Privacy Tip #219 – FBI Considers FaceApp a Counterintelligence Threat

For those of you who have downloaded the face editing app FaceApp, please note that the Federal Bureau of Investigation (FBI) has classified FaceApp as a counterintelligence threat because of its Russian origins.

According to the FBI, “[T]he FBI considers any mobile application or similar product developed in Russia, such as FaceApp, to be a potential counterintelligence threat, based on the data the product collects, its privacy and terms of use policies, and the legal mechanisms available to the Government of Russia that permit access to data within Russia’s borders.”

When the FBI considers an app a security threat to the U.S., we all should. Downloading apps, in general, is risky, but downloading apps based in foreign countries that are trying to obtain information about U.S. citizens – and in fact are obtaining information from unwitting U.S. citizens – is potentially putting us in danger.

Now is the time to perform app hygiene. Check the apps on your phone to determine whether you are using them or not. If you aren’t using them, delete them. There is no reason to continue to allow them to collect your information if you are not using them and getting a benefit from them. If you are using them and can’t live without them, do some due diligence to determine the background of the app, read the Privacy Policy and Terms of Use to know what they are collecting and using about you, and delete the app if your gut tells you something’s not right. If you have downloaded FaceApp, that would be the first one to delete.


Copyright © 2019 Robinson & Cole LLP. All rights reserved.

CPSC Staff Addresses IoT 2018 Hearing Feedback, IoT Project Plans in New Report

Connected products can make the world a safer place: electronic sensors in the home can detect problems and send smartphone notifications to the homeowner; smart alert devices can notify family members or home help companies that an elderly person has fallen and needs assistance. But with over 64 billion connected products in the marketplace, there is a concern that connected devices could introduce hazards that might lead to a risk of injury due to problems with software updates or customization, faulty connections, and even consumer modifications.

As the body charged with overseeing consumer product safety in the U.S., over the last few years, the Consumer Product Safety Commission (CPSC) has shown an increasing interest in defining its role with regard to connected products. In May 2018, the CPSC held a public hearing on IoT, obtaining feedback from a range of stakeholders on potential risks of connected consumer products and the agency’s role. In late September, CPSC staff submitted to the Commission a status report outlining the CPSC’s work on consumer product IoT issues since the public hearing. The report also outlines how CPSC staff understands the agency’s role, which is safeguarding consumers from potential physical product risks, as well as how its work intersects with the jurisdiction of other agencies as they oversee connected products.

The report notes that this is an ongoing process, stating that CPSC staff is working on “how to define consumer product safety in terms of the IoT, the intersection of, and interdependencies among, consumer product safety, data security and privacy, and how our traditional risk management approaches apply to connected products.” The report acknowledges that privacy and data security are not within CPSC’s jurisdiction, but noted that at least one participant in CPSC’s 2018 hearing warned that “CPSC should pay attention to certain cybersecurity threats that create opportunities for physical harm, a risk not previously considered, and resist creating any prescriptive rules for IoT devices.”

To increase institutional knowledge of IoT benefits and challenges, CPSC has dedicated resources to develop its staff’s expertise. CPSC has also participated in developing voluntary standards, has taken a leadership role in establishing an interagency IoT working group, and has been developing its capability to simulate home networks at its laboratory.

The staff report outlines three ongoing internal projects relating to IoT. The first involves developing a methodology for assessing safety-related implications arising out of software and firmware updates to connected products. This project is at what CPSC views as the intersection of product safety and data security and potential “hazardization” of connected products as a result of data vulnerabilities. CPSC is also looking at connected heating appliances and the risks associated with their remote activation. Finally, CPSC is studying smart toys “in an effort to identify physical safety hazards.” It is surprising that CPSC staff would dedicate resources to toys as opposed to other products, like in-home safety devices, since the physical safety of toys is strictly regulated by the mandatory toy safety standard, ASTM F-963. The likelihood of physical hazardization of toys is far lower than, for example, connected home security devices and sensors. In those categories, connectivity, and thus security breaches that affect the operation of those devices, may be directly related to both safety risks and advantages. Indeed, home safety devices is a category where we have actually seen CPSC recall activity.

The report notes that CSPC is engaging in product safety assessments of connected& shared e-scooters. This is likely in response to reports of e-scooters that were vulnerable to hacking. The emerging hazards of micro-mobility devices such as shared e-scooters are also a focus of CPSC’s Operating Plan for Fiscal Year 2020 and represent another product category that appears to be more vulnerable to hazardization than connected toys.

CPSC staff intended to develop a best practices guide for industry and consumers on connected products, which was an enumerated project in the proposed Operating Plan for Fiscal Year 2020. However, an amendment introduced by Commissioner Feldman focuses CPSC’s resources on IoT intergovernmental work instead. Given the report’s acknowledgment that the agency is still working to develop staff expertise in IoT, attempting to create such a guide appears premature at this juncture.

The sharp increase in the number of connected devices in the market means it is necessary and appropriate for CPSC to continue to build expertise on IoT issues, even though very few examples of actual product safety hazards attributable to some type of connectivity failures exist. It would be useful for CPSC to focus its efforts and resources on product categories that pose a higher potential risk to the physical safety of consumers through hazardization or failure as a result of connectivity, without overstating potential risks. It is encouraging that through the intergovernmental initiatives a variety of federal agencies are working collaboratively to better understand the various consumer protection issues potentially raised by connected products that fit within their respective jurisdictions.


© 2019 Keller and Heckman LLP

For more CSPC regulation, see the National Law Review Consumer Protection law page.

Is Your Iphone Spying on you (Again)?

In the latest installment of this seemingly ongoing tale, Google uncovered (for the second time in a month) security flaws in Apple’s iOS, which put thousands of users at risk of inadvertently installing spyware on their iPhones. For two years.

Google’s team of hackers – working on Project Zero – say the cyberattack occurred when Apple users visited a seemingly genuine webpage, with the spyware then installing itself on their phones. It was capable of then sending the user’s texts, emails, photos, real-time location,  contacts, account details (you get the picture) almost instantaneously back to the perpetrators of the hack (which some reports suggest was a nation state). The hack wasn’t limited to Apple apps either, with reports the malware was able to extract data from WhatsApp, GoogleMaps and Gmail.

For us, the scare factor goes beyond data from our smart devices inadvertently revealing secret locations, or being used against us in court – the data and information the cyberspies could have had access to could wreak absolute havoc on the everyday iPhone users’ (and, the people whose details they have in their phones) lives.

We’re talking about this in past tense because while it was only discovered by Project Zero recently, Apple reportedly fixed the vulnerability without much ado in February this year, by releasing a software update.

So how do you protect yourself from being spied on? It seems there’s no sure-fire way to entirely prevent yourself from becoming a victim, or, if you were a victim of this particular attack, to mitigate the damage. But, according to Apple,  “keeping your software up to date is one of the most important things you can do to maintain your Apple product’s security”. We might not be ignoring those pesky “a new update is available for your phone” messages, anymore.


Copyright 2019 K & L Gates

ARTICLE BY Cameron Abbott and Allison Wallace of K&L Gates.
For more on device cyber-vulnerability, see the National Law Review Communications, Media & Internet law page.

Patent Damages: How Many Essential Features in a Smart Phone?

On March 20, 2018, the public version of Eastern District of Texas Magistrate Judge Roy Payne’s March 7, 2018 order tossing a $75 million jury verdict obtained by Ericsson against TCL Communication was released.  Ericsson Inc., et al, v. TCL Communication Technology Holdings, Ltd., et al, Case No. 2:15-cv-00011-RSP, Doc. No. 460 (redacted memorandum opinion and order) (E.D. Tex. March 7, 2018) (“Order”).  Judge Payne’s order sheds important light on the damages analysis for infringement of patents covering features of smartphone technology and potentially provides lessons to future litigants seeking damages for smartphone innovations.

After a jury verdict finding infringement, Ericsson also won a damages verdict of $75M due to TCL’s ongoing and willful infringement of U.S. Patent No. 7,149,510 (“the ’510 patent”).  Ericsson contended that the ’510 patent covers smartphone functionality that allows a user to grant or deny access to native phone functionality to a third-party application, which is a standard feature in all Android smartphones.  After trial, TCL moved for judgment as a matter of law on infringement and damages, or in the alternative new trials.  Judge Payne indicated that he was going to uphold the infringement verdict, but ordered a new trial on damages.  Order at 1.

Ericsson’s damages case relied on two experts: Dr. Wecker and Mr. Mills.  Dr. Wecker analyzed a consumer survey that attempted to approximate the apportioned value of the patented feature in the accused products.  Mr. Mills determined a royalty rate based both on that apportionment and on a hypothetical negotiation between Ericsson and TCL.  Dr. Wecker determined that 28% of TCL customers would not have purchased a TCL smartphone if the smartphone did not have the patented feature in the ’510 patent.  This would have resulted in a loss of 28% of TCL’s sales and profits.  From this, Mr. Mills determined that the at-risk profit for TCL was $3.42 per device sold by TCL, which is the average profit per device for all accused devices, after a 28% loss rate discount.  Mr. Mills determined that during the hypothetical negotiation Ericsson would have recovered nearly all of the at-risk profit, likely obtaining a rate of $3.41 per device, but in any event would have secured no less than half of the at-risk profits, or $1.72 per product.  These rates would have justified a damages award ranging from $123.6M to $245M for damages across the life of the ’510 patent.  Mr. Mills further determined that the parties would have negotiated a lump sum payment discount for both pre-trial and post-trial infringement rather than a running royalty. Based on this expert testimony, the jury awarded Ericsson a $75M lump sum.

Judge Payne threw out the jury’s award for two reasons.  First, Judge Payne found error in Ericsson’s argument that TCL would have settled up front with a lump sum covering the entire royalty for the projected future sales of 111 million smartphones during the remaining life of the ’510 patent.  According to Judge Payne these products could not be part of the infringement base because they did not exist at the time of trial and could not have been adjudicated to infringe.  These future products could not be part of a damages order.  See Order at 12-14.

But the real meat of Judge Payne’s order is in his other justification for throwing out the damages verdict.  Judge Payne faulted Ericsson for painting the consumers’ choice of whether to buy a TCL phone as a binary decision based on the presence of the accused feature.  Judge Payne noted that the case originally had five patents and consumer surveys were done which noted that if each feature of three of the asserted patents was missing from TCL products, TCL would have lost 64% of its profits due to sales lost due to the absence of those features.  Judge Payne concluded that each of these features individually could not be responsible for a quarter of TCL’s profits per phone, and noted the following:

It is not difficult to see how this lost profit number quickly becomes unrealistic. Subtracting just three features covered by a mere three implementation patents would have allegedly cut TCL’s profit by more than half. The evidence from both sides suggested that there were at least a thousand implementation patents that might cover a TCL phone.  Regardless of the number, there is no dispute that a phone with an Android-operating system has many patented features, and that, according to Dr. Wecker’s survey results, consumers would likely find numerous features essential. According to Mr. Mills, any one of these allegedly essential features could independently be worth more than a quarter of TCL’s profit on the phone. By removing even three additional features covered by an implementation patent, on top of the features allegedly covered by the ’510, ’931, and ’310 patents, TCL would have lost all its profit (conservatively), according to Mr. Mills’ theory.

Order at 10-11 (emphasis added) (internal citations omitted).  Judge Payne faulted Ericsson for not considering that a consumer’s decision to purchase or not purchase a phone would be based on whether numerous features were included, not just the ones covered by the asserted patents, and that Ericsson’s theory would erode all of TCL’s profits.  See Order at 11.  The judge further noted that:

To conclude that any one of these features—simply because it is considered essential to a consumer—could account for as much as a quarter of TCL’s total profit is unreliable and does not consider the facts of the case, particularly the nature of smartphones and the number of patents that cover smartphone features.

Order at 11.  Put simply, Judge Payne found that a single feature could not possibly account for $75M in damages for TCL’s smartphones, particularly in view of the many other features that are subject to patent protection.  Judge Payne noted that both sides agreed that Ericsson possessed potentially at least a thousand patents covering features of TCL phones.  Order at 10.  To Judge Payne, it could not possibly be the case that each of these patents accounted for 25% of the profits made by TCL.

This decision underscores the importance of securing a defensible damages analysis, especially in the context of the multifaceted technology embodied in modern smartphones.  Judge Payne’s concerns in his non-precedential opinion seemed to flow largely from unstated anxiety relating to royalty-stacking that made the logical extrapolation of the experts’ rubric unreasonable and erroneous.  In this context, it will be interesting to see how Ericsson recasts its damages theory in the next round of this litigation. We will continue to follow this case to see the approach, as we fully expect a notice of appeal to the Federal Circuit from Ericsson.

 

©1994-2018 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.

Yelling at Your Smartphone Could Get You Fired!

Schrage describes how adaptive bots enable devices to learn from each encounter they have with humans, including negative ones, such as cursing at Siri or slamming a smartphone down when it reports about one restaurant, though the user was searching for a different eating place. Faced with repeated interactions like this, the bot is likely to be adversely affected by the bad behavior, and will fail to perform as intended. As companies leverage more of this technology to enhance worker productivity and customer interactions, employee abuse of bots will frustrate the company’s efforts and investment. That can lead to reduced profits and employee discipline.

Employees are seeing some of this already with the use of telematics in company vehicles. Telematics and related technologies provide employers with a much more detailed view of their employees’ use of company vehicles including location, movement, status and behavior of the vehicle and the employees. That detailed view results from the extensive and real time reports employers receive concerning employees’ use of company vehicles. Employers can see, for example, when their employees are speeding, braking too abruptly, or swerving to strongly. With some applications, employers also can continually record the activity and conversations inside the vehicle, including when vehicle sensors indicate there has been an accident. It is not hard to see that increased use of these technologies can result in more employee discipline, but also make employees drive more carefully.

Just as employers can generate records of nearly all aspects of the use of their vehicles by employees, there surely are records being maintained about the manner in which individuals interact with Siri and similar applications. While those records likely are currently being held and examined by the providers of the technology, that may soon change as organizations want to collect this data for their own purposes. Employers having such information could be significant.

As Mr. Schrage argues, making the most of new AI and machine learning technologies requires that the users of those technologies be good actors. In short, workers will need to be “good” people when interacting with machines that learn, otherwise, it will be more difficult for the machines to perform as intended. Perhaps this will have a positive impact on the bottom line as well as human interactions generally. But it also will raise interesting challenges for human resource professionals as they likely will need to develop and enforce policies designed to improve interactions between human employees and company machines.

We’ll have to see. But in the meantime, be nice to Siri!

Jackson Lewis P.C. © 2016

Pokémon Go in the Workplace: Oh Look There’s a Pikachu!

Did you know that the world is now inhabited by creatures called Pokémon?  (Or maybe they’ve always been there?)  Some run across the plains; others fly through the skies; and some live in the mountains….and some, yes, some, are located right in your workplace.

Through the magic of downloading Pokémon Go to your smartphone, you too can see these creatures and catch them for some apparently critical scientific testing.

Workplace, Pokémon GoEmployers not familiar with Pikachu, Charizard, and Lucario can rest assured – your employees are.  In less than one week,Pokémon Go became the most downloaded smartphone videogame ever, and employers are clamoring for advice on how to deal with a workforce that already seems sufficiently and consistently distracted.

While employers may be used to seeing brief levels of high distraction during community events like March Madness, uncertainly surrounds this new obsession.  And an obsession it seems to be: sometimes when you look around Manhattan, you think you are in the least threatening version of the Walking Dead.  We even heard that someone just opened the first ever Pokémon-friendly hotel in Australia!  And this may only be the beginning as “augmented reality”-based gaming technology will likely improve in the coming years.

So what should employers do in response?

The first thing we’d say is to keep some perspective.  Before you do anything else, make a judgment call over whether you think the Pokémon Go craze will be short-lived – just a temporary blip on the employee-distraction radar, and if you think it will be, consider whether your planned reaction would really amount to an overreaction.  Remember: everyone could not get enough of Angry Birds, Words with Friends, and Candy Crush.  Is this just more of that?  If so, perhaps a quick and friendly preemptive reminder to employees that working time does not mean training your Bulbasaur to fight a Charmelon.  But if you think this is something different; something more serious, then a stronger communication/directive or an outright workplace ban may be in order.

The second thing we’d say is to consider converting this into an employee engagement opportunity.  Determine whether embracing this latest fad rather than suppressing it will pay morale boosting dividends.  There may be tremendous team-building and social engagement opportunities available, given the game’s team-based format.  Further (and we never thought we’d write something like the following, but), consider whether incentivizing your employees to search for imaginary monsters is an effective employee wellness activity.  (See: a more creative version of paying someone to walk 10,000 steps a day.)

Driving, Pokémon GoThird, remind employees to play safely. This picture says it all.  People are playing Pokémon Go while driving, and two men even fell off a 90-foot cliff in San Diego searching for Pokémon! The humorous and not-so-humorous Pokémon-related accident examples grow by the day. There have even been reports of employees leaning out of windows to get better reception and chasing Pokémon critters and nearly falling downstairs.  And problems can and often will arise when employees encroach on another employee’s work space or enter dangerous workplace areas while playing.  Employers therefore, should consider prohibiting their employees from playing the game on company premises or at least restrict it to certain areas and to certain times.

And the risk of an accident becomes even greater when employees operate company vehicles.  Employers should remind employees that while the game creates an augmented reality, they live in plain old regular reality, so if they see an ultra-rare Articuno Pokemon in the center lane of the 405, ignore it and keep driving.  At the same time, it’s not just the game-playing employee who creates the danger; often times, it is the game-playing civilian.  So tell employees, like your delivery drivers, to be on the lookout for individuals not paying attention to their surroundings as they cross streets even if it seems ridiculously obvious that they should know this already.

Pokémon Go, Work, Lastly, remind employees about your electronic use policies’ application toPokémon Go (or scramble to put some in place)!  Within certain parameters, employers have widespread discretion to monitor employees’ internet use on employer-provided computers and devices, to track employees’ data usage on the company’s purchased bandwidth, and to block certain websites and traffic patterns.  And this is no different when it comes to using employer-provided mobile devices where employees play Pokémon Go, or when employees are playing Pokémon Go in workplaces on work time.  Employers therefore, should seize this opportunity to review existing acceptable use policies to ensure that the risks posed by this “phenomenon” are specifically addressed – and if your company does not have an electronic use or acceptable use policy, this is absolutely the time to get one in place.  Some of the more immediate risks (beyond the loss of productivity) that should be addressed, include the following:

  • If using company-owned devices, a download of this app or any related app should be prohibited.  Some of the Pokémon Go-related applications have been proven to contain malware and depending what is on the device, this may be creating a potential data leak (or even data breach) situation.

  • Depending on where employees might be wandering, they are recording what they see while playing Pokémon Go, and could create privacy issues or even create data breaches that may be reportable.

  • Registration using a company-provided email address should be prohibited.  Collection of email addresses ofPokémon Go players have been reported to have been used in “phishing” involving the game and could put company information at risk.

Conclusion

In an age where technological innovation can negatively affect productivity by making it easier for employees to indulge in frivolous distractions (not to mention impact the overall quality of the labor pool when employers mistakenly hire candidates who have merely wandered into an interview in pursuit of an Ivysaur), employers can sometimes overlook the benefits of a tech-savvy workforce and the technology they have at their disposal. While employers should take steps to limit the employee distraction, safety, data breach and privacy-related concerns associated with Pokémon Go, they should also recognize the potential employee engagement opportunity that this novel game presents.

©1994-2016 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.

The Smart Phone Patent Saga Continues: Apple Inc. v. Samsung Electronics Co., Ltd., et al.

In a case involving suits, countersuits and multiple appeals by the two giants of the mobile phone space, the US Court of Appeals for the Federal Circuit reversed a jury’s finding of infringement, voiding the accompanying award to Apple of more than $119 million. Apple Inc. v. Samsung Electronics Co., Ltd., et al., Case Nos. 015-1171, -1195, -1994 (Fed. Cir., Feb. 26, 2016) (Dyk, J).

In this case’s third appeal, the Federal Circuit was asked to deal with “the core infringement and invalidity issues with respect to the asserted patents.” At issue were five patents asserted by Apple against Samsung (four of which a jury found to be infringed) and two patents asserted by Samsung against Apple (one of which the same jury found to be infringed).

After the district court entered judgment on the jury verdict ($120 million to Apple and $160,000 to Samsung), both sides appealed.

The Apple Patents

With regard to the Apple “click structure” patent, the Federal Circuit found that no reasonable jury could have concluded that the accused Samsung devices included the claimed “analyzer server,” and reversed the judgment of infringement. Before trial, neither party sought construction of “analyzer server,” agreeing that it should be given its ordinary meaning. On the last scheduled day of the trial, the Federal Circuit construed this term (in the Motorola case) as “a server routine separate from a client that receives data having structures from the client.” The district court adopted this construction and permitted the parties to recall their expert witnesses to provide testimony under this construction. However, the Federal Circuit concluded that Apple failed to present sufficient testimony that the accused software library programs in the Samsung phones ran separately from the programs they served (i.e., the Browser and Messenger applications), as required by the Federal Circuit’s construction. Accordingly, the Federal Circuit reversed the district court’s denial of judgment as a matter of law (JMOL) of non-infringement.

Apple also asserted its “slide to unlock” patent, whereby a user can slide a moving image across the screen with a finger in order to unlock the phone, and its “auto correct” patent, whereby a phone automatically corrects typing errors. At the district court, Samsung sought JMOL that both of these patents were invalid as obvious. The Federal Circuit agreed.

For the “slide to unlock” patent, Apple did not dispute that the prior art combination disclosed all of the claimed features. Rather, Apple argued that the jury could have reasonably found that one of the references taught away from using the “slider toggle” feature, and that a skilled artisan would not have been motivated to combine these references, since the slide toggle reference describes a wall-mounted touch-screen device, not a mobile phone. The Federal Circuit  disagreed, concluding that “[t]he fact that [the prior art reference] notes that users did not prefer the particular design of the slider toggle is not evidence of teaching away.” The Federal Circuit reasoned that a motivation to use the teachings of a particular prior art reference need not be supported by a finding that the feature is the “preferred, or the most desirable” option.

The Federal Circuit also concluded that no reasonable jury could find that the reference is not analogous art since it concerned user interfaces for touch-screen devices, noting that the asserted patent and the reference both disclose essentially the same structure: a touch-screen device with software that allows the user to slide his or her finger across the screen to change interface states.

The Federal Circuit also dismissed Apple’s secondary considerations argument, noting that although Apple identified the unsolved problem as the lack of an “intuitive” method of unlocking a touch-screen portable device, it provided no evidence showing that the asserted need was recognized in the industry. With respect to industry praise, the Court noted that evidence of approval by Apple fans—who may or may not have been skilled in the art—is not legally sufficient.

With respect to copying, the Federal Circuit noted the only evidence of copying went to an unlock mechanism using a fixed starting and ending point for the slide—a feature disclosed in the prior art. Finally, with respect to commercial success, the Federal Circuit reasoned that Apple’s evidence was not sufficient to show a “nexus” between the patented feature and the commercial success of the iPhone. Accordingly, the evidence of secondary considerations was insufficient as a matter of law to overcome the prima facie obviousness case.

Apple also asserted its “universal search” patent that permits a user to search for results from both the phone and the internet based on a single search term. On appeal, the issue was whether the search feature on the Samsung phones “locates” information on the internet. The district court found that Samsung devices do not search the internet, but rather blend data previously retrieved from a Google server and a local database. Apple argued that the plain meaning of the claim covered search information previously downloaded from the internet, a construction the  district court denied. The Federal Circuit agreed with the district court’s denial.

The Samsung Patents

Samsung asserted a patent directed to capturing, compressing and transmitting videos. In its claim construction order, the district court construed “means for transmission”—a means-plus-function claim limitation—to require software in addition to hardware. Samsung argued that the district court erred in its construction because the specification did not “require any software for transmission, and including such software [in addition to hardware] as necessary structure was error.” The Federal Circuit agreed with the district court that the term “transmission” implies communication from one unit to another, and the specification explains that software is necessary to enable such communication. The Federal Circuit noted that software is necessary because hardware alone does nothing without software instructions telling it what to do, and affirmed the district court’s construction of the term and the judgment of non-infringement.

As for Samsung’s patent directed to a camera system for compressing, decompressing and organizing digital files, the jury found that Apple had infringed, and the district court denied Apple’s post-trial motion for JMOL of non-infringement. Apple argued that no reasonable jury could have found that the Apple products met the “compressor” and “decompressor” limitations of the claim because these limitations require components that compress or decompress both still images and videos, and its products use separate and distinct components to compress and decompress still images and videos. The Federal Circuit rejected this argument, finding that Samsung presented testimony that identified a single Apple design chip with circuitry that performs compressing/decompressing methods for both images and videos.

Practice Note: Assuming this decision resolves the utility patent fight, the only remaining battle shifts to the Supreme Court of the United States, which has now agreed to hear Samsung’s appeal on the issue of damages in connection with design patent infringement. See CertAlert in this issue of IP Update.

Article By

© 2016 McDermott Will & Emery

Smartphone Wars – Supreme Court Awakens: Samsung Files Petition for Certiorari in New Hope to Harmonize Design Patent Law

On Monday, in the latest episode of the smartphone wars, Samsung filed a petition for certiorari with the Supreme Court.

Smartphone Wars

Samsung is appealing a Federal Circuit decision that upheld a $399 million judgment against Samsung for infringing three of Apple’s design patents. Samsung argues that the decision, if left unchecked by the Supreme Court, could dramatically increase the value of design patents. While the Supreme Court is the ultimate power in patent jurisprudence, it was a long time ago that it last considered a design patent case; more than 120 years ago according to Samsung. Samsung’s petition presents two fundamental questions concerning design patents:

1. Where a design patent includes unprotected non-ornamental features, should a district court be required to limit that patent to its protected ornamental scope?

2. Where a design patent is applied to only a component of a product, should an award of infringer’s profits be limited to those profits attributable to the component?

With respect to the first question – whether a district court should be required to limit the protection of a design patent to only ornamental features – Samsung argues that the Federal Circuit’s decision conflicts with both Section 171 of the Patent Act and with the Supreme Court’s precedent requiring judicial construction of patent claims.

According to Samsung, the Federal Circuit refusal “to cabin design patents to their protected ornamental scope” conflicts with Section 171 and allows infringement to be “found based on the use of nonornamental attributes.” Thus, argues Samsung, the Federal Circuit broadened the protectable scope of design patents, which are limited to “any new, original and ornamental design for an article of manufacture,” under section 171. Samsung argues the Federal Circuit’s ruling also creates tension with other areas of intellectual property law that routinely enforce limitations to protectable scope, such as copyright doctrine of “filtration” and trademark law’s doctrine of functionality.

Samsung also maintains that the ruling is contrary to Supreme Court precedents in the analogous context of utility patents, which recognize that district courts have a duty to construe patent claims and eliminate unprotected features. In Samsung’s view, similar to a Markman hearing, a district court should instruct a jury to identify non-ornamental features of a design patent and exclude them from the infringement analysis.

Turning to the second question – whether damages should be limited to the profits attributable to the infringing component – Samsung argues that the Federal Circuit’s decision conflicts with Section 289 of the Patent Act and the basic principles of causation and equity.

Samsung urges that “the Federal Circuit’s holding as a matter of law that an infringer of a design patent is liable for all of the profits it made from its entire product, no matter how little the design contributed to the product’s value or sales” be corrected. Samsung argues that the Federal Circuit’s conclusion that the article of manufacture is the entire smartphone, and not specific subcomponents, is wrong based on a natural reading and purpose of Section 289 of the Patent Act, contemporary extrinsic evidence regarding the definition of “articles of manufacture,” and non-controlling case law (see note below).

According to Samsung, the Federal Circuit’s “interpretation of Section 289 also flies in the face of well-settled tort principles of causation” and “ignores that disgorgement of the defendant’s profits is a classic equitable remedy for which the accepted measure of recovery generally is ‘the net profit attributable to the underlying wrong.’” “The cardinal principle of damages in Anglo-American law is that of compensation for the injury caused to plaintiff by defendant’s breach of duty,” This is the backdrop in which Section 289 was adopted. “Where disgorgement is available in patent cases, it has [] been ‘given in accordance with the principles governing equity jurisdiction, not to inflict punishment but to prevent an unjust enrichment by allowing injured complainants to claim ‘that which … is theirs, and nothing beyond this.’”

Samsung claims that certiorari should be granted because the Federal Circuit’s decision dramatically increases the value of design patents relative to other forms of intellectual property. Without correction, design patents will have whatever scope juries choose to give them, and a design-patent holder will be entitled to the infringer’s profits on the entire product even if the patented design applies only to a part of the product, and contributes to only a minor faction of the overall value. The Federal Circuit’s decision allows design patent owners to obtain the infringer’s total profits – a remedy not available under utility-patent law. Samsung contends that such leverage “poses a real danger for companies everywhere,” that it will lead to an “explosion of design patent assertions and lawsuits.”

Will the Supreme Court agree with Samsung that the Federal Circuit has caused a great disturbance in design patent jurisprudence? Difficult to see. Always in motion is the future.

Bush & Lane Piano Co. v. Becker Bros., 222 F. 902, 904 (2d Cir. 1915), (allowed an award of infringer’s profits from the patented design of a piano case but not from the sale of the entire piano, holding that “recovery should be confined to the subject of the patent.”); Young v. Grand Rapids Refrigerator Co., 268 F. 966 (6th Cir. 1920), (Affirmed the denial of all profits from the sale of refrigerators where the infringed patent related only to the design of the refrigerator’s door latch, explaining that it was not even “seriously contended” that the patentee could recover all profits from sales of refrigerators containing that latch.)

©1994-2015 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.

Apple-Samsung Trade Dress Case Demonstrates Potential Value of Design Patents

A jury awarded Apple more than $1 billion in damages after finding that smartphones sold by Samsung diluted Apple’s trade dress and infringed Apple’s design and utility patents. After a partial retrial limited to determining the appropriate amount of damages, Apple still arose victorious with a $930 million award. Samsung moved for judgment as a matter of law and for a new trial. The district court denied those motions, and Samsung appealed. On May 18, 2015, the Federal Circuit upheld the jury’s verdict of design and utility patent infringement, but reversed the finding of trade dress dilution.

Trade Dress Claims

At issue on appeal was whether Apple’s purported registered and unregistered trade dress associated with its iPhone 3G and 3GS products is functional. Because trademark law gives the trademark owner a “perpetual monopoly,” a design that is functional cannot serve as protectable trade dress. Apple Inc. v. Samsung Elecs. Co., Ltd., No. 14-1335, slip op. at 7 (Fed. Cir. May 18, 2015). The standard is even higher when the owner claims trade dress protection over the configuration of a product, as opposed to product packaging or other forms of trade dress. Slip op. at 8. In fact, the court noted that Apple had not cited a single Ninth Circuit case finding trade dress of a product configuration to be non-functional. Id.

Apple claimed the following elements as its unregistered trade dress:

  • a rectangular product with four evenly rounded corners;
  • a flat, clear surface covering the front of the product;
  • a display screen under the clear surface;
  • substantial black borders above and below the display screen and narrower black borders on either side of the screen; and
  • when the device is on, a row of small dots on the display screen, a matrix of colorful square icons with evenly rounded corners within the display screen, and an unchanging bottom dock of colorful square icons with evenly rounded corners set off from the display’s other icons.

Slip op. at 9. “In general terms, a product feature is functional if it is essential to the use or purpose of the article or if it affects the cost or quality of the article.” Id. (quoting Inwood Labs., Inc. v. Ives Labs., Inc., 456 U.S. 844, 850 n.10 (1982)). Because this case came to the Federal Circuit on appeal from a district court sitting in the Ninth Circuit, the Federal Circuit applied the Ninth Circuit’s Disc Golf test for determining whether a design is functional. Under that test, courts consider whether: (1) the design yields a utilitarian advantage; (2) alternative designs are available; (3) advertising touts the utilitarian advantages of the design; and (4) the particular design results from a comparatively simple or inexpensive method of manufacture. Slip op. at 10. Because this purported trade dress was not registered, Apple had the burden to prove its validity, which required Apple to show that the product features at issue “serve[] no purpose other than identification.” Id. (citing Disc Golf Assoc., Inc. v. Champion Discs, 158 F.3d 1002, 1007 (9th Cir. 1998)). The court of appeals applied those factors and found extensive evidence supporting Samsung’s claim that the alleged trade dress was functional. Slip op. at 12–14.

In addition to the unregistered product configuration discussed above, Apple also asserted a claim based on US Registration 3,470,983, which covered the design details in each of the 16 icons on the iPhone’s home screen framed by the iPhone’s rounded-rectangular shape with silver edges and a black background. Slip op. at 15. Although Apple enjoyed an evidentiary presumption of validity for its registered trade dress, the court again looked to the Disc Golffactors and found that Samsung met its burden of overcoming that presumption and proving the trade dress was functional and the registration invalid. Slip op. at 16. Because the court held Apple’s purported trade dress was functional, it vacated the jury’s verdict on Apple’s claims for trade dress dilution and remanded that portion of the case for further proceedings. Slip op. at 17.

Design Patent Claims

Apple fared better on its design patent claims. Here, Apple asserted three design patents directed to the “front face” (D’677 patent), “beveled front edge” (D’087 patent) and “graphical user interface (GUI)” (D’305 patent) of its iPhone products.

design patent claims - apple samsung

Samsung challenged the court’s claim construction and jury instructions for failing to “ignore[]” functional elements of the designs from the claim scope, such as rectangular form and rounded corners. Slip op. at 20. The court disagreed, finding that Samsung’s proposed rule to eliminate entire elements from the scope of design claims was unsupported by precedent. Id. Rather, the court found that both the claim construction and jury instructions properly focused the infringement analysis on the overall appearance of the claimed design. Id. at 21.

This victory was financially significant for Apple, as the court found they were entitled to Samsung’s entire profits on its infringing smartphones as damages. Like the district court, the court of appeals found that 35 U.S.C. § 289 explicitly authorizes the award of total profit from the article of manufacture bearing the patented design, rather than an apportionment of damages based only on the infringing aspects of the device (i.e., external features and not internal hardware/software). The court of appeals interpreted Samsung’s argument as imposing an “apportionment” requirement on Apple—a requirement the Federal Circuit previously rejected in Nike, Inc. v. Wal-Mart Stores, Inc., 138 F.3d 1437, 1441 (Fed. Cir. 1998). Thus, Apple maintains a claim to at least a significant portion of the $930 million damages award in the case.

Summary and Takeaways

Ultimately, after holding that Apple’s purported trade dress covering elements of the iPhone’s overall shape, black-bordered display screen, and matrix of colorful square icons was invalid, the district court upheld the jury’s verdict that Samsung’s devices infringed Apple’s design patents relating to the iPhone’s overall shape, display screen, and matrix of colorful square icons. The image depicted in Apple’s now-invalid trade dress registration is below on the left. Figures from two of its still-valid design patents are on the right. Although the overlap in what was claimed in these different forms of intellectual property is readily apparent, Apple lost on one set of claims and prevailed on the other.

design patent apple samsung iphone

It remains to be seen how damages associated with the design patent claims differ from damages associated with the now-invalid trade dress claims. But this much is clear: the Federal Circuit has given a reason for companies to reevaluate the role of design patents in their intellectual property portfolios. The time and expense associated with obtaining design patents will not suit all products, but for the right product, they can provide a valuable method of recovery in litigation involving similar product designs.

Criminal Defendant Required to Provide Smartphone Fingerprint, but Not Passcode

Covington BUrling Law Firm

A Virginia state judge ruled last week that law enforcement may require a criminal defendant to provide his fingerprint — but not his passcode — to unlock a smartphone that might contain evidence that would be used against him at trial.

In Commonwealth v. Baust, the police sought access to the smartphone of David Charles Baust, who was indicted in connection an alleged assault. The victim alleged that a video of the assault was stored on Baust’s phone.

Police officers obtained a warrant for the phone and other evidence from Baust’s home. Because the officers were unable to unlock Baust’s phone, the government filed a motion to compel Baust to produce either his passcode or fingerprint to unlock the phone.

Because the government had obtained a lawfully executed search warrant, Baust could not challenge the government’s request on Fourth Amendment grounds. Instead, Baust argued that the request violates the Fifth Amendment, which provides that no person “shall be compelled in any criminal case to be a witness against himself.” Courts have long held that this privilege protects a criminal defendant from being forced to provide the government with “evidence of a testimonial or communicative nature.”

Virginia Circuit Court Judge Steven C. Frucci rejected the government’s request to compel Baust to provide his passcode, holding that providing his passcode would be testimonial because it would force Baust to “disclose the contents of his own mind.” This conclusion is in line with a 2010 ruling by a Michigan federal court that forcing the defendant to produce a passcode is “the extortion of information from the accused.”

But Judge Frucci allowed the government to compel Baust to provide his fingerprint. He concluded that the fingerprint, “like a key . . . does not require Defendant to communicate any knowledge at all.”