throbber
Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 1 of 37 PageID #: 5127
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`MARSHALL DIVISION
`
`UNILOC 2017 LLC,
`
` Plaintiff,
`
`v.
`
`SAMSUNG ELECTRONICS AMERICA, INC.
`and SAMSUNG ELECTRONICS CO. LTD.
`
` Defendants.
`
`
`
`
`
`
`
`Civil Action No. 2:18-cv-508-JRG
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`SAMSUNG’S MOTION FOR SUMMARY JUDGMENT OF NON-INFRINGEMENT
`
`ACTIVE 49523074v8
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 2 of 37 PageID #: 5128
`
`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`INTRODUCTION ............................................................................................................... 1
`
`ISSUES PRESENTED ......................................................................................................... 1
`
`III.
`
`STATEMENT OF UNDISPUTED MATERIAL FACTS .................................................... 2
`
`A.
`
`B.
`
`C.
`
`D.
`
`E.
`
`The ’654 Patent .........................................................................................................2
`
`The Accused Products..............................................................................................4
`
`Uniloc’s Original Infringement Theory .....................................................................6
`
`The Court’s Markman Order Undermined Uniloc’s Infringement Theory ..................7
`
`Dr. Easttom’s Expert Report and Uniloc’s New Infringement Theory ...................8
`
`IV.
`
`LEGAL STANDARDS ....................................................................................................... 9
`
`A.
`
`B.
`
`C.
`
`Summary Judgment ..................................................................................................9
`
`Direct Infringement .................................................................................................10
`
`Indirect Infringement .............................................................................................11
`
`V.
`
`ARGUMENT .................................................................................................................... 12
`
`A.
`
`The Accused Products Do Not Have a “Linked User Identification
`Module” as Required By All Asserted Claims ......................................................12
`
`B.
`
`C.
`
`D.
`
`E.
`
`1.
`
`2.
`
`The Accused Products Do Not Have a “Linked User Identification
`Module” Under the Court’s Claim Construction .......................................13
`
`The Accused Products Do Not Have a “Linked User Identification
`Module” Even Under Uniloc’s New Claim Construction of
`“Normal Operation” ...................................................................................14
`
`The Accused Products’ Lock Screen Does Not Prevent “Normal
`Operation,” as Required By All of the Asserted Claims .......................................16
`
`The Accused Products Do Not Have a “Timing Means” as Required By
`Claims 1, 3, 5, and 7 ................................................................................................18
`
`Uniloc Has Failed to Present Any Evidence of Infringement for the Majority
`of the Accused Products ..........................................................................................20
`
`Uniloc Has Failed to Show Any Evidence of Direct Infringement by
`Samsung .................................................................................................................21
`
`1.
`
`2.
`
`3.
`
`Samsung Cannot Directly Infringe Apparatus Claims 1, 3, 5, 7, 17,
`and 18 .........................................................................................................21
`
`Samsung Cannot Infringe the Method Claims ...........................................23
`
`There is Insufficient Evidence to Raise a Triable Issue of Fact That
`Samsung Has “Used” the Accused Products in the United States .............25
`
`F.
`
`Uniloc Has Failed to Demonstrate Indirect Infringement by Samsung .....................27
`
`ACTIVE 49523074v8
`
`i
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 3 of 37 PageID #: 5129
`
`
`
`1.
`
`2.
`
`3.
`
`4.
`
`Summary Judgment of No Indirect Infringement Should be
`Entered Because Uniloc Cannot Demonstrate Direct Infringement ..........27
`
`Uniloc Has Not Adduced Any Evidence of Knowledge by
`Samsung of Infringement by Third Parties ................................................28
`
`Uniloc Has Adduced No Evidence of Acts By Samsung Intended
`to Induce Infringement ...............................................................................29
`
`Summary Judgment of No Contributory Infringement Should Be
`Entered Because Uniloc Has Not Adduced Any Evidence of No
`Substantial Non-Infringing Use of the Accused Products .........................30
`
`VI.
`
`CONCLUSION ................................................................................................................. 30
`
`
`
`
`
`
`ACTIVE 49523074v8
`
`ii
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 4 of 37 PageID #: 5130
`
`
`
`Cases
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`ACCO Brands, Inc. v. ABA Locks Mfr. Co.,
`501 F.3d 1307 (Fed. Cir. 2007)..........................................................................................11, 26
`
`C.R. Bard, Inc. v. Advanced Cardiovascular Sys., Inc.,
`911 F.2d 670 (Fed. Cir. 1990)....................................................................................................9
`
`Celotex Corp. v. Catrett,
`477 U.S. 317 (1986) .............................................................................................................9, 10
`
`Centillion Data Sys., LLC v. Qwest Communs. Int’l,
`631 F.3d 1279 (Fed. Cir. 2011)..........................................................................................22, 23
`
`Commil USA, LLC v. Cisco Sys., Inc.,
`135 S. Ct. 1920 (2015) .................................................................................................11, 12, 28
`
`Cordis Corp. v. Boston Sci. Corp.,
`561 F.3d 1319 (Fed. Cir. 2009)................................................................................................15
`
`Dodots Licensing Solutions LLC v. Lenovo Holding Co.,
`2018 U.S. Dist. LEXIS 213202 (D. Del. Dec. 19, 2018) .........................................................24
`
`DSU Med. Corp. v. JMS Co.,
`471 F.3d 1293 (Fed. Cir. 2006)................................................................................................28
`
`Ecolab, Inc. v. FMC Corp.,
`569 F.3d 1335 (Fed. Cir. 2009)................................................................................................28
`
`Eli Lilly & Co. v. Barr Labs., Inc.,
`251 F.3d 955 (Fed. Cir. 2001)..................................................................................................10
`
`EMG Tech., LLC v. Vanguard Grp., Inc.,
`2014 U.S. Dist. LEXIS 191718 (E.D. Tex. June 24, 2014) .....................................................10
`
`Finjan, Inc. v. Secure Computing Corp.,
`626 F.3d 1197 (Fed. Cir. 2010)..........................................................................................10, 23
`
`Fujitsu Ltd. v. Netgear Inc.,
`620 F.3d 1321 (Fed. Cir. 2010)..........................................................................................12, 30
`
`Johnston v. IVAC Corp.,
`885 F.2d 1574 (Fed. Cir. 1989)................................................................................................10
`
`Joy Techs., Inc. v. Flakt, Inc.,
`6 F.3d 770 (Fed. Cir. 1993)..............................................................................10, 11, 23, 24, 27
`
`ACTIVE 49523074v8
`
`iii
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 5 of 37 PageID #: 5131
`
`
`Koninklijke Philips N.V. v. Zoll Med. Corp.,
`656 F. App’x. 504 (Fed. Cir. 2016) .........................................................................................28
`
`Meyer Intellectual Props. Ltd. v. Bodum, Inc.,
`690 F.3d 1354 (Fed. Cir. 2012)....................................................................................10, 23, 26
`
`Mirror Worlds, LLC v. Apple, Inc.,
`784 F. Supp. 2d 703 (E.D. Tex. 2011) .........................................................................11, 26, 27
`
`Ormco Corp. v. Align Tech., Inc.,
`463 F.3d 1299 (Fed. Cir. 2006)..........................................................................................11, 24
`
`Power Integrations, Inc. v. Fairchild Semiconductor Int’l, Inc.,
`843 F.3d 1315 (Fed. Cir. 2016)................................................................................................11
`
`Ricoh Co. v. Quanta Computer Inc.,
`550 F.3d 1325 (Fed. Cir. 2008)..........................................................................................11, 24
`
`Toshiba Corp. v. Imation Corp.,
`681 F.3d 1358 (Fed. Cir. 2012)................................................................................................30
`
`TQP Dev., LLC v. Intuit Inc.,
`2014 WL 2810016 (E.D. Tex. June 20, 2014) .........................................................................10
`
`Warner-Jenkinson Co. v. Hilton Davis Chem. Co.,
`520 U.S. 17 (1997) ...................................................................................................................10
`
`
`
`ACTIVE 49523074v8
`
`iv
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 6 of 37 PageID #: 5132
`
`
`I.
`
`INTRODUCTION
`
`Pursuant to Fed. R. Civ. P. 56, Defendants Samsung Electronics America, Inc. (“SEA”) and
`
`Samsung Electronics Co., Ltd. (“SEC”) (collectively, “Samsung”) respectfully move for summary
`
`judgment of non-infringement of U.S. Patent No. 6,836,654 (the “’654 patent”) (Ex. 1).1 Following
`
`the Court’s Markman Order, the infringement theory on which Plaintiff Uniloc 2017 LLC (“Uniloc”)
`
`has relied since the outset of the case became, in Uniloc’s own words, “untenable.” Thus, Uniloc has
`
`made a last-ditch effort to save its case by concocting an entirely new infringement theory based on a
`
`new claim construction for a term that was never proposed for construction by the parties or in fact
`
`construed by the Court in this case. Indeed, its new infringement theory is based on a construction that
`
`differs from a construction for the same term to which Uniloc agreed in another case asserting the ’654
`
`patent before this Court. Regardless, as demonstrated below, even Uniloc’s new theory has no merit.
`
`Accordingly, summary judgment of non-infringement should be entered.
`
`II.
`
`ISSUES PRESENTED
`
`1.
`
`2.
`
`Whether the accused Samsung smartphones utilize a “linked user identification
`module” when they can make outgoing calls with numerous SIM cards.
`
`Whether the accused “lock screen” functionality prevents normal operation when
`outgoing calls can be made without first entering a deblocking code.
`
`3. Whether the accused Samsung smartphones have a “timing means” even though the
`inactivity timer functions independent of a SIM card.
`
`4
`
`5.
`
`Whether Uniloc has sufficient evidence to raise a triable issue of material fact that
`all of the accused Samsung smartphones have been made, used, sold, offered for
`sale, or imported, in the United States by Samsung.
`
`Whether Samsung or the accused Samsung smartphones directly infringe the asserted
`apparatus and method claims.
`
`6. Whether there is sufficient evidence to raise a triable issue of material fact that
`Samsung induces end users to infringe the Asserted Claims, or contributes to the
`
`
`1 Unless otherwise indicated, all Exhibits are attached to the Declaration of Allan A. Kassenoff in
`Support of Samsung’s Motion for Summary Judgment of Non-Infringement.
`
`ACTIVE 49523074v8
`
`1
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 7 of 37 PageID #: 5133
`
`
`
`infringement of the Asserted Claims.
`
`III.
`
`STATEMENT OF UNDISPUTED MATERIAL FACTS
`
`A.
`
`The ’654 Patent
`
`According to the ’654 patent, because mobile devices “are intended to accompany their users
`
`when they move around,” they are frequently “lost or stolen.” (’654 patent at 1:16-18). One alleged
`
`solution to this problem described in the patent is disclosed in U.S. Patent No. 5,913,175 (the “’175
`
`patent”). The ’175 patent purports to prevent a lost or stolen telephone from being used by a third party
`
`by “establishing a link between the device and a specific user identification module [e.g., a SIM card]
`
`and blocking the normal operation of the device [i.e., making outgoing calls] when the user
`
`identification module that is placed inside the device is not the one that is linked to the device.” (’654
`
`patent at 1:24-29).2 In other words, if a phone is lost or stolen and the original (linked) SIM card is
`
`replaced with another SIM card, then the phone will not be able to make outgoing calls. However,
`
`even with that solution, a drawback still existed since, if the phone was lost or stolen along with its
`
`original SIM card, for at least some period of time, a third party could make outgoing calls using the
`
`phone which, at the time of the alleged invention in 1999, was quite expensive. (See id. at 1:30-37
`
`(“When the device is lost or stolen with the identification module to which it is linked . . . the device
`
`can be freely used until the identification module to which it is linked is blocked via the network”
`
`which “may take a certain period of time.”)). According to the ’654 patent, preventing such
`
`unauthorized usage between the time the phone was lost and the time the owner blocked the phone via
`
`the network was an “object of the invention.” (Id. at 1:40-41).
`
`The ’654 patent purports to achieve this object of preventing unauthorized usage as follows:
`
`First, “a device [i.e., a phone] in accordance with the invention (1) verifies a user identification module
`
`
`2 All emphasis is added unless otherwise noted.
`
`ACTIVE 49523074v8
`
`2
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 8 of 37 PageID #: 5134
`
`
`[e.g., a SIM card] mounted inside the mobile radiotelephony device is linked to the mobile
`
`radiotelephony device,” much like the prior art. (Id. at 1:39-43). Then, the device “(2) detects a period
`
`of inactivity of the mobile radiotelephony device during a normal operation of the mobile
`
`radiotelephony device, wherein the normal operation includes a processing of all outgoing calls, and
`
`(3) prevents the normal operation of the mobile radiotelephony device in response to the verification
`
`of the user identification module and in response to the detection of the period of inactivity of the
`
`mobile radiotelephony device.” (Id. at 1:43-51). Once normal operation is prevented, a “deblocking
`
`code” must “be supplied to return to the normal operation mode.” (Id. at 2:11-12). Thus, as explained
`
`in the ’654 patent, the alleged invention prevents a third party from using a lost or stolen phone to make
`
`expensive outgoing calls, other than during that small window of time before the phone is
`
`automatically locked due to the period of inactivity:
`
`[W]hen the device falls into the hands of a third party together with the identification
`module to which it is linked, it has most probably been inactive for a period of time
`that is sufficiently long for its normal operation to be blocked (advantageously, the
`inactive time after which the blocking means are activated is of the order of several
`minutes). The device cannot thus be used without the deblocking code being supplied.
`
`Thanks to the invention the lost or stolen device becomes totally unusable. A fraudulent
`person cannot send communications at the cost of the owner of the device. But neither
`can he use the device with another identification module.
`
`(Id. at 1:52-63).
`
`Independent claims 1 and 10 of the ’654 patent are similar in scope (albeit one is directed to
`
`the device and the other to a method) and are reproduced below:
`
`Claim 1
`
`Claim 103
`
`A mobile radiotelephony device, comprising:
`blocking means for preventing a normal operation
`of the mobile radiotelephony device, wherein the
`normal operation
`includes a processing of
`outgoing calls;
`
`a mobile
`A method of protecting
`radiotelephony
`device,
`the method
`comprising:
`verifying [sic] a user identification module
`mounted inside the mobile radiotelephony
`
`
`3 Independent claim 17 is similar to claim 10, but is written as a “computer readable medium” claim.
`
`ACTIVE 49523074v8
`
`3
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 9 of 37 PageID #: 5135
`
`
`
`
`
`timing means for activating the blocking means in
`response to the mobile radiotelephony device
`being inactive during the normal operation of the
`mobile radiotelephony device for a defined period
`of time subsequent to a mounting of a linked user
`identification module
`inside
`the mobile
`radiotelephony device; and
`the normal
`deblocking means for permitting
`operation of the mobile radiotelephony device in
`response to a supply of a deblocking code to the
`mobile radiotelephony device subsequent to the
`mounting of the linked user identification module
`inside the mobile radiotelephony device and
`subsequent to the defined period of time.
`
`B.
`
`The Accused Products
`
`to
`
`the mobile
`
`linked
`is
`device
`radiotelephony device;
`detecting a period of inactivity of the mobile
`radiotelephony device during a normal
`operation of the mobile radiotelephony
`device, wherein the normal operation
`includes a processing of all outgoing calls;
`preventing the normal operation of the
`mobile radiotelephony device in response
`to the verification of the linked user
`identification module and in response to
`the detection of the period of inactivity of
`the mobile radiotelephony device.
`
`In Plaintiff’s Disclosure of Asserted Claims and Infringement Contentions, Uniloc has accused
`
`over 100 models of Samsung smartphones (the “Accused Products”) of infringing the ’654 patent by
`
`use of a “lock screen” that can be activated after a period of inactivity. (See Ex. 2 (“Infringement
`
`Contentions”) at 1–2). The Accused Products are sold by Samsung as: (1) “unlocked” phones, which
`
`can make calls using any SIM card from any network carrier or (2) “network locked” phones, which
`
`can make calls using any SIM card from a particular network carrier (e.g., a Verizon locked phone
`
`can make calls using any Verizon SIM card). (Expert Report on Non-Infringement by Nenad
`
`Medvidovic, Ph.D., Ex. 3 (“Medvidovic Rpt.”) ¶¶60-61, 104-106, 176-177). Thus, all of the Accused
`
`Products can make outgoing calls with more than one SIM card. (Id.) Users may utilize different SIM
`
`cards in a single device for several reasons. For example, a user may use one SIM card for network
`
`access while in the United States and a different one while travelling overseas. Another user may use
`
`one SIM card for business and a different one for personal use. And yet another user may use two SIM
`
`cards to switch phone numbers or networks. (Id. ¶¶106, 183). Importantly, Samsung’s “unlocked”
`
`phones are sold without a SIM card installed and a user must obtain, install, and use one or more SIM
`
`cards for their preferred network(s). (Id. ¶60).
`
`ACTIVE 49523074v8
`
`4
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 10 of 37 PageID #: 5136
`
`
`
`The Accused Products cannot make outgoing calls over a carrier network unless and until a
`
`user (or carrier or retail representative setting up a phone on a user’s behalf, e.g., an employee in a
`
`Verizon store) activates a SIM card through the Setup Wizard activation process. (Id. ¶¶59, 178).
`
`During that setup process, the carrier network, e.g., Verizon, performs a SIM provisioning check to
`
`confirm the SIM card’s status and verify that it can connect with a network. (Id.)
`
`While SIM cards are required to make or receive calls over a carrier’s network, SIM cards are
`
`not required for other uses of the Accused Products. (Id. ¶¶125-128). For example, SIM cards are not
`
`required to utilize the phone’s camera, Wi-Fi, or various applications on the phone. (Id.) The Accused
`
`Products can even make outgoing voice calls or send messages, without a SIM card, by using voice-
`
`over-IP (VoIP) applications, such as Skype, Google Voice, or WhatsApp. (Id.)
`
`When Samsung sells the Accused Products, the phones do not have an activated secure lock
`
`screen. (Id. ¶¶56, 76-77, 143, 201-202). Rather, as part of the phone’s setup process, a user has the
`
`option to set up a lock screen (or not to). Specifically, a user could opt to utilize no lock screen, “Swipe”
`
`(which is an unsecured lock screen that is disengaged by dragging your finger across the screen),
`
`“Pattern” (which requires dragging your finger across a series of dots in a particular order), a PIN code,
`
`a password, or a biometric, such as a fingerprint, iris scan, and facial recognition. (Id.) The default
`
`setting of the Accused Products is to have an unsecured lock screen. (Id.)
`
`If a user sets up a secure lock screen, the user can unlock the device and make outgoing calls
`
`by entering the selected pattern, PIN, password, or biometric. (Id. ¶¶56-57, 76-77). Alternatively, some
`
`Accused Products can make outgoing calls using a voice-activated assistant called Bixby – without
`
`having to first enter the selected pattern, PIN, password, or biometric. (Id. ¶¶89-93). Bixby is engaged
`
`by saying “Hi, Bixby,” after which a user can say “Call [contact]” to make an outgoing call. (Id.)
`
`Outgoing calls can also be made without first entering a PIN/password/pattern/biometric through use
`
`ACTIVE 49523074v8
`
`5
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 11 of 37 PageID #: 5137
`
`
`of Smart Lock or Auto Lock, which unlocks the phone based on its proximity to another Samsung
`
`device (e.g., a Galaxy Gear watch) or its location (e.g., users can make hands-free calls from their cars
`
`without having to unlock the device). (Id. ¶¶55, 96-97). Additionally, the lock screen does not prevent
`
`users from making calls to any individual that a user sets as an ICE (“in case of emergency”) or an
`
`Emergency Contact. (Id. ¶¶79-87). Users can choose to set an unlimited number of contacts as
`
`ICE/emergency contacts, and ICE/emergency contacts can be called for any reason whatsoever
`
`without first unlocking the device. (Id.)
`
`By default, the Accused Products have an inactivity timer that will cause the screen to turn off
`
`after 30 seconds. (Id. ¶¶98, 153, 155). This is a battery saving feature that can be modified by the user.
`
`(Id.) If the user chooses to set up a secure lock screen, when the screen is turned off by the inactivity
`
`timer, a lock screen is also activated by the device. (Id.) The inactivity timer and lock screen are active
`
`whether or not a SIM card is inserted in the device. (Id.)
`
`C.
`
`Uniloc’s Original Infringement Theory
`
`Since the outset of this case and up until the Court issued its Markman Order, Uniloc had taken
`
`the position that the Accused Products infringe claims 1, 3, 5, 7, 10-11, 13-14, 17, and 18 of the ’654
`
`patent (the “Asserted Claims”) because, when a “linked user identification module” (e.g., a SIM card)
`
`is placed in the phone, and when the phone is inactive for a certain period of time, the phone will lock
`
`until the user inputs his or her PIN/pattern/biometric (i.e., what Uniloc asserts is the “deblocking
`
`code”). Importantly, it had been Uniloc’s position that any SIM card could be used with the phone and
`
`still infringe.
`
`Specifically, in its Infringement Contentions, Uniloc alleged that the Accused Products’ use of
`
`a “lock screen” that can be activated after a period of inactivity and unlocked using a
`
`pattern/PIN/biometric infringes the ’654 patent. (Infringement Contentions (Ex. 2), Ex. A thereto, at
`
`6-13). With respect to the “linked user identification module” and “timing means” limitations of the
`
`ACTIVE 49523074v8
`
`6
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 12 of 37 PageID #: 5138
`
`
`Asserted Claims, Uniloc stated: “[S]ubsequent to a valid SIM card (user identification module) being
`
`inserted into the Accused Products and the security functionality being enabled, access to the Accused
`
`Products is blocked after a time period . . . has passed since the last interaction.” (Id. at 6). Uniloc’s
`
`infringement theory was confirmed through its claim construction briefing where it argued that “[t]he
`
`claims do not require that the user identification module is the only one that performs normal operation
`
`of the device.” (Dkt. 42 at 7; Dkt. 48 at 1-3 (“Thus, a linked user identification module does not have
`
`to be the only one that performs normal operation of the device.”); Dkt. 64 at 1-3 (“[T]he patent
`
`recognizes that both linked and unlinked user identification modules may be used to process calls, even
`
`if another user identification module has been linked.”); Dkt. 62 at 9:2-7, 10:8-11, 12:3-10).
`
`During the claim construction proceedings, Uniloc’s expert, Dr. Easttom, similarly asserted:
`
`[T]here are embodiments in the patent that allow non-linked user identification
`modules to make calls. See, e.g., col. 4, ll. 23-30. Therefore, I do not agreed [sic]
`that the linked user identification module must be the only one that permits normal
`operation of the device.
`
`
`(Dkt. 41-6 at ¶¶27-29).4 And, at the Markman hearing, Uniloc’s counsel asserted that “it is Uniloc’s
`
`position that linked doesn’t in this case mean the only one that permits normal operation. . . . There’s
`
`nothing in the claim that suggests it is the one and only one.” (Dkt. 62 at 8:24-9:7; see also id. at 10:8-
`
`11, 12:7-10).
`
`
`
`The reason Uniloc was forced to take this position was clear – as discussed in Section III.B
`
`above, all of the Accused Products work, i.e., are able to make outgoing calls, using more than one
`
`SIM card.
`
`D.
`
`The Court’s Markman Order Undermined Uniloc’s Infringement Theory
`
`On January 21, 2020, in its Markman Order (Dkt. 61), the Court rejected Uniloc’s claim
`
`
`4 The Declaration of Dr. William C. Easttom II (Chuck Easttom) Concerning Claim Construction of
`U.S. Patent. No. 6,836,654 was struck as untimely (Dkt. 59).
`
`ACTIVE 49523074v8
`
`7
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 13 of 37 PageID #: 5139
`
`
`construction arguments for the term “linked user identification module,” which eviscerated Uniloc’s
`
`infringement theory. Specifically, the Court held that a “linked user identification module” is “a user
`
`identification module that is the only one that permits normal operation of the device.” (Id. at 17). The
`
`Court made clear that “physically connecting a module to a device (e.g., by inserting it into the device
`
`or attaching it to the device via a chain link) does not mean the device is ‘linked’ as ‘linked’ is used in
`
`the patent.” (Id. at 16). The Court also stated that a device cannot operate normally with an unlinked
`
`user identification module: “Neither the Pinault prior-art patent nor the ’654 Patent provide any
`
`example in which a mobile device linked to a linked user identification module may operate normally
`
`without the linked user identification module.” (Id. at 14).
`
`The Court also construed the “timing means” limitation of claim 1 as having the following
`
`structure: “device with a microprocessor assembly programmed to execute the algorithms set forth in
`
`the ’654 Patent at col.3 ll.32-43, and equivalents thereof.” (Id. at 36). In addition, the Court ruled that
`
`the “timing means” algorithm first checks to ensure that a “linked user identification module” is
`
`“placed inside the device”:
`
`If the identification module that is placed inside the device is linked to the device
`(arrow Y4), one looks whether the device has remained in the state of availability
`for a certain period of time T of the order of several minutes, for example (box
`K10). If this is not the case (arrow N10), the device remains in the state of
`availability indicated in box Kl. If this is the case (arrow Yl0), the device passes on
`to a second blocking state indicated in box K11.
`
`(Id. at 35 (citing ’654 patent (Ex. 1) at col. 3 ll. 31-39)). The Court explained “that the timing means is
`
`engaged only after insertion of the linked user identification module.” (Id.)
`
`E.
`
`Dr. Easttom’s Expert Report and Uniloc’s New Infringement Theory
`
`Following the issuance of the Court’s Markman Order, Uniloc realized that its entire
`
`infringement theory had been rendered – in its own words – “untenable.” (Dkt. 96 at 14). Rather than
`
`dismiss its case (as it should have), Uniloc “changed [its] theory of the case.” (Id.) This proved difficult,
`
`ACTIVE 49523074v8
`
`8
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 14 of 37 PageID #: 5140
`
`
`however, since, as its expert Dr. Easttom
`
`
`
` (See Expert Report of William C. Easttom II (Chuck
`
`Easttom) Regarding Infringement of U.S. Patent No. 6,836,654 (“Easttom Rpt.”) (Ex. 4) ¶¶204-210).
`
`Therefore, Uniloc devised an entirely new theory of infringement which relies on a brand-new
`
`construction for “normal operation” which finds no support in the Court’s Markman Order or the
`
`intrinsic evidence and is inconsistent with Uniloc’s construction of the term in another case before this
`
`Court.5 In fact, Dr. Easttom recognizes that he had to “define normal operation” himself. (Id. ¶138).
`
`In his report, Dr. Easttom asserts:
`
`212). Thus, Dr. Easttom asserts that the Accused Products have
`
` (Id. ¶212; see also id. ¶205
`
`IV.
`
`LEGAL STANDARDS
`
`A.
`
`Summary Judgment
`
`
`
`
`
` (Id. ¶21; see also id. ¶¶144, 205,
`
`
`
`
`
`
`
`
`
`
`
`
`
`A grant of summary judgment is proper if the pleadings and evidence show that “there is no
`
`genuine issue as to any material fact and the moving party is entitled to judgment as a matter of law.”
`
`Fed. R. Civ. P. 56(a); Celotex Corp. v. Catrett, 477 U.S. 317, 322 (1986). “Summary judgment is as
`
`
`5 Samsung moved to strike Dr. Easttom’s construction of “normal operation” and other new opinions
`in the Easttom Report, as well as Uniloc’s Amended Infringement Contentions, which were served
`after the Easttom Report was served. (Dkt. 77).
`
`ACTIVE 49523074v8
`
`9
`
`

`

`Case 2:18-cv-00508-JRG Document 110 Filed 04/28/20 Page 15 of 37 PageID #: 5141
`
`
`appropriate in a patent case as it is in any other case.” C.R. Bard, Inc. v. Advanced Cardiovascular
`
`Sys., Inc., 911 F.2d 670, 672 (Fed. Cir. 1990).
`
`“[T]he burden on the moving party may be discharged by ‘showing’—that is, pointing out to
`
`the district court—that there is an absence of evidence to support the nonmoving party’s case.” Celotex,
`
`477 U.S. at 325. When the summary judgment movant demonstrates the absence of a genuine dispute
`
`over any material fact, the burden shifts to the non-movant to show there is a genuine factual issue for
`
`trial. Id. at 325. “A genuine issue exists if the evidence is such that a reasonable jury could find for the
`
`nonmoving party,” and “[a] disputed fact is material if it might affect the outcome of the suit such that
`
`a finding of that fact is necessary and relevant to the proceeding.” Eli Lilly & Co. v. Barr Labs., Inc.,
`
`251 F.3d 955, 962 (Fed. Cir. 2001). “The nonmovant’s burden may not be satisfied by argument,
`
`conclusory allegations, unsubstantiated assertions, metaphysical doubt as to the facts, or a mere
`
`scintilla of evidence.” EMG Tech., LLC v. Vanguard Grp., Inc., 2014 U.S. Dist. LEXIS 191718, at *6
`
`(E.D. Tex. June 24, 2014). And, “conclusory assertions, even from experts, are not sufficient to avoid
`
`summary judgment.” TQP Dev., LLC v. Intuit Inc., 2014 WL 2810016, at *10 (E.D. Tex. June 20,
`
`2014).
`
`B.
`
`Direct Infringement
`
`To establish literal infringement of a patent, every limitation set forth in a claim must be found
`
`in an accused product. Johnston v. IVAC Corp., 885 F.2d 1574, 1577 (Fed. Cir. 1989). When a claim
`
`limitation is not present in an accused device, either literally or under the doctrine of equivalents, the
`
`court must grant summary judgment of non-infringement. See Warner-Jenkinson Co. v. Hilton Davis
`
`Chem. Co., 520 U.S. 17, 39 n.8 (1997).
`
`“To infringe a method claim, a person must have practiced all steps of the claimed method.”
`
`Finjan, Inc. v. Secure Computing Corp., 626 F.3d 1197, 1206 (Fed. Cir. 2010). In other words, “[a]
`
`method claim is directly infringed only by one practicing the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket