throbber

` Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 1 of 317 PageID 2152
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE NORTHERN DISTRICT OF TEXAS
`DALLAS DIVISION
`
`
`SEVEN NETWORKS, LLC,
`
`
`
`v.
`
`ZTE (USA) INC. AND
`ZTE CORPORATION,
`
`
`
`
`Plaintiff,
`
`Defendants.
`
`
`
`
`
`CIVIL ACTION NO. 3:17-CV-1495
`
`PATENT CASE
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`________________________________________________________________
`
`
`SEVEN Networks, LLC’s Appendix in Support of Its
`Opening Claim-Construction Brief
`
`________________________________________________________________
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`P. App. 1
`
`Page 1 of 8
`
`GOOGLE EXHIBIT 1029
`
`

`

`
` Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 159 of 317 PageID 2310
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit H
`
`P. App. 159
`
`Page 2 of 8
`
`

`

`
`
`
` Case 3:17-cv-01495-M Document 61-1 Filed 01/15/18 Page 47 of 198 PageID 1063 Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 160 of 317 PageID 2311
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE NORTHERN DISTRICT OF TEXAS
`DALLAS DIVISION
`
`
`SEVEN NETWORKS, LLC,
`
`
`
`v.
`
`ZTE (USA) INC. AND
`ZTE CORPORATION,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Plaintiff,
`
`Defendants.
`
`CIVIL ACTION NO. 3:17-CV-1495-M
`
`PATENT CASE
`
`JURY TRIAL DEMANDED
`
`DECLARATION OF MICHAEL T. GOODRICH, PHD
`REGARDING CLAIM CONSTRUCTION
`
`
`
`I, Michael T. Goodrich, declare under penalty of perjury as follows:
`
`1.
`
`I am currently a Chancellor’s Professor in the Department of Computer Science at
`
`University of California, Irvine.1 I submit this Declaration to provide relevant background
`
`information regarding the technology at issue in U.S. Patent No. 9,325,600 (attached as Exhibit
`
`2) and in U.S. Patent No. 9,516,127 (attached as Exhibit 3), and to set forth my opinions about
`
`the meaning of certain disputed claim terms in the ’600 and ’127 patents from the perspective of
`
`a person of ordinary skill in the pertinent field.
`
`1 This is a title “designed for persons who have earned the title of Professor and who have
`demonstrated unusual academic merit and whose continued promise for scholarly achievement is
`unusually high.” See Chancellor’s Professors, University of California Irvine Office of
`Academic Personnel, http://ap.uci.edu/titles-of-distinction/chancellors-professors/ (last visited
`Jan. 10, 2018).
`
`P. App. 160
`
`Page 3 of 8
`
`

`

`
`
`
` Case 3:17-cv-01495-M Document 61-1 Filed 01/15/18 Page 98 of 198 PageID 1114 Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 211 of 317 PageID 2362
`
`the WakeLock’s required power level (at least) until its release method is called, at which time
`
`normal
`
`power
`
`operation
`
`is
`
`restored.”108
`
`For
`
`example,
`
`the
`
`constant
`
`PowerManager.PARTIAL_WAKE_LOCK indicates that an application “should continue to use
`
`the CPU even if the user presses the power button on the device. It also allows the screen to dim
`
`and turn off.”109
`
`134. Therefore, in my opinion, “wakelock” means “a software-based mechanism for
`
`indicating that an application needs the mobile device to stay awake.”
`
`C.
`135.
`
`“optimize background traffic”
`
`I understand that SEVEN has proposed the following construction for “optimize
`
`background traffic,” and that ZTE contends that the term is indefinite:
`
`SEVEN
`Term
`“optimize background traffic” “adjust background traffic to
`conserve network or mobile
`device resources”
`
`ZTE
`Indefinite
`
`
`
`136. The term “optimize background traffic” appears in claims 33, 38, 42, and 48 of
`
`the ’127 Patent. In my opinion, a POSA in 2013 would understand that “optimize background
`
`traffic,” when viewed in light of the ’127 Patent specification, means “adjust background traffic
`
`to conserve network or mobile device resources.”
`
`137.
`
`In the context of dynamically changing environments involving computers and
`
`telecommunications, a POSA would understand the term “optimize” to mean “improve the
`
`performance of”110 or “make more efficient.”111 Given the complexity and constant evolution of
`
`108 See, e.g., PAUL DEITEL ET AL., ANDROID FOR PROGRAMMERS: AN APP-DRIVEN APPROACH
`305 (2011). [SEVENLIT0129773]
`109 Id.
`110 See, e.g., Optimize, Microsoft Computer Dictionary (5th ed. 2002) (“To fine-tune an
`application for improved performance.”). [SEVENLIT0127977]
`
`P. App. 211
`
`Page 4 of 8
`
`

`

`
`
`
` Case 3:17-cv-01495-M Document 61-1 Filed 01/15/18 Page 99 of 198 PageID 1115 Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 212 of 317 PageID 2363
`
`computers and networks in such dynamic environments,112 and the impossibility of predicting
`
`the future of online mobile networks with absolute certainty, an interpretation of “optimize” in
`
`the context of the ’127 Patent as a mathematically guaranteed or provably best configuration is
`
`impractical if not impossible. Thus, as I discuss above in the background section on resource
`
`optimization, in the context of the ’127 Patent, a POSA would understand “optimization” to be
`
`directed at conserving resources rather than achieving the mathematically absolute best usage of
`
`such resources.
`
`138. Furthermore, the specification of the ’127 Patent discloses various traffic
`
`optimizations that can conserve network or mobile device resources. For example, the ’127
`
`Patent discloses the manipulation of the timing of triggers so as to optimize network
`
`resources,113 as well as ways to modify the timing of triggers to optimize mobile device
`
`resources, such as battery, CPU, and memory resources.114 Of course, the goal of such
`
`optimization techniques is to conserve these resources, since maximizing the use of such
`
`resources would be detrimental to performance and resource utilization, such as battery life or
`
`network bandwidth.115 For instance, the ’127 Patent discloses, “The traffic can be managed such
`
`that network consumption, for example, use of the cellular network is conserved for effective
`
`and efficient bandwidth utilization.”116 Likewise, the ’127 Patent also discloses, “In addition,
`
`111 See, e.g., Optimized Code, McGraw-Hill Dictionary of Scientific and Technical Terms (5th
`ed. 1994) (“A machine-language program that has been revised to remove inefficiencies and
`unused or unnecessary instructions so that the program is executed more quickly and occupies
`less storage space.”). [SEVENLIT0129814]
`112 See, e.g., ’127 Patent at 6:33–36, 12:62–67, 14:25–67, and 15:44–63,
`113 ’127 Patent at 3:57–4:2; see also ’127 Patent at 4:55–65.
`114 ’127 Patent at 4:5–7; see also ’127 Patent at 3:18–37 and 5:4–6.
`115 See, e.g., ’127 Patent at 6:8–25.
`116 ’127 Patent at 7:50–53 (emphasis added).
`
`P. App. 212
`
`Page 5 of 8
`
`

`

`
`
`
` Case 3:17-cv-01495-M Document 61-1 Filed 01/15/18 Page 100 of 198 PageID 1116 Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 213 of 317 PageID 2364
`
`the host server 100 can manage and coordinate such traffic in the system such that use of device-
`
`side resources (e.g., including but not limited to battery power consumption, radio use,
`
`processor/memory use) are optimized with a general philosophy for resource conservation while
`
`still optimizing performance and user experience.”117 Thus, a POSA would understand that the
`
`optimization of background traffic in the ’127 Patent is directed at the conservation of network
`
`or mobile device resources.
`
`139. A POSA would further understand that applications can operate in a foreground
`
`or background state, where, for instance, a foreground state involves responding to user inputs
`
`and a background state involves operating without user interaction.118 Typically, applications in
`
`a background state have a lower priority for execution than applications in a foreground state.
`
`For example, the ’127 Patent states, “In one embodiment, the mobile device 150 can include one
`
`or more applications 202-206, an operating system (OS) 162, other platform specific and/or other
`
`modules 208 such as network interface components, sensor components, native applications, user
`
`activity detectors, application state detectors (e.g., foreground/background state), other
`
`contextual detectors, other components described in FIG. 1E, and the like.”119
`
`117 ’127 Patent at 7:53–59 (emphasis added).
`118 See, e.g., Background, MICROSOFT COMPUTER DICTIONARY (5th ed. 2002) (“In the context
`of processes or tasks that are part of an operating system or program, operating without
`interaction with the user while the user is working on another task. Background processes or
`tasks are assigned a lower priority in the microprocessor’s allotment of time than foreground
`tasks and generally remain invisible to the user unless the user requests an update or brings the
`task to the foreground. …”). See also Foreground, Microsoft Computer Dictionary (5th ed.
`2002) (“Currently having control of the system and responding to commands issued by the
`user.”).
`119 ’127 Patent at 16:28–35 (emphasis added).
`
`P. App. 213
`
`Page 6 of 8
`
`

`

`
`
`
` Case 3:17-cv-01495-M Document 61-1 Filed 01/15/18 Page 101 of 198 PageID 1117 Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 214 of 317 PageID 2365
`
`140. The ’127 Patent discloses several ways to adjust what a POSA would understand
`
`to include background traffic so as to conserve network or mobile device resources, including the
`
`following:
`
`• The protocol optimizer 123 can “implement the logic of serving recurrent request
`from the local cache 185 instead of allowing those request go over the network to the
`service provider/application host server. One is its tasks is to eliminate or minimize
`the need to send requests to the network, positively affecting network congestion and
`device battery life.”120
`
`• The traffic scheduler 124 can “temporally move communications to optimize usage of
`device resources by unifying keep-alive signaling so that some or all of the different
`applications 163 can send keep-alive messages at the same time (traffic pipelining).
`Traffic scheduler 124 may also decide to delay transmission of data that is not
`relevant at a given time (for example, when the device is not actively used).”121
`
`• The traffic harmonizer 144 can be “responsible for communication between the
`client-side proxy 175 and the polling server 145. The traffic harmonizer 144 connects
`to the polling server 145 directly or through the data storage 130, and to the client
`over any open or proprietary protocol such as the 7TP, implemented for traffic
`optimization. The traffic harmonizer 144 can be also responsible for traffic pipelining
`on the server side: if there's cached content in the database for the same client, this
`can be sent over to the client in one message.”122
`
`• “In one embodiment, systems and methods of intelligent alarm manipulator and
`resource tracker can be used alone or in combination with the signaling optimizer to
`further reduce network requests by consolidating or changing the timing of requests
`such that use of resources including network, battery, CPU, memory and the like is
`reduced.”123
`
`• The local proxy 175 and the proxy server 125 may “filter irrelevant data from the
`communicated data. In addition, the local proxy 175 and the proxy server 125 can
`also accumulate low priority data and send it in batches to avoid the protocol
`overhead of sending individual data fragments.”124
`
`• “The local proxy 175 and the proxy server 125 can work in conjunction to accumulate
`low priority data and send it in batches to reduce the number of times and/or amount
`
`120 ’127 Patent at 12:19–25.
`121 ’127 Patent at 12:29–36.
`122 ’127 Patent at 13:51–60.
`123 ’127 Patent at 15:1–6.
`124 ’127 Patent at 10:64–11:1 (emphasis added).
`
`P. App. 214
`
`Page 7 of 8
`
`

`

`
`
`
` Case 3:17-cv-01495-M Document 61-1 Filed 01/15/18 Page 102 of 198 PageID 1118 Case 3:17-cv-01495-M Document 78 Filed 02/20/18 Page 215 of 317 PageID 2366
`
`of time when the radio is powered up. The local proxy 175 can synchronize the
`network use by performing
`the batched data
`transfer for all connections
`simultaneously.”125
`
`• “The local proxy 175 and the proxy server 125 can also compress or transcode the
`traffic, reducing the amount of data sent over the network 106 and/or 108. The
`signaling traffic in the network 106 and/or 108 can be reduced, as the networks are
`now used less often and the network traffic can be synchronized among individual
`applications.”126
`
`• “The local cache 185 can store responses to recurrent requests, and can be used by the
`Protocol Optimizer 123 to send responses to the applications 163.”127
`
`141. Therefore, in my opinion, a POSA would understand that the meaning of
`
`“optimize background traffic” is “adjust background traffic to conserve network or mobile
`
`device resources.”
`
`D.
`142.
`
`“receive a selection from a user whether to optimize traffic”
`
`I understand that SEVEN has proposed the following construction for “receive a
`
`selection from a user whether to optimize traffic,” and that ZTE contends the term is indefinite:
`
`Term
`“receive a selection from a
`user whether to optimize
`traffic”
`
`SEVEN
`“receive a selection from a
`user whether to adjust traffic
`to conserve network or mobile
`device resources”
`
`ZTE
`Indefinite
`
`
`
`143. The term “receive a selection from a user whether to optimize traffic” appears in
`
`claims 33 and 42 of the ’127 Patent. For context, claims 33 and 42 recite “receive a selection
`
`from a user whether to optimize traffic of a first application executing in a background of the
`
`mobile device.” In my opinion, the plain and ordinary meaning of “receive a selection from a
`
`125 ’127 Patent at 11:11–18 (emphasis added).
`126 ’127 Patent at 11:1–7.
`127 ’127 Patent at 12:26–28.
`
`P. App. 215
`
`Page 8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket