`
`UNITED STATES DISTRICT COURT
`DISTRICT OF MASSACHUSETTS
`
`
`Civil Action No. 1:19-cv-11272-RGS
`
`
`
`
`
`
`
`Civil Action No. 1:19-cv-11278-RGS
`
`
`
`
`
`Plaintiff,
`
`Defendant.
`
`Plaintiff,
`
`UNILOC 2017 LLC,
`
`
`
`v.
`
`PAYCHEX, INC.,
`
`
`
`UNILOC 2017 LLC,
`
`
`
`v.
`
`ATHENAHEALTH, INC.,
`
`
`
`Defendant.
`
`CLAIM CONSTRUCTION MEMORANDUM OF UNILOC 2017
`
`Plaintiff (“Uniloc 2017”) has asserted claims from two IBM patents. The ’578 patent1
`
`describes (what were in 1998) innovative methods of managing configurable application
`
`programs (“applications”) on a computer network for a large enterprise. The ’293 patent2
`
`describes a method of distributing applications from a central network management server
`
`(“NMS”) to remote servers.
`
`Both the ’578 and ’293 disclosures describe a computer network, which connects each
`
`individual user’s computer terminal (“client terminal,” or simply “client”) to a remote server
`
`
`1 U.S. Patent No. 6,324,578 (Ex. A). Another patent, U.S. 6,728,766 (“the ’766 patent”) issued as
`a divisional of the ’578 patent.
`
` 2
`
` U.S. Patent No. 7,069,293 (Ex. B), which was filed as a divisional of another patent, U.S.
`Patent No. 6,510,466 (“the ‘466 patent”), filed the same day as the ’578 patent, December 14,
`1998.
`
`3391952.v1
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 2 of 11
`
`
`
`responsible for supporting that client, as well as for supporting a number of other clients. The
`
`network, in turn, connects the remote servers to a NMS. FIG. 1 of the ’293 patent graphically
`
`illustrates this server/client arrangement:
`
`An application is software written to perform a particular function for a user (as opposed
`
`to system software, which is designed to operate the network). Common examples of
`
`applications are word processing (e.g., Microsoft Word) and spreadsheet (e.g., Excel)
`
`
`
`applications.
`
`In 1998, designers of computer networks for large enterprises were confronted with the
`
`problem of peripatetic users, i.e., users who log in from different clients at different times. IBM,
`
`
`
`2
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 3 of 11
`
`
`
`in these patents, describes innovative ways, circa 1998, to allow a peripatetic user to access the
`
`user’s authorized applications from any client on the network, while maintaining the user’s own
`
`selected preferences. The ’578 patent relates to obtaining user and administrator preferences for
`
`application programs installed at a server and, responsive to a request from a user, executing the
`
`application after an application launcher program is distributed to a client.
`
`Network designers in 1998 were also confronted by the problems of efficiently distributing
`
`applications throughout the enterprise, and of then frequently (and efficiently) updating those
`
`applications, while maintaining consistency among users, as to both application and administrator
`
`preferences. The ’293 patent relates to distributing applications from a NMS to other servers using
`
`an associated file packet that includes a segment configured to initiate registration operations on
`
`the server to make the application available for use.
`
`Uniloc 2017 submits the accompanying Declaration of Dr. Michael Shamos on the issue
`
`of what a person of ordinary skill in the art (POSITA) in December 1998 would have understood
`
`to be the ordinary meaning of the various terms in dispute.
`
`Claim Construction Issues
`
`Uniloc below lists, in what it sees as the order of priority, the claim construction disputes,
`
`beginning with the ’578 patent.
`
`Claim 1 reads (emphasis added):
`
`1. A method for management of configurable application programs on a
`network comprising the steps of:
`
`installing an application program having a plurality of configurable
`preferences and a plurality of authorized users on a server coupled to the
`network;
`
`distributing an application launcher program associated with the
`application program to a client coupled to the network;
`
`
`
`3
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 4 of 11
`
`
`
`obtaining a user set of the plurality of configurable preferences associated
`with one of the plurality of authorized users executing the application
`launcher program;
`
`obtaining an administrator set of the plurality of configurable preferences
`from an administrator; and
`
`executing the application program using the obtained user set and the
`obtained administrator set of the plurality of configurable preferences
`responsive to a request from one of the plurality of authorized users.
`
`
`
` “Application launcher program”
`
`Uniloc’s Construction
`computer program that launches, i.e., starts
`another program
`
`Paychex’s Construction
`A program distributed to a client to initially
`populate a user desktop and to request an
`instance of the application for execution at the
`client
`
`
`All the claims of the ’578 patent require an “application launcher program.” Uniloc
`
`requests the Court give this term its ordinary meaning, which is, quite simply, a program that
`
`launches another program. Dr. Shamos lists contemporaneous sources that used the term in a
`
`manner consistent with its ordinary meaning in the art of a “computer program that launches, i.e.,
`
`starts, another program.” Shamos Decl., ¶¶ 41-44.
`
`Defendants propose a construction that would exclude programs that launch programs
`
`resident on a server. But Dr. Shamos cites programs -- contemporaneously described as
`
`“application launcher programs” -- that did exactly that. Id., ¶¶ 43-44, 48-50. Defendants’
`
`construction would thus depart from the ordinary meaning.
`
`Courts may only depart from the ordinary meaning of a claim term in two instances:
`
`lexicography and disavowal. Hill-Rom Servs., Inc. v. Stryker Corp., 755 F.3d 1367, 1371 (Fed.
`
`Cir. 2014). Where (as here) nothing in the specification indicates the patentee acted as his own
`
`lexicographer, and nothing in the intrinsic record clearly and unambiguously limits the invention
`
`
`
`4
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 5 of 11
`
`
`
`to a particular form or configuration, the court may not depart from the term’s plain meaning.
`
`SciMed Life Sys., Inc. v. Advanced Cardiovascular Sys., Inc., 242 F.3d 1337, 1341 (Fed. Cir.
`
`2001).
`
`Dr. Shamos’s review of the intrinsic record of the ’578 patent finds no support for
`
`Defendants’ departure from the ordinary meaning of the term. The ’578 patent describes an
`
`environment where applications can be executed on the server, as well as on clients. Id., ¶¶ 25-
`
`30. In particular, he finds nothing that would exclude “application launcher programs” that
`
`launch applications resident on a server. Id., ¶¶ 48-63.
`
`In support of his opinion, Dr. Shamos points out: (1) the claims of the ’578 patent do not
`
`specify where an application program is executed, id., ¶ 52; (2) nothing in the specification
`
`would indicate the term would be used in a manner other than its ordinary meaning, id., ¶ 53;
`
`(3) the advantages the invention of the patent provides are independent of where an application is
`
`executed, id., ¶ 54; (4) the “Summary of the Invention” does not limit where applications are
`
`executed, id., ¶ 55; (5) the “Detailed Description of Preferred Embodiments” lists various
`
`embodiments, only one of which is executed at the client (rather than the server), which the
`
`patent refers to as an “alternative,” id., ¶¶ 56-57; (6) the ’578 patent’s figures depict distribution
`
`of an application launcher to clients, but not distribution of an application, id., ¶ 58-59; (7) that
`
`client requests are coming from a variety of different operating systems strongly suggests the
`
`applications would be executed at the server, id., ¶ 60.
`
`Finally, Dr. Shamos found dispositive the reference in the specification to “client/server
`
`application program,” as it clearly refers to an application being run at a server for the benefit of
`
`the client. Id., ¶¶ 61-62.
`
`
`
`5
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 6 of 11
`
`
`
`Defendants’ proposed construction not only excludes all systems that execute
`
`applications at the server, it does not cover a described embodiment that executes applications at
`
`the client. Id., ¶¶ 46-47. See Dkt. 1-1 (’578 patent) at 14:32-34. “A claim construction that
`
`excludes a preferred embodiment … is rarely, if ever correct.” Anchor Wall Sys., Inc. v.
`
`Rockwood Retaining Walls, Inc., 340 F.3d 1298, 1308 (Fed.Cir.2003) (internal citations
`
`omitted).
`
` “Application program”
`
`Uniloc’s Construction
`ordinary meaning, which is software that
`performs tasks for an end-user
`
`Paychex’s Construction
`The code associated with the underlying
`program functions that is a separate
`application from a browser interface and does
`not execute within the browser window
`
`
`This is a well-known computing term that distinguishes user programs from operating
`
`system programs. Shamos Decl., ¶¶ 64, 68. Defendants seek to exclude from the construction
`
`application programs that are browsers or that execute within a browser window, even though
`
`they are commonly referred to in the art as “application programs.”
`
`An application is software written to perform a particular function for a user—as
`
`opposed to system software, which is designed to operate the network. The term “application
`
`program” has been construed by several courts as “software that performs tasks for an end user.”
`
`See, e.g., Seven Networks Inc. v. Visto Corp., 2006 U.S. Dist. LEXIS 93870 (E.D. Tex., Dec. 29,
`
`2006); Rembrandt Technologies, L.P. v. Comcast Corp., et al., 512 F. Supp. 2d 749 (E.D. Tex.
`
`2007).
`
`Nothing in the ordinary meaning of “application,” nor any other language in the asserted
`
`claims of the ’578 and ’293 patents, if given its ordinary meaning, would rule out a browser or a
`
`program executed within the browser window.
`
`
`
`6
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 7 of 11
`
`
`
`Dr. Shamos, in his declaration, ¶¶ 65-66, 71-74, testifies no portion of the ’578 patent
`
`contains, or otherwise supports, a construction of claim 1 of the ’578 patent that would exclude
`
`an application that executes within the browser window. In fact, he cites a passage from the
`
`specification (8:7-20) of that patent that describes an exemplary situation in which the
`
`application is literally executed within the browser window:
`
`It is further to be understood that, in the JAVA™ environment, currently available
`web browser applications are known to those of skill in the art which provide a
`user interface and allow hardware independent communication such as that
`currently specified by Internet protocols. Thus, the application launcher programs
`may be applets which display the icon which are associated with a web browser
`Universal Resource Locator (URL) which points to the location of the applet to be
`executed. Upon selection of the icon displayed by the application launcher, the
`selected application is “launched” by requesting the URL of the application from
`the on-demand server. Such requests may be made utilizing conventional Hyper-
`Text Transfer Protocol (HTTP) communications or other suitable protocols.
`
`Dr. Shamos further testifies, ¶ 73:
`
`The above passage describes an exemplary situation in which the application is
`literally executed within the browser window. A Java applet is a hardware- and
`operating system-independent piece of code, written in a language known as Java
`bytecode, which is downloaded to a client and executed using software known as a
`“Java Virtual Machine” (JVM). All major browsers implemented a JVM;
`otherwise, they would not have been able to support webpages containing Java
`applets. Thus, Defendants’ construction of claim 1 would not read on this
`embodiment.
`
`A construction that would result in no claim reading on a preferred embodiment is highly
`
`suspect. Rexnord Corp. v. Laitram Corp., 274 F.3d 1336, 1342-43 (Fed. Cir. 2001)..
`
`
`
`Defendants may argue the inventors of the ’466 patent, during the prosecution history of
`
`that patent, described Lotus Notes as an “application program [which] executes locally at the
`
`client as a separate application from the browser interface [and] would not execute within the
`
`browser window.” See Declaration of Michael J. Ercolini, Ex. 1 (10/23/2001 Response to
`
`Office Action) at p. 2. However, Lotus Notes is merely a non-exclusive example of an
`
`
`
`7
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 8 of 11
`
`
`
`application program and that statement thus should not be read as applying to all application
`
`programs. Shamos Decl., ¶¶ 67-68.
`
`
`
`The statements on which Defendants would rely, made during the prosecution of the ’466
`
`patent, were intended to describe the invention of the claims of that patent, which require
`
`“providing an instance of the … application… to the client for execution,” seemingly ruling out -
`
`for those claims - executing an application remotely within the browser window.
`
`
`
`Moreover, because the ’466 patent is not formally related to the ’578 patent, statements in
`
`the ’466 prosecution history do not form part of the intrinsic record of the ’578 patent. See, e.g.,
`
`Abbott Laboratories v. Dey, L.P., 287 F.3d 1097, 1104-05 (Fed. Cir. 2002).
`
`
`
`Further, because the statements appear to be simply describing features mandated by
`
`claim limitations unique to the ’466 patent, a person of skill in the art would not apply those
`
`statements to claims of the ’578 patent, which do not have the features the statements describe.
`
`The claims of the ’578 patent do not require providing an instance of the application for
`
`execution locally at the client. Thus, the statements Defendants would rely upon would have
`
`been untrue if they had appeared in the prosecution history of the ’578 patent.
`
`
`
`Similarly, the claims of the ’293 patent do not relate at all to where or how applications
`
`are executed, but only to transmitting applications from an NMS to an intermediate server.
`
`There would have been no reason for the inventors to impose a limitation - or even to mention - a
`
`feature not in the claims, and thus irrelevant to the invention or to any art cited during the
`
`prosecution of that patent.
`
`“Configuration manager program”
`
`Uniloc’s Construction
`ordinary meaning
`
`
`
`
`
`Paychex’s Construction
`A program separate from the application
`program
`
`8
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 9 of 11
`
`
`
`
`
`Uniloc 2017 would give this term its ordinary meaning: a program that manages
`
`configurations. Defendants, by contrast, would impose the restriction that the configuration
`
`manager cannot be part of the program it is configuring.
`
`
`
`There is no support in the intrinsic record for Defendants’ restriction. Shamos Decl., ¶¶
`
`80-86. The specification itself has embodiments that contradict Defendants’ construction. Id., ¶¶
`
`81-85.
`
`“Executing the application program using the obtained user set and the obtained
`
`administrator set responsive to a request from the one of the plurality of authorized users”
`
`
`
`Uniloc’s Construction
`ordinary meaning
`
`Paychex’s Construction
`Initiating execution of the application
`program in response to a launch request from
`the application launcher program using the
`obtained user set and the obtained
`administrator set
`
`
`This is also a term with a straightforward, easily understandable ordinary meaning. The
`
`claim recites the user and administrator sets are used in executing the application program and
`
`the request for execution comes from an “authorized user.”
`
`Defendants would depart from the ordinary meaning by requiring the request to come
`
`from the application launcher (rather than the user) and further require the application launcher
`
`itself uses the two sets.
`
`As Dr. Shamos points out, the intrinsic record does not support that restriction. Shamos
`
`Decl., ¶ 88. Embodiments are disclosed in which the request does not have to come from the
`
`application launcher program. Id. Thus, adding that restriction would cause the claim not to
`
`read on a disclosed embodiment and would thus be improper. Anchor Wall Sys., Inc., 340 F.3d
`
`at 1308.
`
`
`
`
`
`
`
`9
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 10 of 11
`
`
`
`“File packet”
`
`Uniloc’s Construction
`package of one or more computer files
`
`Paychex’s Construction
`A container file that contains one or more
`distinct components that may be individually
`accessed upon opening the container file
`
`
`Uniloc’s construction is straightforward, and represents the ordinary meaning of the term.
`
`Shamos Decl., ¶¶ 90-91.
`
`By contrast, Defendants introduce terminology (“container,” “container file”) that is
`
`vague, and foreign to the ’293 patent and its file history. Further, “component,” as used in the
`
`’293 patent, is not used with reference to file packets and there is no disclosure a file packet must
`
`have “distinct components.” Id., ¶ 92. Finally, there is no disclosure that portions of the file
`
`packet must be “individually accessed,” and the specification contains no reference to “opening”
`
`a file, or what might happen if a file is opened. Id., ¶¶ 93-94.
`
`“Registration operations”
`
`Uniloc’s Construction
`recording at the target on-demand server
`information about authorized users of the
`application program
`
`Paychex’s Construction
`Operations on the target on-demand server
`that include specifying a set of users who may
`access the application program associated
`with the file packet
`
`
`
`
`
`As Dr. Shamos describes, in the intrinsic record “registration” involves recording
`
`information about authorized users. Shamos Decl., ¶ 97. No language in the intrinsic record
`
`requires that “registration operations” must include specifying a set of users. Id., ¶ 98. That
`
`construction would exclude an embodiment the specification discloses. Id., ¶¶ 99-100.
`
`
`
`
`
`
`
`10
`
`
`
`Case 1:19-cv-11278-RGS Document 34 Filed 01/23/20 Page 11 of 11
`
`
`
`Dated: January 23, 2020
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ James J. Foster
`Paul J. Hayes
`James J. Foster
`Kevin Gannon
`PRINCE LOBEL TYE LLP
`One International Place, Suite 3700
`Boston, MA 02110
`Tel: (617) 456-8000
`Email: phayes@princelobel.com
`Email: jfoster@princelobel.com
`Email: kgannon@princelobel.com
`
`ATTORNEYS FOR THE PLAINTIFF
`
`
`CERTIFICATE OF SERVICE
`
`
`
`
`I certify that all counsel of record who have consented to electronic service are being
`
`served with a copy of this document via the Court’s CM/ECF system.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/ James J. Foster
`
`
`
`
`
`
`
`
`
`
`
`
`
`11
`
`