throbber
Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13976 Page 1 of 21
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`JOHN ALLCOCK (Bar No. 98895)
`john.allcock@dlapiper.com
`SEAN C. CUNNINGHAM (Bar No. 174931)
`sean.cunningham@dlapiper.com
`ERIN GIBSON (Bar No. 229305)
`erin.gibson@dlapiper.com
`ROBERT WILLIAMS (Bar No. 246990)
`robert.williams@dlapiper.com
`TIFFANY MILLER (Bar No. 246987)
`tiffany.miller@dlapiper.com
`DLA PIPER LLP (US)
`401 B Street, Suite 1700
`San Diego, California 92101-4297
`Tel: 619.699.2700
`Fax: 619.699.2701
`
`ROBERT BUERGI (Bar No. 242910)
`robert.buergi@dlapiper.com
`DLA PIPER LLP (US)
`2000 University Avenue
`East Palo Alto, CA 94303-2215
`Tel: 650.833.2000
`Fax: 650.833.2001
`
`Attorneys for Plaintiff
`APPLE INC.
`
`
`MARK C. SCARSI (Bar No.
`183926)
`mscarsi@milbank.com
`ASHLEE N. LIN (Bar No.
`275267)
`anlin@milbank.com
`MILBANK, TWEED, HADLEY &
`MCCLOY LLP
`2029 Century Park East, 33rd Floor
`Los Angeles, CA 90067
`Tel: 424.386.4000
`Fax: 213.629.5063
`
`CHRISTOPHER J. GASPAR
`(admitted pro hac vice)
`cgaspar@milbank.com
`MILBANK, TWEED, HADLEY
`& MCCLOY LLP
`28 Liberty Street
`New York, NY 10005
`Tel: 212.530.5000
`Fax: 212.822.5019
`
`UNITED STATES DISTRICT COURT
`
`SOUTHERN DISTRICT OF CALIFORNIA
`
`APPLE INC.,
`
`Plaintiff,
`
`v.
`
`WI-LAN, INC.,
`
`Defendant.
`
`
`
`
`
`
`
`AND RELATED
`COUNTERCLAIMS
`
`
`
`
`
`WEST\280873160
`
`
`
`CASE NO. 3:14-cv-02235-DMS-BLM
`(lead case);
`CASE NO. 3:14-cv-1507-DMS-BLM
`(consolidated)
`
`APPLE INC.’S MEMORANDUM OF
`POINTS AND AUTHORITIES IN
`SUPPORT OF ITS MOTION TO
`STRIKE WI-LAN’S NEW
`INFRINGEMENT THEORIES
`
`Date: June 1, 2018
`Time: 1:30 p.m.
`Dept.: 13A
`Judge: Hon. Dana M. Sabraw
`Magistrate Judge: Hon. Barbara L. Major
`
`
`
`
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13977 Page 2 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`TABLE OF CONTENTS
`
`
`I.
`
`II.
`
`Page
`INTRODUCTION ........................................................................................... 1
`BACKGROUND ............................................................................................. 2
`A. Wi-LAN’s August 2017 Final Infringement Contentions Rely
`Exclusively On The LTE Standard. ...................................................... 2
`B. Wi-LAN’s August 2017 Final Infringement Contentions Do Not
`Cite Any Apple-Produced Technical Documents Or Source
`Code. ..................................................................................................... 3
`C. Wi-LAN Insisted During Fact Discovery That Its LTE Standard-
`Based Infringement Contentions Were “Final.” ................................... 4
`D. Wi-LAN’s February 2018 Expert Reports Offer Brand-New
`Product-Based Infringement Theories. ................................................. 4
`III. LEGAL STANDARDS FOR MOTIONS TO STRIKE ................................. 6
`IV. ARGUMENT .................................................................................................. 7
`A. Wi-LAN’s Experts Impermissibly Substituted A New Theory Of
`Infringement In Their Expert Reports................................................... 7
`1.
`Apple Was Surprised By Wi-LAN’s Change Of
`Infringement Theory, Especially After Wi-LAN
`Repeatedly Represented Its Infringement Theories Were
`“Final.” ........................................................................................ 9
`Apple Has No Ability To Cure Wi-LAN’s Change In
`Infringement Theory After The Close Of Fact Discovery. ...... 11
`Permitting Wi-LAN To Fundamentally Change Its
`Infringement Theory Now Would Disrupt The Trial. .............. 12
`The Evidence Is Indisputably Important. ................................. 12
`4.
`5. Wi-LAN Has No Excuse For Failing To Disclose Its
`Product-Based Infringement Theory Sooner. ........................... 12
`The Proper Remedy Is Striking Wi-LAN’s New Infringement
`Theory And Limiting Wi-LAN To The Standards-Based
`Infringement Theory Disclosed In Its Infringement Contentions. ..... 13
`The Court Also Should Strike Dr. Madisetti’s Incorporation Of
`Source Code By Reference. ................................................................ 14
`The Court Also Should Strike Dr. Madisetti’s New Theory
`Concerning The Claimed “Node,” Which Does Not Appear In
`Wi-LAN’s Final Infringement Contentions. ....................................... 15
`CONCLUSION ............................................................................................. 17
`
`2.
`
`3.
`
`B.
`
`C.
`
`D.
`
`V.
`
`
`WEST\280873160
`
`
`
`
`-i-
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13978 Page 3 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`TABLE OF AUTHORITIES
`
`
`Page
`
`
`CASES
`
`2-Way Computing, Inc. v. Sprint Sols., Inc.,
`No. 11-cv-12, 2015 WL 1932173 (D. Nev. Apr. 28, 2015) ................................ 15
`
`Adobe Sys. Inc. v. Wowza Media Sys.,
`2014 WL 709865 (N.D. Cal. Feb. 23, 2014) ............................................. 6, 13, 16
`
`Am. Video Graphics, L.P. v. Elec. Arts, Inc.,
`359 F. Supp. 2d 558 (E.D. Tex. 2005) ................................................................ 13
`
`Ameranth, Inc. v. Pizza Hut, Inc.,
`No. 12-cv-729, 2013 WL 3894880 (S.D. Cal. July 26, 2013) .......................... 6, 9
`
`ASUS Comput. Int’l v. Round Rock Research, LLC,
`No. 12-cv-02099, 2014 WL 1463609 (N.D. Cal. Apr. 11, 2014) ....................... 16
`
`Droplets, Inc. v. Amazon.com, Inc.,
`No. 12-cv-03733, 2013 WL 1563256 (N.D. Cal. Apr. 12, 2013) ....................... 14
`
`Finjan, Inc. v. Blue Coat Sys., Inc.,
`No. 13-cv-03999, 2015 WL 3640694 (N.D. Cal. June 11, 2015) ................... 8, 16
`
`Finjan, Inc. v. Proofpoint, Inc.,
`No. 13-cv-05808-HSG, 2016 WL 612907 (N.D. Cal. Feb. 16, 2016) .................. 7
`
`Finjan, Inc. v. Sophos, Inc.,
`No. 14-cv-01197, 2015 WL 5012679 (N.D. Cal. Aug. 24, 2015) .......... 10, 11, 12
`
`Fujitsu Ltd. v. Netgear Inc.,
`620 F.3d 1321 (Fed. Cir. 2010) ......................................................................... 7, 9
`
`Kinglite Holdings Inc. v. Micro-Star Int’l Co. Ltd.,
`No. 14-cv-03009, 2016 WL 6762573 (C.D. Cal. June 15, 2016) ....................... 10
`
`Multimedia Patent Tr. v. Apple Inc.,
`No. 10-cv-2618, 2012 WL 4547449 (S.D. Cal. Sept. 28, 2012) ................... 10, 11
`
`NessCap Co., Ltd. v. Maxwell Techs., Inc.,
`No. 07-cv-704, 2008 WL 152147 (S.D. Cal. Jan. 16, 2008) ................................. 6
`
`
`WEST\280873160
`
`
`
`
`-ii-
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13979 Page 4 of 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`TABLE OF AUTHORITIES
`(continued)
`
`
`O2 Micro Int’l Ltd. v. Monolithic Power Sys.,
`467 F.3d 1355 (Fed. Cir. 2006) ............................................................................. 9
`
`Page
`
`Radware, Ltd. v. F5 Networks, Inc.,
`No. 13-cv-02024, 2016 WL 590121 (N.D. Cal. Feb. 13, 2016) ......................... 14
`
`Shared Memory Graphics LLC v. Apple, Inc.,
`812 F. Supp. 2d 1022 (N.D. Cal. 2010)................................................................. 6
`
`SkinMedica, Inc. v. Histogen Inc.,
`830 F. Supp. 2d 986 (S.D. Cal. 2011), aff’d, 727 F.3d 1187 (Fed.
`Cir. 2013) ........................................................................................................... 6, 9
`
`Teashot LLC v. Green Mountain Coffee Roasters, Inc.,
`No. 12-cv-0189, 2014 WL 485876 (D. Colo. Feb. 6, 2014) aff’d,
`595 F. App’x 983 (Fed. Cir. 2015) ...................................................................... 11
`
`ViaSat, Inc. v. Space Sys./Loral, Inc.,
`No. 12-cv-00260-H, 2013 WL 12061803 (S.D. Cal. Dec. 6, 2013) ................. 6, 7
`
`Wi-LAN USA, Inc. v. Apple Inc.,
`830 F.3d 1374 (Fed. Cir. 2016) ........................................................................... 16
`
`OTHER AUTHORITIES
`
`Fed. R. Civ. P. 26(a)(2)(B) ....................................................................................... 14
`
`L.R. 3.6(a)(2) ............................................................................................................ 10
`
`
`WEST\280873160
`
`
`
`
`-iii-
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13980 Page 5 of 21
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`I.
`
`INTRODUCTION
`
`Wi-LAN radically changed its infringement theory after the close of fact
`
`discovery and after representing that its LTE standard-based infringement
`
`contentions served in August 2017 were “final” and did not require amendment.
`
`Despite its assurances, Wi-LAN did an about-face in its expert reports, asserting a
`
`fundamentally different product-based infringement theory. Wi-LAN’s final
`
`infringement contentions cited no source code and no Apple technical documents.
`
`Yet Wi-LAN’s expert reports cite to hundreds of Apple technical documents and
`
`source code files for the first time. And in their depositions, Wi-LAN’s experts,
`
`Vijay Madisetti and Trevor Smedley, distanced themselves from any reliance on the
`
`LTE standard, confirming Wi-LAN’s improper about-face in its theory.
`
`This situation satisfies the factors for a motion to strike in this District. The
`
`law prohibits Wi-LAN’s “shifting sands” approach to its infringement theories—
`
`rather, a patentee is limited to the infringement theories disclosed in its
`
`infringement contentions. If Wi-LAN wanted to pursue a product-based
`
`infringement theory, it was required to disclose that theory and cite to Apple’s
`
`documents and source code in its contentions. Wi-LAN did nothing of the sort.
`
`Rather, it insisted its LTE standard-based infringement contentions were final, then
`
`surprised Apple with a new product-based theory in its expert reports.
`
`Apple therefore seeks an order: (1) limiting Wi-LAN to the LTE standard-
`
`based infringement theory disclosed in its final infringement contentions;
`
`(2) striking Dr. Madisetti’s citations to Apple’s internal technical documents and
`
`source code in support of his new product-based infringement theory; (3) striking
`
`Dr. Madisetti’s reliance on Dr. Smedley’s “source code” expert report; (4) striking
`
`portions of Dr. Madisetti’s untimely “supplemental” expert report; and (5) striking
`
`Dr. Madisetti’s new infringement theory concerning the claim term “node,” which
`
`Wi-LAN did not disclose in its contentions at all. Wi-LAN should proceed to trial
`
`with the LTE standard-based infringement theory it espoused in its final
`
`-1-
`WEST\280873160
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`
`
`
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13981 Page 6 of 21
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`contentions and throughout fact discovery. For the Court’s convenience, Apple has
`
`prepared annotated versions of the Madisetti reports (Exhibits A and L) with red
`
`boxes around the material that constitutes new infringement theories and related
`
`evidence that was not disclosed in Wi-LAN’s final infringement contentions.
`
`II. BACKGROUND
`
`A. Wi-LAN’s August 2017 Final Infringement Contentions Rely
`Exclusively On The LTE Standard.
`
`On August 10, 2017, Wi-LAN served its Second Amended Disclosure of
`
`Asserted Claims and Infringement Contentions. Ex. B.1 Under the Local Rules,
`
`10
`
`these are Wi-LAN’s final infringement contentions. In those final contentions, Wi-
`
`11
`
`LAN based its infringement theory exclusively on the LTE standard, citing portions
`
`12
`
`of the LTE standard and documents related to the LTE standard, including public
`
`13
`
`documents demonstrating the accused Apple iPhones operate on LTE networks.
`
`14
`
`Cunningham Decl., Ex. B, at Appendices A-F.2 Notably, Wi-LAN’s final
`
`15
`
`contentions (1) do not explain how any specific components of the iPhone practice
`
`16
`
`the asserted patent claims, (2) do not cite a single document or source code file
`
`17
`
`produced by Apple, Intel, or Qualcomm, (3) do not separately chart accused
`
`18
`
`products with Intel and Qualcomm baseband processors,3 and (4) repeatedly claim
`
`19
`
`the asserted patents are “fundamental” to the LTE standard. Id. at p. 20 (“[T]hese
`
`20
`
`fundamental inventions, which are implemented in products compliant with the 4G
`
`21
`
`LTE standard, enable advanced features of Apple’s 4G LTE mobile products.”).
`
`/////
`
`1 The exhibits cited in this brief are attached to the Declaration of Sean
`Cunningham (“Cunningham Decl.”) filed with this brief.
`
` 2
`
` Wi-LAN also served preliminary infringement contentions in January 2015 and
`amended infringement contentions in May 2017. Cunningham Decl. ¶ 3. In all
`three sets of infringement contentions, Wi-LAN’s infringement theory was based
`exclusively on the LTE standard. Id.
`
` 3
`
` Qualcomm and Intel supply the baseband processors for the accused iPhones,
`which is the component Wi-LAN claims performs the vast majority of the allegedly
`infringing functionality.
`
`WEST\280873160
`
`-2-
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`
`
`
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13982 Page 7 of 21
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`B. Wi-LAN’s August 2017 Final Infringement Contentions Do Not
`Cite Any Apple-Produced Technical Documents Or Source Code.
`
`On June 29, 2017, Apple produced 204,292 pages of technical documents
`
`and more than 200,000 source code files to Wi-LAN. See Cunningham Decl. ¶ 13.
`
`That same day, Wi-LAN began inspecting Apple’s source code, and spent
`
`approximately 75 days during fact discovery doing so. Cunningham Decl. ¶ 13.
`
`By December 13, 2017, one month before the close of fact discovery, Apple had
`
`produced at least 390,000 source code files and approximately 1.5 million pages of
`
`documents to Wi-LAN. Id.
`
`Despite analyzing Apple’s source code for 22 full days, Wi-LAN’s August
`
`2017 final infringement contentions do not cite a single module, file, or line of
`
`Apple’s source code. See Ex. B at Appendices A-F. Nor do those contentions cite
`
`a single technical document produced by Apple, Qualcomm, or Intel. Id. Rather,
`
`Wi-LAN’s final infringement contentions rely exclusively on the LTE standard and
`
`the fact that the accused iPhones allegedly practice that standard. Id.
`
`To be certain of this, Apple propounded Interrogatory No. 2 asking Wi-LAN
`
`to identify all facts supporting its infringement claim, including by identifying
`
`documents and any testing done on the accused products. Cunningham Decl. ¶ 4;
`
`Ex. H at 4. Wi-LAN’s August 25, 2017 response did not cite any Apple source
`
`code or technical documents, nor did it identify any testing of the accused products.
`
`Ex. H at 4-5. Rather, Wi-LAN: (1) incorporated by reference its August 2017 final
`
`infringement contentions; (2) identified “the publicly-available LTE standard and
`
`other documents cited in the infringement contentions” (all of which were produced
`
`by Wi-LAN); and (3) generically identified “the source code produced by
`
`Qualcomm and Apple in this matter.” Id.
`
`/////
`
`/////
`
`/////
`
`WEST\280873160
`
`
`
`
`
`-3-
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13983 Page 8 of 21
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`C. Wi-LAN Insisted During Fact Discovery That Its LTE Standard-
`Based Infringement Contentions Were “Final.”
`
`In September 2017, Apple asked Wi-LAN to supplement its response to
`
`Interrogatory No. 2 to identify specific portions of source code if Wi-LAN
`
`contended the source code related to its infringement theory. Cunningham Decl.
`
`¶ 5. Wi-LAN represented it would supplement its response as it received
`
`discovery. Ex. C at 1. When Wi-LAN had not done so by November 2017, Apple
`
`again asked Wi-LAN to supplement its response (Ex. D at 5), but Wi-LAN
`
`contended its response was “complete.” Dkt. No. 232-1 at No. 8 (representing to
`
`the Court that Wi-LAN’s interrogatory responses “are complete”).
`
`On December 21, 2017, Apple again raised the fact that Wi-LAN never
`
`amended its infringement contentions to assert a product-based infringement
`
`theory. Ex. E. In response, Wi-LAN again represented that (1) its August 2017
`
`infringement contentions were “final,” but (2) it would agree to supplement its
`
`response to Interrogatory No. 2 by providing citations to Apple’s source code on
`
`January 16, 2018—after the close of fact discovery and without leave of Court.
`
`Ex. F. Apple did not agree to this. Ex. G. On the last day of fact discovery, Wi-
`
`LAN served a supplemental response to Interrogatory No. 2, listing hundreds of
`
`“exemplary” source code files, Apple technical documents and deposition
`
`transcripts with no analysis or pinpoint citations. Ex. H. Wi-LAN supplemented its
`
`response again on January 29, after the close of fact discovery, adding 13 more
`
`pages of lists of source code files, with no analysis or pinpoint citations.
`
`Cunningham Decl. ¶ 12.
`
`D. Wi-LAN’s February 2018 Expert Reports Offer Brand-New
`Product-Based Infringement Theories.
`
`In February 2018, Wi-LAN served expert reports from its two technical
`
`experts, Dr. Vijay Madisetti (on alleged infringement) and Dr. Trevor Smedley (on
`
`source code). Ex. A, Madisetti Report; Ex. I, Smedley Report. Dr. Madisetti’s
`
`-4-
`WEST\280873160
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`
`
`
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13984 Page 9 of 21
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`report offers new theories of alleged infringement that Wi-LAN did not disclose in
`
`its infringement contentions. Dr. Madisetti claims Apple’s products infringe based
`
`on the way they operate, not because they purportedly practice the LTE standard.
`
`See Ex. A, Madisetti Report at ¶ 106 (“Based on technical documentation and
`
`deposition testimony, the LTE standard and the source code, each element of each
`
`asserted claim is directly infringed by the accused products.”).4 Dr. Madisetti cites
`
`to hundreds of Apple technical documents in support of his product-based theory
`
`(id. at ¶¶ 122, 128, 129, 138, 166, 170, 171, 174, 182), none of which were cited in
`
`Wi-LAN’s final contentions. The annotated version of Dr. Madisetti’s report
`
`10
`
`submitted with this motion depicts the degree to which Wi-LAN’s infringement
`
`11
`
`theories have changed to a product-based theory.
`
`12
`
`Even more problematic, at his deposition Dr. Madisetti confirmed he is not
`
`13
`
`relying on the LTE or VoLTE standards at all, but rather is relying on the
`
`14
`
`functionality of the accused products. Ex. J, Madisetti Depo. at 144:13-145:3
`
`15
`
`(“I’ve illustrated how these are met in the accused products as sold. I have no other
`
`16
`
`– I have not offered any specific and additional opinions on the standard”); see also
`
`17
`
`id. at 145:5-18 (LTE standard’s logical channels are not part of his analysis); id. at
`
`18
`
`186:5-21 (characterizing a figure in his report showing the LTE standard’s protocol
`
`19
`
`layers as “outside the context of the infringement”). Dr. Madisetti’s deposition
`
`20
`
`confirmed that Wi-LAN’s about-face from a standards-based infringement read to a
`
`21
`
`product-based infringement read was complete.
`
`22
`
`Wi-LAN also served a report by Dr. Smedley analyzing Apple, Qualcomm
`
`23
`
`and Intel source code and technical documents. Ex. I. Again, Wi-LAN cited none
`
`24
`
`of these materials in its final infringement contentions. On the day before his
`
`25
`
`deposition, Dr. Smedley served an “errata” to his report removing and changing a
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`significant portion of his report (along with a “corrected” report) stating he
`
`4 Dr. Madisetti mentions the LTE standard in his report, but confirmed at his
`deposition that “I have not offered any specific and additional opinions on the
`standard.” Ex. J, Madisetti Depo. at 144:13-145:3.
`
`-5-
`WEST\280873160
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`
`
`
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13985 Page 10 of
`
` 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`“removed passages related to the LTE standard … [from his original report because
`
`he is] not opining on the LTE standard or infringement.” Ex. K, Errata at ¶ 2.
`
`Although Dr. Madisetti does not analyze any specific source code files, he adopts
`
`Dr. Smedley’s source code report. Ex. A, Madisetti Report at ¶¶ 108, 133, 147,
`
`158, 176, 183, 193, 203, 304. Dr. Madisetti confirmed he intends to testify at trial
`
`about the source code in Dr. Smedley’s corrected report, even though none of it was
`
`cited in Wi-LAN’s contentions. Ex. J, Madisetti Depo. at 160:15-17.
`
`III. LEGAL STANDARDS FOR MOTIONS TO STRIKE
`
`The Patent Local Rules are “designed specifically to require parties to
`
`10
`
`crystallize their theories of the case early in the litigation so as to prevent the
`
`11
`
`shifting sands approach ….” Ameranth, Inc. v. Pizza Hut, Inc., No. 12-cv-729,
`
`12
`
`2013 WL 3894880, at *2 (S.D. Cal. July 26, 2013) (internal quotations and citations
`
`13
`
`omitted). The Rules are intended to promote efficient discovery and elicit the
`
`14
`
`parties’ positions on infringement and invalidity early in the case. NessCap Co.,
`
`15
`
`Ltd. v. Maxwell Techs., Inc., No. 07-cv-704, 2008 WL 152147, at *3 (S.D. Cal. Jan.
`
`16
`
`16, 2008). To achieve these goals, a patentee must serve infringement contentions
`
`17
`
`that are detailed enough to put the alleged infringer on notice of the patentee’s
`
`18
`
`theories. These contentions must “state with specificity the theories upon which
`
`19
`
`[Plaintiff] plan[s] to rely early in the litigation.” SkinMedica, Inc. v. Histogen Inc.,
`
`20
`
`830 F. Supp. 2d 986, 995 n.2 (S.D. Cal. 2011), aff’d, 727 F.3d 1187 (Fed. Cir.
`
`21
`
`2013). Among other things, a patentee’s infringement contentions must provide a
`
`22
`
`chart “identifying specifically where each limitation of each asserted claim is found
`
`23
`
`in each accused product… .” Shared Memory Graphics LLC v. Apple, Inc., 812 F.
`
`24
`
`Supp. 2d 1022, 1024 (N.D. Cal. 2010) (emphasis in original).
`
`25
`
`“In a lawsuit for patent infringement in the Southern District of California, a
`
`26
`
`patentee is limited to the infringement theories it sets forth in its infringement
`
`27
`
`contentions.” ViaSat, Inc. v. Space Sys./Loral, Inc., No. 12-cv-00260-H, 2013 WL
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`12061803, at *1 (S.D. Cal. Dec. 6, 2013); see also Adobe Sys. Inc. v. Wowza Media
`
`-6-
`WEST\280873160
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`
`
`
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13986 Page 11 of
`
` 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Sys., 2014 WL 709865, at *13 (N.D. Cal. Feb. 23, 2014) (contentions “constitute
`
`the universe of infringement theories”). Thus, the inquiry on a motion to strike is
`
`whether “the expert has permissibly specified the application of a disclosed theory
`
`or impermissibly substituted a new theory altogether.” Finjan, Inc. v. Proofpoint,
`
`Inc., No. 13-cv-05808-HSG, 2016 WL 612907, at *1 (N.D. Cal. Feb. 16, 2016). To
`
`determine whether to strike a new infringement theory, courts consider the
`
`following factors: “(1) the surprise to the party against whom the evidence would
`
`be offered; (2) the ability of that party to cure the surprise; (3) the extent to which
`
`allowing the evidence would disrupt the trial; (4) the importance of the evidence;
`
`10
`
`and (5) the non-disclosing party’s explanation for its failure to disclose the
`
`11
`
`evidence.” ViaSat, 2013 WL 12061803, at *1-2. All five factors are met here.
`
`12
`
`13
`
`14
`
`15
`
`IV. ARGUMENT
`
`A. Wi-LAN’s Experts Impermissibly Substituted A New Theory Of
`Infringement In Their Expert Reports.
`
`The Court should strike Wi-LAN’s new product-based infringement theory
`
`16
`
`and hold Wi-LAN to the LTE/VoLTE standard-based infringement theory disclosed
`
`17
`
`in its August 2017 final infringement contentions. In the seminal decision Fujitsu
`
`18
`
`Ltd. v. Netgear Inc., 620 F.3d 1321 (Fed. Cir. 2010), the Federal Circuit approved
`
`19
`
`of a patentee relying on an industry standard, rather than evidence of how the
`
`20
`
`accused product actually operates, to prove infringement. The Federal Circuit held
`
`21
`
`that courts may rely on industry standards in analyzing infringement, but noted:
`
`22
`
`“Only in the situation where a patent covers every possible implementation of a
`
`23
`
`standard will it be enough to prove infringement by showing standard compliance.”
`
`24
`
`Id. at 1328. Since the Netgear decision, it has become commonplace for patentees
`
`25
`
`to try to prove infringement based on this alternative standards-based theory.
`
`26
`
`This is precisely what Wi-LAN did throughout fact discovery. In its final
`
`27
`
`infringement contentions, Wi-LAN disclosed that its infringement theory relied on
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`mapping the LTE and VoLTE standards to the asserted claims:
`
`-7-
`WEST\280873160
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`
`
`
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13987 Page 12 of
`
` 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`The Accused Instrumentalities and/or components thereof (e.g., the
`baseband processor and associated software/ firmware) have been
`designed, sold, manufactured, marketed, or advertised by Apple as
`supporting the 3GPP LTE standard for voice over LTE.
`
`Ex. B at 3 (emphasis added). In the accompanying claim charts, Wi-LAN cited the
`
`LTE/VoLTE standards as alleged proof of infringement for every claim limitation.
`
`Ex. B at Appendices A-F. For example, Wi-LAN contended:
`
`The claimed method is performed when the Accused
`Instrumentalities, which include a baseband processor that is
`3GPP LTE standard compliant, are activated as part of design
`and development activities (e.g. interoperability, compliance,
`certification, reliability and quality control testing), and/or
`otherwise operated by Apple or other users of the Accused
`Instrumentalities in a manner consistent with the 3GPP LTE
`standard.
`
`Ex. B, Appendix F at 105 (emphasis added). Wi-LAN’s product-based theory is
`
`not simply “additional evidentiary proof” of a previously disclosed theory—it is a
`
`new theory. See Finjan, Inc. v. Blue Coat Sys., Inc., No. 13-cv-03999, 2015 WL
`
`3640694, at *2 (N.D. Cal. June 11, 2015) (“This is a new theory not previously
`
`disclosed in Plaintiff’s infringement contentions because Defendant had no way of
`
`knowing that Plaintiff’s focus would shift to the policy cache and away from the
`
`categorization cache identified in the contentions.”). Wi-LAN offered no “proof”
`
`of a product-based theory in its final contentions—indeed, Wi-LAN disclosed that
`
`it was not advancing such a theory by citing no Apple technical documents or
`
`source code as evidence of alleged infringement and confirming multiple times that
`
`its LTE/VoLTE standard-based contentions were “final.” To disclose a product-
`
`based infringement theory, Wi-LAN was required to map the functionality of the
`
`accused products—rather than portions of the LTE and VoLTE standards—to the
`
`claims. Wi-LAN instead chose to disclose a standards-based theory.
`
`As all patentees do, Wi-LAN tried to reserve the “right” to “amend or
`
`supplement these disclosures … in the event, for example, that discovery, including
`
`inspection of source code and other technical documents relating to Apple’s
`
`-8-
`WEST\280873160
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`
`
`
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13988 Page 13 of
`
` 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`Accused Instrumentalities, reveals additional evidence of infringement.” Ex. B at
`
`pp. 2-3. Wi-LAN’s problems are two-fold. First, Apple had produced more than
`
`200,000 pages of technical documents and more than 200,000 source code files in
`
`June 2017, six weeks before Wi-LAN’s final infringement contentions were due.
`
`Cunningham Decl. ¶ 13. Wi-LAN thus had the evidence to disclose a product-
`
`based infringement read, but did not cite a single Apple-produced document or line
`
`of source code. Second, Wi-LAN never sought to amend its infringement
`
`contentions to substitute in a product-based infringement theory. On the contrary,
`
`Wi-LAN insisted its standards-based theory was “final” throughout fact discovery,
`
`10
`
`waiting until expert reports to change horses. At some point, Wi-LAN apparently
`
`11
`
`recognized that its patents do not cover “every possible implementation” of the
`
`12
`
`VoLTE standard, so Wi-LAN could not meet the Federal Circuit’s Netgear
`
`13
`
`standard. Netgear, 620 F.3d at 1328. Without asking permission, Wi-LAN shifted
`
`14
`
`to a product-based infringement theory. Wi-LAN’s new theory should be struck.
`
`15
`
`16
`
`17
`
`1.
`
`Apple Was Surprised By Wi-LAN’s Change Of
`Infringement Theory, Especially After Wi-LAN Repeatedly
`Represented Its Infringement Theories Were “Final.”
`
`Wi-LAN’s new product-based infringement theory came as a surprise to
`
`18
`
`Apple, because Wi-LAN’s final infringement contentions do not try to map the
`
`19
`
`asserted claims onto the accused products beyond pointing to the LTE/VoLTE
`
`20
`
`standard and do not cite any internal Apple technical documents or source code.
`
`21
`
`Wi-LAN’s infringement case was and is limited to the theory that the accused
`
`22
`
`iPhones allegedly practice the LTE and VoLTE standards. Wi-LAN’s new theory
`
`23
`
`in its expert reports is precisely the “shifting sands” approach that the Patent Local
`
`24
`
`Rules prohibit. Ameranth, 2013 WL 3894880 at *2; SkinMedica, 830 F. Supp. 2d
`
`25
`
`at 995 (“These rules are important because they ‘require parties to crystallize their
`
`26
`
`theories’ so as to ‘prevent the “shifting sands” approach’”) (quoting O2 Micro Int’l
`
`27
`
`Ltd. v. Monolithic Power Sys., 467 F.3d 1355 (Fed. Cir. 2006)).
`
`28
`
`DLA PIPER LLP (US)
`S A N D I E G O
`
`/////
`
`WEST\280873160
`
`
`
`
`
`-9-
`
`MEMO ISO MOTION TO STRIKE
`3:14-CV-002235-DMS-BLM
`
`

`

`Case 3:14-cv-02235-DMS-BLM Document 315-1 Filed 04/20/18 PageID.13989 Page 14 of
`
` 21
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`If Wi-LAN had wanted to include a product-based infringement theory as
`
`opposed to one based purely on Apple’s alleged practice of an industry standard,
`
`Wi-LAN was required to identify the specific components and software, including
`
`the documents and source code, that support that theory. Multimedia Patent Tr. v.
`
`Apple Inc., No. 10-cv-2618, 2012 WL 4547449, at *3 (S.D. Cal. Sept. 28, 2012);
`
`Finjan, Inc. v. Sophos, Inc., No. 14-cv-01197, 2015 WL 5012679, at *3 (N.D. Cal.
`
`Aug. 24, 2015) (patentee “must provide pinpoint citations, or the substantial
`
`equivalent, to source code” in its contentions); Kinglite Holdings Inc. v. Micro-Star
`
`Int’l Co. Ltd., No. 14-cv-03009, 2016 WL 6762573, at *2 (C.D. Cal. June 15, 2016)
`
`10
`
`(“In software patent cases, it has been this Court’s practice to require that
`
`11
`
`infringement contentions include pinpoint citations to source code.”). Wi-LAN did
`
`12
`
`no

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket