`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`§
`§
`§ Case No. 2:16-cv-00741-JRG
`§
`
`LEAD CASE
`§
`§
`§ Case No. 2:16-cv-00858-JRG
`§ Case No. 2:16-cv-00859-JRG
`§ Case No. 2:16-cv-00860-JRG
`§ Case No. 2:16-cv-00863-JRG
`
`§
`§
`§ Case No. 2:16-cv-00393-RWS
`§
`
`LEAD CASE
`§
`§
`§ Case No. 2:16-cv-00394-RWS
`§ Case No. 2:16-cv-00396-RWS
`§ Case No. 2:16-cv-00397-RWS
`§ Case No. 2:16-cv-00871-RWS
`§ Case No. 2:16-cv-00872-RWS
`
`UNILOC USA, INC., et al,
`
`Plaintiffs,
`
`
`v.
`
`
`
`ADP, LLC,
`BIG FISH GAMES, INC.,
`BLACKBOARD, INC.,
`BOX, INC.,
`ZENDESK, INC.,
`
`Defendants.
`
`
`UNILOC USA, INC., et al,
`
`Plaintiffs,
`
`
`v.
`
`
`
`AVG TECHNOLOGIES USA, INC.,
`BITDEFENDER LLC,
`PIRIFORM, INC.,
`UBISOFT, INC.,
`KASPERSKY LAB, INC.,
`SQUARE ENIX, INC.,
`
`Defendants.
`
`
`
`PLAINTIFFS’ OPENING CLAIM CONSTRUCTION BRIEF
`
`
`
`
`
`
`
`2701560.v1
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 2 of 13 PageID #: 1758
`
`Overview of the Patents
`
`Plaintiffs (“Uniloc”) have asserted claims from four IBM patents, all with effective filing
`
`dates of December 14, 1998.
`
`The ‘578 patent1 describes (what were in 1998) innovative methods of managing
`
`configurable application programs on a computer network for a large enterprise. The IBM
`
`inventors filed the ‘766 patent2 as a divisional of the ‘578, and thus it has the identical written
`
`description (“the ‘578 disclosure”).
`
`The ‘466 patent3 also describes methods of managing application programs, but the
`
`written description of that patent differs from the ‘578 disclosure. The IBM inventors filed the
`
`‘293 patent4 as a divisional of the ‘466, and thus it has a written description identical to that of
`
`the ‘466. (Pinpoint references in this brief to the ‘466/’293 written description (“the ‘466
`
`disclosure”) will be to the ‘466 patent. (Ex. C)).
`
`Both the ’578 and ‘466 disclosures describe a computer network, which connects each
`
`individual user’s computer terminal (“client terminal,” or simply “client”) to a remote server
`
`(“server”) responsible for supporting that client, as well as for supporting a number of other
`
`clients. The network, in turn, connects the remote servers to a central network management
`
`server. FIG. 1 of the ‘466 patent graphically illustrates this server/client arrangement:
`
`
`1 U.S. Patent No. 6,324,578 (Ex. A).
`2 U.S. Patent No. 6,728,766 (Ex. B).
`3 U.S. Patent No. 6,510,466 (Ex. C).
`4 U.S. Patent No. 7,069,293 (Ex. D).
`
`
`2
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 3 of 13 PageID #: 1759
`
`
`
`An application program (“application”) is software written to perform a particular
`
`function for a user (as opposed to system software, which is designed to operate the network.)
`
`Common examples of applications are word processing applications (e.g., Microsoft Word) and
`
`spreadsheets (e.g., Excel).
`
`In 1998, designers of computer networks for large enterprises were confronted with the
`
`problem of peripatetic users, i.e., users who login at different times from different clients. The
`
`IBM inventors, in these patents, describe innovative ways, circa 1998, they had reduced to
`
`practice to allow a peripatetic user to access the user’s authorized applications from any client on
`
`the network, while maintaining the user’s own selected preferences.
`
`3
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 4 of 13 PageID #: 1760
`
`Computer network designers in 1998 were also confronted by the problems of efficiently
`
`distributing applications throughout the enterprise, and of then frequently (and efficiently)
`
`updating those applications, while maintaining consistency among users, as to both application
`
`updates and administrator preferences. The IBM inventors devised, and reduced to practice,
`
`innovative ways to accomplish that.
`
`Finally, the IBM inventors devised methods to manage the allocation of licenses to
`
`applications in the enterprise environment, where the number of users accessing, or seeking to
`
`access, an application would exceed the number of existing licenses.
`
`Claim Construction Issues
`
`Exhibit A to the Joint Claim Construction Statement and Prehearing Memorandum
`
`(“JCCS”) listed 14 claim terms/phrases on which the parties had not reached agreement. Since
`
`filing that document, the parties have eliminated certain disputes, and narrowed others. Uniloc
`
`below lists, in what it sees as the order of priority, the remaining claim construction disputes.
`
`1. Whether the ‘578 and ‘293 patent claims require applications be executed at
`
`the client.
`
`In networks of the type the patents describe, a user can execute (i.e., run) an application
`
`in one of two ways: 1) the application could be downloaded to, and then executed on, the client
`
`terminal, or 2) the application could remain on the server and be executed by the user remotely.
`
`The parties agree the asserted claims of the ‘466 patent (and claims 3, 9, and 15 of the
`
`‘766 patent) are drawn to the first method. But the parties disagree as to the ‘578 and ‘293
`
`patents. Uniloc’s position is the claims of the ‘578 and ‘293 patents cover both methods; by
`
`contrast, defendants would limit the claims of those patents, as with the claims of the ‘466
`
`patent, to the first method.
`
`4
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 5 of 13 PageID #: 1761
`
`Uniloc’s position is easy to explain: All claims of the ‘466 patent (and claims 3, 9, and 15
`
`of the ‘766 patent) have language unambiguously requiring execution on the client. The
`
`independent claims of the ‘466 patent, claims 1, 15, and 16, recite providing an application “to
`
`the client for execution.” (The relevant claims of the ‘766 patent have identical language.) Thus,
`
`during the prosecution history of the ‘466 patent, the inventors acknowledged that, in the claims
`
`they were pursuing in the ‘466 patent, the applications “are executed at a client device rather
`
`than having the application program execute at the server.” (Ex. E at UNILOC_IBM_0630)
`
`But no similar language appears in the claims or prosecution of the ‘578 and ‘293 patents.
`
`For example, while claim 1 of the ‘578 patent reads “executing the application program,” it says
`
`nothing as to where the application, when executed, resides. The inventors appear to have drafted
`
`the claims of the ‘578 patent to cover either method.
`
`The claims of the ‘293 patent are directed to an exchange of applications from a central
`
`management server to the remote servers, not from the remote server to the client. Thus, those
`
`claims do not even mention executing the application program. During the prosecution history of
`
`the ‘293 patent, the inventors distinguished certain prior art by pointing out the claim (that would
`
`become claim 1 of the ‘293 patent) recited “an exchange, not involving a client, to enable
`
`availability of a program” at a target on-demand server. (Ex. F at UNILOC_IBM_0668)
`
`In the JCCS, defendants sought a construction of the ‘578 and ‘293 patent claims that
`
`would require execution at the client. Their mechanism for obtaining that construction was to ask
`
`that “application programs/applications” in all four of the patents, including the ‘578 and ‘293
`
`patents, be defined as program code that “executes locally at the client.” (To the same end, they
`
`also proposed adding “for download” to the availability the ‘293 patent claims would require.)
`
`5
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 6 of 13 PageID #: 1762
`
`
`
`
`
`But nothing in the ordinary and usual meaning of “application” would limit the term to
`
`software executed only at the client; applications are frequently executed at remote servers.
`
`In general, the Court must construe “application” to have its ordinary and usual meaning,
`
`as to those patents. Phillips v. AWH Corp., 415 F. 3d 1303, 1312 (Fed. Cir. 2005)(“[T]he words
`
`of a claim ‘are generally given their ordinary and customary meaning.’”). A Court may depart
`
`from the plain and ordinary meaning in only two instances. Hill-Rom Servs., Inc. v. Stryker
`
`Corp., 755 F. 3d 1367, 1371 (Fed. Cir. 2014). The first is when a patentee acts as his own
`
`lexicographer. Id. The second is when the patentee disavows the full scope of the claim term in
`
`the specification or during prosecution. Id.; Poly-America, L.P. v. API Industries, Inc., 839 F. 3d
`
`1131, 1136 (Fed. Cir. 2016). Because the ordinary and usual meaning does not support their
`
`position, to have any chance of success defendants must thus identify, in the intrinsic record of
`
`6
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 7 of 13 PageID #: 1763
`
`the ‘578 and ‘293 patents, a definition or disclaimer supporting a different construction of
`
`“application.” The intrinsic record of these patents, however, contains no such definition or
`
`disclaimer. Indeed, because the ‘578 patent issued on a first office action, nothing in its
`
`prosecution history would or could limit its claims. And, as discussed above, the only relevant
`
`statement in the ‘293 file history disclaimed involvement by the client.
`
`Nor does anything in the intrinsic record of the ‘466 or ‘766 patents modify the ordinary
`
`and usual meeting of “application.” Although, as discussed above, the claims of the ‘466 patent
`
`are limited to execution on the client, that limitation arises not from including “application” in
`
`the claims, but from including other, quite specific language.
`
`2. Whether claims 6 and 8 of the ‘578 patent are indefinite.
`
`In the JCCS, defendants proposed that claims 6 and 8 of the ‘578 patent be found
`
`indefinite.
`
`
`
`Although that document did not explain their position, their invalidity contentions (Ex. G
`
`at 44-45) argued a person of skill in the art (POSITA) cannot determine what “the initiating
`
`execution step” in those claims refers to.
`
`A POSITA, however, would have certainty as to the scope of claims 6 and 8. Claim 1 of
`
`the ‘578 patent, a method claim from which those claims depend, reads:
`
`1. A method for management of configurable application programs on a network
`comprising the steps of:
`
`installing an application program having a plurality of configurable preferences and a
`plurality of authorized users on a server coupled to the network;
`
`distributing an application launcher program associated with the application program
`to a client coupled to the network;
`
`7
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 8 of 13 PageID #: 1764
`
`obtaining a user set of the plurality of configurable preferences associated with one of
`the plurality of authorized users executing the application launcher program;
`
`obtaining an administrator set of the plurality of configurable preferences from an
`administrator; and
`
`executing the application program using the obtained user set and the obtained
`administrator set of the plurality of configurable preferences responsive to a request from
`the one of the plurality of authorized users.
`
`(Emphasis added.) The only step in claim 1 that mentions execution is the final step,
`
`immediately above, which covers executing the application, using certain obtained sets of
`
`preferences.
`
`Claim 6 reads:
`
`6. A method according to claim 1 wherein the step of executing is preceded by the step
`of storing the obtained user set and the obtained administrator set on a storage device
`coupled to the server and wherein the initiating execution step includes the step of
`retrieving the stored user set and the stored administrator set from the storage device.
`
`(Emphasis added). A POSITA would understand claim 6 plainly adds to claim 1: A) storing
`
`those obtained sets before executing the application, and B) retrieving the sets from storage as
`
`part of initiating the application.
`
`
`
`Claim 8 reads:
`
`8. A method according to claim 1 wherein the initiating execution step includes the step
`of obtaining default preference values for any of the plurality of configurable preferences
`which are not specified by the user set or the administrator set.
`
`(Emphasis added). A POSITA would understand claim 8 plainly adds to claim 1: obtaining
`
`default preference values as part of initiating the application.
`
`3.
`
`Whether claims 20, 22, 24, 35, 37, and 39 of the ‘578 patent are indefinite.
`
`Defendants contend these claims are indefinite, again arguing that a POSITA would not
`
`understand the meaning of a particular limitation in each of these claims, relating to execution.
`
`8
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 9 of 13 PageID #: 1765
`
`
`
`For purposes of illustration, we will discuss, as representative, the limitation “the
`
`computer readable program code means for executing the application program,” which appears
`
`in claim 35 of the ‘578 patent, which, in turn, depends from claim 32 of that patent.
`
`This phrase, and the other various phrases that defendants have listed, are means-plus-
`
`function limitations. Courts construe means-plus-function limitations to cover the corresponding
`
`structures disclosed in the specification that perform the claimed function. Northrop Grumman
`
`Corp. v. Intel Corp., 325 F. 3d 1346, 1349-50 (Fed. Cir. 2003)(“In construing a means-plus-
`
`function limitation, a court must identify both the claimed function and the corresponding
`
`structure in the written description for performing that function)(citing Micro. Chem., Inc. v.
`
`Great Plains Chem. Co., 194 F. 3d 1250, 1258 (Fed. Cir. 1999).
`
`In cases involving a computer-related invention, a POSITA would understand the
`
`structure corresponding to “computer readable program code means for executing the application
`
`program” would be the code (including its relevant algorithms) written to cause a processor to
`
`execute the application. Ergo Licensing, LLC v. CareFusion 303, Inc., 673 F. 3d 1361, 1365
`
`(Fed. Cir. 2010).
`
`In their invalidity contentions, defendants seem to be arguing that a POSITA cannot
`
`determine whether this limitation is the same as the “computer readable program code means for
`
`9
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 10 of 13 PageID #: 1766
`
`providing an instance of the application program … for use in executing the application
`
`program” (in claim 32).
`
`But a POSITA, who is assumed to know the law on means-plus-function claims, would
`
`be certain of what each claim covers. The structure corresponding to the above quoted phrase
`
`from claim 32 would be the code written to cause the processor to provide an instance of the
`
`application (i.e., a copy of an executable version of the program that has been written to the
`
`computer’s memory) for use in executing the application. By contrast, as explained above, the
`
`structure that dependent claim 35 adds to the structures of claim 32 is the code written to cause
`
`the processor to execute the application.
`
`Stated more succinctly, the relevant code of claim 32 provides an executable copy of the
`
`program for use in executing the application; the code of claim 35 actually executes the program.
`
`Although the above discusses only claims 32 and 35, the analysis is identical for the other
`
`pairs of claims defendants cite.
`
`4.
`
`The construction of “license availability.”
`
`All parties seem to agree that “license availability” refers to a “determination that a user
`
`can be issued a license to the selected application.”
`
`
`
`10
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 11 of 13 PageID #: 1767
`
`The issue remains in dispute, however, because two holdout defendants want to
`
`gratuitously add to that definition “distinct from any determination that the user is authorized to
`
`access the selected application program.”
`
`Uniloc opposes that condition. In general, Uniloc believes defining something by saying
`
`what it is not is poor practice. But here, it could also mislead the jury by wrongly implying a
`
`claim does not cover licensing availability software that includes, as a first step in allocating
`
`licenses, determining which users are authorized.
`
`5. What the jury should be told re “instance of an application program.”
`
`The parties seem to agree on what an “instance of a program” means, but disagree as to
`
`what the jury should be told.
`
`Uniloc feels lay jurors will not understand the term, and thus the more detailed the
`
`description, the better. Thus, Uniloc asks the Court to instruct:
`
`A program is a sequence of instructions that indicates which operations the computer
`should perform on a set of data. An instance of a program is a copy of a program that is
`understandable by a computer’s central processing unit and that is ready to run as soon it
`is copied from storage into memory.
`
`Defendants would go along with “an executable copy of an installed program.”
`
`Attached as Ex. H is a document from the Linux Information Project, which was
`
`circulated among the parties, and forms the basis of the more specific proposals above.
`
`
`
`
`
`
`
`
`
`11
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 12 of 13 PageID #: 1768
`
`Date: May 18, 2017
`
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`
`
`
`
`
`
`
`
`
`/s/ James J. Foster
`Paul J. Hayes
`Kevin Gannon
`James J. Foster
`Prince Lobel Tye LLP
`One International Place - Suite 3700
`Boston, MA 02110
`Tel: 617-456-8000
`Email: phayes@princelobel.com
`Email: kgannon@princelobel.com
`Email: jfoster@princelobel.com
`
`Edward R. Nelson III
`ed@nelbum.com
`Texas State Bar No. 00797142
`Anthony M. Vecchione
`anthony@nelbum.com
`Texas State Bar No. 24061270
`NELSON BUMGARDNER PC
`3131 West 7th Street, Suite 300
`Fort Worth, Texas 76107
`Phone: (817) 377-9111
`
`James L. Etheridge
`Texas State Bar No. 24059147
`Ryan S. Loveless
`Texas State Bar No. 24036997
`Brett A. Mangrum
`Texas State Bar No. 24065671
`Travis Lee Richins
`Texas State Bar No. 24061296
`ETHERIDGE LAW GROUP, PLLC
`2600 E. Southlake Blvd., Suite 120 / 324
`Southlake, Texas 76092
`Telephone: (817) 470-7249
`Facsimile: (817) 887-5950
`Jim@EtheridgeLaw.com
`Ryan@EtheridgeLaw.com
`Brett@EtheridgeLaw.com
`Travis@EtheridgeLaw.com
`
`ATTORNEYS FOR THE PLAINTIFFS
`
`
`
`
`
`
`12
`
`
`
`Case 2:16-cv-00741-RWS Document 151 Filed 05/18/17 Page 13 of 13 PageID #: 1769
`
`
`
`CERTIFICATE OF SERVICE
`
`I certify that all counsel of record who have consented to electronic service are being
`served with a copy of this document via the Court’s CM/ECF system per Local Rule CV-5(a)(3)
`on May 18, 2017.
`
`
`/s/ James J. Foster
`
`
`
`
`
`
`
`
`
`
`
`
`
`13
`
`