throbber
Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 1 of 11
`
`UNITED STATES DISTRICT COURT
`DISTRICT OF MASSACHUSETTS
`
`
`Civil Action No. 1:19-cv-11272-RGS
`
`
`
`
`
`
`
`Civil Action No. 1:19-cv-11278-RGS
`
`
`
`
`
`Plaintiff,
`
`Defendant.
`
`Plaintiff,
`
`UNILOC 2017 LLC,
`
`
`
`v.
`
`PAYCHEX, INC.,
`
`
`
`UNILOC 2017 LLC,
`
`
`
`v.
`
`ATHENAHEALTH, INC.,
`
`
`
`Defendant.
`
`CLAIM CONSTRUCTION MEMORANDUM OF UNILOC 2017
`
`Plaintiff (“Uniloc 2017”) has asserted claims from two IBM patents. The ’578 patent1
`
`describes (what were in 1998) innovative methods of managing configurable application
`
`programs (“applications”) on a computer network for a large enterprise. The ’293 patent2
`
`describes a method of distributing applications from a central network management server
`
`(“NMS”) to remote servers.
`
`Both the ’578 and ’293 disclosures describe a computer network, which connects each
`
`individual user’s computer terminal (“client terminal,” or simply “client”) to a remote server
`
`
`1 U.S. Patent No. 6,324,578 (Ex. A). Another patent, U.S. 6,728,766 (“the ’766 patent”) issued as
`a divisional of the ’578 patent.
`
` 2
`
` U.S. Patent No. 7,069,293 (Ex. B), which was filed as a divisional of another patent, U.S.
`Patent No. 6,510,466 (“the ‘466 patent”), filed the same day as the ’578 patent, December 14,
`1998.
`
`3391952.v1
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 2 of 11
`
`
`
`responsible for supporting that client, as well as for supporting a number of other clients. The
`
`network, in turn, connects the remote servers to a NMS. FIG. 1 of the ’293 patent graphically
`
`illustrates this server/client arrangement:
`
`An application is software written to perform a particular function for a user (as opposed
`
`to system software, which is designed to operate the network). Common examples of
`
`applications are word processing (e.g., Microsoft Word) and spreadsheet (e.g., Excel)
`
`
`
`applications.
`
`In 1998, designers of computer networks for large enterprises were confronted with the
`
`problem of peripatetic users, i.e., users who log in from different clients at different times. IBM,
`
`
`
`2
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 3 of 11
`
`
`
`in these patents, describes innovative ways, circa 1998, to allow a peripatetic user to access the
`
`user’s authorized applications from any client on the network, while maintaining the user’s own
`
`selected preferences. The ’578 patent relates to obtaining user and administrator preferences for
`
`application programs installed at a server and, responsive to a request from a user, executing the
`
`application after an application launcher program is distributed to a client.
`
`Network designers in 1998 were also confronted by the problems of efficiently distributing
`
`applications throughout the enterprise, and of then frequently (and efficiently) updating those
`
`applications, while maintaining consistency among users, as to both application and administrator
`
`preferences. The ’293 patent relates to distributing applications from a NMS to other servers using
`
`an associated file packet that includes a segment configured to initiate registration operations on
`
`the server to make the application available for use.
`
`Uniloc 2017 submits the accompanying Declaration of Dr. Michael Shamos on the issue
`
`of what a person of ordinary skill in the art (POSITA) in December 1998 would have understood
`
`to be the ordinary meaning of the various terms in dispute.
`
`Claim Construction Issues
`
`Uniloc below lists, in what it sees as the order of priority, the claim construction disputes,
`
`beginning with the ’578 patent.
`
`Claim 1 reads (emphasis added):
`
`1. A method for management of configurable application programs on a
`network comprising the steps of:
`
`installing an application program having a plurality of configurable
`preferences and a plurality of authorized users on a server coupled to the
`network;
`
`distributing an application launcher program associated with the
`application program to a client coupled to the network;
`
`
`
`3
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 4 of 11
`
`
`
`obtaining a user set of the plurality of configurable preferences associated
`with one of the plurality of authorized users executing the application
`launcher program;
`
`obtaining an administrator set of the plurality of configurable preferences
`from an administrator; and
`
`executing the application program using the obtained user set and the
`obtained administrator set of the plurality of configurable preferences
`responsive to a request from one of the plurality of authorized users.
`
`
`
` “Application launcher program”
`
`Uniloc’s Construction
`computer program that launches, i.e., starts
`another program
`
`Paychex’s Construction
`A program distributed to a client to initially
`populate a user desktop and to request an
`instance of the application for execution at the
`client
`
`
`All the claims of the ’578 patent require an “application launcher program.” Uniloc
`
`requests the Court give this term its ordinary meaning, which is, quite simply, a program that
`
`launches another program. Dr. Shamos lists contemporaneous sources that used the term in a
`
`manner consistent with its ordinary meaning in the art of a “computer program that launches, i.e.,
`
`starts, another program.” Shamos Decl., ¶¶ 41-44.
`
`Defendants propose a construction that would exclude programs that launch programs
`
`resident on a server. But Dr. Shamos cites programs -- contemporaneously described as
`
`“application launcher programs” -- that did exactly that. Id., ¶¶ 43-44, 48-50. Defendants’
`
`construction would thus depart from the ordinary meaning.
`
`Courts may only depart from the ordinary meaning of a claim term in two instances:
`
`lexicography and disavowal. Hill-Rom Servs., Inc. v. Stryker Corp., 755 F.3d 1367, 1371 (Fed.
`
`Cir. 2014). Where (as here) nothing in the specification indicates the patentee acted as his own
`
`lexicographer, and nothing in the intrinsic record clearly and unambiguously limits the invention
`
`
`
`4
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 5 of 11
`
`
`
`to a particular form or configuration, the court may not depart from the term’s plain meaning.
`
`SciMed Life Sys., Inc. v. Advanced Cardiovascular Sys., Inc., 242 F.3d 1337, 1341 (Fed. Cir.
`
`2001).
`
`Dr. Shamos’s review of the intrinsic record of the ’578 patent finds no support for
`
`Defendants’ departure from the ordinary meaning of the term. The ’578 patent describes an
`
`environment where applications can be executed on the server, as well as on clients. Id., ¶¶ 25-
`
`30. In particular, he finds nothing that would exclude “application launcher programs” that
`
`launch applications resident on a server. Id., ¶¶ 48-63.
`
`In support of his opinion, Dr. Shamos points out: (1) the claims of the ’578 patent do not
`
`specify where an application program is executed, id., ¶ 52; (2) nothing in the specification
`
`would indicate the term would be used in a manner other than its ordinary meaning, id., ¶ 53;
`
`(3) the advantages the invention of the patent provides are independent of where an application is
`
`executed, id., ¶ 54; (4) the “Summary of the Invention” does not limit where applications are
`
`executed, id., ¶ 55; (5) the “Detailed Description of Preferred Embodiments” lists various
`
`embodiments, only one of which is executed at the client (rather than the server), which the
`
`patent refers to as an “alternative,” id., ¶¶ 56-57; (6) the ’578 patent’s figures depict distribution
`
`of an application launcher to clients, but not distribution of an application, id., ¶ 58-59; (7) that
`
`client requests are coming from a variety of different operating systems strongly suggests the
`
`applications would be executed at the server, id., ¶ 60.
`
`Finally, Dr. Shamos found dispositive the reference in the specification to “client/server
`
`application program,” as it clearly refers to an application being run at a server for the benefit of
`
`the client. Id., ¶¶ 61-62.
`
`
`
`5
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 6 of 11
`
`
`
`Defendants’ proposed construction not only excludes all systems that execute
`
`applications at the server, it does not cover a described embodiment that executes applications at
`
`the client. Id., ¶¶ 46-47. See Dkt. 1-1 (’578 patent) at 14:32-34. “A claim construction that
`
`excludes a preferred embodiment … is rarely, if ever correct.” Anchor Wall Sys., Inc. v.
`
`Rockwood Retaining Walls, Inc., 340 F.3d 1298, 1308 (Fed.Cir.2003) (internal citations
`
`omitted).
`
` “Application program”
`
`Uniloc’s Construction
`ordinary meaning, which is software that
`performs tasks for an end-user
`
`Paychex’s Construction
`The code associated with the underlying
`program functions that is a separate
`application from a browser interface and does
`not execute within the browser window
`
`
`This is a well-known computing term that distinguishes user programs from operating
`
`system programs. Shamos Decl., ¶¶ 64, 68. Defendants seek to exclude from the construction
`
`application programs that are browsers or that execute within a browser window, even though
`
`they are commonly referred to in the art as “application programs.”
`
`An application is software written to perform a particular function for a user—as
`
`opposed to system software, which is designed to operate the network. The term “application
`
`program” has been construed by several courts as “software that performs tasks for an end user.”
`
`See, e.g., Seven Networks Inc. v. Visto Corp., 2006 U.S. Dist. LEXIS 93870 (E.D. Tex., Dec. 29,
`
`2006); Rembrandt Technologies, L.P. v. Comcast Corp., et al., 512 F. Supp. 2d 749 (E.D. Tex.
`
`2007).
`
`Nothing in the ordinary meaning of “application,” nor any other language in the asserted
`
`claims of the ’578 and ’293 patents, if given its ordinary meaning, would rule out a browser or a
`
`program executed within the browser window.
`
`
`
`6
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 7 of 11
`
`
`
`Dr. Shamos, in his declaration, ¶¶ 65-66, 71-74, testifies no portion of the ’578 patent
`
`contains, or otherwise supports, a construction of claim 1 of the ’578 patent that would exclude
`
`an application that executes within the browser window. In fact, he cites a passage from the
`
`specification (8:7-20) of that patent that describes an exemplary situation in which the
`
`application is literally executed within the browser window:
`
`It is further to be understood that, in the JAVA™ environment, currently available
`web browser applications are known to those of skill in the art which provide a
`user interface and allow hardware independent communication such as that
`currently specified by Internet protocols. Thus, the application launcher programs
`may be applets which display the icon which are associated with a web browser
`Universal Resource Locator (URL) which points to the location of the applet to be
`executed. Upon selection of the icon displayed by the application launcher, the
`selected application is “launched” by requesting the URL of the application from
`the on-demand server. Such requests may be made utilizing conventional Hyper-
`Text Transfer Protocol (HTTP) communications or other suitable protocols.
`
`Dr. Shamos further testifies, ¶ 73:
`
`The above passage describes an exemplary situation in which the application is
`literally executed within the browser window. A Java applet is a hardware- and
`operating system-independent piece of code, written in a language known as Java
`bytecode, which is downloaded to a client and executed using software known as a
`“Java Virtual Machine” (JVM). All major browsers implemented a JVM;
`otherwise, they would not have been able to support webpages containing Java
`applets. Thus, Defendants’ construction of claim 1 would not read on this
`embodiment.
`
`A construction that would result in no claim reading on a preferred embodiment is highly
`
`suspect. Rexnord Corp. v. Laitram Corp., 274 F.3d 1336, 1342-43 (Fed. Cir. 2001)..
`
`
`
`Defendants may argue the inventors of the ’466 patent, during the prosecution history of
`
`that patent, described Lotus Notes as an “application program [which] executes locally at the
`
`client as a separate application from the browser interface [and] would not execute within the
`
`browser window.” See Declaration of Michael J. Ercolini, Ex. 1 (10/23/2001 Response to
`
`Office Action) at p. 2. However, Lotus Notes is merely a non-exclusive example of an
`
`
`
`7
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 8 of 11
`
`
`
`application program and that statement thus should not be read as applying to all application
`
`programs. Shamos Decl., ¶¶ 67-68.
`
`
`
`The statements on which Defendants would rely, made during the prosecution of the ’466
`
`patent, were intended to describe the invention of the claims of that patent, which require
`
`“providing an instance of the … application… to the client for execution,” seemingly ruling out -
`
`for those claims - executing an application remotely within the browser window.
`
`
`
`Moreover, because the ’466 patent is not formally related to the ’578 patent, statements in
`
`the ’466 prosecution history do not form part of the intrinsic record of the ’578 patent. See, e.g.,
`
`Abbott Laboratories v. Dey, L.P., 287 F.3d 1097, 1104-05 (Fed. Cir. 2002).
`
`
`
`Further, because the statements appear to be simply describing features mandated by
`
`claim limitations unique to the ’466 patent, a person of skill in the art would not apply those
`
`statements to claims of the ’578 patent, which do not have the features the statements describe.
`
`The claims of the ’578 patent do not require providing an instance of the application for
`
`execution locally at the client. Thus, the statements Defendants would rely upon would have
`
`been untrue if they had appeared in the prosecution history of the ’578 patent.
`
`
`
`Similarly, the claims of the ’293 patent do not relate at all to where or how applications
`
`are executed, but only to transmitting applications from an NMS to an intermediate server.
`
`There would have been no reason for the inventors to impose a limitation - or even to mention - a
`
`feature not in the claims, and thus irrelevant to the invention or to any art cited during the
`
`prosecution of that patent.
`
`“Configuration manager program”
`
`Uniloc’s Construction
`ordinary meaning
`
`
`
`
`
`Paychex’s Construction
`A program separate from the application
`program
`
`8
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 9 of 11
`
`
`
`
`
`Uniloc 2017 would give this term its ordinary meaning: a program that manages
`
`configurations. Defendants, by contrast, would impose the restriction that the configuration
`
`manager cannot be part of the program it is configuring.
`
`
`
`There is no support in the intrinsic record for Defendants’ restriction. Shamos Decl., ¶¶
`
`80-86. The specification itself has embodiments that contradict Defendants’ construction. Id., ¶¶
`
`81-85.
`
`“Executing the application program using the obtained user set and the obtained
`
`administrator set responsive to a request from the one of the plurality of authorized users”
`
`
`
`Uniloc’s Construction
`ordinary meaning
`
`Paychex’s Construction
`Initiating execution of the application
`program in response to a launch request from
`the application launcher program using the
`obtained user set and the obtained
`administrator set
`
`
`This is also a term with a straightforward, easily understandable ordinary meaning. The
`
`claim recites the user and administrator sets are used in executing the application program and
`
`the request for execution comes from an “authorized user.”
`
`Defendants would depart from the ordinary meaning by requiring the request to come
`
`from the application launcher (rather than the user) and further require the application launcher
`
`itself uses the two sets.
`
`As Dr. Shamos points out, the intrinsic record does not support that restriction. Shamos
`
`Decl., ¶ 88. Embodiments are disclosed in which the request does not have to come from the
`
`application launcher program. Id. Thus, adding that restriction would cause the claim not to
`
`read on a disclosed embodiment and would thus be improper. Anchor Wall Sys., Inc., 340 F.3d
`
`at 1308.
`
`
`
`
`
`
`
`9
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 10 of 11
`
`
`
`“File packet”
`
`Uniloc’s Construction
`package of one or more computer files
`
`Paychex’s Construction
`A container file that contains one or more
`distinct components that may be individually
`accessed upon opening the container file
`
`
`Uniloc’s construction is straightforward, and represents the ordinary meaning of the term.
`
`Shamos Decl., ¶¶ 90-91.
`
`By contrast, Defendants introduce terminology (“container,” “container file”) that is
`
`vague, and foreign to the ’293 patent and its file history. Further, “component,” as used in the
`
`’293 patent, is not used with reference to file packets and there is no disclosure a file packet must
`
`have “distinct components.” Id., ¶ 92. Finally, there is no disclosure that portions of the file
`
`packet must be “individually accessed,” and the specification contains no reference to “opening”
`
`a file, or what might happen if a file is opened. Id., ¶¶ 93-94.
`
`“Registration operations”
`
`Uniloc’s Construction
`recording at the target on-demand server
`information about authorized users of the
`application program
`
`Paychex’s Construction
`Operations on the target on-demand server
`that include specifying a set of users who may
`access the application program associated
`with the file packet
`
`
`
`
`
`As Dr. Shamos describes, in the intrinsic record “registration” involves recording
`
`information about authorized users. Shamos Decl., ¶ 97. No language in the intrinsic record
`
`requires that “registration operations” must include specifying a set of users. Id., ¶ 98. That
`
`construction would exclude an embodiment the specification discloses. Id., ¶¶ 99-100.
`
`
`
`
`
`
`
`10
`
`

`

`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 11 of 11
`
`
`
`Dated: January 23, 2020
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ James J. Foster
`Paul J. Hayes
`James J. Foster
`Kevin Gannon
`PRINCE LOBEL TYE LLP
`One International Place, Suite 3700
`Boston, MA 02110
`Tel: (617) 456-8000
`Email: phayes@princelobel.com
`Email: jfoster@princelobel.com
`Email: kgannon@princelobel.com
`
`ATTORNEYS FOR THE PLAINTIFF
`
`
`CERTIFICATE OF SERVICE
`
`
`
`
`I certify that all counsel of record who have consented to electronic service are being
`
`served with a copy of this document via the Court’s CM/ECF system.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ James J. Foster
`
`
`
`
`
`
`
`
`
`
`
`
`
`11
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket