`Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 1 of 20 Page ID #:209
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXHIBIT 3
`EXHIBIT 3
`
`
`
`
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 1 of 19 PageID #: 1386Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 2 of 20 Page ID #:210
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`§
`
`§
`§ Case No. 2:16-cv-00862-RWS
`§
`
`LEAD CASE
`§
`
`
`
`
`
`§
`§ Case No. 2:16-cv-01193-RWS
`
`UNILOC USA INC., et al.,
`
`Plaintiffs,
`
`v.
`
`NETSUITE, INC.,
`NUTANIX, INC.,
`
`Defendants.
`
`
`PLAINTIFFS’ OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 2 of 19 PageID #: 1387Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 3 of 20 Page ID #:211
`
`TABLE OF CONTENTS
`
`
`OVERVIEW OF THE PATENTS .................................................................................................. 2
`
`Claim Construction Issues .............................................................................................................. 3
`
`“Application Launcher Program” - as used in the ’578 patent only ........................................... 4
`
` I. The ordinary meaning of “application launcher program” supports Uniloc’s position. .. 5
`
` II. Claim 1 of the ’578 patent supports Uniloc’s position. ................................................... 5
`
` III. The specification of the ’578 patent supports Uniloc’s position. .................................... 6
`
` IV. The Court must modify its construction from a related case, as to the ’578 patent. ........ 6
`
`
`
`
`
`
`
` A. The construction does not reflect the ordinary meaning of
`“application launcher.” ........................................................................................... 7
`
` B. The Opinion erred in using the prosecution history of the
`’466 patent to construe claims of the ’578 patent. .................................................. 8
`
` C. The Opinion erred in using the prosecution history of the
`’766 patent to construe the claims of the ’578 patent. ............................................ 9
`
`“Application Program” - ’578, ’293, and ’766 patents only ..................................................... 11
`
`“On demand server” - ’578 patent............................................................................................. 14
`
`“Target on-demand server” - ’293 patent .................................................................................. 14
`
`“Executing the application program” - ’578 patent .................................................................. 15
`
`“Configuration manager program” - ’578 patent ...................................................................... 16
`
`“License availability” - ’766 patent .......................................................................................... 16
`
`“Distributing the file packet” - ’293 patent ............................................................................... 16
`
`“License management server” - ’766 patent ............................................................................. 17
`
`i
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 3 of 19 PageID #: 1388Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 4 of 20 Page ID #:212
`
`
`
`Plaintiffs (“Uniloc”) have asserted claims from four IBM patents, directed towards four
`
`different inventions, with each invention relating to a particular portion of a distributed computer
`
`network. The patents are largely independent. A company could infringe a patent covering one
`
`portion of its network, but not infringe a second patent covering a second portion, if that
`
`company chose not to use the invention of the second patent in that second portion.
`
`
`
`The ’466 patent1 describes methods of managing application programs. The claims of the
`
`’466 patent are directed to methods, systems, and products for downloading applications to an
`
`individual computer terminal (“client”) for execution at that client. Thus, all of the claims of the
`
`’466 patent incorporate specific language requiring downloading of applications to the client for
`
`execution, namely: “providing an instance of the… application… to the client for execution.”
`
`Because those claims have that specific language, there appears to be very little disagreement
`
`between the parties as to how the claims of the ’466 patent should be construed.
`
`
`
`But the claims of the ’5782 patent are directed towards a different invention, which
`
`invention can be practiced in networks where applications are not downloaded to clients, and
`
`execution is instead at a server. For that reason – and in sharp contrast to the claims of the ’466
`
`patent filed on the same day – the IBM inventors omitted from the claims of the ’578 patent any
`
`language that would require downloading to, or execution at, the client.
`
`
`
`The principal claim construction dispute in these cases, as well as in earlier cases, arises
`
`from the effort by defendants to persuade the Court to read into the claims of the ’578 patent
`
`limitations found only in the ’466 patent claims.
`
`
`
`
`
`
`1 U.S. Patent No. 6,510,466 (Ex. A).
`
`2 U.S. Patent No. 6,324,578 (Ex. B).
`
`
`
`1
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 4 of 19 PageID #: 1389Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 5 of 20 Page ID #:213
`
`OVERVIEW OF THE PATENTS
`
`
`
`The ’578 patent describes (what were in 1998) innovative methods of managing
`
`configurable application programs on a computer network for a large enterprise.3 The ’466
`
`patent also describes methods of managing patent applications, but the written description of that
`
`patent differs from the ’578 disclosure.4
`
`Both the ’578 and ’466 disclosures describe a computer network, which connects each
`
`individual user’s computer terminal (“client terminal,” or simply “client”) to a remote server
`
`(“server”) responsible for supporting that client, as well as for supporting a number of other
`
`clients. The network, in turn, connects the remote servers to a central network management
`
`server. FIG. 1 of the ’466 patent graphically illustrates this server/client arrangement:
`
`
`
`
`3 The IBM inventors filed the ’766 patent (U.S. Patent No. 6,728,766 (Ex. C)) as a divisional of
`the ’578, and thus it has the identical written description (“the ’578 disclosure”).
`
`4 The IBM inventors filed the ’293 patent (U.S. Patent No. 7,069,293 (Ex. D)) as a divisional of
`the ’466, and thus it has a written description identical to that of the ’466 (“the ’466 disclosure”).
`
`
`
`2
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 5 of 19 PageID #: 1390Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 6 of 20 Page ID #:214
`
`An application program (“application”) is software written to perform a particular
`
`function for a user (as opposed to system software, which is designed to operate the network).
`
`Common examples of applications are word processing applications (e.g., Microsoft Word) and
`
`spreadsheets (e.g., Microsoft Excel).
`
`In 1998, designers of computer networks for large enterprises were confronted with the
`
`problem of peripatetic users, i.e., users who login at different times from different clients. The
`
`IBM inventors, in these patents, describe innovative ways, circa 1998, they had reduced to
`
`practice to allow a peripatetic user to access the user’s authorized applications from any client on
`
`the network, while maintaining the user’s own selected preferences.
`
`Computer network designers in 1998 were also confronted by the problems of efficiently
`
`distributing applications throughout the enterprise, and of then frequently (and efficiently)
`
`updating those applications, while maintaining consistency among users, as to both application
`
`updates and administrator preferences. The IBM inventors devised, and reduced to practice,
`
`innovative ways to accomplish that.
`
`Finally, the IBM inventors devised methods to manage the allocation of licenses to
`
`applications in the enterprise environment, where the number of users accessing, or seeking to
`
`access, an application would exceed the number of existing licenses.
`
`Claim Construction Issues
`
`Exhibit A to the Joint Claim Construction Statement and Prehearing Memorandum listed
`
`a large number of claim terms/phrases on which the parties had not reached agreement. Since
`
`filing that document, the parties have eliminated certain disputes, and narrowed others. This
`
`brief discusses, in order of priority, the previously identified terms/phrases on which the parties
`
`still have a dispute.
`
`
`
`3
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 6 of 19 PageID #: 1391Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 7 of 20 Page ID #:215
`
`“Application Launcher Program” - as used in the ’578 patent only
`
`This term appears, as follows, in claim 15 of the ’578 patent:
`
`A method… comprising the steps of: …distributing an application launcher
`program associated with the application program to a client …;[and] obtaining a
`user set … associated with [a user] executing the application launcher
`program.”
`
`Claim term
`
`“application launcher
`program associated with the
`application program” /
`“application launcher
`programs associated with
`each of the set of the plurality
`of application programs”
`
`Uniloc’s proposed
`construction
`a program distributed to a
`client to initially populate a
`user desktop and to request
`execution of the application
`program
`
`Defendants’ proposed
`construction
`a program distributed to a
`client to initially populate a
`user desktop and to request an
`instance of the application
`program for execution at the
`client, and to specify one or
`more of the configurable
`parameters of the application
`program
`
`
`Defendants seem to agree with Uniloc’s construction, as far as it goes, including that the
`
`application launcher requests execution of the application. But Defendants want to add an
`
`extraneous requirement that the requested execution of the application occur at the client. That
`
`construction, however, would contradict the ordinary meaning of “application launcher
`
`program,” and needlessly exclude embodiments of the ’578 patented invention in which the
`
`application executes on the server.6
`
`
`
`
`
`
`5 In discussing the use of terms in the ’578 patent, this brief will focus on claim 1, as
`representative, but Uniloc’s arguments would be identical for the use of those terms in other
`claims of the ’578 patent.
`
`6 Defendants also seek to add to the construction “to specify one or more of the configurable
`parameters of the application program.” Nothing in the specification, however, seems to require
`that. At one point, the specification describes an embodiment that does not have that feature
`(12:26-31).
`
`
`
`4
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 7 of 19 PageID #: 1392Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 8 of 20 Page ID #:216
`
`The ordinary meaning of “application launcher program” supports Uniloc’s
`position.
`
`I.
`
`
`
`Uniloc submits the accompanying declaration of Dr. Michael Shamos, as to the ordinary
`
`meaning of “application launcher program.” As Dr. Shamos testifies, “application launcher” was
`
`in common use before 1998, when the application for the ’578 patent was filed. (¶ 26-32). A
`
`person of skill in the art (POSITA) at that time would have understood an “application launcher”
`
`as “a computer program that launches, i.e., starts, another computer program.” (¶ 28). Dr.
`
`Shamos provides copious examples, including the use of the term in seven prior art patents7
`
`(Shamos Decl., Ex. 2-8) and a 1997 article describing a contemporaneous product, which Novell
`
`marketed as the Novell Application Launcher. (Shamos Decl., Ex. 9)8
`
`As documented in several of Dr. Shamos’s examples, the ordinary meaning of
`
`“application launcher” reads on programs that launch executions of application on the server. (¶
`
`29-32).
`
`II.
`
`Claim 1 of the ’578 patent supports Uniloc’s position.
`
`Dr. Shamos testifies nothing in the language of claim 1 of the ’578 patent would limit
`
`“application launcher” to programs that launch only at a client. (¶¶ 33-35).
`
`
`
`Claim 1, in its entirety, reads:
`
`A method for management of configurable application programs on a network
`comprising the steps of:
`
`installing an application program having a plurality of configurable
`preferences and a plurality of authorized users on a server coupled to the
`network;
`
`
`7 Among those patents are ones entitled “Launching Computer Applications,” “Distributed
`Application Launcher for Optimizing Desktops Based on Client characteristics Information,” and
`“Protected Application Launchers with Graphical Interface.” (Shamos Decl., Ex. 2-4).
`
`8 The parties have agreed to add “distributed to a client to initially populate a user desktop” to
`the construction, to reflect its description in the specification of the ’578 patent.
`
`
`
`5
`
`
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 8 of 19 PageID #: 1393Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 9 of 20 Page ID #:217
`
`distributing an application launcher program associated with the application
`program to a client coupled to the network;
`
`obtaining a user set of the plurality of configurable preferences associated
`with one of the plurality of authorized users executing the application
`launcher program;
`
`obtaining an administrator set of the plurality of configurable preferences
`from an administrator; and
`
`executing the application program using the obtained user set and the obtained
`administrator set of the plurality of configurable preferences responsive to a
`request from one of the plurality of authorized users.
`
`(emphasis added). An inspection of the entirety of claim 1 confirms that nothing in that claim
`
`refers to, or implies, “request[ing] an instance of the application program for execution at the
`
`client,” the requirement Defendants attempt to add.
`
`III. The specification of the ’578 patent supports Uniloc’s position.
`
`Dr. Shamos reviews the specification of the ’578 patent, and testifies that nothing in the
`
`specification would cause a person of skill in the art to limit the ordinary meaning of the term.
`
`(¶ 36-49). Further, he cites specific portions of the specification that would confirm the
`
`inventors intended the ordinary meaning to apply. (¶ 42-49)
`
`He points out the advantage of the invention of the ’578 patent is that a centralized
`
`database containing stored user and administrator preferences can be queried and updated. As he
`
`testifies, because that advantage does not depend on the whether the applications are executed at
`
`the client or the server, a POSITA would thus not have expected the inventors to limit the
`
`invention to an embodiment that executes applications only on the client, and they did not. (¶ 37)
`
`IV.
`
`The Court must modify its construction from a related case, as to the ’578 patent.
`
`Uniloc is, of course, aware that, in a related action, this Court, in an interlocutory
`
`Memorandum Opinion and Order (“Opinion”)(Ex. E), construed “application launcher program”
`
`across all three patents in which it appeared – including the ’578 patent – as “a program
`
`
`
`6
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 9 of 19 PageID #: 1394Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 10 of 20 Page ID
`
` #:218
`
`distributed to a client to initially populate a user desktop and to request an instance of the
`
`application for execution at the client.” (Emphasis added). In the instant actions, however,
`
`Uniloc asks the Court, with respect to claim 1 (and other claims) of the ’578 patent, to modify
`
`the second half of that construction.9
`
`To support that request, Uniloc highlights several factual statements and legal
`
`conclusions in the Opinion that need to be reconsidered, and sets forth the reasons for
`
`reconsideration.
`
`A.
`
`The construction does not reflect the ordinary meaning of “application
`launcher.”
`
`
`
`
`The Opinion (at 28) found that “application launcher program” is not a term of art, but
`
`was a term coined by the patentees for the Asserted Patents. But in that proceeding there was no
`
`evidence before the Court that the patentees coined the term, nor had they claimed to have done
`
`so. The Court was apparently misled by a bald assertion, in a brief of the defendants in that case,
`
`that the patentees had coined the term. (-393 action, Dkt. 185, at 3)(Ex. F). They had not.
`
`The declaration of Dr. Shamos, and the copious examples he cites, establish “application
`
`launcher program” was a term of art in 1998, not a term coined by the inventors here. As
`
`reflected in his testimony and the documented examples, a construction requiring execution at
`
`the client does not reflect the ordinary meaning of that term.10
`
`
`9 Uniloc is not asking the Court to modify the construction with respect to the claims of the ’466
`patent or the ’766 patent in which “application launcher” appears. Similarly, Uniloc is not
`seeking, in this action, a different construction as to those claims of the ’466 and ’766 patents.
`
`10 The Opinion (at 4) contains an error. It copies, and labels as claim 1, what is actually claim
`15. The copied claim (15) is narrower than claim 1, because claim 15 requires the server
`“provide an instance of the application program” responsive to a request from a user, a limitation
`not in claim 1. Perhaps this mistake – copying the wrong claim as claim 1 – caused the
`BACKGROUND section of the Opinion (at 4) to state, erroneously:
`
`
`
`7
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 10 of 19 PageID #: 1395Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 11 of 20 Page ID
`
` #:219
`
`
`
`B.
`
`The Opinion erred in using the prosecution history of the ’466 patent to
`construe claims of the ’578 patent.
`
`
`
`
`1. Under Abbott Laboratories, the prosecution history of the ’466 patent
`cannot be used to interpret the claims of the ’578 patent.
`
`The Opinion (at 29-30) erroneously relies on statements in the prosecution history of the
`
`’466 patent to construe how this term is used in claim 1 of the ’578 patent. The Opinion
`
`overlooks that the separate applications for the ’578 patent and the ’466 patent were not
`
`continuations, divisionals, or continuations-in-part of each other. They were filed as
`
`independent, patentably distinct applications, on the same date. Further, the inventive entities
`
`differed: the ’578 application included an inventor (Kaminsky) not an inventor on the ’466
`
`application; the ’466 application, in turn, included inventors (McGarvey and Salahshour) not on
`
`the ’578 application. Even though the applications were co-pending, shared some common
`
`inventors, and were commonly assigned, the prosecution history of one cannot limit the claims of
`
`the other.
`
`Abbott Laboratories v. Dey, L.P., 287 F.3d 1097 (Fed. Cir. 2002) is squarely on point:
`
`It is true that the ’839 and ’301 patents are commonly owned by Abbott, and
`the inventor of the ’839 patent is one of the three inventors of the ’301 patent.
`However, the ’839 application was not filed as a continuation, continuation-
`in-part, or divisional application of the ’301 application. These applications
`have no formal relationship and were presented to the patent office as
`patentably distinct inventions. … Under these circumstances, we do not see a
`basis for concluding that statements made about the characteristics of the
`surfactant claimed by the ’301 patent should be attributed to the improved
`surfactant claimed by the ’839 patent, simply because the applications had a
`common assignee, one common inventor, and similar subject matter. We
`therefore conclude that the above-quoted statements from the prosecution
`
`
`The ’578 patent relates to obtaining user and administrator preferences for the
`application programs installed at a server and providing these preferences along with
`an instance of the application program to a client for execution.
`
`(emphasis added). Inspection of the actual claim 1 readily shows nothing in it supports the
`underlined portion of that statement.
`
`
`
`8
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 11 of 19 PageID #: 1396Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 12 of 20 Page ID
`
` #:220
`
`history of the ’301 patent do not create an estoppel with respect to the ’839
`patent.
`
`Id. at 1104-05 (Emphasis added); see also In re Berg, 140 F.3d 1428, 1435 n. 7 (Fed. Cir. 1998)
`
`(noting, in the context of considering a double patenting rejection, that two applications filed by
`
`the same inventor were “not related as by continuation, continuation-in-part, or divisional” and
`
`that filing such two separate applications implied “that each application is independent and
`
`patentably distinct”).
`
`
`
`The Opinion (at 11-14) justified reliance on the ’466 prosecution history by citing
`
`Verizon Servs. Corp. v. Vonage Holdings Corp., 503 F.3d 1295, 1306-07 (Fed. Cir. 2007) and
`
`Microsoft Corp. v. Multi-tech Sys., Inc., 357 F.3d 1340, 1350 (Fed. Cir. 2004). The Opinion,
`
`however, overlooked that the applications in those cases were formally related, as continuations,
`
`continuations-in-part, or divisionals, unlike the relationship between the ’578 application and the
`
`’466 application. That is the critical distinction Abbott Laboratories highlights. Additionally, in
`
`Verizon and Microsoft, the inventive entities were the same. Here, the inventive entities differ.
`
`The inventive entity of the ’466 application did not include Kaminsky and thus that entity would
`
`not have authority to surrender, on Kaminsky’s behalf, the scope of claims that Kaminsky, et al.,
`
`had obtained.
`
`
`
`C.
`
`The Opinion erred in using the prosecution history of the ’766 patent to
`construe the claims of the ’578 patent.
`
`
`
`
`1. Under Microsoft and Georgia-Pacific, statements in the prosecution
`history of the ’766 patent do not affect construction of claims in the ’578
`patent.
`
`The Opinion (at 29) erroneously relied on statements in the prosecution history of the
`
`’766 patent to construe how this term is used in the ’578 patent. The error, however, is different
`
`from the one recited above. Because the application for the ’766 patent was a divisional of the
`
`application for the ’578 patent, Abbott Laboratories would not apply. Under the authority of
`
`
`
`9
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 12 of 19 PageID #: 1397Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 13 of 20 Page ID
`
` #:221
`
`both Microsoft and Verizon, the prosecution history of the ’766 patent could have relevance to
`
`construction of the ’578 patent.
`
`But there are two significant limitations, which prevent using those prosecution histories
`
`here to construe the ’578 patent. In Microsoft, 357 F.3d at 1349 n. 7, the majority opinion
`
`distinguished statements in a prosecution history that “refer more specifically to the references
`
`cited against the claims of the [patent being prosecuted] only.” The majority limited the
`
`relevance of those statements to construction of the claims of the patent then being prosecuted,
`
`holding statements of that type could not be used to construe claims of other patents in the
`
`family. Thus, under Microsoft, statements in the prosecution history of the ’766 patent that refer
`
`to references cited against claims of the ’766 patent cannot be cited to construe other patents,
`
`however related. The statements from the ’766 prosecution history that the Opinion (at 29)
`
`refers to clearly fall in that category, as they are statements distinguishing prior art references
`
`(Duvvoori, Franklin, Christiano ) cited against only the claims of the ’766 patent.
`
`The other significant limitation arises from Georgia-Pacific Corp. v. United States
`
`Gypsum Co., 195 F.3d 1322, 1333 (Fed. Cir. 1999). As the majority opinion in Microsoft, 357
`
`F.3d at 1350, itself acknowledges, the Georgia-Pacific case:
`
`rejected the argument that the patentee was “bound by” statements made
`by the applicant in connection with a later application after the patent in
`suit had already issued. … We rejected the argument that the patentee was
`bound, or estopped, by a statement made in connection with a later
`application on which the examiner of the first application could not have
`relied.
`
`Here, the ’578 patent issued on November 27, 2001. The examiner of the ’578 patent
`
`could not have relied on any statements made after that date in the prosecution of the ’766 patent,
`
`and there were no statements before that date. Although the application for the ’766 patent was
`
`filed on April 10, 2001, as it turns out, there were no statements at all in that prosecution until
`
`
`
`10
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 13 of 19 PageID #: 1398Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 14 of 20 Page ID
`
` #:222
`
`well after November 27, 2001 because the Patent Office did not issue its first office action in that
`
`prosecution until May 7, 2002. The applicant first responded on August 1, 2002. Georgia-
`
`Pacific would hold that those, and any later, statements in the ’766 prosecution cannot bind, or
`
`estop, the patentee of an earlier patent.
`
`Here, where the intrinsic record of the ’578 patent, namely, its specification and
`
`prosecution history, does not itself limit the construction of “application launcher,” Georgia-
`
`Pacific holds that post-issuance statements in a continuation or divisional do not bind or create
`
`an estoppel as to the ’578 patent itself.
`
`As to use of the prosecution history of the ’466 patent to construe claims of the ’578
`
`patent, Abbott Laboratories creates an absolute bar, as argued earlier. But it is worth noting that
`
`if Abbott Laboratories did not apply, Microsoft and Georgia-Pacific still would. The use of
`
`statements from the ’466 patent history would have to be shown to satisfy the requirements of
`
`both cases, before it could be used to construe claims of the ’578 patent.
`
`“Application Program” - ’578, ’293, and ’766 patents only
`
`Claim term
`
`application program(s) /
`application(s)
`
`Uniloc’s proposed
`construction
`code associated with
`performing function for a
`user
`
`Defendants’ proposed
`construction
`the code associated with the
`underlying program functions
`that is a separate application
`from a browser interface and
`does not execute within the
`browser window
`
`An application program does
`not include a resource such as
`a static HTML file, a
`dynamically generated page
`created by a CGI-based
`program, or a source of
`information identified by a
`Uniform Resource Locator
`(URL) and published by a
`
`
`
`11
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 14 of 19 PageID #: 1399Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 15 of 20 Page ID
`
` #:223
`
`Claim term
`
`Uniloc’s proposed
`construction
`
`Defendants’ proposed
`construction
`Web server, such as a web
`page, a complete web site, a
`web-enabled database, or an
`applet.
`
`
`
`
`An application is software written to perform a particular function for a user -- as
`
`opposed to system software, which is designed to operate the network. Nothing in the ordinary
`
`meaning of “application,” nor any other language in the asserted claims of the ’578, ’293, or
`
`’766 patents, if given its ordinary meaning, would rule out execution within the browser window.
`
`
`
`Dr. Shamos, in his declaration (¶ 50-53) testifies that no portion of the ’578 patent
`
`contains, or otherwise supports, a construction of claim 1 of the’578 patent that would exclude
`
`an application that executes within the browser window. In fact, he cited a passage from the
`
`specification (8:7-20) of that patent that describes an exemplary situation in which the
`
`application is literally executed within the browser window:
`
`It is further to be understood that, in the JAVA™ environment, currently
`available web browser applications are known to those of skill in the art
`which provide a user interface and allow hardware independent
`communication such as that currently specified by Internet protocols. Thus,
`the application launcher programs may be applets which display the icon
`which are associated with a web browser Universal Resource Locator
`(URL) which points to the location of the applet to be executed. Upon
`selection of the icon displayed by the application launcher, the selected
`application is “launched” by requesting the URL of the application from
`the on-demand server. Such requests may be made utilizing conventional
`Hyper-Text Transfer Protocol (HTTP) communications or other suitable
`protocols.
`
`Dr. Shamos testifies:
`
`The above passage describes an exemplary situation in which the
`application is literally executed within the browser window. A Java applet
`is a hardware- and operating system-independent piece of code, written in
`a language known as Java bytecode, which is downloaded to a client and
`executed using software known as a “Java Virtual Machine” (JVM). All
`major browsers implemented a JVM; otherwise, they would not have been
`
`
`
`12
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 15 of 19 PageID #: 1400Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 16 of 20 Page ID
`
` #:224
`
`able to support webpages containing Java applets. Thus, the construction of
`claim 1 would not read on this embodiment.
`
`A construction that would result in no claim reading on a preferred embodiment is highly
`
`suspect. Rexnord Corp. v. Laitram Corp., 274 F.3d 1336, 1342-43 (Fed. Cir. 2001).
`
`
`
`The Opinion, however, had adopted a construction that included “does not execute within
`
`the browser window,” seemingly across all four patents. The sole basis for that was that the
`
`patentees of the ’466 patent, during the prosecution history of the ’466 patent, argued “an
`
`instance of the application program … executes locally at the client as a separate application
`
`from the browser interface [and] would not execute within the browser window.” Opinion at 20.
`
`
`
`Uniloc does not object to that construction, as applied to the ’466 patent. To begin with,
`
`the statements on which the Court relied were made during the prosecution of that patent.
`
`Further, the statements reasonably describe the invention of the claims of the ’466 patent. The
`
`claims of that patent literally require “providing an instance of the … application… to the client
`
`for execution,” seemingly ruling out executing remotely within the browser window.
`
`
`
`But a POSITA would not understand the statements as applying to the inventions claimed
`
`in the other three patents, as those claims omit any such requirements. Legal issues aside, the
`
`statements would make no sense, if they had appeared in the prosecution history of the other
`
`patents.
`
`
`
`As Dr. Shamos testified, the claims of the ’578 patent do not specify where applications
`
`are executed, and the specification of that patent includes an embodiment that literally executes
`
`within the browser window. Similarly, the claims of the ’293 patent do not relate at all to where
`
`or how applications are executed, but only to transmitting applications from a network
`
`management server to an intermediate server.
`
`
`
`13
`
`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 16 of 19 PageID #: 1401Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 17 of 20 Page ID
`
` #:225
`
`
`
`In any event, for the reasons described above, under Abbott Laboratories, statements in
`
`the ’466 prosecution history cannot be considered at all in construing the ’578 or ’766 patents.
`
`As to the ’293 patent, the statements, apart from not being relevant to