`
`
`
`
`
`
`
`UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`TYLER DIVISION
`
`
`
`
`CASE NO. 6:08cv030-LED
`
`
`
`
`
`
`JURY DEMANDED
`Defendant: CISCO SYSTEMS, INC.
`
`
`
`
`
`NETWORK-1 SECURITY SOLUTIONS,
`INC., a Delaware corporation,
`
` Plaintiff,
`
`
`vs.
`
`
`CISCO SYSTEMS, INC., a California
`corporation; CISCO-LINKSYS, L.L.C., a
`California Limited Liability Company;
`ADTRAN, INC., a Delaware corporation;
`ENTERASYS NETWORKS, INC., a
`Delaware corporation; EXTREME
`NETWORKS, INC., a Delaware corporation;
`FOUNDRY NETWORKS, INC., a Delaware
`corporation; NETGEAR, INC., a Delaware
`corporation; 3COM CORPORATION, a
`Delaware corporation;
`
` Defendants.
`
`
`
`
`Expert Report of
`Dr. James M. Knox
`CISCO SYSTEMS, INC.
`
`
`_________________________
`
`
`Signed
`
`
`
`NOTICE: THIS REPORT CONTAINS INFORMATION
`CONSIDERED HIGHLY CONFIDENTIAL – FOR OUTSIDE
`COUNSEL ONLY
`
`
`
`
`
`
`
`March 14, 2010
`
`Date
`
`
`
`As of 3/14/2010
`
`Table of Contents
`
` 1
`
`
`2
`
` .................................................................................................. - 1 -
`Scope of document
`Expert qualifications, basis of opinion, and approach
` ............................................ - 2 -
`2.1
`Qualifications
` .................................................................................................. - 2 -
`2.2
`Person of ordinary skill in the art
` .................................................................... - 2 -
`2.3
`Assignment
` ..................................................................................................... - 4 -
`2.4 Materials considered
` ....................................................................................... - 5 -
`2.5
`Approach
` ......................................................................................................... - 5 -
`2.6
`Photographic evidence and schematics
` ........................................................... - 6 -
`3 Overview of infringement findings
` ......................................................................... - 7 -
`3.1
`Understanding of the law
` ................................................................................ - 7 -
`3.2
`The ‘930 patent
` ............................................................................................... - 8 -
`3.3
`Overview of Defendant’s products
` ................................................................. - 9 -
`3.3.1
`Defendant’s Accused PSEs and PDs
` ...................................................... - 9 -
`3.3.2
`Defendant’s Accused PSEs and integrated circuits
` ................................ - 9 -
`3.3.3
`Defendant’s Accused PDs
`..................................................................... - 10 -
`3.4
`
`Claim construction ........................................................................................ - 10 -
`3.5
`
`Summary of infringement opinions .............................................................. - 11 -
`4 Claim 6 - detailed infringement analysis and opinions
` ......................................... - 12 -
`4.1
`
`Claim 6: preamble ........................................................................................ - 12 -
`4.1.1
`
`Claim construction ................................................................................ - 12 -
`4.1.2
`Evidence
` ................................................................................................ - 12 -
`4.1.3
`Analysis
`................................................................................................. - 12 -
`4.1.4
`
`Conclusion ............................................................................................ - 15 -
`4.2
`
`Claim 6: element [a-1] ................................................................................. - 15 -
`4.2.1
`
`Claim construction ................................................................................ - 15 -
`4.2.2
`Evidence
` ................................................................................................ - 15 -
`4.2.3
`Analysis
`................................................................................................. - 15 -
`4.2.4
`
`Conclusion ............................................................................................ - 17 -
`4.3
`
`Claim 6: element [a-2] ................................................................................. - 17 -
`4.3.1
`
`Claim construction ................................................................................ - 17 -
`4.3.2
`Evidence
` ................................................................................................ - 18 -
`4.3.3
`Analysis
`................................................................................................. - 18 -
`4.3.4
`
`Conclusion ............................................................................................ - 20 -
`4.4
`
`Claim 6: element [a-3] ................................................................................. - 21 -
` ................................................................................ - 21 -
`4.4.1
`Claim construction
`4.4.2
`Evidence
` ................................................................................................ - 21 -
`4.4.3
`Analysis
`................................................................................................. - 21 -
`4.4.4
`
`Conclusion ............................................................................................ - 28 -
`4.5
`
`Claim 6: element [a-4] ................................................................................. - 28 -
`4.5.1
`
`Claim construction ................................................................................ - 28 -
`4.5.2
`Evidence
` ................................................................................................ - 28 -
`4.5.3
`Analysis
`................................................................................................. - 29 -
`4.5.4
`
`Conclusion ............................................................................................ - 39 -
`4.6
`
`Claim 6: element [a-5] ................................................................................. - 39 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` ii
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
`Claim construction ................................................................................ - 40 -
`
`4.6.1
`Evidence
` ................................................................................................ - 40 -
`4.6.2
`Analysis
`................................................................................................. - 40 -
`4.6.3
`
`Conclusion ............................................................................................ - 52 -
`4.6.4
`4.7
`
`Claim 6: element [b] .................................................................................... - 52 -
`4.7.1
`
`Claim construction ................................................................................ - 53 -
`4.7.2
`Evidence
` ................................................................................................ - 53 -
`4.7.3
`Analysis:
` ............................................................................................... - 53 -
`4.7.4
`
`Conclusion ............................................................................................ - 72 -
`4.8
`
`Claim 6: element [c]..................................................................................... - 72 -
`4.8.1
`
`Claim construction ................................................................................ - 72 -
`4.8.2
`Evidence
` ................................................................................................ - 73 -
`4.8.3
`Analysis
`................................................................................................. - 73 -
`4.8.4
`
`Conclusion ............................................................................................ - 79 -
`4.9
`
`Claim 6: element [d] .................................................................................... - 79 -
`4.9.1
`
`Claim construction ................................................................................ - 79 -
`4.9.2
`Evidence
` ................................................................................................ - 80 -
`4.9.3
`Analysis
`................................................................................................. - 80 -
`4.9.4
`
`Conclusion ............................................................................................ - 89 -
`5 Claim 9 - detailed infringement analysis and opinions
` ......................................... - 89 -
`5.1
`
`Claim 9: preamble ........................................................................................ - 89 -
`5.1.1
`
`Claim construction ................................................................................ - 89 -
`5.1.2
`Evidence
` ................................................................................................ - 89 -
`5.1.3
`Analysis
`................................................................................................. - 89 -
`5.1.4
`
`Conclusion ............................................................................................ - 90 -
`5.2
`
`Claim 9: element [a]..................................................................................... - 90 -
`5.2.1
`
`Claim construction ................................................................................ - 90 -
`5.2.2
`Evidence
` ................................................................................................ - 90 -
`5.2.3
`Analysis
`................................................................................................. - 90 -
`5.2.4
`
`Conclusion ............................................................................................ - 95 -
`5.3
`Claim elements satisfied by structures
` .......................................................... - 95 -
`6 Direct and indirect infringement
` ........................................................................... - 96 -
`6.1
`Direct infringement
` ....................................................................................... - 96 -
`6.2
`Encouraging infringing usage
` ....................................................................... - 97 -
`6.2.1
`Selling products designed to infringe
` ................................................... - 97 -
`6.2.2
`
`Instructing ............................................................................................. - 98 -
`
`6.2.3 Marketing or advertising ....................................................................... - 99 -
`6.3 Material components – PSEs (data nodes) and PDs (access devices)
` ........ - 100 -
`6.4
`802.3af / Cisco proprietary detection
` ......................................................... - 100 -
`6.4.1
`Default is IEEE 802.3af detection
` ...................................................... - 101 -
`6.4.2
`Advantages of IEEE 802.3af over Cisco Proprietary Detection
` ......... - 101 -
`6.5
`Automatic / Manual / Semi-Automatic Modes
` ........................................... - 101 -
`7 No substantial non-infringing uses
` ..................................................................... - 103 -
`7.1
`
`PSEs (switches) ........................................................................................... - 103 -
`7.1.1
`Tested Demonstrative
` ......................................................................... - 104 -
`7.2
`PDs (access devices)
` ................................................................................... - 104 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` iii
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
` ........................................................................ - 105 -
`Tested Demonstratives
`7.2.1
`
`8 Benefits of the claimed invention ....................................................................... - 106 -
`8.1
`Benefits of PoE and the claimed invention
` ................................................. - 106 -
`8.1.1
`Cost savings
` ........................................................................................ - 106 -
`8.1.2
`
`Flexibility ............................................................................................ - 107 -
`8.1.3
`
`Enhanced network control and scalability .......................................... - 107 -
`8.1.4
`
`Reliable uninterruptible power supply ................................................ - 108 -
`8.1.5
`Time savings
` ....................................................................................... - 108 -
`8.1.6
`Ease of deployment
` ............................................................................. - 109 -
`8.2
`Effective detection method
` ......................................................................... - 111 -
`8.3
`Benefits of the detection method claimed in the ‘930 patent
` ...................... - 112 -
`8.3.1
`
`Reliability ............................................................................................ - 113 -
`8.3.2
`Same type of signal
` ............................................................................. - 116 -
`8.3.3
`Phantom power
` ................................................................................... - 116 -
`8.3.4
`
`No modification to the PHY ............................................................... - 118 -
`8.3.5
`
`Additional benefits associated with Claim 9 ...................................... - 118 -
`8.4
`Non-infringing alternatives
` ......................................................................... - 119 -
`8.4.1
`Superior to alternative detection methods
`........................................... - 120 -
`8.4.2
`IEEE 802.3af standard infringes
` ......................................................... - 120 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` iv
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
`List of Figures
`
`Figure 1 – End Point PSE PoE Delivery ....................................................................... - 13 -
`
`Figure 2 –Typical Defendant data switch
` ..................................................................... - 16 -
`Figure 3 – Switch connected to Access Point
` ............................................................... - 19 -
`Figure 4 – Switch connected to Access Point
` ............................................................... - 22 -
`
`Figure 5 – T-568B Straight Through Ethernet Cable ................................................... - 23 -
`Figure 6 – IEEE 802.3af Powered-Device Detection
` ................................................... - 24 -
`
`Figure 7 – WS - X4248-RJ45V Cisco Catalyst 4500 PoE............................................ - 24 -
`
`Figure 8 – WS-X2428-RJ21V Cisco Catalyst 4500 PoE ............................................. - 25 -
`
`Figure 9 – PSE to PD Cable Method ............................................................................ - 27 -
`
`Figure 10 – Rear panel of a Switch 4210 26-port PWR ............................................... - 31 -
`
`Figure 11 – Rear panel of a Switch 4210 26-port PWR ............................................... - 37 -
`Figure 12 – CE-500 Getting Started Guide
`................................................................... - 38 -
`
`Figure 13 – Powering On the Switch ............................................................................ - 38 -
`Figure 14 – Complete 4-Port Powered Ethernet Power Source
` .................................... - 43 -
`Figure 15 – LTC4259 data sheet
` ................................................................................... - 44 -
`Figure 16 – LTC4259 data sheet
` ................................................................................... - 44 -
`Figure 17 – Complete 4-Port Powered Ethernet Power Source
` .................................... - 45 -
`Figure 18 – Power over Ethernet System Diagram
` ...................................................... - 45 -
`Figure 19 – Power over Ethernet System Diagram
` ...................................................... - 47 -
`Figure 20 –– Internal Block Diagram
` ........................................................................... - 48 -
`Figure 21 – PSE to PD Cable Method
` .......................................................................... - 50 -
`Figure 22 – Blocking Diodes to Detect Pins
` ................................................................. - 51 -
`
`Figure 23 – Power Control MOSFETs ......................................................................... - 51 -
`Figure 24 – Simplified Timing Diagram of the Start Up of a PD (Access Device)
` ..... - 55 -
`Figure 25 – Low level Current Mirror, Circuitry of LTC4259 IC
` ................................ - 56 -
`Figure 26 – LTC4259A-1 Datasheet Detection Sequence,
` ........................................... - 57 -
`Figure 27 – LTC4259A Detection Current
` ................................................................... - 57 -
`
`Figure 28 – LTC4259A Slope Calculation ................................................................... - 58 -
`Figure 29 – ‘930 Patent, Symmetric Center Tapped Transformers
` .............................. - 60 -
`
`Figure 30 – Buck Switching Power Supply .................................................................. - 61 -
`Figure 31 – TPS2377-1 Typical Application Circuit
` .................................................... - 62 -
`
`Figure 32 – TPS2375 Detection Circuit Portion ........................................................... - 63 -
`Figure 33 – VSS Connected to Ground
` ........................................................................ - 63 -
`Figure 34 – LTC4259 Datasheet, 4-Port Ethernet Power Source
` ................................. - 72 -
`Figure 35 – Power over Ethernet On Cisco Catalyst 6500 Series Switches
` ................. - 73 -
`Figure 36 – Complete 4-Port Powered Ethernet Power Source
` .................................... - 74 -
`
`Figure 37 – LTC4259 Internal sensing circuitry........................................................... - 74 -
`Figure 38 – PSE Validation Circuit
` .............................................................................. - 76 -
`Figure 39 – Detection Mode Requirements
` .................................................................. - 76 -
` ............................. - 78 -
`Figure 40 – AIR AP1131AG Detection, Classification, and Power
`Figure 41 – Two-Level Detection Induced Voltages
` .................................................... - 78 -
`
`Figure 42 – Operating Power and Data Communication .............................................. - 79 -
`Figure 43 – LTC4259 Data Sheet, 4-Port Ethernet Power Source
` ............................... - 81 -
`
`Figure 44 – LTC4259A Slope Calculation ................................................................... - 83 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` v
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
` ....................................... - 84 -
`Figure 45 – LTC4259 Data Sheet, Electrical Characteristics
`Figure 46 – LTC4259A datasheet, Fig. 1
` ..................................................................... - 85 -
`Figure 47 – Table 33-2 IEEE 802.3af Standard
` ........................................................... - 85 -
`Figure 48 – Table 33-2 802.3af Standard
` ..................................................................... - 86 -
`Figure 49 – Typical Detection Waveform
` .................................................................... - 88 -
`
`Figure 50 – Detection with Power Application ............................................................ - 88 -
`Figure 51 – LTC4259A datasheet, Fig. 1
` ..................................................................... - 91 -
`Figure 52 – LTC4259A Data Sheet
` .............................................................................. - 91 -
`Figure 53 – Sense Port on LTC4259A
` .......................................................................... - 91 -
`Figure 54 – LTC4259 Data Sheet, Power over Ethernet System Diagram
` .................. - 92 -
`Figure 55 – LTC4259A Data Sheet
` .............................................................................. - 93 -
`Figure 56 – LTC4259A Disconnect
` .............................................................................. - 93 -
`
`Figure 57 – Catalyst 3560 Switch Getting Started Guide ............................................. - 98 -
`Figure 58 – LTC4259 Data Sheet, 4-Port Ethernet Power Source
` ............................. - 103 -
`Figure 59 – Cisco Unified IP Phone 7942G Data Sheet
` ............................................. - 109 -
`Figure 60 – 3Com Solutions: Power over Ethernet
` ................................................... - 110 -
`Figure 61 – IEEE 802.3af Standard 3.1 Overview
` ..................................................... - 112 -
`
`Figure 62 – Cisco pre-standard Powered-Device Power Delivery ............................. - 114 -
`Figure 63 – Frequently Used Loopback Connectors
` .................................................. - 115 -
`Figure 64 – Forked Cables
` .......................................................................................... - 117 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` vi
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
`
`
`Appendix
`1-6[a-1]
`1-6[a-2]
`1-6[a-3]
`
`1-6[a-4]
`
`2
`3
`4
`5
`
`Appendices
`
`
`
`Evidence: “providing a data node adapted for data switching”
`Evidence: “providing … an access device adapted for data transmission”
`Evidence: “providing … at least one data signaling pair connected
`between the data node and the access device and arranged to transmit
`data therebetween”
`Evidence: “providing … a main power source connected to supply
`power to the data node”
`Integrated circuits
`Evidence: IEEE 802.3af compliant
`Tested demonstrative
`Inducement
`
`
`
` vii
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
`1 SCOPE OF DOCUMENT
`
`This document presents opinions and analysis relating to U.S. Patent 6,218,930 (the ‘930
`patent) of Katzenberg et al.
`
`This document details the analysis and examination of certain products of Cisco Systems,
`Inc. (hereinafter “the Defendant” or “Defendant”) to determine whether they infringe the
`‘930 patent. The document presents my opinions, and the basis for my opinions, that
`every element of each asserted claim of the ‘930 patent exists in the Defendant’s accused
`equipment when the equipment is connected and operated as intended and instructed and
`suggested by the Defendant’s associated manuals, literature, advertising, or other
`placards and data, both literally and under the doctrine of equivalents. This document
`also details the analysis, examination, opinions, and the basis for opinions, relating to
`benefits of the invention claimed in the ‘930 patent and whether there existed non-
`infringing alternatives to using the claimed invention available to Defendant.
`
`The products analyzed include data nodes (switches) which are enabled to provide
`Power-over-Ethernet (“PoE”) via a CAT-5 cable or similar data transmission cable
`signaling pairs. Also considered are access devices (wireless access points, cameras,
`telephones, etc.) that are enabled to receive power from the previously mentioned CAT-5
`cable over these same data transmission pairs.
`
`This document has been prepared in conjunction with corresponding documents relating
`to each of the other remaining Defendants in this litigation. Evidence that is presented in
`the body and the Appendix of those corresponding documents includes evidence that also
`relates to this Defendant (for example, evidence that a switch is adapted for data
`switching or evidence relating to the functionality of certain integrated circuits used in
`Defendant’s products). In addition, while the general analysis in the body of this
`document is substantially the same as in the corresponding documents for other
`Defendants, the corresponding documents often contain different details or explain
`nuances that have not been included in this document but that are nevertheless applicable
`to this Defendant. In addition, as explained in this document, Defendant’s products can
`be used in conjunction the products of the other Defendants. For these reasons, the
`analysis and evidence presented in the corresponding documents of the other Defendants
`should be considered part of the expert report for the present Defendant. For purposes of
`brevity, rather than reproducing the text of each of those corresponding documents here, I
`am incorporating those documents by reference, and they should be deemed a part of this
`report as thought fully set forth. Those incorporated documents include the Expert
`Reports of Dr. James M. Knox for CISCO-LINKSYS, L.L.C., ADTRAN, INC.,
`ENTERASYS NETWORKS, INC., EXTREME NETWORKS, INC., FOUNDRY
`NETWORKS, INC., and 3COM CORPORATION.
`
`All opinions and facts stated in this report are true and correct to the best of my
`knowledge. If called upon to testify, I could and would testify to the truth of the
`following.
`
`
`
` - 1 -
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
`2 EXPERT QUALIFICATIONS, BASIS OF OPINION, AND APPROACH
`
`2.1 Qualifications
`
`A copy of my resume is attached as Exhibit 1.
`
` I
`
` am qualified to render opinions on electronics, data communications, Ethernet
`networks, the ‘930 patent, and Defendant’s products. I have over 40 years of
`professional experience in industry and academics relating to electronics, data
`communications, and the design of computer hardware and software, including the design
`of electrical communications circuits, microprocessors, and A/D (Analog to Digital)
`converters.
`
` I
`
` received a Bachelor’s degree in Electrical Engineering from the University of Texas in
`1969, a Master’s degree in Computer Science from the University of Texas in 1971, and
`a Ph.D. in Electrical Engineering from the University of Texas in 1978. At the
`University of Texas, I studied and took courses in areas relating to computer networking
`and computer communications. I also studied and took numerous courses dealing with
`electronics, electronic components, and electrical circuits – including the design and use
`of microprocessors and A/D converters.
`
` I
`
` taught Electrical Engineering and Computer Science at the University of Texas,
`including courses involving the design, use, and programming of microprocessors and
`embedded microprocessor systems. These courses included the techniques for
`communicating over memory and I/O channels to remote devices, as well as the design
`and use of localized components such as A/D converters and digital switches.
`
`After graduating from the University of Texas, my work experience in the computer
`hardware and software design field included the design and implementation of numerous
`electronic and data communication systems. I designed microprocessors at the transistor
`circuit level (including designing algorithmic structures within the microprocessor), and
`developed and implemented their use in land-based, sea-based, air-based, and deep space
`applications. I have designed many digital communication networks. I have analyzed
`and am familiar with the internal components of Ethernet networks. I have opined in
`several other legal cases involving power over Ethernet electronics, and been qualified as
`an expert and testified in court about such systems.
`
`I am currently the owner of a computer technology company called TriSoft, located in
`Austin, Texas. TriSoft is involved in the research and development of unique electronic
`systems and components. I consult in projects involving remote power delivery,
`embedded microprocessor system design, and data communications, to name a very small
`subset.
`
`2.2 Person of ordinary skill in the art
`
`Through my education, experience and training, in academia and industry, and my
`analysis of the ‘930 patent, I am familiar with the knowledge of a person of ordinary skill
`
` - 2 -
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
`(1) The educational level of the inventors.
`
`in the field of the ‘930 patent in the 1999 – 2001 time frame. For the purposes of this
`report, I am of the opinion that a person of ordinary skill in the art with respect to the
`‘930 patent is a person with an undergraduate degree in Electrical Engineering and three
`years of experience.
`
`In determining what would be the level of ordinary skill in the field as the 2000 – 2001
`timeframe, considered are the following:
`
`
`
`My understanding is that the inventors’ education is as follows: Boris Katzenberg
`
`attended New York City Community College for two years studying electrical
`technology curriculum. Katzenberg deposition 15:20-16:2. Joseph Deptula received a
`Bachelors and Masters Degree in Electrical Engineering, both from the University of
`Connecticut. Deptula deposition 10:4-12.
`
`
`
`
`(2) The type of problems encountered in the art.
`
`Electrical engineering and networking problems generally involve choices in
`design. There are often numerous ways to address networking problems that
`achieve the same result. The design choices can include everything from physical
`structure, to algorithmic choices, to implementation details.
`
`(3) The prior art solutions to those problems.
`
`The principal prior art asserted by Defendants involve networking solutions.
`
`(4) The rapidity with which innovations are made.
`
`Based on my observations over the past 20 plus years, major innovations in
`networking occur about every 3-5 years.
`
`(5) The sophistication of the technology.
`
`Developing networking solutions is a moderately sophisticated technology.
`
`(6) The educational level of workers in the field.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Workers in the field generally had some undergraduate training, although not
`necessarily a bachelor’s degree, in electrical engineering. Most would have
`acquired a portion of their knowledge through hands on experience.
`
`
`Based on these factors, it is my conclusion that a person of ordinary skill in the art at the
`time would have been a person with an undergraduate degree in Electrical Engineering
`and three years of experience.
`
`
` - 3 -
`
`Expert Report of Dr. James M. Knox – Cisco Systems, Inc.
`
`
`
`As of 3/14/2010
`
`2.3 Assignment
`
`The primary assignment was to evaluate certain products of the Defendant to determine
`whether the products, when connected and operated as intended and instructed and
`suggested by Defendant’s associated manuals, literature, advertising, or other placards
`and data, infringe, either literally or under the doctrine of equivalents, claims 6 and 9 of
`the ‘930 patent (“asserted claims”).1
` The assignment also included analyzing related
`issues including benefits of the claimed invention and the availability of non-infringing
`alternatives to the claimed invention.
`
`I have been retained by Network-1 to provide my expert opinions in this case. My
`compensation is $230 per hour. My compensation is not based on the outcome of this
`litigation.
`
`If called at trial, I expect to testify on the matters set forth herein. It is also possible I
`may testify in response to testimony given by experts for the Defendant and experts for
`parties other than the Defendant. If called upon to testify I may give a tutorial of the
`technology underlying the ‘930 patent. In preparation for this tutorial I may create and
`introduce graphical depictions, tables, charts, animations, and models as exhibits to aid
`the understanding of the technology involved. Additionally, I may create and introduce
`graphical depictions, tables, charts, animations, and models as exhibits to aid the
`understanding of the subject matter disclosed in the ‘930 patent and the relationship
`between the ‘930 patent and the accused equipment analyzed and examined in this report.
`
`It is my understanding that discovery in this case is continuing and that the parties are
`still exchanging information in this case. I reserve the right to add, modify, expand, and
`supplement the positions I set forth in this report based on any information that I receive
`or review after the submission of this report, including performance of the additional
`analysis specifically identified in this report.
`
` reserve t