Facebook, Inc. v. BlackBerry Limited et al
Filing
1
COMPLAINT for Patent Infringement against BlackBerry Corporation, BlackBerry Limited ( Filing fee $ 400, receipt number 0971-12650708.). Filed byFacebook, Inc.. (Attachments: #1 Exhibit A, #2 Exhibit B, #3 Exhibit C, #4 Exhibit D, #5 Exhibit E, #6 Exhibit F, #7 Civil Cover Sheet)(Keefe, Heidi) (Filed on 9/4/2018)
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 1 of 118
1
2
3
4
5
6
7
8
9
COOLEY LLP
HEIDI L. KEEFE (178960)
(hkeefe@cooley.com)
MARK R. WEINSTEIN (193043)
(mweinstein@cooley.com)
MATTHEW J. BRIGHAM (191428)
(mbrigham@cooley.com)
LOWELL D. MEAD (223989)
(lmead@cooley.com)
3175 Hanover Street
Palo Alto, CA 94304-1130
Telephone: (650) 843-5000
Facsimile: (650) 849-7400
COOLEY LLP
MICHAEL G. RHODES (116127)
(rhodesmg@cooley.com)
101 California Street
5th Floor
San Francisco, CA 94111-5800
Telephone: (415) 693-2000
Facsimile: (415) 693-2222
Attorneys for Plaintiff
FACEBOOK, INC.
10
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF CALIFORNIA
11
12
13
14
15
16
Case No. 18-5434
FACEBOOK, INC.,
a Delaware corporation,
Plaintiff,
COMPLAINT FOR
PATENT INFRINGEMENT
v.
BLACKBERRY LIMITED,
a Canadian corporation, and
BLACKBERRY CORPORATION,
18 a Delaware corporation,
17
JURY TRIAL DEMANDED
Defendants.
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
1
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 2 of 118
COMPLAINT FOR PATENT INFRINGEMENT
1
2
1.
Plaintiff
Facebook,
(“Facebook”)
Limited
submits
(“BlackBerry
the
following
3
Complaint against
4
BlackBerry Corporation (“BlackBerry Corp.”) (collectively, “BlackBerry”):
Ltd.”)
and
NATURE OF THE ACTION
5
6
BlackBerry
Inc.
2.
Facebook brings this action against BlackBerry for infringement of
7
U.S. Patent No. 8,429,231 (“’231 patent”), U.S. Patent No. 7,567,575 (“’575 patent”),
8
U.S. Patent No. 6,356,841 (“’841 patent”), U.S. Patent No. 7,228,432 (“’432 patent”),
9
U.S. Patent No. 6,744,759 (“’759 patent”), and U.S. Patent No. 7,302,698
10
(“’698 patent”) (collectively “the Patents-in-Suit”).
FACEBOOK BACKGROUND
11
12
3.
Facebook’s mission is to give people the power to build community and
13
bring the world closer together. Facebook’s top priority is to build useful and engaging
14
products that enable people to connect and share with friends and family through mobile
15
devices, personal computers, and other surfaces. Facebook also helps people discover
16
and learn about what is going on in the world around them, enable people to share their
17
opinions, ideas, photos and videos, and other activities with audiences ranging from
18
their closest friends to the public at large, and stay connected everywhere by accessing
19
Facebook’s products, including:
20
•
21
Facebook. Facebook enables people to connect, share, discover,
and communicate with each other on mobile devices and
22
personal computers. There are a number of different ways to
23
engage with people on Facebook, the most important of which
24
is News Feed which displays an algorithmically-ranked series
25
of stories and advertisements individualized for each person.
26
27
•
through photos, videos, and direct messages. Instagram is also a
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
Instagram. Instagram is a community for sharing visual stories
CASE NO. 18-5434
2
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 3 of 118
1
2
place for people to stay connected with the interests and
3
communities that they care about.
4
•
Messenger. Messenger is a messaging application that makes it
5
easy for people to connect with other people, groups and
6
businesses across a variety of platforms and devices.
7
8
•
WhatsApp. WhatsApp is a fast, simple, and reliable messaging
application that is used by people around the world to connect
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
securely and privately.
4.
Facebook is also investing in a number of longer-term initiatives, such as
connectivity efforts, artificial intelligence research, and augmented and virtual reality,
to develop technologies that Facebook believes will help Facebook better serve
Facebook’s communities and pursue Facebook’s mission to give people the power to
build community and bring the world closer together.
5.
Facebook’s product development philosophy is centered on continuous
innovation in creating and improving products that are social by design, which means
that Facebook’s products are designed to place people and their social interactions at
the core of the product experience. As Facebook’s user base grows, and the level of
engagement from the people who use Facebook’s products continues to increase,
including with video, Facebook’s computing needs continue to expand. Facebook
makes significant investments in technology both to improve Facebook’s existing
products and services and to develop new ones, as well as for Facebook’s marketers and
developers. Facebook is also investing in protecting the security and integrity of
Facebook’s platform by investing in both people and technology to strengthen
Facebook’s systems against abuse.
research and development expenses of $7.75 billion, $5.92 billion, and $4.82 billion in
2017, 2016, and 2015, respectively.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
Facebook’s technology investments included
CASE NO. 18-5434
3
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 4 of 118
1
6.
To establish and protect Facebook’s proprietary rights, Facebook relies on
2
a combination of patents, trademarks, copyrights, trade secrets, including know-how,
3
license agreements, confidentiality procedures, non-disclosure agreements with third
4
parties, employee disclosure and invention assignment agreements, and other
5
contractual rights. In addition, to further protect Facebook’s proprietary rights, from
6
time to time Facebook has purchased patents and patent applications from third parties.
7
THE PARTIES
8
9
10
11
7.
Facebook is a corporation organized and existing under the laws of the
State of Delaware, having its principal place of business at 1601 Willow Road, Menlo
Park, CA 94025.
8.
Defendant BlackBerry Ltd. is a corporation organized and existing under
12
the laws of Canada, having its principal place of business at 2200 University Avenue
13
East, Waterloo, Ontario, Canada N2K 0A7.
14
9.
Defendant BlackBerry Corp. is a corporation organized and existing under
15
the laws of the State of Delaware. BlackBerry Corp. operates offices in the Northern
16
District of California, including locations at 3001 Bishop Drive, Suite 400, San Ramon,
17
CA 94583, 331 Fairchild Drive, Suite 300 & 1st Floor, Mountain View, CA 94043,
18
837 Arnold Drive, Suites 400 & 600, Martinez, CA 94553, and 2988 Campus Drive,
19
Suites 100, 110, 115, and 200, San Mateo, CA 94403.
JURISDICTION
20
21
10.
This is a civil action for patent infringement arising under the patent laws
22
of the United States, Title 35 of the United States Code. This Court has exclusive
23
subject matter jurisdiction over this complaint pursuant to 28 U.S.C. §§ 1331 and
24
1338(a).
25
11.
This Court has personal jurisdiction over BlackBerry. Upon information
26
and belief, BlackBerry has committed and continues to commit acts of infringement
27
giving rise to this action within California and within this judicial district. For example,
28
BlackBerry has committed and continues to commit acts of infringement in this District,
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
4
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 5 of 118
1
by among other things, using, offering for sale, and selling products that infringe the
2
Patents-in-Suit. Furthermore, BlackBerry does substantial business in California and
3
within this District. BlackBerry Corp. is registered to do business in the State of
4
California. BlackBerry Corp. also has offices and employees in California and within
5
this District, including its Principal Executive Office and Principal Business Office in
6
California located at 3001 Bishop Drive, Suite 400, San Ramon, CA 94583. On
7
information and belief, BlackBerry Corp. is a wholly owned subsidiary, directly or
8
indirectly, of BlackBerry Ltd., and BlackBerry Corp. conducts business in this judicial
9
district and in the United States on behalf of BlackBerry Ltd. In conducting business
10
in California and in this judicial district, BlackBerry derives revenue from the infringing
11
products being used, sold, imported, and/or offered for sale and providing service and
12
support to BlackBerry’s customers in California and this District.
VENUE
13
14
12.
Venue is appropriate in the Northern District of California pursuant to
15
28 U.S.C. §§ 1391(b) and (c) and 1400(b).
16
infringement within this judicial district giving rise to this action. BlackBerry has and
17
continues to conduct business in this District, including one or more acts of selling,
18
using, importing, and/or offering for sale infringing products or providing service to
19
customers in this District. In addition, BlackBerry Corp. has regular and established
20
places of business in this District including the office locations identified above.
21
BlackBerry Ltd. is not a resident of the United States and therefore may be properly
22
sued in this judicial district.
COUNT I: INFRINGEMENT OF U.S. PATENT NO. 8,429,231
23
24
25
26
BlackBerry has committed acts of
13.
Facebook incorporates by reference and re-alleges all foregoing
paragraphs of this Complaint as if fully set forth herein.
14.
Facebook is the owner by assignment of U.S. Patent No. 8,429,231
27
(“’231 patent”), entitled “Voice Instant Messaging,” including the exclusive right to
28
bring suit to enforce the patent and the exclusive right to obtain relief for infringement.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
5
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 6 of 118
1
The ’231 patent was duly and legally issued by the U.S. Patent and Trademark Office
2
on April 23, 2013. The patent properly claims priority to U.S. Application Ser.
3
No. 09/810,159, filed on March 19, 2001, which claims the benefit of U.S. Provisional
4
Application No. 60/189,974, filed on March 17, 2000, and U.S. Provisional Application
5
No. 60/239,917, filed on October 13, 2000.
6
15.
A true and correct copy of the ’231 patent is attached as Exhibit A.
7
16.
The ’231 Patent is valid and enforceable under the United States Patent
8
Laws.
SUMMARY OF INVENTION
9
10
17.
The ’231 patent traces its roots to America Online, Inc. (“AOL”).
11
In particular, the written description contained in the ’231 patent was originally filed on
12
behalf of AOL with substantially the same content on March 19, 2001. In 2012,
13
Facebook acquired hundreds of patents and related patent application rights that had
14
been previously held by AOL.
15
18.
Before the filing of the patent applications that led to the ’231 patent,
16
instant messaging involving the exchange of text messages between senders and
17
recipients was well-known and widely used. The patent’s Background section states,
18
for example, that AOL had provided subscribers with the ability to send and receive
19
instant messages and that instant messaging was becoming a preferred means of
20
communicating among online subscribers. (’231, col. 1:33-41.)
21
19.
The inventions of the ’231 patent provide techniques and related system
22
functionality for enabling voice communication between users of an instant messaging
23
system. The ’231 patent states that the described invention “relates generally to
24
transferring data between subscribers of a communications system and more
25
particularly to transferring audio data between subscribers of an instant messaging
26
host.” (Id., col. 1:13-16.) The patent describes the use of multiple communication
27
channels in an instant messaging system to enable voice communication. The patent
28
states, for example: “Voice communication may be enabled by establishing a generic
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
6
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 7 of 118
1
signaling interface channel, a control channel, and an audio channel between the sender
2
and the recipient.” (Id., col. 1:64-66.)
3
20.
Among other things, the ’231 patent describes that using multiple channels
4
including a generic signaling interface channel can protect users of the communication
5
system, such as by providing for the exchange of local IP addresses only when both
6
users permit the exchange. The patent states, for example: “In one implementation, a
7
talk tool establishes an active talk session using three communication channels: a
8
Generic Signaling Interface (GSI) channel, a control channel, and an audio channel.
9
The talk tool uses the GSI channel to establish the initial connection. During this
10
connection, the local IP addresses are exchanged. After the initial connection phase is
11
done, the GSI channel is no longer used.” (Id., col. 13:27-33.) The patent further states:
12
“By using the GSI channel, the exchange of local IP addresses is only done when both
13
users permit such an exchange, i.e., by clicking on the CONNECT UI. These actions
14
protect users from having their local EP [sic, IP] addresses automatically obtained
15
without their consent.” (Id., col. 13:27-38.)
16
21.
Consistent with these statements, the claims of the ’231 patent recite the
17
use of more than one channel, including a generic signaling interface channel, to
18
establish
19
(See ’231, Claims 1 and 10.)
20
22.
voice
communication
between
the
sender
and
the
recipient.
The ’231 patent also describes that the instant messaging system can
21
determine the voice communication capabilities of the recipient. The patent states, for
22
example: “Once the instant message is verified, the host 604 determines the capabilities
23
of the recipient (step 615). For example, the host 604 may monitor and update the
24
online status, client version, and device type of all connected subscribers in real time.
25
The capability to receive audio data may depend on hardware (e.g., device type),
26
software (e.g., client version), and/or transfer preferences (e.g., blocked screen names).
27
To be talk enabled, both the talk software and audio equipment must be available. The
28
host 604 then reports the capabilities of the recipient to the sender (step 620).” (Id., col.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
7
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 8 of 118
1
2
12:16-25.)
23.
Consistent with this description, each claim of the ’231 patent recites that
3
the invention includes steps or functions of determining voice communication
4
capabilities of the recipient and establishing voice communication “based on the
5
determined voice communication capabilities of the recipient and based on the
6
indication that the sender has selected the voice communication option.”
BLACKBERRY’S INFRINGEMENT
7
8
24.
BlackBerry has infringed and is continuing to infringe the ’231 patent by
9
making, using, selling and/or offering to sell in the United States, or importing into the
10
United States, products or processes that practice the ’231 patent in violation of
11
35 U.S.C. § 271(a), including without limitation its BBM Enterprise software product
12
and related functionality.
13
25.
BlackBerry’s infringement of the ’231 patent has caused and will continue
14
to cause damage to Facebook for which Facebook is entitled to recovery under
15
35 U.S.C. § 284.
16
26.
As set forth below, BlackBerry infringes the ’231 patent. The following
17
description is exemplary and illustrative of BlackBerry’s infringement based on
18
publicly available information. Facebook expects to further develop the evidence of
19
BlackBerry’s infringement after obtaining discovery from BlackBerry in the course of
20
this action.
21
27.
BBM Enterprise is an instant messaging application and associated system
22
that permits users to exchange text messages and engage in voice and video
23
communications. For example, a user of BBM Enterprise can select a telephone button
24
to initiate a voice call, as shown in the annotated screenshot below.
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
8
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 9 of 118
1
2
3
4
5
6
7
8
9
10
11
28.
BlackBerry infringes the ’231 patent in connection with BBM Enterprise.
The following exemplary figure from the ’231 patent, annotated in red, illustrates how
an instant messaging user can initiate voice communication by selecting a button.
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
9
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 10 of 118
1
2
3
4
5
29.
An illustrative description of BlackBerry’s infringement on an element-
by-element basis is provided below for exemplary claims of the patent.
1[p] A method comprising:
BlackBerry provides BBM Enterprise, which performs the method described
below, as used in a variety of different platforms.
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
(Source: BBM-Enterprise-latest-Security-Note-en.pdf at 6.)
[a] enabling presentation of a first communication graphical user
interface to a sender, the first communication graphical user interface
comprising one or more communication options including a voice
communication option;
BBM Enterprise enables presentation of a first communication graphical user
interface to a sender, the first communication graphical user interface comprising one
or more communication options including a voice communication option. For example,
BBM Enterprise uses a chat interface on the sender’s mobile device or computer that
presents a sender with an option to send a text message or a voice call.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
10
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 11 of 118
1
2
3
4
5
6
7
8
9
10
(Source: BBM Enterprise – Secure Cross-Platform Instant Messaging Demo, at 1:39
11
(published 10/31/2017) (annotated), available at
12
https://www.youtube.com/watch?v=4AhQS6LYHug.)
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
11
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 12 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
(Source: https://help.blackberry.com/en/bbm-enterprise-for-
20
android/current/help/uvm1474995230203.html)
21
22
[b] enabling presentation of a second communication graphical user
interface to a recipient;
23
BBM Enterprise enables presentation of a second communication graphical user
24
interface to a recipient. For example, the recipient of a BBM Enterprise message views
25
the received message in a BBM Enterprise communication interface displayed on the
26
recipient’s mobile device or computer.
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
12
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 13 of 118
1
2
3
4
5
6
7
8
9
(Source: BBM Enterprise – Secure Cross-Platform Instant Messaging Demo, at 1:39
10
(published 10/31/2017), available at
11
https://www.youtube.com/watch?v=4AhQS6LYHug.)
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
(Source: Apple Store, BBM Enterprise, https://itunes.apple.com/us/app/bbm-
27
enterprise/id1147293419?mt=8 (annotated).)
28
[c] determining voice communication capabilities of the recipient;
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
13
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 14 of 118
1
BBM Enterprise determines voice communication capabilities of the recipient.
2
For example, if a recipient can receive voice or video calls, voice and video icons are
3
presented to the sender of a message. In addition, an icon can be shown that identifies
4
that a contact can participate in BBM Voice calls, reflecting that the voice
5
communication capabilities of the contact (potential recipient) have been determined.
6
7
8
9
(Source: https://emm.b2b-
10
blackberry.net/dls/Manuals/BBM/PC/BBM_Enterprise_Windows-
11
macOS_1.2.UserGuide-en.pdf)
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
14
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 15 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
(Source: https://help.blackberry.com/en/bbm-enterprise-for-
20
android/current/help/uvm1474995230203.html)
[d] receiving, at a server, an indication that the sender has selected the
21
22
voice communication option; and
23
BBM Enterprise receives, at a server, an indication that the sender has selected
24
the voice communication option. For example, after a user selects the voice call icon,
25
a BBM Enterprise server receives a request from a sender to set up a voice call with a
26
recipient.
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
15
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 16 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
(Source: https://help.blackberry.com/en/bbm-protected-security/latest/bbm-protected-
17
security/sqp1464359148449.html)
18
[e] establishing, based on the determined voice communication
19
capabilities of the recipient and based on the indication that the sender
20
has selected the voice communication option, a voice communication
21
between the sender and the recipient using more than one channel
22
including at least a generic signaling interface channel.
23
BBM Enterprise establishes, based on the determined voice communication
24
capabilities of the recipient and based on the indication that the sender has selected the
25
voice communication option, a voice communication between the sender and the
26
recipient using more than one channel including at least a generic signaling interface
27
channel. The establishment of voice communication uses multiple channels including
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
16
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 17 of 118
1
a generic signaling interface channel. For example, voice communication established
2
between devices on Wi-Fi or cellular networks uses a generic signaling interface
3
channel and may use one or more cellular network channels or Wi-Fi channels.
4
IP addresses may be provided as part of establishing the voice communication. The
5
establishment of voice communication may also use one or more additional channels,
6
such as cellular network control channels as well as a channel through the BlackBerry
7
Infrastructure, which may be an encrypted channel.
8
9
10
11
12
13
14
15
16
17
18
19
20
(Source: https://help.blackberry.com/en/bbm-protected-security/latest/bbm-protected-
21
security/sqp1464359148449.html)
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
17
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 18 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
18
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 19 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
(Source: https://help.blackberry.com/en/bbm-protected-security/latest/bbm-protected-
22
security/zgh1464359194884.html)
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
19
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 20 of 118
1
2
3
4
5
6
7
8
9
(Source: BBM Enterprise – Secure Cross-Platform Instant Messaging Demo, at 1:48
10
(published 10/31/2017) (annotated), available at
11
https://www.youtube.com/watch?v=4AhQS6LYHug.)
12
3. The method of claim 1, wherein determining voice communication
13
capabilities of the recipient comprises determining whether the recipient
14
has enabled a hardware device for voice communication.
15
As explained with respect to Claim 1[c], BBM Enterprise determines voice
16
communication capabilities of the recipient comprising determining whether the
17
recipient has enabled a hardware device for voice communication. For example, BBM
18
Enterprise determines whether the recipient’s device hardware and/or software supports
19
voice communication.
20
4. The method of claim 1, wherein determining voice communication
21
capabilities of the recipient comprises determining whether the recipient
22
has enabled software for voice communication.
23
As explained with respect to Claim 1[c], BBM Enterprise determines voice
24
communication capabilities of the recipient comprising determining whether the
25
recipient has enabled software for voice communication. For example, BBM Enterprise
26
determines whether the recipient’s device hardware and/or software supports voice
27
communication.
28
6. The method of claim 1, further comprising reporting the voice
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
20
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 21 of 118
1
communication capabilities of the recipient to the sender.
2
BBM Enterprise reports the voice communication capabilities of the recipient to
3
the sender. For example, BBM Enterprise displays voice and video call icons if the
4
recipient has voice and video call capability, as discussed with respect to Claim 1[c].
5
9. The method of claim 1, wherein the more than one channel further
6
comprises a different communications channel than a control channel
7
associated with instant message communications between the sender and
8
the recipient.
9
BBM Enterprise uses more than one channel including a different
10
communication channel than a control channel associated with instant message
11
communications between the sender and recipient. For example, on information and
12
belief, a control channel is used for the text instant messaging in BBM Enterprise that
13
is different from a voice communications channel.
30.
14
15
including without limitation monetary damages no less than a reasonable royalty.
COUNT II: INFRINGEMENT OF U.S. PATENT NO. 7,567,575
16
31.
17
18
Facebook is entitled to relief as a result of BlackBerry’s infringement,
Facebook incorporates by reference and re-alleges all foregoing
paragraphs of this Complaint as if fully set forth herein.
32.
19
Facebook is the owner by assignment of U.S. Patent No. 7,567,575
20
(“’575 patent”), entitled “Personalized multimedia services using a mobile service
21
platform,” including the exclusive right to bring suit to enforce the patent and the
22
exclusive right to obtain relief for infringement. The ’575 patent was duly and legally
23
issued by the U.S. Patent and Trademark Office on July 28, 2009. The patent is based
24
on U.S. Patent Application Ser. No. 10/136,540 filed on May 1, 2002, and claims the
25
benefit of U.S. Provisional Application No. 60/317,712, filed on Sep. 7, 2001.
26
33.
A true and correct copy of the ’575 patent is attached as Exhibit B.
27
34.
The ’575 patent is valid and enforceable under the United States Patent
28
Laws.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
21
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 22 of 118
SUMMARY OF INVENTION
1
2
35.
The ’575 patent originated with AT&T Corp. (“AT&T”), as reflected on
3
the face of the patent. At the time of the patent filing, AT&T identified itself as among
4
the world’s premier voice, video, and data communications companies, serving
5
consumers, businesses, and government. Backed by the research and development
6
capabilities of AT&T Labs, AT&T ran the world’s largest, most sophisticated
7
communications network, was the largest cable operator in the U.S., was a leading
8
supplier of data and Internet services for businesses, and offered outsourcing, consulting
9
and networking-integration to large businesses, according to the company.
10
36.
Before the filing of the ’575 patent, users of mobile devices could access
11
content on the Internet over a wireless connection. (See ’575, col. 1:24-49.) However,
12
according to the ’575 patent, accessing multimedia data on the Internet from a mobile
13
device over a wireless connection was often unreliable and could suffer from congestion
14
and problematic transmission conditions.
15
“[w]ireless access links suffer from severe transmission conditions, such as narrow
16
bandwidth, higher bit error rates and high latency.” (Id., col. 2:12-14.) “Another
17
problem with wireless links is congestion of the control and request channels when these
18
channels are used simultaneously to deliver the multimedia content.” (Id., col. 2:22-
19
25.) According to the ’575 patent, “[i]t would, therefore, be desirable to provide
20
personal multimedia services delivered over a wireless communication channel to a
21
variety of mobile device types while minimizing congestion of the control and request
22
paths. It would further be desirable to provide a mobile service platform and separate
23
multimedia servers having distinct channels for delivering transcoded multimedia data
24
and adapting the delivery of the multimedia data to fluctuations of the wireless
25
communication channel conditions.” (Id., col. 2:26-34.)
26
37.
For example, according to the patent,
The invention of the ’575 patent addresses these perceived needs.
27
The invention provides a mobile platform to deliver multimedia (for example, graphics,
28
video, and/or audio) with a request path and control channel to minimize congestion
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
22
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 23 of 118
1
while leveraging the identity of the mobile user and a profile of the mobile device. The
2
patent identifies a number of technological improvements to computer network
3
functionality that flow from the invention, such as the following:
4
“In one aspect of the invention, a method for providing multimedia data
5
from at least one controllable multimedia source to a mobile device includes providing
6
a request path from the mobile device to a mobile service platform, receiving a request
7
from the mobile device, obtaining a device profile from the mobile device,
8
authenticating the identity of a user of the mobile device, and determining a user profile
9
in response to the user identity. The method further includes authorizing control and
10
access to the at least one multimedia source, providing a control channel from the
11
mobile service platform to at least one multimedia server, providing multimedia data
12
delivery information to the at least one multimedia server, and providing multimedia
13
data to the mobile device in response to the request via the at least one multimedia
14
server. With such a technique, personal multimedia services are delivered over a
15
wireless communication channel to a variety of mobile device types while minimizing
16
congestion of the control and request paths, and a mobile user can control multimedia
17
sources over the wireless channel. By routing the control paths through the mobile
18
service platform and the content delivery paths through multimedia servers, the control,
19
transcoding, and multimedia delivery functions are handled efficiently without
20
overloading any particular communications pipe. The inventive technique enables
21
different modes of communication from a multitude of handheld devices for efficient
22
and personalized multimedia delivery.” (Id., col. 2:60-3:18.)
23
“In general, the present invention provides personalized multimedia
24
service by integrating a mobile service platform, and a plurality of multimedia servers
25
for wireless multimedia delivery. The mobile service platform operates as a message
26
gateway for allowing mobile devices using various protocols on different access
27
networks to access multimedia resources on the Internet and various other networks.
28
The mobile service platform includes a flexible architecture having a plurality of
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
23
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 24 of 118
1
components that cooperate to service mobile device service requests.” (Id., col. 4:19-
2
28.)
3
38.
The claims of the ’575 patent, which includes claim 1 and the claims that
4
depend from claim 1, reflect these technological benefits to computer network
5
functionality. Claim 1 recites a method for providing multimedia data from at least one
6
controllable source to a mobile device, consistent with the specification’s descriptions
7
for personalized multimedia data delivery where a mobile user can control multimedia
8
sources. As described in the specification, by using the inventive technique for
9
authorizing control and access to the at least one multimedia source, providing a control
10
channel from the mobile service platform to at least one multimedia server, providing
11
multimedia data delivery information to the at least one multimedia server, and
12
providing multimedia data to the mobile device in response to the request via the at least
13
one multimedia server, as reflected in claim 1, personal multimedia services can be
14
delivered over a wireless communication channel to a variety of mobile device types
15
while minimizing congestion of the control and request paths, and a particular mobile
16
user can exercise control over multimedia sources through the wireless channel.
17
39.
Claim 1 further recites steps including providing a request path from the
18
mobile device to a mobile service platform, providing a control channel from the mobile
19
service platform to at least one multimedia server, and providing multimedia data to the
20
mobile device via the at least one multimedia server. These features of claim 1 further
21
reflect the specification’s teachings that by routing the control paths through the mobile
22
service platform and the content delivery paths through multimedia servers, the control
23
and multimedia delivery functions are handled efficiently without overloading any
24
particular communications pipe, and that the inventive technique enables different
25
modes of communication from a multitude of handheld devices for efficient and
26
personalized multimedia delivery.
27
28
40.
Furthermore, claim 1 recites steps of obtaining a device profile,
authenticating the identity of a user of the mobile device, determining a user profile
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
24
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 25 of 118
1
corresponding to the user identity, and authorizing control and access to the at least one
2
multimedia source. These features reflect the specification’s descriptions of how the
3
invention provides benefits including personal multimedia services and personalized
4
multimedia delivery.
BLACKBERRY’S INFRINGEMENT
5
6
41.
BlackBerry has infringed and is continuing to infringe the ’575 patent by
7
making, using, selling and/or offering to sell in the United States, or importing into the
8
United States, products or processes that practice the ’575 patent in violation of
9
35 U.S.C. § 271(a), including without limitation its BlackBerry UEM (Unified
10
Endpoint Manager) product and related functionality, which were formerly named
11
BlackBerry Enterprise Server (BES) in various versions, including its implementation
12
with BlackBerry’s Secure Connect Plus product and related functionality.
13
14
15
42.
BlackBerry’s infringement of the ’575 patent has caused and will continue
to cause damage for which Facebook is entitled to recovery under 35 U.S.C. § 284.
43.
As set forth below, BlackBerry infringes the ’575 patent. The following
16
description is exemplary and illustrative of BlackBerry’s infringement based on
17
publicly available information. Facebook expects to further develop the evidence of
18
BlackBerry’s infringement after obtaining discovery from BlackBerry in the course of
19
this action.
20
44.
The BlackBerry UEM product provides endpoint management and policy
21
control for devices and apps. BlackBerry provides a cloud-based solution hosted by
22
BlackBerry. BlackBerry Secure Connect Plus is a BlackBerry UEM component that
23
provides a secure IP tunnel between apps and an organization’s network. A network
24
architecture illustration by BlackBerry is provided below, with the red annotation
25
added.
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
25
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 26 of 118
1
2
3
4
5
6
7
8
9
10
11
45.
An illustrative figure from the ’575 patent is provided below, with the red
annotation added around an exemplary mobile service platform.
12
13
14
15
16
17
18
19
20
21
22
23
24
25
46.
An illustrative description of BlackBerry’s infringement on an element-
by-element basis is provided below for exemplary claims of the patent.
26
1[p] A method for providing multimedia data from at least one
27
controllable multimedia source to a mobile device comprising:
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
26
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 27 of 118
1
BlackBerry UEM, including its implementation with Secure Connect Plus,
2
provides for the secure transfer of data between the source and the device. According
3
to BlackBerry, UEM helps “[s]ecure and manage mobile devices, laptops and other
4
endpoints across different operating systems and ownership models. Control user access
5
to business apps, data and content. And do it all from a single, easy-to-use management
6
console, with an extensive set of policies and profiles to suit your needs.”
7
(Source: https://us.blackberry.com/content/dam/blackberry-com/PDF/enterprise/ds-
8
blackberry-uem.pdf)
9
10
11
12
13
14
15
16
17
18
19
20
21
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
22
ake1452094272560.html)
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
27
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 28 of 118
1
2
3
4
5
6
7
8
9
10
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
lsh1428958213732.html)
11
12
13
14
15
16
17
18
19
20
21
22
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
23
lsh1428958213732.html)
24
25
[a] providing a request path from the mobile device to a mobile service
platform;
26
BlackBerry UEM, including implementations with Secure Connect Plus,
27
includes functionality that allows a mobile device to request secure access to data from
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
28
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 29 of 118
1
the user’s organization. In order for a mobile device to access the data through
2
BlackBerry UEM, the user may activate their device using a supplied username and
3
password. For many types of devices, this activation is done through the UEM Client
4
application in communication with the UEM server, which may be a cloud
5
implementation. UEM provides a request path from the user’s device to the mobile
6
service platform in the cloud. The request path passes between the mobile device and
7
the organizational content through BlackBerry’s UEM architecture.
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
24
ake1452094272560.html)
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
29
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 30 of 118
1
2
3
4
5
6
7
8
9
10
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
ake1452094272560.html)
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
ake1452094272560.html)
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
30
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 31 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
(Source: http://help.blackberry.com/en/blackberry-uem/current/administration/
15
blackberry-uem-client.html)
16
[b] receiving a request from the mobile device;
17
BlackBerry UEM includes functionality that receives requests from mobile
18
devices, such as a request to permit the device to obtain a secure connection between
19
the device and an organization’s apps or related content.
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
31
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 32 of 118
1
2
3
4
5
6
7
8
9
10
11
12
(Source: http://help.blackberry.com/en/blackberry-uem/current/administration/
13
blackberry-uem-client.html)
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
32
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 33 of 118
1
2
3
4
5
6
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
7
lsh1428958213732.html)
8
[c] obtaining a device profile from the mobile device;
9
In order to activate a device and establish a connection on BlackBerry UEM, a
10
mobile device is required to send certain information to BlackBerry UEM, including
11
sending encrypted CSR and HMAC information.
12
connection with requesting information from a remote source, the mobile device also
13
transmits device profile data (information about the mobile device) to the UEM server
14
or cloud implementation, such as the device type, operating system, and/or other profile
15
information.
On information and belief, in
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
33
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 34 of 118
1
2
3
4
5
6
7
8
9
10
11
12
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
13
kja1394733078938.html)
14
15
16
17
18
19
20
21
22
23
24
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/administration/activation-
25
profile.html)
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
34
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 35 of 118
1
2
3
4
5
6
7
8
9
10
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/administration/
activating_devices.html)
11
12
13
14
15
16
17
(Source: http://help.blackberry.com/en/blackberry-uem-client-for-android/current/
18
user-guide/mws1480630841555.html)
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
35
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 36 of 118
1
(Source: http://help.blackberry.com/en/blackberry-uem/current/administration/
2
creating-a-device-group.html)
3
[d] authenticating the identity of a user of the mobile device;
4
BlackBerry UEM requires a user to activate the user’s device before accessing
5
the secure network. This activation process requires an assigned username and
6
password, or the work email and password associated with the user. This information
7
required for activation authenticates the identity of the user. In addition, the UEM
8
server or cloud implementation authenticates the identity of the user of the mobile
9
device in connection with requests from the mobile device to the cloud implementation.
10
According to BlackBerry, the BlackBerry Infrastructure provides a trusted path between
11
the organization and every user based on mutual authentication.
12
13
14
15
(Source: https://us.blackberry.com/content/dam/blackberry-com/PDF/enterprise/ds-
16
blackberry-uem.pdf)
17
18
19
20
(Source: https://us.blackberry.com/content/dam/blackberry-com/PDF/enterprise/ds-
21
blackberry-uem.pdf)
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
36
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 37 of 118
1
2
3
4
5
6
7
8
9
10
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/administration/
activating_devices.html)
11
12
13
14
15
16
17
18
19
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
20
ake1452094272560.html)
21
[e] determining a user profile corresponding to the user identity;
22
Once a device has been activated with BlackBerry UEM using a username and
23
password assigned to the user, and when a user’s mobile device seeks access through
24
the network, the system can determine that a user profile has been created. This user
25
account allows the administrator to assign IT policies and profiles to make sure the
26
appropriate features are available to the user.
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
37
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 38 of 118
1
2
3
4
(Source: https://us.blackberry.com/content/dam/blackberry-com/PDF/enterprise/ds-
5
blackberry-uem.pdf)
6
7
8
9
(Source: http://help.blackberry.com/en/blackberry-uem/current/administration/
managing_user_groups_and_user_accounts.html)
10
11
12
13
14
15
(Source: http://help.blackberry.com/en/blackberry-uem/current/administration/
adr1374514829642.html)
16
17
18
19
20
21
22
23
24
(Source: http://help.blackberry.com/en/blackberry-uem/current/administration/
ake1371676480571.html)
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
38
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 39 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/administration/
activating_devices.html)
[f] authorizing control and access to the at least one multimedia source;
Once a device has been activated with BlackBerry UEM, the system recognizes
the device profile that has been created by the administrator. For example, the device
profile directs what productivity apps the device has been assigned, the degree of
protection based on the user’s role and assigns IT policies and profiles to make sure the
appropriate features are available to the mobile device. The system authorizes control
and access to the multimedia source such as a corporate intranet or other multimedia
content repository. Examples of multimedia content identified by the ’575 patent
include “image media such as GIF, JPEG and PNG; audio media such as Real Audio,
wav, au; and video files such as QuickTime, MPEG, and Motion JPEG.” (’575, col.
9:36-41.)
22
23
24
25
(Source: https://us.blackberry.com/content/dam/blackberry-com/PDF/enterprise/dsblackberry-uem.pdf)
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
39
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 40 of 118
1
2
3
4
5
6
7
8
9
10
11
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/administration/activation-
12
profile.html)
13
14
15
16
17
18
19
20
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/administration/
21
activating_devices.html)
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
40
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 41 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
14
lsh1428958213732.html)
15
[g] obtaining a mobile device transmission profile;
16
Once a device has been activated with BlackBerry UEM, the system recognizes
17
the device profile and user account that has been created by the administrator. The
18
device profile includes work connection functionality, which defines how devices
19
connect to work resources, such as content servers, for data transfer. On information
20
and belief, in order to transmit data, the system obtains a mobile device transmission
21
profile (e.g., information that describes the protocol of the wireless channel
22
environment), such as data describing the Wi-Fi and/or application transmission
23
protocols used in order to transmit data.
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
41
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 42 of 118
1
2
3
4
5
6
7
(Source: http://help.blackberry.com/en/blackberry-uem/current/administration/
8
wnw1513879285859.html)
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
42
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 43 of 118
1
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
2
car1398183904582.html)
3
4
5
6
7
8
9
10
11
12
13
14
15
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
16
lsh1428958213732.html)
17
18
[h] providing a control channel from the mobile service platform to at
least one multimedia server;
19
BlackBerry UEM, including implementation with Secure Connect Plus, has
20
functionality that communicates with devices to create a secure tunnel for data transfer
21
from the device to the app. For example, BSCP signaling includes both a TLS tunnel
22
and a DTLS tunnel with transcoder as illustrated below.
23
24
25
Data flow: Accessing an application or content server using BlackBerry Secure
Connect Plus
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
43
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 44 of 118
1
2
3
4
5
6
7
8
9
10
11
12
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
13
lsh1428958213732.html)
14
15
16
17
18
19
20
21
22
23
(Source: http://devblog.blackberry.com/2015/07/bes12-v12-2-and-the-blackberry-
24
secure-connect-plus-transport/)
25
26
[i] providing multimedia data delivery information to the at least one
multimedia server; and
27
Multimedia data delivery information is provided to the multimedia server. For
28
example, transmission-related data passes through BlackBerry UEM and its
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
44
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 45 of 118
1
components.
2
3
4
5
6
7
8
9
10
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
ake1452094272560.html)
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
45
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 46 of 118
1
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
2
lsh1428958213732.html)
3
4
[j] providing multimedia data to the mobile device in response to the
request via the at least one multimedia server.
5
BlackBerry UEM responds to a request from a mobile device, creates a secure
6
connection for data transfer, connects to third-party apps, and transmits data through
7
BlackBerry UEM, and the data is then delivered to the end-user’s mobile device.
8
BlackBerry UEM provides the multimedia data to the mobile device, serving as an
9
intermediary between the multimedia server and the mobile device.
10
11
12
13
14
15
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
16
lsh1428958213732.html)
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
46
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 47 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
(Source: http://help.blackberry.com/en/blackberry-uem/current/architecture/
25
lsh1428958213732.html)
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
47
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 48 of 118
1
2
3
4
5
6
7
8
9
10
11
(Source: http://help.blackberry.com/en/blackberry-uem/12.7/architecture/
ake1452094272560.html)
3. The method of claim 1 further comprising providing a user control
12
path from the mobile device to the at least one controllable multimedia
13
source via the at least one multimedia server for controlling the at least
14
controllable multimedia source from the mobile device.
15
BlackBerry UEM provides a user control path from the mobile device to the at
16
least one controllable multimedia source via the at least one multimedia server for
17
controlling the at least controllable multimedia source from the mobile device, as
18
discussed above with respect to Claim 1. UEM provides a path for a user of a mobile
19
device, such as a smartphone, connected to a multimedia source, such as a corporate
20
intranet, to control the multimedia source from the mobile device.
21
4. The method of claim 1 further comprising providing a user control
22
path from the mobile device to the at least one controllable multimedia
23
source via the mobile service platform for controlling the at least
24
controllable multimedia source from the mobile device.
25
BlackBerry UEM provides a user control path from the mobile device to the at
26
least one controllable multimedia source via the mobile service platform for controlling
27
the at least controllable multimedia source from the mobile device, as discussed above
28
with respect to Claim 1. UEM provides a path for a user of a mobile device, such as a
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
48
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 49 of 118
1
smartphone, connected to a multimedia source, such as a corporate intranet, to control
2
the multimedia source from the mobile device.
22. The method of claim 1 wherein the mobile device includes devices
3
4
selected from the group consisting of SMS mobile phones, WAP mobile
5
phones, PDA devices, Instant Messaging devices, e-mail devices, two
6
way pagers, pocket PCs, handheld PCs, and smart phones.
7
BlackBerry UEM can connect to a host of devices, including mobile phones,
8
laptops, and even wearable headsets. BlackBerry’s UEM helps “[s]ecure and manage
9
mobile devices, laptops and other endpoints across different operating systems and
10
ownership models. Control user access to business apps, data and content. And do it all
11
from a single, easy-to-use management console, with an extensive set of policies and
12
profiles to suit your needs.”
13
(Source: https://us.blackberry.com/content/dam/blackberry-com/PDF/enterprise/ds-
14
blackberry-uem.pdf)
15
16
17
18
19
20
21
(Source: http://help.blackberry.com/en/blackberry-uem/current/overview-and-whats-
22
new/dsc1395171862872.html)
23
24
25
26
27
28
47.
Facebook is entitled to relief as a result of BlackBerry’s infringement,
including without limitation monetary damages no less than a reasonable royalty.
COUNT III: INFRINGEMENT OF U.S. PATENT NO. 6,356,841
48.
Facebook incorporates by reference and re-alleges all foregoing
paragraphs of this Complaint as if fully set forth herein.
49.
Facebook is the owner by assignment of U.S. Patent No. 6,356,841
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
49
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 50 of 118
1
(“’841 patent”), entitled “G.P.S. management system,” including the exclusive right to
2
bring suit to enforce the patent and the exclusive right to obtain relief for infringement.
3
The ’841 patent was duly and legally issued by the U.S. Patent and Trademark Office
4
on March 12, 2002. The patent is based on U.S. Patent Application Ser. No. 09/474,368
5
filed on December 29, 1999.
6
50.
A true and correct copy of the ’841 patent is attached as Exhibit C.
7
51.
The ’841 patent is valid and enforceable under the United States Patent
8
Laws.
SUMMARY OF INVENTION
9
10
52.
The ’841 patent originated with BellSouth Intellectual Property
11
Corporation, as indicated on the face of the patent. BellSouth Intellectual Property
12
Corporation was affiliated with telecommunications provider BellSouth Corp., which
13
traced its roots to the AT&T corporate family. BellSouth Corp. was acquired by AT&T
14
Inc. in 2006 for a reported $85.8 billion.
15
53.
The ’841 patent notes that Global Positioning System (GPS) data was
16
known and used prior to the patented invention, but its use was limited and subject to a
17
number of drawbacks. As stated in the patent: “One of the drawbacks of conventional
18
G.P.S. systems is the local and isolated nature of the G.P.S. information. Currently, the
19
position information is only sent to the local user and the location history, or where the
20
user has been, cannot be determined. Furthermore, conventional G.P.S. systems do not
21
allow centralized storage and processing of information and conventional G.P.S.
22
systems cannot track multiple G.P.S. users.” (’841, col. 1:17-24.)
23
54.
The invention of the ’841 patent provides centralized tracking and analysis
24
from a “central location,” enabling one or more remote devices and their associated
25
items, such as vehicles, to be tracked centrally. The patent states: “The invention
26
generally allows accurate and convenient tracking and management of multiple G.P.S.-
27
equipped remote entities.” (’841, col. 2:55-57.) The inventive system reflected in the
28
patent also includes numerous additional features that provide benefits as described in
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
50
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 51 of 118
1
the specification. For example, “the system includes provisions that allow information
2
stored in the remote unit to be transmitted to the central location during periods of
3
relative inactivity. This feature allows information to be transferred from the remote
4
unit to the central location without interfering with the function of the system during
5
busy or active periods of time.” (Id., col. 1:61-67.)
6
55.
The invention also provides additional benefits such as a power-saving
7
state to conserve power usage by the remote GPS-equipped device. The patent includes
8
a section entitled “Power Conservation Features” that states as follows:
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
The invention includes provisions to conserve power. When
the system detects an ignition off condition, the system
processes all of the computing steps associated with the
detection of an ignition off condition, and then the ICU enters
a ‘sleep’ mode in order to reduce power consumption. When
in sleep mode, power shall be supplied only to those
components that must still function when the vehicle is not
moving.
During the “sleep mode” the alert call features, including the
RAT (Remote Alert Transmitter) button, still function. The
preferred way the system allows the alert call feature to
function during a state of ‘sleep,’ such that the system comes
out of sleep mode when the system senses an activation of a
technician alert call, either from an in-vehicle button or a
remote button, and the ICU comes out of the sleep mode long
enough to perform alert call processing functions.
System parameters, location of the vehicle, and other stored
data is maintained while the ICU is in sleep mode. Turning
the vehicle ignition on causes the ICU to come out of the sleep
mode and resume normal processing.
Preferably, the ICU is designed to conserve power during all
of its operating modes. Primary vehicle power consumption
by all G.P.S. components within the vehicle should not to
exceed 1 Amp hour for any twenty-four hour period.
(’841, col. 11:45-12:2.)
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
51
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 52 of 118
1
56.
The claims of the ’841 patent, including the claims infringed by
2
BlackBerry, reflect the technological benefits and advantages over the prior art that the
3
specification describes. For example, claims 12 and 26 recite that a remote unit
4
receiving GPS information has a first state where it consumes a first quantity of power
5
and a second state where it consumes a second quantity of power. These claim features
6
reflect the specification’s teachings that the invention includes provisions to conserve
7
power, such as a “sleep” mode and related functionality to reduce power consumption.
8
Claim 12 further recites that where the remote unit stores the GPS information in a
9
memory and transmits the GPS information to a central location when the unit is in a
10
second state, and claims 19 and 25 recite that the remote unit detects a loss of GPS
11
signal and stores information associated with the loss of signal, reflecting the data
12
storage-related features of the invention as described in the specification.
BLACKBERRY’S INFRINGEMENT
13
14
57.
BlackBerry has infringed and is continuing to infringe the ’841 patent by
15
making, using, selling and/or offering to sell in the United States, or importing into the
16
United States, products or processes that practice the ’841 patent in violation of
17
35 U.S.C. § 271(a), including without limitation BlackBerry’s Radar products,
18
including Radar-L and Radar-M, and related software products and system
19
functionality.
20
21
22
58.
BlackBerry’s infringement of the ’841 patent has caused and will continue
to cause damage for which Facebook is entitled to recovery under 35 U.S.C. § 284.
59.
As set forth below, BlackBerry infringes the ’841 patent. The following
23
description is exemplary and illustrative of BlackBerry’s infringement based on
24
publicly available information. Facebook expects to further develop the evidence of
25
BlackBerry’s infringement after obtaining discovery from BlackBerry in the course of
26
this action.
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
52
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 53 of 118
1
60.
BlackBerry’s Radar products provide asset tracking and monitoring
2
functionality. Using web-based software, customers can view the locations of assets,
3
such as trucks in a fleet, which have Radar devices installed. An illustration by
4
BlackBerry of the Radar Dashboard user interface is provided below.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
(Source: https://us.blackberry.com/qnx-radar/trailer-chassis-and-container-tracking/
20
radar-solution/radar-services)
21
61.
Illustrative figures from the ’841 patent are provided below.
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
53
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 54 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
54
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 55 of 118
1
2
3
4
5
6
7
8
9
10
11
12
(’841, Figs. 15 and 17.)
62.
An illustrative description of BlackBerry’s infringement on an element-
by-element basis is provided below for exemplary claims of the patent.
12[p]. A system comprising:
13
BlackBerry’s Radar products including associated software comprise an asset
14
tracking system. The Radar device contains sensors and attaches to commercial
15
vehicles and reports various vehicle conditions including location, motion, humidity,
16
and door events. The reports can be provided to a central location, such as to monitor
17
a truck fleet that has Radar devices installed.
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
55
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 56 of 118
1
2
3
4
5
(Source: https://us.blackberry.com/qnx-radar/trailer-chassis-and-container-tracking/
6
radar-solution/radar-services)
12[a] (a) a central location;
7
8
As shown above, the Radar system includes a central location, such as a location
9
from which the Radar devices and associated assets are monitored. BlackBerry states
10
that
11
(Source: https://docs.radar.blackberry.com/.)
12
Dashboard interface through the web at https://dashboard.radar.blackberry.com/.
13
it
provides
“securely
hosted
cloud
services”
for
Radar.
BlackBerry directs users to access a
12[b] (b) a remote unit in communication with the central location, the
14
remote unit in communication with a Global Positioning System receiver
15
and receiving Global Positioning System information from the Global
16
Positioning System receiver; wherein
17
The BlackBerry Radar-L and Radar-M asset tracker devices each contain
18
components including sensor and processing components and a GPS receiver.
19
Each device contains components that communicate with the central location such as
20
by transmitting location and sensor data.
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
56
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 57 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
12[c] the remote unit having a first state wherein the remote unit
consumes a first quantity of power and a second state where the remote
unit consumes a second quantity of power, the first quantity of being
greater than the second quantity of power;
16
The remote unit has multiple different states that consume different quantities of
17
power. For example, when a Radar device has a low battery and/or detects a low
18
temperature and is not in continuous motion, the data update rate will be decreased (for
19
example, decreasing the data update rate from the default 15 minutes to 30 minutes or
20
more) “to maintain battery life.” By decreasing the data update rate, the device
21
consumes less power and therefore maintains battery life.
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
57
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 58 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
(Source: https://docs.radar.blackberry.com/guides/user_guide_asset/#low-
20
temperature-or-low-battery-conditions )
21
12[d] the remote unit storing the Global Positioning System information
22
in a memory wherein the remote unit transmits the Global Positioning
23
System information to the central location when the remote unit is in the
24
second state.
25
The remote unit stores GPS data in a memory. For example, in normal operation,
26
a Radar device takes data readings every 5 minutes and uploads data to the network
27
every 15 minutes, confirming that the device stores the data in a memory.
28
In the second state of operation (lower-power state with low battery and/or low
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
58
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 59 of 118
1
temperature), the device also transmits GPS data to the central location at a different
2
rate, as indicated by the evidence cited for Claim 12[c] above.
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
(Source: https://www.fleetcomplete.com/en/products/blackberry-radar/)
15. The system according to claim 12, wherein other information, in
addition to the Global Positioning System information, is stored in the
memory.
On information and belief, Radar device memories store GPS data as well as
other information such as sensor data, as indicated for Claim 12[d]. As noted for
Claim 12[d], in normal operation the device takes data readings every 5 minutes and
uploads data every 15 minutes, storing data in the interim.
16. The system according to claim 12, wherein other information is
stored in the memory.
See claim 15.
23[p]. A system comprising:
See claim 12[p].
23[a]. a remote unit in communication with a central location, the
remote unit comprising a Global Positioning System receiver, a
processor in communication with the Global Positioning System receiver
and in communication with a memory,
The BlackBerry Radar-L and Radar-M asset tracker devices each contain
components including a GPS receiver, processor, and memory. Both the Radar-L and
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
59
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 60 of 118
1
Radar-M models also contain cellular communication technology used to transmit
2
location and sensor data back to a central location. The devices contain memory as
3
indicated by the fact that they record sensor data every 5 minutes and upload the data
4
every 15 minutes in normal operation.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
23[b]. the remote unit transmitting Global Positioning System data to the
central location,
Using their cellular transceivers, the Radar-M and Radar-L transmit GPS location
data to the BlackBerry cloud.
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
60
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 61 of 118
1
23[c]. wherein the central location compares the Global Positioning
2
System data to a predetermined parameter having a range of acceptable
3
values, and notes if the predetermined parameter is outside the range of
4
acceptable values; and
5
The central location processes the location data in comparison with stored
6
parameter data, such as to determine whether an asset is inside or outside of a geofence
7
and provide event-driven alerts to customers. The BlackBerry Radar web interface can
8
display a map with geofences and asset locations. There is also a tab that displays asset
9
events. The system receives GPS data to determine if the vehicle location is inside or
10
outside of “acceptable values” associated with the geofence.
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
(Source: https://docs.radar.blackberry.com/guides/user_guide_otherinfo/)
23[d]. wherein the length of time the remote unit remains in a stationary
position is monitored and is compared to a predetermined stationary
time, and if the length of time that the remote unit remains in a stationary
position is greater than the predetermined stationary time, the system
notes an exception.
In addition to geofences, BlackBerry Radar Dwell Detection can identify idle
assets that have remained in one location for too long. For example, according to
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
61
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 62 of 118
1
BlackBerry, if a truck remains at a customer location for too long, the trucking company
2
may adjust the bill for that customer. Alternatively, an employer can track how long its
3
drivers remain at a given location. As recited in Claim 23, Dwell Detection can be
4
combined with geofencing to identify idle assets that remain within specified areas.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
62
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 63 of 118
1
(Source: https://us.blackberry.com/qnx-radar/trailer-chassis-and-container-
2
tracking/radar-solution/radar-services)
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
(Source: https://docs.radar.blackberry.com/guides/user_guide_otherinfo/)
For example, the BlackBerry web interface can display a “Dwell Report”
identifying assets that have remained stationary and/or within a geofence for an
extended period of time.
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
63
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 64 of 118
1
(Source: https://us.blackberry.com/qnx-radar/trailer-chassis-and-container-tracking/
2
radar-solution/radar-services)
25. The system according to claim 23, wherein the remote unit detects a
3
4
loss of Global Positioning System signal and stores information
5
associated with the loss of signal.
6
On information and belief, when the Radar device detects a loss of GPS signal,
7
the unit detects the loss of signal and stores information associated with the loss of
8
signal.
9
26. The system according to claim 23, wherein the remote unit has a first
10
state wherein the remote unit consumes a first quantity of power and a
11
second state where the remote unit consumes a second quantity of power,
12
the first quantity of power being greater than the second quantity of
13
power.
14
The Radar device has multiple different states that consume different quantities
15
of power, as discussed above for Claim 12. For example, when the device has a low
16
battery and/or detects a low temperature and the device is not in continuous motion, the
17
data update rate will be decreased, which consumes less power.
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
64
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 65 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
(Source: https://docs.radar.blackberry.com/guides/user_guide_asset/#lowtemperature-or-low-battery-conditions)
27. The system according to claim 23, wherein at least one report is
generated.
The Radar system generates reports (as well as alert message reports) when assets
are outside of a geofence or are in an extended idle state, as shown in the screenshots
above for Claim 23.
28. The system according to claim 23, wherein the system notes if the
predetermined parameter is outside the range of acceptable values by
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
65
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 66 of 118
1
generating a report that includes information related to the instances
2
where the predetermined parameter is outside the range of acceptable
3
values.
4
The Radar system generates reports that identify and display (as well as alert
5
message reports) when assets are outside of a geofence or are in an extended idle state,
6
as shown in the screenshots above for Claim 23.
7
8
9
10
11
12
63.
Facebook is entitled to relief as a result of BlackBerry’s infringement,
including without limitation monetary damages no less than a reasonable royalty.
COUNT IV: INFRINGEMENT OF U.S. PATENT NO. 7,228,432
64.
Facebook incorporates by reference and re-alleges all foregoing
paragraphs of this Complaint as if fully set forth herein.
65.
Facebook is the owner by assignment of U.S. Patent No. 7,228,432
13
(“’432 patent”), entitled “Method and apparatus for providing security for a computer
14
system,” including the exclusive right to bring suit to enforce the patent and the
15
exclusive right to obtain relief for infringement. The ’432 patent was duly and legally
16
issued by the U.S. Patent and Trademark Office on June 5, 2007. The patent is based
17
on U.S. Patent Application Ser. No. 10/660,335 filed on September 11, 2003.
18
66.
A true and correct copy of the ’432 patent is attached as Exhibit D.
19
67.
The ’432 patent is valid and enforceable under the United States
20
Patent Laws.
21
22
SUMMARY OF INVENTION
68.
The ’432 patent originated with the Hewlett Packard Company (“HP”)
23
corporate family. HP was a leading multinational technology company that was
24
founded and headquartered in Palo Alto, California. HP was succeeded by corporate
25
entities including publicly-traded HP Inc. and Hewlett Packard Enterprise.
26
69.
The ’432 patent acknowledges that computer networks existed that
27
allowed files, programs, and other information to be transferred from one computer
28
system to another system, including the use of security systems to prevent unauthorized
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
66
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 67 of 118
1
intrusions or attacks. (’432, col. 1:7-24.) However, prior art security functions suffered
2
from drawbacks. For example, according to the patent, while computer viruses could
3
be pre-classified to assist in identifying malicious code, computer systems could be left
4
vulnerable “because a virus may be unknown or unclassified.” (Id., col. 1:28-29.) “As a
5
result, the computer system is not able to remove an unknown virus before it attacks the
6
computer system.” (Id., col. 1:29-31.) Computing performance impact was also an
7
issue. For example, the patent explains that “the performance of the central processing
8
unit (‘CPU’) may be impacted by the operation of security functions of the computer
9
system. The computer system's overall performance may be diminished because the
10
11
security functions are consuming the resources of the CPU.” (Id., col. 1:31-36.)
70.
To address the perceived deficiencies in the prior art, the inventions taught
12
by the ’432 patent use a security processor to access and validate a requested file, which
13
may then be provided to another processor. The patent explains how the disclosed
14
invention provides an improved approach that may enhance the performance of a
15
computer system:
16
The disclosed embodiments provide an improved approach
that may address one or more of the issues discussed above,
while enhancing the performance of a computer system. With
computer systems, security functions may be provided to
protect the system. The security functions may be managed
by a device or component, such as a processor, that is within
the computer system or external to the computer system. In
the disclosed embodiments, the security of the computer
system is maintained in a manner that: (1) protects against
defeat by thread models or technologies; (2) minimizes
interaction with the CPU; and (3) allows trapping of code that
is unknown or unclassified.
17
18
19
20
21
22
23
24
25
26
27
28
(Id., col. 2:18-29.)
71.
As one example taught by the ’432 patent, the disclosed techniques “may
enable a computer system to operate in a more efficient manner by having a security
co-processor that protects against defeat by thread models or technologies.” (Id., col.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
67
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 68 of 118
1
2:31-34.) The patent explains:
2
By having a security co-processor examine code and
activities that are independent of the operating system, the
threaded programs are unable to defeat the security of the
computer system. In addition, the security co-processor may
minimize the performance impact on the central processing
unit (“CPU”) of a computer system by performing the
security functions, which allows the CPU to devote more
resources to non-security related functions. Furthermore, the
security co-processor may examine new code without the
code being pre-classified. Thus, as new viruses are
introduced, the security co-processor may trap the unknown
or unclassified code before the CPU is damaged by an attack
from the code.
3
4
5
6
7
8
9
10
11
12
(Id., col. 2:37-49.)
72.
In one illustrative example embodiment, a security co-processor
13
(designated as item 111) may examine code independent of the operating system of a
14
computer system (item 100) and a processor complex (item 102) or other computers in
15
a computer network. (Id., col. 4:11-35, Fig. 2.) Using this architecture, “the security
16
co-processor 111 may enable the computer system 100 to prevent thread technologies
17
and unknown code from attacking the computer system 100. As a benefit to the
18
computer system 100, the security co-processor 111 may examine code independently
19
of the processor complex 102, which may be executing an operating system. As such,
20
the security co-processor 111 may trap code that is unknown or unclassified to prevent
21
it from impacting the performance or integrity of the computer system 100.” (Id., col.
22
4:13-17.) In addition, “[b]ecause the security co-processor 111 performs the security
23
functions and activities, it frees the use of the CPU cycles on the processor
24
complex 102 for other computing activities.” (Id., col. 4:17-20.)
25
73.
The claims of the ’432 patent reflect the technological improvements
26
taught by the specification. For example, each claim recites a security processor used to
27
validate a file that is distinct from another processor. The architecture reflected in the
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
68
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 69 of 118
1
claims, including a security processor distinct from another processor, can be used to
2
enhance the operation of the computer system or systems involved in the
3
implementation, as described in the specification. For example, as the specification
4
teaches, any malicious code can be isolated by the security processor so that it does not
5
harm the performance or integrity of the other processor or associated operating system
6
or computer system. Furthermore, as explained by the specification, the use of a
7
security processor distinct from another processor also minimizes the performance
8
impact on the other processor, allowing the other processor to devote resources to non-
9
security related computing activities.
BLACKBERRY’S INFRINGEMENT
10
11
74.
BlackBerry has infringed and is continuing to infringe the ’432 patent by
12
making, using, selling and/or offering to sell in the United States, or importing into the
13
United States, products or processes that practice the ’432 patent in violation of
14
35 U.S.C. § 271(a), including without limitation BlackBerry Workspaces.
15
16
17
75.
BlackBerry’s infringement of the ’432 patent has caused and will continue
to cause damage for which Facebook is entitled to recovery under 35 U.S.C. § 284.
76.
As set forth below, BlackBerry infringes the ’432 patent. The following
18
description is exemplary and illustrative of BlackBerry’s infringement based on
19
publicly available information. Facebook expects to further develop the evidence of
20
BlackBerry’s infringement after obtaining discovery from BlackBerry in the course of
21
this action.
22
77.
BlackBerry’s WorkSpaces product, formerly called WatchDox, provides
23
secure file sharing to users and organizations. The product can be hosted in a cloud
24
implementation. An illustrative diagram of the WatchDox architecture is reproduced
25
below, illustrating how files provided to the server are converted and validated by a
26
security processing function and then placed into a secure repository, where the files
27
may be further processed and accessed by remote devices.
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
69
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 70 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
(Source: WatchDox Security White Paper, at 5.)
78.
An excerpt from an exemplary figure in the ’432 patent is reproduced
16
below, with red box annotations around exemplary processor complex 102 and
17
exemplary security co-processor 111.
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
70
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 71 of 118
1
(’432, Fig. 2 (annotated excerpt).)
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
79.
An illustrative description of BlackBerry’s infringement on an element-
by-element basis is provided below for exemplary claims of the patent.
1[p]. A method of providing security for a computer system, the method
comprising the acts of:
BlackBerry Workspaces involves a method of providing security for a computer
system. BlackBerry provides a cloud hosting service. BlackBerry’s product provides
a secure file management platform. The platform separates security processing from
other functionality such as the web application that serves users.
The Workspaces virtual appliance is a multi-tier application
with strict separation between the web application serving the
users, the database that contains the system meta-data, and a
secure file system that contains the encrypted documents.
(Source: http://help.blackberry.com/en/blackberry-workspaces-appliance-x/current/
whitepaper/mbf1465305286684.html)
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
71
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 72 of 118
1
2
3
4
5
6
7
8
9
10
11
12
The Workspaces next-generation virtual appliance is a
composite system consisting of multiple virtual machines.
These virtual machines are responsible for the system’s frontend web and management interfaces, load balancing,
document converters, and other internal components.
The Workspaces virtual appliance virtual machines run
hardened Redhat Enterprise Linux and one or more instances
of Windows Server.
File storage for the virtual appliance installation is a NAS,
SAN, NFS, or an externally deployed Object-Storage. This
component stores the encrypted customer files and the
permissions database data.
(Source: http://help.blackberry.com/en/blackberry-workspaces-appliance-x/current/
whitepaper/iip1465304150551.html)
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
(Source: http://help.blackberry.com/en/blackberry-workspaces/current/quick-startguide/vix1490520108806.html)
1[a]. generating a request for a file;
BlackBerry Workspaces generates a request for a file, such as via a file access
request (e.g., an open, edit, annotate or share request) based on a user request originated
via a web browser or through the Workspaces client application. On the Workspaces
server side, a request is generated that results in the requested document being converted
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
72
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 73 of 118
1
into a format for delivery to the user. For example, the system provides a secure
2
Workspaces API call.
3
4
5
6
7
8
9
10
11
12
13
14
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
15
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
16
workspaces.pdf (highlighting added))
17
18
19
20
21
22
23
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
24
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
25
workspaces.pdf)
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
73
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 74 of 118
1
2
3
4
5
6
7
8
9
10
11
(Source: http://help.blackberry.com/en/blackberry-workspaces/current/quick-start-
12
guide/vix1490520108806.html)
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
(Source: http://help.blackberry.com/en/blackberry-workspaces/current/userguide/gry1443705389220.html)
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
74
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 75 of 118
1
1[b]. receiving the request at a dedicated security processor;
2
BlackBerry Workspaces receives file access requests at a dedicated security
3
processor. A Workspaces server application receives the request, which results in the
4
dedicated security processor converting the file into a format for the user. The secure
5
file system may receive the request as a secure API call.
6
7
8
9
10
11
12
13
14
15
16
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
17
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
18
workspaces.pdf (highlighting added))
19
20
21
22
23
24
25
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
26
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
27
workspaces.pdf)
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
75
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 76 of 118
1
The URL that you use to access the BlackBerry
Service
2
3
Workspaces application. This URL MUST correspond
FQDN
to SSL certificates and must consist of at least 3 parts.
4
(e.g. watchdox.nycompany.com)
5
6
7
8
9
SSL Certificates corresponding to the service FQDN.
SSL
Certificate /
Chain /
Private Key
10
(Source: http://help.blackberry.com/en/blackberry-workspaces-appliance-
11
x/current/installation-and-upgrade/gem1464691870923.html, section “Install
12
Appliance-X on Linux”, step 8.)
13
Sizing requirements
14
Each deployment option has specific sizing
recommendations that are based on server size, which are
defined by server storage, memory, and the number of
processors.
15
16
17
18
Table 1. Server sizes
19
20
Server size
21
22
23
24
25
Local operating
system storage
Memory
Processors
(CPU/vCPU)
Small
100GB
4 GB
2
Medium
100GB
8 GB
4
Large
100GB
12 GB
6
X-Large
100GB
16 GB
8
26
27
28
(Source: http://help.blackberry.com/en/blackberry-workspaces-appliance-x/current/
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
76
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 77 of 118
1
2
installation-and-upgrade/gem1464691870923.html)
1[c]. using the dedicated security processor to access the file;
3
BlackBerry Workspaces uses the dedicated security processor to access the files
4
in the Workspaces. For example, the system accesses the file in order to convert it into
5
a particular format for the requesting user.
6
7
8
9
10
11
12
13
14
15
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
16
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
17
workspaces.pdf)
18
19
1[d]. using the dedicated security processor to validate the requested
file;
20
BlackBerry Workspaces uses the dedicated security processor to validate the
21
requested file. As part of converting the file to a format for the requesting user, the
22
system validates the requested file, for example to ensure that the file conversion has
23
completed successfully. The system also will, for example, provide information on any
24
file which failed to synchronize correctly, indicating that it has attempted to validate
25
that file and found an error.
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
77
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 78 of 118
1
2
3
4
5
6
7
8
9
10
11
12
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
13
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
14
workspaces.pdf)
15
16
17
18
19
20
21
22
23
(Source: http://help.blackberry.com/en/blackberry-workspaces-for-windows/current/
24
user-guide/gry1443705752000.html)
25
26
1[e]. providing the file to an other processor, if the requested file is
validated;
27
BlackBerry Workspaces provides the file to another processor if the requested
28
file is validated. For example, the Workspaces system will provide the converted and
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
78
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 79 of 118
1
validated file to a web application (e.g., a web server with processor) to be provided to
2
the user. The system may also provide a file to a user’s device, such as a BlackBerry
3
smartphone containing a processor.
4
5
6
7
8
9
10
11
12
13
14
15
16
17
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
18
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
19
workspaces.pdf (highlighting added))
20
21
22
23
24
The Workspaces virtual appliance is a multi-tier application
with strict separation between the web application serving the
users, the database that contains the system meta-data, and a
secure file system that contains the encrypted documents.
(http://help.blackberry.com/en/blackberry-workspaces-appliancex/current/whitepaper/mbf1465305286684.html)
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
79
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 80 of 118
1
2
3
4
5
6
(Source: https://help.blackberry.com/en/blackberry-workspaces-app-for-android/
7
current/user-guide/gry1443705134196.html)
8
1[f].validating a user access to execute the request; and
9
BlackBerry Workspaces validates a user’s access to a file, executing the access
10
request only if the user is authorized. The system checks to confirm that the user
11
requesting the file has been authorized to execute the request.
12
13
14
15
16
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e-
17
1e01eebb2ce5_wp-ensuring-document-security-across-any-device-with-
18
workspaces.pdf (highlighting added))
19
20
21
22
23
24
25
26
(Source: http://help.blackberry.com/en/blackberry-workspaces/current/user-guide/
27
gry1443705314525.html )
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
80
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 81 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
(Source: http://help.blackberry.com/en/blackberry-workspaces/current/user-guide/
gry1443705301815.html )
1[g]. enabling the other processor to continue processing the file, if the
user access is validated.
BlackBerry Workspaces enables the other processor to continue processing the
file if the user’s access is validated. For example, the web application processor is
enabled to continue processing the file if the user access request is validated, by
permitting the file to be served to the user.
14
15
16
17
18
19
20
(Source: https://idency.com/wp-content/uploads/2017/06/5bbc8123-541e-4e1b-995e1e01eebb2ce5_wp-ensuring-document-security-across-any-device-withworkspaces.pdf (highlighting added))
21
22
23
24
25
26
27
(Source: http://help.blackberry.com/en/blackberry-workspaces/current/user-guide/
gry1443705314525.html)
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
81
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 82 of 118
1
2
3
4
5
6
(Source: https://help.blackberry.com/en/blackberry-workspaces-for-windows/current/
user-guide/gry1443705302406.html)
3. The method, as set forth in claim 1, wherein accessing the file
7
8
9
10
comprises loading the file from a system memory.
On information and belief, the step of accessing the file comprises loading the
file from a system memory, such as RAM memory at a server.
5. The method, as set forth in claim 1, wherein the dedicated security
11
12
13
14
15
16
processor is in a remote computer system.
As shown above for Claim 1, the dedicated security processor in a WorkSpaces
implementation may be in a remote computer system, such as a cloud-based
implementation where the security processing is performed in a computer system
remote from the other processor.
6. The method, as set forth in claim 1, wherein the other processor and
17
18
19
20
21
22
23
24
25
26
27
28
the dedicated security processor are disposed in a computer system.
As shown above for Claim 1, the dedicated security processor and other processor
in a WorkSpaces implementation may be disposed in a computer system, such as a
WorkSpaces cloud or server computer system.
80.
Facebook is entitled to relief as a result of BlackBerry’s infringement,
including without limitation monetary damages no less than a reasonable royalty.
COUNT V: INFRINGEMENT OF U.S. PATENT NO. 6,744,759
81.
Facebook incorporates by reference and re-alleges all foregoing
paragraphs of this Complaint as if fully set forth herein.
82.
Facebook is the owner by assignment of U.S. Patent No. 6,744,759
(“’759 patent”), entitled “System and method for providing user-configured telephone
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
82
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 83 of 118
1
service in a data network telephony system,” including the exclusive right to bring suit
2
to enforce the patent and the exclusive right to obtain relief for infringement.
3
The ’759 patent was duly and legally issued by the U.S. Patent and Trademark Office
4
on June 1, 2004. The patent is based on U.S. Patent Application Ser. No. 09/405,283
5
filed on September 27, 1999.
6
83.
A true and correct copy of the ’759 patent is attached as Exhibit E.
7
84.
The ’759 patent is valid and enforceable under the United States Patent
8
Laws.
SUMMARY OF INVENTION
9
10
85.
The ’759 patent originated with network technology company 3Com
11
Corporation (“3Com”), based in Santa Clara, California. 3Com was recognized as one
12
of the market leaders in networking hardware and software products including Voice
13
over IP (VoIP) telephony products. As of the patent filing date in 1999, 3Com reported
14
that it had more than 200 million customers worldwide. 3Com was acquired by HP in
15
2010 for a reported value of approximately $2.7 billion.
16
86.
The ’759 patent addresses needs that arose in the field of telephone service
17
configuration. The patent explains that telephone service providers could “permit
18
customer subscribers of the features to tailor their telephone service according to
19
individual needs” with services such as call blocking, caller ID, and call forwarding.
20
(’759, col. 1:25-27.) However, while telephone service features were available, “the
21
features are nevertheless limited in their flexibility and scope. The effect to the user is
22
that the features become clumsy and difficult to use.” (Id., col. 2:38-39.) “For example,
23
in order to use the Call Forwarding function, the user must perform the steps at the
24
user’s own phone prior to moving to the location of the telephone to which calls will be
25
forwarded.” (Id., col. 2:41-44.)
26
87.
In addition, telephone devices themselves suffered from deficiencies. For
27
example, although the Public Switched Telephone Network (PSTN) had been
28
developed, “[o]ne problem with the PSTN is that the terminal devices (e.g. telephones)
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
83
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 84 of 118
1
lack intelligence and operate as ‘dumb’ terminals on a network having the intelligence
2
in central offices.” (Id., col. 2:49-52.) While some PSTN telephones included display
3
features, they were “limited however by the closed PSTN signaling architecture, which
4
prohibits access by the PSTN telephones to the network signaling protocols.” (Id., col.
5
2:61-64.) Furthermore, “[t]he display functions are effectively limited to displaying
6
text, again, as a ‘dumb’ terminal.” (Id., col. 2:64-65.)
7
88.
Beyond traditional PSTN telephony, Internet telephony was also known,
8
which could involve telephones that “may be substantially more intelligent than typical
9
PSTN telephones” and “may include substantially the computer resources of a typical
10
11
personal computer.” (Id., col. 3:19-22.)
89.
The ’759 patent explains that needs existed in the field, including needs
12
for incorporating feature sets “into a data network telephony system that uses a data
13
network such as the Internet,” providing “new features and enhancements to telephony
14
service that accommodates and conforms to users’ needs,” and providing “features and
15
capabilities to telephone service that create new opportunities for users and for service
16
providers.” (Id., col. 3:24-31.)
17
18
90.
described by the patent. The patent states:
19
The present invention addresses the above needs by providing
a system in a data network telephony system, such as for
example, the Internet, that provides a way for users to make
brand new telephones usable without having to wait while the
telephone company programs an account. The embodiments
of the present invention may also be used to modify existing
telephone accounts to incorporate new features, or features
that may be desired for a limited amount of time.
20
21
22
23
24
25
26
The inventions taught by the ’759 patent addressed these needs, as
(Id., col. 3:32-40.)
91.
According to the patent, “[o]ne advantage of the present invention is that
27
telephone features become user-configurable.” (Id., col. 3:41-42.) “Another advantage
28
is that the extent to which features are user-configurable may be determined by the
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
84
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 85 of 118
1
service provider. The service provider may wish to make a few basic features standard
2
and impose their use in a registration function. Other features may then be made
3
selectable by the user.” (Id., col. 3:43-48.)
4
92.
The specification describes illustrative examples of how the invention may
5
be implemented using data network telephones and telephony features that the user may
6
select by accessing a service provider’s web page.
7
In addition to features selected when “setting up a new account,” features may also be
8
modified based on the user’s selections, so that “[u]sers need not be locked into any
9
service plan or feature set.” (Id., col. 11:20-25.) “One advantage of such provisioning
10
functions is that services may be ordered for temporary use in a manner that is
11
convenient to the user.” (Id., col. 11:25-28.)
12
93.
(Id., col. 16:6-8, 16:16-39.)
The specification also describes another “advantage” of the disclosed
13
inventive system that the user can “obtain access to fully personalized, user-configured
14
service account as well as to user-selected telephony enhancements and features.” (Id.,
15
col. 6:55-58.)
16
94.
The claims of the ’759 patent reflect the improvements and benefits taught
17
by the specification. For example, each claim of the patent recites functionality through
18
which a service provider can enable a user, using a form presented in the web browser,
19
to request certain features to be provisioned for a data network telephone. As taught by
20
the specification, the inventions recited in the claims thus enable a service provider to
21
allow users to select and modify certain user-configurable features for a data network
22
telephone in a convenient manner using a web-based interface, where the service
23
provider can determine which available features are user-configurable. As the
24
specification explains, these inventions for user-configurable data network telephone
25
features enable a user to conveniently select and configure features for the data network
26
telephone without the user having to wait for the telephone company or service provider
27
to program the user’s account. Further incorporating these benefits taught by the patent,
28
claims 4 and 8 and the claims that depend therefrom further specify that the service
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
85
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 86 of 118
1
provider sends a message to the data network telephone effectuating the features chosen
2
by the user.
BLACKBERRY’S INFRINGEMENT
3
4
95.
BlackBerry has infringed and is continuing to infringe the ’759 patent by
5
making, using, selling and/or offering to sell in the United States, or importing into the
6
United States, products or processes that practice the ’759 patent in violation of
7
35 U.S.C. § 271(a), including without limitation the BlackBerry Enterprise Server
8
(BES, including versions BES10 – BES12) and the BlackBerry Unified Endpoint
9
Manager (UEM).
10
11
12
96.
BlackBerry’s infringement of the ’759 patent has caused and will continue
to cause damage for which Facebook is entitled to recovery under 35 U.S.C. § 284.
97.
As set forth below, BlackBerry infringes the ’759 patent. The following
13
description is exemplary and illustrative of BlackBerry’s infringement based on
14
publicly available information. Facebook expects to further develop the evidence of
15
BlackBerry’s infringement after obtaining discovery from BlackBerry in the course of
16
this action.
17
98.
BlackBerry’s UEM product and predecessor BES product include a Self-
18
Service feature, which is a web-based application enabling users to perform certain
19
tasks, such as creating a password to activate a device or sending commands to the
20
device. If a user’s device is lost or stolen, the user can perform actions through the Self-
21
Service interface such as remotely changing the password on the device or deleting data
22
from the device.
23
99.
The following is an exemplary video screenshot provided by BlackBerry,
24
showing how a user can specify an activation password for a device using the Self-
25
Service web interface.
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
86
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 87 of 118
1
(Source: https://www.youtube.com/watch?v=F7e-LmFyWXw)
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
100. The following figure from the ’759 patent shows an exemplary web
interface where a user can specify information as part of the process to provision
features for a data network telephone.
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
87
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 88 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
(’759, Fig. 4B.)
101. An illustrative description of BlackBerry’s infringement on an elementby-element basis is provided below for exemplary claims of the patent.
8[p]. A method for providing a user selected configuration for a data
network telephone comprising the steps of:
The BES and BlackBerry UEM Self-Service websites allow the user to select a
configuration for a data network telephone.
The Self-Service feature works for
smartphones that are data network phones that enable telephony over data networks,
such as Voice Over Wi-Fi and Voice Over LTE.
24
25
26
27
28
BES12 Self-Service is a web-based application that you can
use to perform certain tasks, such as creating a password to
activate your device or sending commands to your device. If
your device is lost or stolen, you can remotely change the
password on your device or delete data from your device. You
don't need to install any software on your computer to use
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
88
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 89 of 118
1
BES12 Self-Service. Your administrator will provide you
with the web address and login information that you need to
log in to BES12 Self-Service.
2
3
4
(Source: http://help.blackberry.com/en/bes12-self- service/latest/bes 12-self-service/
amo1375906210935.html)
5
6
7
8
9
10
11
12
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberryuem-self-service/amo1375906210935.html)
13
14
15
16
17
18
19
20
21
22
23
24
(Source: https://us.blackberry.com/support/business/blackberry-uem)
8[a]. receiving a request to configure the data network telephone from
25
the user;
26
After the user logs into the BES12 or UEM Self-Service website and provides a
27
configuration request, a request is received to configure the user’s data network
28
telephone.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
89
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 90 of 118
1
2
3
4
5
6
7
8
9
10
11
(Source: https://www.youtube.com/watch?v=Hydk1TFK54I)
12
13
14
15
16
17
18
19
20
21
22
23
24
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberryuem-self-service-pdf/BlackBerry-UEM-Self-Service-latest-User-Guide-en.pdf)
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
90
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 91 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberry-
16
uem-self-service-pdf/BlackBerry-UEM-Self-Service-latest-User-Guide-en.pdf)
17
8[b]. presenting a user feature request form in a web browser of a
18
workstation, the user feature request form prompting the user to select
19
features with which the data network telephone is to be provisioned;
20
The user is presented with features in a request form prompting selection of
21
commands with which their data network telephone is to be provisioned. For example,
22
the web browser form prompts the user to select features such as (1) specifying a device
23
password and locking the device, (2) unlocking the device and clearing password, and
24
other features. The user can select the features of specifying a password and locking
25
the device, for example, to provision the device with the features of a password and
26
being locked.
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
91
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 92 of 118
1
2
3
4
5
6
7
8
9
10
11
(Source: https://www.youtube.com/watch?v=Hydk1TFK54I)
12
13
14
15
16
17
18
19
20
21
22
(Source: https://www.youtube.com/watch?v=Hydk1TFK54I)
23
24
25
26
Using BES12 Self-Service, you can send various remote
commands to your device. For example:
If your device is lost or stolen, you can remotely lock the
device or delete data from the device.
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
92
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 93 of 118
1
2
3
4
If you forget the device password on your iOS or Android
device, you can clear it.
If you misplace your iOS, Android, or Windows 10 Mobile
device, you might be able to use BES12 Self-Service to locate
your device on a map”
5
6
(Source: http://help.blackberry.com/en/bes12-self-service/latest/bes_12-self-servicepdf/BES12-Self-Service-latest-User-Guide-en.pdf)
7
8
9
10
11
12
13
14
15
16
17
18
19
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberryuem-self-service-pdf/BlackBerry-UEM-Self-Service-latest-User-Guide-en.pdf)
20
21
22
23
24
25
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberry-
26
uem-self-service-pdf/BlackBerry-UEM-Self-Service-latest-User-Guide-en.pdf)
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
93
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 94 of 118
1
2
3
4
5
6
7
8
9
10
(Source: https://www.youtube.com/watch?v=F7e-LmFyWXw)
11
8[c]. setting a user account in accordance with the selected features;
12
Once the presented feature is selected by the user, the user account is set in
13
accordance with the feature.
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
(Source: https://www.youtube.com/watch?v=Hydk1TFK54I)
BES12 Self-Service is a web-based application that you can
use to perform certain tasks, such as creating a password to
activate your device or sending commands to your device. If
your device is lost or stolen, you can remotely change the
password on your device or delete data from your device. You
don't need to install any software on your computer to use
BES12 Self-Service. Your administrator will provide you
with the web address and login information that you need to
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
94
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 95 of 118
1
log in to BES12 Self-Service.
2
(Source: https://help.blackberry.com/en/bes12-self-service/latest/bes12-self-
3
service/amo1375906210935.html)
4
5
6
7
8
9
10
11
12
13
14
15
16
17
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberryuem-self-service-pdf/BlackBerry-UEM-Self-Service-latest-User-Guide-en.pdf)
8[d]. sending a configuration message to provision the data network
telephone with the features selected; and
After the user account is set, a configuration message is sent to the data network
telephone in order for the features to take effect on the device.
18
19
20
21
22
23
24
BES12 Self-Service is a web-based application that you can
use to perform certain tasks, such as creating a password to
activate your device or sending commands to your device. If
your device is lost or stolen, you can remotely change the
password on your device or delete data from your device. You
don't need to install any software on your computer to use
BES12 Self-Service. Your administrator will provide you
with the web address and login information that you need to
log in to BES12 Self-Service.
25
(Source: https://help.blackberry.com/en/bes12-self-service/latest/bes 12-self-
26
service/amo1375906210935.html)
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
95
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 96 of 118
1
2
3
4
5
6
7
8
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberry-
9
uem-self-service-pdf/BlackBerry-UEM-Self-Service-latest-User-Guide-en.pdf)
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberryuem-self-service/amo1377803743419.html)
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
96
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 97 of 118
1
8[e]. causing a confirming message to be presented to the user, the
2
confirming message indicating to the user that the data network
3
telephone is provisioned with the features selected by the user.
4
5
6
7
8
9
The system causes a confirming message to be presented to the user indicating
that the data network telephone is provisioned with the selected features. The message
may be presented to the user at the Self-Service web interface and/or at the user’s
device, as per dependent claims 9 and 10, for example indicating that the device is
locked, has its password set, or has other provisioned features.
10
11
12
13
14
15
16
17
18
19
(Source: https://www.youtube.com/watch?v=F7e-LmFyWXw)
20
21
22
23
24
25
26
(Source: https://www.youtube.com/watch?v=F7e-LmFyWXw)
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
97
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 98 of 118
1
2
3
4
5
6
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberry-
7
uem-self-service-pdf/BlackBerry-UEM-Self-Service-latest-User-Guide-en.pdf)
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
(Source: http://help.blackberry.com/en/blackberry-uem-self-service/latest/blackberryuem-self-service/amo1377803743419.html)
9. The method of claim 8, wherein causing a confirming message to be
presented to the user comprises sending a confirming message to the
workstation that causes the workstation to present to the user the
confirming message.
The Self-Service feature causes a confirming message to be presented to the
user, at the Self-Service web interface and/or at the user’s device.
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
98
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 99 of 118
1
10. The method of claim 8 wherein causing a confirming message to be
2
presented to the user comprises sending a confirming message to the
3
data network telephone that causes the data network telephone to present
4
to the user the confirming message.
5
6
7
8
9
10
11
The Self-Service feature causes a confirming message to be presented to the user,
at the Self-Service web interface and/or at the user’s device.
102. Facebook is entitled to relief as a result of BlackBerry’s infringement,
including without limitation monetary damages no less than a reasonable royalty.
COUNT VI: INFRINGEMENT OF U.S. PATENT NO. 7,302,698
103. Facebook incorporates by reference and re-alleges all foregoing
paragraphs of this Complaint as if fully set forth herein.
12
104. Facebook is the owner by assignment of U.S. Patent No. 7,302,698
13
(“’698 patent”), entitled “Operation of trusted state in computing platform,” including
14
the exclusive right to bring suit to enforce the patent and the exclusive right to obtain
15
relief for infringement. The ’698 patent was duly and legally issued by the U.S. Patent
16
and Trademark Office on November 27, 2007. The patent is based on U.S. Patent
17
Application Ser. No. 09/728,827 filed on November 28, 2000.
18
105. A true and correct copy of the ’698 patent is attached as Exhibit F.
19
106. The ’698 patent is valid and enforceable under the United States
20
Patent Laws.
SUMMARY OF INVENTION
21
22
23
107. The ’698 patent originated with the HP corporate family. Facebook refers
to and incorporates by reference paragraph 68 above.
24
108. The ’698 patent addresses computer security. As described in the patent,
25
prior art operating systems before the ’698 patent suffered from problems with security,
26
such as vulnerability to viruses and unauthorized third-party modifications. (’698,
27
col. 2:38-55.) One identified problem with prior art computing platforms was that
28
“[t]he operating status of a computer system or platform and the status of the data within
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
99
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 100 of 118
1
the platform or system is dynamic and difficult to predict.” (Id., col. 2:40-43.) As a
2
result, “[i]t is difficult to determine whether a computer platform is operating correctly
3
because the state of the computer platform and data on the platform is constantly
4
changing and the computer platform itself may be dynamically changing.” (Id., col.
5
2:42-46.)
6
109. To address the perceived problems, the invention of the ’698 patent
7
provides increased security to a computing system by using a monitoring component
8
that operates to determine the current operational state of the system. The patent
9
describes: “Specific embodiments of the present invention comprise a computer
10
platform having a processing means and a memory means, and which is physically
11
associated with a component, known herein after as a ‘trusted component’ which
12
monitors operation of the computer platform by collecting metrics data from the
13
computer platform, and which is capable of verifying to third party computer entities
14
interacting with the computer platform to the correct functioning of the computer
15
platform.” (Id., col. 7:18-26.) The patent describes that security is enhanced by the use
16
of a monitoring component in a number of ways:
17
18
19
20
21
22
23
24
25
26
27
28
A user of a computing entity has higher confidence in the
integrity and security of his/her own computer entity and in
the integrity and security of the computer entity belonging to
the other computing entity.
Each entity is confident that the other entity is in fact the
entity which it purports to be.
Where one or both of the entities represent a party to a
transaction, e.g. a data transfer transaction, because of the inbuilt trusted component, third party entities interacting with
the entity have a high degree of confidence that the entity does
in fact represent such a party.
The trusted component increases the inherent security of the
entity itself, through verification and monitoring processes
implemented by the trusted component.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
100
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 101 of 118
1
The computer entity is more likely to behave in the way it is
expected to behave.
2
3
(Id., col. 7:33-49.)
4
110. The claims of the ’698 patent reflect these technological benefits that
5
increase the security of the computer platform as described by the patent. For example,
6
each claim recites the use of a “monitoring component” having a data processor and a
7
memory, distinct from a first data processor and memory in a computer system, that
8
performs functions including determining which operating state is the current operating
9
state. As described in the specification, for example, the presence of a monitoring
10
component increases the inherent security of the computing entity itself through the
11
verification and monitoring processes that it implements.
BLACKBERRY’S INFRINGEMENT
12
13
111. BlackBerry has infringed and is continuing to infringe the ’698 patent by
14
making, using, selling and/or offering to sell in the United States, or importing into the
15
United States, products or processes that practice the ’698 patent in violation of
16
35 U.S.C. § 271(a), including without limitation its QNX software products, including
17
the QNX Neutrino Realtime Operating System (RTOS), and related applications and
18
implementations.
19
applications such as BlackBerry’s CAR Infotainment products, the BlackBerry 10 OS
20
operating system, and other applications.
21
22
QNX Neutrino is provided by BlackBerry for a variety of
112. BlackBerry’s infringement of the ’698 patent has caused and will continue
to cause damage for which Facebook is entitled to recovery under 35 U.S.C. § 284.
23
113. As set forth below, BlackBerry infringes the ’698 patent. The following
24
description is exemplary and illustrative of BlackBerry’s infringement based on
25
publicly available information. Facebook expects to further develop the evidence of
26
BlackBerry’s infringement after obtaining discovery from BlackBerry in the course of
27
this action.
28
114. BlackBerry’s QNX Neutrino uses monitoring components to monitor
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
101
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 102 of 118
1
operating states of a computing platform. For example, High Availability Manager
2
(“HAM”) components monitor operating states so that appropriate action can be taken
3
if needed. The HAM contains subcomponents such as entities, conditions, and actions
4
and may also be associated with a Guardian. According to BlackBerry, the HAM
5
provides “a resilient manager (or ‘smart watchdog’) that can perform multistage
6
recovery whenever system services or processes fail, no longer respond, or are detected
7
to be in a state where they cease to provide acceptable levels of service.” (Source:
8
http://support7.qnx.com/download/download/26183/QNX_Neutrino_RTOS_System_
9
Architecture.pdf)
10
115. A figure from the ’698 patent is provided below, showing an exemplary
11
embodiment where operating states are monitored by a trusted component. In this
12
example, boot up and a re-boot via BIOS are monitored by a trusted component.
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
102
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 103 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
(’698, Fig. 7.)
116. An illustrative description of BlackBerry’s infringement on an elementby-element basis is provided below for exemplary claims of the patent.
1[p]. A computing entity comprising:
QNX Neutrino and associated implementations as provided by BlackBerry
comprise a computing entity.
1[a] a computer platform comprising
26
QNX Neutrino provides a computer platform for computing entities with a
27
variety of implementations. For example, the BlackBerry 10 operating system platform
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
103
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 104 of 118
1
sits on the BlackBerry device entities, and BlackBerry provides a QNX Neutrino
2
platform in other applications and implementations.
3
4
5
6
7
8
9
10
11
12
(Sources: https://global.blackberry.com/en/software; https://help.blackberry.com/en/
13
blackberry-security-overview/latest/blackberry-security-overview/
14
awi1402929620791.html)
15
16
17
18
19
20
21
22
23
24
25
26
27
28
The BlackBerry 10 OS is a microkernel operating system
that is based on the QNX Neutrino RTOS.
(Source: https://help.blackberry.com/en/blackberry-security-overview/latest/
blackberry-security-overview/awi1402930370721.html )
1[b]. a plurality of physical and logical resources including a first data
processor and a first memory;
QNX Neutrino implementations include physical and logical resources including
data processors and memory. For example, the BlackBerry 10 OS contains various
processes, which may include a first user process with its (first) memory address space.
The process manager is capable of creating multiple POSIX
processes (each of which may contain multiple POSIX
threads).
In the QNX Neutrino RTOS, the microkernel is paired with
the Process Manager in a single module (procnto). This
module is required for all runtime systems.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
104
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 105 of 118
1
(Source: http://support7.qnx.com/download/download/26183/QNX_Neutrino_
2
RTOS_System_Architecture.pdf)
3
4
5
6
7
8
9
10
(Source:https://developer.blackberry.com/native/documentation/dev/rtos/arch/proc_
memman.html)
11
12
13
14
15
(Source: https://developer.blackberry.com/native/documentation/dev/rtos/arch/proc
16
_memman.html)
1[c]. a monitoring component comprising a second data processor and a
17
18
second memory;
19
QNX Neutrino, such as in the BlackBerry 10 OS and other implementations,
20
contains a monitoring component comprising a second data processor and memory
21
space. For example, the High Availability Manager including associated components
22
“provides a mechanism for monitoring processes and services on your system.”
23
(Source:
24
Neutrino_RTOS_System_Architecture.pdf) The process of monitoring states (and
25
associated memory) is separate and distinct from other data processing and memory.
http://support7.qnx.com/download/
download/26183/QNX_
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
105
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 106 of 118
1
2
3
4
5
6
(Source: https://developer.blackberry.com/native/documentation/dev/rtos/arch/proc
7
_memman.html )
8
9
10
11
12
13
14
The High Availability Manager (HAM) provides a
mechanism for monitoring processes and services on your
system. The goal is to provide a resilient manager (or “smart
watchdog”) that can perform multistage recovery whenever
system services or processes fail, no longer respond, or are
detected to be in a state where they cease to provide
acceptable levels of service. Entities are the fundamental units
of observation/monitoring in the system. Essentially, an entity
is a process (pid). As processes, all entities are uniquely
identifiable by their pids.
15
(Source: http://support7.qnx.com/download/download/26183/QNX_Neutrino_
16
RTOS_System_Architecture.pdf)
17
18
19
20
21
22
23
24
25
26
27
28
Create fault tolerant applications
Under this system, every driver, application, protocol stack,
and file system runs outside the kernel in the safety of
memory-protected user space. Virtually any component can
fail and be automatically restarted without affecting other
components or the kernel. Further, the QNX OS provides an
optional high-availability framework for ensuring critical
software is monitored and kept running even after faults.
(Source: http://support7.qnx.com/download/download/26406/QNX%20OS%20
Security.pdf)
If a process stops responding, it isolates a process in its user
space and restarts the process without negatively affecting
other processes. It uses adaptive partitioning to prevent apps
from interfering with or reading the memory used by another
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
106
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 107 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
app. It validates requests for resources and controls how apps
access the capabilities of the device, such as access to the
camera, contacts, and device identifying information.
(Source: https://help.blackberry.com/en/blackberry-security-overview/latest/
blackberry-security-overview/awi1402930370721.html)
1[d]. wherein, said computer platform is capable of operating in a
plurality of different states, each said state utilising a corresponding
respective set of individual ones of said physical and logical resources;
QNX Neutrino provides for different states that use different computer resources,
and BlackBerry provides implementations that include multiple different states. For
example, BlackBerry 10 can transition to different application processes, each process
having a state and corresponding resources (e.g., their own protected address spaces).
Multiple different states are monitored by High Availability Manager components.
QNX Neutrino also provides different kernel states such as “running, “ready,” and
“blocked” that utilize different computer resources.
15
16
17
18
19
An app can transition between states as a result of a user’s
action or because of the state of the device.
…
The following diagram shows how an app can move from
state to state:
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
107
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 108 of 118
1
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
2
_in_app_life_cycle.html )
3
4
5
6
7
8
9
10
With memory protection, if one of the processes executing in
a multitasking environment attempts to access memory that
hasn’t been explicitly declared or allocated for the type of
access attempted, the MMU hardware can notify the OS,
which can then abort the thread (at the failing/offending
instruction). This protects process address spaces from each
other, preventing coding errors in a thread in one process from
damaging memory used by threads in other processes or even
in the OS. This protection is useful both for development and
for the installed runtime system, because it makes
postmortem analysis possible.
11
(Source: https://developer.blackberry.com/native/documentation/dev/rtos/arch/proc
12
_memman.html )
13
Kernel states, the complete list
14
15
16
17
18
19
20
Here's the complete list of kernel blocking states, with brief explanations
of each state.
By the way, this list is available in —you'll notice that
the states are all prefixed with STATE_ , but the prefix tends to be
omitted in conversation and the documentation (for example, “READY” is
really STATE_READY):
If the state is:
The thread is:
STATE_CONDVAR
Waiting for a condition variable to be signaled
STATE_DEAD
Dead. Kernel is waiting to release the thread's resources
STATE_INTR
Waiting for an interrupt
26
STATE_JOIN
Waiting for the completion of another thread
27
STATE_MUTEX
Waiting to acquire a mutex
21
22
23
24
25
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
108
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 109 of 118
1
2
STATE_NANOSLEEP
Sleeping for a period of time
STATE_NET_REPLY
Waiting for a reply to be delivered across the network
STATE_NET_SEND
the network
Waiting for a pulse or message to be delivered across
3
4
5
6
STATE_READY
Not running on a CPU, but is ready to run (one or more
higher or equal priority threads are running)
7
STATE_RECEIVE
Waiting for a client to send a message
STATE_REPLY
Waiting for a server to reply to a message
STATE_RUNNING
Actively running on a CPU
STATE_SEM
Waiting to acquire a semaphore
13
STATE_SEND
Waiting for a server to receive a message
14
STATE_SIGSUSPEND Waiting for a signal
8
9
10
11
12
15
16
STATE_SIGWAITINFO Waiting for a signal
STATE_STACK
Waiting for more stack to be allocated
18
STATE_STOPPED
Suspended (SIGSTOP signal)
19
STATE_WAITCTX
Waiting for a register context (usually floating point) to
become available (only on SMP systems)
17
20
21
22
23
STATE_WAITPAGE
Waiting for process manager to resolve a fault on a page
STATE_WAITTHREAD Waiting for a thread to be created
24
(Source: http://www.qnx.com/developers/docs/7.0.0/#com.qnx.doc.neutrino.getting
25
_started/topic/s1_procs_Kernel_states.html)
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
109
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 110 of 118
Kernel states
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
We've been talking about “running,” “ready,” and “blocked” loosely—let's
now formalize these thread states.
RUNNING
QNX Neutrino's RUNNING state simply means that the thread is now
actively consuming the CPU. On an SMP system, there will be
multiple threads running; on a single-processor system, there will be
one thread running.
READY
The READY state means that this thread could run right now—except
that it's not, because another thread, (at the same or higher
priority), is running. If two threads were capable of using the CPU,
one thread at priority 10 and one thread at priority 7, the priority 10
thread would be RUNNING, and the priority 7 thread would be
READY.
The blocked states
What do we call the blocked state? The problem is, there's not
just one blocked state. Under QNX Neutrino, there are in fact over a
dozen blocking states.
Why so many? Because the kernel keeps track of why a thread is
blocked.
(Source: http://www.qnx.com/developers/docs/7.0.0/#com.qnx.doc.neutrino.
getting_started/topic/s1_procs_kstate.html)
21
1[e]. wherein said monitoring component operates to determine which of
22
said plurality of states is the current operating state of said computer
23
platform.
24
QNX Neutrino includes monitoring functionality to determine which state is the
25
current state. For example, High Availability Manager components determine which
26
state is the current operating state. See Claim 1[c] above. (Source: http://support7.qnx
27
.com/download/download/26183/QNX_Neutrino_RTOS_System_Architecture.pdf)
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
110
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 111 of 118
1
In a BlackBerry 10 OS implementation, the monitoring component determines the
2
current operating state.
3
4
5
6
7
8
9
10
11
12
13
14
15
An app can transition between states as a result of a user’s
action or because of the state of the device. These transitions
make up your app's life cycle. When an app makes a transition
from one state of the life cycle to another, the BlackBerry 10
OS notifies the app using events. The events that an app
receives can vary depending on the way the user configures
the settings on the device. … The BlackBerry 10 OS can
deactivate your app and move it to the background at any
time. For example, a user may leave your app to open another
app. When the OS deactivates your app, your code should first
save the app state. In addition, your app should stop any
unnecessary threads and processes (such as updating the UI
in real time) to preserve system resources. When the OS
activates your app again, you can reload the saved state, and
restart any suspended processes.
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
_in_app_life_cycle.html )
16
17
18
19
20
21
22
23
24
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
25
_in_app_life_cycle.html )
26
3. The computing entity as claimed in claim 1, in which exit of said
27
computer platform from each said operating state is monitored by said
28
monitoring component.
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
111
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 112 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
On information and belief, the exit of the QNX Neutrino platform from each
operating state is monitored by the monitoring component.
20[p]. A method of storing data at a computing entity comprising a
computer platform
See claim 1[p]-[a].
20[a] having a first data processor and a first memory
See claim 1[b].
20[b] and a monitoring component having a second data processor and
a second memory, said method comprising the steps of:
See claim 1[c].
20[c] initiating a session on the computing platform;
BlackBerry’s QNX Neutrino initiates a session on the computing platform. For
example, a user app process or other process is started that begins a session.
The process manager is capable of creating multiple POSIX
processes (each of which may contain multiple POSIX
threads).
In the QNX Neutrino RTOS, the microkernel is paired with
the Process Manager in a single module (procnto). This
module is required for all runtime systems.
19
(Source: http://support7.qnx.com/download/download/26183/QNX_Neutrino_
20
RTOS_System_Architecture.pdf)
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
112
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 113 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
_in_app_life_cycle.html )
20[d]. the monitoring component recording state data describing a
current operational state of the computing platform;
See Claim 1[c] and 1[e] regarding the monitoring component and
High Availability Manager. The monitoring component records and determines the
state of processes and kernel states and records descriptive data.
An app can transition between states as a result of a user's
action or because of the state of the device. These transitions
make up your app's life cycle. When an app makes a
transition from one state of the life cycle to another, the
BlackBerry 10 OS notifies the app using events. The events
that an app receives can vary depending on the way the user
configures the settings on the device.
The following diagram shows how an app can move from
state to state:
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
113
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 114 of 118
1
2
3
4
5
6
7
8
9
10
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
11
_in_app_life_cycle.html )
12
13
14
15
16
17
18
19
20
21
22
23
24
The High Availability Manager (HAM) provides a
mechanism for monitoring processes and services on your
system. The goal is to provide a resilient manager (or “smart
watchdog”) that can perform multistage recovery whenever
system services or processes fail, no longer respond, or are
detected to be in a state where they cease to provide
acceptable levels of service. Entities are the fundamental units
of observation/monitoring in the system. Essentially, an entity
is a process (pid). As processes, all entities are uniquely
identifiable by their pids.
(Source: http://support7.qnx.com/download/download/26183/QNX_Neutrino_
RTOS_System_Architecture.pdf)
20[e]. generating data in the session; and
QNX Neutrino generates data in the session. For example, an app process session
generates its own app data (e.g., information about the state) which eventually needs to
be saved, and other processes generate data during the session.
25
26
27
28
The BlackBerry 10 OS can deactivate your app and move it
to the background at any time. For example, a user may leave
your app to open another app. When the OS deactivates your
app, your code should first save the app state. In addition,
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
114
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 115 of 118
1
2
3
4
your app should stop any unnecessary threads and processes
(such as updating the UI in real time) to preserve system
resources. When the OS activates your app again, you can
reload the saved state, and restart any suspended processes.
9
An app can also experience interruptions during its life cycle
such as losing focus, low memory events, and low battery
events. Your app should listen for these events and respond
by saving information about the state of the app. For example,
the screen element currently in focus, or any user-entered
data, should be saved. The saved state can be reloaded so that
when the user returns to the app, the user can then continue
on as before.
10
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
11
_in_app_life_cycle.html )
5
6
7
8
12
20[f]. storing the generated data with reference to the state data so that
13
the generated data may be recovered in a future session of the computing
14
platform in the same operational state.
15
QNX Neutrino stores the generated data with reference to the state data so that
16
generated data may be recovered in a future session in the same operational state. For
17
example, the data generated by an app is saved so that it may be recovered in the same
18
state when the computing platform reactivates the app. The High Availability Manager
19
provides “a resilient manager (or ‘smart watchdog’) that can perform multistage
20
recovery whenever system services or processes fail, no longer respond, or are detected
21
to be in a state where they cease to provide acceptable levels of service.” (Source:
22
http://support7.qnx.com/download/download/26183/QNX_Neutrino_RTOS_System_
23
Architecture.pdf)
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
115
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 116 of 118
1
2
3
4
5
6
7
8
9
10
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
11
_in_app_life_cycle.html)
12
13
14
15
16
17
18
19
20
The BlackBerry 10 OS can deactivate your app and move it
to the background at any time. For example, a user may
leave your app to open another app. When the OS
deactivates your app, your code should first save the app
state. In addition, your app should stop any unnecessary
threads and processes (such as updating the UI in real time)
to preserve system resources. When the OS activates your
app again, you can reload the saved state, and restart any
suspended processes.
(Source: https://developer.blackberry.com/native/documentation/dev/states/transitions
_in_app_life_cycle.html)
27
The High Availability Manager (HAM) provides a
mechanism for monitoring processes and services on your
system. The goal is to provide a resilient manager (or “smart
watchdog”) that can perform multistage recovery whenever
system services or processes fail, no longer respond, or are
detected to be in a state where they cease to provide
acceptable levels of service. Entities are the fundamental units
of observation/monitoring in the system. Essentially, an entity
is a process (pid). As processes, all entities are uniquely
identifiable by their pids.
28
(Source: http://support7.qnx.com/download/download/26183/QNX_Neutrino_RTOS_
21
22
23
24
25
26
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
116
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 117 of 118
1
2
3
System_Architecture.pdf)
117. Facebook is entitled to relief as a result of BlackBerry’s infringement,
including without limitation monetary damages no less than a reasonable royalty.
4
118. On information and belief, compliance with 35 U.S.C. § 287 has been
5
achieved to the extent applicable to the asserted claims of the Patents-in-Suit and/or is
6
not applicable to the asserted claims of the Patents-in-Suit.
PRAYER FOR RELIEF
7
8
WHEREFORE, Facebook respectfully requests:
9
A.
10
11
12
That Judgment be entered that BlackBerry has infringed each of the
Patents-in-Suit under 35 U.S.C. § 271;
B.
An award of monetary damages sufficient to compensate Facebook for
BlackBerry’s infringement under 35 U.S.C. § 284;
13
C.
Costs and expenses incurred by Facebook in this action;
14
D.
An award of prejudgment and post-judgment interest; and
15
E.
Such other and further relief as the Court may deem just and proper.
DEMAND FOR JURY TRIAL
16
17
18
Pursuant to Rule 38(b) of the Federal Rules of Civil Procedure,
Facebook respectfully demands a trial by jury on all issues triable by jury.
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
117
COMPLAINT
Case 3:18-cv-05434-EDL Document 1 Filed 09/04/18 Page 118 of 118
1
Dated: September 4, 2018
COOLEY LLP
2
3
/s/ Heidi L. Keefe
Heidi L. Keefe (178960)
4
5
HEIDI L. KEEFE (178960)
(hkeefe@cooley.com)
MARK R. WEINSTEIN (193043)
(mweinstein@cooley.com)
MATTHEW J. BRIGHAM (191428)
(mbrigham@cooley.com)
LOWELL D. MEAD (223989)
(lmead@cooley.com)
3175 Hanover Street
Palo Alto, CA 94304-1130
Telephone: (650) 843-5000
Facsimile: (650) 849-7400
6
7
8
9
10
11
COOLEY LLP
MICHAEL G. RHODES (116127)
(rhodesmg@cooley.com)
101 California Street
5th Floor
San Francisco, CA 94111-5800
Telephone: (415) 693-2000
Facsimile: (415) 693-2222
12
13
14
15
16
Attorneys for Plaintiff
FACEBOOK, INC.
17
18
19
20
21
22
23
24
25
26
27
28
COOLEY LLP
ATTORNEYS AT LAW
PALO ALTO
CASE NO. 18-5434
118
COMPLAINT
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?