Apple Inc. v. Samsung Electronics Co. Ltd. et al

Filing 925

Administrative Motion to File Under Seal Apple's Motion for Summary Judgment of Non-Infringement of U.S. Patent Number 7,362,867 and Invalidity of U.S. Patent Numbers 7,456,893 and 7,577,460 filed by Apple Inc.(a California corporation). (Attachments: #1 Declaration of Erica Tierney in Support of Apple's Administrative Motion to File Documents Under Seal, #2 Declaration of Mark D. Selwyn in Support of Apple's Administrative Motion to File Documents Under Seal, #3 Proposed Order Granting Apple Inc.'s Administrative Motion to File Documents Under Seal, #4 Plaintiff and Counterclaim-Defendant Apple Inc.'s Notice of Motion and Motion for Summary Judgment of Non-Infringement of U.S. Patent Number 7,362,867 and Invalidity of U.S. Patent Numbers 7,456,893 and 7,577,460, #5 Declaration of Mark D. Selwyn in Support of Apple's Motion for Summary Judgment of Non-Infringement of U.S. Patent Number 7,362,867 and Invalidity of U.S. Patent Numbers 7,456,893 and 7,577,460, #6 Exhibit 1, #7 Exhibit 2, #8 Exhibit 3, #9 Exhibit 4, #10 Exhibit 5, #11 Exhibit 6, #12 Exhibit 7, #13 Exhibit 8, #14 Exhibit 9, #15 Exhibit 10, #16 Exhibit 11, #17 Exhibit 12, #18 Exhibit 13, #19 Exhibit 14, #20 Exhibit 15, #21 Exhibit 16, #22 Exhibit 17, #23 Exhibit 18, #24 Exhibit 19, #25 Exhibit 20, #26 Exhibit 21, #27 Exhibit 22, #28 Exhibit 23, #29 Exhibit 24, #30 Exhibit 25, #31 Exhibit 26, #32 [Proposed] Order Granting Apple Inc.'s Motion for Partial Summary Judgment)(Selwyn, Mark) (Filed on 5/17/2012) Modified on 5/21/2012 attachment #1 and 2 sealed pursuant to General Order No. 62 (dhm, COURT STAFF).

Download PDF
EXHIBIT 7 (Filed Under Seal) HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN JOSE DIVISION APPLE INC., a California corporation, Plaintiff, v. SAMSUNG ELECTRONICS CO., LTD., a Korean business entity, SAMSUNG ELECTRONICS AMERICA, INC., a New York corporation, and SAMSUNG TELECOMMUNICATIONS AMERICA, LLC, a Delaware limited liability company, Defendants. SAMSUNG ELECTRONICS CO., LTD., a Korean business entity, SAMSUNG ELECTRONICS AMERICA, INC., a New York corporation, and SAMSUNG TELECOMMUNICATIONS AMERICA, LLC, a Delaware limited liability company, Counterclaim-Plaintiffs, v. APPLE INC., a California corporation, Counterclaim-Defendant. Page 1 of 29 Civil Action No. 11-CV-01846-LHK EXPERT REPORT OF WAYNE STARK REGARDING NONINFRINGEMENT OF US PATENT NUMBER 7,362,867 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI I. Introduction A. Prior Reports 1. I previously submitted a report on March 22, 2012, entitled “Expert Report of Dr. Wayne Stark Regarding Invalidity of U.S. Patent No. 7,362,867” (the “Stark Invalidity Report”). 2. I have reviewed the report dated March 22, 2012, entitled “Expert Report of Richard D. Wesel, Ph.D. Regarding Infringement of U.S. Patent No. 7,362,867” (the “Wesel Opening Report”). 3. I have also reviewed the report dated March 25, 2012, entitled “Samsung’s First Supplement to the Expert Report of Richard D. Wesel, Ph.D. Regarding Infringement of U.S. Patent No. 7,362,867” (the “Wesel Supplemental Report”). 4. I have received the report dated April 13, 2012, entitled “Samsung’s Second Supplement to the Expert Report of Richard D. Wesel, Ph.D. Regarding Infringement of U.S. Patent No. 7,362,867. However, because this report was submitted only three days ago, I have not had adequate time to review it. Accordingly, I reserve the right to supplement the material contained herein in order to address the second supplemental report submitted by Dr. Wesel. B. Summary of Report 5. This report responds to the Wesel Opening and Supplemental Reports. As explained below, in my opinion the accused products do not infringe the asserted claims of the ‘867 patent. 6. I expect to testify at trial about the matters set forth in this report, if asked about these matters by the Court or by the parties’ attorneys. C. Understanding of the Law 7. I am not an attorney. I have been informed about the legal standards for patent infringement by counsel for Apple. 8. I have been informed and understand that analyzing whether a product or process infringes a patent is a two-step process. First, the patent claims are construed by the Court. Second, the construed claims are compared to the allegedly infringing product or process to determine whether the product or process falls within the scope of the claims. Page 2 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 9. I have been informed and understand that, if the Court has not construed a claim term, the term should be given the ordinary and customary meaning that a person of ordinary skill in the art would give to the term. I have further been informed and understand that terms should be given the same meaning when used more than once in the same claim or when used in multiple claims of the same patent. 10. I have been informed and understand that the party asserting patent infringement bears the burden of proof. 1. Literal Infringement And Infringement Under The Doctrine Of Equivalents 11. I have been informed and understand that a patent claim is “literally” infringed when an accused product or process includes each and every element of a patent claim. I have been informed and understand that the person asserting literal patent infringement has the burden of proving that each and every element of the patent claim may be found in the accused product or process. 12. I have been informed and understand that statements made during prosecution, including arguments intended to distinguish the pending claims from the prior art, may limit the scope of the issued claims. 13. If a patent claim is not literally infringed, I have been informed and understand that a patent claim may also be infringed under the doctrine of equivalents. For example, I have been informed and understand that if an accused product does not have a structure or step required by a patent claim, then that product cannot literally infringe. However, if the accused product has a structure or step that is “insubstantially different” from what is required by the patent claim, then the product may nevertheless infringe the patent under the doctrine of equivalents. I have been informed and understand that one test to determine whether an accused product and patent claim are “insubstantially different” is to evaluate whether the structure or step in the accused product performs substantially the same function, in substantially the same way, and achieves substantially the same result as the structure or step in the patent claim. 14. I have been informed and understand that arguments made about the scope of a patent during its prosecution may limit the range of equivalents to a patent claim. For example, I have been informed and understand that, during the prosecution of a patent application, Page 3 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI an applicant may make amendments to narrow the scope of a patent claim. I understand that this creates a presumption that the patent would not have been awarded unless the claim was narrowed, and therefore the range of “equivalent” structures is likewise narrowed. I have been informed and understand that this presumption can be rebutted under limited circumstances, such as if the amendment only had a tangential relation to the equivalent now accused or if the equivalent now accused could not have been foreseen at the time of the amendment. 15. I have been informed and understand that representations made to foreign patent offices are also relevant evidence as to whether an allegedly infringing equivalent is insubstantially different than a patent claim. 16. I have been informed and understand that the doctrine of equivalents may not be used to broaden the scope of a patent to encompass products or processes which are the same as what was in the prior art (i.e., existed before the alleged invention of the patent was conceived), and/or would have been obvious given the products or processes that existed at the time of the patent application. 17. I have been informed and understand that each patent claim does not need to cover all the embodiments disclosed within a patent, and that different claims may be drafted to cover different embodiments. However, I have further been informed and understand that if a patent discloses an embodiment that is not claimed in the patent, then the unclaimed embodiment cannot be infringed, either literally or under the doctrine of equivalents. 18. I have been informed and understand that a “dependent” claim includes all of the requirements of an “independent” claim, plus additional requirements of its own. As a result, if an independent claim is not infringed, then the dependent claims are not infringed either. On the other hand, if an independent claim is infringed, a separate finding must still be made as to whether the additional requirements of the dependent claims have been met. 2. Direct Infringement 19. I have been informed and understand that a patent claim is directly infringed when a person makes, uses, sells, or offers to sell in the United States, or imports into the United States, a product or process that includes each element of a patent claim, either literally or under the doctrine of equivalents. Page 4 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 3. Indirect Infringement 20. I have been informed and understand that a party may be liable for indirectly infringing a patent claim, and that the person asserting indirect infringement has the burden of proof. I have been informed and understand that there are two types of indirect infringement: contributory infringement and inducing infringement. I have been informed and understand that both types of indirect infringement require proof of direct infringement. 