Apple Inc. v. Samsung Electronics Co. Ltd. et al
Filing
1003
Declaration of Richard D. Wesel, Ph.D., in Support of #1005 Samsung's Opposition to Apple's Motion for Summary Judgment of Non-Infringement of U.S. Patent Number 7,362,867 filed by Samsung Electronics America, Inc.. (Attachments: #1 Exhibit A, #2 Exhibit B, #3 Exhibit C, #4 Exhibit D, #5 Exhibit E, #6 Exhibit F, #7 Exhibit G, #8 Exhibit H, #9 Exhibit I, #10 Exhibit J, #11 Exhibit K, #12 Exhibit L, #13 Exhibit M, #14 Exhibit N, #15 Exhibit O, #16 Exhibit P)(Maroulis, Victoria) (Filed on 6/1/2012) Modified on 6/4/2012 linking entry to document #1005 (dhm, COURT STAFF).
1 QUINN EMANUEL URQUHART & SULLIVAN, LLP
Charles K. Verhoeven (Bar No. 170151)
charlesverhoeven@quinnemanuel.com
50 California Street, 22nd Floor
San Francisco, California 94111
Telephone: (415) 875-6600
Facsimile: (415) 875-6700
Kevin P.B. Johnson (Bar No. 177129)
kevinjohnson@quinnemanuel.com
Victoria F. Maroulis (Bar No. 202603)
victoriamaroulis@quinnemanuel.com
th
555 Twin Dolphin Drive, 5 Floor
Redwood Shores, California 94065-2139
Telephone:
(650) 801-5000
Facsimile:
(650) 801-5100
Michael T. Zeller (Bar No. 196417)
michaelzeller@quinnemanuel.com
865 S. Figueroa St., 10th Floor
Los Angeles, California 90017
Telephone: (213) 443-3000
Facsimile: (213) 443-3100
Attorneys for the Defendant Samsung Entities
UNITED STATES DISTRICT COURT
NORTHERN DISTRICT OF CALIFORNIA
SAN JOSE DIVISION
Case No. 11-CV-01846-LHK
APPLE INC.,
Plaintiff, CounterclaimDefendant
vs.
SAMSUNG ELECTRONICS CO., LTD. et.
al,
Defendants, CounterclaimPlaintiffs.
DECLARATION OF RICHARD D.
WESEL, PH.D. IN SUPPORT OF
SAMSUNG'S OPPOSITION TO APPLE’S
MOTION FOR SUMMARY JUDGMENT
OF NON-INFRINGEMENT OF U.S.
PATENT NUMBER 7,362,867
PUBLIC REDACTED VERSION
02198.51845/4780363.3
, PH.
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
DECLARATION OF RICHARD D. WESEL, PH.D.
2
I, Richard Wesel, declare as follows:
3
1.
I have been retained on behalf of Samsung Electronics Co., Ltd. Samsung
4 Electronics America., Inc. and Samsung Telecommunications America, LLC (“Samsung”) to offer
5
6
7
8
an expert opinion on the infringement of U.S. Patent No. 7,362,867 to Kim et al. (’867 Patent)
asserted in this case against Apple Inc. (“Apple”).
2.
I have bachelor's and master's degrees in electrical engineering from the
9 Massachusetts Institute of Technology and a doctorate in electrical engineering from Stanford
10 University.
11
12
13
3.
I am currently a Professor in the Electrical Engineering Department and Associate
Dean of Academic and Student Affairs for the Henry Samueli School of Engineering and Applied
Science (HSSEAS) at UCLA. I have been an electrical engineering professor at UCLA since 1996
14
15
16
17
teaching courses in error control coding and communication systems among other topics. I
received the HSSEAS TRW Excellence in Teaching Award in 2000.
4.
I have authored or co-authored over 130 conference and journal publications on
18 communications and signal processing. I have received the National Science Foundation
19 CAREER Award and an Okawa Foundation Award for Excellence in Telecommunications
20
21
22
23
Research.
5.
I am being compensated at my standard hourly consulting rate of $450. My
compensation does not depend on my testimony, the opinions I express, or the outcome of this
24 litigation.
25
6.
If asked at hearings or trial, I am prepared to testify on issues pertaining to wether
26 the baseband processors in the Apple iPhone 3G, 3GS, and 4 (GSM version) as well as the original
27 iPad 3G and the iPad 2 3G (GSM version) (collectively the “Accused Apple Products”) infringe
28
-1-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 the claims of the ’867 Patent and relevant background materials such as source code, standards
2 documents, and technical specifications.
3
4
I.
MATERIALS CONSIDERED
7.
In preparing this report, I have considered and relied upon my own experiences in
5
6
the field, the items discussed herein:
7
a. U.S. Patent No. 7,362,867
8
b. U.S. Patent No. 7,362,867 prosecution history
9
c. 3GPP Standard TS 25.213 Release 5.0.0
10
d. 3GPP Standard TS 25.213 Release 6.0.0
11
12
e. 3GPP Standard TS 25.213 Release 6.5.0
13
f. Samsung’s Patent Local Rules 3-1 Infringement Contentions filed September 7,
2011
14
g. Apple’s PLR 4-2 disclosure dated Oct. 31, 2011
15
16
17
18
h. Samsung’s PLR 4-2 disclosure dated Oct. 31, 2011
i. Deposition Transcript of Mr. Jason Shi dated March 1, 2012 (“Shi Dep.”)
j. Deposition Transcript of Mr. Hee Won Kang dated Nov. 15, 2011 (“Kang Dep.”)
19
k. Deposition Transcript of Mr. Jae Yoel Kim dated Nov. 18, 2011 (“Kim Dep.”)
20
l. Deposition Transcript of Mr. Mack Paltian dated March 20, 2012 (“Paltian Dep.”)
21
m. Deposition Transcript of Mr. Andre Zorn dated March 20, 2012 (“Zorn Dep.”)
22
n. Qualcomm MDM6210/MDM6610 Mobile Data Modem Device Specification
23
o. (Bates Nos. QCITC7940000089-193)
24
25
26
27
p. UBM TechInsights Teardown Report (Bates Nos. S-ITC-003058461–653)
q. Infineon X-Gold 608 Product Specification (Bates Nos. APL7940015897894900099)
r. Infineon X-Gold 61x Product Specification (Bates Nos. 593DOC002961-4487)
28
-2-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
s. 3G Scrambling Codes (from 25.211) (Bates No. 750DOC001008-17)
1
2 II.
3
4
LEGAL PRINCIPLES
A.
Claim Construction
8.
I understand that claim construction is an issue of law for the Court to decide. I
5
6
7
further understand that the purpose of claim construction is to determine the meaning and scope of
the patent claims asserted to be infringed from the standpoint of a person of ordinary skill in the
8 art at the time of the invention. I understand that although the Court has ruled on the parties’
9 disputed claim terms in its Order Construing Disputed Clam Terms of U.S. Patent Nos. 7,698,711;
10 6,493,002; 7,469,381; 7,663,607; 7,812,828; 7,844,915; and 7,853,891 neither party requested the
11
12
13
14
Court to construe any terms related to the ’867 Patent. I understand that the parties initially
exchanged proposed claim construction regarding the terms “primary scrambling code” and
“means for delaying at least one of the primary scrambling codes and secondary scrambling code
15 to produce Q-channel components.” (Wesel Decl., Exhibit H).
16
9.
I understand that the meaning of a term is considered in the context of the patent as
17 a whole, including the claim language and the specification, as well as the patent's prosecution
18 history – collectively described as intrinsic evidence. I also understand that claim construction
19
20
21
22
23
may take into account extrinsic evidence, such as dictionaries and treatises; however, such
evidence is considered less reliable than intrinsic evidence, and is examined in the context of the
available intrinsic evidence.
10.
I am informed and understand that district courts are not required to construe every
24 limitation present in a patent's claim. In particular, a district court is not obligated to construe
25 terms with ordinary meanings, lest trial courts be inundated with requests to parse the meaning of
26
27
every word in the asserted claims. However, a determination that a claim term “needs no
construction” or can be understood according to its “plain and ordinary meaning” may be
28
-3-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 inadequate when a term has more than one ordinary meaning or when reliance on a term's ordinary
2 meaning does not resolve the parties' dispute.
3
4
B.
Infringement
11.
I understand that the patentee has the burden of proving infringement by the
5
6
7
8
preponderance of the evidence. This standard requires that the patentee present evidence that, as a
whole, shows that the fact sought to be proved is more probable than not.
12.
I understand that an analysis of patent infringement requires two steps. The first
9 step is to determine the proper meaning and scope of the asserted claims, as discussed above. The
10 second step is to compare the claims, properly construed, to the accused devices or processes.
11
12
13
14
13.
I understand that to literally infringe a patent claim, a product or process must
contain or embody each and every limitation of that claim, properly construed.
14.
I understand that even if all limitations of a claim are not literally met, an accused
15 product or process may still infringe under the Doctrine of Equivalents (“DOE”). Specifically, if a
16 product or process does not literally infringe, based upon the express terms of a patent claim, the
17 product or process may nonetheless be found to infringe if the elements of the accused product or
18 process are “equivalents” of the claimed elements of the patented invention. I understand that this
19
20
21
22
equivalency is typically found if the elements of the accused product or process are
“insubstantially different” form the claimed elements of the patented invention, and
insubstantiality of difference typically occurs when the elements of the accused product or process
23 perform the same function as the claimed elements of the patented invention, accomplish
24 substantially the same result, and do so in substantially the same way.
25
26
27
15.
I understand that if an accused product or process wholly lacks even a single
limitation of a claim, it cannot infringe the claim under the DOE. I understand that the range of
equivalents cannot be so broad as to encompass that which was already known in the prior art. I
28
-4-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 also understand that the doctrine of prosecution history estoppel precludes a patentee from
2 reclaiming through equivalents subject matter that was relinquished based on statements or
3
4
amendments during prosecution.
16.
I am informed by counsel that an analysis of the role played by each element in the
5
6
7
context of the specific patent claim will help inform the inquiry as to whether (a) an accused
substitute element matches the function, way, and result of the claimed element, or (b) the accused
8 substitute element plays a role substantially different from the claimed element, because things
9 that are equivalent in one context may be inequivalent in another context, and thing inequivalent in
10 one context may be equivalent in another context.
11
12
13
14
17.
I understand that every claim limitation is essential in proving infringement, and
that the absence of even one limitation in an accused product or process avoids infringement.
18.
I understand that, to infringe a dependent claim, the accused product or process
15 must include each and every limitation of all claims from which the dependent claim depends.
16 Therefore, a dependent claim cannot be infringed by an accused product or process if the product
17 or process does not infringe the independent claim from which the dependent claim depends.
18
19
20
21
22
23
C.
Person of Ordinary Skill in the Art
19.
I understand that to determine the ordinary and customary meaning of a claim term,
one looks to the meaning that a person of ordinary skill in the art would have given the term at the
time of the invention.
20.
I understand that a person of ordinary skill is also a person of ordinary creativity,
24 not an automaton. A person of ordinary skill, while not someone who undertakes to innovate, is
25 capable of drawing inferences and taking creative steps. I understand that the hypothetical person
26
of ordinary skill is a person of ordinary skill at the time of the alleged invention.
27
28
-5-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
21.
1
It is my opinion that a person of ordinary skill in the relevant art of the ’867 Patent
2 at the time of those inventions would have had a Bachelors degree in electrical engineering with
3
4
three years of relevant engineering experience or a Masters degree in electrical engineering with
one year of relevant experience.
5
6
III.
THE ASSERTED CLAIMS
7
A.
Technology Background
8
22.
Standards organizations are essential in the engineering and manufacturing of
9 technological products. These organizations ensure that products components and the devices
10 themselves are compatible with existing end-user products or the networks on which they operate.
11
12
13
14
For mobile communications, mobile devices and network equipment manufactured by different
companies must be able to communicate with one another. Without an agreed upon standard,
communications between such devices would not be possible. Examples of such standards
15 organizations include IEEE (www.ieee.org), which is known for the Ethernet (IEEE 802.3) and
16 WiFi (IEEE 802.11) standards, the National Institute of Standard and Technology (www.nist.gov)
17 , which is a federal agency known for encryption (FIPS-197) and hashing standards (FIPS-180)
18 standards, and the International Organization for Standardization (www.iso.org) , which sets the
19
20
21
22
quality assurance (ISO 9000) standard.
23.
For mobile communications, the European Telecommunications Standard Institute
(“ETSI”) (www.etsi.org) “produces globally-applicable standards for Information and
23 Communications Technologies (ICT), including fixed, mobile, radio, converged, broadcast and
24 internet technologies.” (ETSI, http://www.etsi.org/WebSite/AboutETSI/AboutEtsi.aspx (last
25 visited March 20, 2012)). ETSI is “officially recognized by the European Union as a European
26
Standards Organization [and is] a not-for-profit organization with more than 700 ETSI member
27
28
-6-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 organizations drawn from 62 countries across 5 continents world-wide.” (ETSI,
2 http://www.etsi.org/WebSite/AboutETSI/AboutEtsi.aspx (last visited March 20, 2012).
3
4
24.
Two of the most popular standards for wireless mobile devices are the Global
System for Mobile Communication (“GSM”) and its later version the Universal Mobile
5
6
7
Telecommunications System (“UMTS”). Today, the 3rd Generation Partnership Project (3GPP)
governs the standardization of GSM and UMTS. GSM and UMTS regulate cellular networks and,
8 in particular, the networks owned and operated by service providers such as AT&T. 3GPP is a
9 partnership of several standardization organizations including The Association of Radio Industries
10 and Businesses (ARIB), (Japan), The Alliance for Telecommunications Industry Solutions (ATIS),
11
12
13
14
15
(USA), China Communications Standards Association (CCSA), ETSI (Europe),
Telecommunications Technology Association (TTA), (Korea), Telecommunication Technology
Committee (TTC), (Japan). (http://www.3gpp.org/partners).
25.
Samsung has been an important member of ETSI throughout the period of the ’867
16 Patent and has been one of the primary contributors to the 3GPP Standard generally and, more
17 specifically, to 3GPP TS 25.213. Samsung has declared over 40 U.S. or foreign patents and patent
18 applications as essential or as likely to become essential to TS 25.213 including ’867 Patent, U.S.
19
20
21
22
Patent No. 6,459,693 (“Device and Method for Cancelling Code Interference in CDMA
Communication System”), AU App. No. 2002300503 (“Method of Transmitting/Receiving
Information About Orthogonal Variable Spreading Factor Codes Assigned to User Data in a High
23 Speed Data Packet Access Communications System”), and EP App. No. 00935677.5 (“Apparatus
24 and Method for Generating Sync Word and Transmitting and Receiving the Sync Word in W25 CDMA Communication System”). (See ETSI IPR Information Statement and Licensing
26
Declaration, Bates No. APLNDC-WH-A 0000009375-9396). Samsung’s contributions regarding
27
28
-7-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 the generation of scrambling codes were recognized by ETSI and adopted over competing
2 proposals.
3
4
26.
Although there may be some variations, the wireless networks owned and operated
by service providers such as AT&T consist of a wireless portion and a wired portion, as depicted
5
6
in the figure below:
7
8
9
10
11
12
13
14
15
16
Figure 1 – Wireless Network
17
18
27.
The base station communicates with mobile devices wirelessly by transmitting and
19 receiving radio frequency (RF) signals. Within the 3GPP Standard, the base station is also known
20 as “Node B” and the mobile devices are known as user equipment (“UE”).
21
22
23
24
25
28.
Figure 1 shows two types of wireless communication – communication from the
base station to the mobile device (“downlink communication”) and communication from the
mobile device to the base station (“uplink communications”).
29.
Because of transmitter power limitations and also to increase density, a central idea
26 of cellular mobile communications is that there are many base stations and that each base station
27 covers a limited region, called a cell. However, wireless communications from a UE meant for one
28
-8-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 base station are often also present at the receiving antenna of other (nearby) base stations.
2 Similarly, wireless communications from a base station meant for one UE often are present at the
3
4
receive antenna(s) of other UEs including both UEs of the same base station and UEs that are
communicating with a different (nearby) base station. Also, the base station will simultaneously be
5
6
7
receiving communications from multiple UEs that are communicating with it.
30.
Thus, for cellular communication systems to succeed there must be a way for a UE
8 to receive the transmissions intended for it and suppress other transmissions. Similarly, the base
9 station must be able to identify and receive each of the transmissions intended for it from multiple
10 UEs while suppressing transmissions meant for other base stations.
11
12
13
14
31.
Scrambling codes provide one way for a receiver to identify and receive the
transmissions intended for it while suppressing the other transmissions. Specifically, at the
transmitter, the transmission is spread using a specific scrambling sequence. Then, at the receiver,
15 the received sequence is correlated using that same scrambling sequence. Other receivers with
16 different scrambling sequences will suppress the unwanted transmissions when they use a
17 different scrambling code in their correlator than the scrambling code associated with the
18 unwanted transmissions.
19
20
21
22
32.
For this system to work, each base station and each UE must have the capability to
produce a large number of well-separated scrambling sequences. One such family of wellseparated scrambling sequences are the Gold codes. A particular set of Gold codes is produced by
23 adding two m-sequences with various relative offsets (also known as shifts or delays) between the
24 two m-sequences. Each possible relative delay produces a different Gold code, and the number of
25 possible Gold codes in such a set is the number of possible relative delays which is also the length
26
of the original m-sequences.
27
28
-9-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
33.
1
A key idea of the ’867 Patent is an inventive method and apparatus for generating
2 such a set of Gold codes in an extremely efficient way by using masking to introduce the needed
3
4
delays. The asserted claims of the ’867 Patent are directed toward a novel and efficient method of
generating, selecting and specifically organizing primary and secondary scrambling codes.
5
B.
7
Asserted Claims of the ’867 Patent
34.
6
The Asserted Claims of the ’867 Patent are reproduced below with terms being
8 construed by either party bolded the first time that the term appears in the claims:
9
35.
10
Claim 25 recites:
11
a. An apparatus for generating scrambling codes in mobile communication system
having a scrambling code generator, comprising:
12
b. a first m-sequence generator to generate a first m-sequence;
13
c. a second m-sequence generator to generate a second m-sequence; and
14
d. at least one adder for generating a ((K-1)*M+K)th Gold code as a Kth primary
scrambling code by adding a (((K-1)*M+K)-1)-times shifted first m-sequence and
the second m-sequence,
15
16
e. wherein K is a natural number and M is a total number of secondary scrambling
codes per one primary scrambling code.
17
18
36.
19
The apparatus of claim 25, wherein the secondary scrambling codes of the Kth
primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold
codes.
20
21
22
23
Claim 26 recites:
IV.
SUMMARY OF OPINIONS
37.
It is my opinion that Apple is improperly construing the term “scrambling code” in
24 its motion for summary judgment. Apple argues that, in order to infringe, the Patent requires that
25 the “scrambling code” in claim 25 must be “complex scrambling code sequence Sdl,n” as that term
26
27
is used in the 3GPP Standard. (See Apple’s Motion for Summary Judgment of Noninfringement
of U.S. Patent No. 7,362,867 (“Apple’s Motion”) at 5-7).
28
-10-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
(Id.). This argument
1
2 requires a construction of “scrambling code” such that a “scrambling code” cannot be a sum of
3
4
two m-sequences and must be a complex code sequence. This construction is not supported by the
Patent and is not what one of ordinary skill would understand the term to mean.
5
38.
6
7
It is my opinion, a person of ordinary skill in the art would understand the term
“scrambling code” as used in the claims of the ’867 Patent to mean “a code generated by adding a
8 first m-sequence and a second m-sequence.” The Patent is clear that the scrambling codes taught
9 by claims 25 and 26 are codes generated by adding two m-sequences and that the result of this
10 addition is a binary scrambling code.
11
12
13
14
39.
It is my opinion that under the proper construction of “scrambling code,” Apple’s
iPhone and iPad products literally infringe claims 25 and 26 of the ’867 Patent. Apple does not
argue otherwise.
15 V.
CONSTRUCTION OF THE TERM “SCRAMBLING CODE”
16
40.
Claim 25 of the ’867 Patent claims an “apparatus for generating a scrambling code”
17 that generates a “Gold code” as a “primary scrambling code.” (’867 Patent at 15:65-16:12).
18 Claim 26 describes an apparatus for generating secondary scrambling codes. (Id. at 16:13-15).
19
Apple does not contest its practice of any of the asserted claims or limitations save one.
20
21
22
(Apple’s Motion
23
24 at 2:21-3:1). To the contrary, this assertion is not supported by the facts. Apple’s position is
25 based entirely upon an erroneous construction of the term “scrambling code.” Using the definition
26
of “scrambling code” provided within the language of claim 25 and reiterated in the patent
27
28
-11-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 specification, defining a scrambling code as a Gold code generated by the addition of two m2 sequences, it is clear that the Accused Products generate Gold codes that are scrambling codes.
3
4
41.
I understand that the basis of Apple’s non-infringement argument rests on the
limitation requiring “at least one adder for generating a ((K-1)*M+K)th Gold code as a Kth primary
5
6
7
scrambling code by adding (((K-1)*M+K)-1)-times shifted first m-sequence and a second msequence.” Apple’s argument is founded on its construction of the term “scrambling code” in
8 claims 25 and 26 of the ’867 Patent. Apple construes “scrambling code” to mean “complex
9 scrambling code sequence Sdl,n” in the 3GPP Standard. Apple argues that, as they are used in the
10 3GPP Standard, the terms “scrambling codes” and “Gold codes” are distinct and separate from one
11
12
13
14
15
another and, as a result, the Accused Apple Products cannot generate a ((K-1)*M+K)th Gold code
as a Kth primary scrambling code by adding (((K-1)*M+K)-1)-times shifted first m-sequence and a
second m-sequence.
42.
In my opinion, this is not a valid claim construction. Apple’s construction requires
16 a binary sequence (comprised of 1s and 0s) to be complex sequence (comprised of real and
17 imaginary values), which is not possible. Because the claims explicitly state that the adder
18 generates a Gold code (which is binary) as a scrambling code, Apple’s construction of a primary
19
20
21
22
scrambling code as a complex sequence is internally inconsistent. To be internally consistent, any
construction of a primary scrambling code in claim 25 must have the primary scrambling code be
a binary sequence. Indeed, the primary scrambling code in claim 25 is a particular Gold code that
23 is used for channel separation.
24
43.
It is my opinion that Apple is misinterpreting the terms “Gold codes” and
25 “scrambling codes.” As described below, the ’867 Patent explicitly defines “scrambling code” as
26
27
the binary code that is the result of the addition of two m-sequences. Furthermore, even the
extrinsic evidence (the 3GPP Standard,
28
-12-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 support Samsung’s assertion that Apple infringes the ’867 Patent because the Accused Apple
2 Products contain an infringing apparatus for generating scrambling codes in a UMTS mobile
3
4
communication system.
A.
Intrinsic Support for Samsung’s Construction
44.
The intrinsic evidence of the ’867 Patent makes clear that, for the purposes of
5
6
7
interpreting claims 25 and 26, the term “scrambling code” refers to a binary scrambling code
8 generated by adding two m-sequences. Further, the Patent also makes clear that “scrambling
9 codes” and “Gold codes” are not distinct and the terms may be used interchangeably. However,
10 the Patent also teaches (for example in claim 30) using this binary scrambling code to produce the
11
12
13
14
complex scrambling code referred to as Sdl,n, described in the 3GPP Standard.
45.
As I will discuss below, the Patent describes a process of generating a binary
scrambling code and ultimately producing the I and Q-channel components that comprise a
15 complex scrambling code. Claims 25 and 26 teach the organization and generation of the primary
16 and secondary binary scrambling codes and the Standard and source code follow this teaching
17 exactly. That the Standard also describes using binary scrambling codes to produce complex
18 scrambling codes does not change the fact that the generation of the binary scrambling codes
19
20
21
22
infringes claims 25 and 26. Apple’s focus on the complex scrambling codes is at best misdirected.
46.
The specification clearly states that the primary scrambling codes of claims 25 and
26 are binary scrambling codes. For example, in claim 25 itself the Patent references an “adder
th
th
23 for generating a ((K-1)*M+K) Gold code as a K primary scrambling code by adding a (((K-
24 1)*M+K)-1)-times shifted first m-sequence and the second m-sequence.” (’867 Patent at col.
25 16:5-8). Here, it is evident that the Patent is referring to a “primary scrambling code”
26
27
(interchangeably called a “Gold code”) as a binary sequence that is the result of the addition of
two m-sequences. One of ordinary skill in the art recognizes that m-sequences are binary and that
28
-13-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 the addition of two m-sequences to produce a Gold code produces a binary sequence. Thus, as it
2 is used in claims 25 and 26, the scrambling code is a binary scrambling code comprised of 0s and
3
4
1s.
47.
Furthermore, the Patent repeatedly refers to both primary and secondary scrambling
5
6
7
codes as binary codes resulting from the sum of two m-sequences. (See ’867 Patent at col. 4:3-4
(“a gold sequence is normally generated through binary adding to two distinct m-sequences,”);
8 col. 4:62-64(“adding the output of the first m-sequence generator and the output of the second m9 sequence generator to generate first primary scrambling code for generating primary scrambling
10 code”); col. 5:2-3(“generating i-th secondary scrambling code by adding the summed value and
11
12
13
14
second m-sequence generator's output”); col. 5:13-14(“a first summer for adding the first and
second m-sequences to generate the primary scrambling code”); col. 5:19-21(“adding the second
m-sequence with the summed values to generate the secondary scrambling code”); col. 5:29-31(“a
15 first summer for adding the first and second m-sequences to generate the primary scrambling
16 code”); col. 6:23-24 (“A gold code used herein as a scrambling code is generated through binary
17 adding of two distinct m-sequences.”); col. 6:64-7:8 (“a gold sequence is selected from 218-1
18 length gold sequences, the first 38400 chips are used as a primary scrambling code, the second
19
20
21
22
38400 chips a first secondary scrambling code corresponding to the primary scrambling code . . .
the sixth 38400 chips a fifth secondary scrambling code corresponding to the primary scrambling
code.”); col. 7:13-17 (“Out of six m-sequence code groups, the first scrambling code group is used
23 as primary scrambling codes and the remaining five scrambling code groups are used as secondary
24 scrambling codes.”); col. 7:24-28 (“As shown in FIG. 6, once a primary scrambling code is
25 selected, the secondary scrambling codes corresponding to the primary scrambling code are also
26
27
part of a gold code which also includes the primary scrambling code.”); col. 8:17-20 (“The adder
740 adds the 0-th register values _(i.e., the last bits) of the first and second shift register memories
28
-14-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 700 and 705 to generate a scrambling code, which becomes the primary scrambling code.”); col.
2 9:57-58 (“The output of the adder 810 is a primary scrambling code.”); col. 9:62-65 (“the masking
3
4
5
6
7
section 820 masks the input values from the first shift register with a mask function k, (i.e.,
Σ(kixai)) and outputs the masked values to an adder 815 for generating the first secondary
scrambling code.”); col. 10:2-5 (“Then, the adder 810 adds the output bits from the 0-th registers
of the first and second shift register memories 800 and 805 to generate I-channel primary
8 scrambling code signals.”); col. 10:34-39 (“While the first embodiment masks both m-sequences
9 m1(t) and m2(t) to generate scrambling codes, the second embodiment involves cyclic shift of the
10 m-sequence m (t) only other than m (1) to generate scrambling sequences.”); col. 10:40-43
2
1
11
12
13
14
(“Referring to FIG. 9, when M secondary scrambling codes correspond to one primary scrambling
code, the first (M+2)-th, (2M+3)-th, . . . , ((K-1)*M+K)-th, . . . , and (511M+512)-th gold codes
are used as primary scrambling codes.”); col. 10:44-48 (“The secondary scrambling codes
15 corresponding to the ((K-1)*M+K)-th gold code used as the (K)-th primary scrambling code are
16 composed of M gold codes, i.e., ((K-1)*M+(K+1)), ((K-1)*(K+2)) . . . , and (K*M+K)-th gold
17 codes.”); col. 11:5-7 (“The scrambling code generator shown in FIG. 10 comprises the two m18 sequence generators 1050 and 1060”); col. 11:17-19 (“The second embodiment of the present
19
20
21
22
invention uses a gold code length of 38400 symbols to generate scrambling codes.”); col. 11:43-46
(“The adder 1030 adds the 0-th register values of the first and second shift register memories 1040
and 1045 to generate a scrambling code, which becomes a primary scrambling code.”); col. 11:49-
23 52 (“Here, the output from the adder 1030 is used as the primary scrambling code and the
24 scrambling codes output from the adders 1032 to 1034 can be used as secondary scrambling codes
25 that corresponds to the primary scrambling code.”).
26
27
48.
In the “Background of the Invention,” the ’867 Patent states that UMTS systems,
such as the one upon which the Accused Apple Products operate, use “scrambling codes for the
28
-15-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 purpose of separating base stations.” (’867 Patent at col. 1:23-25). Further, the Patent states that
2 another objective behind the use of scrambling codes in mobile communication systems is to
3
4
“increase[] capacity in addition to separation of base stations.” (Id. at col. 1:29-33). Apple does
not dispute that the document governing the operation of UMTS systems is the 3GPP Standard
5
6
7
and concedes that the Accused Apple Products practice the relevant 3GPP Standard. (Apple’s
Motion at 5:10-11 (“There is no dispute that the two accused Intel processors generate a
8 scrambling code in accordance with the standard. Wesel Dep. at 114:22-25 (Selwyn Decl., Ex.
9 5)”).
10
11
12
13
14
49.
Further, the Patent clearly states that “Gold codes” and “scrambling codes” are the
same codes. For example, according to the Patent, “[i]t should be noted that for the purpose of
illustration, the term ‘scrambling code’ is interchangeable with the term ‘gold code’ or ‘gold
sequence’ indicating the same code as the scrambling code.” (’867 Patent at col. 2:13-16).1
50.
15
To the extent that Apple argues that the “scrambling code” used for spreading or
16 differentiation between base-stations is different than the “scrambling code” that is
17 interchangeable with “gold code” or “gold sequence,” there is no support in the specification for
18 such a claim. Apple does not identify any language in the ’867 Patent distinguishing one
19
scrambling code from another.
20
51.
21
22
In claim 30, the Patent teaches “The apparatus as claimed in claim 25, wherein the
primary scrambling code and secondary scrambling code are I-channel components and the
23 apparatus further comprises a means for delaying at least one of the primary scrambling codes and
24
1
Taken together, the quoted sections of the specification state that UMTS systems require the
use of scrambling codes to separate base-stations from one another and that these “scrambling
26 codes” may also be referred to as “gold codes” or “gold sequences.” This requirement in the
specification is identical to the requirement identified by the 3GPP Standard Technical
27 Specification (TS 25.213) in section 5.2.2. (3GPP TS 25.213 v5.0.0 at 22 and 3GPP TS 25.213
v6.0.0 at 22-23).
28
25
-16-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 secondary scrambling code to produce Q-channel components.” (Id. at 16:29-34). Here, the claim
2 teaches using the binary scrambling code from claim 25 as the I-channel (“real”) component of the
3
4
complex scrambling sequence and delaying that same binary scrambling code for use as the Qchannel (“imaginary”) component of the complex scrambling sequence.
5
6
(See Wesel Expert Report on Infringement at 30-39).2
7
52.
8
I note that if the “primary scrambling code” of claim 25 were taken to be a complex
9 scrambling code, claim 30 would not make sense. A complex scrambling code already has both
10 an I-channel component and a Q-channel component. A complex scrambling code sequence
11
cannot not be used as an I-channel component.
12
53.
13
14
Just as is done in claim 30, other parts of the specification treat the I and Q-
channel components, which when converted from binary to real values comprise the real and
15 imaginary parts of the complex scrambling code sequence, as continuations of the scrambling code
16 referenced in claims 25 and 26. For example, the Patent describes Figure 4 as delaying the I17 channel component “to generate the gold sequence codes of a Q-channel component” (’867 Patent
18 at col. 3:64-67). Similarly, the Patent also describes Figure 8 as delaying “I-channel primary
19
20
21
22
scrambling code signals . . . to generate Q-channel primary scrambling code signals” (Id. at col.
10:5-9), and Figure 10 as delaying “the I-channel signals for a predetermined number of chips to
generate Q-channel scrambling code signals” (Id. at 12:4-6). When read in conjunction with the
23 3GPP Standard, the I and Q-channel components are eventually converted to real valued
24 sequences (+1 and -1) (3GPP TS 25.213 v5.0.0 at 23 and 3GPP TS 25.213 v6.0.0 at 23), however
25
26
2
27
28
-17-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 in the Intel source code accused of infringing claims 25 and 26, they are binary values. (See
2 Verilog code file r99_cog_scr.v (Bates No. 750DOC0000011)).
3
4
54.
Apple argues that “the 25.213 standard makes clear that the Gold code described in
the standard (lower case zn) is not used as a scrambling code in the standard but is merely an input
5
6
7
used to produce the scrambling code.” However, the process described in the Standard (using the
binary scrambling code zn to produce I and Q-channel components as shown in Figure 10) is
8 exactly the process described in claim 30 and elsewhere in the Patent. The Patent teaches an
9 apparatus that uses the binary scrambling codes of claims 25 and 26 to produce I and Q-channel
10 components.
11
12
13
(See
Expert Report of Richard D. Wesel, Ph.D. Regarding Infringement of U.S. Patent No. 7,362,867
(“Infringement Report”) at ¶¶79-91).
14
B.
Extrinsic Support for Samsung’s Construction
15
55.
Apple’s Motion alleges that claim 25 of the Patent requires the “complex
16 scrambling code sequence Sdl,n,” referenced in the Standard must be a binary Gold code. Although
17 Apple’s Motion does not reference any intrinsic evidence demonstrating that the scrambling codes
18 referenced in claims 25 and 26 of the Patent should refer to the complex scrambling code sequence
19
20
21
22
23
Sdl,n and not to the binary scrambling code zn, the motion makes numerous references to extrinsic
evidence that purportedly supports its position that the code should be complex including citations
to the 3GPP Standard and my deposition.
56.
Apple states “
24
25
26
27
28
-18-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
(Apple’s Motion at 5:2-6). This argument requires construing “primary scrambling
1
2 code” in claim 25 to be the complex scrambling code Sdl,n of the Standard.
3
4
5
6
7
8
9
10
(3GPP TS 25.213 v6.0.0 at 23).
11
57.
12
13
14
15
In support of this argument, Apple considers the “Gold code sequence zn,”
identified in that same section as the “Gold code” referenced in claim 25 and argues that it is
wholly different than the “complex scrambling code sequence Sdl,n.” (Apple’s Motion at 5-6).
Apple argues that “Although Dr. Wesel’s answer refers to ‘little z, sub n’ as a ‘binary scrambling
16 code,’ this is not the ‘primary scrambling code’ required by the claims.” (Apple’s Motion at 6:1817 19 (referencing Wesel Dep. at 116:16-22 (Selwyn Decl., Ex. 5)(see below)).
18
19
20
21
22
23
24
25
26
27
28
-19-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
(Apple’s Motion at 6:8-17).
58.
The Patent states that “each unique scrambling code used for spreading
15 (scrambling) downlink channel signals of each base stations is referred to as ‘primary scrambling
16 code.’” (’867 Patent at col. 1:52-54). Apple quotes a section from my April 23, 2012 deposition in
17
18
19
20
which I responded that scrambling codes are used for spreading. (Apple’s Motion at 6 (quoting
April 23, 2012 Deposition of Richard Wesel (“Wesel Dep.”) at 164:15-17) (Q. So the scrambling
codes you say infringe the ‘867 patent, what are they used for? A: Spreading.”) (Selwyn Decl., Ex.
21 5).). Thus, when I stated that scrambling codes are used for “spreading”, I was merely explaining
22 what is stated in the specification.
23
59.
The section of the standard excerpted above and in Apple’s Motion describes the
24 generation of scrambling codes. Binary scrambling code “z ” is a Gold code sequence that results
n
25
26
27
28
from the addition of two m-sequences. This binary scrambling code is rewritten using “+1” to
represent any “0” in the binary scrambling code and “-1” to represent any “1” in the binary
scrambling code. This rewritten sequence is then further used to generate the complex scrambling
-20-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 code sequence Sdl,n. In Figure 10, the Standard demonstrates a method of generating the complex
2 scrambling code sequence from the binary scrambling code exactly as described in claim 30 of the
3
Patent and in the patent specification:
4
5
6
7
17 16 15
14 13
12 11 10
9
8
7
6
5
4
3
2
1
0
I
8
9
Q
10
11
17 16 15
14 13
12 11 10
9
8
7
6
5
4
3
2
1
0
12
13
14
15
16
17
Figure 10: Configuration of downlink scrambling code generator
60.
It is my opinion that the binary scrambling codes of claims 25 and 26 are used for
spreading. This is what the specification says and it is their purpose in the 3GPP Standard.
18 Without these binary scrambling codes, the I and Q-channel components could not be generated.
19 As I stated in my deposition “[binary scrambling code ‘zn’ is] used for spreading because it's used
20 to make the ultimate spreading code.” (Wesel Dep. at 165:19-166:4).
21
22
23
24
25
26
61.
Apple’s own statements support the claim construction of “primary scrambling
codes” as specific Gold codes. (See Apple’s Motion at 4:20-21 (“Claim 25 includes an express
requirement that the scrambling code be a ‘Gold code.’”); 5:24-6:1 (“As noted above, claim 25 of
the ’867 Patent requires the generation of a scrambling code that is a Gold Code.”)).
62.
Using the correct claim construction to interpret the 3GPP Standard, for n=16*i
27 where i=0…511, “little z, sub n” is exactly the primary scrambling code required by the claims
28 because it is exactly the result of an “adder for generating a ((K-1)*M+K)th Gold code as a Kth
-21-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 primary scrambling code by adding a (((K-1)*M+K)-1)-times shifted first m-sequence and the
2 second m-sequence,” where K=n+1. My opinion has always been that the primary and secondary
3
4
scrambling codes of claims 25 and 26 are binary scrambling codes produced by adding two msequences (i.e. a Gold code). My expert report supports this in numerous places. (See
5
6
Infringement Report at ¶6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
63.
The 3GPP Standard makes clear that zn is the (binary) primary scrambling code as
defined by the Patent. The 3GPP Standard clearly distinguishes primary and secondary scrambling
23 codes by the value of n.
24
25
26 (3GPP TS 25.213 v5.0.0 at 21; 3GPP TS 25.213 v6.0.0 at 22).
27
Moreover, zn is clearly identified as being either a primary or secondary scrambling code
28 by its subscript” n,” which is called the scrambling code number in the Standard.
-22-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
(3GPP TS 25.213 v5.0.0 at 22; 3GPP TS 25.213 v6.0.0 at 22).
64.
The sequence zn, constructed exactly as described by the Standard, is exactly as my
5 Infringement Report described the construction of the primary and secondary scrambling codes in
6 the Intel source code as the sum of two appropriately shifted m-sequences. It is clearly identified
7 as being either primary or secondary based on the value of its subscript “n,” and matches exactly
8
9
the association of the primary and secondary scrambling codes of claims 25 and 26 with K=n+1.
As a result, the Accused Apple Products contain an apparatus implementing the Standard which
10
11
12
also infringes claims 25 and 26 of the ’867 Patent.
65.
Additional extrinsic evidence supports the argument that the primary scrambling
13 code described in claim 25 is a binary scrambling code.
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-23-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
66.
Apple’s Motion focuses on the complex scrambling sequence Sdl,n and ignores the
2 source code. However the Standard does not describe a method for implementing an apparatus for
3
4
generating scrambling codes.
67.
The Patent also discusses the construction of a complex scrambling code (like
5
6
7
complex scrambling code sequence Sdl,n with I and Q-channel components) from the binary
scrambling code in claim 30. (See ’867 Patent at col. 16:29-34). However, the fact that a complex
8 scrambling is discussed in the Standard does not change (and cannot change) the fact that the
9 construction of zn infringes claims 25 and 26 before Sdl,n is ever constructed.
10
11
12
13
14
68.
Finally, even Apple’s expert witness uses the term “primary scrambling code” to
refer to the binary scrambling code that is used to generate the I and Q-components (real and
imaginary components) of the complex scrambling code sequence Sdl,n. For example, during his
deposition, Apple’s expert, Dr. Wayne Stark, readily understood questioning that referred to the
15 binary scrambling code as the “primary scrambling code” and referenced other publications that
16 similarly recognized this relationship. Dr. Stark even refers to the primary and secondary
17 scrambling codes as Gold codes.
18
19
20
21
22
23
24
25
26
27
28
-24-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 (April 20, 2012 Deposition Transcript of Wayne Stark (“Stark Dep. Tr.”), Wesel Decl. Exhibit P,
at 31:7-16).
2
3
4
5
6
7
8
9
10
11
12
13
(Stark Dep. Tr. at 31:24-32:8).
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-25-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 (Stark Dep. Tr. at 32:9-22).
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
(Stark Dep. Tr. at 33:5-21).
20
21
22
23
24
25
26
27
28
-26-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
(Stark Dep. Tr. at 33:22-34:12).
These repeated references by Dr. Stark to the teachings in the ’867 Patent and the
15
16 purportedly invaliditing references describing how to delay a “scrambling code” to create what
17 Apple now asserts is the only scrambling code in the Standard contradict Apple’s construction of
18 the scrambling codes of claims 25 and 26 as complex sequences , a construction that is not
19
20
supported by the ’867 Patent, the 3GPP Standard, the source code or by statements of Apple’s
own expert witness.
21
22
VI.
INFRINGEMENT OF THE ’867 PATENT
23
A.
Accused Apple Products
24
69.
It is my opinion that the Accused Apple Products infringe claims 25 and 26 of the
25 ’867 Patent. The following discussion includes portions of my analysis (as presented in my earlier
26 reports) of how the Accused Apple Products meet each limitation of claims 25 and 26 of the ’867
27
Patent, literally or under the doctrine of equivalents.
28
-27-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
70.
It is my opinion that the Accused Apple Products meet every limitation of claims
2 25 and 26 of the ’867 Patent for at least the reasons below and in the Infringement Report and its
3
supplements.
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-28-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
76.
I understand Apple asserts that “Samsung’s infringement theory is based on
Apple’s compliance with the 3GPP Standard governing the accused [iPhone and iPad] products”
and cites to my expert report on infringement for this statement. (See Apple’s Motion at 5:4-7).
15 Apple misunderstands my expert report and Samsung’s infringement theory.
16
77.
In the section of my expert report that Apple has cited to, I state that in order to be
17 compliant with the 3GPP Standard, each Accused Apple Product “must contain an apparatus for
18 generating scrambling codes in mobile communications system.” However, my expert report does
19
20
21
not state that the Accused Apple Products infringe only because they are compliant with the 3GPP
Standard.
22
23
24
25
26
27
78.
Apple does not address that part of my infringement opinion that relies on
28
-29-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 the source code. Thus, the motion for summary judgment regarding non-infringement of the ’867
2 Patent claims does not refute that part my infringement opinion which is based on the source code.
3
B.
The Accused Apple Products Infringe Claims 25 and 26 of the ’867 Patent
80.
I understand that Apple’s only point of contention is that its products do not use
4
5
6
7
8
9
10
11
12
13
14
15
16
17 binary adders to add two m-sequences to produce complex scrambling sequence Sdl,n. Based upon
18 a proper claim construction as described above there is no question that the Accused Apple
19
Products infringe claims 25 and 26 of the ’867 Patent.
20
21
22
C.
The Accused Apple Products Infringe Each Limitation of Claim 25
81.
Claim 25 provides:
1.
23
24
25
82.
An apparatus for generating scrambling codes in mobile
communication system having a scrambling code generator,
comprising:
In order to be compliant with the 3GPP Standard, each of the Accused Apple
26 Products must contain an apparatus for generating scrambling codes in mobile communication
27
system having a scrambling code generator since the 3GPP Standard describes a mobile
28
-30-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 communication system and since standard-compliant devices will contain at least one scrambling
2 code generator as described in Section 5.2.2 of 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at
3
21-23) and Section 5.2.2 of 3GPP TS 25.213 v6.0.0 (Wesel Decl., Exhibit F at 22-23).
4
5
6
7
8
9
10
11
12
13
14
15
16
17
2.
85.
a first m-sequence generator to generate a first m-sequence;
The 3GPP Standard requires a first m-sequence generator to generate a first m-
18 sequence as described in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at 22) and 3GPP TS
19
25.213 v6.0.0.
20
21
22
23
24
86.
25
26
27
28
-31-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
3.
6
7
87.
a second m-sequence generator to generate a second m-sequence; and
The 3GPP Standard requires a second m-sequence generator to generate a second
8 m-sequence as described in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at 22) and 3GPP TS
9 25.213 v6.0.0 (Wesel Decl., Exhibit F at 22) as “the y sequence”. The Standard provides:
10
11
12
13
14
15
16
17
18
19
20
21
22
4.
23
24
25
89.
at least one adder for generating a ((K-1)*M+K)th Gold code as a Kth
primary scrambling code by adding (((K-1)*M+K)-1)-times shifted first
m-sequence and a second m-sequence,
The 3GPP Standard requires at least one adder for generating a ((K-1)*M+K)th
26 Gold code as a Kth primary scrambling code by adding (((K-1)*M+K)-1)-times shifted first m27
28
-32-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 sequence and a second m-sequence, as described in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit
2 E at 21) and 3GPP TS 25.213 v6.0.0 (Wesel Decl., Exhibit F at 22). The Standard provides:
3
4
5
6
7
8
9
The Standard further provides:
10
11
12
13
14
15
16
17
18
19
20
21
22
23
90.
I note that the Standard above, (page 21 for v5.0.0 and page 22 for v6.0.0 of
24 Section 5.2.2 on “Scrambling code”) indexes the primary scrambling codes with the values i= 0,
25 …, 511 rather than 1, …, 512, but this does not change the fact that the Accused Apple Products
26 compute exactly the primary scrambling codes taught in claim 25. For example, exactly the same
27
Gold code is the first primary scrambling code in both the Standard and the ’867 Patent. In the
28
-33-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 Standard it is the first (n=0) Gold code and in the ’867 Patent it is the first (K=1) Gold code. In
2 both cases it is the Gold code in which the two m-sequences are added with no relative shift.
3
4
91.
Each of the Accused Apple Products contains at least one adder for generating a
((K-1)*M+K)th Gold code as a Kth primary scrambling code by adding (((K-1)*M+K)-1)-times
5
6
shifted first m-sequence and a second m-sequence.
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
5.
wherein K is a natural number and M is a total number of secondary
scrambling codes per primary scrambling code.
26
27
28
-34-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-35-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-36-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-37-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-38-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-39-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
D.
The Accused Apple Products Infringe Each Limitation of Claim 26
120.
Claim 26 recites “The apparatus of claim 25, wherein the secondary scrambling
codes of the Kth primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold
Codes.”
121.
In order to comply with the 3GPP Standard, Apples Accused Products must contain
24 “The apparatus of claim 25, wherein the secondary scrambling codes of the Kth primary
25 scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold Codes.”
26
27
122.
The 3GPP Standard requires that the secondary scrambling codes of the Kth
primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold Codes as described
28
-40-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1 in 3GPP TS 25.213 v5.0.0 (Wesel Decl., Exhibit E at 21) and 3GPP TS 25.213 v6.0.0 (Wesel
2 Decl., Exhibit F at 22). The Standard provides:
3
4
5
6
7
8
9
123.
For each of the Accused Apple Products the generated secondary scrambling codes
10 of the Kth primary scrambling codes are the ((K-1)*M+K+1)th through (K*M+K)th Gold Codes.
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-41-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-42-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
1
125.
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-43-
Case No. 11-cv-01846-LHK
DECLARATION OF RICHARD D. WESEL, PH.D.
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?