to the store; she recalls the experience
a display depicting portions of a web site visited by the user as a function of web site navigation data; and Alice mulls over Bob’s previous shopping visits and his past preferences for neckties (stodgy, conservative); she decides that she will show him that kind of necktie
a display depicting portions of a web site visited by the user based at least in part on the received data from the user profile Alice shows Bob a selection of stodgy, conservative neckties of the type he has previously shown a disposition to buy

References

  1. Such charts also appear in patent litigation outside the US, e.g. the UK IPEC: "It is likely to be necessary to break down a patent claim into suitable integers (i.e. separate parts) in order to explain a case on infringement with reference to specific elements of the alleged infringing product or process. This may be most conveniently done in the form of a table or chart annexed to the statement of case." (The Intellectual Property Enterprise Court Guide, April 2014)
  2. These charts often contain diagrams of the relevant elements, to show that the device contains the element as recited in the claim. See, for example, this infringement chart.
  3. Albeit not parsed as carefully as here; in contrast to the actual MPEP 2214 example, the chart here has broken down the claim into limitations, and has split the corresponding quotation into parts corresponding to each limitation.
  4. Alice and Bob are typical protagonists of computer science and cryptography hypothetical cases, comparable to John Doe and Richard Roe in legal hypothetical cases. See, e.g., Alice and Bob; Security protocol notation.
  5. See KENEXA BrassRING, INC. v. HireABILITY.COM, LLC (D. Mass Apr. 28, 2015) ("However, Alice made clear that the underlying principle behind both cases was that patents directed only to 'organizing human activity' are invalid."); Open Text S.A. v. Box. Inc. (N.D. Cal. Jan. 20, 2015) ("a 'method of organizing human activity' [is] an unpatentable abstract idea"); Amdocs Ltd. v. Openet Telecom, Inc. (E.D. Va. Oct. 24, 2014) ("A claim directed to 'a method of organizing human activity' seems presumptively patent ineligible."); see also Planet Bingo, LLC v. VKGS LLC, 576 Fed. App'x 1005, 1008 (Fed. Cir. 2014) (nonprecedential) (holding that methods and systems for "managing a game of Bingo" were similar to "organizing human activity" and therefore directed to a patent-ineligible abstract idea).
  6. 2014 WL 4365245 (D. Del. Sept. 3, 2014). See also Joao Bock Transaction Systems, LLC v. Jack Henry & Associates, Inc., 2014 U.S. Dist. LEXIS 172567 (D. Del. Dec. 15, 2014).
  7. George Washington Computer Law.
  8. 2014 U.S. Dist. LEXIS 174725 (D. Del. Dec. 18, 2014).
This article is issued from Wikipedia - version of the Wednesday, October 14, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.