throbber
1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 1 of 21
`
`Michael A. Sherman (SBN 94783)
`masherman@stubbsalderton.com
`Jeffrey F. Gersh (SBN 87124)
`jgersh@stubbsalderton.com
`Sandeep Seth (SBN 195914)
`sseth@stubbsalderton.com
`Wesley W. Monroe (SBN 149211)
`wmonroe@stubbsalderton.com
`Stanley H. Thompson, Jr. (SBN 198825)
`sthompson@stubbsalderton.com
`Viviana Boero Hedrick (SBN 239359)
`vhedrick@stubbsalderton.com
`STUBBS, ALDERTON & MARKILES, LLP
`15260 Ventura Blvd., 20th Floor
`Sherman Oaks, CA 91403
`Telephone:
`(818) 444-4500
`Facsimile:
`(818) 444-4520
`
`Attorneys for Defendants
`[Additional Attorneys listed below]
`
`
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`SAN JOSE DIVISION
`
`CASE NO.: 5:18-md-02834-BLF
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`
`Case No.: 5:18-cv-00767-BLF
`
`
`IN RE PERSONALWEB TECHNOLOGIES,
`LLC, ET AL., PATENT LITIGATION
`
`
`
`
`AMAZON.COM, INC., et al.,
`
`
`
`v.
`
`Plaintiffs,
`
`PERSONALWEB TECHNOLOGIES, LLC, et
`al.,
`
`
`
`Defendants.
`
`PERSONALWEB TECHNOLOGIES, LLC and
`LEVEL 3 COMMUNICATIONS, LLC,
`
`
`
`v.
`
`Counterclaimants,
`
`AMAZON.COM, INC. and AMAZON WEB
`SERVICES, INC.,
`
`
`
`
`
`
`Counterdefendants.
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 2 of 21
`
`Counterclaimant PersonalWeb Technologies, LLC (“Counterclaimant” or “PersonalWeb”)
`
`brings this Counterclaim for patent infringement against Counterdefendants Amazon.com, Inc.
`
`(“Amazon.com”) and Amazon Web Services, Inc. (“AWS”) (collectively, “Amazon” or
`
`“Counterdefendant”). Counterclaimant PersonalWeb alleges:
`
`PRELIMINARY STATEMENT
`
`1.
`
`PersonalWeb and Level 3 Communications, LLC (“Level 3”) are parties to an
`
`agreement between Kinetech, Inc. and Digital Island, Inc. dated September 1, 2000 (the “Agreement”).
`
`Pursuant to the Agreement, PersonalWeb and Level 3 each own a fifty percent (50%) undivided
`
`interest in and to the patents at issue in this action: U.S. Patent Nos. 6,928,442, 7,802,310, and
`
`8,099,420 (“Patents-in-Suit”). Level 3 has joined in this Complaint pursuant to its contractual
`
`obligations under the Agreement, at the request of PersonalWeb.
`
`2.
`
`Pursuant to the Agreement, Level 3 has, among other rights, certain defined rights to
`
`use, practice, license, sublicense and enforce and/or litigate the Patents-in-Suit in connection with a
`
`particular field of use (“Level 3 Exclusive Field”). Pursuant to the Agreement PersonalWeb has,
`
`among other rights, certain defined rights to use, practice, license, sublicense, enforce and/or litigate
`
`the Patents-in-Suit in fields other than the Level 3 Exclusive Field (the “PersonalWeb Patent Field”).
`
`3.
`
`All
`
`infringement allegations, statements describing PersonalWeb, statements
`
`describing any Counterdefendant (or any Counterdefendant’s products) and any statements made
`
`regarding jurisdiction and venue are made by PersonalWeb alone, and not by Level 3. PersonalWeb
`
`alleges that the infringements at issue in this case all occur within, and are limited to, the PersonalWeb
`
`Patent Field. Accordingly, PersonalWeb has not provided notice to Level 3—under Section 6.4.1 of
`
`the Agreement or otherwise—that PersonalWeb desires to bring suit in the Level 3 Exclusive Field in
`
`its own name on its own behalf or that PersonalWeb knows or suspects that Counterdefendant is
`
`infringing or has infringed any of Level 3’s rights in the patents.
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`1
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 3 of 21
`
`THE PARTIES
`
`4.
`
`Counterclaimant PersonalWeb Technologies, LLC is a limited liability company duly
`
`organized and existing under the laws of Texas with its principal place of business at 112 E. Line
`
`Street, Suite 204, Tyler, TX 75702.
`
`5.
`
`Counterclaimant Level 3 Communications, LLC is a limited liability company
`
`organized under the laws of Delaware with its principal place of business at 100 CenturyLink Drive,
`
`Monroe, Louisiana, 71203.
`
`6.
`
`PersonalWeb’s infringement claims asserted in this case are asserted by PersonalWeb
`
`and all fall outside the Level 3 Exclusive Field. Level 3 is currently not asserting patent infringement
`
`in this case in the Level 3 Exclusive Field against any Counterdefendant.
`
`7.
`
`Amazon alleges that Amazon.com, Inc. is a Delaware corporation with offices and
`
`employees throughout several of the United States, including the Northern District of California.
`
`8.
`
`Amazon alleges that AWS is a wholly-owned subsidiary of Amazon.
`
`JURISDICTION AND VENUE
`
`9.
`
`The court has subject matter jurisdiction of this counterclaim pursuant to 28 U.S.C.
`
`§§ 1331 and 1338(a) because this counterclaim arises under the patent laws of the United States,
`
`35 U.S.C. §§ 1 et seq.
`
`10.
`
`Venue is proper in this federal district pursuant to 28 U.S.C. §§ 1391(b)–(c) and
`
`1400(b) because, on information and belief, Counterdefendant has a regular and established place of
`
`business in this District and has committed acts of infringement in this District.
`
`11.
`
`This court has personal jurisdiction over Amazon.com because, in addition to the
`
`allegations in above paragraphs, Amazon.com has purposely directed its declaratory judgment
`
`activities related to the patents-in-suit into the Northern District of California. Further, on information
`
`and belief, Amazon.com purposefully directed activities at residents of California, the claims in the
`
`counterclaim arise out of and relate to those activities, and assertion of personal jurisdiction over
`
`Amazon.com would be fair.
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`2
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 4 of 21
`
`12.
`
`This court has personal jurisdiction over AWS because, in addition to the allegations
`
`in above paragraphs, AWS has purposely directed its declaratory judgment activities related to the
`
`patents-in-suit into the Northern District of California. Further, on information and belief, AWS
`
`purposefully directed activities at residents of California, the claims in the counterclaim arise out of
`
`and relate to those activities, and assertion of personal jurisdiction over AWS would be fair.
`
`PERSONALWEB BACKGROUND
`
`13.
`
`The Patents-in-Suit cover fundamental aspects of cloud computing, including the
`
`identification of files or data and the efficient retrieval thereof in a manner which reduces bandwidth
`
`transmission and storage requirements.
`
`14.
`
`The ability to reliably identify and access specific data is essential to any computer
`
`system or network. On a single computer or within a small network, the task is relatively easy: simply
`
`name the file, identify it by that name and its stored location on the computer or within the network,
`
`and access it by name and location. Early operating systems facilitated this approach with standardized
`
`naming conventions, storage device identifiers, and folder structures.
`
`15.
`
`Ronald Lachman and David Farber, the inventors of the Patents-in-Suit, recognized
`
`that the conventional approach for naming, locating, and accessing data in computer networks could
`
`not keep pace with ever-expanding, global data processing networks. New distributed storage systems
`
`use files that are stored across different devices in dispersed geographic locations. These different
`
`locations could use dissimilar conventions for identifying storage devices and data partitions.
`
`Likewise, different users could give identical names to different files or parts of files—or unknowingly
`
`give different names to identical files. No solution existed to ensure that identical file names referred
`
`to the same data, and conversely, that different file names referred to different data. As a result,
`
`expanding networks could not only become clogged with duplicate data, they also made locating and
`
`controlling access to stored data more difficult.
`
`16.
`
`Lachman and Farber developed a solution: replacing conventional naming and storing
`
`conventions with system-wide “substantially unique,” content-based identifiers. Their approach
`
`assigned substantially unique identifiers to “data items” of any type: “the contents of a file, a portion
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`3
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 5 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`of a file, a page in memory, an object in an object-oriented program, a digital message, a digital
`
`scanned image, a part of a video or audio signal, or any other entity which can be represented by a
`
`sequence of bits.” Applied system-wide, this invention would permit any data item to be stored,
`
`located, managed, synchronized, and accessed using its content-based identifier.
`
`17.
`
`To create a substantially unique, content-based identifier, Lachman and Farber turned
`
`to cryptography. Cryptographic hash functions, including MD4, MD5, and SHA, had been used in
`
`computer systems to verify the integrity of retrieved data—a so-called “checksum.” Lachman and
`
`Farber recognized that these same hash functions could be devoted to a vital new purpose: if a
`
`cryptographic hash function was applied to a sequence of bits (a “data item”), it would produce a
`
`substantially unique result value, one that: (1) virtually guarantees a different result value if the data
`
`item is changed; (2) is computationally difficult to reproduce with a different sequence of bits; and
`
`(3) cannot be used to recreate the original sequence of bits.
`
`18.
`
`These cryptographic hash functions would thus assign any sequence of bits, based on
`
`content alone, with a substantially unique identifier. Lachman and Farber estimated that the odds of
`
`these hash functions producing the same identifier for two different sequences of bits (i.e., the
`
`“probability of collision”) would be about 1 in 2 to the 29th power. Lachman and Farber dubbed their
`
`content-based identifier a “True Name.”
`
`19.
`
`Using a True Name, Lachman and Farber conceived various data structures and
`
`methods for managing data (each data item correlated with a single True Name) within a network—
`
`no matter the complexity of the data or the network. These data structures provide a key-map
`
`organization, allowing for a rapid identification of any particular data item anywhere in a network by
`
`comparing a True Name for the data item against other True Names for data items already in the
`
`network. In operation, managing data using True Names allows a user to determine the location of
`
`any data in a network, determine whether access is authorized, and to selectively provide access to
`
`specific content not possible using the conventional naming arts.
`
`20.
`
`On April 11, 1995, Lachman and Farber filed their patent application, describing these
`
`and other ways in which content-based “True Names” elevated data-processing systems over
`
`conventional file-naming systems. The first True Name patent issued on November 2, 1999. The last
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`4
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 6 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`of the Patents-in-Suit has expired, and the allegations herein are directed to the time period before
`
`expiration of the last of the Patents-in-Suit.
`
`21.
`
`PersonalWeb has successfully enforced its intellectual property rights against third
`
`party infringers, and its enforcement of the Patents-In Suit is ongoing. This enforcement has resulted
`
`in PersonalWeb obtaining settlements and granting non-exclusive licenses regarding the Patents-in-
`
`Suit.
`
`22.
`
`PersonalWeb has filed actions against various website operators (“website
`
`defendants”) for infringement of several of the True Name patents.1 In some of these actions, inter
`
`alia, PersonalWeb alleges that the website defendants infringe certain claims of the True Name patents
`
`through their control over and use of certain aspects of Amazon’s S3 system to distribute their webpage
`
`content so that downstream intermediate caches and end-point browsers only serve/use the latest
`
`content authorized by the website defendant. In those actions, PersonalWeb also alleges that the
`
`certain website defendants also infringe certain claims of the True Names patents through the
`
`combination of their control over and use of these certain aspects of Amazon’s S3 system and their
`
`control over and use of certain aspects of the website architecture they have used to produce webpages
`
`for their websites.
`
`23.
`
`In the actions against these website defendants, PersonalWeb alleges that the website
`
`defendants directly infringe the asserted True Name patents because for each of the elements of the
`
`asserted claims, the website defendants either perform or direct and control the vicarious performance
`
`of each claimed element and used the claimed system such that infringement is attributable to the
`
`website owner. See, Travel Sentry, Inc. v. Tropp, 497 Fed. App’x 958 (Fed. Cir. 2017). Moreover,
`
`while the law on direct infringement has been undergoing tremendous development since the U.S.
`
`Supreme Court’s decision in Limelight Networks, Inc. v. Akamai Technologies, Inc., 134 S. Ct. 2111
`
`(2014), it is also possible this Court may find in lawsuits against the website defendants that despite
`
`infringement of the patents-in-suit, such website defendants are not the ones directly infringing, but
`
`rather Amazon is. Thus, PersonalWeb is hereby pleading direct infringement by Amazon or the
`
`website defendants in the alternative. Fed. R. Civ. Proc. 8(d)(2); US Gypsum Co. v. Nat’l Gypsum
`
`
`
`
`1 See, FAC, ¶ 23.
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`5
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 7 of 21
`
`Co., 77 S. Ct 490, 495-96 (1956); Lifetime Indus., Inc. v. Trim-Lok, Inc., 869 F.3d 1372, 1381 (Fed.
`
`Cir. 2017); Milo & Gabby, LLC v. Amazon.com, Inc., 12 F. Supp. 3d 1341, 1353-54 (W.D. Wa. 2014).
`
`24.
`
`Apart from the issue of direct infringement, there is a legal question as to who is “using”
`
`the claimed methods and systems. In Joy Technologies v. Flakt, Inc., 6 F.3d 770 (Fed. Cir. 1993), the
`
`Federal Circuit held that when one party built a factory for a second party and the second party used
`
`the factory, it was the second party that “used” a method patent covering a method performed by the
`
`factory. The present cases are similar to the facts in Joy Technologies, except that instead of the second
`
`party (i.e., website operators) owning the system built by the first party, the second party is in essence
`
`leasing the system built by the first party so that it may use it to serve its webpages. As with direct
`
`infringement, though, the situation here is different enough from the facts of Joy Technologies that
`
`this or another court may find that it is the builder of the factory (i.e., Amazon) that is the “user” of
`
`the method performed by the factory rather than the purchaser/lessor of the factory (i.e., the website
`
`operators). Thus, as with direct infringement, if S3 performs all the elements of a method claim of a
`
`True Name patent, either Amazon or the website operator is the “user” of the method performed by
`
`Amazon’s S3 for the purposes of patent law. So, again, PersonalWeb is hereby pleading that the
`
`method performed by Amazon’s S3 is either by Amazon or the website defendants (or both), in the
`
`alternative.
`
`GENERAL BACKGROUND
`
`25.
`
`A webpage is a type of document that is typically retrieved over the World Wide Web,
`
`made viewable and formatted (rendered) by a web browser, and displayed electronically. A “webpage”
`
`often refers to what is visible in a browser, but sometimes also refers to a computer file “webpage base
`
`file”), usually written in Hypertext Markup Language (“HTML”) or a comparable markup language.
`
`Such HTML webpage base files typically include text, formatting, and references (hyperlinks) to other
`
`web contents, such as style sheets, scripts, and images that make up part of the webpage. Web contents
`
`referenced in an HTML or similar file are also called “webpage assets” or “asset files” herein. The
`
`web browser coordinates the retrieval of the various asset files of a webpage and renders the webpage
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`6
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 8 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`for display from the webpage base file and the asset files referenced in the webpage base file or
`
`referenced in other asset files.
`
`26.
`
`On the World Wide Web, hyperlinks generally include Uniform Resource Identifiers
`
`(“URIs”), which each typically include an address of a server (“host”) from which the asset file is to
`
`be retrieved (e.g., “www.website.com”), a “path” to the location of that asset file on the host server
`
`(e.g., “/directory/”), and a filename (e.g., “filename.ext”).
`
`27.
`
`On the Internet, a web browser typically retrieves a webpage base file from a remote
`
`web server and retrieves referenced asset files from the same or different servers. The web browser
`
`retrieves a webpage base file or an asset file by making a GET “request” to a web server using the
`
`Hypertext Transfer Protocol (“HTTP”), an industry standard. The web server may respond to such an
`
`HTTP request with a HTTP “response” that includes the requested web content and may include other
`
`information or instructions.
`
`28.
`
`A static webpage is delivered exactly as stored, as web content in the web server’s file
`
`system or memory. In contrast, a dynamic webpage is generated by a web server application, usually
`
`driven by server-side software, upon receipt of a request from a browser (user). For example, a picture
`
`of a building might be delivered as static content (a picture) whereas the latest traffic conditions may
`
`be delivered dynamically based on real time traffic information.
`
`29.
`
`The speed of a browser retrieving webpage base files and incorporated asset files can
`
`be increased by the browser storing previously retrieved webpage base files and asset files in a browser
`
`“cache” on the computer running the browser. If a browser’s user later requests a previously retrieved
`
`webpage base file or requests a webpage that includes an asset file previously used by the browser in
`
`rendering the same or a different webpage (for example, by reloading a webpage or visiting the same
`
`webpage again), the browser may use the cached webpage base file or asset file rather than having to
`
`download the same file repeatedly over the Internet again.
`
`30.
`
`Two computers communicating over the Internet usually are not directly connected to
`
`each other but rather interact via chains of network appliances and other computers (e.g., “switches”
`
`and “intermediate” servers). Many intermediate servers have caches similar to and complementing
`
`the browser cache that store webpage base files and assets that pass through that intermediate server.
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`7
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 9 of 21
`
`If a browser or server requests a file from the intermediate server that is present in that intermediate
`
`server’s cache, the intermediate server can use the content in its cache to respond to the request rather
`
`than send the request upstream towards the web server from which the file initially originated (also
`
`called the “origin server”).
`
`31.
`
`Responses to HTTP requests may include header elements (control elements) and a
`
`body (the “object” that was requested). Under HTTP, web servers can include a “cache-control”
`
`header with a response that includes a webpage or asset file. A “cache-control” header includes one
`
`or more directives that instruct browsers and intermediate server caches (“intermediate caches”) as to
`
`whether and for how long the file (object) included in the response may be cached or under what
`
`circumstances and under what conditions the cached content may be used. HTTP also provides for
`
`including other headers in responses that provide similar types of instructions to browsers and
`
`intermediate caches. Collectively, these other headers and directives in a “cache-control” header are
`
`referred to herein as “cache-control headers.”
`
`32.
`
`Given that webpage content changes, sometimes rather quickly and regularly, a
`
`problem that website owners face is effectively instructing a browser that is re-rendering a previously
`
`cached webpage that one or more of its cached files for that webpage are no longer the correct and
`
`authorized content (the content of those files has changed) and similarly reauthorizing the use of those
`
`cached files whose content has not changed.
`
`33.
`
`On one hand, website owners want to encourage the browsers that render their web
`
`pages to use cached files thereby reducing the number of requests for these files that are being made
`
`to their webpage servers. Therefore, they frequently will set cache-control headers that authorize the
`
`browser to cache their webpage base files and asset files so the files are on hand when the browser
`
`needs to render that webpage again. On the other hand, website owners want the browsers to use the
`
`latest authorized files so that their users do not see the wrong content when viewing their webpage.
`
`COUNTERDEFENDANT’S BACKGROUND
`
`34.
`
`On information and belief, Counterdefendant provided on-demand cloud computing
`
`services on a subscription basis.
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`8
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 10 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`35.
`
`On information and belief, in addition to the website defendants named in the above-
`
`referenced lawsuits, Amazon alleges that it “handles approximately 12 trillion requests per month”
`
`and Amazon’s S3 “services millions of requests per second.” Declaration of Trevor Rowe, Dkt. No.
`
`42-4, ¶ 5, Declaration of Dr. Preshant Shenoy, Dkt. No. 42-1, ¶ 35. On information and belief, Amazon
`
`thus has numerous additional customers (“web server customers”) that have used Amazon’s S3 as
`
`their web host server (“S3 web host server”) to host and serve certain content used in rendering the
`
`customers’ webpages since before expiration of the last to expire of the Patents-in-Suit.2
`
`36.
`
`On information and belief, the S3 web host servers provided a system of notifications
`
`and authorizations to allow their web server customers to control the distribution of content, e.g., what
`
`webpage content may be served from the S3 web host for the web server customers’ webpage(s) and
`
`intermediate caches and what cached webpage content a browser is re-authorized to use to render the
`
`web server customers’ webpage(s).
`
`37.
`
`On information and belief, S3 web host servers and their associated method of
`
`providing webpage content, responded on behalf of their web server customers to “conditional” HTTP
`
`GET requests with If-None-Match headers and associated content-based ETag values for webpage
`
`asset files that the web server customers uploaded to S3 web host servers for hosting and service, the
`
`asset files being required to render various webpages of the web server customers.
`
`38.
`
`On information and belief, S3 web host servers and associated method used these
`
`ETags to instruct both the intermediate cache servers and the endpoint caches at browsers to verify
`
`whether they were still authorized to reuse the previously cached webpage base files of the web server
`
`customers and to instruct them to obtain newly authorized content in rendering the web server
`
`customers’ webpage when that content had changed. In other words, whether the previously cached
`
`content was still considered valid for use by the web server customers.
`
`39.
`
`On information and belief, Amazon thereby reduced the bandwidth and computation
`
`required by its S3 web host servers (acting as origin servers for its web server customers) and any
`
`intermediate cache servers to field user requests to render the web server customers’ webpages as
`
`
`
`2 While the counterclaim is sometimes written in the present or present perfect tense, all
`specific allegations are directed to the system’s operations and the method’s performance in the
`
`relevant time period.
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`9
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 11 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`those servers only need to serve files whose content has changed. On information and belief, this has
`
`allowed for the efficient update of cached information only when such content has changed, thereby
`
`reducing transaction overhead and bandwidth and allowing the authorized content to be served from
`
`the nearest cache.
`
`40.
`
`On information and belief, the web server customers contracted with Amazon to use
`
`Amazon’s S3 system to store and serve the web server customers’ webpage content on their behalf,
`
`including certain automation features to perform certain accused portions of the method and operate
`
`certain accused portions of the system on their behalf. On information and belief, once the web server
`
`customers’ webpage files were compiled and are complete, the web server customers uploaded them
`
`to S3 web host servers as objects.
`
`41.
`
`On information and belief, an object’s value comprised a sequence of bits and, upon
`
`upload, an object’s associated ETag value was generated by the S3 web host server by applying a hash
`
`function to the sequence of bits; wherein any two objects comprising identical sequences of bits had
`
`identical associated ETag values. Thus, on information and belief, when an object’s content was
`
`changed and uploaded to the S3 web host server, a new associated ETag value was generated on the
`
`web server customers’ behalf. Upon information and belief, this ETag was used by Amazon and its
`
`web server customers in authorizing or disallowing the respective service or use of the object’s content
`
`by intermediate cache servers and endpoint caches such as browser caches.
`
`42. More particularly, on information and belief, each of the web server customers’
`
`webpages included a webpage base file (e.g., a main or initial HTML file) and one or more asset files
`
`referenced in the webpage base file (or referenced in other asset files that contained references to other
`
`asset files). On information and belief, the references in the webpage base file to the asset files needed
`
`to render the webpage were typically Uniform Resource Identifiers (“URIs”), which each typically
`
`included a filename, the address of a host server from which the asset file could be retrieved, and a
`
`“path” to the location of that asset file on that server.
`
`43.
`
`On information and belief, when the web server customers created a webpage base file
`
`for a webpage, whether dynamic or static, that webpage base file included a sequence of bits. On
`
`information and belief, the web server customers created these webpage base files without using
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`10
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 12 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`Amazon S3 web host servers—rather, they were created on non-S3 servers and served to users’
`
`browsers by non-S3 web servers. On information and belief, in most cases an associated ETag value
`
`was generated for the webpage base file by the web server customers by applying a hash function to
`
`the sequence of bits, wherein any two webpage base files comprising identical sequences of bits had
`
`identical associated ETag values—but again, the ETags for webpage base files were generated
`
`independent of Amazon S3 web host servers.
`
`44.
`
`On information and belief, when an intermediate cache server or a browser requested
`
`a webpage from a web server customer for the first time, it sent an HTTP GET request with the web
`
`server customer’s webpage’s URI and the web server customer’s origin server (not an S3 web host
`
`server) responded by sending an HTTP 200 (OK) response message containing the webpage base file,
`
`along with any respective associated ETag, if such an ETag was generated. On information and belief,
`
`the intermediate cache server or a browser then sent individual HTTP GET requests, each with an
`
`asset file’s URI that was referenced in the webpage base file. For each such request, the server
`
`identified in the URI or an upstream cache server responded by sending an HTTP 200 response
`
`containing the requested asset file. On information and belief, if the URI of an asset file identified an
`
`S3 server, the HTTP 200 response included the asset file’s associated ETag.
`
`45.
`
`On information and belief, upon receipt of the HTTP 200 responses, the intermediate
`
`cache server or browser cached the webpage base file and asset files with their associated URIs and
`
`associated ETag values, if applicable, and the browser used them in rendering the requested web page
`
`of the web server customer. On information and belief, the intermediate cache servers and browser
`
`caches were caused to maintain databases/tables which mapped the URIs of asset files/webpage base
`
`files to their respective responses and, if applicable, associated cache-control headers and ETags.
`
`46.
`
`On information and belief, by responding to an HTTP GET request for a given webpage
`
`asset file by transmitting the content of an asset file with an associated ETag, Amazon and/or its web
`
`server customers instructed the browser cache, and all intermediate cache servers, to use an HTTP
`
`conditional GET request the next time that asset file is requested. More specifically, on information
`
`and belief, the browser or intermediate cache was instructed to include the ETag in the HTTP
`
`conditional GET request with an “If-None-Match” header to re-verify that they were still authorized
`
`
`
`
`FIRST AMENDED COUNTERCLAIM
`
`
`11
`
`
`
`
`CASE NO: 5:18-md-02834-BLF
`CASE NO: 5:18-cv-00767-BLF
`
`

`

`
`
`Case 5:18-md-02834-BLF Document 257 Filed 10/04/18 Page 13 of 21
`
`to serve or use that content or determine that they are no longer authorized to use that content and
`
`therefore must use new content.
`
`47.
`
`On information and belief, Amazon and/or its web server customers did this, for
`
`example, by causing cache-control headers to be included in HTTP responses containing the web
`
`server customers’ asset files. On information and belief, Amazon and

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket