throbber
Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 1 of 20 Page ID #:209
`Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 1 of 20 Page ID #:209
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`EXHIBIT 3
`EXHIBIT 3
`
`
`
`
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 1 of 19 PageID #: 1386Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 2 of 20 Page ID #:210
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`

`

`§ Case No. 2:16-cv-00862-RWS

`
`LEAD CASE

`
`
`
`
`

`§ Case No. 2:16-cv-01193-RWS
`
`UNILOC USA INC., et al.,
`
`Plaintiffs,
`
`v.
`
`NETSUITE, INC.,
`NUTANIX, INC.,
`
`Defendants.
`
`
`PLAINTIFFS’ OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 2 of 19 PageID #: 1387Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 3 of 20 Page ID #:211
`
`TABLE OF CONTENTS
`
`
`OVERVIEW OF THE PATENTS .................................................................................................. 2
`
`Claim Construction Issues .............................................................................................................. 3
`
`“Application Launcher Program” - as used in the ’578 patent only ........................................... 4
`
` I. The ordinary meaning of “application launcher program” supports Uniloc’s position. .. 5
`
` II. Claim 1 of the ’578 patent supports Uniloc’s position. ................................................... 5
`
` III. The specification of the ’578 patent supports Uniloc’s position. .................................... 6
`
` IV. The Court must modify its construction from a related case, as to the ’578 patent. ........ 6
`
`
`
`
`
`
`
` A. The construction does not reflect the ordinary meaning of
`“application launcher.” ........................................................................................... 7
`
` B. The Opinion erred in using the prosecution history of the
`’466 patent to construe claims of the ’578 patent. .................................................. 8
`
` C. The Opinion erred in using the prosecution history of the
`’766 patent to construe the claims of the ’578 patent. ............................................ 9
`
`“Application Program” - ’578, ’293, and ’766 patents only ..................................................... 11
`
`“On demand server” - ’578 patent............................................................................................. 14
`
`“Target on-demand server” - ’293 patent .................................................................................. 14
`
`“Executing the application program” - ’578 patent .................................................................. 15
`
`“Configuration manager program” - ’578 patent ...................................................................... 16
`
`“License availability” - ’766 patent .......................................................................................... 16
`
`“Distributing the file packet” - ’293 patent ............................................................................... 16
`
`“License management server” - ’766 patent ............................................................................. 17
`
`i
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 3 of 19 PageID #: 1388Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 4 of 20 Page ID #:212
`
`
`
`Plaintiffs (“Uniloc”) have asserted claims from four IBM patents, directed towards four
`
`different inventions, with each invention relating to a particular portion of a distributed computer
`
`network. The patents are largely independent. A company could infringe a patent covering one
`
`portion of its network, but not infringe a second patent covering a second portion, if that
`
`company chose not to use the invention of the second patent in that second portion.
`
`
`
`The ’466 patent1 describes methods of managing application programs. The claims of the
`
`’466 patent are directed to methods, systems, and products for downloading applications to an
`
`individual computer terminal (“client”) for execution at that client. Thus, all of the claims of the
`
`’466 patent incorporate specific language requiring downloading of applications to the client for
`
`execution, namely: “providing an instance of the… application… to the client for execution.”
`
`Because those claims have that specific language, there appears to be very little disagreement
`
`between the parties as to how the claims of the ’466 patent should be construed.
`
`
`
`But the claims of the ’5782 patent are directed towards a different invention, which
`
`invention can be practiced in networks where applications are not downloaded to clients, and
`
`execution is instead at a server. For that reason – and in sharp contrast to the claims of the ’466
`
`patent filed on the same day – the IBM inventors omitted from the claims of the ’578 patent any
`
`language that would require downloading to, or execution at, the client.
`
`
`
`The principal claim construction dispute in these cases, as well as in earlier cases, arises
`
`from the effort by defendants to persuade the Court to read into the claims of the ’578 patent
`
`limitations found only in the ’466 patent claims.
`
`
`
`
`
`
`1 U.S. Patent No. 6,510,466 (Ex. A).
`
`2 U.S. Patent No. 6,324,578 (Ex. B).
`
`
`
`1
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 4 of 19 PageID #: 1389Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 5 of 20 Page ID #:213
`
`OVERVIEW OF THE PATENTS
`
`
`
`The ’578 patent describes (what were in 1998) innovative methods of managing
`
`configurable application programs on a computer network for a large enterprise.3 The ’466
`
`patent also describes methods of managing patent applications, but the written description of that
`
`patent differs from the ’578 disclosure.4
`
`Both the ’578 and ’466 disclosures describe a computer network, which connects each
`
`individual user’s computer terminal (“client terminal,” or simply “client”) to a remote server
`
`(“server”) responsible for supporting that client, as well as for supporting a number of other
`
`clients. The network, in turn, connects the remote servers to a central network management
`
`server. FIG. 1 of the ’466 patent graphically illustrates this server/client arrangement:
`
`
`
`
`3 The IBM inventors filed the ’766 patent (U.S. Patent No. 6,728,766 (Ex. C)) as a divisional of
`the ’578, and thus it has the identical written description (“the ’578 disclosure”).
`
`4 The IBM inventors filed the ’293 patent (U.S. Patent No. 7,069,293 (Ex. D)) as a divisional of
`the ’466, and thus it has a written description identical to that of the ’466 (“the ’466 disclosure”).
`
`
`
`2
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 5 of 19 PageID #: 1390Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 6 of 20 Page ID #:214
`
`An application program (“application”) is software written to perform a particular
`
`function for a user (as opposed to system software, which is designed to operate the network).
`
`Common examples of applications are word processing applications (e.g., Microsoft Word) and
`
`spreadsheets (e.g., Microsoft Excel).
`
`In 1998, designers of computer networks for large enterprises were confronted with the
`
`problem of peripatetic users, i.e., users who login at different times from different clients. The
`
`IBM inventors, in these patents, describe innovative ways, circa 1998, they had reduced to
`
`practice to allow a peripatetic user to access the user’s authorized applications from any client on
`
`the network, while maintaining the user’s own selected preferences.
`
`Computer network designers in 1998 were also confronted by the problems of efficiently
`
`distributing applications throughout the enterprise, and of then frequently (and efficiently)
`
`updating those applications, while maintaining consistency among users, as to both application
`
`updates and administrator preferences. The IBM inventors devised, and reduced to practice,
`
`innovative ways to accomplish that.
`
`Finally, the IBM inventors devised methods to manage the allocation of licenses to
`
`applications in the enterprise environment, where the number of users accessing, or seeking to
`
`access, an application would exceed the number of existing licenses.
`
`Claim Construction Issues
`
`Exhibit A to the Joint Claim Construction Statement and Prehearing Memorandum listed
`
`a large number of claim terms/phrases on which the parties had not reached agreement. Since
`
`filing that document, the parties have eliminated certain disputes, and narrowed others. This
`
`brief discusses, in order of priority, the previously identified terms/phrases on which the parties
`
`still have a dispute.
`
`
`
`3
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 6 of 19 PageID #: 1391Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 7 of 20 Page ID #:215
`
`“Application Launcher Program” - as used in the ’578 patent only
`
`This term appears, as follows, in claim 15 of the ’578 patent:
`
`A method… comprising the steps of: …distributing an application launcher
`program associated with the application program to a client …;[and] obtaining a
`user set … associated with [a user] executing the application launcher
`program.”
`
`Claim term
`
`“application launcher
`program associated with the
`application program” /
`“application launcher
`programs associated with
`each of the set of the plurality
`of application programs”
`
`Uniloc’s proposed
`construction
`a program distributed to a
`client to initially populate a
`user desktop and to request
`execution of the application
`program
`
`Defendants’ proposed
`construction
`a program distributed to a
`client to initially populate a
`user desktop and to request an
`instance of the application
`program for execution at the
`client, and to specify one or
`more of the configurable
`parameters of the application
`program
`
`
`Defendants seem to agree with Uniloc’s construction, as far as it goes, including that the
`
`application launcher requests execution of the application. But Defendants want to add an
`
`extraneous requirement that the requested execution of the application occur at the client. That
`
`construction, however, would contradict the ordinary meaning of “application launcher
`
`program,” and needlessly exclude embodiments of the ’578 patented invention in which the
`
`application executes on the server.6
`
`
`
`
`
`
`5 In discussing the use of terms in the ’578 patent, this brief will focus on claim 1, as
`representative, but Uniloc’s arguments would be identical for the use of those terms in other
`claims of the ’578 patent.
`
`6 Defendants also seek to add to the construction “to specify one or more of the configurable
`parameters of the application program.” Nothing in the specification, however, seems to require
`that. At one point, the specification describes an embodiment that does not have that feature
`(12:26-31).
`
`
`
`4
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 7 of 19 PageID #: 1392Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 8 of 20 Page ID #:216
`
`The ordinary meaning of “application launcher program” supports Uniloc’s
`position.
`
`I.
`
`
`
`Uniloc submits the accompanying declaration of Dr. Michael Shamos, as to the ordinary
`
`meaning of “application launcher program.” As Dr. Shamos testifies, “application launcher” was
`
`in common use before 1998, when the application for the ’578 patent was filed. (¶ 26-32). A
`
`person of skill in the art (POSITA) at that time would have understood an “application launcher”
`
`as “a computer program that launches, i.e., starts, another computer program.” (¶ 28). Dr.
`
`Shamos provides copious examples, including the use of the term in seven prior art patents7
`
`(Shamos Decl., Ex. 2-8) and a 1997 article describing a contemporaneous product, which Novell
`
`marketed as the Novell Application Launcher. (Shamos Decl., Ex. 9)8
`
`As documented in several of Dr. Shamos’s examples, the ordinary meaning of
`
`“application launcher” reads on programs that launch executions of application on the server. (¶
`
`29-32).
`
`II.
`
`Claim 1 of the ’578 patent supports Uniloc’s position.
`
`Dr. Shamos testifies nothing in the language of claim 1 of the ’578 patent would limit
`
`“application launcher” to programs that launch only at a client. (¶¶ 33-35).
`
`
`
`Claim 1, in its entirety, reads:
`
`A method for management of configurable application programs on a network
`comprising the steps of:
`
`installing an application program having a plurality of configurable
`preferences and a plurality of authorized users on a server coupled to the
`network;
`
`
`7 Among those patents are ones entitled “Launching Computer Applications,” “Distributed
`Application Launcher for Optimizing Desktops Based on Client characteristics Information,” and
`“Protected Application Launchers with Graphical Interface.” (Shamos Decl., Ex. 2-4).
`
`8 The parties have agreed to add “distributed to a client to initially populate a user desktop” to
`the construction, to reflect its description in the specification of the ’578 patent.
`
`
`
`5
`
`

`

`
`
`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 8 of 19 PageID #: 1393Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 9 of 20 Page ID #:217
`
`distributing an application launcher program associated with the application
`program to a client coupled to the network;
`
`obtaining a user set of the plurality of configurable preferences associated
`with one of the plurality of authorized users executing the application
`launcher program;
`
`obtaining an administrator set of the plurality of configurable preferences
`from an administrator; and
`
`executing the application program using the obtained user set and the obtained
`administrator set of the plurality of configurable preferences responsive to a
`request from one of the plurality of authorized users.
`
`(emphasis added). An inspection of the entirety of claim 1 confirms that nothing in that claim
`
`refers to, or implies, “request[ing] an instance of the application program for execution at the
`
`client,” the requirement Defendants attempt to add.
`
`III. The specification of the ’578 patent supports Uniloc’s position.
`
`Dr. Shamos reviews the specification of the ’578 patent, and testifies that nothing in the
`
`specification would cause a person of skill in the art to limit the ordinary meaning of the term.
`
`(¶ 36-49). Further, he cites specific portions of the specification that would confirm the
`
`inventors intended the ordinary meaning to apply. (¶ 42-49)
`
`He points out the advantage of the invention of the ’578 patent is that a centralized
`
`database containing stored user and administrator preferences can be queried and updated. As he
`
`testifies, because that advantage does not depend on the whether the applications are executed at
`
`the client or the server, a POSITA would thus not have expected the inventors to limit the
`
`invention to an embodiment that executes applications only on the client, and they did not. (¶ 37)
`
`IV.
`
`The Court must modify its construction from a related case, as to the ’578 patent.
`
`Uniloc is, of course, aware that, in a related action, this Court, in an interlocutory
`
`Memorandum Opinion and Order (“Opinion”)(Ex. E), construed “application launcher program”
`
`across all three patents in which it appeared – including the ’578 patent – as “a program
`
`
`
`6
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 9 of 19 PageID #: 1394Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 10 of 20 Page ID
`
` #:218
`
`distributed to a client to initially populate a user desktop and to request an instance of the
`
`application for execution at the client.” (Emphasis added). In the instant actions, however,
`
`Uniloc asks the Court, with respect to claim 1 (and other claims) of the ’578 patent, to modify
`
`the second half of that construction.9
`
`To support that request, Uniloc highlights several factual statements and legal
`
`conclusions in the Opinion that need to be reconsidered, and sets forth the reasons for
`
`reconsideration.
`
`A.
`
`The construction does not reflect the ordinary meaning of “application
`launcher.”
`
`
`
`
`The Opinion (at 28) found that “application launcher program” is not a term of art, but
`
`was a term coined by the patentees for the Asserted Patents. But in that proceeding there was no
`
`evidence before the Court that the patentees coined the term, nor had they claimed to have done
`
`so. The Court was apparently misled by a bald assertion, in a brief of the defendants in that case,
`
`that the patentees had coined the term. (-393 action, Dkt. 185, at 3)(Ex. F). They had not.
`
`The declaration of Dr. Shamos, and the copious examples he cites, establish “application
`
`launcher program” was a term of art in 1998, not a term coined by the inventors here. As
`
`reflected in his testimony and the documented examples, a construction requiring execution at
`
`the client does not reflect the ordinary meaning of that term.10
`
`
`9 Uniloc is not asking the Court to modify the construction with respect to the claims of the ’466
`patent or the ’766 patent in which “application launcher” appears. Similarly, Uniloc is not
`seeking, in this action, a different construction as to those claims of the ’466 and ’766 patents.
`
`10 The Opinion (at 4) contains an error. It copies, and labels as claim 1, what is actually claim
`15. The copied claim (15) is narrower than claim 1, because claim 15 requires the server
`“provide an instance of the application program” responsive to a request from a user, a limitation
`not in claim 1. Perhaps this mistake – copying the wrong claim as claim 1 – caused the
`BACKGROUND section of the Opinion (at 4) to state, erroneously:
`
`
`
`7
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 10 of 19 PageID #: 1395Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 11 of 20 Page ID
`
` #:219
`
`
`
`B.
`
`The Opinion erred in using the prosecution history of the ’466 patent to
`construe claims of the ’578 patent.
`
`
`
`
`1. Under Abbott Laboratories, the prosecution history of the ’466 patent
`cannot be used to interpret the claims of the ’578 patent.
`
`The Opinion (at 29-30) erroneously relies on statements in the prosecution history of the
`
`’466 patent to construe how this term is used in claim 1 of the ’578 patent. The Opinion
`
`overlooks that the separate applications for the ’578 patent and the ’466 patent were not
`
`continuations, divisionals, or continuations-in-part of each other. They were filed as
`
`independent, patentably distinct applications, on the same date. Further, the inventive entities
`
`differed: the ’578 application included an inventor (Kaminsky) not an inventor on the ’466
`
`application; the ’466 application, in turn, included inventors (McGarvey and Salahshour) not on
`
`the ’578 application. Even though the applications were co-pending, shared some common
`
`inventors, and were commonly assigned, the prosecution history of one cannot limit the claims of
`
`the other.
`
`Abbott Laboratories v. Dey, L.P., 287 F.3d 1097 (Fed. Cir. 2002) is squarely on point:
`
`It is true that the ’839 and ’301 patents are commonly owned by Abbott, and
`the inventor of the ’839 patent is one of the three inventors of the ’301 patent.
`However, the ’839 application was not filed as a continuation, continuation-
`in-part, or divisional application of the ’301 application. These applications
`have no formal relationship and were presented to the patent office as
`patentably distinct inventions. … Under these circumstances, we do not see a
`basis for concluding that statements made about the characteristics of the
`surfactant claimed by the ’301 patent should be attributed to the improved
`surfactant claimed by the ’839 patent, simply because the applications had a
`common assignee, one common inventor, and similar subject matter. We
`therefore conclude that the above-quoted statements from the prosecution
`
`
`The ’578 patent relates to obtaining user and administrator preferences for the
`application programs installed at a server and providing these preferences along with
`an instance of the application program to a client for execution.
`
`(emphasis added). Inspection of the actual claim 1 readily shows nothing in it supports the
`underlined portion of that statement.
`
`
`
`8
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 11 of 19 PageID #: 1396Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 12 of 20 Page ID
`
` #:220
`
`history of the ’301 patent do not create an estoppel with respect to the ’839
`patent.
`
`Id. at 1104-05 (Emphasis added); see also In re Berg, 140 F.3d 1428, 1435 n. 7 (Fed. Cir. 1998)
`
`(noting, in the context of considering a double patenting rejection, that two applications filed by
`
`the same inventor were “not related as by continuation, continuation-in-part, or divisional” and
`
`that filing such two separate applications implied “that each application is independent and
`
`patentably distinct”).
`
`
`
`The Opinion (at 11-14) justified reliance on the ’466 prosecution history by citing
`
`Verizon Servs. Corp. v. Vonage Holdings Corp., 503 F.3d 1295, 1306-07 (Fed. Cir. 2007) and
`
`Microsoft Corp. v. Multi-tech Sys., Inc., 357 F.3d 1340, 1350 (Fed. Cir. 2004). The Opinion,
`
`however, overlooked that the applications in those cases were formally related, as continuations,
`
`continuations-in-part, or divisionals, unlike the relationship between the ’578 application and the
`
`’466 application. That is the critical distinction Abbott Laboratories highlights. Additionally, in
`
`Verizon and Microsoft, the inventive entities were the same. Here, the inventive entities differ.
`
`The inventive entity of the ’466 application did not include Kaminsky and thus that entity would
`
`not have authority to surrender, on Kaminsky’s behalf, the scope of claims that Kaminsky, et al.,
`
`had obtained.
`
`
`
`C.
`
`The Opinion erred in using the prosecution history of the ’766 patent to
`construe the claims of the ’578 patent.
`
`
`
`
`1. Under Microsoft and Georgia-Pacific, statements in the prosecution
`history of the ’766 patent do not affect construction of claims in the ’578
`patent.
`
`The Opinion (at 29) erroneously relied on statements in the prosecution history of the
`
`’766 patent to construe how this term is used in the ’578 patent. The error, however, is different
`
`from the one recited above. Because the application for the ’766 patent was a divisional of the
`
`application for the ’578 patent, Abbott Laboratories would not apply. Under the authority of
`
`
`
`9
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 12 of 19 PageID #: 1397Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 13 of 20 Page ID
`
` #:221
`
`both Microsoft and Verizon, the prosecution history of the ’766 patent could have relevance to
`
`construction of the ’578 patent.
`
`But there are two significant limitations, which prevent using those prosecution histories
`
`here to construe the ’578 patent. In Microsoft, 357 F.3d at 1349 n. 7, the majority opinion
`
`distinguished statements in a prosecution history that “refer more specifically to the references
`
`cited against the claims of the [patent being prosecuted] only.” The majority limited the
`
`relevance of those statements to construction of the claims of the patent then being prosecuted,
`
`holding statements of that type could not be used to construe claims of other patents in the
`
`family. Thus, under Microsoft, statements in the prosecution history of the ’766 patent that refer
`
`to references cited against claims of the ’766 patent cannot be cited to construe other patents,
`
`however related. The statements from the ’766 prosecution history that the Opinion (at 29)
`
`refers to clearly fall in that category, as they are statements distinguishing prior art references
`
`(Duvvoori, Franklin, Christiano ) cited against only the claims of the ’766 patent.
`
`The other significant limitation arises from Georgia-Pacific Corp. v. United States
`
`Gypsum Co., 195 F.3d 1322, 1333 (Fed. Cir. 1999). As the majority opinion in Microsoft, 357
`
`F.3d at 1350, itself acknowledges, the Georgia-Pacific case:
`
`rejected the argument that the patentee was “bound by” statements made
`by the applicant in connection with a later application after the patent in
`suit had already issued. … We rejected the argument that the patentee was
`bound, or estopped, by a statement made in connection with a later
`application on which the examiner of the first application could not have
`relied.
`
`Here, the ’578 patent issued on November 27, 2001. The examiner of the ’578 patent
`
`could not have relied on any statements made after that date in the prosecution of the ’766 patent,
`
`and there were no statements before that date. Although the application for the ’766 patent was
`
`filed on April 10, 2001, as it turns out, there were no statements at all in that prosecution until
`
`
`
`10
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 13 of 19 PageID #: 1398Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 14 of 20 Page ID
`
` #:222
`
`well after November 27, 2001 because the Patent Office did not issue its first office action in that
`
`prosecution until May 7, 2002. The applicant first responded on August 1, 2002. Georgia-
`
`Pacific would hold that those, and any later, statements in the ’766 prosecution cannot bind, or
`
`estop, the patentee of an earlier patent.
`
`Here, where the intrinsic record of the ’578 patent, namely, its specification and
`
`prosecution history, does not itself limit the construction of “application launcher,” Georgia-
`
`Pacific holds that post-issuance statements in a continuation or divisional do not bind or create
`
`an estoppel as to the ’578 patent itself.
`
`As to use of the prosecution history of the ’466 patent to construe claims of the ’578
`
`patent, Abbott Laboratories creates an absolute bar, as argued earlier. But it is worth noting that
`
`if Abbott Laboratories did not apply, Microsoft and Georgia-Pacific still would. The use of
`
`statements from the ’466 patent history would have to be shown to satisfy the requirements of
`
`both cases, before it could be used to construe claims of the ’578 patent.
`
`“Application Program” - ’578, ’293, and ’766 patents only
`
`Claim term
`
`application program(s) /
`application(s)
`
`Uniloc’s proposed
`construction
`code associated with
`performing function for a
`user
`
`Defendants’ proposed
`construction
`the code associated with the
`underlying program functions
`that is a separate application
`from a browser interface and
`does not execute within the
`browser window
`
`An application program does
`not include a resource such as
`a static HTML file, a
`dynamically generated page
`created by a CGI-based
`program, or a source of
`information identified by a
`Uniform Resource Locator
`(URL) and published by a
`
`
`
`11
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 14 of 19 PageID #: 1399Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 15 of 20 Page ID
`
` #:223
`
`Claim term
`
`Uniloc’s proposed
`construction
`
`Defendants’ proposed
`construction
`Web server, such as a web
`page, a complete web site, a
`web-enabled database, or an
`applet.
`
`
`
`
`An application is software written to perform a particular function for a user -- as
`
`opposed to system software, which is designed to operate the network. Nothing in the ordinary
`
`meaning of “application,” nor any other language in the asserted claims of the ’578, ’293, or
`
`’766 patents, if given its ordinary meaning, would rule out execution within the browser window.
`
`
`
`Dr. Shamos, in his declaration (¶ 50-53) testifies that no portion of the ’578 patent
`
`contains, or otherwise supports, a construction of claim 1 of the’578 patent that would exclude
`
`an application that executes within the browser window. In fact, he cited a passage from the
`
`specification (8:7-20) of that patent that describes an exemplary situation in which the
`
`application is literally executed within the browser window:
`
`It is further to be understood that, in the JAVA™ environment, currently
`available web browser applications are known to those of skill in the art
`which provide a user interface and allow hardware independent
`communication such as that currently specified by Internet protocols. Thus,
`the application launcher programs may be applets which display the icon
`which are associated with a web browser Universal Resource Locator
`(URL) which points to the location of the applet to be executed. Upon
`selection of the icon displayed by the application launcher, the selected
`application is “launched” by requesting the URL of the application from
`the on-demand server. Such requests may be made utilizing conventional
`Hyper-Text Transfer Protocol (HTTP) communications or other suitable
`protocols.
`
`Dr. Shamos testifies:
`
`The above passage describes an exemplary situation in which the
`application is literally executed within the browser window. A Java applet
`is a hardware- and operating system-independent piece of code, written in
`a language known as Java bytecode, which is downloaded to a client and
`executed using software known as a “Java Virtual Machine” (JVM). All
`major browsers implemented a JVM; otherwise, they would not have been
`
`
`
`12
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 15 of 19 PageID #: 1400Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 16 of 20 Page ID
`
` #:224
`
`able to support webpages containing Java applets. Thus, the construction of
`claim 1 would not read on this embodiment.
`
`A construction that would result in no claim reading on a preferred embodiment is highly
`
`suspect. Rexnord Corp. v. Laitram Corp., 274 F.3d 1336, 1342-43 (Fed. Cir. 2001).
`
`
`
`The Opinion, however, had adopted a construction that included “does not execute within
`
`the browser window,” seemingly across all four patents. The sole basis for that was that the
`
`patentees of the ’466 patent, during the prosecution history of the ’466 patent, argued “an
`
`instance of the application program … executes locally at the client as a separate application
`
`from the browser interface [and] would not execute within the browser window.” Opinion at 20.
`
`
`
`Uniloc does not object to that construction, as applied to the ’466 patent. To begin with,
`
`the statements on which the Court relied were made during the prosecution of that patent.
`
`Further, the statements reasonably describe the invention of the claims of the ’466 patent. The
`
`claims of that patent literally require “providing an instance of the … application… to the client
`
`for execution,” seemingly ruling out executing remotely within the browser window.
`
`
`
`But a POSITA would not understand the statements as applying to the inventions claimed
`
`in the other three patents, as those claims omit any such requirements. Legal issues aside, the
`
`statements would make no sense, if they had appeared in the prosecution history of the other
`
`patents.
`
`
`
`As Dr. Shamos testified, the claims of the ’578 patent do not specify where applications
`
`are executed, and the specification of that patent includes an embodiment that literally executes
`
`within the browser window. Similarly, the claims of the ’293 patent do not relate at all to where
`
`or how applications are executed, but only to transmitting applications from a network
`
`management server to an intermediate server.
`
`
`
`13
`
`

`

`Case 2:16-cv-00862-RWS Document 117 Filed 09/22/17 Page 16 of 19 PageID #: 1401Case 8:19-cv-01151-JLS-DFM Document 24-5 Filed 09/12/19 Page 17 of 20 Page ID
`
` #:225
`
`
`
`In any event, for the reasons described above, under Abbott Laboratories, statements in
`
`the ’466 prosecution history cannot be considered at all in construing the ’578 or ’766 patents.
`
`As to the ’293 patent, the statements, apart from not being relevant to

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket