`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`TEXARKANA DIVISION
`
`MAXELL, LTD.,
`
`
`
`Plaintiff
`
`Civil Action NO. 5:19-cv-00036-RWS
`
`v.
`
`APPLE INC.,
`
`Defendant.
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.’S MOTION TO COMPEL INFRINGEMENT CONTENTIONS
`COMPLIANT WITH PATENT RULE 3-1(G) OR, IN THE ALTERNATIVE, TO
`PRECLUDE MAXELL’S RELIANCE ON SOURCE CODE FOR INFRINGEMENT
`
`
`
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 2 of 11 PageID #: 5378
`
`TABLE OF AUTHORITIES
`
`Page
`
`I.
`
`II.
`
`INTRODUCTION ............................................................................................................. 1
`
`MATERIAL FACTS ......................................................................................................... 1
`
`III.
`
`LEGAL STANDARD ........................................................................................................ 3
`
`IV. ARGUMENT ..................................................................................................................... 4
`
`A.
`
`B.
`
`Maxell’s SIC Fails to Disclose Its Infringement Theories With Specificity. ........ 4
`
`Maxell Has No Excuse For Its Failure to Comply with P.R. 3-1(g). ..................... 6
`
`V.
`
`CONCLUSION .................................................................................................................. 7
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 3 of 11 PageID #: 5379
`
`
`
`I.
`
`INTRODUCTION
`
`The Local Patent Rules, through P.R. 3-1(g), plainly required Maxell to provide “pinpoint
`
`citations to source code” in its infringement contentions to give Apple “adequate notice” of
`
`Maxell’s infringement theories. UltimatePointer, LLC v. Nintendo Co., No. 6:11-CV-496-LED,
`
`2013 WL 6253767, at *3 (E.D. Tex. Dec. 3, 2013). Maxell has not done so, and is now refusing
`
`to supplement its contentions, despite the fact that Apple first made source code available for
`
`Maxell’s inspection in August and Apple tolled—at Maxell’s request—the deadline for Maxell
`
`to provide its P.R. 3-1(g) contentions. Maxell’s refusal to supplement contravenes the purpose
`
`of the Local Patent Rules, which are designed to provide “all parties with adequate notice and
`
`information with which to litigate their cases” and deter “litigation by ambush.” Computer
`
`Acceleration Corp. v. Microsoft Corp., 503 F. Supp. 2d 819, 822 (E.D. Tex. 2007).
`
`Instead of providing pinpoint citations to source code, Maxell chose merely to list source
`
`code file and folder names for each limitation it contends is practiced by software—identifying
`
`more than hundreds and even thousands of files as relevant for each “software” limitation. It
`
`never tried to identify any “single structure, process, algorithm, feature or function” alleged to
`
`infringe these software limitations. Connectel, LLC v. Cisco Sys., Inc., 391 F. Supp. 2d 526, 528
`
`(E.D. Tex. 2005). And it never explained how it contends the source code allegedly satisfies
`
`each claim limitation. Maxell’s bulk listing of source code gives Apple no notice of Maxell’s
`
`source code-based infringement theories. Thus, Apple respectfully requests the Court require
`
`that Maxell immediately provide compliant infringement contentions or preclude Maxell from
`
`relying on source code evidence for its infringement case.
`
`II. MATERIAL FACTS
`
`In its original infringement contentions, Maxell alleged that every currently asserted
`
`claim includes one or more “software limitations” governed by P.R. 3-1(g). This Rule required
`
`1
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 4 of 11 PageID #: 5380
`
`
`
`Maxell to “identify, on an element-by-element basis for each asserted claim, what source code …
`
`allegedly satisfies the software limitations” within 30 days of source code production. D.I. 42 at
`
`2. Based on Maxell’s broad designations, Apple made available for inspection approximately
`
`900,000 files in 185 clearly named directories on August 14, 2019. And at Maxell’s request,
`
`Apple tolled the time for Maxell to comply with Rule 3-1(g) by a month.1 But, when Maxell
`
`served its Supplemental Infringement Contentions (“SIC”), instead of providing pinpoint
`
`citations to source code—as required under the Patent Rules—Maxell only identified long lists
`
`of file and folder names for each alleged software limitation.
`
`For example, claim element 1(d) of U.S. Patent No. 8,339,493 recites “mixing or culling
`
`signal charges accumulated in the N number of vertically arranged pixel lines ….” Maxell
`
`contends that this is a P.R. 3-1(g) limitation that implicates software. But instead of identifying
`
`“what source code … allegedly satisfies” this limitation, the SIC lists 47 pages of source code
`
`files and folder names—identifying 6 full folders and 682 individual files in other folders—just
`
`for this single limitation. See Ex. B (excerpt). One of the folders Maxell listed alone contains
`
`over 27,000 additional files. Thus, Maxell’s SIC identified tens of thousands of files (which
`
`would translate into hundreds of thousands of pages if printed), all without further explanation of
`
`the listed code, for a single software limitation. As another example, claim element 1(f) of U.S.
`
`Patent No. 10,084,991 recites “paus[ing] the displaying of the first digital information and
`
`render[ing] the camera operative.” Maxell asserted that this too is a P.R. 3-1(g) limitation, but
`
`
`1 Maxell did not even begin the process of clearing its experts for source code review—a process
`of which it was aware it must satisfy at least beginning when the parties first filed the protective
`order on June 26, 2019—until after Apple made its source code production in August. And, to
`date, Maxell has not printed a single page of code, nor has any of Maxell’s experts who are
`expected to offer infringement opinions even reviewed the produced code.
`
`
`2
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 5 of 11 PageID #: 5381
`
`
`
`listed 74 full folders and more than 70 pages of file names. See Exs. A, C. Apple cannot divine
`
`from these long lists what portions of code Maxell contends satisfy the relevant limitations.2
`
`Apple requested that Maxell correct its SIC, but Maxell refused. Simmons Decl. ¶ 6.
`
`III. LEGAL STANDARD
`
`P.R. 3-1 requires a patentee to disclose its “particular theories of infringement,” Zix Corp.
`
`v. Echoworx Corp., No. 2:15-CV-1272-JRG, 2016 WL 3410367, at *1 (E.D. Tex. May 13,
`
`2016), including the “single structure, process, algorithm, feature or function of any accused
`
`product” alleged to infringe, Connectel, 391 F. Supp. 2d at 528. Infringement contentions that
`
`fail to identify “what specific parts of the accused products practice the relevant software claim
`
`elements” may be stricken. Zix, 2016 WL 3410367, at *2. P.R. 3-1(g) is also plain on its face:
`
`requiring that Maxell identify the “source code” that “allegedly satisfies” the claim limitations.
`
`Indeed, specific line-item identification of source code is the required practice in this
`
`District. Michael S Sutton Ltd. v. Nokia Corp., No. 6:07-CV-203, 2009 WL 9051240, at *2
`
`(E.D. Tex. Feb. 13, 2009) (explaining that a plaintiff must identify the “location of the [claimed
`
`elements] in the source code” and finding general citations to 83 pages of source code
`
`insufficient); see also UltimatePointer, LLC, 2013 WL 6253767, at *3 (requiring “pinpoint
`
`citations” to source code); Wi-LAN, Inc. v. Acer, Inc., No. 2:07-CV-473-TJW, 2010 WL
`
`9593050, at *1 (E.D. Tex. July 29, 2010) (requiring plaintiff to supplement by “identifying the
`
`source code lines”); Treehouse Avatar LLC v. Valve Corp., No. C17-1860-RAJ, 2019 WL
`
`917403, at *2 (W.D. Wash. Feb. 25, 2019) (“[T]he Northern District of California, Central
`
`District of California, and Eastern District of Texas, generally hold that in software cases, once
`
`
`2 These are just two of many examples of Maxell’s bulk listing of source code, including
`substantially overlapping 45+ page lists of file names for each asserted claim of the ’493 patent.
`The SIC lists 10 or more pages of source code folders and file names (i.e., hundreds of files)
`each for 57 claim elements, including 25 or more pages for 39 claim elements.
`
`3
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 6 of 11 PageID #: 5382
`
`
`
`source code has been provided to plaintiffs, they must supplement their infringement contentions
`
`with pinpoint source code citations.”) (emphasis added); Finjan, Inc. v. Check Point Software
`
`Techs., Inc., No. 18-CV-02621-WHO, 2019 WL 955000, at *6 (N.D. Cal. Feb. 27, 2019)
`
`(requiring specific “pinpoint source code citations” under similar Patent Rules).
`
`IV. ARGUMENT
`
`A. Maxell’s SIC Fails to Disclose Its Infringement Theories With Specificity.
`
`Maxell’s SIC fails to “provide enough specificity to give [Apple] notice of the patentee’s
`
`claims” for the software limitations. Michael S Sutton Ltd., 2009 WL 9051240, at *2. As
`
`explained above, Maxell identified thousands of source code files for claim element 1(d) of the
`
`’493 Patent. See Ex. B. The listed source code spans practically every aspect of image-related
`
`functionality, ranging from code used to capture image data from the image sensor to code used
`
`to display a “slide show.” Since the listed source code covers all aspects of image processing,
`
`Apple is at a loss as to Maxell’s actual infringement theory with respect to the “mixing or
`
`culling” limitation. This is designed to tactically disadvantage Apple. Because the constructions
`
`of “mixing” and “culling” are disputed (see D.I. 99 at 16), Maxell’s overbroad listing of various
`
`code allows it the freedom to choose whatever portion of the source code it will later rely on in
`
`its expert reports without having to disclose its theories before the claim construction hearing.
`
`This is precisely the type of “litigation by ambush” tactic the Patent Rules are designed to
`
`prohibit. See Computer Acceleration, 503 F. Supp. 2d at 822.
`
`Maxell cannot hide its infringement theories among long lists of source code files.
`
`Rather, Maxell is required to “identify the particular claim components in each claim, map those
`
`components onto the features of the allegedly infringing products, and pinpoint cite source code
`
`that practices that component.” Check Point Software, 2019 WL 955000, at *6 (emphasis
`
`added); see also Zix, No. 2:15-CV-1272-JRG, 2016 WL 3410367, at *2 (contentions must
`
`4
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 7 of 11 PageID #: 5383
`
`
`
`identify the “specific parts of the accused products [that] practice the relevant software claim
`
`elements”). Maxell’s “analysis” of source code includes nothing more than “simply parrot[ting]
`
`claim language without identifying any particular supporting language in its sources or linking
`
`the cited sources to particular source code.” Check Point Software, 2019 WL 955000, at *5.
`
`And Maxell has not explained what algorithms in source code, individually or in combination,
`
`infringe any claim element. By citing “multiple sets of source code … with little or no
`
`explanation for which set of citations relate to the relevant claim limitation,” Maxell has not
`
`disclosed “how any particular set of source code practices the asserted claim limitation.” Id. at
`
`*5. Maxell’s tactic “creates incalculable alternatives of infringement theories,” making it “next
`
`to impossible to know what its infringement theories are.” Id. at *7.
`
`In pre-motion correspondence, Maxell relied on Finjan, Inc. v. Proofpoint, Inc., No. 13-
`
`CV-05808-HSG, 2015 WL 9023166 (N.D. Cal. Dec. 16, 2015), to argue that it does not need to
`
`provide pinpoint citations. While Finjan did not require pinpoint citations, Maxell’s reliance on
`
`it is misplaced because it did not apply P.R. 3-1(g)’s specific requirement. Nevertheless, Finjan
`
`required that “plaintiff … sufficiently identif[y] its theory of infringement through other means.”
`
`Id. at *2. But Maxell has not provided any means to decipher its infringement theories. And
`
`subsequent decisions have criticized Finjan for undermining the “early and specific disclosure”
`
`of contentions required by the local Patent Rules. Kinglite Holdings Inc. v. Micro-Star Int’l Co.,
`
`No. CV-14-03009-JVS-PJWX, 2016 WL 6762573, at *2-3 (C.D. Cal. June 15, 2016) (requiring
`
`pinpoint citations). And a 2019 N.D. Cal. decision specifically required the same plaintiff to
`
`provide “pinpoint source code citations ... as required by the Patent Local Rules.” Check Point,
`
`2019 WL 955000, at *7. Apple is not aware of any decision—and Maxell has not cited any—
`
`that replaced this District’s longstanding rule requiring specificity with Finjan’s 2015 holding.
`
`5
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 8 of 11 PageID #: 5384
`
`
`
`There is a reason why courts routinely require pinpoint citations to source code. Without
`
`specific contentions, Maxell would be allowed to freely mix and match previously-undisclosed
`
`combinations of software algorithms to create a “shifting sands” approach to patent litigation that
`
`the Patent Rules intend to prevent. Keranos, LLC v. Silicon Storage Tech., Inc., 797 F.3d 1025,
`
`1035 (Fed. Cir. 2015).
`
`B. Maxell Has No Excuse For Its Failure to Comply with P.R. 3-1(g).
`
`This District has also rejected Maxell’s argument, made in pre-motion correspondence,
`
`that it need not cite source code with specificity to comply with P.R. 3-1(g) because it “otherwise
`
`compl[ied] with P.R. 3-1.” See Zix, No. 2:15-CV-1272-JRG, 2016 WL 3410367, at *2. But
`
`Maxell “triggered P.R. 3-1(g) of the Discovery Order” by designating claim elements as software
`
`limitations. Id. And after demanding voluminous source code from Apple by doing so, Maxell
`
`cannot “reverse course on whether or not P.R. 3-1(g) applies whenever it is either convenient or
`
`advantageous.” Id. at *3. If Maxell has now determined that certain claim limitations do not
`
`implicate source code, it should have withdrawn them as “software limitations” in its
`
`contentions. Maxell did not do so, and it must now disclose specific citations to source code.
`
`The Court should also reject Maxell’s self-serving claim that the volume of source code
`
`Apple has produced justifies its deficient SIC. Maxell itself requested that Apple produce a large
`
`amount of source code through its original contentions and subsequent conferences with Apple’s
`
`counsel. During those conferences, Maxell argued that the amount at stake in this case justifies
`
`its disproportionate demands for source code discovery. Maxell cannot change its position now
`
`to argue that source code Apple made available in response to Maxell’s disproportionate
`
`demands—at Apple’s great expense—somehow excuses Maxell’s failure to comply with the
`
`Patent Rules. Indeed, the complexity of this case mandates more, not less, specific disclosure of
`
`infringement theories. See Realtime Data, LLC v. Packeteer, Inc., No. 6:08-CV-144, 2009 WL
`
`6
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 9 of 11 PageID #: 5385
`
`
`
`2590101, at *6 (E.D. Tex. Aug. 18, 2009) (“With a lawsuit of great complexity, it is all the more
`
`imperative to avoid springing new claims on Defendants at a late stage.”).
`
`Maxell’s reliance on Thomas Swan & Co. v. Finisar Corp., No. 2:13-CV-178-JRG, 2014
`
`WL 12599221, at *2 (E.D. Tex. Apr. 16, 2014) to argue that it has sufficiently narrowed the code
`
`is also misplaced. There, the Court found that the plaintiff’s citations—to “9,000 to 15,000 lines
`
`of source code”—provided sufficient notice of its contentions. Id. The total volume cited in the
`
`entire Swan case—equivalent to a few dozen source code files produced by Apple—pales in
`
`comparison to the thousands of files Maxell has cited for just one claim element. Moreover,
`
`Maxell has demonstrated that it is capable of citing specific lines of source code by doing so in
`
`discovery correspondence. See Simmons Decl. ¶ 5; Michael S Sutton, 2009 WL 9051240, at *3
`
`(requiring specific disclosure where patent owner was clearly capable of narrowing the code).
`
`Lastly, Maxell’s continued demands for disproportionate source code discovery,
`
`including for claim elements that it did not even designate as “software limitations,” does not
`
`excuse Maxell from complying with the Patent Rules. This case is in the claim construction
`
`phase, and Apple has been unduly prejudiced by Maxell’s failure to disclose its infringement
`
`theories on software limitations. Maxell cannot avoid its obligations by asking for more source
`
`code (while at the same time complaining that the volume of the produced code is too large to
`
`provide specific citations). The Patent Rules require Maxell to disclose its infringement theories
`
`with specificity, and Maxell cannot circumvent these rules by requesting more code.
`
`V.
`
`CONCLUSION
`
`Apple respectfully requests that the Court require Maxell to correct the deficiencies in its
`
`infringement contentions or preclude Maxell from relying on source code evidence.
`
`7
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 10 of 11 PageID #: 5386
`
`
`
`November 12, 2019
`
`
`/s/ Luann L. Simmons
`
`
`
`Luann L. Simmons (Pro Hac Vice)
`lsimmons@omm.com
`O’MELVENY & MYERS LLP
`Two Embarcadero Center
`28th Floor
`San Francisco, CA 94111
`Telephone: 415-984-8700
`Facsimile: 415-984-8701
`
`Xin-Yi Zhou (Pro Hac Vice)
`vzhou@omm.com
`Anthony G. Beasley (TX #24093882)
`tbeasley@omm.com
`O’MELVENY & MYERS LLP
`400 S. Hope Street
`Los Angeles, CA 90071
`Telephone: 213-430-6000
`Facsimile: 213-430-6407
`
`Laura Bayne Gore (Pro Hac Vice)
`lbayne@omm.com
`O’MELVENY & MYERS LLP
`Times Square Tower, 7 Times Square
`New York, NY 10036
`Telephone: 212-326-2000
`Facsimile: 212-326-2061
`
`Melissa R. Smith (TX #24001351)
`melissa@gilliamsmithlaw.com
`GILLIAM & SMITH, LLP
`303 South Washington Avenue
`Marshall, Texas 75670
`Telephone: (903) 934-8450
`Facsimile: (903) 934-9257
`
`Attorneys for Defendant Apple Inc.
`
`8
`
`
`
`
`
`
`
`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 11 of 11 PageID #: 5387
`
`
`
`
`
`CERTIFICATE OF SERVICE
`
`
`
`The undersigned hereby certifies that all counsel of record who are deemed to have
`
`consented to electronic service are being served with a copy of this document via the Court's
`
`CM/ECF system per Local Rule CV-5(a)(3) on November 12, 2019.
`
`
`
`
`
`
`
`
`
`
`
`/s/Melissa R. Smith
`Melissa R. Smith
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CERTIFICATE OF CONFERENCE
`
`On November 4, 2019, pursuant to Local Rule CV-7(h), counsel for Defendants met and
`
`conferred with counsel for Plaintiff, and counsel for Plaintiff indicated that Plaintiff is opposed to
`
`the relief sought by this Motion.
`
`/s/Melissa R. Smith
`Melissa R. Smith
`
`
`
`
`
`9
`
`