throbber
As of 3/14/2010
`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`TYLER DIVISION
`
`
`
`
`CASE NO. 6:08cv030-LED
`
`
`
`
`
`
`JURY DEMANDED
`Defendant: CISCO SYSTEMS, INC.
`
`
`
`
`
`NETWORK-1 SECURITY SOLUTIONS,
`INC., a Delaware corporation,
`
` Plaintiff,
`
`
`vs.
`
`
`CISCO SYSTEMS, INC., a California
`corporation; CISCO-LINKSYS, L.L.C., a
`California Limited Liability Company;
`ADTRAN, INC., a Delaware corporation;
`ENTERASYS NETWORKS, INC., a
`Delaware corporation; EXTREME
`NETWORKS, INC., a Delaware corporation;
`FOUNDRY NETWORKS, INC., a Delaware
`corporation; NETGEAR, INC., a Delaware
`corporation; 3COM CORPORATION, a
`Delaware corporation;
`
` Defendants.
`
`
`
`
`Expert Report of
`Dr. James M. Knox
`CISCO SYSTEMS, INC.
`
`
`_________________________
`
`
`Signed
`
`
`
`NOTICE: THIS REPORT CONTAINS INFORMATION
`CONSIDERED HIGHLY CONFIDENTIAL – FOR OUTSIDE
`COUNSEL ONLY
`
`
`
`
`
`
`
`March 14, 2010
`
`Date
`
`

`

`As of 3/14/2010
`
`Table of Contents
`
` 1
`
`
`2
`
` .................................................................................................. - 1 -
`Scope of document
`Expert qualifications, basis of opinion, and approach
` ............................................ - 2 -
`2.1
`Qualifications
` .................................................................................................. - 2 -
`2.2
`Person of ordinary skill in the art
` .................................................................... - 2 -
`2.3
`Assignment
` ..................................................................................................... - 4 -
`2.4 Materials considered
` ....................................................................................... - 5 -
`2.5
`Approach
` ......................................................................................................... - 5 -
`2.6
`Photographic evidence and schematics
` ........................................................... - 6 -
`3 Overview of infringement findings
` ......................................................................... - 7 -
`3.1
`Understanding of the law
` ................................................................................ - 7 -
`3.2
`The ‘930 patent
` ............................................................................................... - 8 -
`3.3
`Overview of Defendant’s products
` ................................................................. - 9 -
`3.3.1
`Defendant’s Accused PSEs and PDs
` ...................................................... - 9 -
`3.3.2
`Defendant’s Accused PSEs and integrated circuits
` ................................ - 9 -
`3.3.3
`Defendant’s Accused PDs
`..................................................................... - 10 -
`3.4
`
`Claim construction ........................................................................................ - 10 -
`3.5
`
`Summary of infringement opinions .............................................................. - 11 -
`4 Claim 6 - detailed infringement analysis and opinions
` ......................................... - 12 -
`4.1
`
`Claim 6: preamble ........................................................................................ - 12 -
`4.1.1
`
`Claim construction ................................................................................ - 12 -
`4.1.2
`Evidence
` ................................................................................................ - 12 -
`4.1.3
`Analysis
`................................................................................................. - 12 -
`4.1.4
`
`Conclusion ............................................................................................ - 15 -
`4.2
`
`Claim 6: element [a-1] ................................................................................. - 15 -
`4.2.1
`
`Claim construction ................................................................................ - 15 -
`4.2.2
`Evidence
` ................................................................................................ - 15 -
`4.2.3
`Analysis
`................................................................................................. - 15 -
`4.2.4
`
`Conclusion ............................................................................................ - 17 -
`4.3
`
`Claim 6: element [a-2] ................................................................................. - 17 -
`4.3.1
`
`Claim construction ................................................................................ - 17 -
`4.3.2
`Evidence
` ................................................................................................ - 18 -
`4.3.3
`Analysis
`................................................................................................. - 18 -
`4.3.4
`
`Conclusion ............................................................................................ - 20 -
`4.4
`
`Claim 6: element [a-3] ................................................................................. - 21 -
` ................................................................................ - 21 -
`4.4.1
`Claim construction
`4.4.2
`Evidence
` ................................................................................................ - 21 -
`4.4.3
`Analysis
`................................................................................................. - 21 -
`4.4.4
`
`Conclusion ............................................................................................ - 28 -
`4.5
`
`Claim 6: element [a-4] ................................................................................. - 28 -
`4.5.1
`
`Claim construction ................................................................................ - 28 -
`4.5.2
`Evidence
` ................................................................................................ - 28 -
`4.5.3
`Analysis
`................................................................................................. - 29 -
`4.5.4
`
`Conclusion ............................................................................................ - 39 -
`4.6
`
`Claim 6: element [a-5] ................................................................................. - 39 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` ii
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
`Claim construction ................................................................................ - 40 -
`
`4.6.1
`Evidence
` ................................................................................................ - 40 -
`4.6.2
`Analysis
`................................................................................................. - 40 -
`4.6.3
`
`Conclusion ............................................................................................ - 52 -
`4.6.4
`4.7
`
`Claim 6: element [b] .................................................................................... - 52 -
`4.7.1
`
`Claim construction ................................................................................ - 53 -
`4.7.2
`Evidence
` ................................................................................................ - 53 -
`4.7.3
`Analysis:
` ............................................................................................... - 53 -
`4.7.4
`
`Conclusion ............................................................................................ - 72 -
`4.8
`
`Claim 6: element [c]..................................................................................... - 72 -
`4.8.1
`
`Claim construction ................................................................................ - 72 -
`4.8.2
`Evidence
` ................................................................................................ - 73 -
`4.8.3
`Analysis
`................................................................................................. - 73 -
`4.8.4
`
`Conclusion ............................................................................................ - 79 -
`4.9
`
`Claim 6: element [d] .................................................................................... - 79 -
`4.9.1
`
`Claim construction ................................................................................ - 79 -
`4.9.2
`Evidence
` ................................................................................................ - 80 -
`4.9.3
`Analysis
`................................................................................................. - 80 -
`4.9.4
`
`Conclusion ............................................................................................ - 89 -
`5 Claim 9 - detailed infringement analysis and opinions
` ......................................... - 89 -
`5.1
`
`Claim 9: preamble ........................................................................................ - 89 -
`5.1.1
`
`Claim construction ................................................................................ - 89 -
`5.1.2
`Evidence
` ................................................................................................ - 89 -
`5.1.3
`Analysis
`................................................................................................. - 89 -
`5.1.4
`
`Conclusion ............................................................................................ - 90 -
`5.2
`
`Claim 9: element [a]..................................................................................... - 90 -
`5.2.1
`
`Claim construction ................................................................................ - 90 -
`5.2.2
`Evidence
` ................................................................................................ - 90 -
`5.2.3
`Analysis
`................................................................................................. - 90 -
`5.2.4
`
`Conclusion ............................................................................................ - 95 -
`5.3
`Claim elements satisfied by structures
` .......................................................... - 95 -
`6 Direct and indirect infringement
` ........................................................................... - 96 -
`6.1
`Direct infringement
` ....................................................................................... - 96 -
`6.2
`Encouraging infringing usage
` ....................................................................... - 97 -
`6.2.1
`Selling products designed to infringe
` ................................................... - 97 -
`6.2.2
`
`Instructing ............................................................................................. - 98 -
`
`6.2.3 Marketing or advertising ....................................................................... - 99 -
`6.3 Material components – PSEs (data nodes) and PDs (access devices)
` ........ - 100 -
`6.4
`802.3af / Cisco proprietary detection
` ......................................................... - 100 -
`6.4.1
`Default is IEEE 802.3af detection
` ...................................................... - 101 -
`6.4.2
`Advantages of IEEE 802.3af over Cisco Proprietary Detection
` ......... - 101 -
`6.5
`Automatic / Manual / Semi-Automatic Modes
` ........................................... - 101 -
`7 No substantial non-infringing uses
` ..................................................................... - 103 -
`7.1
`
`PSEs (switches) ........................................................................................... - 103 -
`7.1.1
`Tested Demonstrative
` ......................................................................... - 104 -
`7.2
`PDs (access devices)
` ................................................................................... - 104 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` iii
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
` ........................................................................ - 105 -
`Tested Demonstratives
`7.2.1
`
`8 Benefits of the claimed invention ....................................................................... - 106 -
`8.1
`Benefits of PoE and the claimed invention
` ................................................. - 106 -
`8.1.1
`Cost savings
` ........................................................................................ - 106 -
`8.1.2
`
`Flexibility ............................................................................................ - 107 -
`8.1.3
`
`Enhanced network control and scalability .......................................... - 107 -
`8.1.4
`
`Reliable uninterruptible power supply ................................................ - 108 -
`8.1.5
`Time savings
` ....................................................................................... - 108 -
`8.1.6
`Ease of deployment
` ............................................................................. - 109 -
`8.2
`Effective detection method
` ......................................................................... - 111 -
`8.3
`Benefits of the detection method claimed in the ‘930 patent
` ...................... - 112 -
`8.3.1
`
`Reliability ............................................................................................ - 113 -
`8.3.2
`Same type of signal
` ............................................................................. - 116 -
`8.3.3
`Phantom power
` ................................................................................... - 116 -
`8.3.4
`
`No modification to the PHY ............................................................... - 118 -
`8.3.5
`
`Additional benefits associated with Claim 9 ...................................... - 118 -
`8.4
`Non-infringing alternatives
` ......................................................................... - 119 -
`8.4.1
`Superior to alternative detection methods
`........................................... - 120 -
`8.4.2
`IEEE 802.3af standard infringes
` ......................................................... - 120 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` iv
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
`List of Figures
`
`Figure 1 – End Point PSE PoE Delivery ....................................................................... - 13 -
`
`Figure 2 –Typical Defendant data switch
` ..................................................................... - 16 -
`Figure 3 – Switch connected to Access Point
` ............................................................... - 19 -
`Figure 4 – Switch connected to Access Point
` ............................................................... - 22 -
`
`Figure 5 – T-568B Straight Through Ethernet Cable ................................................... - 23 -
`Figure 6 – IEEE 802.3af Powered-Device Detection
` ................................................... - 24 -
`
`Figure 7 – WS - X4248-RJ45V Cisco Catalyst 4500 PoE............................................ - 24 -
`
`Figure 8 – WS-X2428-RJ21V Cisco Catalyst 4500 PoE ............................................. - 25 -
`
`Figure 9 – PSE to PD Cable Method ............................................................................ - 27 -
`
`Figure 10 – Rear panel of a Switch 4210 26-port PWR ............................................... - 31 -
`
`Figure 11 – Rear panel of a Switch 4210 26-port PWR ............................................... - 37 -
`Figure 12 – CE-500 Getting Started Guide
`................................................................... - 38 -
`
`Figure 13 – Powering On the Switch ............................................................................ - 38 -
`Figure 14 – Complete 4-Port Powered Ethernet Power Source
` .................................... - 43 -
`Figure 15 – LTC4259 data sheet
` ................................................................................... - 44 -
`Figure 16 – LTC4259 data sheet
` ................................................................................... - 44 -
`Figure 17 – Complete 4-Port Powered Ethernet Power Source
` .................................... - 45 -
`Figure 18 – Power over Ethernet System Diagram
` ...................................................... - 45 -
`Figure 19 – Power over Ethernet System Diagram
` ...................................................... - 47 -
`Figure 20 –– Internal Block Diagram
` ........................................................................... - 48 -
`Figure 21 – PSE to PD Cable Method
` .......................................................................... - 50 -
`Figure 22 – Blocking Diodes to Detect Pins
` ................................................................. - 51 -
`
`Figure 23 – Power Control MOSFETs ......................................................................... - 51 -
`Figure 24 – Simplified Timing Diagram of the Start Up of a PD (Access Device)
` ..... - 55 -
`Figure 25 – Low level Current Mirror, Circuitry of LTC4259 IC
` ................................ - 56 -
`Figure 26 – LTC4259A-1 Datasheet Detection Sequence,
` ........................................... - 57 -
`Figure 27 – LTC4259A Detection Current
` ................................................................... - 57 -
`
`Figure 28 – LTC4259A Slope Calculation ................................................................... - 58 -
`Figure 29 – ‘930 Patent, Symmetric Center Tapped Transformers
` .............................. - 60 -
`
`Figure 30 – Buck Switching Power Supply .................................................................. - 61 -
`Figure 31 – TPS2377-1 Typical Application Circuit
` .................................................... - 62 -
`
`Figure 32 – TPS2375 Detection Circuit Portion ........................................................... - 63 -
`Figure 33 – VSS Connected to Ground
` ........................................................................ - 63 -
`Figure 34 – LTC4259 Datasheet, 4-Port Ethernet Power Source
` ................................. - 72 -
`Figure 35 – Power over Ethernet On Cisco Catalyst 6500 Series Switches
` ................. - 73 -
`Figure 36 – Complete 4-Port Powered Ethernet Power Source
` .................................... - 74 -
`
`Figure 37 – LTC4259 Internal sensing circuitry........................................................... - 74 -
`Figure 38 – PSE Validation Circuit
` .............................................................................. - 76 -
`Figure 39 – Detection Mode Requirements
` .................................................................. - 76 -
` ............................. - 78 -
`Figure 40 – AIR AP1131AG Detection, Classification, and Power
`Figure 41 – Two-Level Detection Induced Voltages
` .................................................... - 78 -
`
`Figure 42 – Operating Power and Data Communication .............................................. - 79 -
`Figure 43 – LTC4259 Data Sheet, 4-Port Ethernet Power Source
` ............................... - 81 -
`
`Figure 44 – LTC4259A Slope Calculation ................................................................... - 83 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` v
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
` ....................................... - 84 -
`Figure 45 – LTC4259 Data Sheet, Electrical Characteristics
`Figure 46 – LTC4259A datasheet, Fig. 1
` ..................................................................... - 85 -
`Figure 47 – Table 33-2 IEEE 802.3af Standard
` ........................................................... - 85 -
`Figure 48 – Table 33-2 802.3af Standard
` ..................................................................... - 86 -
`Figure 49 – Typical Detection Waveform
` .................................................................... - 88 -
`
`Figure 50 – Detection with Power Application ............................................................ - 88 -
`Figure 51 – LTC4259A datasheet, Fig. 1
` ..................................................................... - 91 -
`Figure 52 – LTC4259A Data Sheet
` .............................................................................. - 91 -
`Figure 53 – Sense Port on LTC4259A
` .......................................................................... - 91 -
`Figure 54 – LTC4259 Data Sheet, Power over Ethernet System Diagram
` .................. - 92 -
`Figure 55 – LTC4259A Data Sheet
` .............................................................................. - 93 -
`Figure 56 – LTC4259A Disconnect
` .............................................................................. - 93 -
`
`Figure 57 – Catalyst 3560 Switch Getting Started Guide ............................................. - 98 -
`Figure 58 – LTC4259 Data Sheet, 4-Port Ethernet Power Source
` ............................. - 103 -
`Figure 59 – Cisco Unified IP Phone 7942G Data Sheet
` ............................................. - 109 -
`Figure 60 – 3Com Solutions: Power over Ethernet
` ................................................... - 110 -
`Figure 61 – IEEE 802.3af Standard 3.1 Overview
` ..................................................... - 112 -
`
`Figure 62 – Cisco pre-standard Powered-Device Power Delivery ............................. - 114 -
`Figure 63 – Frequently Used Loopback Connectors
` .................................................. - 115 -
`Figure 64 – Forked Cables
` .......................................................................................... - 117 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` vi
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
`
`
`Appendix
`1-6[a-1]
`1-6[a-2]
`1-6[a-3]
`
`1-6[a-4]
`
`2
`3
`4
`5
`
`Appendices
`
`
`
`Evidence: “providing a data node adapted for data switching”
`Evidence: “providing … an access device adapted for data transmission”
`Evidence: “providing … at least one data signaling pair connected
`between the data node and the access device and arranged to transmit
`data therebetween”
`Evidence: “providing … a main power source connected to supply
`power to the data node”
`Integrated circuits
`Evidence: IEEE 802.3af compliant
`Tested demonstrative
`Inducement
`
`
`
` vii
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
`1 SCOPE OF DOCUMENT
`
`This document presents opinions and analysis relating to U.S. Patent 6,218,930 (the ‘930
`patent) of Katzenberg et al.
`
`This document details the analysis and examination of certain products of Cisco Systems,
`Inc. (hereinafter “the Defendant” or “Defendant”) to determine whether they infringe the
`‘930 patent. The document presents my opinions, and the basis for my opinions, that
`every element of each asserted claim of the ‘930 patent exists in the Defendant’s accused
`equipment when the equipment is connected and operated as intended and instructed and
`suggested by the Defendant’s associated manuals, literature, advertising, or other
`placards and data, both literally and under the doctrine of equivalents. This document
`also details the analysis, examination, opinions, and the basis for opinions, relating to
`benefits of the invention claimed in the ‘930 patent and whether there existed non-
`infringing alternatives to using the claimed invention available to Defendant.
`
`The products analyzed include data nodes (switches) which are enabled to provide
`Power-over-Ethernet (“PoE”) via a CAT-5 cable or similar data transmission cable
`signaling pairs. Also considered are access devices (wireless access points, cameras,
`telephones, etc.) that are enabled to receive power from the previously mentioned CAT-5
`cable over these same data transmission pairs.
`
`This document has been prepared in conjunction with corresponding documents relating
`to each of the other remaining Defendants in this litigation. Evidence that is presented in
`the body and the Appendix of those corresponding documents includes evidence that also
`relates to this Defendant (for example, evidence that a switch is adapted for data
`switching or evidence relating to the functionality of certain integrated circuits used in
`Defendant’s products). In addition, while the general analysis in the body of this
`document is substantially the same as in the corresponding documents for other
`Defendants, the corresponding documents often contain different details or explain
`nuances that have not been included in this document but that are nevertheless applicable
`to this Defendant. In addition, as explained in this document, Defendant’s products can
`be used in conjunction the products of the other Defendants. For these reasons, the
`analysis and evidence presented in the corresponding documents of the other Defendants
`should be considered part of the expert report for the present Defendant. For purposes of
`brevity, rather than reproducing the text of each of those corresponding documents here, I
`am incorporating those documents by reference, and they should be deemed a part of this
`report as thought fully set forth. Those incorporated documents include the Expert
`Reports of Dr. James M. Knox for CISCO-LINKSYS, L.L.C., ADTRAN, INC.,
`ENTERASYS NETWORKS, INC., EXTREME NETWORKS, INC., FOUNDRY
`NETWORKS, INC., and 3COM CORPORATION.
`
`All opinions and facts stated in this report are true and correct to the best of my
`knowledge. If called upon to testify, I could and would testify to the truth of the
`following.
`
`
`
` - 1 -
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
`2 EXPERT QUALIFICATIONS, BASIS OF OPINION, AND APPROACH
`
`2.1 Qualifications
`
`A copy of my resume is attached as Exhibit 1.
`
` I
`
` am qualified to render opinions on electronics, data communications, Ethernet
`networks, the ‘930 patent, and Defendant’s products. I have over 40 years of
`professional experience in industry and academics relating to electronics, data
`communications, and the design of computer hardware and software, including the design
`of electrical communications circuits, microprocessors, and A/D (Analog to Digital)
`converters.
`
` I
`
` received a Bachelor’s degree in Electrical Engineering from the University of Texas in
`1969, a Master’s degree in Computer Science from the University of Texas in 1971, and
`a Ph.D. in Electrical Engineering from the University of Texas in 1978. At the
`University of Texas, I studied and took courses in areas relating to computer networking
`and computer communications. I also studied and took numerous courses dealing with
`electronics, electronic components, and electrical circuits – including the design and use
`of microprocessors and A/D converters.
`
` I
`
` taught Electrical Engineering and Computer Science at the University of Texas,
`including courses involving the design, use, and programming of microprocessors and
`embedded microprocessor systems. These courses included the techniques for
`communicating over memory and I/O channels to remote devices, as well as the design
`and use of localized components such as A/D converters and digital switches.
`
`After graduating from the University of Texas, my work experience in the computer
`hardware and software design field included the design and implementation of numerous
`electronic and data communication systems. I designed microprocessors at the transistor
`circuit level (including designing algorithmic structures within the microprocessor), and
`developed and implemented their use in land-based, sea-based, air-based, and deep space
`applications. I have designed many digital communication networks. I have analyzed
`and am familiar with the internal components of Ethernet networks. I have opined in
`several other legal cases involving power over Ethernet electronics, and been qualified as
`an expert and testified in court about such systems.
`
`I am currently the owner of a computer technology company called TriSoft, located in
`Austin, Texas. TriSoft is involved in the research and development of unique electronic
`systems and components. I consult in projects involving remote power delivery,
`embedded microprocessor system design, and data communications, to name a very small
`subset.
`
`2.2 Person of ordinary skill in the art
`
`Through my education, experience and training, in academia and industry, and my
`analysis of the ‘930 patent, I am familiar with the knowledge of a person of ordinary skill
`
` - 2 -
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
`(1) The educational level of the inventors.
`
`in the field of the ‘930 patent in the 1999 – 2001 time frame. For the purposes of this
`report, I am of the opinion that a person of ordinary skill in the art with respect to the
`‘930 patent is a person with an undergraduate degree in Electrical Engineering and three
`years of experience.
`
`In determining what would be the level of ordinary skill in the field as the 2000 – 2001
`timeframe, considered are the following:
`
`
`
`My understanding is that the inventors’ education is as follows: Boris Katzenberg
`
`attended New York City Community College for two years studying electrical
`technology curriculum. Katzenberg deposition 15:20-16:2. Joseph Deptula received a
`Bachelors and Masters Degree in Electrical Engineering, both from the University of
`Connecticut. Deptula deposition 10:4-12.
`
`
`
`
`(2) The type of problems encountered in the art.
`
`Electrical engineering and networking problems generally involve choices in
`design. There are often numerous ways to address networking problems that
`achieve the same result. The design choices can include everything from physical
`structure, to algorithmic choices, to implementation details.
`
`(3) The prior art solutions to those problems.
`
`The principal prior art asserted by Defendants involve networking solutions.
`
`(4) The rapidity with which innovations are made.
`
`Based on my observations over the past 20 plus years, major innovations in
`networking occur about every 3-5 years.
`
`(5) The sophistication of the technology.
`
`Developing networking solutions is a moderately sophisticated technology.
`
`(6) The educational level of workers in the field.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Workers in the field generally had some undergraduate training, although not
`necessarily a bachelor’s degree, in electrical engineering. Most would have
`acquired a portion of their knowledge through hands on experience.
`
`
`Based on these factors, it is my conclusion that a person of ordinary skill in the art at the
`time would have been a person with an undergraduate degree in Electrical Engineering
`and three years of experience.
`
`
` - 3 -
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`

`

`As of 3/14/2010
`
`2.3 Assignment
`
`The primary assignment was to evaluate certain products of the Defendant to determine
`whether the products, when connected and operated as intended and instructed and
`suggested by Defendant’s associated manuals, literature, advertising, or other placards
`and data, infringe, either literally or under the doctrine of equivalents, claims 6 and 9 of
`the ‘930 patent (“asserted claims”).1
` The assignment also included analyzing related
`issues including benefits of the claimed invention and the availability of non-infringing
`alternatives to the claimed invention.
`
`I have been retained by Network-1 to provide my expert opinions in this case. My
`compensation is $230 per hour. My compensation is not based on the outcome of this
`litigation.
`
`If called at trial, I expect to testify on the matters set forth herein. It is also possible I
`may testify in response to testimony given by experts for the Defendant and experts for
`parties other than the Defendant. If called upon to testify I may give a tutorial of the
`technology underlying the ‘930 patent. In preparation for this tutorial I may create and
`introduce graphical depictions, tables, charts, animations, and models as exhibits to aid
`the understanding of the technology involved. Additionally, I may create and introduce
`graphical depictions, tables, charts, animations, and models as exhibits to aid the
`understanding of the subject matter disclosed in the ‘930 patent and the relationship
`between the ‘930 patent and the accused equipment analyzed and examined in this report.
`
`It is my understanding that discovery in this case is continuing and that the parties are
`still exchanging information in this case. I reserve the right to add, modify, expand, and
`supplement the positions I set forth in this report based on any information that I receive
`or review after the submission of this report, including performance of the additional
`analysis specifically identified in this report.
`
` reserve t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket