throbber
Exhibit A
`U.S. Patent No. 7,490,348
`Westin Stonebriar
`Evidence
`
`
`On information and belief, Westin Stonebriar’s accused instrumentalities include a first communication part defining a first
`class of service that includes a first set of permissions for access to resources including access to files on a system being
`controlled by said first communication part, and a second communication part, transmitting a separate communication stream
`from said first communication part, over substantially a same transmitting area as said first communication part, and said
`second communication part defining a second class of service which includes a second set of permissions of access to
`resources, where said second set of permissions does not include said access to said first files on said system.
`
`Plaintiff requires the benefit of discovery before it can identify the accused instrumentality that meets this claim limitation. At
`the parties’ March 8, 2013 Rule 26(f) conference, the first possible day to serve such discovery, Plaintiff served Interrogatory
`No. 1 and accompanying document requests which seek information sufficient to identify all Defendants’ networks, including
`those that are hidden or encrypted, whether such networks have access to server resources, including what type of access,
`and the hardware configurations associated with such networks. While Plaintiff has requested expedited production and
`responses to this discovery, Defendants have not yet provided such information.
`
`The first communication part may be met by hidden networks. On information and belief, the hotel has one or more hidden
`networks that may meet this limitation, including: networks where the network name (e.g., SSID) is not broadcast, networks
`that are broadcast in only a portion of the hotel that is not publicly accessible, or networks transmitted using a standard that
`requires specialized equipment to monitor.
`
`Networks observed on the property may also belong to the hotel and meet this limitation. Those networks include: “Tammy’s
`Verizon MIFI4510L,” or “Bbrown Mifi.” Without the additional discovery mentioned above, Plaintiff cannot determine the
`relationship of this network to the hotel or the details of this network.
`
`On information and belief, the hotel uses digital-radio-based networks to communicate amongst hotel staff that may meet this
`claim limitation. For example, the hotel uses digital radios that communicate based on one or more ETSI DMR standards.
`
`On information and belief, the hotel used and/or uses wireless networks identified above to allow access to files on one or
`
`Claim
`Language
`Claim 1
`A wireless
`network
`comprising:
`
` a
`
` first
`communication
`part defining a
`first class of
`service that
`includes a first
`set of
`permissions for
`access to
`resources
`including
`access to files
`on a system
`being
`controlled by
`said first
`communication
`part, and a
`second
`communication
`part,
`transmitting a
`separate
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 1
`
`STARWOOD Ex 1013, page 1
`
`

`
`Evidence
`
`more servers. For example, the hotel used and/or uses wireless networks to connect to a ZapMail server, a hospitality server,
`a Galaxy LightSpeed server, a doorlock server, an audio server, a video server, or an Internet Access server.
`
`Alternatively, the first communication part may be met by known networks but would require unauthorized access to those
`networks to determine if they allow access to files on a system. Plaintiff could not have legally obtained this information
`outside of discovery because Plaintiff would have had to access Defendants’ networks without sufficient permission. See, e.g.,
`Tex. Penal Code Ann. § 33.02 (“[a] person commits an offense if the person knowingly accesses a computer, computer
`network, or computer system without the effective consent of the owner.”); see also the Federal Wiretap Act, 18 U.S.C.§2511
`(“[e]xcept as otherwise specifically provided in this chapter any person who… intentionally intercepts, endeavors to intercept,
`or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication… shall be
`punished… or shall be subject to suit… .”); see also the Pen Register and Trap and Trace Act, 18 U.S.C. §3121 (“[e]xcept as
`provided in this section, no person may install or use a pen register or a trap and trace device without first obtaining a court
`order under section 3123 of this title… .”).
`
`Regarding the second communication part:
`
`The second communication part comprises“WESTIN-GUEST” broadcast from a device with a MAC address of
`00:3A:99:02:1F:80. As shown in the screenshot below, a network named WESTIN-GUEST is broadcasted from a device with a
`MAC address of 00:3A:99:02:1F:80. At least eight other “WESTIN-GUEST” networks are broadcast from devices with different
`MAC addresses within the Westin Stonebriar property. All nine networks named WESTIN-GUEST are “Open,” which means
`unencrypted.
`
`
`Claim
`Language
`communication
`stream from
`said first
`communication
`part, over
`substantially a
`same
`transmitting
`area as said
`first
`communication
`part, and said
`second
`communication
`part defining a
`second class of
`service which
`includes a
`second set of
`permissions of
`access to
`resources,
`where said
`second set of
`permissions
`does not
`include said
`access to said
`first files on
`said system,
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 2
`
`STARWOOD Ex 1013, page 2
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 3
`
`STARWOOD Ex 1013, page 3
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 4
`
`STARWOOD Ex 1013, page 4
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 5
`
`STARWOOD Ex 1013, page 5
`
`

`
`Claim
`Language
`
`Evidence
`
`
`On information and belief, the other WESTIN-GUEST devices shown above similarly meet this claim limitation.
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:99:02:1F:80 is associated with the name ‘WESTIN-GUEST’ and that at least eight other devices with different MAC
`addresses are also associated with the name ‘WESTIN-GUEST’” on the Westin Stonebriar property. (Legacy Stonebriar Hotel,
`Ltd. and Legacy Stonebriar Hotel II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 6
`
`STARWOOD Ex 1013, page 6
`
`

`
`Claim
`Language
`
`Evidence
`
`95; Def. Starwood Hotels & Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 95.)
`
`The Westin Stonebriar website admits: “Plano hotel, guest room amenities: … High Speed wired and wireless internet access.”
`http://www.westinstonebriar.com/accommodations.html
`
`WESTIN-GUEST broadcast from a device with a MAC address of 00:3A:99:02:1F:80 does not provide access to information on a
`Westin Stonebriar server.
`
`Alternatively, the second commuication part comprises“WESTIN-MEETING” broadcast from a device with a MAC address of
`00:3A:98:E6:07:80. As shown in the screenshot below, a network named “WESTIN-MEETING” is broadcasted from a device
`with a MAC address of 00:3A:98:E6:07:80. At least ten other devices with different MAC addresses also transmit a network
`named WESTIN-MEETING within the Westin Stonebriar property. All eleven networks named WESTIN-MEETING are “Open,”
`which means unencrypted.
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 7
`
`STARWOOD Ex 1013, page 7
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 8
`
`STARWOOD Ex 1013, page 8
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 9
`
`STARWOOD Ex 1013, page 9
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 10
`
`STARWOOD Ex 1013, page 10
`
`

`
`Claim
`Language
`
`Evidence
`
`
`On information and belief, the other WESTIN-MEETING devices shown above similarly meet this claim limitation.
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:98:E6:07:80 is associated with the name ‘WESTIN-MEETING’ and that at least ten other devices with different MAC
`addresses are also associated with the name ‘WESTIN-MEETING’” on the Westin Stonebriar property. (Legacy Stonebriar
`Hotel, Ltd. and Legacy Stonebriar Hotel II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 11
`
`STARWOOD Ex 1013, page 11
`
`

`
`Claim
`Language
`
`said first
`communication
`part having its
`access
`controlled by
`requiring users
`of the first
`communication
`part to use a
`first key, said
`first key being
`a non-public
`key of a type
`that controls
`access, and
`automatically
`provides access
`to users that
`
`Evidence
`
`Complaint, at ¶ 97; Def. Starwood Hotels & Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 97.)
`
`The Westin Stonebriar website admits: “[a]ll of our meeting facilities feature high-speed wired and wireless Internet access,
`videoconferencing capabilities, satellite and T-1 line connections, and the support of our superb onsite audio/video staff.”
`http://www.westinstonebriar.com/meetings.html
`
`WESTIN-MEETING broadcast from a device with a MAC address of 00:3A:98:E6:07:80 does not provide access to information
`on a Westin Stonebriar server.
`
`Lone Star WiFi presently asserts that this claim element is literally present. To the extent that this claim element is found to
`not literally meet the claim element, Lone Star WiFi contends that the instrumentality identified herein is insubstantially
`different from the claimed invention of the associated patent-in-suit and therefore would infringe under the doctrine of
`equivalents.
`
`On information and belief, Westin Stonebriar’s accused instrumentalities include said first communication part having its
`access controlled by requiring users of the first communication part to use a first key, said first key being a non-public key of a
`type that controls access, and automatically provides access to users that have said first key and does not provide access to
`users who do not have said first key, said second communication part allowing access without said first key.
`
`Regarding the non-public key, discovery is needed. Plaintiff requires the benefit of discovery before it can identify the accused
`instrumentality that meets this claim limitation. At the parties’ March 8, 2013 Rule 26(f) conference, the first possible day to
`serve such discovery, Plaintiff served Interrogatory No. 1 and accompanying document requests which seek information
`sufficient to identify all Defendants’ networks, including those that are hidden or encrypted, whether such networks have
`access to server resources, including what type of access, and the hardware configurations associated with such networks.
`While Plaintiff has requested expedited production and responses to this discovery, Defendants have not yet provided such
`information.
`
`Regarding the second communication part:
`
`The second communication part comprisesWESTIN-GUEST displays the below initial webpage which requires a “Last Name”
`and “Room Number” as a key before allowing access to additional webpages on the Internet.
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 12
`
`STARWOOD Ex 1013, page 12
`
`

`
`Evidence
`
`Claim
`Language
`have said first
`key and does
`not provide
`access to users
`who do not
`have said first
`key, said
`second
`communication
`part allowing
`access without
`said first key;
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 13
`
`STARWOOD Ex 1013, page 13
`
`

`
`Claim
`Language
`
`Evidence
`
`
`If you select “Enter an Access Code,” WESTIN-GUEST displays the below webpage that requires an “Access Code” as a key.
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 14
`
`STARWOOD Ex 1013, page 14
`
`

`
`Claim
`Language
`
`Evidence
`
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:99:02:1F:80 is associated with the name ‘WESTIN-GUEST’ and that users at The Westin Stonebriar Hotel can obtain
`access to one or more webpages with certain active access codes or last names and room numbers.” (Legacy Stonebriar Hotel,
`Ltd. and Legacy Stonebriar Hotel II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶
`99; Def. Starwood Hotels & Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 99.)
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 15
`
`STARWOOD Ex 1013, page 15
`
`

`
`Claim
`Language
`
`Evidence
`
`Alternatively, the second commuication part comprisesWESTIN-MEETING displays the below initial webpage without a key.
`The webpage requires an “Access Code” before allowing access to additional webpages on the Internet. As shown below,
`WESTIN-MEETING also displays a “Terms” and a “Need Help Connecting” webpage prior to entry of a key.
`
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 16
`
`STARWOOD Ex 1013, page 16
`
`

`
`Claim
`Language
`
`Evidence
`
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:98:E6:07:80 is associated with the name ‘WESTIN-MEETING’ and that users at The Westin Stonebriar Hotel can obtain
`access to one or more webpages with certain active access codes.” (Legacy Stonebriar Hotel, Ltd. and Legacy Stonebriar Hotel
`II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶ 103; Def. Starwood Hotels &
`Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 103.)
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 17
`
`STARWOOD Ex 1013, page 17
`
`

`
`Claim
`Language
`
`wherein said
`second
`communication
`part allows said
`access upon
`detecting a
`second key
`which is a
`public key, and
`does not allow
`said access
`when not
`detecting said
`second key;
`a third
`communication
`part,
`transmitting a
`separate
`communication
`stream from
`said first
`communication
`part, and
`separate from
`said second
`
`Evidence
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:98:E6:07:80 is associated with the name ‘WESTIN-MEETING’ and that users at The Westin Stonebriar Hotel can obtain
`access to one or more webpages with certain active access codes.” (Legacy Stonebriar Hotel, Ltd. and Legacy Stonebriar Hotel
`II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶ 104; Def. Starwood Hotels &
`Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 104.)
`
`On information and belief, Westin Stonebriar’s accused instrumentalities include said second communication part allow[ing]
`said access upon detecting a second key which is a public key, and []not allow[ing] said access when not detecting said second
`key.
`
`As discussed above, the identified instrumentalities that comprise the second communication part require keys for access.
`Discovery is needed to determine if the second key, as identified above, is a public key. Plaintiff requires the benefit of
`discovery before it can identify the accused instrumentality that meets this claim limitation. At the parties’ March 8, 2013 Rule
`26(f) conference, the first possible day to serve such discovery, Plaintiff served Interrogatory No. 1 and accompanying
`document requests which seek information sufficient to identify all Defendants’ networks, including those that are hidden or
`encrypted, whether such networks have access to server resources, including what type of access, and the hardware
`configurations associated with such networks. While Plaintiff has requested expedited production and responses to this
`discovery, Defendants have not yet provided such information.
`
`
`On information and belief, Westin Stonebriar’s accused instrumentalities include a third communication part, transmitting a
`separate communication stream from said first communication part, and separate from said second communication part, over
`substantially a same transmitting area as said first and second communication parts, and said third communication part
`defining a third class of service which includes a third set of permissions of access to resources, where said third set of
`permissions does not include said access to said files on said system, and allows access to only specified internet sites; wherein
`said third communication part allowing access without needing any key.
`
`The third communication party comprises “WESTIN-LOBBY” is broadcast from a device with a MAC address of
`00:3A:99:05:90:50. At least two other devices with different MAC addresses also transmit a network named WESTIN-LOBBY
`within the Westin Stonebriar property. All three networks named WESTIN-LOBBY are “Open,” which means unencrypted.
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 18
`
`STARWOOD Ex 1013, page 18
`
`

`
`Claim
`Language
`communication
`part, over
`substantially a
`same
`transmitting
`area as said
`first and
`second
`communication
`parts, and said
`third
`communication
`part defining a
`third class of
`service which
`includes a third
`set of
`permissions of
`access to
`resources,
`where said
`third set of
`permissions
`does not
`include said
`access to said
`files on said
`system, and
`allows access
`to only
`specified
`internet sites;
`
`
`
`Evidence
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 19
`
`STARWOOD Ex 1013, page 19
`
`

`
`Claim
`Language
`wherein said
`third
`communication
`part allowing
`access without
`needing any
`key.
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 20
`
`STARWOOD Ex 1013, page 20
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 21
`
`STARWOOD Ex 1013, page 21
`
`

`
`Claim
`Language
`
`Evidence
`
`
`On information and belief, the other WESTIN-LOBBY devices shown above similarly meet this claim limitation.
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:99:05:90:50 is associated with the name ‘WESTIN-LOBBY’ and that at least two other devices with different MAC
`addresses are also associated with the name ‘WESTIN-LOBBY’” on the Westin Stonebriar property. (Legacy Stonebriar Hotel,
`Ltd. and Legacy Stonebriar Hotel II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 22
`
`STARWOOD Ex 1013, page 22
`
`

`
`Claim
`Language
`
`Evidence
`
`96; Def. Starwood Hotels & Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 96.)
`The Westin Stonebriar website admits: “[w]e offer complimentary high-speed Internet access in all of our public areas to help
`you stay connected.” http://www.westinstonebriar.com/accommodations.html
`
`WESTIN-LOBBY displays the initial internet sites shown below without a key; allows access with an "Access Code"; allows
`complimentary access to "basic websites" without a key; and displays a “Terms” webpage prior to entry of a key.
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
`
`
` 23
`
`STARWOOD Ex 1013, page 23
`
`

`
`Claim
`Language
`
`
`
`Evidence
`
`
`WESTIN-LOBBY does not allow access to a server.
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:99:05:90:50 is associated with the name ‘WESTIN-LOBBY’ and that users at The Westin Stonebriar Hotel can obtain
`access to one or more webpages with certain active access codes.” (Legacy Stonebriar Hotel, Ltd. and Legacy Stonebriar Hotel
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 24
`
`STARWOOD Ex 1013, page 24
`
`

`
`Claim
`Language
`
`Claim 2
`A network as in
`claim 1,
`wherein said
`first class of
`service
`includes a
`greater speed
`of network
`access than
`
`Evidence
`
`II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶ 101; Def. Starwood Hotels &
`Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 101.)
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:99:05:90:50 is associated with the name ‘WESTIN-LOBBY’ and that The Westin Stonebriar Hotel provides complimentary
`Internet access in the lobby of The Westin Stonebriar Hotel.” (Legacy Stonebriar Hotel, Ltd. and Legacy Stonebriar Hotel II,
`Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶ 102; Def. Starwood Hotels &
`Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 102.)
`
`WESTIN-LOBBY broadcast from a device with a MAC address of 00:3A:99:05:90:50 and WESTIN-GUEST broadcast from a device
`with a MAC address of 00:3A:99:02:1F:80 transmit over substantially a same transmitting area because, as shown in the
`screenshots, they are accessible from the same locations.
`
`WESTIN-LOBBY broadcast from a device with a MAC address of 00:3A:99:05:90:50 and WESTIN-MEETING broadcast from a
`device with a MAC address of 00:3A:98:E6:07:80 transmit over substantially a same transmitting area because, as shown in the
`screenshots, they are accessible from the same locations.
`
`Lone Star WiFi presently asserts that this claim element is literally present. To the extent that this claim element is found to
`not literally meet the claim element, Lone Star WiFi contends that the instrumentality identified herein is insubstantially
`different from the claimed invention of the associated patent-in-suit and therefore would infringe under the doctrine of
`equivalents.
`
`
`On information and belief, Westin Stonebriar’s accused instrumentalities include wherein said first class of service includes a
`greater speed of network access than said second class of service.
`
`Plaintiff requires the benefit of discovery before it can identify the accused instrumentality that meets this claim limitation. At
`the parties’ March 8, 2013 Rule 26(f) conference, the first possible day to serve such discovery, Plaintiff served Interrogatory
`No. 1 and accompanying document requests which seek information sufficient to identify all Defendants’ networks, including
`those that are hidden or encrypted, whether such networks have access to server resources, including what type of access,
`and the hardware configurations associated with such networks. While Plaintiff has requested expedited production and
`responses to this discovery, Defendants have not yet provided such information.
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 25
`
`STARWOOD Ex 1013, page 25
`
`

`
`Claim
`Language
`said second
`class of service.
`
`Claim 3
`A network as in
`claim 1,
`wherein said
`wireless
`network
`includes an
`access granting
`mechanism,
`that detects a
`user’s key, and
`automatically
`grants one of
`said first and
`second levels
`of services
`based on
`detecting one
`of said first or
`second key, or
`grants said
`third level of
`service if a user
`
`Evidence
`
`Plaintiff could not have legally obtained this information outside of discovery because Plaintiff would have had to access
`Defendants’ networks without sufficient permission. See, e.g., Tex. Penal Code Ann. § 33.02 (“[a] person commits an offense if
`the person knowingly accesses a computer, computer network, or computer system without the effective consent of the
`owner.”); see also the Federal Wiretap Act, 18 U.S.C.§2511 (“[e]xcept as otherwise specifically provided in this chapter any
`person who… intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to
`intercept, any wire, oral, or electronic communication… shall be punished… or shall be subject to suit… .”); see also the Pen
`Register and Trap and Trace Act, 18 U.S.C. §3121 (“[e]xcept as provided in this section, no person may install or use a pen
`register or a trap and trace device without first obtaining a court order under section 3123 of this title… .”).
`
`
`On information and belief, Westin Stonebriar’s accused instrumentalities include wherein said wireless network includes an
`access granting mechanism, that detects a user’s key, and automatically grants one of said first and second levels of services
`based on detecting one of said first or second key, or grants said third level of service if a user is detected without said first or
`second key..
`
`Plaintiff requires the benefit of discovery before it can identify the accused instrumentality that meets this claim limitation. At
`the parties’ March 8, 2013 Rule 26(f) conference, the first possible day to serve such discovery, Plaintiff served Interrogatory
`No. 1 and accompanying document requests which seek information sufficient to identify all Defendants’ networks, including
`those that are hidden or encrypted, whether such networks have access to server resources, including what type of access,
`and the hardware configurations associated with such networks. While Plaintiff has requested expedited production and
`responses to this discovery, Defendants have not yet provided such information.
`
`Plaintiff could not have legally obtained this information outside of discovery because Plaintiff would have had to access
`Defendants’ networks without sufficient permission. See, e.g., Tex. Penal Code Ann. § 33.02 (“[a] person commits an offense if
`the person knowingly accesses a computer, computer network, or computer system without the effective consent of the
`owner.”); see also the Federal Wiretap Act, 18 U.S.C.§2511 (“[e]xcept as otherwise specifically provided in this chapter any
`person who… intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to
`intercept, any wire, oral, or electronic communication… shall be punished… or shall be subject to suit… .”); see also the Pen
`Register and Trap and Trace Act, 18 U.S.C. §3121 (“[e]xcept as provided in this section, no person may install or use a pen
`register or a trap and trace device without first obtaining a court order under section 3123 of this title… .”).
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 26
`
`STARWOOD Ex 1013, page 26
`
`

`
`Evidence
`
`
`On information and belief, Westin Stonebriar’s accused instrumentalities include a first wireless network portion, including a
`first network transmitter, which is accessed by users having a first key which is a non-public key of a type that controls access,
`and which allows a first specified level of access to services, and which automatically grants access to users having said first
`key but does not grant access to users who do not have said first key.
`
` A
`
` first wireless network portion comprises“WESTIN-GUEST” broadcast from a device with a MAC address of 00:3A:99:02:1F:80.
`As shown in the screenshot below, a network named WESTIN-GUEST is broadcasted from a device with a MAC address of
`00:3A:99:02:1F:80. At least eight other “WESTIN-GUEST” networks are broadcast from devices with different MAC addresses
`within the Westin Stonebriar property. All nine networks named WESTIN-GUEST are “Open,” which means unencrypted.
`
`
`Claim
`Language
`is detected
`without said
`first or second
`key.
`Claim 4
`A wireless
`network
`system,
`comprising:
`A first wireless
`network
`portion,
`including a first
`network
`transmitter,
`which is
`accessed by
`users having a
`first key which
`is a non-public
`key of a type
`that controls
`access, and
`which allows a
`first specified
`level of access
`to services, and
`which
`automatically
`grants access
`to users having
`said first key
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 27
`
`STARWOOD Ex 1013, page 27
`
`

`
`Claim
`Language
`but does not
`grant access to
`users who do
`not have said
`first key; and
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 28
`
`STARWOOD Ex 1013, page 28
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 29
`
`STARWOOD Ex 1013, page 29
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 30
`
`STARWOOD Ex 1013, page 30
`
`

`
`Claim
`Language
`
`Evidence
`
`
`On information and belief, the other WESTIN-GUEST devices shown above similarly meet this claim limitation.
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:99:02:1F:80 is associated with the name ‘WESTIN-GUEST’ and that at least eight other devices with different MAC
`addresses are also associated with the name ‘WESTIN-GUEST’” on the Westin Stonebriar property. (Legacy Stonebriar Hotel,
`Ltd. and Legacy Stonebriar Hotel II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 31
`
`STARWOOD Ex 1013, page 31
`
`

`
`Claim
`Language
`
`Evidence
`
`95; Def. Starwood Hotels & Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 95.)
`
`The Westin Stonebriar website admits: “Plano hotel, guest room amenities: … High Speed wired and wireless internet access.”
`http://www.westinstonebriar.com/accommodations.html
`
`WESTIN-GUEST displays the below initial webpage which requires a “Last Name” and “Room Number” as a key before allowing
`access to additional webpages on the Internet.
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 32
`
`STARWOOD Ex 1013, page 32
`
`

`
`Claim
`Language
`
`Evidence
`
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 33
`
`STARWOOD Ex 1013, page 33
`
`

`
`Claim
`Language
`
`Evidence
`
`
`If you select “Enter an Access Code,” WESTIN-GUEST displays the below webpage that requires an “Access Code” as a key.
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 34
`
`STARWOOD Ex 1013, page 34
`
`

`
`Claim
`Language
`
`Evidence
`
`
`The Legacy Stonebriar entities and Starwood admitted in their Answers that “a device with a MAC address of
`00:3A:99:02:1F:80 is associated with the name ‘WESTIN-GUEST’ and that users at The Westin Stonebriar Hotel can obtain
`access to one or more webpages with certain active access codes or last names and room numbers.” (Legacy Stonebriar Hotel,
`Ltd. and Legacy Stonebriar Hotel II, Ltd.’s Answer, Affirm. Defs., and Counterclaims [sic] to Pl. Lone Star WiFi’s Complaint, at ¶
`99; Def. Starwood Hotels & Resorts Worldwide, Inc.’s Answer to Pl.’s Compl. for Patent Infringement, at ¶ 99.)
`
`
`
`
`Rule 3-1 Infringement Contentions
`
`
`
`
`
`
`
`
`
`
` 35
`
`STARWOOD Ex 1013, page 35
`
`

`
`Evidence
`
`Alternatively, a first wireless network portion may comprise a hidden network or other network. Discovery is needed to
`determine if these other networks meet this limitation. Plaintiff requires the benefit of discovery before it can identify the
`accused instrumentality that meets this claim limitation. At the parties’ March 8, 2013 Rule 26(f) conference, the first possible
`day to serve such discovery, Plaintiff served Interrogatory No. 1 and accompanying document requests which seek information
`sufficient to identify all Defendants’ networks, including those that are hidden or encrypted, whether such networks have
`access to server resources, including what type of access, and the hardware configurations associated with such networks.
`While Plaintiff has requested expedited production and responses to this discovery, Defendants have not yet provided such
`information.
`
`On information and belief, the hotel has one or more hidden networks

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket