throbber
Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 1 of 32
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`ANCORA TECHNOLOGIES, INC.
`
`Civil Action No. 6:21-cv-00735
`
`Plaintiff,
`
` Jury Trial Requested
`
`v.
`
`GOOGLE, LLC,
`
`Defendant.
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`This is an action for patent infringement in which Ancora Technologies, Inc. makes the
`
`following allegations against Google, LLC (“Google”):
`
`RELATED CASE
`
`1.
`
`This case is related to the actions Ancora Technologies, Inc. v. Roku, Inc. (W.D. Tex.
`
`Jul. 16, 2021); Ancora Technologies Inc. v. Nintendo Co. Ltd. et al. (W.D. Tex. Jul. 16, 2021); and
`
`Ancora Technologies Inc. v. Vizio, Inc. (W.D. Tex. Jul. 16, 2021)—each of which was filed on July
`
`16, 2021, in the United States District Court for the Western District of Texas, Waco Division,
`
`asserting infringement of United States Patent No. 6,411,941.
`
`PARTIES
`
`2.
`
`Plaintiff Ancora Technologies, Inc. is a corporation organized and existing under the
`
`laws of the State of Delaware with a place of business at 23977 S.E. 10th Street, Sammamish,
`
`Washington 98075.
`
`3.
`
`Defendant Google, LLC is a limited liability corporation organized under the laws of
`
`Delaware. Google maintains a regular and established place of business in this district at 500 West
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 2 of 32
`
`2nd Street, Austin, Texas, 78701. Google may be served with process through its registered agent,
`
`the Corporation Service Company, at 211 East 7th Street, Suite 620, Austin Texas 78701. Google is
`
`registered to do business in the State of Texas and has been since at least November 17, 2006.
`
`JURISDICTION AND VENUE
`
`4.
`
`This action arises under the patent laws of the United States, Title 35 of the United
`
`States Code, such that this Court has subject matter jurisdiction pursuant to 28 U.S.C. §§ 1331 and
`
`1338(a).
`
`5.
`
`This Court also has personal jurisdiction over Google including because Google
`
`maintains a regular and established place of business in the Western District of Texas, including at
`
`500 West 2nd Street, Austin, Texas, 78701.
`
`6.
`
`In addition, directly or through intermediaries, Google has committed acts within the
`
`Western District of Texas giving rise to this action and/or has established minimum contacts with the
`
`Western District of Texas such that the exercise of jurisdiction would not offend traditional notions
`
`of fair play and substantial justice.
`
`7.
`
`For example, Google has placed or contributed to placing infringing products like the
`
`Nexus 6P and Pixelbook into the stream of commerce via an established distribution channel
`
`knowing or understanding that such products would be sold and used in the United States, including
`
`in the Western District of Texas.
`
`8.
`
`Further, on information and belief, Google also has derived substantial revenues from
`
`infringing acts in the Western District of Texas, including from the sale and use of infringing
`
`products like the Nexus 6P and Pixelbook.
`
`9.
`
`In addition, venue is proper under 28 U.S.C. § 1391(b)-(c) and 28 U.S.C. § 1400 as
`
`Google maintains a regular and established place of business in the Western District of Texas,
`
`
`
`2
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 3 of 32
`
`including at least at 500 West 2nd Street, Austin, Texas, 78701. In re HTC Corp., 889 F.3d 1349,
`
`1354 (Fed. Cir. 2018); In re Cray Inc., 871 F.3d 1355, 1362-63 (Fed. Cir. 2017).
`
`10.
`
`Furthermore, Google employs at its regular and established place of business at 500
`
`West 2nd Street, Austin, Texas, individuals with responsibility for Google Cloud servers which, as
`
`set forth below, are utilized by Google to transmit infringing over-the-air (“OTA”) software updates
`
`to the Accused Devices.
`
`THE ASSERTED PATENT
`
`11.
`
`This lawsuit asserts causes of action for infringement of United States Patent No.
`
`6,411,941 (“the ’941 Patent”), which is entitled “Method of Restricting Software Operation Within a
`
`License Limitation.”
`
`12.
`
`The U.S. Patent and Trademark Office duly and legally issued the ’941 Patent on
`
`June 25, 2002.
`
`13.
`
`Subsequent to issue, and at least by December 21, 2004, all right, title, and interest in
`
`the ’941 Patent, including the sole right to sue for any infringement, were assigned to Ancora
`
`Technologies, Inc., which has held, and continues to hold, all right, title, and interest in the ’941
`
`Patent.
`
`14.
`
`The president of Ancora Technologies, Inc.—Mr. Miki Mullor—is one of the
`
`inventors of the ’941 Patent.
`
`15.
`
`A reexamination certificate to the ’941 Patent subsequently was issued on June 1,
`
`2010.
`
`16.
`
`Since being assigned to Ancora Technologies, Inc., the ’941 Patent has been asserted
`
`in patent infringement actions filed against Microsoft Corporation, Dell Incorporated, Hewlett
`
`Packard Incorporated, Toshiba America Information Systems, Apple Inc., HTC America, Inc., HTC
`
`
`
`3
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 4 of 32
`
`Corporation, Samsung Electronics Co., Ltd., Samsung Electronics America, Inc., LG Electronics,
`
`Inc., LG Electronics U.S.A., Inc., Sony Mobile Communications AB, Sony Mobile
`
`Communications, Inc., Sony Mobile Communications (USA) Inc., Lenovo Group Ltd., Lenovo
`
`(United States) Inc., Motorola Mobility, LLC, TCT Mobile (US) Inc., and Huizhou TCL Mobile
`
`Communication Co., Ltd.
`
`17.
`
`In the course of these litigations, a number of the ’941 Patent’s claim terms have been
`
`construed, and the validity of the ’941 Patent has been affirmed repeatedly.
`
`18.
`
`For example, in December 2012, the United States District Court for the Northern
`
`District of California issued a claim construction order construing the terms (1) “volatile memory”;
`
`(2) “non-volatile memory”; (3) “BIOS”; (4) “program”; (5) “license record”; and (6) “verifying the
`
`program using at least the verification structure.” Ancora Techs., Inc. v. Apple Inc., No. 11–CV–
`
`06357 YGR, 2012 WL 6738761, at *1 (N.D. Cal. Dec. 31, 2012).
`
`19.
`
`Further, the court rejected Apple’s indefiniteness arguments and further held that, at
`
`least with respect to Claims 1-3 and 5-17, “[t]he steps of the Claim do not need to be performed in
`
`the order recited.” Ancora Techs., Inc. v. Apple Inc., No. 11–CV–06357 YGR, 2012 WL 6738761, at
`
`*5, *13 (N.D. Cal. Dec. 31, 2012).
`
`20.
`
`Subsequently, the United States Court of Appeals for the Federal Circuit affirmed the
`
`district court’s rejection of Apple’s indefiniteness argument. Ancora Techs., Inc. v. Apple, Inc., 744
`
`F.3d 732, 739 (Fed. Cir. 2014).
`
`21.
`
`The Federal Circuit also agreed with Ancora Technologies, Inc. that “the district court
`
`erred in construing ‘program’ to mean ‘a set of instructions for software applications that can be
`
`executed by a computer’”—holding that, as Ancora had argued, the term should be accorded its
`
`
`
`4
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 5 of 32
`
`normal meaning of “‘a set of instructions’ for a computer.” Ancora Techs., Inc. v. Apple, Inc., 744
`
`F.3d 732, 734-35, 737 (Fed. Cir. 2014).
`
`22.
`
`Subsequently, in a more recent decision, the Federal Circuit held that the ’941 Patent
`
`satisfied § 101 as a matter of law—stating: “[W]e conclude that claim 1 of the ’941 patent is not
`
`directed to an abstract idea.” Ancora Techs., Inc. v. HTC Am., Inc., 908 F.3d 1343 (Fed. Cir. 2018),
`
`as amended (Nov. 20, 2018).
`
`23.
`
`In addition, the Patent Trial and Appeal Board rejected HTC’s request to institute
`
`covered business method review proceedings on the ’941 Patent—explaining that “the ’941
`
`[P]atent’s solution to the addressed problem is rooted in technology, and thus, is a ‘technical
`
`solution’” and also rejecting HTC’s argument that “the ’941 [P]atent recites a technological solution
`
`that is not novel and nonobvious.”
`
`24.
`
`This Court likewise issued a claim construction order construing or adopting the plain
`
`and ordinary meaning of various claims of the ’941 Patent, including (1) “non-volatile memory”; (2)
`
`“license”; (3) “license record”; (4) “volatile memory”; (5) “BIOS”; (6) “memory of the BIOS”; (7)
`
`“program”; (8) “selecting a program residing in the volatile memory”; (9) “using an agent to set up a
`
`verification structure in the erasable, non-volatile memory of the BIOS”; (10) “set up a verification
`
`structure”; (11) “verifying the program using at least the verification structure”; (12) “acting on the
`
`program according to the verification”; (13) “first non-volatile memory area of the computer”; (14)
`
`the Claim 1 preamble; and (15) the order of Claim 1 steps. Ancora Technologies, Inc. v. LG
`
`Electronics, Inc., 1:20-cv-00034-ADA, at Dkt. 69 (W.D Tex. June 2, 2020).
`
`25.
`
`Finally, and most recently, the United States District Court for the Central District of
`
`California issued a claim construction order construing the terms (1) “volatile memory”; (2)
`
`“selecting a program residing in the volatile memory”; (3) “set up a verification structure”; (4)
`
`
`
`5
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 6 of 32
`
`“license record”; (5) “memory of the BIOS”; and (6) the whole of Claim 8. Ancora Techs., Inc v.
`
`TCT Mobile (US), Inc., et al., No. 8:19-cv-02192-GW-AS, ECF No. 66 & 69 (C.D. Cal. Nov. 18-19,
`
`2020).
`
`COUNT 1 – INFRINGEMENT
`
`26.
`
`Plaintiff repeats and incorporates by reference each preceding paragraph as if fully set
`
`forth herein and further state:
`
`27.
`
`Google has infringed the ’941 Patent in violation of 35 U.S.C. § 271(a) by, prior to
`
`the expiration of the ’941 Patent, selling, and/or offering for sale in the United States, and/or
`
`importing into the United States, without authorization, products and/or operating system software
`
`for products that are capable of performing at least Claim 1 of the ’941 Patent literally or under the
`
`doctrine of equivalents and, without authorization, then causing such products to perform each step
`
`of at least Claim 1 of the ’941 Patent.
`
`28.
`
`At a minimum, such Accused Products include those servers/software utilized by
`
`Google to transmit an over-the-air (“OTA”) software update, as well as those smartphones, laptops,
`
`smart home devices and other devices and technology that included Google’s operating system
`
`software and to which Google sent or had sent an OTA update that caused such device to perform
`
`the method recited in Claim 1 prior to the expiration of the ’941 Patent.
`
`29.
`
`Such Accused Products include products like the Nexus 6P and Pixelbook, which—as
`
`detailed below—Google configured such that it would be capable of performing each step of Claim
`
`1 of the ’941 Patent and subsequently provided one or more OTA updates that caused the device to
`
`perform each step of Claim 1.1
`
`
`1 This description of infringement is illustrative and not intended to be an exhaustive or limiting
`explanation of every manner in which each Accused Product infringes the ’941 patent. Further, on
`information and belief, the identified functionality of the Nexus 6P and Pixelbook are representative
`of components and functionality present in all Accused Products.
`
`
`
`6
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 7 of 32
`
`30.
`
`Such Accused Products also include products like the Nexus 6, Nexus 9, Nexus
`
`Player, Nexus 6P, Google Pixel C, Chromebook Pixel, Pixelbook, Pixel Slate, Chromecast 1st
`
`Generation, Chromecast 2nd Generation, Chromecast Audio, Chromecast Ultra, Chromecast 3rd
`
`Generation, Google Home, Home Mini, Home Max, Home Hub / Nest Hub, Google Wifi AC1200,
`
`Nest Thermostat, Nest Thermostat v1.12, Nest Thermostat Generation 2, Nest Thermostat
`
`Generation 2 V2.8, Nest Protect, Nest Cam Indoor, Nest Thermostat Gen 3, Nest T3019US, Nest
`
`T3021US, Nest T3032US, Nest Cam Outdoor, Nest Cam IQ, Nest Secure, Nest Guard, Nest Detect,
`
`Nest Tag, Nest Hello, Nest Thermostat E, Nest T4000ES, and Nest T5000SF, as well as any
`
`predecessor models to such devices, to which Google sent, or had sent, an OTA update prior to the
`
`expiration of the ’941 Patent.
`
`31.
`
`For example, Claim 1 of the ’941 Patent claims “a method of restricting software
`
`operation within a license for use with a computer including an erasable, non-volatile memory area
`
`of a BIOS of the computer, and a volatile memory area; the method comprising the steps of: [1]
`
`selecting a program residing in the volatile memory, [2] using an agent to set up a verification
`
`structure in the erasable, non-volatile memory of the BIOS, the verification structure accommodating
`
`data that includes at least one license record, [3] verifying the program using at least the verification
`
`structure from the erasable non-volatile memory of the BIOS, and [4] acting on the program
`
`according to the verification.”
`
`32. When Google transmitted an OTA update like its Nexus 6P Version 7.0, 7.1, 8.0, and
`
`8.1 updates, Google performed and/or caused devices like the Nexus 6P to perform each element of
`
`Claim 1 as part of its Google-specified, pre-configured software update process:
`
`
`
`7
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 8 of 32
`
`https://android.googlesource.com/platform/external/avb/+/master/README.md#Build-System-
`Integration.
`
`
`
`
`
`
`https://source.android.com/devices/tech/ota.
`
`https://source.android.com/security/verifiedboot.
`
`
`
`8
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 9 of 32
`
`
`https://source.android.com/devices/tech/ota/nonab.
`
`
`
`33.
`
`In particular, each Nexus 6P contains both erasable, non-volatile memory in the form
`
`of flash memory and volatile memory in the form of RAM memory. Such non-volatile memory
`
`includes a cache or data partition which—on information and belief—is an example of BIOS
`
`memory:
`
`
`
`
`
`
`
`9
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 10 of 32
`
`https://support.google.com/nexus/answer/6102470?hl=en-
`GB&ref_topic=3415518#zippy=%2Cnexus-p.
`
`
`https://source.android.com/devices/tech/ota/nonab.
`
`34.
`
`Further, as detailed above, each Nexus 6P was configured by Google to repeatedly
`
`check to see if a new software update was available, including through the following method:
`
`
`
`https://support.google.com/nexus/answer/7680439?hl=en-GB&ref_topic=3415518.
`
`35.
`
`During this process, one or more OTA servers owned or controlled by Google set up
`
`a verification structure in the erasable, non-volatile memory of the BIOS of the Nexus 6P by
`
`transmitting to the device an OTA update, which the Nexus 6P is configured by Google to save to
`
`
`
`
`
`10
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 11 of 32
`
`the erasable, non-volatile memory of its BIOS. As noted previously, on information and belief, such
`
`BIOS areas include what Google refers to as the cache or data memory area partition.
`
`36.
`
`This OTA update contains a verification structure that includes data accommodating
`
`at least one license record.
`
`37.
`
`Examples of such a license record includes include a cryptographic signature or key:
`
`https://source.android.com/devices/tech/ota/sign_builds.
`
`38.
`
`Other examples include a cryptographic hash or hash tree:
`
`https://source.android.com/security/verifiedboot/verified-boot.
`
`
`
`11
`
`
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 12 of 32
`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 12 of 32
`
`What is it?
`
`Verified boot is the process of assuring the end user of the integrity of the software mnning on a device. It typically starts with a read—only portion of
`the device firmware which loads code and executes it only after cryptographically verifying that the code is authentic and doesn't have any known
`security flaws. AVB is one implementation of verified boot.
`
`The VBMeta struct
`
`The central data structure used in AVB isthe VBMeta struct. This data structure contains a number of descriptors {and other metadata) and all of this
`data is cryptographicallysigned. Descriptors are used for image hashes. image hashtree metadata. and socalled chainedpartitions A simple example
`is the following:
`
`vbmete
`
`Hash for boot
`Hashtree metadata for system
`Hashtree metadata for vendo r
`
`(signed by keyO)
`
`system
`payload
`hashtree
`
`vendor
`payload
`hashtree
`
`“'
`
`(”that
`partitions)
`
`where the vbmeta partition holds the hash for the boot partition in a hash descriptor. Forthe system and vendor partitions a hashtree follows
`the filesystem data and the vbmeta partition holds the root hash, salt. and offset of the hashtree in hashtree descriptors. Because the VBMeta struct
`in the vbmeta partition is cryptographically signed. the boot loader can check the signature and verify it was made by the owner of keyo (by e.g.
`embedding the public part of key@ land thereby trust the hashes used for boot . system , and vendor .
`
`A chained partition descriptor is used to delegate authority - it contains the name of the partition where authority is delegated as well as the public key
`that is tmsted for signatures on this particular partition. As an example. consider the following setup:
`
`
`
`
`
`
`
`vbmete
`Hash for boot
`Hashtree metadata for system
`Hashtree metadata for vendor
`
`Chained partitions:
`xyz —> keprub
`
`(signed by keyo)
`
`xyz
`payload
`hashtree
`vbmeta
`(signed by
`key?)
`
`footer
`
`...
`
`(other
`partitions)
`
`In this setup the xyz partition has a hashtree for integrity—checking. Following the hashtree is a VBMeta struct which contains the hashtree descriptor
`with hashtree metadata [root hash. salt offset. etc.) and this stmct is signed with keyl . Finally. at the end of the partition is a footer which has the
`offset of the VBMeta struct.
`
`This setup allows the bootloader to use the chain partition descriptor to find the footer at the end of the partition [using the name in the chain
`partition descriptor} which in turns helps locate the VBMeta struct and verify that it was signed by keyl [using key1_pub stored in the chain
`partition descriptor}. Cmcially. because there's a footer with the offset the xyz partition can be updated without the vbmeta partition needing any
`changes.
`
`
`
`
`
`12
`12
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 13 of 32
`
`https://android.googlesource.com/platform/external/avb/+/master/README.md#the-vbmeta-digest.
`
`
`39.
`
`Other examples include x509 and/or root certificate authority:
`
`
`
`https://source.android.com/devices/tech/ota/sign_builds.
`
`40.
`
`Once the verification structure has been set up in the BIOS, the Nexus 6P is
`
`configured by Google to reboot, load the OTA update into its volatile memory (e.g., RAM), and
`
`then use the at least one license record from the BIOS to verify the OTA update as part of its secure
`
`
`
`or verified boot process:
`
`https://source.android.com/devices/bootloader.
`
`
`
`
`
`13
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 14 of 32
`
`
`https://source.android.com/devices/tech/ota/nonab.
`
`
`
`41.
`
`If the OTA update is verified, the Nexus 6P is further configured to load and execute
`
`the update.
`
`https://source.android.com/devices/tech/ota/nonab.
`
`
`
`
`
`14
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 15 of 32
`
`42.
`
`Further, during the infringing time period, Google performed or caused to be
`
`performed each of the Claim 1 steps identified above by providing an OTA update to each Accused
`
`Product: https://developers.google.com/android/ota.
`
`43.
`
`In addition, during the infringing time period, when Google transmitted an OTA
`
`update to Chrome OS for Pixelbook, Google performed and/or caused devices like the Pixelbook to
`
`perform each element of Claim 1 as part of its Google-specified, pre-configured software update
`
`process.
`
`https://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot.
`
`
`
`
`
`15
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 16 of 32
`
`https://support.google.com/pixelbook/answer/9133875?hl=en.
`
`
`
`
`
`16
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 17 of 32
`
`https://chromium.googlesource.com/aosp/platform/system/update_engine/#Life-of-an-A_B-Update.
`
`44.
`
`In particular, each Pixelbook contains both erasable, non-volatile memory in the form
`
`of flash memory and volatile memory in the form of RAM memory. Such non-volatile memory
`
`includes an alternate partition or “slot” which—on information and belief—is an example of BIOS
`
`memory:
`
`https://support.google.com/pixelbook/answer/7503982?hl=en&ref_topic=7504137
`
`
`
`https://support.google.com/pixelbook/answer/7504948?hl=en.
`
`
`
`
`
`https://chromium.googlesource.com/aosp/platform/system/update_engine/#Life-of-an-A_B-Update.
`
`
`
`17
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 18 of 32
`
`45.
`
`Further, as detailed above, each Pixelbook was configured by Google to repeatedly
`
`check to see if a new software update was available, including through the following methods:
`
`https://support.google.com/pixelbook/answer/9134767?hl=en.
`
`https://support.google.com/pixelbook/answer/9133875?hl=en.
`
`
`
`18
`
`
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 19 of 32
`
`46.
`
`During this process, one or more OTA servers owned or controlled by Google set up
`
`a verification structure in the erasable, non-volatile memory of the BIOS of the Pixelbook by
`
`transmitting to the device an OTA update, which the Pixelbook is configured by Google to save to
`
`the erasable, non-volatile memory of its BIOS. As noted previously, on information and belief, such
`
`BIOS areas include what Google refers to as the target slot or inactive partition.
`
`47.
`
`This OTA update contains a verification structure that includes data accommodating
`
`at least one license record.
`
`48.
`
`Examples of such a license record include a cryptographic signature or key or a
`
`cryptographic hash or hash tree:
`
`https://chromium.googlesource.com/aosp/platform/system/update_engine/#Life-of-an-A_B-Update.
`
`
`
`
`
`19
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 20 of 32
`
`https://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot-data-structures
`
`https://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot-data-structures.
`
`
`
`https://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot-data-structures.
`
`
`
`
`
`20
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 21 of 32
`
`http://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot.
`
`49.
`
`Other examples include x509 and/or root certificate authority:
`
`
`
`
`
`https://chromium.googlesource.com/chromiumos/third_party/arm-trusted-firmware/+/v1.2-
`rc0/docs/trusted-board-boot.md.
`
`50.
`
`Once the verification structure has been set up in the BIOS, the Pixelbook is
`
`configured by Google to apply the update to the inactive partition or slot, and upon reboot, load the
`
`OTA update into its volatile memory (e.g., RAM), and then use the at least one license record from
`
`the BIOS to verify the OTA update as part of its secure or verified boot process prior to launching
`
`the operating system:
`
`
`
`21
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 22 of 32
`
`https://www.chromium.org/chromium-os/chromiumos-design-docs/firmware-boot-and-recovery.
`
`51.
`
`If the OTA update is verified, the Pixelbook is further configured to load and execute
`
`
`
`the update.
`
`
`
`22
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 23 of 32
`
`https://www.chromium.org/chromium-os/chromiumos-design-docs/verified-boot-data-structures.
`
`52.
`
`Further, during the infringing time period, Google performed or caused to be
`
`performed each of the Claim 1 steps identified above by providing an OTA update to each Accused
`
`
`
`Product.
`
`53.
`
`In addition, and as described above for the Google Nexus 6P and Pixelbook, during
`
`the infringing time period Google performed or caused to be performed each of the Claim 1 steps
`
`identified and described above when it transmitted an OTA update to other Accused Products such
`
`as the Chromecast or Nest Thermostat, Google performed and/or caused devices like the Chromecast
`
`and Nest Thermostat to perform each element of Claim 1 as part of its Google-specified, pre-
`
`configured software update process, including as reported by various third parties.
`
`
`
`23
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 24 of 32
`
`
`
`
`
`
`
`https://support.google.com/chromecast/answer/6292664?hl=en-IN.
`
`https://support.google.com/googlenest/answer/7188572?co=GENIE.Platform%3DAndroid&hl=en-
`AU.
`
`https://support.google.com/googlenest/answer/9335964?hl=en&co=GENIE.Platform=Android#z
`ippy=%2Chow-to-get-software-updates
`
`
`
`24
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 25 of 32
`
`https://support.google.com/googlenest/answer/7188572?co=GENIE.Platform%3DAndroid&hl=e
`n-AU.
`
`https://support.google.com/googlenest/answer/9263516?hl=en#zippy=%2Cnest-thermostat-e-and-
`nest-learning-thermostat.
`
`
`
`25
`
`
`
`
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 26 of 32
`
`https://dzone.com/articles/the-best-ways-to-update-iot-devices-over-the-air.
`
`https://arstechnica.com/gadgets/2018/10/google-home-hub-under-the-hood-its-nothing-like-other-
`google-smart-displays/.
`
`
`
`
`
`https://fenix.tecnico.ulisboa.pt/downloadFile/1689244997256539/MEIC-ist173009-Tomas-Pinho-
`resumo_alargado.pdf.
`
`54.
`
`Further, Google expressly conditions participation in the OTA update process and the
`
`receipt of the benefit of a software update on the performance of each of the above steps.
`
`55.
`
`Primarily, as described above, Google pre-configures/programs each Accused
`
`Product to perform the above described steps upon receiving an OTA update from Google.
`
`56.
`
`Further, Google not only set the time and conditions under which a user could receive
`
`and install an OTA update, but Google required all users to accept and install such updates.
`
`
`
`26
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 27 of 32
`
`57.
`
`For example, Google stated the following in its Terms of Service (applicable from
`
`April 14, 2014, to October 15, 2017):
`
`https://policies.google.com/terms/archive/20140414.
`
`58.
`
`As another example, Google stated the following in its March 25, 2014 Google
`
`
`
`Chrome OS Terms of Service:
`
`https://www.google.com/chromebook/termsofservice.html#index.
`
`59.
`
`As another example, Google stated the following in its Nest End User License
`
`Agreement (EULA):
`
`
`
`https://nest.com/legal/eula/.
`
`
`
`27
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 28 of 32
`
`60.
`
`As another example, Google stated that Google Nest Wifi and Google WiFi receives
`
`automatic software updates “to make sure you always have the latest security features and protection
`
`from recently discovered security threats”:
`
`
`
`https://support.google.com/googlenest/answer/6309220?hl=en&ref_topic=9832039.
`
`61.
`
`Further, Google emphasizes the benefits associated with using OTA updates to update
`
`the software of its Accused Products, including by advertising that, in one analysis, 87% of all Nexus
`
`owners were “running the latest security update after a month,” and that “it takes about one and a
`
`half
`
`calendar weeks
`
`for
`
`the OTA
`
`to
`
`reach
`
`every Google
`
`device”:
`
`https://source.android.com/devices/tech/ota/ab/ab_faqs; https://source.android.com/security/bulletin/
`
`pixel.
`
`62.
`
`As another example, Google stated that severe security vulnerabilities required
`
`critical or urgent action to apply OTA software updates as soon as possible, explaining: “The most
`
`severe of these issues are Critical security vulnerabilities in device-specific code that could enable
`
`arbitrary code execution within the context of the kernel, leading to the possibility of a local
`
`permanent device compromise, which may require reflashing the operating system to repair the
`
`device.” https://source.android.com/security/bulletin/2016-12-01.
`
`63.
`
`As another example, Google advertises the “great new features” and other benefits
`
`associated with updating Accused Products to new versions of the Android Operating System. See
`
`https://developer.android.com/about/versions/pie/android-
`
`
`
`28
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 29 of 32
`
`9.0; https://developer.android.com/about/versions/oreo; https://developer.android.com/about/version
`
`s/nougat; https://developer.android.com/about/versions/marshmallow.
`
`64.
`
`Google also identified the specific benefits associated with each OTA update:
`
`https://source.android.com/security/bulletin; https://source.android.com/security/bulletin/pixel;
`
`https://developer.android.com/about/versions;
`
`https://chromereleases.googleblog.com/search/label/Chrome%20OS;
`
`https://support.google.com/googlenest/answer/9263516?hl=en&ref_topic=9361783; .
`
`65.
`
`As another example, Google explains that its automatic updates to its Nest devices,
`
`such as
`
`the Nest Thermostat, “improve
`
`the performance of the Product Software”:
`
`https://nest.com/legal/eula/.
`
`66.
`
`As another example, Google states that its automatic updates to Chrome OS devices,
`
`such as its Pixelbook, “are designed to improve, enhance and further develop the Software and may
`
`take the form of bug fixes, enhanced functions, new software modules and completely new
`
`versions”: https://www.google.com/chromebook/termsofservice.html.
`
`67.
`
`Further, Google controlled the manner in which each OTA update could be
`
`performed, including by pre-configuring each Accused Product such that, upon receiving an OTA
`
`update from Google, the device would automatically perform each remaining step of the claimed
`
`method.
`
`68.
`
`Google also controlled the timing of the performance of such method by determining
`
`when to utilize its OTA servers/software to set up a verification structure in each Accused Product.
`
`69.
`
`For example, Google uses Google Cloud servers to transmit data to and support the
`
`Accused Products, including, on information and belief, its OTA servers to provide OTA updates to
`
`Accused Products.
`
`
`
`29
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 30 of 32
`
`70.
`
`Various third parties also have reported such functionality:
`
`https://www.fastcompany.com/90358396/that-major-google-outage-meant-some-nest-users-couldnt-
`unlock-doors-or-use-the-ac.
`
`
`
`
`
`30
`
`
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 31 of 32
`
`https://support.google.com/googlenest/thread/55022253/new-google-wifi-firmware-12871-57-12-
`bandwidth-speed-cut-in-half?hl=en.
`
`71.
`
`Google also had the right and ability to stop or limit infringement simply by not
`
`performing the initial step of using its OTA servers/software to set up a verification structure in each
`
`Accused Product. Absent this action by Google, the infringement at issue in this lawsuit would not
`
`have occurred.
`
`72.
`
`Google’s infringement has caused damage to Ancora, and Ancora is entitled to
`
`recover from Google those damages that Ancora has sustained as a result of Google’s infringement.
`
`DEMAND FOR JURY TRIAL
`
`73.
`
`Ancora hereby demands a jury trial for all issues so triable.
`
`PRAYER FOR RELIEF
`
`WHEREFORE, Plaintiff prays for judgment as follows:
`
`A.
`
`Declaring that Google has infringed United States Patent No. 6,411,941 in violation
`
`of 35 U.S.C. § 271;
`
`B.
`
`Awarding damages to Ancora arising out of this infringement, including enhanced
`
`damages pursuant to 35 U.S.C. § 284 and prejudgment and post-judgment interest, in an amount
`
`according to proof;
`
`C.
`
`Awarding such other costs and relief the Court deems just and proper, including any
`
`relief that the Court may deem appropriate under 35 U.S.C. § 285.
`
`Date: July 16, 2021
`
`
`
`
`
`
`
`
`
`/s/ Andres Healy
`
`Andres Healy (WA 45578)
`SUSMAN GODFREY LLP
`1201 Third Avenue, Suite 3800
`Seattle, Washington 98101
`Tel: (206) 516-3880
`Fax: 206-516-3883
`ahealy@susmangodfrey.com
`
`
`
`
`
`31
`
`

`

`Case 6:21-cv-00735 Document 1 Filed 07/16/21 Page 32 of 32
`
`Lexie G. White (TX 24048876)
`SUSMAN GODFREY LLP
`1000 Louisiana Street, Suite 5100
`Houston, Texas 77002
`Tel: (713) 651-9366
`Fax: (713) 654-6666
`lwhite@susmangodfrey.com
`
`Charles Ainsworth
`State Bar No. 00783521
`Robert Christopher Bunt
`State Bar No. 00787165
`PARKER, BUNT & AINSWORTH, P.C.
`100 E. Ferguson, Suite 418
`Tyler, TX 75702
`903/531-3535
`E-mail: charley@pbatyler.com
`E-mail: rcbunt@pbatyler.com
`
`COUNSEL FOR PLAINTIFF ANCORA
`TECHNOLOGIES, INC.
`
`
`
`
`
`32
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket