throbber
Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 1 of 11 PageID #: 5377
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF TEXAS
`TEXARKANA DIVISION
`
`MAXELL, LTD.,
`
`
`
`Plaintiff
`
`Civil Action NO. 5:19-cv-00036-RWS
`
`v.
`
`APPLE INC.,
`
`Defendant.
`
`JURY TRIAL DEMANDED
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.’S MOTION TO COMPEL INFRINGEMENT CONTENTIONS
`COMPLIANT WITH PATENT RULE 3-1(G) OR, IN THE ALTERNATIVE, TO
`PRECLUDE MAXELL’S RELIANCE ON SOURCE CODE FOR INFRINGEMENT
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 2 of 11 PageID #: 5378
`
`TABLE OF AUTHORITIES
`
`Page
`
`I.
`
`II.
`
`INTRODUCTION ............................................................................................................. 1
`
`MATERIAL FACTS ......................................................................................................... 1
`
`III.
`
`LEGAL STANDARD ........................................................................................................ 3
`
`IV. ARGUMENT ..................................................................................................................... 4
`
`A.
`
`B.
`
`Maxell’s SIC Fails to Disclose Its Infringement Theories With Specificity. ........ 4
`
`Maxell Has No Excuse For Its Failure to Comply with P.R. 3-1(g). ..................... 6
`
`V.
`
`CONCLUSION .................................................................................................................. 7
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 3 of 11 PageID #: 5379
`
`
`
`I.
`
`INTRODUCTION
`
`The Local Patent Rules, through P.R. 3-1(g), plainly required Maxell to provide “pinpoint
`
`citations to source code” in its infringement contentions to give Apple “adequate notice” of
`
`Maxell’s infringement theories. UltimatePointer, LLC v. Nintendo Co., No. 6:11-CV-496-LED,
`
`2013 WL 6253767, at *3 (E.D. Tex. Dec. 3, 2013). Maxell has not done so, and is now refusing
`
`to supplement its contentions, despite the fact that Apple first made source code available for
`
`Maxell’s inspection in August and Apple tolled—at Maxell’s request—the deadline for Maxell
`
`to provide its P.R. 3-1(g) contentions. Maxell’s refusal to supplement contravenes the purpose
`
`of the Local Patent Rules, which are designed to provide “all parties with adequate notice and
`
`information with which to litigate their cases” and deter “litigation by ambush.” Computer
`
`Acceleration Corp. v. Microsoft Corp., 503 F. Supp. 2d 819, 822 (E.D. Tex. 2007).
`
`Instead of providing pinpoint citations to source code, Maxell chose merely to list source
`
`code file and folder names for each limitation it contends is practiced by software—identifying
`
`more than hundreds and even thousands of files as relevant for each “software” limitation. It
`
`never tried to identify any “single structure, process, algorithm, feature or function” alleged to
`
`infringe these software limitations. Connectel, LLC v. Cisco Sys., Inc., 391 F. Supp. 2d 526, 528
`
`(E.D. Tex. 2005). And it never explained how it contends the source code allegedly satisfies
`
`each claim limitation. Maxell’s bulk listing of source code gives Apple no notice of Maxell’s
`
`source code-based infringement theories. Thus, Apple respectfully requests the Court require
`
`that Maxell immediately provide compliant infringement contentions or preclude Maxell from
`
`relying on source code evidence for its infringement case.
`
`II. MATERIAL FACTS
`
`In its original infringement contentions, Maxell alleged that every currently asserted
`
`claim includes one or more “software limitations” governed by P.R. 3-1(g). This Rule required
`
`1
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 4 of 11 PageID #: 5380
`
`
`
`Maxell to “identify, on an element-by-element basis for each asserted claim, what source code …
`
`allegedly satisfies the software limitations” within 30 days of source code production. D.I. 42 at
`
`2. Based on Maxell’s broad designations, Apple made available for inspection approximately
`
`900,000 files in 185 clearly named directories on August 14, 2019. And at Maxell’s request,
`
`Apple tolled the time for Maxell to comply with Rule 3-1(g) by a month.1 But, when Maxell
`
`served its Supplemental Infringement Contentions (“SIC”), instead of providing pinpoint
`
`citations to source code—as required under the Patent Rules—Maxell only identified long lists
`
`of file and folder names for each alleged software limitation.
`
`For example, claim element 1(d) of U.S. Patent No. 8,339,493 recites “mixing or culling
`
`signal charges accumulated in the N number of vertically arranged pixel lines ….” Maxell
`
`contends that this is a P.R. 3-1(g) limitation that implicates software. But instead of identifying
`
`“what source code … allegedly satisfies” this limitation, the SIC lists 47 pages of source code
`
`files and folder names—identifying 6 full folders and 682 individual files in other folders—just
`
`for this single limitation. See Ex. B (excerpt). One of the folders Maxell listed alone contains
`
`over 27,000 additional files. Thus, Maxell’s SIC identified tens of thousands of files (which
`
`would translate into hundreds of thousands of pages if printed), all without further explanation of
`
`the listed code, for a single software limitation. As another example, claim element 1(f) of U.S.
`
`Patent No. 10,084,991 recites “paus[ing] the displaying of the first digital information and
`
`render[ing] the camera operative.” Maxell asserted that this too is a P.R. 3-1(g) limitation, but
`
`
`1 Maxell did not even begin the process of clearing its experts for source code review—a process
`of which it was aware it must satisfy at least beginning when the parties first filed the protective
`order on June 26, 2019—until after Apple made its source code production in August. And, to
`date, Maxell has not printed a single page of code, nor has any of Maxell’s experts who are
`expected to offer infringement opinions even reviewed the produced code.
`
`
`2
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 5 of 11 PageID #: 5381
`
`
`
`listed 74 full folders and more than 70 pages of file names. See Exs. A, C. Apple cannot divine
`
`from these long lists what portions of code Maxell contends satisfy the relevant limitations.2
`
`Apple requested that Maxell correct its SIC, but Maxell refused. Simmons Decl. ¶ 6.
`
`III. LEGAL STANDARD
`
`P.R. 3-1 requires a patentee to disclose its “particular theories of infringement,” Zix Corp.
`
`v. Echoworx Corp., No. 2:15-CV-1272-JRG, 2016 WL 3410367, at *1 (E.D. Tex. May 13,
`
`2016), including the “single structure, process, algorithm, feature or function of any accused
`
`product” alleged to infringe, Connectel, 391 F. Supp. 2d at 528. Infringement contentions that
`
`fail to identify “what specific parts of the accused products practice the relevant software claim
`
`elements” may be stricken. Zix, 2016 WL 3410367, at *2. P.R. 3-1(g) is also plain on its face:
`
`requiring that Maxell identify the “source code” that “allegedly satisfies” the claim limitations.
`
`Indeed, specific line-item identification of source code is the required practice in this
`
`District. Michael S Sutton Ltd. v. Nokia Corp., No. 6:07-CV-203, 2009 WL 9051240, at *2
`
`(E.D. Tex. Feb. 13, 2009) (explaining that a plaintiff must identify the “location of the [claimed
`
`elements] in the source code” and finding general citations to 83 pages of source code
`
`insufficient); see also UltimatePointer, LLC, 2013 WL 6253767, at *3 (requiring “pinpoint
`
`citations” to source code); Wi-LAN, Inc. v. Acer, Inc., No. 2:07-CV-473-TJW, 2010 WL
`
`9593050, at *1 (E.D. Tex. July 29, 2010) (requiring plaintiff to supplement by “identifying the
`
`source code lines”); Treehouse Avatar LLC v. Valve Corp., No. C17-1860-RAJ, 2019 WL
`
`917403, at *2 (W.D. Wash. Feb. 25, 2019) (“[T]he Northern District of California, Central
`
`District of California, and Eastern District of Texas, generally hold that in software cases, once
`
`
`2 These are just two of many examples of Maxell’s bulk listing of source code, including
`substantially overlapping 45+ page lists of file names for each asserted claim of the ’493 patent.
`The SIC lists 10 or more pages of source code folders and file names (i.e., hundreds of files)
`each for 57 claim elements, including 25 or more pages for 39 claim elements.
`
`3
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 6 of 11 PageID #: 5382
`
`
`
`source code has been provided to plaintiffs, they must supplement their infringement contentions
`
`with pinpoint source code citations.”) (emphasis added); Finjan, Inc. v. Check Point Software
`
`Techs., Inc., No. 18-CV-02621-WHO, 2019 WL 955000, at *6 (N.D. Cal. Feb. 27, 2019)
`
`(requiring specific “pinpoint source code citations” under similar Patent Rules).
`
`IV. ARGUMENT
`
`A. Maxell’s SIC Fails to Disclose Its Infringement Theories With Specificity.
`
`Maxell’s SIC fails to “provide enough specificity to give [Apple] notice of the patentee’s
`
`claims” for the software limitations. Michael S Sutton Ltd., 2009 WL 9051240, at *2. As
`
`explained above, Maxell identified thousands of source code files for claim element 1(d) of the
`
`’493 Patent. See Ex. B. The listed source code spans practically every aspect of image-related
`
`functionality, ranging from code used to capture image data from the image sensor to code used
`
`to display a “slide show.” Since the listed source code covers all aspects of image processing,
`
`Apple is at a loss as to Maxell’s actual infringement theory with respect to the “mixing or
`
`culling” limitation. This is designed to tactically disadvantage Apple. Because the constructions
`
`of “mixing” and “culling” are disputed (see D.I. 99 at 16), Maxell’s overbroad listing of various
`
`code allows it the freedom to choose whatever portion of the source code it will later rely on in
`
`its expert reports without having to disclose its theories before the claim construction hearing.
`
`This is precisely the type of “litigation by ambush” tactic the Patent Rules are designed to
`
`prohibit. See Computer Acceleration, 503 F. Supp. 2d at 822.
`
`Maxell cannot hide its infringement theories among long lists of source code files.
`
`Rather, Maxell is required to “identify the particular claim components in each claim, map those
`
`components onto the features of the allegedly infringing products, and pinpoint cite source code
`
`that practices that component.” Check Point Software, 2019 WL 955000, at *6 (emphasis
`
`added); see also Zix, No. 2:15-CV-1272-JRG, 2016 WL 3410367, at *2 (contentions must
`
`4
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 7 of 11 PageID #: 5383
`
`
`
`identify the “specific parts of the accused products [that] practice the relevant software claim
`
`elements”). Maxell’s “analysis” of source code includes nothing more than “simply parrot[ting]
`
`claim language without identifying any particular supporting language in its sources or linking
`
`the cited sources to particular source code.” Check Point Software, 2019 WL 955000, at *5.
`
`And Maxell has not explained what algorithms in source code, individually or in combination,
`
`infringe any claim element. By citing “multiple sets of source code … with little or no
`
`explanation for which set of citations relate to the relevant claim limitation,” Maxell has not
`
`disclosed “how any particular set of source code practices the asserted claim limitation.” Id. at
`
`*5. Maxell’s tactic “creates incalculable alternatives of infringement theories,” making it “next
`
`to impossible to know what its infringement theories are.” Id. at *7.
`
`In pre-motion correspondence, Maxell relied on Finjan, Inc. v. Proofpoint, Inc., No. 13-
`
`CV-05808-HSG, 2015 WL 9023166 (N.D. Cal. Dec. 16, 2015), to argue that it does not need to
`
`provide pinpoint citations. While Finjan did not require pinpoint citations, Maxell’s reliance on
`
`it is misplaced because it did not apply P.R. 3-1(g)’s specific requirement. Nevertheless, Finjan
`
`required that “plaintiff … sufficiently identif[y] its theory of infringement through other means.”
`
`Id. at *2. But Maxell has not provided any means to decipher its infringement theories. And
`
`subsequent decisions have criticized Finjan for undermining the “early and specific disclosure”
`
`of contentions required by the local Patent Rules. Kinglite Holdings Inc. v. Micro-Star Int’l Co.,
`
`No. CV-14-03009-JVS-PJWX, 2016 WL 6762573, at *2-3 (C.D. Cal. June 15, 2016) (requiring
`
`pinpoint citations). And a 2019 N.D. Cal. decision specifically required the same plaintiff to
`
`provide “pinpoint source code citations ... as required by the Patent Local Rules.” Check Point,
`
`2019 WL 955000, at *7. Apple is not aware of any decision—and Maxell has not cited any—
`
`that replaced this District’s longstanding rule requiring specificity with Finjan’s 2015 holding.
`
`5
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 8 of 11 PageID #: 5384
`
`
`
`There is a reason why courts routinely require pinpoint citations to source code. Without
`
`specific contentions, Maxell would be allowed to freely mix and match previously-undisclosed
`
`combinations of software algorithms to create a “shifting sands” approach to patent litigation that
`
`the Patent Rules intend to prevent. Keranos, LLC v. Silicon Storage Tech., Inc., 797 F.3d 1025,
`
`1035 (Fed. Cir. 2015).
`
`B. Maxell Has No Excuse For Its Failure to Comply with P.R. 3-1(g).
`
`This District has also rejected Maxell’s argument, made in pre-motion correspondence,
`
`that it need not cite source code with specificity to comply with P.R. 3-1(g) because it “otherwise
`
`compl[ied] with P.R. 3-1.” See Zix, No. 2:15-CV-1272-JRG, 2016 WL 3410367, at *2. But
`
`Maxell “triggered P.R. 3-1(g) of the Discovery Order” by designating claim elements as software
`
`limitations. Id. And after demanding voluminous source code from Apple by doing so, Maxell
`
`cannot “reverse course on whether or not P.R. 3-1(g) applies whenever it is either convenient or
`
`advantageous.” Id. at *3. If Maxell has now determined that certain claim limitations do not
`
`implicate source code, it should have withdrawn them as “software limitations” in its
`
`contentions. Maxell did not do so, and it must now disclose specific citations to source code.
`
`The Court should also reject Maxell’s self-serving claim that the volume of source code
`
`Apple has produced justifies its deficient SIC. Maxell itself requested that Apple produce a large
`
`amount of source code through its original contentions and subsequent conferences with Apple’s
`
`counsel. During those conferences, Maxell argued that the amount at stake in this case justifies
`
`its disproportionate demands for source code discovery. Maxell cannot change its position now
`
`to argue that source code Apple made available in response to Maxell’s disproportionate
`
`demands—at Apple’s great expense—somehow excuses Maxell’s failure to comply with the
`
`Patent Rules. Indeed, the complexity of this case mandates more, not less, specific disclosure of
`
`infringement theories. See Realtime Data, LLC v. Packeteer, Inc., No. 6:08-CV-144, 2009 WL
`
`6
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 9 of 11 PageID #: 5385
`
`
`
`2590101, at *6 (E.D. Tex. Aug. 18, 2009) (“With a lawsuit of great complexity, it is all the more
`
`imperative to avoid springing new claims on Defendants at a late stage.”).
`
`Maxell’s reliance on Thomas Swan & Co. v. Finisar Corp., No. 2:13-CV-178-JRG, 2014
`
`WL 12599221, at *2 (E.D. Tex. Apr. 16, 2014) to argue that it has sufficiently narrowed the code
`
`is also misplaced. There, the Court found that the plaintiff’s citations—to “9,000 to 15,000 lines
`
`of source code”—provided sufficient notice of its contentions. Id. The total volume cited in the
`
`entire Swan case—equivalent to a few dozen source code files produced by Apple—pales in
`
`comparison to the thousands of files Maxell has cited for just one claim element. Moreover,
`
`Maxell has demonstrated that it is capable of citing specific lines of source code by doing so in
`
`discovery correspondence. See Simmons Decl. ¶ 5; Michael S Sutton, 2009 WL 9051240, at *3
`
`(requiring specific disclosure where patent owner was clearly capable of narrowing the code).
`
`Lastly, Maxell’s continued demands for disproportionate source code discovery,
`
`including for claim elements that it did not even designate as “software limitations,” does not
`
`excuse Maxell from complying with the Patent Rules. This case is in the claim construction
`
`phase, and Apple has been unduly prejudiced by Maxell’s failure to disclose its infringement
`
`theories on software limitations. Maxell cannot avoid its obligations by asking for more source
`
`code (while at the same time complaining that the volume of the produced code is too large to
`
`provide specific citations). The Patent Rules require Maxell to disclose its infringement theories
`
`with specificity, and Maxell cannot circumvent these rules by requesting more code.
`
`V.
`
`CONCLUSION
`
`Apple respectfully requests that the Court require Maxell to correct the deficiencies in its
`
`infringement contentions or preclude Maxell from relying on source code evidence.
`
`7
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 10 of 11 PageID #: 5386
`
`
`
`November 12, 2019
`
`
`/s/ Luann L. Simmons
`
`
`
`Luann L. Simmons (Pro Hac Vice)
`lsimmons@omm.com
`O’MELVENY & MYERS LLP
`Two Embarcadero Center
`28th Floor
`San Francisco, CA 94111
`Telephone: 415-984-8700
`Facsimile: 415-984-8701
`
`Xin-Yi Zhou (Pro Hac Vice)
`vzhou@omm.com
`Anthony G. Beasley (TX #24093882)
`tbeasley@omm.com
`O’MELVENY & MYERS LLP
`400 S. Hope Street
`Los Angeles, CA 90071
`Telephone: 213-430-6000
`Facsimile: 213-430-6407
`
`Laura Bayne Gore (Pro Hac Vice)
`lbayne@omm.com
`O’MELVENY & MYERS LLP
`Times Square Tower, 7 Times Square
`New York, NY 10036
`Telephone: 212-326-2000
`Facsimile: 212-326-2061
`
`Melissa R. Smith (TX #24001351)
`melissa@gilliamsmithlaw.com
`GILLIAM & SMITH, LLP
`303 South Washington Avenue
`Marshall, Texas 75670
`Telephone: (903) 934-8450
`Facsimile: (903) 934-9257
`
`Attorneys for Defendant Apple Inc.
`
`8
`
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 129 Filed 11/14/19 Page 11 of 11 PageID #: 5387
`
`
`
`
`
`CERTIFICATE OF SERVICE
`
`
`
`The undersigned hereby certifies that all counsel of record who are deemed to have
`
`consented to electronic service are being served with a copy of this document via the Court's
`
`CM/ECF system per Local Rule CV-5(a)(3) on November 12, 2019.
`
`
`
`
`
`
`
`
`
`
`
`/s/Melissa R. Smith
`Melissa R. Smith
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CERTIFICATE OF CONFERENCE
`
`On November 4, 2019, pursuant to Local Rule CV-7(h), counsel for Defendants met and
`
`conferred with counsel for Plaintiff, and counsel for Plaintiff indicated that Plaintiff is opposed to
`
`the relief sought by this Motion.
`
`/s/Melissa R. Smith
`Melissa R. Smith
`
`
`
`
`
`9
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket