throbber
Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 1 of 13 PageID #: 1757
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`


`§ Case No. 2:16-cv-00741-JRG

`
`LEAD CASE


`§ Case No. 2:16-cv-00858-JRG
`§ Case No. 2:16-cv-00859-JRG
`§ Case No. 2:16-cv-00860-JRG
`§ Case No. 2:16-cv-00863-JRG
`


`§ Case No. 2:16-cv-00393-RWS

`
`LEAD CASE


`§ Case No. 2:16-cv-00394-RWS
`§ Case No. 2:16-cv-00396-RWS
`§ Case No. 2:16-cv-00397-RWS
`§ Case No. 2:16-cv-00871-RWS
`§ Case No. 2:16-cv-00872-RWS
`
`UNILOC USA, INC., et al,
`
`Plaintiffs,
`
`
`v.
`
`
`
`ADP, LLC,
`BIG FISH GAMES, INC.,
`BLACKBOARD, INC.,
`BOX, INC.,
`ZENDESK, INC.,
`
`Defendants.
`
`
`UNILOC USA, INC., et al,
`
`Plaintiffs,
`
`
`v.
`
`
`
`AVG TECHNOLOGIES USA, INC.,
`BITDEFENDER LLC,
`PIRIFORM, INC.,
`UBISOFT, INC.,
`KASPERSKY LAB, INC.,
`SQUARE ENIX, INC.,
`
`Defendants.
`
`
`
`PLAINTIFFS’ OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`2701560.v1
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 2 of 13 PageID #: 1758
`
`Overview of the Patents
`
`Plaintiffs (“Uniloc”) have asserted claims from four IBM patents, all with effective filing
`
`dates of December 14, 1998.
`
`The ‘578 patent1 describes (what were in 1998) innovative methods of managing
`
`configurable application programs on a computer network for a large enterprise. The IBM
`
`inventors filed the ‘766 patent2 as a divisional of the ‘578, and thus it has the identical written
`
`description (“the ‘578 disclosure”).
`
`The ‘466 patent3 also describes methods of managing application programs, but the
`
`written description of that patent differs from the ‘578 disclosure. The IBM inventors filed the
`
`‘293 patent4 as a divisional of the ‘466, and thus it has a written description identical to that of
`
`the ‘466. (Pinpoint references in this brief to the ‘466/’293 written description (“the ‘466
`
`disclosure”) will be to the ‘466 patent. (Ex. C)).
`
`Both the ’578 and ‘466 disclosures describe a computer network, which connects each
`
`individual user’s computer terminal (“client terminal,” or simply “client”) to a remote server
`
`(“server”) responsible for supporting that client, as well as for supporting a number of other
`
`clients. The network, in turn, connects the remote servers to a central network management
`
`server. FIG. 1 of the ‘466 patent graphically illustrates this server/client arrangement:
`
`
`1 U.S. Patent No. 6,324,578 (Ex. A).
`2 U.S. Patent No. 6,728,766 (Ex. B).
`3 U.S. Patent No. 6,510,466 (Ex. C).
`4 U.S. Patent No. 7,069,293 (Ex. D).
`
`
`2
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 3 of 13 PageID #: 1759
`
`
`
`An application program (“application”) is software written to perform a particular
`
`function for a user (as opposed to system software, which is designed to operate the network.)
`
`Common examples of applications are word processing applications (e.g., Microsoft Word) and
`
`spreadsheets (e.g., Excel).
`
`In 1998, designers of computer networks for large enterprises were confronted with the
`
`problem of peripatetic users, i.e., users who login at different times from different clients. The
`
`IBM inventors, in these patents, describe innovative ways, circa 1998, they had reduced to
`
`practice to allow a peripatetic user to access the user’s authorized applications from any client on
`
`the network, while maintaining the user’s own selected preferences.
`
`3
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 4 of 13 PageID #: 1760
`
`Computer network designers in 1998 were also confronted by the problems of efficiently
`
`distributing applications throughout the enterprise, and of then frequently (and efficiently)
`
`updating those applications, while maintaining consistency among users, as to both application
`
`updates and administrator preferences. The IBM inventors devised, and reduced to practice,
`
`innovative ways to accomplish that.
`
`Finally, the IBM inventors devised methods to manage the allocation of licenses to
`
`applications in the enterprise environment, where the number of users accessing, or seeking to
`
`access, an application would exceed the number of existing licenses.
`
`Claim Construction Issues
`
`Exhibit A to the Joint Claim Construction Statement and Prehearing Memorandum
`
`(“JCCS”) listed 14 claim terms/phrases on which the parties had not reached agreement. Since
`
`filing that document, the parties have eliminated certain disputes, and narrowed others. Uniloc
`
`below lists, in what it sees as the order of priority, the remaining claim construction disputes.
`
`1. Whether the ‘578 and ‘293 patent claims require applications be executed at
`
`the client.
`
`In networks of the type the patents describe, a user can execute (i.e., run) an application
`
`in one of two ways: 1) the application could be downloaded to, and then executed on, the client
`
`terminal, or 2) the application could remain on the server and be executed by the user remotely.
`
`The parties agree the asserted claims of the ‘466 patent (and claims 3, 9, and 15 of the
`
`‘766 patent) are drawn to the first method. But the parties disagree as to the ‘578 and ‘293
`
`patents. Uniloc’s position is the claims of the ‘578 and ‘293 patents cover both methods; by
`
`contrast, defendants would limit the claims of those patents, as with the claims of the ‘466
`
`patent, to the first method.
`
`4
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 5 of 13 PageID #: 1761
`
`Uniloc’s position is easy to explain: All claims of the ‘466 patent (and claims 3, 9, and 15
`
`of the ‘766 patent) have language unambiguously requiring execution on the client. The
`
`independent claims of the ‘466 patent, claims 1, 15, and 16, recite providing an application “to
`
`the client for execution.” (The relevant claims of the ‘766 patent have identical language.) Thus,
`
`during the prosecution history of the ‘466 patent, the inventors acknowledged that, in the claims
`
`they were pursuing in the ‘466 patent, the applications “are executed at a client device rather
`
`than having the application program execute at the server.” (Ex. E at UNILOC_IBM_0630)
`
`But no similar language appears in the claims or prosecution of the ‘578 and ‘293 patents.
`
`For example, while claim 1 of the ‘578 patent reads “executing the application program,” it says
`
`nothing as to where the application, when executed, resides. The inventors appear to have drafted
`
`the claims of the ‘578 patent to cover either method.
`
`The claims of the ‘293 patent are directed to an exchange of applications from a central
`
`management server to the remote servers, not from the remote server to the client. Thus, those
`
`claims do not even mention executing the application program. During the prosecution history of
`
`the ‘293 patent, the inventors distinguished certain prior art by pointing out the claim (that would
`
`become claim 1 of the ‘293 patent) recited “an exchange, not involving a client, to enable
`
`availability of a program” at a target on-demand server. (Ex. F at UNILOC_IBM_0668)
`
`In the JCCS, defendants sought a construction of the ‘578 and ‘293 patent claims that
`
`would require execution at the client. Their mechanism for obtaining that construction was to ask
`
`that “application programs/applications” in all four of the patents, including the ‘578 and ‘293
`
`patents, be defined as program code that “executes locally at the client.” (To the same end, they
`
`also proposed adding “for download” to the availability the ‘293 patent claims would require.)
`
`5
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 6 of 13 PageID #: 1762
`
`
`
`
`
`But nothing in the ordinary and usual meaning of “application” would limit the term to
`
`software executed only at the client; applications are frequently executed at remote servers.
`
`In general, the Court must construe “application” to have its ordinary and usual meaning,
`
`as to those patents. Phillips v. AWH Corp., 415 F. 3d 1303, 1312 (Fed. Cir. 2005)(“[T]he words
`
`of a claim ‘are generally given their ordinary and customary meaning.’”). A Court may depart
`
`from the plain and ordinary meaning in only two instances. Hill-Rom Servs., Inc. v. Stryker
`
`Corp., 755 F. 3d 1367, 1371 (Fed. Cir. 2014). The first is when a patentee acts as his own
`
`lexicographer. Id. The second is when the patentee disavows the full scope of the claim term in
`
`the specification or during prosecution. Id.; Poly-America, L.P. v. API Industries, Inc., 839 F. 3d
`
`1131, 1136 (Fed. Cir. 2016). Because the ordinary and usual meaning does not support their
`
`position, to have any chance of success defendants must thus identify, in the intrinsic record of
`
`6
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 7 of 13 PageID #: 1763
`
`the ‘578 and ‘293 patents, a definition or disclaimer supporting a different construction of
`
`“application.” The intrinsic record of these patents, however, contains no such definition or
`
`disclaimer. Indeed, because the ‘578 patent issued on a first office action, nothing in its
`
`prosecution history would or could limit its claims. And, as discussed above, the only relevant
`
`statement in the ‘293 file history disclaimed involvement by the client.
`
`Nor does anything in the intrinsic record of the ‘466 or ‘766 patents modify the ordinary
`
`and usual meeting of “application.” Although, as discussed above, the claims of the ‘466 patent
`
`are limited to execution on the client, that limitation arises not from including “application” in
`
`the claims, but from including other, quite specific language.
`
`2. Whether claims 6 and 8 of the ‘578 patent are indefinite.
`
`In the JCCS, defendants proposed that claims 6 and 8 of the ‘578 patent be found
`
`indefinite.
`
`
`
`Although that document did not explain their position, their invalidity contentions (Ex. G
`
`at 44-45) argued a person of skill in the art (POSITA) cannot determine what “the initiating
`
`execution step” in those claims refers to.
`
`A POSITA, however, would have certainty as to the scope of claims 6 and 8. Claim 1 of
`
`the ‘578 patent, a method claim from which those claims depend, reads:
`
`1. A method for management of configurable application programs on a network
`comprising the steps of:
`
`installing an application program having a plurality of configurable preferences and a
`plurality of authorized users on a server coupled to the network;
`
`distributing an application launcher program associated with the application program
`to a client coupled to the network;
`
`7
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 8 of 13 PageID #: 1764
`
`obtaining a user set of the plurality of configurable preferences associated with one of
`the plurality of authorized users executing the application launcher program;
`
`obtaining an administrator set of the plurality of configurable preferences from an
`administrator; and
`
`executing the application program using the obtained user set and the obtained
`administrator set of the plurality of configurable preferences responsive to a request from
`the one of the plurality of authorized users.
`
`(Emphasis added.) The only step in claim 1 that mentions execution is the final step,
`
`immediately above, which covers executing the application, using certain obtained sets of
`
`preferences.
`
`Claim 6 reads:
`
`6. A method according to claim 1 wherein the step of executing is preceded by the step
`of storing the obtained user set and the obtained administrator set on a storage device
`coupled to the server and wherein the initiating execution step includes the step of
`retrieving the stored user set and the stored administrator set from the storage device.
`
`(Emphasis added). A POSITA would understand claim 6 plainly adds to claim 1: A) storing
`
`those obtained sets before executing the application, and B) retrieving the sets from storage as
`
`part of initiating the application.
`
`
`
`Claim 8 reads:
`
`8. A method according to claim 1 wherein the initiating execution step includes the step
`of obtaining default preference values for any of the plurality of configurable preferences
`which are not specified by the user set or the administrator set.
`
`(Emphasis added). A POSITA would understand claim 8 plainly adds to claim 1: obtaining
`
`default preference values as part of initiating the application.
`
`3.
`
`Whether claims 20, 22, 24, 35, 37, and 39 of the ‘578 patent are indefinite.
`
`Defendants contend these claims are indefinite, again arguing that a POSITA would not
`
`understand the meaning of a particular limitation in each of these claims, relating to execution.
`
`8
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 9 of 13 PageID #: 1765
`
`
`
`For purposes of illustration, we will discuss, as representative, the limitation “the
`
`computer readable program code means for executing the application program,” which appears
`
`in claim 35 of the ‘578 patent, which, in turn, depends from claim 32 of that patent.
`
`This phrase, and the other various phrases that defendants have listed, are means-plus-
`
`function limitations. Courts construe means-plus-function limitations to cover the corresponding
`
`structures disclosed in the specification that perform the claimed function. Northrop Grumman
`
`Corp. v. Intel Corp., 325 F. 3d 1346, 1349-50 (Fed. Cir. 2003)(“In construing a means-plus-
`
`function limitation, a court must identify both the claimed function and the corresponding
`
`structure in the written description for performing that function)(citing Micro. Chem., Inc. v.
`
`Great Plains Chem. Co., 194 F. 3d 1250, 1258 (Fed. Cir. 1999).
`
`In cases involving a computer-related invention, a POSITA would understand the
`
`structure corresponding to “computer readable program code means for executing the application
`
`program” would be the code (including its relevant algorithms) written to cause a processor to
`
`execute the application. Ergo Licensing, LLC v. CareFusion 303, Inc., 673 F. 3d 1361, 1365
`
`(Fed. Cir. 2010).
`
`In their invalidity contentions, defendants seem to be arguing that a POSITA cannot
`
`determine whether this limitation is the same as the “computer readable program code means for
`
`9
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 10 of 13 PageID #: 1766
`
`providing an instance of the application program … for use in executing the application
`
`program” (in claim 32).
`
`But a POSITA, who is assumed to know the law on means-plus-function claims, would
`
`be certain of what each claim covers. The structure corresponding to the above quoted phrase
`
`from claim 32 would be the code written to cause the processor to provide an instance of the
`
`application (i.e., a copy of an executable version of the program that has been written to the
`
`computer’s memory) for use in executing the application. By contrast, as explained above, the
`
`structure that dependent claim 35 adds to the structures of claim 32 is the code written to cause
`
`the processor to execute the application.
`
`Stated more succinctly, the relevant code of claim 32 provides an executable copy of the
`
`program for use in executing the application; the code of claim 35 actually executes the program.
`
`Although the above discusses only claims 32 and 35, the analysis is identical for the other
`
`pairs of claims defendants cite.
`
`4.
`
`The construction of “license availability.”
`
`All parties seem to agree that “license availability” refers to a “determination that a user
`
`can be issued a license to the selected application.”
`
`
`
`10
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 11 of 13 PageID #: 1767
`
`The issue remains in dispute, however, because two holdout defendants want to
`
`gratuitously add to that definition “distinct from any determination that the user is authorized to
`
`access the selected application program.”
`
`Uniloc opposes that condition. In general, Uniloc believes defining something by saying
`
`what it is not is poor practice. But here, it could also mislead the jury by wrongly implying a
`
`claim does not cover licensing availability software that includes, as a first step in allocating
`
`licenses, determining which users are authorized.
`
`5. What the jury should be told re “instance of an application program.”
`
`The parties seem to agree on what an “instance of a program” means, but disagree as to
`
`what the jury should be told.
`
`Uniloc feels lay jurors will not understand the term, and thus the more detailed the
`
`description, the better. Thus, Uniloc asks the Court to instruct:
`
`A program is a sequence of instructions that indicates which operations the computer
`should perform on a set of data. An instance of a program is a copy of a program that is
`understandable by a computer’s central processing unit and that is ready to run as soon it
`is copied from storage into memory.
`
`Defendants would go along with “an executable copy of an installed program.”
`
`Attached as Ex. H is a document from the Linux Information Project, which was
`
`circulated among the parties, and forms the basis of the more specific proposals above.
`
`
`
`
`
`
`
`
`
`11
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 12 of 13 PageID #: 1768
`
`Date: May 18, 2017
`
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`
`
`
`
`
`
`
`
`
`/s/ James J. Foster
`Paul J. Hayes
`Kevin Gannon
`James J. Foster
`Prince Lobel Tye LLP
`One International Place - Suite 3700
`Boston, MA 02110
`Tel: 617-456-8000
`Email: phayes@princelobel.com
`Email: kgannon@princelobel.com
`Email: jfoster@princelobel.com
`
`Edward R. Nelson III
`ed@nelbum.com
`Texas State Bar No. 00797142
`Anthony M. Vecchione
`anthony@nelbum.com
`Texas State Bar No. 24061270
`NELSON BUMGARDNER PC
`3131 West 7th Street, Suite 300
`Fort Worth, Texas 76107
`Phone: (817) 377-9111
`
`James L. Etheridge
`Texas State Bar No. 24059147
`Ryan S. Loveless
`Texas State Bar No. 24036997
`Brett A. Mangrum
`Texas State Bar No. 24065671
`Travis Lee Richins
`Texas State Bar No. 24061296
`ETHERIDGE LAW GROUP, PLLC
`2600 E. Southlake Blvd., Suite 120 / 324
`Southlake, Texas 76092
`Telephone: (817) 470-7249
`Facsimile: (817) 887-5950
`Jim@EtheridgeLaw.com
`Ryan@EtheridgeLaw.com
`Brett@EtheridgeLaw.com
`Travis@EtheridgeLaw.com
`
`ATTORNEYS FOR THE PLAINTIFFS
`
`
`
`
`
`
`12
`
`

`

`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 13 of 13 PageID #: 1769
`
`
`
`CERTIFICATE OF SERVICE
`
`I certify that all counsel of record who have consented to electronic service are being
`served with a copy of this document via the Court’s CM/ECF system per Local Rule CV-5(a)(3)
`on May 18, 2017.
`
`
`/s/ James J. Foster
`
`
`
`
`
`
`
`
`
`
`
`
`
`13
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket