[00:00:41] Speaker 01: Our final case this morning is number 16-2193 Preservation Wellness versus Halls Crips Healthcare, Ms. [00:01:08] Speaker 01: Zagali. [00:01:09] Speaker 04: Good morning, Your Honors. [00:01:11] Speaker 04: May it please the court, I am Nicole Galley. [00:01:13] Speaker 04: I am here on behalf of the Appellant Preservation Wellness Technologies. [00:01:17] Speaker 04: I've requested five minutes for rebuttal. [00:01:19] Speaker 04: Your Honor, as you seem like you want to get to the heart of the issue, and I'd like to do the same. [00:01:23] Speaker 04: What's inventive about my client's patents? [00:01:25] Speaker 04: Why should we be allowed to go forward? [00:01:30] Speaker 04: I think this case turns on a central issue, which is whether the use of a two-way firewall in the claims of this patent is inventive. [00:01:39] Speaker 04: sufficient to render the claims patent eligible. [00:01:42] Speaker 04: I submit that the court did not reach the right result. [00:01:45] Speaker 04: Obviously, that's why we're here, for the following reasons. [00:01:50] Speaker 04: In essence, your honors, when you look at the opinion, what the court concluded was that the two-way firewall in the patent was a conventional piece of software. [00:01:59] Speaker 04: And here's where the real problem is, that it was being used in a conventional manner for conventional functions and purposes. [00:02:06] Speaker 04: And that's where the whole real heart of the dispute is at this point. [00:02:10] Speaker 04: First of all, a two-way firewall as a factual matter. [00:02:15] Speaker 02: Chancellor, on the 271 panel, the limitations on the claims to me appear to be wholly functional. [00:02:23] Speaker 02: And I think that creates a problem, and I think that's what Judge Bryson was focusing on. [00:02:28] Speaker 04: I understand that, Your Honor. [00:02:29] Speaker 04: We spent quite a bit of time discussing the functional nature of the claims, except that's not entirely accurate. [00:02:34] Speaker 04: And for the core reason that the tools that are being used, the pieces of computer equipment or programs that are being used to carry out those functions, are different than what you would normally and ordinarily find [00:02:48] Speaker 04: being used to carry out those particular functions. [00:02:50] Speaker 04: So I agree with you that there are certainly plenty of functional limitations in the claim. [00:02:54] Speaker 02: But the two-way firewall is... It's not enough to claim the tool. [00:02:58] Speaker 02: You have to show how the tool will work or what the tool is doing. [00:03:02] Speaker 04: It does, Your Honor. [00:03:03] Speaker 04: It says that the two-way firewall is performing certain functions. [00:03:07] Speaker 04: And that's where I was going. [00:03:08] Speaker 04: What are the functions that a two-way firewall will normally perform in a system such as this? [00:03:16] Speaker 04: Three items. [00:03:17] Speaker 04: First of all, where is it located? [00:03:19] Speaker 04: And that is actually key to the whole inventive part of this claim. [00:03:23] Speaker 04: It's located usually at the perimeter of a network. [00:03:26] Speaker 04: And it's not located usually at the user interface. [00:03:28] Speaker 04: And that's another part of this. [00:03:30] Speaker 01: Where do the claims talk about the location of it? [00:03:34] Speaker 04: And they talk about it by the fact that it's the two-way firewall that is performing these functions. [00:03:40] Speaker 04: But it doesn't say where it's located, does it? [00:03:43] Speaker 04: The claims themselves. [00:03:44] Speaker 04: do not, you say where it's located. [00:03:47] Speaker 04: However, it is absolutely clear when you look at numerous points, number one in the specification, that it's located at the server level. [00:03:55] Speaker 04: It's not located at the user interface level. [00:03:56] Speaker 01: I was trying to mention in the claims tab that we construe the claims as being limited in that way, particularly when we're applying the VRI standard. [00:04:05] Speaker 04: Well, Your Honor, [00:04:07] Speaker 04: There is no claim construction permitted in this case. [00:04:09] Speaker 04: We submitted a claim construction which the court said that he adopted, which includes the location. [00:04:14] Speaker 03: Can I just for a second? [00:04:14] Speaker 03: Because claim one says a server which includes a two-way firewall program. [00:04:18] Speaker 03: So I actually think that you are factually wrong when you tell Judge Dyke that the claim doesn't say where the two-way firewall is. [00:04:24] Speaker 04: I apologize, Your Honor. [00:04:26] Speaker 04: You are correct. [00:04:26] Speaker 04: It does say it's on the server. [00:04:28] Speaker 04: That's absolutely right. [00:04:29] Speaker 04: And my apologies, Your Honor. [00:04:31] Speaker 04: It's not simply in the specification. [00:04:33] Speaker 04: That is absolutely accurate. [00:04:34] Speaker 04: I got that incorrect. [00:04:37] Speaker 04: So that's in fact correct. [00:04:38] Speaker 04: It is actually saying that it is on the server. [00:04:40] Speaker 04: And then when you look back at figure one, it shows that the server is not where the user interface is located. [00:04:46] Speaker 04: That's located on the client end. [00:04:48] Speaker 04: And that's what we were attempting to get at by talking about middleware. [00:04:54] Speaker 04: Where does it say where the server is located, Your Honor? [00:04:56] Speaker 02: The claim. [00:04:58] Speaker 04: In the claim, let me pull that up. [00:05:02] Speaker 04: And I am going to be referring [00:05:06] Speaker 04: to appendix at 82. [00:05:11] Speaker 04: Well, Your Honor, if you read through it, it talks about this being a network. [00:05:19] Speaker 04: And it talks about that within the network there is a patient access computer device. [00:05:25] Speaker 04: And then separately, it talks about there being a server. [00:05:28] Speaker 04: And that inherently implies that these are two different parts of the system. [00:05:34] Speaker 02: and two different locations. [00:05:38] Speaker 04: Well, as I understand how computers work, Your Honor, in theory, all of these things, I suppose, if it were one closed system, could all be on one particular piece of hardware. [00:05:48] Speaker 02: Hold on just a minute. [00:05:49] Speaker 02: That could be, but what we're interested in is not our various opinions. [00:05:54] Speaker 02: It's what are the claims directed to? [00:05:57] Speaker 02: And you start off by saying that the functions [00:06:03] Speaker 02: are explained, or you have rules within the functions. [00:06:07] Speaker 02: Now, one of them is the location of the firewall. [00:06:11] Speaker 02: That turned out not to be correct, but you said that it's located in a different area than normally it's in the server. [00:06:19] Speaker 02: I asked you, well, do the claims show where the server's located? [00:06:23] Speaker 02: And you said yes, but they don't. [00:06:27] Speaker 04: Well, Your Honor, they are distinguishing between the client interface [00:06:32] Speaker 04: and where the two-way firewall is located. [00:06:35] Speaker 04: It does not say that the patient access computer is on the server. [00:06:39] Speaker 04: It distinguishes that. [00:06:41] Speaker 04: So I do believe that it shows that they are in different parts of the system. [00:06:44] Speaker 03: But even if they're following up on, I believe, both of my colleagues' points, even if it's located in the server, as Judge Raina suggests, that doesn't tell us precisely where it's located. [00:06:57] Speaker 03: What you argued to us in your brief [00:06:59] Speaker 03: It is located in middleware, and that's really a critical distinction between prior uses of firewall and this use of firewall is located in middleware. [00:07:08] Speaker 03: I don't find that word in the specification. [00:07:10] Speaker 03: I find no evidence that this firewall is located in the middleware, maybe located in the server. [00:07:16] Speaker 03: But that's not good enough for you to prevail. [00:07:18] Speaker 03: You went much further in your briefs and said that the location is very precise. [00:07:22] Speaker 03: I don't see that in the claims, and it's definitely not in the claims, but I don't see it in the specs. [00:07:26] Speaker 04: Well, Your Honor, I think there is a disconnect here. [00:07:31] Speaker 04: And let me see if I can address that. [00:07:33] Speaker 04: I'm actually saying it is correct. [00:07:35] Speaker 04: I'm actually saying that firewalls are normally located in the middleware, and that that is where the firewall, where the middleware concept is coming from. [00:07:44] Speaker 04: Where I'm talking about the location difference is where the type of software that is normally performing the functions that are being called out is located. [00:07:54] Speaker 04: That is not firewall software normally. [00:07:57] Speaker 04: And that is usually user interface software. [00:08:00] Speaker 04: And it's located in a different place from where the firewall software is. [00:08:04] Speaker 02: So that is a disagreement. [00:08:06] Speaker 02: So middleware does not appear in the claim? [00:08:08] Speaker 04: Absolutely not, Your Honor. [00:08:09] Speaker 04: That was something that we were going to proffer expert testimony to support. [00:08:12] Speaker 04: Or in the spec. [00:08:16] Speaker 04: It does not appear in the prosecution history either, Your Honor. [00:08:18] Speaker 04: I will absolutely grant that. [00:08:20] Speaker 02: Why do you argue it here before us, if you know that? [00:08:23] Speaker 04: Because, Your Honor, we were asked to provide a claim interpretation, that claim interpretation would have been supported by expert testimony had we been allowed to have a hearing. [00:08:32] Speaker 04: I'm bound by what we presented to the court in good faith. [00:08:35] Speaker 04: And I had presented an offer of proof, in essence, that if I had been allowed to proceed, I would have presented extrinsic evidence that would have supported what one of ordinary spoiling the art would have understood reading these claims, reading the specification and the prosecution history. [00:08:51] Speaker 04: There are certainly clues that one of Ordinary Skill in the Art would look at and that we did look at, such as where the fact that the firewall was located on a server, that there is a distinct place within the system called a user interface. [00:09:06] Speaker 04: And then when you look at the prosecution history, for example, you see that Mofagi is operating in the user interface and the USPTO held [00:09:17] Speaker 04: that the client's invention was allowable because a two-way firewall was not, therefore, shown by what was happening with Mofege with this graphical user interface that was taking this performance. [00:09:27] Speaker 01: And that's what the expert was going to testify about, was how to interpret the prosecution history? [00:09:31] Speaker 04: Not at all, Your Honor. [00:09:32] Speaker 04: The expert was going to provide the word middleware as being what was being defined by what was in the prosecution history. [00:09:41] Speaker 01: But I guess the question that I'm getting at is there's nothing in the claims about it, nothing in the specification about it, nothing in the prosecution history. [00:09:49] Speaker 01: Why can't we, on appeal, simply say the intrinsic evidence suggests that the claims include a middleware limitation and a problem? [00:10:00] Speaker 04: And I am fine with that, actually, Your Honor. [00:10:02] Speaker 04: We do not need to rest upon middleware in order for this appeal to be successful. [00:10:09] Speaker 04: Because if you look solely at the specification at the claim, which I misspoke earlier, which shows that there is a distinction between the client end of the system and the server, which is where the firewall is residing. [00:10:22] Speaker 04: If you're looking at what firewalls normally do, which we [00:10:27] Speaker 04: I don't think there was any dispute about what the firewalls normally do, which even in the opinion, the court does state that they normally block wholesale access by users, programs and software and data into the system, and again, wholesale access by those same types of things out of the system. [00:10:49] Speaker 04: That's not what's happening here. [00:10:53] Speaker 04: is operating at a much more granular level. [00:10:56] Speaker 04: So we can, for the moment, and I'm happy for the sake of argument, to not talk about where it's located at this moment. [00:11:03] Speaker 04: But gee, Stephen, to focus on the functions alone, the functions that are being performed by this firewall are different than what you would normally see a firewall performing. [00:11:13] Speaker 04: And that alone is inventive. [00:11:15] Speaker 04: How so? [00:11:16] Speaker 04: Because again, this particular software is making determinations about [00:11:22] Speaker 04: an authorized user. [00:11:23] Speaker 04: So you already have the password system in the claim, and it's letting in an authorized user. [00:11:29] Speaker 04: And then it's determining what type of authorized user can see what type of information. [00:11:35] Speaker 04: And then particularly when you look down, for example, to claim 14, it says that another user, if you want to call them a super user, can make changes in what information that the patient user can see. [00:11:47] Speaker 04: And these are not functions that you would normally find a two-way firewall performing. [00:11:52] Speaker 02: Don't you concede below that firewall is a conventional computer system? [00:11:57] Speaker 04: No, Your Honor. [00:11:58] Speaker 04: I know that there is talk in the opinion about concessions. [00:12:01] Speaker 04: What we said was it was pled in the alternative. [00:12:03] Speaker 04: It was argued throughout the transcript in the alternative that it may not be a conventional two-way firewall. [00:12:10] Speaker 04: But we are willing to say that even if it is a conventional two-way firewall, [00:12:15] Speaker 04: Under cases such as Bascom, you can have, and there are others, you can have completely conventional components. [00:12:22] Speaker 04: You can have a claim, as they did in Bascom, where every single one of the components there was conventional, but it was operating in a non-conventional manner. [00:12:29] Speaker 04: And that's the heart of what our argument is, that the two-way firewall here is not operating to do what two-way firewalls normally do, but to do a different set. [00:12:39] Speaker 02: So you did concede, and you concede it just now, that it's conventional software. [00:12:44] Speaker 02: that a firewall is convention, right? [00:12:46] Speaker 02: You're saying, but in this case, it's being used in a non-conventional way. [00:12:52] Speaker 04: I am not conceding that point, Your Honor. [00:12:54] Speaker 04: I am conceding that even if this court were to hold that it were conventional, we would still win because it's not being used in a conventional manner. [00:13:02] Speaker 03: Can you say you're not conceding that at page 291 of the appendix? [00:13:04] Speaker 03: I mean, I think this is you. [00:13:06] Speaker 03: Are you sure? [00:13:08] Speaker 03: The right person? [00:13:11] Speaker 03: Is this you at page 291 of the appendix? [00:13:15] Speaker 03: yes your honor the court's asking you what it does reach of this patent and you go through and explains that it is a two-way firewall program which is conventionally found and then you go through and explains that a firewall prevents [00:13:29] Speaker 03: certain types of users from getting into all of the systems, and it prevents certain types of information and malware and whatnot from getting in. [00:13:36] Speaker 03: Two-way firewall also has a known meaning, which again, at a network level, prevents certain stuff from getting out. [00:13:42] Speaker 03: It could be information, yada, yada, yada. [00:13:45] Speaker 03: This is what you represented to the court below. [00:13:47] Speaker 03: This wasn't a concession. [00:13:48] Speaker 03: This wasn't like, OK, Your Honor, even if you conclude it's conventional, he said, what does it do in the reach of this patent? [00:13:54] Speaker 03: And you explained it. [00:13:56] Speaker 04: Your Honor, again, [00:13:57] Speaker 04: We have stated from the very beginning in our brief that this could be used as a conventional two-way firewall. [00:14:05] Speaker 04: I am not prepared, nor have I been authorized, to concede that if we were allowed to proceed with the case, Your Honor, we would make a showing that it may also not be a conventional two-way firewall. [00:14:17] Speaker 04: I don't have that record. [00:14:18] Speaker 04: I'm here on a motion to dispense. [00:14:19] Speaker 02: Was this two-way firewall available at the time of the patent application? [00:14:25] Speaker 04: Your Honor. [00:14:27] Speaker 04: To my knowledge, because you could use a conventional, we don't disagree, you could use a conventional two-way firewall for this purpose and adapt it. [00:14:36] Speaker 04: Yes, I think that is one possibility. [00:14:38] Speaker 02: So Judge Bryson stated at Appendix 19, he says, preservation conceded at the hearing on the motions to dismiss that the two-way firewall is a conventional computer program that was available at the time of the patent application. [00:14:54] Speaker 04: Your Honor, again, we have never disagreed that a conventional two-way firewall, I'm not saying it's the only one that would be encompassed by the claims, but a conventional two-way firewall is being used, I should say, in this claim in an unconventional manner. [00:15:10] Speaker 04: And that's where I think the real part of the argument lies. [00:15:13] Speaker 04: I'd like to reserve my remaining time for rebuttal. [00:15:19] Speaker 01: Thank you, Ms. [00:15:20] Speaker ?: Galley. [00:15:22] Speaker 01: Mr. Rao? [00:15:23] Speaker 01: Good morning, Your Honors. [00:15:33] Speaker 00: May it please the court? [00:15:35] Speaker 00: I think you've heard kind of the nub of it, which is if there is a conventionally known two-way firewall, and then there is potentially an unconventionally known two-way firewall. [00:15:47] Speaker 00: What are the differences between the two, other than the stated functions that have been offered by the patentee? [00:15:54] Speaker 00: And when you look at the specification, there is no guidance as to how those functions that are being performed that are identified in the claim construction provided by the patentee. [00:16:09] Speaker 00: How are those functions being performed, and how are [00:16:15] Speaker 00: the differences between the two manifest in the technology. [00:16:18] Speaker 00: How are they implemented? [00:16:19] Speaker 00: What is the way in which the particular programming is done? [00:16:24] Speaker 00: What's the way in which the software is designed to accomplish that result? [00:16:29] Speaker 00: What we really have is we have merely claiming a functional result. [00:16:33] Speaker 00: You have a claim that's directed to the resulting system. [00:16:37] Speaker 00: And so what we're left with when we focus on the entire middleware issue is not only are there [00:16:44] Speaker 00: no mentions of the benefits of locating the two-way firewall on any given spot on the server, whether middleware or what's sometimes being called the user interface level. [00:16:57] Speaker 00: There's no discussion at all of either of those two locations within the patent. [00:17:01] Speaker 00: And if you talk about how it might compare or not compare to Bascom, Bascom was an invention that was directed to an unconventional way of arranging [00:17:10] Speaker 00: conventional components, so it's allowed the exploitation of specific technical features. [00:17:15] Speaker 00: In Bascom, there were features that were identified. [00:17:18] Speaker 00: There was technical disclosure. [00:17:20] Speaker 00: There were flow charts. [00:17:22] Speaker 00: And then they explained the exploitation of specific technical features of the components to produce a specific technical result over the prior art. [00:17:31] Speaker 00: Here, we don't have the exploitation of specific technical features. [00:17:36] Speaker 00: Some of them aren't even disclosed. [00:17:38] Speaker 00: And we certainly don't have an explanation as to how they're an improvement over the prior art. [00:17:42] Speaker 00: So from the perspective of the appellees, it's not a close call in saying that this case is distinguishable from Bascom. [00:17:54] Speaker 00: Taking the arguments directed specifically to the middleware, I think the lower court had the better of the argument in regard to how to manage the middleware. [00:18:05] Speaker 00: The district court said, [00:18:06] Speaker 00: The two-way firewall suffers from an added infirmity beyond just the fact that it's claimed functionally. [00:18:12] Speaker 00: It says it's the location of the middleware. [00:18:15] Speaker 00: And the court said, although that feature, its location in the middleware, is nowhere found in the 271 patent, either in the claims or in the specification, preservation argues that it's an inherent feature of the two-way firewall program. [00:18:30] Speaker 00: Well, that's a bit of a challenge in having that be relied upon for the inventive concept. [00:18:35] Speaker 00: And the district court laid out the two options in the inherency argument as they saw them. [00:18:39] Speaker 00: They said either there's no structure, in which case it's defined purely functionally, as providing tiered access to patients and physicians and adds nothing to the inventive concept. [00:18:49] Speaker 00: Or alternatively, it does have structure, but that definition is so well known that it need not be described in a patent to be understood by a person of ordinary skill in the art. [00:18:59] Speaker 00: In that instance, the structure it said is simply a conventional structure [00:19:03] Speaker 00: that functions in a well-known manner. [00:19:05] Speaker 00: So in either of those two options, we're left in a position where we're unable to look to the location of the two-way firewall and the middleware as being the type of transformative piece of an inventive concept that would move it out of the abstract idea. [00:19:25] Speaker 00: And I'll also point to pages 32 and 33 of the Blue Brief, where preservation furthers its argument about the [00:19:33] Speaker 00: the special nature of the location of the two-way firewall in the middleware as opposed to at the user interface level and says that it enhances the security. [00:19:42] Speaker 00: Now when you look at the teaching in the patent, the patent has a small disclosure regarding security that's on appendix 82 as the page number, column 13, lines 45 through 55 have two concepts about security mentioned. [00:20:02] Speaker 00: that the server itself is secure. [00:20:04] Speaker 00: And that's a well-known item from the prior art. [00:20:07] Speaker 00: And the second is it says that the security that would be gained by this invention would be that you wouldn't carry around your medical records on your person, and that the security provider was the access over the internet in a secure manner. [00:20:24] Speaker 00: So even within the patent itself, when we look outside of the claims to try to find the teachings in regard to security, [00:20:31] Speaker 00: They're not focused on the type of security that we're hearing about in the briefing. [00:20:38] Speaker 00: Further to that, to the extent the specification is talking about the benefits or not of having security, it's clearly not talking about the location. [00:20:52] Speaker 00: There was also reference to the Markman and whether or not that process would have changed the result. [00:21:01] Speaker 00: We look at the process in which the lower court decided to accept the claim construction as provided. [00:21:08] Speaker 00: And while we believe the construction would be inconsistent with one that would be given by a full process, since the construction was picked by preservation, I don't think there could be any legitimate argument as to the content of that construction. [00:21:23] Speaker 00: And we believe that the construction was adopted in full by the lower court and assessed on its merits. [00:21:31] Speaker 00: And the process that was used below, which included a full deliberation not just of the individual elements, but the combined elements of the invention, the ordered combination, we also think was fully proper. [00:21:48] Speaker 00: So in light of the record below being so robust on that analysis, we believe that the criticisms from preservation after that process [00:22:01] Speaker 00: are misplaced. [00:22:03] Speaker 00: Do you have anything further? [00:22:04] Speaker 00: No, I'm going to relinquish the rest of my time unless you have any questions, Your Honor. [00:22:07] Speaker 00: I think we don't. [00:22:07] Speaker 00: Thank you. [00:22:08] Speaker 00: Thank you. [00:22:10] Speaker 01: Ms. [00:22:10] Speaker 01: Golley? [00:22:12] Speaker 04: Thank you. [00:22:15] Speaker 01: Thank both counsels. [00:22:16] Speaker 01: The case is submitted. [00:22:17] Speaker 01: That concludes our session.