21. I have been informed and understand that a party attempting to prove contributory infringement must show that a party has contributed to another’s direct infringement of the patent. The contributory infringer must have supplied an important component of the infringing product with knowledge that the component was especially made or adapted for use to infringe the patent. I understand that if the component supplied to the direct infringer had other substantial, non-infringing uses, then there was no contributory infringement. 22. I have been informed and understand that a party attempting to prove inducement of patent infringement must show that a party induced another to commit direct infringement. The party who allegedly induced the infringement must have been aware of the patent and must have believed that his or her actions would encourage infringement. 23. I have been informed and understand that it is not enough that the accused inducer was indifferent to the possibility that it might be encouraging patent infringement or that the accused inducer took a substantial and unjustified risk that it would encourage patent infringement. I have further been informed and understand that a party that believes it is highly probable that its actions will encourage patent infringement cannot avoid liability by being “willfully blind” to the existence of the patent or to the fact that its actions will encourage patent infringement. 24. I have been informed and understand that if the party accused of inducing patent infringement did not know of the patent or believed that the patent was invalid, then the accused inducer is not liable. Similarly, I have further been informed and understand that if the accused inducer believed the acts it was inducing were non-infringing, then it is not liable. Page 5 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI II. Operation of the Accused Products A. Scrambling code generation in the X-GOLD 608 and X-GOLD 616 chipsets 25 26. 27. 1 The Wesel Opening Report also accuses the iPhone 4S of infringing because it accuses a baseband processor made by Qualcomm. However, I have been informed that Judge Koh has excluded the iPhone 4S from this case. Accordingly, I have not addressed Prof. Wesel’s accusations regarding the iPhone 4S or Qualcomm’s baseband chip. 2 Page 6 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 28. 29. Page 7 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 30. Page 8 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 31 Page 9 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 32. Each scrambling code generator creates two segments of m-sequences x and y using two shift registers of the type shown in Figure 10, reproduced below. 3GPP TS 25.213 v6.0.0 at 23. 33. As specified in the 25.213 standard, the X-GOLD 608 and 616 are able to generate both primary and secondary scrambling codes. For example, 25.213 states: 5 Prof. Wesel apparently accuses devices compliant with either version 5.0.0 or 6.0.0 of 25.213 of infringing. In this report, I have cited to version 6.0.0 of the standard. As regards the ‘867 patent, those two versions of the standard are not materially different. Page 10 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 3GPP TS 25.213 v6.0.0 at 22. 34. The 25.213 standard also includes a mathematical definition of the scrambling codes generated by the X-GOLD 616 and 608. It states: 3GPP TS 25.213 v6.0.0 at 23.6 35. As described above, the nth scrambling code Sdl,n is a complex code containing a real part Zn(i) mod (218-1), and an imaginary part Zn(i+131072) mod (218-1). The real and imaginary parts of the nth scrambling code are sequences Zn(i) and Zn(i+131072), respectively, each of which comprises values +1 and -1 (i.e., they are {1,-1}-valued sequences).7 36. These {+1,-1}-valued sequences that form the real and imaginary portions of a scrambling code are each constructed from portions of a{0,1}-valued Gold code zn(i), as described on p. 23 of 25.213 v6.0.0, shown above. III. There is no infringement of claims 25-27 and 30 37. As explained below, the accused products do not infringe the asserted claims of the ’867 patent, either literally or under the doctrine of equivalents. 6 Prof. Wesel cites to this same portion of the 25.213 standard. See, e.g., Wesel Opening Report at ¶84. In this report, I will use the term “{1,0}-valued” to describe sequences that comprise 0s and 1s, and I will use the term “{+1,-1}-valued” to describe sequences that comprise +1s and -1s. 7 Page 11 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 38. 39. 40. I have reviewed the source code cited by Dr. Wesel in his Opening Report and First Supplemental Report, and the code is consistent with the noninfringement arguments I describe herein. I have not yet had adequate time to review the Second Supplemental Report of Dr. Wesel, which was submitted by Samsung only three days ago, but I have no reason to believe that any of the source code cited in that report is inconsistent with the arguments described herein. A. The Asserted Claims Require the Scrambling Codes to Be Gold Codes 1. The Claims 41. Claim 25, the only asserted independent claim, requires the primary scrambling code to be a Gold code. Claim 25 recites: …at least one adder for generating a ((K-1)*M+K)th Gold code as a K th primary scrambling code by adding a (((K-1)*M+K)-1)times shifted first m-sequence and the second m-sequence, wherein K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code. Claim 25 of the ‘867 patent (emphasis added). 42. That language of claim 25 requires the K th primary scrambling code to be a Gold code. 43. Similarly, claim 26 recites: Page 12 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 26. The apparatus of claim 25, wherein the secondary scrambling codes of the Kth primary scrambling codes are the ((K1)*M+K+1)th through (K*M+K)th Gold codes. Claim 26 of the ‘867 patent (emphasis added). 44. Once again, that claim language requires the secondary scrambling codes to be Gold codes. 2. The Specification 45. The specification of the ‘867 patent also explains that the scrambling codes of the alleged invention are Gold codes. It recites: A gold code used herein as a scrambling code is generated through binary adding of two distinct m-sequences. ‘867 patent at 6:23-24 (emphasis added). First, when a gold sequence is selected from 218-1 length gold sequences, the first 38400 chips are used as a primary scrambling code… ‘867 patent at 6:64-7:32 (emphasis added). Referring to FIG. 9, when M secondary scrambling codes correspond to one primary scrambling code, the first (M+2)-th, (2M+3)-th, . . . , ((K-1)*M+K)-th, . . . , and (511M+512)-th gold codes are used as primary scrambling codes. The secondary scrambling codes corresponding to the ((K-1)*M+K)-th gold code used as the (K)-th primary scrambling code are composed of M gold codes8, i.e., ((K-1)*M+(K+1)), ((K-1)*M+(K+2)) . . . , and (K*M+K)-th gold codes. ‘867 patent at 10:40-48 (emphasis added). 46. The final quote above makes it particularly clear that the scrambling codes are Gold codes. 3. The File History 8 In this and similar quotes, the ‘867 patent and file history clarify that each of the M secondary scrambling codes is a single Gold code. In the ‘867 patent, there is a one-to-one correspondence between scrambling codes and Gold codes. Page 13 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 47. During prosecution of the ‘867 patent, Samsung confirmed that the claimed scrambling codes are Gold codes. For example, Samsung stated: Regarding new [pending] Claim 599, new Claim 59 recites, “an apparatus for generating scrambling codes in mobile communication system having a scrambling code generator”, “a first m-sequence generator to generate a first m-sequence”, and “a second m-sequence generator to generate a second m-sequence”. In this context, the description on page 7 discloses in lines 14 and 15 that a Gold code used herein as a scrambling code is generated through binary adding of two distinct m-sequences. Moreover, new Claim 59 recites, “at least one adder for generating a ((K-1)*M+K)-th gold code as a K-th primary scrambling code by adding a ((K-1)*M+K-1)-times shifted first m-sequence and the second m-sequence”. The description on page 12, lines 24 to 26 discloses, referring to Fig. 9, that when M secondary scrambling codes correspond to one primary scrambling code, the first, (M+2)'th, (2M+3)'th, ... , ((K-l)*M+K),th, …, and (511M+512)'th Gold codes are used as primary scrambling codes. The description also discloses on page 7, lines 23 to 25, that for the purpose of the present invention, the sum of the m-sequence m1(t) cyclically shifted time and the m-sequence m2(t) will be designated as a Gold code g, that is, g (t) = m1(t + )+m2(t). Finally, new Claim 59 recites, “wherein K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code”. The description on page 12, lines 26 to 29 discloses that the secondary scrambling codes corresponding to the (((K-1)*M+K)'th Gold code used as the (K)'th primary scrambling code are composed of M Gold codes, i.e., ((K1)*M+(K+1)), ((K-1)*M+(K+2))..., and (K*M+K)'th Gold codes. April 28, 2006, response at 15 (emphasis added). The present invention discloses: 1) generating a primary scrambling code and secondary scrambling codes with predetermined 2 m sequences; 2) using the sum of the first m sequence shifted (L-l) times and the first m sequence as Lth gold code; and 3) using ((K-l)*M+K)-th gold code as a K-th primary scrambling code (See claims 54, 59, and 65), and using ((K-l)*M+K+l)- 9 Pending claim 59 corresponds to issued claim 25. Page 14 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI (K*M+K)-th gold codes as secondary scrambling code corresponding to the K-th primary scrambling code (e.g., claim 54). December 11, 2006, response at 16 (emphasis original). The invention as recited in Claim 59 relates to an apparatus for generating scrambling codes in mobile communication system having a scrambling code generator. The apparatus includes a first m-sequence generator to generate a first m-sequence. (Specification at page 1, line 18 to page 20, line 23, FIG. 10). The apparatus further includes a second m-sequence generator to generate a second m-sequence. (Specification at page 19, line 18 to page 20, line 23, FIG. 10). The apparatus still further includes at least one adder for generating a ((K−1)*M+K)th Gold code as a Kth primary scrambling code by adding a ((K-1)*M+K-1)-times shifted first m-sequence and the second m-sequence. (Specification at page 18, line 25 to page 19, line 18, and page 11, lines 6-15). Finally, in the apparatus K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code. (Specification at page 18, line 25 to page 19, line 18). September 13, 2007, appeal brief at 4 (emphasis added). Claim 59 recites an apparatus for generating scrambling codes in mobile communication system having a scrambling code generator. The apparatus includes a first m-sequence generator to generate a first m-sequence. The apparatus further includes a second msequence generator to generate a second m-sequence. The apparatus still further includes at least one adder for generating a ((K−l)*M+K)th Gold code as a Kth primary scrambling code by adding a ((K-l)*M+K-I)-times shifted first m-sequence and the second m-sequence. Finally, in the apparatus K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code. September 13, 2007, appeal brief at 20 (emphasis added). Thus in Claim 59 a K-th primary scrambling code is generated. A specific gold code is used as the K-th primary scrambling code. The specific gold code is the ((K-l)*M+K)-th gold code. The ((Kl)*M+Kth gold code is generated by adding a ((K-l)*M+K-l)-times shifted first m-sequence and the second m-sequence. The K-th primary scrambling code is directly related to the total number of secondary scrambling codes per one primary scrambling code. September 13, 2007, appeal brief at 21 (emphasis added). Page 15 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 48. Summarizing, during prosecution, Samsung repeatedly said that the claimed scrambling codes are Gold codes. 4. Summary 49. The language in the asserted claims is clear: the claimed scrambling codes must be Gold codes. The specification of the ‘867 patent also explains that the scrambling codes of the invention are Gold codes. Finally, during prosecution, Samsung repeatedly explained that the scrambling codes of the asserted claims are Gold codes. 50. Therefore, as explained below, the asserted claims cannot cover processors like Intel’s in which the scrambling codes are not Gold codes. B. The Accused Products Do Not Infringe Because Their Scrambling Codes are Not Gold Codes 51. As described above, the scrambling code generators of the accused products implement §5.2.2 of the 3GPP TS 25.213 standard. According to this section of the 25.213 standard, the nth scrambling code Sdl,n(i) is a complex number, comprising a real part Zn(i) and an imaginary part jZn(i+131072 (modulo 218-1)), as shown below: 25.213v6.0.0 at 23. 52. Page 16 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 53. a) No Literal Infringement b) No Infringement Under the Doctrine of Equivalents 54 55. 56. 57. Even though Prof. Wesel was clearly on notice of this position, he failed to provide any analysis regarding infringement under the doctrine of equivalents. That reinforces my view that Samsung has failed to carry its burden to establish infringement under the doctrine of equivalents. Page 17 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 58. 59. 60. 61. Therefore, the asserted claims of the ‘867 patent cannot be infringed under the doctrine of equivalents. (i) Claim 30 62. Claim 30 reads, 30. The apparatus as claimed in claim 25, wherein the primary scrambling code and secondary scrambling code are I-channel components and the apparatus further comprises a means for delaying at least one of the primary scrambling codes and secondary scrambling code to produce Q-channel components. 63. Although Prof. Wesel has not argued that claim 30 affects the interpretation of independent claim 25 such that it can be infringed, either literally or under the doctrine of equivalents, I note that nothing about claim 30 changes my opinion expressed above regarding claim 25. 64. Page 18 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 65. 2. The Scrambling Codes Generated by the Accused Products are Not {0,1}-Valued Sequences, as Required by the ’867 Claims 66. 67. 68. Claim 25, the only asserted independent claim, recites: …at least one adder for generating a ((K-1)*M+K)th Gold code as a K th primary scrambling code by adding a (((K-1)*M+K)-1)times shifted first m-sequence and the second m-sequence, wherein K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code. Claim 25 of the ‘867 patent (emphasis added). 69. Claim 26 has a similar requirement for secondary scrambling codes. 70. That is, the asserted claims require the scrambling codes to be Gold codes, each of which is generated by binary adding together two m-sequences. The ‘867 patent makes clear that the m-sequences and Gold codes are {0,1}-valued sequences, i.e., each element of the Gold code is either a “0” or a “1.” See, e.g., the ‘867 patent at 4:3-4 (“Referring to FIG. 5, a gold sequence is normally generated through binary adding to two distinct msequences”) (emphasis added), 6:23-24 (“A gold code used herein as a scrambling code is generated through binary adding of two distinct m-sequences”) (emphasis added). Moreover, the shift registers described in the ’867 patent contain values comprising 0s and 1s, and these values are read out of the shift register and added together using modulo 2 arithmetic to form Gold codes. See, e.g., Figure 10 of the ’867 patent, reproduced below, showing shift registers 1040 and 1045, and binary adders 1010, 1015, Page 19 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 1030, 1032, 1034, all of which are depicted using the same symbol. See also the ’867 patent at 11:23-27 (“The first m-sequence generator 1050 generates the first m-sequence using the register memory 1040 and the adder 1010 which is a binary adder that adds the {1,0} values from the registers 0 and 7 of the register memory 1040 and outputs the sum into the register 17.”) (emphasis added). 71. One of ordinary skill in the art would understand that these operations can only be performed using binary arithmetic, which operates on {0,1}-valued sequences containing 0s and 1s. This is consistent with the understanding of those of ordinary skill that Gold codes are {0,1}-valued sequences. 72. Page 20 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 73. a) No Literal Infringement b) No Infringement under the Doctrine of Equivalents 74. 75. 76. Page 21 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI C. The Accused Products do Not Use the Indexing Required by the Asserted Claims 77. The asserted claims of the ‘867 patent require a specific indexing, or numbering, of the scrambling codes. The indexing required by the claims is illustrated in the drawing below, for the case in which there are fifteen secondary codes for every primary code and there are a total of 512 primary codes.10 Claim 25 specifies only the indexing used for the primary codes (illustrated in red in the drawing below). Dependent claim 26 specifies the indexing used for the secondary codes (illustrated in green in the drawing below). Together, claims 25 and 26 require the indexing illustrated in the drawing. 78. Of particular interest, in the asserted claims, the indexing begins with the 1th code, i.e., there is no 0th code. That the asserted claims exclude a 0th code can be shown in a variety of ways. First, the wherein clause of claim 25 recites that “K is a natural number.” Natural numbers are positive integers. The smallest natural number is one. If the value of K=1 is plugged into claim 25, it yields, 10 By making M, i.e., the number of secondary codes per primary code, be 15, and by using 512 primary codes, I have made the figure be as similar as possible to the indexing of 25.213. Page 22 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI at least one adder for generating a 1th Gold code as a 1th primary scrambling code by adding a 0-times shifted first m-sequence and the second m-sequence… 79. In other words, plugging K=1 into claim 25 results in the 1th primary scrambling code being the 1th Gold code, which is exactly what is illustrated in the drawing. 80. 81. 82. The drawing below shows the indexing specified by 25.213 v6.0.0. Page 23 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 83. The portion of the 25.213 standard that requires the indexing specified in the drawing above is copied below. 25.213v6.0.0 at 22. 84. The drawing below compares the indexing required by the asserted claims and that of 25.213.11 As shown, they are not identical. 11 Again, by making M, i.e., the number of secondary codes per primary code, be 15, and by using 512 primary codes, I have made the indexing required by the asserted claims appear as similar as possible to the indexing of 25.213. Page 24 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI 1. No Literal Infringement 2. No Infringement Under the Doctrine of Equivalents 85. 86. 87. 88. 89. The prosecution of the ‘867 patent took almost eight years.12 After the examiner had finally rejected the claims, Samsung filed an appeal brief. In that appeal brief, Samsung distinguished the cited prior art as follows: Claim 59 [which corresponds to asserted claim 25] recites an apparatus for generating scrambling codes in mobile communication system having a scrambling code generator. The apparatus includes a first m-sequence generator to generate a first m-sequence. The apparatus further includes a second m-sequence 12 The application that led to the ‘867 patent was filed on Jul. 7, 2000, and the patent issued on Apr. 22, 2008. Page 25 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI generator to generate a second m-sequence. The apparatus still further includes at least one adder for generating a ((K−l)*M+K)th Gold code as a Kth primary scrambling code by adding a ((K−l)*M+K−1)-times shifted first m-sequence and the second msequence. Finally, in the apparatus K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code… Since neither Dahlman et al. nor Dahlman nor Bums teach or disclose at least one adder for generating a ((K−l)*M+K)th Gold code as a Kth primary scrambling code by adding a ((K−l)*M+K−1)-times shifted first m-sequence and the second msequence, wherein K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code, neither reference, nor any combination thereof, can be used to render obvious Claim 59 September 13, 2007, appeal brief at 20-21 (emphasis added). 90. That is, Samsung distinguished the prior art by arguing that it did not teach the equations embedded in claim 25 that specify the claim’s indexing. Having distinguished the prior art by arguing the importance of those limitations (i.e., the importance of the indexing), Samsung cannot now argue that those limitations are infringed under the doctrine of equivalents. Also, Samsung’s argument regarding the required indexing was not limited to the material quoted above. Samsung went on to argue: Thus in Claim 59 a K-th primary scrambling code is generated. A specific gold code is used as the K-th primary scrambling code. The specific gold code is the ((K−l)*M+K)-th gold code. The ((K−l)*M+K)th gold code is generated by adding a ((K−l)*M+K−l)-times shifted first m-sequence and the second msequence. The K-th primary scrambling code is directly related to the total number of secondary scrambling codes per one primary scrambling code. The Examiner alleges that generating a ((K−l)*M+K)-th gold code as a K-th primary scrambling code of Claim 59 is disclosed by Dahlman et al. [footnote omitted] As stated above in section 2C, neither Dahlman et al., Dahlman or Burns teach or disclose an adder for adding two m-sequences to generate a scrambling code, namely, at least one adder for generating a ((K−l)*M+K)th Gold code as a Kth primary scrambling code by adding a ((K−1)*M+K−1)-times shifted first m-sequence and the second m-sequence… Page 26 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI Therefore, neither Dahlman et aI., Dahlman nor Burns, or any combination thereof, teaches of discloses at least one adder for generating a ((K−1)*M+K)th Gold code as a Kth primary scrambling code by adding a ((K−l)*M+K−l)-times shifted first msequence and the second m-sequence, wherein K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code. Since neither Dahlman et al., Dahlman nor Burns, either alone or in combination, teaches or discloses at least this recitation of Claim 59 of the present application, of at least one adder for generating a ((K−l)*M+K)th Gold code as a Kth primary scrambling code by adding a ((K−l)*M+K−l)-times shifted first m-sequence and the second m-sequence, wherein K is a natural number and M is a total number of secondary scrambling codes per one primary scrambling code, Claim 59 cannot be rendered unpatentable over Dahlman et al., Dahlman nor Burns. September 13, 2007, appeal brief at 21-22 (emphasis added). 91. As shown by the quote above, Samsung again distinguished pending claim 59 (which corresponds to asserted independent claim 25), by arguing that the claimed indexing was not taught in the prior art. In the above argument, Samsung made the indexing argument by describing the “specific Gold code” required by the claims. After Samsung presented these arguments, the examiner allowed the claims. Again, having obtained its claims by specifically arguing the importance of the required indexing, Samsung cannot now argue that the indexing requirements of the claims are infringed under the doctrine of equivalents. 3. Invalidity 92. In the Stark Invalidity Report, I explained (e.g., in connection with Figure I) that the difference between the ‘867 patent’s organization of codes and the prior art’s organization is trivial and not patentable. 93. The difference described above between the indexing of the asserted claims and the indexing of the 25.213 standard (and the accused products) may also be a minor one. However, that difference relates to the indexing limitations (i.e., the equations embedded in claim 25, which require a particular indexing), which Samsung used during Page 27 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI prosecution to distinguish the prior art that was before the examiner.13 The end result is that the ‘867 patent is both not infringed and invalid (e.g., over Ericsson).14 IV. Secondary Considerations of Non-Obviousness 94. 95. Scrambling codes were widely known in the prior art, as were ways of generating them. As explained in my invalidity report, specifying a particular organization of scrambling codes was a trivial implementation detail needing only to be agreed upon before the technology could be specified in the standard. See, e.g., the Stark Invalidity Report at paras. 12-13. 96. Ericsson proposed a solution to the problem of generating and organizing scrambling codes shortly before Samsung made its own proposal. Ericsson solved the problem of organizing scrambling codes in a way that was different than, but as good as, Samsung’s method. See my invalidity report at paras. 11-13 and Fig. 1, and Ericsson’s proposal at APLNDC- WH0000013868-73. 97. 98. V. Alternative Technology 99. In the Stark Invalidity Report, I reviewed alternative technology that could have been adopted by the 3GPP committee. See, e.g., Stark Invalidity Report at ¶188. 100. Another alternative to the ‘867 patent is to avoid use of the m-sequence generators required by claim 25, i.e., the only asserted independent claim. As an 13 As explained in my invalidity report, the prior art that was before the examiner is inferior to the prior art on which my invalidity opinions are based, such as Ericsson. 14 I note that like the prior art, the indexing of 25.213 (and the accused products) begins at zero, not at one as is done in the asserted claims. Page 28 of 29 HIGHLY CONFIDENTIAL – ATTORNEYS' EYES ONLY CONTAINS APPLE AND THIRD PARTY CBI example, instead of using m-sequence generators, the two m-sequences used in 25.213 could be stored in advance in memory and then read out of the memory as needed. Such an implementation would avoid all the asserted claims of the ‘867 patent, and would not incur any significant loss of performance or additional cost. Each of the two msequences is 218-1 bits long, so storing both of them would require a total of 219-2 bits (i.e., 64 kilobytes) of memory. In practical terms, 64kB is a negligible amount of data; many common mobile devices, including the Accused Products, have storage capacities more than 100,000 times this size. Thus, this approach would be at least as feasible and cost-efficient as the approach described in the '867 claims. Trial Exhibits 101. I may rely on visual aids and demonstrative exhibits that demonstrate the bases of my opinions. Examples of these visual aids and demonstrative exhibits may include, for example, claim charts, patent drawings, excerpts from patent specifications, file histories, interrogatory responses, deposition testimony and deposition exhibits, as well as charts, diagrams, videos and animated or computer-generated video. 102. Other than as referred to in this report, I have not yet prepared any exhibits for use at trial as a summary or support for the opinions expressed in this report, but I expect to do so in accordance with the Court’s scheduling order. VI. Supplementation of opinions 103. I reserve the right to supplement my opinions after I have and the opportunity to review expert reports or other materials from Samsung or other additional documents or materials that are brought to my attention. Date: April 16 Wayne E. Stark Page 29 of 29

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?