Apple Inc. v. Samsung Electronics Co. Ltd. et al

Filing 1003

Declaration of Richard D. Wesel, Ph.D., in Support of #1005 Samsung's Opposition to Apple's Motion for Summary Judgment of Non-Infringement of U.S. Patent Number 7,362,867 filed by Samsung Electronics America, Inc.. (Attachments: #1 Exhibit A, #2 Exhibit B, #3 Exhibit C, #4 Exhibit D, #5 Exhibit E, #6 Exhibit F, #7 Exhibit G, #8 Exhibit H, #9 Exhibit I, #10 Exhibit J, #11 Exhibit K, #12 Exhibit L, #13 Exhibit M, #14 Exhibit N, #15 Exhibit O, #16 Exhibit P)(Maroulis, Victoria) (Filed on 6/1/2012) Modified on 6/4/2012 linking entry to document #1005 (dhm, COURT STAFF).

Download PDF
1 QUINN EMANUEL URQUHART & SULLIVAN, LLP Charles K. Verhoeven (Bar No. 170151)  charlesverhoeven@quinnemanuel.com 50 California Street, 22nd Floor  San Francisco, California 94111  Telephone: (415) 875-6600 Facsimile: (415) 875-6700  Kevin P.B. Johnson (Bar No. 177129)  kevinjohnson@quinnemanuel.com Victoria F. Maroulis (Bar No. 202603)  victoriamaroulis@quinnemanuel.com th  555 Twin Dolphin Drive, 5 Floor Redwood Shores, California 94065-2139  Telephone: (650) 801-5000 Facsimile: (650) 801-5100  Michael T. Zeller (Bar No. 196417)  michaelzeller@quinnemanuel.com  865 S. Figueroa St., 10th Floor Los Angeles, California 90017  Telephone: (213) 443-3000 Facsimile: (213) 443-3100   Attorneys for the Defendant Samsung Entities  UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN JOSE DIVISION    Case No. 11-CV-01846-LHK  APPLE INC., Plaintiff, CounterclaimDefendant   vs.  SAMSUNG ELECTRONICS CO., LTD. et. al,  Defendants, CounterclaimPlaintiffs.   DECLARATION OF RICHARD D. WESEL, PH.D. IN SUPPORT OF SAMSUNG'S OPPOSITION TO APPLE’S MOTION FOR SUMMARY JUDGMENT OF NON-INFRINGEMENT OF U.S. PATENT NUMBER 7,362,867 PUBLIC REDACTED VERSION   02198.51845/4780363.3 , PH. Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 DECLARATION OF RICHARD D. WESEL, PH.D. 2 I, Richard Wesel, declare as follows: 3 1. I have been retained on behalf of Samsung Electronics Co., Ltd. Samsung 4 Electronics America., Inc. and Samsung Telecommunications America, LLC (“Samsung”) to offer 5 6 7 8 an expert opinion on the infringement of U.S. Patent No. 7,362,867 to Kim et al. (’867 Patent) asserted in this case against Apple Inc. (“Apple”). 2. I have bachelor's and master's degrees in electrical engineering from the 9 Massachusetts Institute of Technology and a doctorate in electrical engineering from Stanford 10 University. 11 12 13 3. I am currently a Professor in the Electrical Engineering Department and Associate Dean of Academic and Student Affairs for the Henry Samueli School of Engineering and Applied Science (HSSEAS) at UCLA. I have been an electrical engineering professor at UCLA since 1996 14 15 16 17 teaching courses in error control coding and communication systems among other topics. I received the HSSEAS TRW Excellence in Teaching Award in 2000. 4. I have authored or co-authored over 130 conference and journal publications on 18 communications and signal processing. I have received the National Science Foundation 19 CAREER Award and an Okawa Foundation Award for Excellence in Telecommunications 20 21 22 23 Research. 5. I am being compensated at my standard hourly consulting rate of $450. My compensation does not depend on my testimony, the opinions I express, or the outcome of this 24 litigation. 25 6. If asked at hearings or trial, I am prepared to testify on issues pertaining to wether 26 the baseband processors in the Apple iPhone 3G, 3GS, and 4 (GSM version) as well as the original 27 iPad 3G and the iPad 2 3G (GSM version) (collectively the “Accused Apple Products”) infringe 28 -1- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 the claims of the ’867 Patent and relevant background materials such as source code, standards 2 documents, and technical specifications. 3 4 I. MATERIALS CONSIDERED 7. In preparing this report, I have considered and relied upon my own experiences in 5 6 the field, the items discussed herein: 7 a. U.S. Patent No. 7,362,867 8 b. U.S. Patent No. 7,362,867 prosecution history 9 c. 3GPP Standard TS 25.213 Release 5.0.0 10 d. 3GPP Standard TS 25.213 Release 6.0.0 11 12 e. 3GPP Standard TS 25.213 Release 6.5.0 13 f. Samsung’s Patent Local Rules 3-1 Infringement Contentions filed September 7, 2011 14 g. Apple’s PLR 4-2 disclosure dated Oct. 31, 2011 15 16 17 18 h. Samsung’s PLR 4-2 disclosure dated Oct. 31, 2011 i. Deposition Transcript of Mr. Jason Shi dated March 1, 2012 (“Shi Dep.”) j. Deposition Transcript of Mr. Hee Won Kang dated Nov. 15, 2011 (“Kang Dep.”) 19 k. Deposition Transcript of Mr. Jae Yoel Kim dated Nov. 18, 2011 (“Kim Dep.”) 20 l. Deposition Transcript of Mr. Mack Paltian dated March 20, 2012 (“Paltian Dep.”) 21 m. Deposition Transcript of Mr. Andre Zorn dated March 20, 2012 (“Zorn Dep.”) 22 n. Qualcomm MDM6210/MDM6610 Mobile Data Modem Device Specification 23 o. (Bates Nos. QCITC7940000089-193) 24 25 26 27 p. UBM TechInsights Teardown Report (Bates Nos. S-ITC-003058461–653) q. Infineon X-Gold 608 Product Specification (Bates Nos. APL7940015897894900099) r. Infineon X-Gold 61x Product Specification (Bates Nos. 593DOC002961-4487) 28 -2- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. s. 3G Scrambling Codes (from 25.211) (Bates No. 750DOC001008-17) 1 2 II. 3 4 LEGAL PRINCIPLES A. Claim Construction 8. I understand that claim construction is an issue of law for the Court to decide. I 5 6 7 further understand that the purpose of claim construction is to determine the meaning and scope of the patent claims asserted to be infringed from the standpoint of a person of ordinary skill in the 8 art at the time of the invention. I understand that although the Court has ruled on the parties’ 9 disputed claim terms in its Order Construing Disputed Clam Terms of U.S. Patent Nos. 7,698,711; 10 6,493,002; 7,469,381; 7,663,607; 7,812,828; 7,844,915; and 7,853,891 neither party requested the 11 12 13 14 Court to construe any terms related to the ’867 Patent. I understand that the parties initially exchanged proposed claim construction regarding the terms “primary scrambling code” and “means for delaying at least one of the primary scrambling codes and secondary scrambling code 15 to produce Q-channel components.” (Wesel Decl., Exhibit H). 16 9. I understand that the meaning of a term is considered in the context of the patent as 17 a whole, including the claim language and the specification, as well as the patent's prosecution 18 history – collectively described as intrinsic evidence. I also understand that claim construction 19 20 21 22 23 may take into account extrinsic evidence, such as dictionaries and treatises; however, such evidence is considered less reliable than intrinsic evidence, and is examined in the context of the available intrinsic evidence. 10. I am informed and understand that district courts are not required to construe every 24 limitation present in a patent's claim. In particular, a district court is not obligated to construe 25 terms with ordinary meanings, lest trial courts be inundated with requests to parse the meaning of 26 27 every word in the asserted claims. However, a determination that a claim term “needs no construction” or can be understood according to its “plain and ordinary meaning” may be 28 -3- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 inadequate when a term has more than one ordinary meaning or when reliance on a term's ordinary 2 meaning does not resolve the parties' dispute. 3 4 B. Infringement 11. I understand that the patentee has the burden of proving infringement by the 5 6 7 8 preponderance of the evidence. This standard requires that the patentee present evidence that, as a whole, shows that the fact sought to be proved is more probable than not. 12. I understand that an analysis of patent infringement requires two steps. The first 9 step is to determine the proper meaning and scope of the asserted claims, as discussed above. The 10 second step is to compare the claims, properly construed, to the accused devices or processes. 11 12 13 14 13. I understand that to literally infringe a patent claim, a product or process must contain or embody each and every limitation of that claim, properly construed. 14. I understand that even if all limitations of a claim are not literally met, an accused 15 product or process may still infringe under the Doctrine of Equivalents (“DOE”). Specifically, if a 16 product or process does not literally infringe, based upon the express terms of a patent claim, the 17 product or process may nonetheless be found to infringe if the elements of the accused product or 18 process are “equivalents” of the claimed elements of the patented invention. I understand that this 19 20 21 22 equivalency is typically found if the elements of the accused product or process are “insubstantially different” form the claimed elements of the patented invention, and insubstantiality of difference typically occurs when the elements of the accused product or process 23 perform the same function as the claimed elements of the patented invention, accomplish 24 substantially the same result, and do so in substantially the same way. 25 26 27 15. I understand that if an accused product or process wholly lacks even a single limitation of a claim, it cannot infringe the claim under the DOE. I understand that the range of equivalents cannot be so broad as to encompass that which was already known in the prior art. I 28 -4- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 also understand that the doctrine of prosecution history estoppel precludes a patentee from 2 reclaiming through equivalents subject matter that was relinquished based on statements or 3 4 amendments during prosecution. 16. I am informed by counsel that an analysis of the role played by each element in the 5 6 7 context of the specific patent claim will help inform the inquiry as to whether (a) an accused substitute element matches the function, way, and result of the claimed element, or (b) the accused 8 substitute element plays a role substantially different from the claimed element, because things 9 that are equivalent in one context may be inequivalent in another context, and thing inequivalent in 10 one context may be equivalent in another context. 11 12 13 14 17. I understand that every claim limitation is essential in proving infringement, and that the absence of even one limitation in an accused product or process avoids infringement. 18. I understand that, to infringe a dependent claim, the accused product or process 15 must include each and every limitation of all claims from which the dependent claim depends. 16 Therefore, a dependent claim cannot be infringed by an accused product or process if the product 17 or process does not infringe the independent claim from which the dependent claim depends. 18 19 20 21 22 23 C. Person of Ordinary Skill in the Art 19. I understand that to determine the ordinary and customary meaning of a claim term, one looks to the meaning that a person of ordinary skill in the art would have given the term at the time of the invention. 20. I understand that a person of ordinary skill is also a person of ordinary creativity, 24 not an automaton. A person of ordinary skill, while not someone who undertakes to innovate, is 25 capable of drawing inferences and taking creative steps. I understand that the hypothetical person 26 of ordinary skill is a person of ordinary skill at the time of the alleged invention. 27 28 -5- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 21. 1 It is my opinion that a person of ordinary skill in the relevant art of the ’867 Patent 2 at the time of those inventions would have had a Bachelors degree in electrical engineering with 3 4 three years of relevant engineering experience or a Masters degree in electrical engineering with one year of relevant experience. 5 6 III. THE ASSERTED CLAIMS 7 A. Technology Background 8 22. Standards organizations are essential in the engineering and manufacturing of 9 technological products. These organizations ensure that products components and the devices 10 themselves are compatible with existing end-user products or the networks on which they operate. 11 12 13 14 For mobile communications, mobile devices and network equipment manufactured by different companies must be able to communicate with one another. Without an agreed upon standard, communications between such devices would not be possible. Examples of such standards 15 organizations include IEEE (www.ieee.org), which is known for the Ethernet (IEEE 802.3) and 16 WiFi (IEEE 802.11) standards, the National Institute of Standard and Technology (www.nist.gov) 17 , which is a federal agency known for encryption (FIPS-197) and hashing standards (FIPS-180) 18 standards, and the International Organization for Standardization (www.iso.org) , which sets the 19 20 21 22 quality assurance (ISO 9000) standard. 23. For mobile communications, the European Telecommunications Standard Institute (“ETSI”) (www.etsi.org) “produces globally-applicable standards for Information and 23 Communications Technologies (ICT), including fixed, mobile, radio, converged, broadcast and 24 internet technologies.” (ETSI, http://www.etsi.org/WebSite/AboutETSI/AboutEtsi.aspx (last 25 visited March 20, 2012)). ETSI is “officially recognized by the European Union as a European 26 Standards Organization [and is] a not-for-profit organization with more than 700 ETSI member 27 28 -6- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 organizations drawn from 62 countries across 5 continents world-wide.” (ETSI, 2 http://www.etsi.org/WebSite/AboutETSI/AboutEtsi.aspx (last visited March 20, 2012). 3 4 24. Two of the most popular standards for wireless mobile devices are the Global System for Mobile Communication (“GSM”) and its later version the Universal Mobile 5 6 7 Telecommunications System (“UMTS”). Today, the 3rd Generation Partnership Project (3GPP) governs the standardization of GSM and UMTS. GSM and UMTS regulate cellular networks and, 8 in particular, the networks owned and operated by service providers such as AT&T. 3GPP is a 9 partnership of several standardization organizations including The Association of Radio Industries 10 and Businesses (ARIB), (Japan), The Alliance for Telecommunications Industry Solutions (ATIS), 11 12 13 14 15 (USA), China Communications Standards Association (CCSA), ETSI (Europe), Telecommunications Technology Association (TTA), (Korea), Telecommunication Technology Committee (TTC), (Japan). (http://www.3gpp.org/partners). 25. Samsung has been an important member of ETSI throughout the period of the ’867 16 Patent and has been one of the primary contributors to the 3GPP Standard generally and, more 17 specifically, to 3GPP TS 25.213. Samsung has declared over 40 U.S. or foreign patents and patent 18 applications as essential or as likely to become essential to TS 25.213 including ’867 Patent, U.S. 19 20 21 22 Patent No. 6,459,693 (“Device and Method for Cancelling Code Interference in CDMA Communication System”), AU App. No. 2002300503 (“Method of Transmitting/Receiving Information About Orthogonal Variable Spreading Factor Codes Assigned to User Data in a High 23 Speed Data Packet Access Communications System”), and EP App. No. 00935677.5 (“Apparatus 24 and Method for Generating Sync Word and Transmitting and Receiving the Sync Word in W25 CDMA Communication System”). (See ETSI IPR Information Statement and Licensing 26 Declaration, Bates No. APLNDC-WH-A 0000009375-9396). Samsung’s contributions regarding 27 28 -7- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 the generation of scrambling codes were recognized by ETSI and adopted over competing 2 proposals. 3 4 26. Although there may be some variations, the wireless networks owned and operated by service providers such as AT&T consist of a wireless portion and a wired portion, as depicted 5 6 in the figure below: 7 8 9 10 11 12 13 14 15 16 Figure 1 – Wireless Network 17 18 27. The base station communicates with mobile devices wirelessly by transmitting and 19 receiving radio frequency (RF) signals. Within the 3GPP Standard, the base station is also known 20 as “Node B” and the mobile devices are known as user equipment (“UE”). 21 22 23 24 25 28. Figure 1 shows two types of wireless communication – communication from the base station to the mobile device (“downlink communication”) and communication from the mobile device to the base station (“uplink communications”). 29. Because of transmitter power limitations and also to increase density, a central idea 26 of cellular mobile communications is that there are many base stations and that each base station 27 covers a limited region, called a cell. However, wireless communications from a UE meant for one 28 -8- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 base station are often also present at the receiving antenna of other (nearby) base stations. 2 Similarly, wireless communications from a base station meant for one UE often are present at the 3 4 receive antenna(s) of other UEs including both UEs of the same base station and UEs that are communicating with a different (nearby) base station. Also, the base station will simultaneously be 5 6 7 receiving communications from multiple UEs that are communicating with it. 30. Thus, for cellular communication systems to succeed there must be a way for a UE 8 to receive the transmissions intended for it and suppress other transmissions. Similarly, the base 9 station must be able to identify and receive each of the transmissions intended for it from multiple 10 UEs while suppressing transmissions meant for other base stations. 11 12 13 14 31. Scrambling codes provide one way for a receiver to identify and receive the transmissions intended for it while suppressing the other transmissions. Specifically, at the transmitter, the transmission is spread using a specific scrambling sequence. Then, at the receiver, 15 the received sequence is correlated using that same scrambling sequence. Other receivers with 16 different scrambling sequences will suppress the unwanted transmissions when they use a 17 different scrambling code in their correlator than the scrambling code associated with the 18 unwanted transmissions. 19 20 21 22 32. For this system to work, each base station and each UE must have the capability to produce a large number of well-separated scrambling sequences. One such family of wellseparated scrambling sequences are the Gold codes. A particular set of Gold codes is produced by 23 adding two m-sequences with various relative offsets (also known as shifts or delays) between the 24 two m-sequences. Each possible relative delay produces a different Gold code, and the number of 25 possible Gold codes in such a set is the number of possible relative delays which is also the length 26 of the original m-sequences. 27 28 -9- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 33. 1 A key idea of the ’867 Patent is an inventive method and apparatus for generating 2 such a set of Gold codes in an extremely efficient way by using masking to introduce the needed 3 4 delays. The asserted claims of the ’867 Patent are directed toward a novel and efficient method of generating, selecting and specifically organizing primary and secondary scrambling codes. 5 B. 7 Asserted Claims of the ’867 Patent 34. 6 The Asserted Claims of the ’867 Patent are reproduced below with terms being 8 construed by either party bolded the first time that the term appears in the claims: 9 35. 10 Claim 25 recites: 11 a. An apparatus for generating scrambling codes in mobile communication system having a scrambling code generator, comprising: 12 b. a first m-sequence generator to generate a first m-sequence; 13 c. a second m-sequence generator to generate a second m-sequence; and 14 d. at least one adder for generating a ((K-1)*M+K)th Gold code as a Kth primary scrambling code by adding a (((K-1)*M+K)-1)-times shifted first m-sequence and the second m-sequence, 15 16 e. wherein K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code. 17 18 36. 19 The apparatus of claim 25, wherein the secondary scrambling codes of the Kth primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold codes. 20 21 22 23 Claim 26 recites: IV. SUMMARY OF OPINIONS 37. It is my opinion that Apple is improperly construing the term “scrambling code” in 24 its motion for summary judgment. Apple argues that, in order to infringe, the Patent requires that 25 the “scrambling code” in claim 25 must be “complex scrambling code sequence Sdl,n” as that term 26 27 is used in the 3GPP Standard. (See Apple’s Motion for Summary Judgment of Noninfringement of U.S. Patent No. 7,362,867 (“Apple’s Motion”) at 5-7). 28 -10- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. (Id.). This argument 1 2 requires a construction of “scrambling code” such that a “scrambling code” cannot be a sum of 3 4 two m-sequences and must be a complex code sequence. This construction is not supported by the Patent and is not what one of ordinary skill would understand the term to mean. 5 38. 6 7 It is my opinion, a person of ordinary skill in the art would understand the term “scrambling code” as used in the claims of the ’867 Patent to mean “a code generated by adding a 8 first m-sequence and a second m-sequence.” The Patent is clear that the scrambling codes taught 9 by claims 25 and 26 are codes generated by adding two m-sequences and that the result of this 10 addition is a binary scrambling code. 11 12 13 14 39. It is my opinion that under the proper construction of “scrambling code,” Apple’s iPhone and iPad products literally infringe claims 25 and 26 of the ’867 Patent. Apple does not argue otherwise. 15 V. CONSTRUCTION OF THE TERM “SCRAMBLING CODE” 16 40. Claim 25 of the ’867 Patent claims an “apparatus for generating a scrambling code” 17 that generates a “Gold code” as a “primary scrambling code.” (’867 Patent at 15:65-16:12). 18 Claim 26 describes an apparatus for generating secondary scrambling codes. (Id. at 16:13-15). 19 Apple does not contest its practice of any of the asserted claims or limitations save one. 20 21 22 (Apple’s Motion 23 24 at 2:21-3:1). To the contrary, this assertion is not supported by the facts. Apple’s position is 25 based entirely upon an erroneous construction of the term “scrambling code.” Using the definition 26 of “scrambling code” provided within the language of claim 25 and reiterated in the patent 27 28 -11- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 specification, defining a scrambling code as a Gold code generated by the addition of two m2 sequences, it is clear that the Accused Products generate Gold codes that are scrambling codes. 3 4 41. I understand that the basis of Apple’s non-infringement argument rests on the limitation requiring “at least one adder for generating a ((K-1)*M+K)th Gold code as a Kth primary 5 6 7 scrambling code by adding (((K-1)*M+K)-1)-times shifted first m-sequence and a second msequence.” Apple’s argument is founded on its construction of the term “scrambling code” in 8 claims 25 and 26 of the ’867 Patent. Apple construes “scrambling code” to mean “complex 9 scrambling code sequence Sdl,n” in the 3GPP Standard. Apple argues that, as they are used in the 10 3GPP Standard, the terms “scrambling codes” and “Gold codes” are distinct and separate from one 11 12 13 14 15 another and, as a result, the Accused Apple Products cannot generate a ((K-1)*M+K)th Gold code as a Kth primary scrambling code by adding (((K-1)*M+K)-1)-times shifted first m-sequence and a second m-sequence. 42. In my opinion, this is not a valid claim construction. Apple’s construction requires 16 a binary sequence (comprised of 1s and 0s) to be complex sequence (comprised of real and 17 imaginary values), which is not possible. Because the claims explicitly state that the adder 18 generates a Gold code (which is binary) as a scrambling code, Apple’s construction of a primary 19 20 21 22 scrambling code as a complex sequence is internally inconsistent. To be internally consistent, any construction of a primary scrambling code in claim 25 must have the primary scrambling code be a binary sequence. Indeed, the primary scrambling code in claim 25 is a particular Gold code that 23 is used for channel separation. 24 43. It is my opinion that Apple is misinterpreting the terms “Gold codes” and 25 “scrambling codes.” As described below, the ’867 Patent explicitly defines “scrambling code” as 26 27 the binary code that is the result of the addition of two m-sequences. Furthermore, even the extrinsic evidence (the 3GPP Standard, 28 -12- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 support Samsung’s assertion that Apple infringes the ’867 Patent because the Accused Apple 2 Products contain an infringing apparatus for generating scrambling codes in a UMTS mobile 3 4 communication system. A. Intrinsic Support for Samsung’s Construction 44. The intrinsic evidence of the ’867 Patent makes clear that, for the purposes of 5 6 7 interpreting claims 25 and 26, the term “scrambling code” refers to a binary scrambling code 8 generated by adding two m-sequences. Further, the Patent also makes clear that “scrambling 9 codes” and “Gold codes” are not distinct and the terms may be used interchangeably. However, 10 the Patent also teaches (for example in claim 30) using this binary scrambling code to produce the 11 12 13 14 complex scrambling code referred to as Sdl,n, described in the 3GPP Standard. 45. As I will discuss below, the Patent describes a process of generating a binary scrambling code and ultimately producing the I and Q-channel components that comprise a 15 complex scrambling code. Claims 25 and 26 teach the organization and generation of the primary 16 and secondary binary scrambling codes and the Standard and source code follow this teaching 17 exactly. That the Standard also describes using binary scrambling codes to produce complex 18 scrambling codes does not change the fact that the generation of the binary scrambling codes 19 20 21 22 infringes claims 25 and 26. Apple’s focus on the complex scrambling codes is at best misdirected. 46. The specification clearly states that the primary scrambling codes of claims 25 and 26 are binary scrambling codes. For example, in claim 25 itself the Patent references an “adder th th 23 for generating a ((K-1)*M+K) Gold code as a K primary scrambling code by adding a (((K- 24 1)*M+K)-1)-times shifted first m-sequence and the second m-sequence.” (’867 Patent at col. 25 16:5-8). Here, it is evident that the Patent is referring to a “primary scrambling code” 26 27 (interchangeably called a “Gold code”) as a binary sequence that is the result of the addition of two m-sequences. One of ordinary skill in the art recognizes that m-sequences are binary and that 28 -13- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 the addition of two m-sequences to produce a Gold code produces a binary sequence. Thus, as it 2 is used in claims 25 and 26, the scrambling code is a binary scrambling code comprised of 0s and 3 4 1s. 47. Furthermore, the Patent repeatedly refers to both primary and secondary scrambling 5 6 7 codes as binary codes resulting from the sum of two m-sequences. (See ’867 Patent at col. 4:3-4 (“a gold sequence is normally generated through binary adding to two distinct m-sequences,”); 8 col. 4:62-64(“adding the output of the first m-sequence generator and the output of the second m9 sequence generator to generate first primary scrambling code for generating primary scrambling 10 code”); col. 5:2-3(“generating i-th secondary scrambling code by adding the summed value and 11 12 13 14 second m-sequence generator's output”); col. 5:13-14(“a first summer for adding the first and second m-sequences to generate the primary scrambling code”); col. 5:19-21(“adding the second m-sequence with the summed values to generate the secondary scrambling code”); col. 5:29-31(“a 15 first summer for adding the first and second m-sequences to generate the primary scrambling 16 code”); col. 6:23-24 (“A gold code used herein as a scrambling code is generated through binary 17 adding of two distinct m-sequences.”); col. 6:64-7:8 (“a gold sequence is selected from 218-1 18 length gold sequences, the first 38400 chips are used as a primary scrambling code, the second 19 20 21 22 38400 chips a first secondary scrambling code corresponding to the primary scrambling code . . . the sixth 38400 chips a fifth secondary scrambling code corresponding to the primary scrambling code.”); col. 7:13-17 (“Out of six m-sequence code groups, the first scrambling code group is used 23 as primary scrambling codes and the remaining five scrambling code groups are used as secondary 24 scrambling codes.”); col. 7:24-28 (“As shown in FIG. 6, once a primary scrambling code is 25 selected, the secondary scrambling codes corresponding to the primary scrambling code are also 26 27 part of a gold code which also includes the primary scrambling code.”); col. 8:17-20 (“The adder 740 adds the 0-th register values _(i.e., the last bits) of the first and second shift register memories 28 -14- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 700 and 705 to generate a scrambling code, which becomes the primary scrambling code.”); col. 2 9:57-58 (“The output of the adder 810 is a primary scrambling code.”); col. 9:62-65 (“the masking 3 4 5 6 7 section 820 masks the input values from the first shift register with a mask function k, (i.e., Σ(kixai)) and outputs the masked values to an adder 815 for generating the first secondary scrambling code.”); col. 10:2-5 (“Then, the adder 810 adds the output bits from the 0-th registers of the first and second shift register memories 800 and 805 to generate I-channel primary 8 scrambling code signals.”); col. 10:34-39 (“While the first embodiment masks both m-sequences 9 m1(t) and m2(t) to generate scrambling codes, the second embodiment involves cyclic shift of the 10 m-sequence m (t) only other than m (1) to generate scrambling sequences.”); col. 10:40-43 2 1 11 12 13 14 (“Referring to FIG. 9, when M secondary scrambling codes correspond to one primary scrambling code, the first (M+2)-th, (2M+3)-th, . . . , ((K-1)*M+K)-th, . . . , and (511M+512)-th gold codes are used as primary scrambling codes.”); col. 10:44-48 (“The secondary scrambling codes 15 corresponding to the ((K-1)*M+K)-th gold code used as the (K)-th primary scrambling code are 16 composed of M gold codes, i.e., ((K-1)*M+(K+1)), ((K-1)*(K+2)) . . . , and (K*M+K)-th gold 17 codes.”); col. 11:5-7 (“The scrambling code generator shown in FIG. 10 comprises the two m18 sequence generators 1050 and 1060”); col. 11:17-19 (“The second embodiment of the present 19 20 21 22 invention uses a gold code length of 38400 symbols to generate scrambling codes.”); col. 11:43-46 (“The adder 1030 adds the 0-th register values of the first and second shift register memories 1040 and 1045 to generate a scrambling code, which becomes a primary scrambling code.”); col. 11:49- 23 52 (“Here, the output from the adder 1030 is used as the primary scrambling code and the 24 scrambling codes output from the adders 1032 to 1034 can be used as secondary scrambling codes 25 that corresponds to the primary scrambling code.”). 26 27 48. In the “Background of the Invention,” the ’867 Patent states that UMTS systems, such as the one upon which the Accused Apple Products operate, use “scrambling codes for the 28 -15- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 purpose of separating base stations.” (’867 Patent at col. 1:23-25). Further, the Patent states that 2 another objective behind the use of scrambling codes in mobile communication systems is to 3 4 “increase[] capacity in addition to separation of base stations.” (Id. at col. 1:29-33). Apple does not dispute that the document governing the operation of UMTS systems is the 3GPP Standard 5 6 7 and concedes that the Accused Apple Products practice the relevant 3GPP Standard. (Apple’s Motion at 5:10-11 (“There is no dispute that the two accused Intel processors generate a 8 scrambling code in accordance with the standard. Wesel Dep. at 114:22-25 (Selwyn Decl., Ex. 9 5)”). 10 11 12 13 14 49. Further, the Patent clearly states that “Gold codes” and “scrambling codes” are the same codes. For example, according to the Patent, “[i]t should be noted that for the purpose of illustration, the term ‘scrambling code’ is interchangeable with the term ‘gold code’ or ‘gold sequence’ indicating the same code as the scrambling code.” (’867 Patent at col. 2:13-16).1 50. 15 To the extent that Apple argues that the “scrambling code” used for spreading or 16 differentiation between base-stations is different than the “scrambling code” that is 17 interchangeable with “gold code” or “gold sequence,” there is no support in the specification for 18 such a claim. Apple does not identify any language in the ’867 Patent distinguishing one 19 scrambling code from another. 20 51. 21 22 In claim 30, the Patent teaches “The apparatus as claimed in claim 25, wherein the primary scrambling code and secondary scrambling code are I-channel components and the 23 apparatus further comprises a means for delaying at least one of the primary scrambling codes and 24 1 Taken together, the quoted sections of the specification state that UMTS systems require the use of scrambling codes to separate base-stations from one another and that these “scrambling 26 codes” may also be referred to as “gold codes” or “gold sequences.” This requirement in the specification is identical to the requirement identified by the 3GPP Standard Technical 27 Specification (TS 25.213) in section 5.2.2. (3GPP TS 25.213 v5.0.0 at 22 and 3GPP TS 25.213 v6.0.0 at 22-23). 28 25 -16- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 secondary scrambling code to produce Q-channel components.” (Id. at 16:29-34). Here, the claim 2 teaches using the binary scrambling code from claim 25 as the I-channel (“real”) component of the 3 4 complex scrambling sequence and delaying that same binary scrambling code for use as the Qchannel (“imaginary”) component of the complex scrambling sequence. 5 6 (See Wesel Expert Report on Infringement at 30-39).2 7 52. 8 I note that if the “primary scrambling code” of claim 25 were taken to be a complex 9 scrambling code, claim 30 would not make sense. A complex scrambling code already has both 10 an I-channel component and a Q-channel component. A complex scrambling code sequence 11 cannot not be used as an I-channel component. 12 53. 13 14 Just as is done in claim 30, other parts of the specification treat the I and Q- channel components, which when converted from binary to real values comprise the real and 15 imaginary parts of the complex scrambling code sequence, as continuations of the scrambling code 16 referenced in claims 25 and 26. For example, the Patent describes Figure 4 as delaying the I17 channel component “to generate the gold sequence codes of a Q-channel component” (’867 Patent 18 at col. 3:64-67). Similarly, the Patent also describes Figure 8 as delaying “I-channel primary 19 20 21 22 scrambling code signals . . . to generate Q-channel primary scrambling code signals” (Id. at col. 10:5-9), and Figure 10 as delaying “the I-channel signals for a predetermined number of chips to generate Q-channel scrambling code signals” (Id. at 12:4-6). When read in conjunction with the 23 3GPP Standard, the I and Q-channel components are eventually converted to real valued 24 sequences (+1 and -1) (3GPP TS 25.213 v5.0.0 at 23 and 3GPP TS 25.213 v6.0.0 at 23), however 25 26 2 27 28 -17- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 in the Intel source code accused of infringing claims 25 and 26, they are binary values. (See 2 Verilog code file r99_cog_scr.v (Bates No. 750DOC0000011)). 3 4 54. Apple argues that “the 25.213 standard makes clear that the Gold code described in the standard (lower case zn) is not used as a scrambling code in the standard but is merely an input 5 6 7 used to produce the scrambling code.” However, the process described in the Standard (using the binary scrambling code zn to produce I and Q-channel components as shown in Figure 10) is 8 exactly the process described in claim 30 and elsewhere in the Patent. The Patent teaches an 9 apparatus that uses the binary scrambling codes of claims 25 and 26 to produce I and Q-channel 10 components. 11 12 13 (See Expert Report of Richard D. Wesel, Ph.D. Regarding Infringement of U.S. Patent No. 7,362,867 (“Infringement Report”) at ¶¶79-91). 14 B. Extrinsic Support for Samsung’s Construction 15 55. Apple’s Motion alleges that claim 25 of the Patent requires the “complex 16 scrambling code sequence Sdl,n,” referenced in the Standard must be a binary Gold code. Although 17 Apple’s Motion does not reference any intrinsic evidence demonstrating that the scrambling codes 18 referenced in claims 25 and 26 of the Patent should refer to the complex scrambling code sequence 19 20 21 22 23 Sdl,n and not to the binary scrambling code zn, the motion makes numerous references to extrinsic evidence that purportedly supports its position that the code should be complex including citations to the 3GPP Standard and my deposition. 56. Apple states “ 24 25 26 27 28 -18- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. (Apple’s Motion at 5:2-6). This argument requires construing “primary scrambling 1 2 code” in claim 25 to be the complex scrambling code Sdl,n of the Standard. 3 4 5 6 7 8 9 10 (3GPP TS 25.213 v6.0.0 at 23). 11 57. 12 13 14 15 In support of this argument, Apple considers the “Gold code sequence zn,” identified in that same section as the “Gold code” referenced in claim 25 and argues that it is wholly different than the “complex scrambling code sequence Sdl,n.” (Apple’s Motion at 5-6). Apple argues that “Although Dr. Wesel’s answer refers to ‘little z, sub n’ as a ‘binary scrambling 16 code,’ this is not the ‘primary scrambling code’ required by the claims.” (Apple’s Motion at 6:1817 19 (referencing Wesel Dep. at 116:16-22 (Selwyn Decl., Ex. 5)(see below)). 18 19 20 21 22 23 24 25 26 27 28 -19- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 (Apple’s Motion at 6:8-17). 58. The Patent states that “each unique scrambling code used for spreading 15 (scrambling) downlink channel signals of each base stations is referred to as ‘primary scrambling 16 code.’” (’867 Patent at col. 1:52-54). Apple quotes a section from my April 23, 2012 deposition in 17 18 19 20 which I responded that scrambling codes are used for spreading. (Apple’s Motion at 6 (quoting April 23, 2012 Deposition of Richard Wesel (“Wesel Dep.”) at 164:15-17) (Q. So the scrambling codes you say infringe the ‘867 patent, what are they used for? A: Spreading.”) (Selwyn Decl., Ex. 21 5).). Thus, when I stated that scrambling codes are used for “spreading”, I was merely explaining 22 what is stated in the specification. 23 59. The section of the standard excerpted above and in Apple’s Motion describes the 24 generation of scrambling codes. Binary scrambling code “z ” is a Gold code sequence that results n 25 26 27 28 from the addition of two m-sequences. This binary scrambling code is rewritten using “+1” to represent any “0” in the binary scrambling code and “-1” to represent any “1” in the binary scrambling code. This rewritten sequence is then further used to generate the complex scrambling -20- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 code sequence Sdl,n. In Figure 10, the Standard demonstrates a method of generating the complex 2 scrambling code sequence from the binary scrambling code exactly as described in claim 30 of the 3 Patent and in the patent specification: 4 5 6 7 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 I 8 9 Q 10 11 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 12 13 14 15 16 17 Figure 10: Configuration of downlink scrambling code generator 60. It is my opinion that the binary scrambling codes of claims 25 and 26 are used for spreading. This is what the specification says and it is their purpose in the 3GPP Standard. 18 Without these binary scrambling codes, the I and Q-channel components could not be generated. 19 As I stated in my deposition “[binary scrambling code ‘zn’ is] used for spreading because it's used 20 to make the ultimate spreading code.” (Wesel Dep. at 165:19-166:4). 21 22 23 24 25 26 61. Apple’s own statements support the claim construction of “primary scrambling codes” as specific Gold codes. (See Apple’s Motion at 4:20-21 (“Claim 25 includes an express requirement that the scrambling code be a ‘Gold code.’”); 5:24-6:1 (“As noted above, claim 25 of the ’867 Patent requires the generation of a scrambling code that is a Gold Code.”)). 62. Using the correct claim construction to interpret the 3GPP Standard, for n=16*i 27 where i=0…511, “little z, sub n” is exactly the primary scrambling code required by the claims 28 because it is exactly the result of an “adder for generating a ((K-1)*M+K)th Gold code as a Kth -21- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 primary scrambling code by adding a (((K-1)*M+K)-1)-times shifted first m-sequence and the 2 second m-sequence,” where K=n+1. My opinion has always been that the primary and secondary 3 4 scrambling codes of claims 25 and 26 are binary scrambling codes produced by adding two msequences (i.e. a Gold code). My expert report supports this in numerous places. (See 5 6 Infringement Report at ¶6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 63. The 3GPP Standard makes clear that zn is the (binary) primary scrambling code as defined by the Patent. The 3GPP Standard clearly distinguishes primary and secondary scrambling 23 codes by the value of n. 24 25 26 (3GPP TS 25.213 v5.0.0 at 21; 3GPP TS 25.213 v6.0.0 at 22). 27 Moreover, zn is clearly identified as being either a primary or secondary scrambling code 28 by its subscript” n,” which is called the scrambling code number in the Standard. -22- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 (3GPP TS 25.213 v5.0.0 at 22; 3GPP TS 25.213 v6.0.0 at 22). 64. The sequence zn, constructed exactly as described by the Standard, is exactly as my 5 Infringement Report described the construction of the primary and secondary scrambling codes in 6 the Intel source code as the sum of two appropriately shifted m-sequences. It is clearly identified 7 as being either primary or secondary based on the value of its subscript “n,” and matches exactly 8 9 the association of the primary and secondary scrambling codes of claims 25 and 26 with K=n+1. As a result, the Accused Apple Products contain an apparatus implementing the Standard which 10 11 12 also infringes claims 25 and 26 of the ’867 Patent. 65. Additional extrinsic evidence supports the argument that the primary scrambling 13 code described in claim 25 is a binary scrambling code. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -23- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 66. Apple’s Motion focuses on the complex scrambling sequence Sdl,n and ignores the 2 source code. However the Standard does not describe a method for implementing an apparatus for 3 4 generating scrambling codes. 67. The Patent also discusses the construction of a complex scrambling code (like 5 6 7 complex scrambling code sequence Sdl,n with I and Q-channel components) from the binary scrambling code in claim 30. (See ’867 Patent at col. 16:29-34). However, the fact that a complex 8 scrambling is discussed in the Standard does not change (and cannot change) the fact that the 9 construction of zn infringes claims 25 and 26 before Sdl,n is ever constructed. 10 11 12 13 14 68. Finally, even Apple’s expert witness uses the term “primary scrambling code” to refer to the binary scrambling code that is used to generate the I and Q-components (real and imaginary components) of the complex scrambling code sequence Sdl,n. For example, during his deposition, Apple’s expert, Dr. Wayne Stark, readily understood questioning that referred to the 15 binary scrambling code as the “primary scrambling code” and referenced other publications that 16 similarly recognized this relationship. Dr. Stark even refers to the primary and secondary 17 scrambling codes as Gold codes. 18 19 20 21 22 23 24 25 26 27 28 -24- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 (April 20, 2012 Deposition Transcript of Wayne Stark (“Stark Dep. Tr.”), Wesel Decl. Exhibit P, at 31:7-16). 2 3 4 5 6 7 8 9 10 11 12 13 (Stark Dep. Tr. at 31:24-32:8). 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -25- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 (Stark Dep. Tr. at 32:9-22). 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 (Stark Dep. Tr. at 33:5-21). 20 21 22 23 24 25 26 27 28 -26- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 (Stark Dep. Tr. at 33:22-34:12). These repeated references by Dr. Stark to the teachings in the ’867 Patent and the 15 16 purportedly invaliditing references describing how to delay a “scrambling code” to create what 17 Apple now asserts is the only scrambling code in the Standard contradict Apple’s construction of 18 the scrambling codes of claims 25 and 26 as complex sequences , a construction that is not 19 20 supported by the ’867 Patent, the 3GPP Standard, the source code or by statements of Apple’s own expert witness. 21 22 VI. INFRINGEMENT OF THE ’867 PATENT 23 A. Accused Apple Products 24 69. It is my opinion that the Accused Apple Products infringe claims 25 and 26 of the 25 ’867 Patent. The following discussion includes portions of my analysis (as presented in my earlier 26 reports) of how the Accused Apple Products meet each limitation of claims 25 and 26 of the ’867 27 Patent, literally or under the doctrine of equivalents. 28 -27- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 70. It is my opinion that the Accused Apple Products meet every limitation of claims 2 25 and 26 of the ’867 Patent for at least the reasons below and in the Infringement Report and its 3 supplements. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -28- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 76. I understand Apple asserts that “Samsung’s infringement theory is based on Apple’s compliance with the 3GPP Standard governing the accused [iPhone and iPad] products” and cites to my expert report on infringement for this statement. (See Apple’s Motion at 5:4-7). 15 Apple misunderstands my expert report and Samsung’s infringement theory. 16 77. In the section of my expert report that Apple has cited to, I state that in order to be 17 compliant with the 3GPP Standard, each Accused Apple Product “must contain an apparatus for 18 generating scrambling codes in mobile communications system.” However, my expert report does 19 20 21 not state that the Accused Apple Products infringe only because they are compliant with the 3GPP Standard. 22 23 24 25 26 27 78. Apple does not address that part of my infringement opinion that relies on 28 -29- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 the source code. Thus, the motion for summary judgment regarding non-infringement of the ’867 2 Patent claims does not refute that part my infringement opinion which is based on the source code. 3 B. The Accused Apple Products Infringe Claims 25 and 26 of the ’867 Patent 80. I understand that Apple’s only point of contention is that its products do not use 4 5 6 7 8 9 10 11 12 13 14 15 16 17 binary adders to add two m-sequences to produce complex scrambling sequence Sdl,n. Based upon 18 a proper claim construction as described above there is no question that the Accused Apple 19 Products infringe claims 25 and 26 of the ’867 Patent. 20 21 22 C. The Accused Apple Products Infringe Each Limitation of Claim 25 81. Claim 25 provides: 1. 23 24 25 82. An apparatus for generating scrambling codes in mobile communication system having a scrambling code generator, comprising: In order to be compliant with the 3GPP Standard, each of the Accused Apple 26 Products must contain an apparatus for generating scrambling codes in mobile communication 27 system having a scrambling code generator since the 3GPP Standard describes a mobile 28 -30- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 communication system and since standard-compliant devices will contain at least one scrambling 2 code generator as described in Section 5.2.2 of 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at 3 21-23) and Section 5.2.2 of 3GPP TS 25.213 v6.0.0 (Wesel Decl., Exhibit F at 22-23). 4 5 6 7 8 9 10 11 12 13 14 15 16 17 2. 85. a first m-sequence generator to generate a first m-sequence; The 3GPP Standard requires a first m-sequence generator to generate a first m- 18 sequence as described in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at 22) and 3GPP TS 19 25.213 v6.0.0. 20 21 22 23 24 86. 25 26 27 28 -31- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 3. 6 7 87. a second m-sequence generator to generate a second m-sequence; and The 3GPP Standard requires a second m-sequence generator to generate a second 8 m-sequence as described in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at 22) and 3GPP TS 9 25.213 v6.0.0 (Wesel Decl., Exhibit F at 22) as “the y sequence”. The Standard provides: 10 11 12 13 14 15 16 17 18 19 20 21 22 4. 23 24 25 89. at least one adder for generating a ((K-1)*M+K)th Gold code as a Kth primary scrambling code by adding (((K-1)*M+K)-1)-times shifted first m-sequence and a second m-sequence, The 3GPP Standard requires at least one adder for generating a ((K-1)*M+K)th 26 Gold code as a Kth primary scrambling code by adding (((K-1)*M+K)-1)-times shifted first m27 28 -32- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 sequence and a second m-sequence, as described in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit 2 E at 21) and 3GPP TS 25.213 v6.0.0 (Wesel Decl., Exhibit F at 22). The Standard provides: 3 4 5 6 7 8 9 The Standard further provides: 10 11 12 13 14 15 16 17 18 19 20 21 22 23 90. I note that the Standard above, (page 21 for v5.0.0 and page 22 for v6.0.0 of 24 Section 5.2.2 on “Scrambling code”) indexes the primary scrambling codes with the values i= 0, 25 …, 511 rather than 1, …, 512, but this does not change the fact that the Accused Apple Products 26 compute exactly the primary scrambling codes taught in claim 25. For example, exactly the same 27 Gold code is the first primary scrambling code in both the Standard and the ’867 Patent. In the 28 -33- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 Standard it is the first (n=0) Gold code and in the ’867 Patent it is the first (K=1) Gold code. In 2 both cases it is the Gold code in which the two m-sequences are added with no relative shift. 3 4 91. Each of the Accused Apple Products contains at least one adder for generating a ((K-1)*M+K)th Gold code as a Kth primary scrambling code by adding (((K-1)*M+K)-1)-times 5 6 shifted first m-sequence and a second m-sequence. 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 5. wherein K is a natural number and M is a total number of secondary scrambling codes per primary scrambling code. 26 27 28 -34- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -35- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -36- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -37- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -38- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -39- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 D. The Accused Apple Products Infringe Each Limitation of Claim 26 120. Claim 26 recites “The apparatus of claim 25, wherein the secondary scrambling codes of the Kth primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold Codes.” 121. In order to comply with the 3GPP Standard, Apples Accused Products must contain 24 “The apparatus of claim 25, wherein the secondary scrambling codes of the Kth primary 25 scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold Codes.” 26 27 122. The 3GPP Standard requires that the secondary scrambling codes of the Kth primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold Codes as described 28 -40- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at 21) and 3GPP TS 25.213 v6.0.0 (Wesel 2 Decl., Exhibit F at 22). The Standard provides: 3 4 5 6 7 8 9 123. For each of the Accused Apple Products the generated secondary scrambling codes 10 of the Kth primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold Codes. 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27                                                     28 -41- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -42- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D. 1 125. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 -43- Case No. 11-cv-01846-LHK DECLARATION OF RICHARD D. WESEL, PH.D.

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?