Sycamore IP Holdings LLC v. AT&T Inc. et al
Filing
551
MEMORANDUM OPINION AND ORDER re 182 MOTION for Summary Judgment ON EQUITABLE ESTOPPEL FRAUD, PATENT MISUSE, LACHES, UNCLEAN HANDS AND WAIVER (REDACTED VERSION) filed by Sycamore IP Holdings LLC, 193 MOTION for Summary Judgment < i>Defendants' Motion For Summary Judgment Of Noninfringement, No Indirect Infringement, And No Willful Infringement filed by Verizon Business Global, LLC, Verizon Services Corporation, AT&T Corp, Level 3 Communications, LLC, Qwest Corporation, AT&T Services, Inc., CenturyLink Communications, LLC, Teleport Communications America, LLC, 203 MOTION for Summary Judgment ON THE SCOPE OF LEVEL 3'S INFRINGEMENT (REDACTED VERSION) filed by Sycamore IP Holdings LLC, 191 SEALED MOTION ON THE SCOPE OF LEVEL 3S INFRINGEMENT filed by Sycamore IP Holdings LLC, 183 SEALED MOTION ON EQUITABLE ESTOPPEL FRAUD, PATENT MISUSE, LACHES, UNCLEAN HANDS AND WAIVER (SEALED VERSION) filed by Sycam ore IP Holdings LLC, 207 SEALED MOTION FOR SUMMARY JUDGMENT ON THE SCOPE OF LEVEL 3'S INFRINGEMENT (SEALED VERSION) filed by Sycamore IP Holdings LLC, 180 MOTION for Summary Judgment Of Invalidity Under 35 U.S.C. Section 10 1 filed by Verizon Business Global, LLC, Verizon Services Corporation, AT&T Corp, Level 3 Communications, LLC, Qwest Corporation, AT&T Services, Inc., CenturyLink Communications, LLC, Teleport Communications America, LLC, 189 SEALED MOTION ON THE SCOPE OF CENTURYLINKS INFRINGEMENT filed by Sycamore IP Holdings LLC, 202 MOTION for Summary Judgment ON THE SCOPE OF CENTURYLINK'S INFRINGEMENT (REDACTED VERSION) filed by Sycamore IP Holdings LLC, [ 179] MOTION for Summary Judgment Defendants' Motion for Summary Judgment of Invalidity Under 35 U.S.C. § 102(f) AND 35 U.S.C. § 102(a) filed by Verizon Business Global, LLC, Verizon Services Corporation, AT&T Corp, Qw est Corporation, AT&T Services, Inc., CenturyLink Communications, LLC, Level 3 Communications, Inc., Teleport Communications America, LLC, 206 SEALED MOTION FOR SUMMARY JUDGMENT ON THE SCOPE OF CENTURYLINK'S INFRINGEMENT (SEALED VERSION) filed by Sycamore IP Holdings LLC, 186 MOTION for Summary Judgment OF NO INEQUITABLE CONDUCT filed by Sycamore IP Holdings LLC, 205 SEALED MOTION FOR SUMMARY JUDGMENT ON AT&T'S INFRINGEMENT OF THE SYCAMORE PA TENT (SEALED VERSION) filed by Sycamore IP Holdings LLC, 201 MOTION for Summary Judgment ON AT&T'S INFRINGEMENT OF THE SYCAMORE PATENT (REDACTED VERSION) filed by Sycamore IP Holdings LLC, 185 MOTION for Summary Judgment OF INFRINGEMENT BY PERFORMING THE ACCUSED MAPPINGS PURSUANT TO THE ACCUSED STANDARDS filed by Sycamore IP Holdings LLC, 187 SEALED MOTION ON AT&TS INFRINGEMENT OF THE SYCAMORE PATENT filed by Sycamore IP Holdings LLC.. Signed by Judge William C. Bryson on 2/16/2018. (nkl, )
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF TEXAS
MARSHALL DIVISION
SYCAMORE IP HOLDINGS LLC,
Plaintiff,
v.
AT&T CORP., et al.,
Defendants.
§
§
§
§
§
§
§
§
§
Case No. 2:16-CV-588-WCB
LEAD CASE
MEMORANDUM OPINION AND ORDER
In these consolidated infringement actions, Plaintiff Sycamore IP Holdings LLC
(“Sycamore”) filed suit against a number of defendants grouped into four cases: Case No. 2:16cv-588, against AT&T Corp., AT&T Services, Inc., and Teleport Communications America,
LLC (collectively, “AT&T”); Case No. 2:16-cv-589, against CenturyLink Communications,
LLC, and Qwest Corporation (collectively, “CenturyLink”); Case No. 2:16-cv-590, against Level
3 Communications, LLC (“Level 3”); and Case No. 2:16-cv-591, against Verizon Business
Global, LLC, and Verizon Services Corporation (collectively, “Verizon”). On February 15,
2018, the Court was informed that the parties in the Verizon case have entered into a settlement
agreement. Accordingly, this order will not address any issues relating to that case. The Court
has set trial in the action against Level 3 to begin on April 23, 2018, with the trials in each of the
other two cases to follow.
This order addresses a number of motions filed in advance of the Level 3 trial, some of
which are filed by, or directed at, Level 3 alone, and some of which are filed by, or directed at,
Level 3 and other defendants. This order will first address Sycamore’s Motion for Partial
Summary Judgment of Infringement by Performing the Accused Mappings Pursuant to the
Accused Standards, Dkt. No. 185; Defendants’ Motion for Summary Judgment of
Noninfringement, No Direct Infringement, and No Willful Infringement, Dkt. No. 193; and
Sycamore’s Motion for Summary Judgment on the Scope of Level 3’s Infringement, Dkt. No.
191. After construing the relevant claim terms, with the assistance of supplemental briefs, see
Dkt. Nos. 418, 419, 420, 421, 512, and 514, and oral arguments by the parties at the motions
hearing held on January 19, 2018, the Court DENIES Sycamore’s motion for partial summary
judgment of infringement (Dkt. No. 185), GRANTS the defendants’ motion for summary
judgment of non-infringement (Dkt. No. 193), and DENIES AS MOOT Sycamore’s motion for
summary judgment on the scope of Level 3’s infringement (Dkt. No. 191).
This order also addresses four motions for summary judgment relating to defenses raised
by Level 3 and other defendants: Defendants’ Motion for Summary Judgment of Invalidity
Under 35 U.S.C. § 102(f) and 35 U.S.C. § 102(a), Dkt. No. 179; Defendants’ Motion for
Summary Judgment of Invalidity Under 35 U.S.C. Section 101, Dkt. No. 180; Sycamore’s
Motion for Summary Judgment of No Inequitable Conduct, Dkt. No. 186; and Sycamore’s
Motion for Summary Judgment on Equitable Estoppel, Fraud, Patent Misuse, Laches, Unclean
Hands, and Waiver, Dkt. No. 183. The Court DENIED the first three of those motions following
argument at the motions hearing, with an explanation for the Court’s ruling on each motion. The
Court GRANTED the fourth motion in part and DENIED it in part. In this order, the Court will
expand on the explanations given in open court for its rulings on each of those four motions.
The reasons for the Court’s rulings in each instance incorporate both the Court’s remarks during
the motions hearing and the written elaboration on those remarks set forth below.
2
BACKGROUND
Sycamore alleges that the defendants have infringed claims 1 and 3–8 of U.S. Patent No.
6,952,405 (“the ’405 Patent”). 1 The patent is directed to a problem that arises during the
electronic communication of information over networks when different communication protocols
are used for different portions of the communication path. Transmission protocols that are
frequently used in local area networks (“LANs”), such as Gigabit Ethernet (“GbE”) or Fibre
Channel, are inefficient for transmitting data over long-haul communication networks that are
designed to carry data at high speeds and over long distances. Long-haul networks, sometimes
referred to as wide area networks (“WANs”), therefore typically use different transmission
protocols from those used in local networks; for example, long-haul networks often rely on
optical communication protocols such as Synchronous Optical Networking (“SONET”). When
multiple protocols are used, it is often desirable that messages transferred from a LAN system to
a WAN system be transferred without the loss or corruption of information, a process known as
“transparent transcoding.”
A. The ’405 Patent
A problem that engineers in the industry encountered during their efforts to devise
transparent transcoding schemes was that differences in the bandwidth used by the LAN and
WAN systems resulted in the inefficient use of the available WAN bandwidth. ’405 patent, col.
1, line 52, through col. 2, line 11. The objective of the ’405 patent was to create a transcoding
protocol that would, for example, compress a GbE signal into fewer bits, thus enabling two GbE
signals to be sent at once over a SONET link. Id., col. 2, ll. 53–59. To achieve that objective,
the inventors of the ’405 patent devised a transcoding system in which, for example, an 80-bit
1
Claims 1 and 8 are independent claims. Claims 3 through 7 depend from claim 1.
3
information group from the GbE transmission is converted into a 65-bit information stream for
transmission over the SONET link without the loss of any information. Id., col. 7, ll. 41–48; see
also id., Fig. 6. The 65-bit stream includes not only data, but also bits that indicate the locations
and identities of any control characters that were contained in the information group. Id., col. 2,
ll. 41–52; see also id., col. 3, ll. 37–45.
The ’405 patent refers to the input for the claimed encoding methods as an “information
group.” An “information group” is a series of bits comprising data words, control characters, or
a combination of both data words and control characters. Dkt. No. 104, at 2. The output of the
encoding methods is called the “encoded information stream.” The parties agree that each
“information group” is encoded into a single “encoded information stream,” and that the two
correspond one-to-one. See Dkt. No. 419, at 1 (Defendants: “‘Encoded information stream’
refers only to the data corresponding to a single incoming ‘information group.’”); Dkt. No. 420,
at 1 (Sycamore: “The parties agree that each ‘encoded information stream’ corresponds to a
single ‘information group’ and vice versa.”).
Claim 1 recites a method in which the encoding occurs through one of two processes,
depending on whether the information group includes control characters. Claim limitation 1(a).
If the information group contains only data words and no control characters, the first process is
used. The first step is to generate a “data indicator.” Claim limitation 1(b). The data indicator
consists of one or more bits indicating whether the information group includes any control
characters. Dkt. No. 104. The data indicator is combined with the data words, and both are
included in the encoded information stream. The parties agree that the data indicator and the
data words must be combined as part of the same encoded information stream. Dkt. No. 419, at
10 (Defendants: “The limitations require that the recited claim components [i.e., the data
4
indicator and data words] . . . be combined/included in one encoded information stream.”); Dkt.
No. 420, at 1 n.1 (Sycamore: “Sycamore agrees the referenced fields are contained within the
same ‘encoded information stream.’”).
If the information group contains one or more control characters, the encoding method
uses the second process, which consists of four steps. First, the control characters are encoded to
form “control codes.” Claim limitation 1(c)(i). Second, a transition indicator is generated based
on the number of control codes that are present in the information group. Claim limitation
1(c)(ii). A “transition indicator,” which consists of one or more bits, indicates the occurrence of
the last control code in the encoded information stream. Dkt. No. 110. Third, a location pointer
is generated for each control code; the location pointer indicates the sequential position of the
corresponding control character within the information group.
Claim limitation 1(c)(iii).
Finally, the control codes, data words, location pointers, and transition indicator are all combined
to form the encoded information stream. Claim limitation 1(c)(iv).
Claim 8, the only other independent claim asserted in this action, teaches a nearly
identical method for encoding a multi-word information group. If the information group does
not include control characters, the data words and a data indicator are encoded into an encoded
information stream. Claim limitation 8(a). If the information group includes control characters,
then: (i) the control characters are encoded into control codes; (ii) a transition indicator is
generated; (iii) a location pointer is generated; and (iv) the control codes, the transition indicator,
the location pointers, and any data words are combined into an encoded information stream.
Claim limitation 8(b).
B. The Accused Mapping Standards
Sycamore accuses the defendants’ networks of infringing the ’405 patent to the extent
that they use one of four transcoding methods, or “mappings,” for which the Telecommunication
5
Standardization Sector of the International Telecommunications Union (“ITU-T”) has issued
standards. Sycamore’s theory of infringement is that those standardized transcoding methods are
covered by the claims of the ’405 patent and that the defendants’ use of those standardized
methods in their communication systems infringes the patent. For ease of reference, the Court
adopts the defendants’ nomenclature of referring to the four accused mappings as Mappings A
through D. See Dkt. No. 193.
Mapping A: In 2005, the ITU-T released a standard for what it called the Transparent
Generic Framing Procedure (“GFP-T”) in a document entitled ITU-T Recommendation
G.7041/Y.1303. That standard, referred to as ITU G.7041, described a process for mapping
LAN signals, such as Gigabit Ethernet or Fibre Channel signals, onto a transport network. Dkt.
No. 185-2.
Mapping B: In 2009, the ITU-T released a standard for mapping Gigabit Ethernet signals
onto networks that use an ODU0 signal (an optical data transport protocol). The document
containing that standard is entitled ITU-T Recommendation G.709/Y.1331, and the standard is
referred to as ITU G.709 or the G.709 standard. Dkt. No. 185-3. The 2009 version states: “The
mapping of the 1000BASE-X signal into GFP-T is performed as specified in [ITU G.7041] . . . .”
Id. at 84 (brackets in original).
Mapping C: In 2012, the ITU-T released a new revision to ITU G.709 that, among other
things, set out a standard for mapping 10 Gigabit Ethernet Fibre Channel signals onto networks
that use an ODU2 signal (another optical data transport protocol). Dkt. No. 185-4.
Mapping D: The 2012 version of ITU G.709 also described a standard for mapping 40
Gigabit Ethernet signals onto ODU3 (another optical data transport protocol). Id.
6
DISCUSSION
I. Claim Construction
Following summary judgment briefing, the Court identified several infringement disputes
that the Court considered to be predicated on disagreements regarding claim construction. The
Court therefore directed the parties to file briefs on the newly identified claim construction
issues. Dkt. No. 389. The parties filed briefs addressing those issues, Dkt. Nos. 418–421, and
the Court heard oral argument on those issues at the January 19, 2018, motions hearing. The
Court will address two of those issues here: the meaning of the term “encoded information
stream,” and the meaning of the term “control characters” in the phrases “encoding the control
characters,” claim limitation 1(c)(1), and “encoding control characters,” claim limitation 8(b).
The Court does not address the “data words” claim construction issue raised only by
CenturyLink. See Dkt. No. 419, at 20–23.
A. “Encoded Information Stream”
With respect to the term “encoded information stream,” the parties disagree about two
interrelated issues: (1) whether an encoded information stream must be a continuous series of
bits, such that when a data indicator is “combin[ed]” with the data words the data indicator bits
and the data words are physically contiguous; and (2) whether the bits in an encoded information
stream may be logically connected but physically separate in the outgoing data signal, such that
the data indicator bits may be separated from the data words by bits from other, unrelated
encoded information streams.
Sycamore argues (1) that the ’405 patent requires only that there be a “logical
relationship” between the bits in an encoded information stream, and (2) that the word
“combining” does not require physical contiguity. Sycamore notes that the specification permits
the user to “arrange the fields . . . as desired,” so long as the fields are sent in “prearranged
7
sequential locations in the encoded information stream.”
’405 patent, col. 6, ll. 12–19.
Sycamore also emphasizes a sentence in the specification that reads: “It is not necessary to have
these fields [i.e., the control codes, the data words, and the transition indicator] be physically
contiguous within the encoded information stream as long as the fields can be found according to
predetermined logic.” Id., col. 6, ll. 20–22; see also id., col. 4, ll. 56–60 (“It is understood that
the data indicator field . . . and the data fields . . . may be arranged in many other predetermined
orders within the encoded information stream.”); id., col. 5, ll. 65–67 (“Again it should be
appreciated that the first and second fields 414 and 418 and the sub-fields 418z may be arranged
in other predetermined orders.”); id., col. 8, ll. 18–21 (“These fields can be arranged in any of a
variety of different orders, as desired by the user, within the constraints as described above.”).
From these descriptions in the specification, Sycamore concludes that the bits of an encoded
information stream need not be contiguous in the outgoing signal.
Sycamore’s position, however, begs the question.
The quoted excerpts from the
specification make clear that the various fields may be rearranged within the encoded
information stream in any predetermined order, so long as those fields all appear within the same
encoded information stream. Thus, it does not matter whether the control codes are transmitted
first or last, or whether a control code is physically contiguous to its corresponding location
pointer, so long as their positioning within the encoded information stream is predetermined.
That much is beyond dispute. But that does not answer the question whether the encoded
information stream itself consists of a continuous series of bits. That is, the specification does
not unambiguously answer the question whether all of the bits belonging to a particular encoded
information stream need to be physically contiguous, or whether the bits belonging to each
8
encoded information stream can be intermingled with bits belonging to other information
streams.
While the specification is not explicit as to that issue, both intrinsic and extrinsic
evidence supports the construction that an encoded information stream consists of a continuous
series of bits.
Both of the examples of encoded information streams depicted in the
specification, Figures 3(a) and 3(b), depict a single block of contiguous bits. Figure 6, which
“illustrates one example of the configurations for the encoded information stream 400 that may
be generated according to the present encoding algorithm,” ’405 patent, col. 7, ll. 43–46, labels
the bits in a 64B/65B encoded information stream sequentially, from bit 1 to bit 65. 2 See also
id., col. 7, line 41, through col. 8, line 21 (describing a preferred embodiment of the encoding
method in a sequential, bit-by-bit process).
Although the defendants concede that the specification does not expressly define the term
“encoded information stream” to be limited to a continuous series of bits, they argue
persuasively that a person of ordinary skill in the art would understand the term “stream” to
impose a requirement of contiguity. For example, although dictionary definitions of the term
“stream,” including those cited by the defendants, are not identical, nor all equally relevant, they
are consistent in suggesting that the term “stream,” as of the date of the ’405 patent application,
was understood to refer to a continuous or sequential series of bits. See, e.g., Alan Freedman,
The Computer Desktop Encyclopedia (2d. ed. 1999) (Stream: “A contiguous group of data.”
Streaming data: “Data that is structured and processed in a continuous flow, such as digital
2
The notation “64B/65B” indicates that 64 bits of information payload are transmitted
together with an additional bit that serves a different function in the group. The notation
“8B/10B encoding” indicates that eight bits of information payload are transmitted in a 10-bit
block. In general, the additional bits are added to preserve data integrity, to signal some
characteristic about the payload bits, or for other technical reasons.
9
audio and video.”); IEEE Standard Dictionary of Electrical and Electronics Terms (6th ed. 1997)
(Stream: “An ordered sequence of characters, as described by the C Standard.”); McGraw-Hill
Dictionary of Scientific and Technical Terms (Sybil P. Parker, ed., 5th ed. 1994) (Stream: “A
collection of binary digits that are transmitted in a continuous sequence, and from which
extraneous data such as control information or parity bits are excluded.”); Microsoft Computer
Dictionary (5th ed. 2002) (Stream: “Any data transmissions, such as the movement of a file
between disk and memory, that occurs in a continuous flow.”); Official Internet Dictionary (Russ
Bahorsky, ed. 1998) (Streaming: “A technique for transferring data in a continuous stream to
allow large multimedia files to be viewed before the entire file has been downloaded to a client’s
computer.”); U.S. Dep’t of Commerce, Nat’l Tech. Info. Serv., Telecommunications: Glossary of
Telecommunication Terms (1991) (Bit stream transmission: “The transmission of characters at
fixed time intervals without stop and start elements. Note: The bits that make up the characters
follow each other in sequence without interruption.” Data stream: “A sequence of digitally
encoded signals used to represent information for transmission.”); Webster’s New World
Dictionary of Computer Terms (6th ed. 1997) (Stream: “A continuous flow of data through a
channel.”); Martin H. Weik, Communications Standard Dictionary (2d ed. 1989) (Bit stream:
“An uninterrupted sequence of pulses representing binary digits transmitted in a transmission
medium. For example, a continuous sequence of bits in a wireline or optical fiber.” Data
stream:
“A sequence of characters or pulses used to represent information during
transmission.”).
Although the Court does not adopt any single one of those definitions as the sole proper
construction of the term “encoded information stream,” as that term is used in the ’405 patent,
the dictionary definitions as a whole indicate that a person of skill in the art at the time of the
10
invention would have understood that the word “stream” indicates contiguity, continuousness, or
sequential ordering. Indeed, even Sycamore’s expert, Dr. Scott Nettles, appears to have agreed
with the thrust of those definitions when he testified in his deposition that “stream is a term of art
and streams are sequences of things of indefinite extent.” Dkt. No. 421-1, at 74:6–8.
Sycamore argues that a person of ordinary skill in the art would understand that the
encoded information stream could be “further encoded, encrypted, or scrambled prior to
transmission over the network.” Dkt. No. 420, at 4. For example, Dr. Nettles explained that a
person of ordinary skill in the art would know that the outgoing signal would be multiplexed for
transmission and de-multiplexed at the receiver. Dkt. No. 418-3 ¶¶ 22–23. That may be so. But
the patent does not address whether the stream might be further encoded, encrypted, scrambled,
or multiplexed once it is sent to the network; it merely requires that the outgoing signal be
encoded into a stream before it is sent to the network. See ’405 patent, col. 4, ll. 38–41
(describing that, when no control characters are present, the indicator bit and data words are
“sent to the serializer 280 which generates the encoded information stream to be sent to the
network 290”); id., col. 6, ll. 10–12 (describing that, when control characters are present, the data
and control fields “are sent to the serializer 280 for generating the encoded information stream
400 to be sent to the network 290”); id., col. 6, ll. 27–28 (“At the receiving end 300, a deserializer 311 receives the encoded information stream 400 from the network 290.”). That the
stream may undergo additional encodings does not detract from the requirement that a stream be
generated as part of the claimed methods.
This construction of the term “encoded information stream” is harmonious with the
patent’s use of the term “combine.” The patent makes clear that certain fields are combined to
generate the encoded information stream. See, e.g., ’405 patent, claim 1(b), col. 9, ll. 28–30
11
(“combining said data indicator with the data words of the information group to generate an
encoded information stream”); id., claim 11, col. 11, ll. 16–17 (“generating an encoded
information stream by combining said data indicator and the data words”); id., col. 2, ll. 33–36
(“[T]he control codes, the data words, the location pointers, and the transition indicator are
combined for each information group to form the encoded information stream.”).
Under
Sycamore’s construction of “encoded information stream,” the term “combin[ed]” would mean
merely “logically connected” in some manner. That interpretation of the term “combine” is not
supported by the ’405 patent or any of the extrinsic evidence cited by Sycamore. If, however,
“encoded information stream” means a contiguous set of bits such that the various fields are put
together in a continuous stream, the term “combine” can assume its natural and ordinary
meaning. See, e.g., Webster’s Third New Int’l Dictionary of the English Language (2002)
(Combine: “[T]o bring into close relationship.”). The Court therefore construes “encoded
information stream” to mean “a continuous series of encoded bits that is to be sent or received
over the network and that corresponds to its respective information group.”
B. “Encoding Control Characters”
The defendants argue that two of the accused mappings, Mappings C and D, do not
satisfy the limitations of claims 1 and 8 that provide for encoding control characters into control
codes. The defendants’ argument raises two related claim construction issues: what it means to
“encode,” and what types of information can be included in a “control character.”
As for the term “encode,” the parties agree that “encoding” control characters to control
codes means that the control characters must be converted into a different form. Dkt. No. 418, at
11; Dkt. No. 419, at 18. The parties’ agreed-upon construction of “control codes” as “encoded
control characters,” Dkt. No. 104, at 2, indicates that each control character must be encoded in
some fashion. Furthermore, the specification provides that the encoding of the information
12
stream results in a reduction in “the necessary bandwidth for transporting the information,” ’405
patent, col. 2, ll. 36–37, and that “[t]he control codes have fewer bits than the control characters
contained in the information group,” id., col. 4, ll. 24–25. Therefore, it is clear that each control
character must be converted in some way that results in a reduction in the number of bits.
Accordingly, the Court construes “encoding control characters” to mean “converting at least a
portion of each present control character into a form that comprises fewer bits.”
Second, the parties dispute whether “control characters” consist exclusively of bits that
represent system control information, or whether “control characters” can contain non-control
information, including data information or block-type information.
Although the parties
previously agreed that “control characters” should be construed to mean “bits in an information
group representing control information,” Dkt. No. 104, at 2, Sycamore now argues for a
construction that permits control characters to “include information relating to non-control
information, so long as when considered in their entirety, they represent control information,”
Dkt. No. 418, at 9.
The defendants contend that the patent draws a clear distinction between “control
characters” and “data,” such that “control characters” must include only bits representing control
information and may not include data. Dkt. No. 419, at 14–16. The defendants note that the
asserted claims recite two distinct elements, “control characters” and “data words,” and that the
claims treat information groups that contain control characters differently from those that do not.
Id. at 14–15. Based on that observation, the defendants conclude that “control characters and
data words can’t be the same thing.” Id. at 15.
The Court agrees that the distinction between data information and control information is
fundamental to the patent and its claimed encoding scheme.
13
However, the defendants’
construction of “control characters” limits that term in a way that is not supported by the
specification.
The ’405 patent does not explicitly define the term “control character,” except to say that
the term is used “in place of the more conventionally used term control code.” ’405 patent, col.
3, ll. 39–40. As an example, the patent refers to the 1 Gigabit Ethernet standard in which there
are 12 possible control codes. Id., col. 3, ll. 37–45; id., col. 6, ll. 61–62. The patent explains that
the coding scheme it teaches is applicable to a variety of networking formats, including Gigabit
Ethernet, Fibre Channel, and “other data formats that have been encoded using block line codes,”
id., col. 3, ll. 33–37; id., col. 4, ll. 53–57, such as “256B/257B, 128B/129B, 16B/17B, [and]
8B/9B,” id., col. 2, ll. 66–67; see also id., col. 7, ll. 32–36. The patent is therefore not limited to
a single encoding scheme or a single conception of control character, but states that it is
applicable to a variety of “long-established Ethernet standard[s].” Id., col. 1, ll. 18–38.
The meaning of “control character” in the ’405 patent is therefore not limited to the
definition of control characters contained in the 1 Gigabit Ethernet standard that the patent
describes as a preferred embodiment, nor is it limited to a series of bits that consist exclusively of
system control information. The ’405 patent designates certain bits as “control characters” based
on the designation assigned by the LAN line encoding scheme. That is to say, the patented
scheme relies on the input signal protocol to define the distinction between data words and
control characters. The encoding protocol simply reduces the number of bits in each control
character so as to transport the communication more efficiently over an optical network. As
Sycamore’s expert explained, in the 8B/10B encoding specification “there are clear definitions as
to what the control and what the data is” and “the definition of 8b/10b says these are the control
and these are the data.” Dkt. No. 419-8, at 105:6–107:7; see also id. at 105:18–20 (“[W]hat is
14
control and what is data is something that you have to look at contextually.”); id. at 106:1–2
(“This applies to other transcodings besides 8b/10b.”). For purposes of the ’405 patent, a control
character can therefore contain whatever the incoming line encoding scheme provides in the
portions of the signal that it designates as control characters, even if the control characters also
include data information.
Finally, although the claims use the terms “data words” and “control characters,” which
could suggest that each field is limited to a single word or character, the specification makes
clear that each field could also be a block, consisting of multiple words or characters. See ’405
patent, col. 5, ll. 50–55 (“For example, if 5–8 blocks or words are included in the information
group, a sub-field 418z of 3-bits is preferably selected to represent the eight different positions
where a control character may be found within the information group.” (emphasis added)). The
term “control character” can therefore refer to a block of multiple characters or words and is not
limited to a single character. For the foregoing reasons, the Court construes “control characters”
as “bits in an information group designated as related to control by the input encoding scheme.”
II. Motions Relating to Infringement
A. Infringement: Accused Mappings A and B
1. The ITU G.7041 Standard (Mapping A)
Like the ’405 patent, the G.7041 standard describes a method for encoding information.
The G.7041 standard receives eight characters of 8B/10B information and maps them onto a
64B/65B block. Dkt. No. 185-2, at 30. In each 65-bit block, the “leading bit” or “flag bit”
indicates whether “that block contains only 64B/65B 8-bit data characters or whether client
control characters are also present in that block.” Id. If the 65-bit block does not contain control
characters, the flag bit is set as 0; otherwise it is set as 1. Id. If the 65-bit block contains control
characters, the control characters are placed at the beginning of the block, and each control
15
character is encoded into eight bits. The first of those eight bits is a Last Control Character flag
bit, which indicates whether that control character is the last control character in the block. The
next three bits constitute the Control Code Locator, which indicates the original location of the
control code character within the sequence of the eight characters contained in the block. The
last four bits in the 8-bit group constitute the Control Code Indicator, which represents the
8B/10B control code character and is coded in 4 bits. Id. Figure 8-2 illustrates how the input is
encoded:
The eight characters that compose the 64B/65B block are not transmitted over the
network as a discrete block.
Rather, eight 64B/65B code blocks are combined into a
“superblock,” which is described in Figure 8-3 of the standard. Dkt. No. 185-2, at 32. The entire
16
superblock is 536 bits in size and consists of the following components: First, the payloads from
each of the eight 64B/65B blocks are grouped into a superblock—i.e., 64 characters of eight bits
each; next, the “leading (Flag) bits of each of the eight 64B/65B codes are grouped together into
a first trailing octet”; finally, 16 additional bits are sent, which are used “for a CRC-16 error
check over the bits of this superblock.” Id. The superblock has the following structure, in which
each row is eight bits:
The G.7041 standard notes that “[t]o minimize latency, the transparent GFP mapper can begin
transmitting data as soon as the first 64B/65B code in the group has been formed rather than
waiting for the entire superblock to be formed.” Id.
2. The 2009 Version of the ITU G.709 Standard (Mapping B)
As noted, in 2009 the ITU-T issued a standard for mapping Gigabit Ethernet signals onto
certain types of optical transport networks. This standard was designated as ITU G.709, but it
stated that the mapping “is performed as specified in [ITU G.7041],” that is, Mapping A. Dkt.
17
No. 185-5, at 84 (brackets in original). The infringement analysis is therefore identical for
Mappings A and B.
3. Infringement of Claim Limitations 1(b) and 8(a)
Sycamore’s theory of infringement is that the defendants practice the two mapping
standards at issue in this case, ITU G.7041 and ITU G.709, and that any party that practices
those mapping standards will necessarily infringe the asserted claims of the ’405 patent. The
defendants respond that a party that practices the G.7041 mapping standard does not necessarily
infringe claim limitations 1(b) and 8(a) of the ’405 patent, and that proof that the defendants
practice those mapping standards therefore does not constitute proof of infringement.
Sycamore’s infringement theory is based on the principles set out by the Federal Circuit
in Fujitsu Ltd. v. Netgear Inc., 620 F.3d 1321 (Fed. Cir. 2010). There, the Circuit held that a
district court “may rely on an industry standard in analyzing infringement.”
Id. at 1327.
Specifically, the court held that “[i]f a district court construes the claims and finds that the reach
of the claims includes any device that practices a standard, then this can be sufficient for a
finding of infringement.” Id. However, the court cautioned that “in many instances, an industry
standard does not provide the level of specificity required to establish that practicing that
standard would always result in infringement.” Id. The court emphasized that in such cases the
patent owner cannot establish infringement simply by “arguing that the product admittedly
practices the standard, therefore it infringes.” Id. at 1328. Rather, “the patent owner must
compare the claims to the accused products or, if appropriate, prove that the accused products
implement any relevant optional sections of the standard.” Id. It is only in the situation in which
a patent covers “every possible implementation of a standard” that it will be “enough to prove
infringement by showing standard compliance.” Id. Applying the test set forth in Fujitsu, this
18
Court agrees with the defendants that the evidence does not show that practicing the G.7041
standard would necessarily infringe the ’405 patent, and that the defendants are therefore entitled
to summary judgment of non-infringement.
The parties do not disagree that the “information group” referred to in the G.7041
mapping standard consists of the eight incoming characters of the 8B/10B signal—that is, 80 bits
of information that comprise some combination of eight data words and/or control characters.
The “encoded information group” in the G.7041 standard is therefore the 64B/65B encoding of
those eight data words and/or control characters, consisting of a single flag bit and eight bits for
each of the eight data words or control characters. See Dkt. No. 159-1, at A-1 (Sycamore’s
infringement contentions regarding the G.7041 standard, dated September 12, 2016, identify the
“Input client characters” in Figure 8-2 as the multi-word information group for claim 1 and
describe the information group as containing eight data words, eight control characters, or a
mixture of eight data words and control characters); id. at A-20 (stating, for claim 3, “Each of the
information groups comprises 8 words . . . . Each of the words of the information group
comprises 10 bits (i.e., an 8B/10B character).”); id. at A-22 (stating, for claim 4, “Each of the
information groups comprises 80 bits (8 10-bit 8B/10B characters).”); see also Dkt. No. 185, at
10; Dkt. No. 245, at 3; Dkt. No. 418, at 9 (“In the G.7041 GFP-T standard, a ‘block’ is defined as
a 64b/65b portion of the outgoing signal that corresponds to 80 bits of an incoming 8b/10b signal
(or 64 bits of an incoming 8-bit signal). If those 80 (or 64) bits are the ‘information group’, then
each 64b/65b block is a single ‘encoded information stream.’” (citation omitted)). 3 The “data
indicator” is the “flag bit” in the G.7041 standard. Dkt. No. 159-1, at A-6 through A-7.
3
Sycamore is not asserting that the 536-bit superblock is the encoded information stream,
such that the information group consists of 64 8B/10B characters. Because the G.7041 mapping
standard processes data in groups of eight 8B/10B characters, the result of that interpretation
19
Under the Court’s claim constructions, Sycamore has not presented evidence that the
G.7041 mapping standard necessarily satisfies either claim limitation 1(b) or claim limitation
8(a) of the ’405 patent. Claim limitation 1(b) requires that the data indicator and data words be
combined to generate an encoded information stream that includes the data indicator and data
words. Similarly, claim limitation 8(a) requires that the data words be encoded with a data
indicator to generate an encoded information stream.
The G.7041 standard does neither.
Although the G.7041 standard generates a flag bit for each 64-bit information group, the data
words and the corresponding flag bit are not combined, but are transmitted separately. The
superblock structure transmits the data words and control characters first, followed by an octet of
eight flag bits. Because the eight separate information groups—i.e., eight separate encoded
information streams—are transmitted first, and the data indicators for all eight are combined and
transmitted later, the data indicator is never put into a contiguous stream of encoded information
with the data words. For that reason, the transmission of the superblocks under the G.7041
standard does not infringe the ’405 patent.
In its opposition to the defendants’ motion for summary judgment of non-infringement,
Sycamore made an alternative argument in favor of infringement. It argued that superblock
encoding is a two-part process, and that “the data indicator and data words are first combined
before the data indicator is separated into a trailing octet.” Dkt. No. 245, at 7. As support for
that proposition, Sycamore cited two White Papers on the G.7041 and G.709 standards prepared
by Dr. Steve Gorshe, an engineer with PMC-Sierra and one of the principal architects of the
standards. See Dkt. Nos. 245-12 and 245-13. Summarizing the mapping method for Gigabit
would be that the accused products would fail to satisfy various claim limitations of the ’405
patent, including the limitations directed at generating a data indicator, a transition indicator, and
a location pointer. See Dkt. No. 193, at 11–15.
20
Ethernet onto OPU0 in the 2011 White Paper, Dr. Gorshe described the implementation of the
G.709 standard as follows:
“Adapt the incoming GE signal into GFP-T:
o Transcode the incoming GE 8B/10B characters into 64B/65B code blocks,
o Group eight 64B/65B blocks into a 67 byte superblock, and
o Map one superblock into a GFP frame, with no 65B_PAD or GFP Idles.”
Dkt. No. 245-13, at 41. Sycamore also cites the 2005 White Paper by Dr. Gorshe, Dkt. No. 24512, which addressed the G.7041 standard. The cited portions of that White Paper describe the
GFP-T mapping protocol and the way data and control characters are mapped into a 64B/65B
code. It describes the process of mapping an incoming information stream to form a 64B/65B
code, after which eight 64B/65B codes are combined into a superblock in which the “payload
data bytes of the eight constituent 64B/65B codes are placed into the superblock in transmission
order, with the eight leading (flag) bits of these codes grouped together in a trailing byte.” Id. at
15.
In their reply brief, the defendants did not respond to Sycamore’s argument based on the
White Papers. Because little attention had been devoted to the White Papers in the parties’
briefs, the Court requested additional briefing on the relevance and admissibility of the White
Papers. Dkt. No. 494. The defendants responded that the White Papers are inadmissible as
hearsay and do not create a fact issue regarding infringement.
Dkt. No. 512.
Sycamore
responded that the White Papers are admissible and that they raise a factual issue as to
infringement. Dkt. No. 514. Sycamore also pointed to certain technical documents generated by
manufacturers of the equipment that use the accused mappings.
previously been submitted as part of the summary judgment record.
21
That evidence had not
For purposes of the summary judgment motions, the Court will assume the White Papers
are both admissible.
The question before the Court on Sycamore’s alternative theory of
infringement is whether Sycamore’s evidence, consisting primarily of the G.7041 standard and
the two White Papers, is sufficient to create a factual issue as to whether the standards require the
formation of an infringing block of continuous bits before the data indicator is separated from the
data to which it pertains.
Sycamore argues that the G.7041 standard establishes that the decoded 8B/10B characters
are mapped into a 64B/65B block, as shown in Figure 8-2 of the standard, before the 64B/65B
blocks are grouped into a superblock, as shown in Figure 8-3 of the standard. Dkt. No. 185-2, at
30, 32. The block shown in Figure 8-2, Sycamore argues, is a physical, contiguous block of bits.
That characterization, according to Sycamore, is consistent with the statement in the 2011 White
Paper referring to “[t]ranscod[ing] the incoming GE 8B/10B characters into 64B/65B code
blocks.” Dkt. No. 509-2, at 41.
The problem with Sycamore’s theory is that neither the G.7041 standard nor the White
Papers establishes that the 64B/65B block consists of physically contiguous bits, as opposed to
bits that are logically related but not necessarily continuous within the communication signal. 4
Both the standard and the White Papers refer to the 64B/65B blocks as “codes” or “code blocks,”
Dkt. No. 509-1, at 15–16; Dkt. No. 509-2, at 41, and the standard refers to the 64B/65B code
being “formed,” Dkt. No. 418-4, at 32, but none of those references states that the standard
4
Ironically, Sycamore’s alternative argument causes the parties to switch positions with
respect to whether bits that are part of a stream or block must be contiguous or need only be
logically related. Sycamore argued that logical relationship was enough in connection with the
construction of the term “stream,” but now argues that physical contiguity is required for the
term “block.” The defendants have taken the opposite position. The Court’s analysis results in a
different construction for the two terms, based on the evidence that the term “stream” has been
interpreted as requiring continuous or contiguous bits, while there is no evidence that the term
“block” must be given the same construction.
22
requires that a physical “block” of contiguous bits ever be generated in order to satisfy the ’405
patent.
For example, the 2005 White Paper articulates, in granular detail, the “process of going
from the 64B/65B code to a GFP frame,” which is illustrated in Figure 6 of that document. Dkt.
No. 245-12, at 16. Figure 6 shows the construction of the GFP-T frame in four steps: first, it
shows a 65-bit block of contiguous bits containing the leading bit and the 64 bits of payload
information; second it shows a 520-bit block consisting of eight 65-bit blocks, in which each
leading bit is physically contiguous with its respective 64 bits of payload information; third, the
eight leading bits are repositioned into a trailing byte to form the superblock structure; and
finally, four superblocks are fit into a GFP-T frame.
23
Dkt. No. 245-12, at 17. If this four-step process of encoding were necessary for implementing
the G.7041 standard, the first and second steps would satisfy the contested claim limitations.
However, the standard itself suggests that this four-step process need not occur. The
standard states that “[t]o minimize latency, the transparent GFP mapper can begin transmitting
data as soon as the first 64B/65B code in the group has been formed rather than waiting for the
entire superblock to be formed.” Dkt. No. 185-2, at 32. Because information can begin to be
transmitted immediately after the first block of information is received, the standard does not
require the actual physical generation of the second step of the White Paper’s four-step
implementation. Given that the 2005 White Paper is intended to “provide an overview of GFP
24
for a reader who is unfamiliar with this technology,” Dkt. No. 245-12, at 5, the Court cannot
infer that the White Paper describes the only possible implementation of the G.7041 mapping
standard. It is therefore insufficient to satisfy Sycamore’s burden.
The defendants elicited expert testimony from several witnesses that the 64B/65B block
referred to in the G.7041 standard does not have to consist of physically contiguous bits. See
Dkt. No. 298-6, 91:22–92:10 (Sharma deposition: “Q. In order to create an output 64b/65b
block, is it necessary that those 65 bits be physically contiguous? A. It’s not necessary that they
be physically contiguous, no.”); Dkt. No. 185-10 ¶ 248 (Lanning Report: “Figure 8-2 is a logical
representation. . . . Figure 8-2 does not depict how products practicing the accused standard
must be implemented. Dr. Nettles has presented no evidence that the Accused Instrumentalities
perform the encoding as depicted in Figure 8-2. Indeed, it would make no sense and be less
efficient to generate such a structure and then encode the 64B/65B blocks into the superblock
structure shown in Figure 8-3.”); Dkt. No. 185-11 ¶ 124 (Schofield Report:
“Dr. Nettles
provides no source code, documentation, or analysis as to whether the intermediary step shown
in Figure 8-2 is ever generated by any of the accused line cards. Based on my experience, doing
so is unnecessary and could lead to added latency. Instead of generating the blocks shown in
Figure 8-2 and then transforming those blocks into the superblock structure of Figure 8-3, one of
skill in the art would generate the information stream of each octet as shown in Figure 8-3 and
then separate the data indicator by placing it in the appropriate slot in the first trailing octet.
Thus, from an implementation stand point, one of skill in the art could place the data indicator
directly into the first trailing octet without ever combining it with the data words in the encoded
information stream as required by limitation 1(b).”).
25
Sycamore offered no expert evidence to the contrary. In fact, Sycamore’s expert, Dr.
Nettles, gave testimony that was squarely at odds with Sycamore’s alternative theory of
infringement. He admitted that Figure 8-2 from the G.7041 standard does not “depict what is
actually generated and sent over a communications link,” but instead “is showing the logical
relationships that go into the transform. The figure which is 8-3, which is the superblock, is
closer to what is sent over the wire[.]” Dkt. No. 427-4, at 152:14–21. When asked, “Is 8-2
generated?” Dr. Nettles replied, “Something that has all of the pieces of 8-2 is generated because
otherwise there would be no way to recreate them.” Id. at 155:5–8. He added, “[t]he output
stream is generated with the logical relationships we see in 8-2 . . . you don’t have to preserve the
physical relationships we see in 8-2 in the serialized output.” Id. at 159:4–23. He conceded that
“I don’t necessarily have visibility into what the implementation of the framer does and what
order they do things in,” id. at 160:3–6, but he clarified that “picture 8-2 tells us how to encode
information groups. Figure 8-3 tells us more about how the serializer formats things,” id. at
162:8–10. When asked, “So it doesn’t matter for purposes of infringement whether what is
actually physically generated takes the form of what is shown in Figure 8-2, it just needs to
employ the logical relationships depicted in Figure 8-2; is that correct?” he answered, “It has to
have the pieces.” Id. at 166:15–21. Thus, Dr. Nettles conceded that, as the defendants’ experts
contended, the G.7041 standard does not require an implementation that generates the 65 bits of
the 64B/65B block depicted in Figure 8-2 in a physically contiguous form. His testimony puts
the kibosh on Sycamore’s alternative infringement theory that the 64B/65B block of Figure 8-2
is generated before the creation of the superblock of Figure 8-3 and that each of the data-only
blocks in the 64B/65B block is an encoded information stream of continuous bits that includes
both the data indicator and data words.
26
In response to the Court’s request for the parties to brief the issue of the admissibility and
relevance of the White Papers, and to provide any deposition testimony or expert reports in the
case that discussed the White Papers, Sycamore submitted specification sheets from four chip
manufacturers. Sycamore contends that the chips made by those manufacturers generate an
intermediate block of physically contiguous bits corresponding to one of the blocks displayed in
Figure 8-2 of the G.7041 standard.
Those specification sheets, Dkt. Nos. 514-2 through 514-5, provide no significant support
for Sycamore’s infringement claims. To begin with, Sycamore’s infringement contention was
that the defendants practice the G.7041 standard and that practicing that standard would
necessarily result in infringement of the ’405 patent. See Fujitsu, 620 F.3d at 1327–28. Even
assuming that the specification sheets describe an infringing 65-bit block of continuous bits, the
specification sheets do not prove that the G.7041 standard must be implemented in a way that
infringes Sycamore’s patent, but only that it could be.
Second, at least two of the
specifications—those from Nortel Networks and Ciena Corporation—contain language that
largely tracks the G.7041 standard.
Nothing in those specifications provides support for
Sycamore’s alternative theory of infringement. The other two specifications—from Applied
Micro Circuits Corp. and Cortina Systems, Inc.—are ambiguous; without supporting testimony
explaining the language used in those specifications, it is not clear whether the reference to
“blocks” and “codes” are meant to refer to physical structures or merely logical constructs. And
finally, Sycamore represented that it was not relying on those specifications to prove
infringement, but was merely using them as support for the proposition that the G.7041 standard
is consistent with Sycamore’s alternative theory of infringement.
27
In sum, the Court concludes that the evidence presented on summary judgment fails to
show a genuine issue of material fact as to infringement by Accused Mappings A or B.
B. Infringement: Accused Mappings C and D 5
1. The Standards
The 2012 revised version of the G.709 standard provided for mapping of faster LAN
networks onto faster optical transport networks. Among other changes, the revised standard
provided for mapping 10 Gigabit Fibre Channel signals onto ODU2e signals (Mapping C) and 40
Gigabit Ethernet signals onto ODU3 signals (Mapping D). The 2012 document was released as a
new version of ITU-T Recommendation G.709/Y.1331. Except for one difference at the end of
the encoding process, Mapping C and Mapping D are identical. Sycamore claims that both
infringe the ’405 patent.
Mappings C and D are both methods to encode data and to send it more efficiently over a
transport network. Rather than receive information in 8B/10B characters, as in the ’405 patent
and the G.7041 standard, Mappings C and D process input that is in the form of 64B/66B code
blocks—i.e., 64 bits of content and two bits of overhead. Dkt. No. 185-4, at 164–65. According
to the line encoding scheme, each 64B/66B block can be one of two types: a data block, which
contains eight data bytes; or a control block, which can include a mixture of data and control
information. Id. at 164.
The 64B/66B control blocks are more complex than the control words in the 8B/10B
scheme. In the 8B/10B scheme, there are only 12 possible control words. The 64B/66B line
encoding scheme describes 15 different control block types, which can contain exclusively
control information or a mixture of control and data information. Id. at 166, 168. Specifically, a
5
Sycamore does not accuse Level 3 of infringing by practicing Mappings C or D; as to
Level 3, only Mappings A and B are at issue.
28
64B/66B control block contains a two-bit sync header, eight bits to indicate which of the 15
block types the control character is, and 56 bits of other information. Id. Figure B.2 of the 2012
mapping standards illustrates the data block format and the 15 control block formats:
As in the G.7041 mapping standard, in which eight 8B/10B words are grouped and
processed, Mappings C and D group and process eight 64B/66B blocks to encode a 512B/513B
block. Id. at 165. The composition and structure of the 512B/513B block is determined based
on the number of 64B/66B data blocks and control blocks to be included in the 512B/513B
block. Id. at 168–69. If the 512B/513B structure contains at least one control block, a flag bit is
set to “1”; if the structure contains only data blocks, the flag bit is set to “0.” Id. Data blocks are
transmitted without any further encoding. Figure B.5 shows the components of the 512B/513B
structure, 6 based on the number of 64B/66B data blocks and control blocks:
6
The statements in the chart below that “-aaa = 4-bit representation of the first control
code’s type (first control block type: CB TYPE)”; “-bbb = 4-bit representation of the second
control code’s type (Second control block type: CB TYPE)”; and “-hhh = 4-bit representation of
the eight control code’s type (Eighth control block type: CB TYPE)” appear to be erroneous.
The references to “-aaa”; “-bbb”; and “-hhh” should read “-aaaa”; “-bbbb”; and “-hhhh.”
29
Control blocks, which include eight bits of block type information and 56 bits of control
and/or data information, are encoded as follows: The eight-bit control block type is “translated
into a 4-bit code according to the rightmost column of Figure B.2.” Id. at 168. This four-bit
code is shown in Figure B.5 as four lowercase letters (“aaaa,” “bbbb,” etc.). A three-bit “POS
field” is generated to indicate the position of the original 64B/66B control block in the sequence
of the eight 64B/66B blocks that are received in the coding process. Id. The POS field is shown
in Figure B.5 as three capital letters (“AAA,” “BBB,” etc.). A flag continuation bit (“FC”)
indicates whether the particular control block is the final control block in the 512B/513B
30
mapping group, or whether there are additional control blocks in the group. Id. Figure B.4
shows the structure of the eight-bit “control block header”:
The control block header is combined with the remaining 56 bits of the control block to
create a 64-bit row in the 512B/513B structure. Id. Any control blocks are placed at the front of
the 512B/513B structure, in the order in which they were received, followed by any data blocks,
in the order received. Id. Figure B.3 depicts an example, containing five data blocks and three
control blocks (the fifth, sixth, and seventh rows on the left side of the figure), of how eight
incoming 64B/66B blocks are processed and rearranged into the 512B/513B structure:
The two mapping standards diverge at the final step. In Mapping C, each 512B/513B
structure is grouped with seven other 512B/513B structures to form a “516-octet superblock,”
and 17 such superblocks are grouped to form an 8800-octet GFP frame. Id. at 95. As in the
G.7041 mapping standard, the physical structure of the superblock is significant for infringement
analysis. Figure 17-18 of the 2012 version of the G.709 standard, set out below, illustrates the
31
FC1200 GFP frame, with four bytes (32 bits) per row, and shows in detail the structure of a
single superblock. The figure shows that a superblock has 512 bytes (4096 bits) of information
and four trailing bytes (32 bits). Specifically, the eight one-bit flag bits are grouped together in a
single octet at the end of the superblock (the “Superblock flags”), followed by 24 CRC errorcheck bits. Id. at 95–96.
Mapping D combines the 512B/513B structures in a different way. Rather than being
combined into a superblock, two 512B/513B structures are combined to form a 1027B block. Id.
at 92. Mapping D adds an additional leading bit, the “flag parity bit” to protect the 512B/513B
structure’s flag bit and signal the location of the code blocks. Id. at 191. The two 512B/513B
32
structures are transmitted in the following order: the parity bit; the flag bit from the first
512B/513B structure; the flag bit from the second 512B/513B structure; the payload (i.e., the
eight data and/or control blocks) from the first 512B/513B structure; and finally, the payload
from the second 512B/513B structure. Id. Figure F.1 from the 2012 standard illustrates this
structure:
2. Infringement of Claim Limitations 1(b) and 8(a)
As with the first two accused mappings, Sycamore’s theory of infringement is that the
defendants practice Mappings C and D, and that those mapping standards necessarily infringe the
asserted claims of the ’405 patent. The defendants again respond that Sycamore’s evidence fails
to show that implementing the mapping standards necessarily satisfies limitations 1(b) and 8(a)
of the ’405 patent, and that Sycamore has therefore failed to prove that practicing the mapping
standards constitutes proof of infringement. The Court again agrees with the defendants.
Sycamore contends that the “information group” in the 512B/513B mapping standards is
the set of eight 64-bit blocks that are shown in Figure B.5. Dkt. No. 185, at 16; see also Dkt. No.
33
159-1, at C-1 (Sycamore’s infringement contentions regarding Mapping C, dated September 12,
2016, which identify the “multi-word information group” as the eight 64-bit blocks shown in
Figure B.5); id. at D-1 (same, regarding Mapping D). As in the case of the G.7041 mapping
standard, the “data indicator” of the ’405 patent corresponds to the standard’s “Flag bit.” Id. at
C-8, D-8.
As in the case of Mappings A and B, the defendants contend that the 512B/513B
mapping standards do not infringe the ’405 patent because the data words and the data indicator
are not “combin[ed]” to “generate an encoded information stream.”
For that reason, the
defendants argue, the 512B/513B mapping standards do not satisfy claim limitations 1(b) or 8(a),
which require that the data words and the data indicator be “includ[ed]” in a single encoded
information stream. In Mapping C, as in the G.7041 standard, the flag bits for each of the eight
information groups in the superblock are placed in a trailing octet at the end of the superblock,
separate from the corresponding data words. In Mapping D, the flag bits for the two information
groups are grouped first and are transmitted immediately before the two information groups.
Applying the Court’s claim constructions, limitations 1(b) and 8(a) both require that the
data indicator and the data words be combined or included in the same encoded information
stream. The encoded data is transmitted in a superblock in the case of Mapping C, and in a pair
of blocks in the case of Mapping D. As a result, multiple flag bits are combined and transmitted
together, and they are transmitted separately from their corresponding data words. Therefore, it
is clear that the final encoded output of each mapping does not infringe the ’405 patent.
In its opposition to the defendants’ motion for summary judgment, Sycamore did not
argue that Mappings C and D perform a two-step process, the alternative infringement argument
that Sycamore made with respect to Mappings A and B. See Dkt. No. 245, at 6–7 (in the context
34
of its two-step theory, discussing only Figures 8-2 and 8-3 of the G.7041 standard and creating a
64B/65B code block).
However, Sycamore raised that argument in its supplemental brief
addressing Dr. Gorshe’s White Papers. Dkt. No. 514, at 4. In his 2011 White Paper, Dr. Gorshe
wrote that in Mapping C, the “64B/66B line codes are first transcoded into 512B/513B block
codes” and then “eight 513B blocks are grouped in a 16-block (64-octet) superblock.” Dkt. No.
509-2, at 55. Similarly, Dr. Gorshe wrote that in Mapping D, “[t]he 1024B/1027B block code is
constructed as a concatenation of two 512B/513B block codes.” Id. at 50.
In its supplemental brief, Sycamore also argued that the standard itself requires that an
infringing contiguous 513-bit block be formed. Dkt. No. 514, at 4. For Mapping C, the 2012
G.709 standard is performed by “transcoding a group of eight 66B blocks into one 513B block
(as described in Annex B)” and then “assembling eight 513B blocks into one 516-octet
superblock,” wherein “the leading flag bits from each of the eight 513B blocks are relocated into
a single octet at the end of the 513-octet superblock data field.” Dkt. No. 185-4, at 95–96.
Similarly, Mapping D is described as creating a flag parity bit “across two 513B blocks.” Id. at
191.
As with Mappings A and B, however, Sycamore has not met its burden of showing that
an infringing 513-bit block is generated. Sycamore offers no evidence or expert testimony that
these 513-bit blocks must consist of contiguous bits, and the defendants offer expert testimony to
suggest that implementing the standard would not require generating a continuous 513-bit block
before further encoding the superblock or interleaved structure of Figure 17-18 or Figure F.1,
respectively. See Dkt. No. 185-10 ¶¶ 252–62; id. ¶ 271 (Lanning Report: “Indeed, although I
have not been shown evidence of the internal implementation of the line cards, in my opinion it
is more likely that the line cards would generate the superblock in the final format. This is my
35
opinion because such rearrangement would be wasteful and would require additional time (thus
potentially leading to communications latency), as well as additional computational resources
(thus potentially leading to greater power consumption and additional circuitry).”). Because
Sycamore has failed to meet its burden to show that there is any evidence that Mappings C and D
require the generation of a continuous series of 513 bits in order to perform a two-step encoding
process, and because the final encoded outgoing stream does not combine or include the
transition indicator and the data words in a single encoded information stream, summary
judgment for the defendants is appropriate.
3. Infringement of Claim Limitations 1(c)(i) and 8(b)
The defendants further contend that Mappings C and D do not satisfy claim limitations
1(c)(i) and 8(b) of the ’405 patent, which recite encoding “control characters to control codes.”
With respect to those limitations, the defendants assert that there are two flaws in Sycamore’s
infringement theory:
First, they contend that the control blocks in the 64B/66B input
information cannot constitute “control characters” because the blocks can contain data words in
addition to control information. Second, they note that only the eight-bit “block type” field is
encoded, while the remaining 56 bits of the control block are incorporated without change in the
encoded information stream; for that reason, they contend, these mappings do not “encode”
control characters. Dkt. No. 193, at 16–17; Dkt. No. 255, at 11–15. Neither argument is
persuasive.
Under the Court’s construction, a “control character” is defined by the line encoding
standard that the accused infringing device uses as input. According to Sycamore’s infringement
theory regarding Mappings C and D, each “information group” comprises eight 64B/66B blocks.
Dkt. No. 185, at 16; see also Dkt. No. 159-1, at C-1. Under both standards, “[e]ach 66B
36
codeword . . . is one of the following: a set of eight data bytes with a sync header of ‘01’; or a
control block . . . beginning with a sync header of ‘10’.” Dkt. No. 185-4, at 164. Each control
block can be one of 15 block types, and each control block can contain either exclusively control
information or a mixture of control and data information. Id. at 164, 166. The control block
contains a leading byte that in turn contains a block type field. Id. at 166, 168. When the
mapping standard receives a 66B control block, it is “encoded into a row of the [512B/513B]
structure shown in Figure B.3” by first removing the sync header “10,” then translating the 8-bit
control block type field into a 4-bit code, and finally generating a flag continuation bit and a
position indicator of three bits. Id. at 168.
This encoding process satisfies the encoding “control characters into control codes”
limitations of claims 1 and 8. The accused “control character” in these mappings is the control
block, which is defined in the 64B/66B line encoding scheme as consisting of 64 payload bits
and 2 bits of overhead. See, e.g., id. (using the phrase “66B control block” 13 times on a single
page when describing the encoding process for the accused mappings). The accused mappings
reduce an eight-bit segment of each of the 66-bit control blocks into four bits. The accused
mappings, like the ’405 patent, rely on the line encoding standard to determine what constitutes a
“control block.” Under the Court’s construction of “control character,” the fact that the control
block may contain data words does not preclude infringement. Moreover, the mapping standards
are clear that the 8-bit block type field is part of the incoming 66B control block, and that the 8bit type field is converted into a form that comprises fewer bits. Nothing more is required to
satisfy the two disputed limitations.
37
C. Remaining Issues Relating to Infringement
In the course of the summary judgment briefing, Sycamore stated that it was not pursuing
a theory of indirect infringement. Dkt. No. 245, at 1. That issue, which was raised in the
defendants’ motion for summary judgment, is therefore moot. Because the Court grants the
defendants’ motion as to non-infringement, their argument about no willful infringement is also
moot. With respect to Sycamore’s motion for summary judgment on the scope of Level 3’s
infringement, Dkt. No. 191, the Court’s disposition of the summary judgment motions regarding
infringement of the accused mapping standards make it unnecessary to address the infringement
contentions in that motion. That motion is therefore DENIED AS MOOT. For the same reason,
Sycamore’s infringement-related motions directed to AT&T and CenturyLink are DENIED AS
MOOT, specifically: Sycamore’s Motion for Summary Judgment on AT&T’s Infringement of
the Sycamore Patent, Dkt. No. 205; and Sycamore’s Motion for Summary Judgment on the
Scope of CenturyLink’s Infringement, Dkt. No. 206. Finally, at this time, the Court need not
address AT&T’s Motion to Strike Plaintiff’s Late-Disclosed Infringement Theories, Dkt. No.
417; or CenturyLink’s Additional Opposition to Sycamore’s Motion for Partial Summary
Judgment of Infringement by Performing the Accused Mappings Pursuant to the Accused
Standards, Dkt. No. 270.
38
III. Motions Relating to Defenses
A. Invalidity Under 35 U.S.C. §§ 102(a) and 102(f) (2006) 7
1. Background
In the fall of 2000, Dr. Danny Tsang took a sabbatical from Hong Kong University of
Science and Technology and joined Sycamore Networks, a predecessor-in-interest to plaintiff
Sycamore IP Holdings LLC. While at Sycamore Networks, Dr. Tsang worked with his manager,
Dr. Murat Azizoglu, on an encoding scheme to transport Gigabit Ethernet signals over SONET
systems. On December 5, 2000, Sycamore Networks filed U.S. Provisional Patent Application
No. 60/251,341 (the “Provisional Application”), which described Dr. Tsang’s encoding scheme
and named Dr. Tsang and Dr. Azizoglu as the inventors. Dkt. No. 179-4. The Provisional
Application described methods of encoding Gigabit Ethernet signals for transmission over a
SONET network by encoding the control codes and grouping multiple data words or control
codes together for more efficient transmission.
From at least August 2000 until July 2001, Sycamore Networks was a member of the
Alliance for Telecommunications Industry Standards (“ATIS”), a standards-setting organization
that is accredited by the American National Standards Institute (“ANSI”). ANSI accredited and
ATIS sponsored the T1 Standards Committee, which included a working group called T1X1.5
that was working on protocols for encoding data over SONET. The T1X1.5 working group was
ultimately responsible for developing a proposal for transparent encoding that became one of the
foundations of the four accused mappings at issue in this case.
7
The language of section 102 was significantly amended by the Leahy-Smith America
Invents Act (“AIA”), Pub. L. No. 112-29, 125 Stat. 284 (2011). However, the former version of
section 102 applies to this case because the AIA amendments to section 102 apply only to
patents with an effective filing date of March 16, 2013, or later. See id. § 3(n), 125 Stat. at 293;
Solvay S.A. v. Honeywell Int’l Inc., 742 F.3d 998, 1000 n.1 (Fed. Cir. 2014).
39
Dr. Tsang and Dr. Yang Cao, another employee of Sycamore Networks, were participants
in the T1X1.5 working group. Dr. Tsang participated in the working group from approximately
October 2000 to March 26, 2001. In the weeks after he submitted the Provisional Application,
Dr. Tsang approached Dr. Gorshe of PMC-Sierra and Mike Scholten of Applied Micro Circuits
Corp. (“AMCC”) to propose presenting his transparent encoding scheme to the T1X1.5 working
group. PMC-Sierra and AMCC were both members of the T1X1.5 working group, and Dr.
Gorshe was the technical editor of the group. Dr. Tsang informed Dr. Gorshe and Mr. Scholten
that he had a patent application pending on his encoding scheme.
On December 8, 2000, Mr. Scholten wrote to Dr. Tsang via e-mail stating that he
believed Dr. Tsang’s proposal “represents a simpler, more generic approach than the current
T1X1 proposal” and that “AMCC would like to support and co-author this contribution with
you.” Dkt. No. 257-6, at MC000015–16. However, Mr. Scholten emphasized that “we can’t do
that unless Sycamore publicly indicates they will not use their pending patent to charge royalties
or restrict use of this scheme.” Id. at MC000016. Dr. Tsang wrote back that “Sycamore will not
charge AMCC for the 64B/65B licensing fee” and suggested that “it may be politically better if
AMCC can present the proposal at T1X1.5.” Id. at MC000015. Mr. Scholten said this was
“good news” and agreed to present Dr. Tsang’s proposal at the January 2001 T1X1 meeting. Id.
at MC000014.
Dr. Tsang first approached Dr. Gorshe on December 13, 2000. As with AMCC, Dr.
Tsang offered Dr. Gorshe’s company, PMC-Sierra, a royalty-free license to any patent issuing
from the Provisional Application. See Dkt. No. 257-5, at 230:21–231:6 (Dr. Tsang testifying in
deposition that “Because they . . . are co-author of the proposal, after checking with Rick Barry
[of Sycamore Networks], he agree Sycamore would not charge the co-author of these two
40
company licensing fee for using the technology.”). During a conference call on December 19,
2000, that included Dr. Tsang, Dr. Gorshe explained that the ANSI patent policy required that
any patented technology that is included in the standard would have to be available royalty free
or under reasonable and non-discriminatory terms. Dkt. No. 257-6, at MC000006; Dkt. No. 25717, at 78:13–79:22.
Dr. Gorshe’s notes from that conference call indicate that Dr. Tsang
represented that Sycamore Networks “won’t charge patent royalties to chip vendors who support
them up front” and “won’t [charge] big royalties in any case.” Dkt. No. 257-6, at MC000005.
The T1 Standards Committee applied ANSI’s patent policy, which in October 2000
provided as follows:
14.2 Statement from Patent Holder
Prior to approval of such a proposed American National Standard, ANSI
shall receive from the patent holder (in a form approved by ANSI) either:
assurance in the form of a general disclaimer to the effect that the patentee does
not hold and does not anticipate holding any invention whose use would be
required for compliance with the proposed American National Standard or
assurance that:
(1) A license will be made available without compensation to applicants
desiring to utilize the license for the purpose of implementing the
standard, or
(2) A license will be made available to applicants under reasonable terms and
conditions that are demonstrably free of any unfair discrimination.
Dkt. No. 257-15, at ATIS002562. ANSI has stated that its patent policy does not apply to
pending patent applications, Dkt. No. 182-12, at SYC0026714 (May 2003 ANSI document
elaborating on patent policy); Dkt. No. 182-13, at 6 (May 2004 ANSI document stating the
same), and the Vice President and General Counsel of ANSI testified to the same effect before
the Federal Trade Commission and the Department of Justice in April 2002, Dkt. No. 182-20, at
SYC0026698.
Dr. Tsang, Dr. Gorshe, and Mr. Scholten collaborated on a series of proposals regarding
their transparent encoding scheme, which were submitted to the working group on December 22,
41
2000, December 29, 2000, and January 8, 2001. As of December 26, 2000, Dr. Gorshe devised a
revision to Dr. Tsang’s encoding scheme that rearranged some of the fields so that the output
would be byte-aligned—that is, Dr. Gorshe’s revision ensured that information fields would be
self-contained within the same byte, rather than spanning across more than one byte. Dr.
Gorshe’s idea was included in the trio’s December 29 submission to the working group. The
encoding scheme, with Dr. Gorshe’s revisions, was adopted by the working group and was made
a part of the draft standard in January 2001.
On February 27, 2001, Sycamore Networks filed U.S. Patent Application No. 09/794,949
(“the ’949 application” or “the Non-Provisional Application”). That application claimed priority
to the December 5, 2000, Provisional Application. The ’949 application issued as the ’405
patent in October 2005. The specification of the Non-Provisional Application was significantly
expanded from the Provisional Application.
Meanwhile, in June 2001, the T1X1 subcommittee began working with the ITU-T Study
Group to create a final version of the standard. The ITU-T Study Group integrated the T1X1
encoding scheme into the ITU-T’s final adopted standard for GFP-T in the August 2005 ITU
G.7041 recommendation. Dr. Gorshe was involved in the development of the standard for the
ITU-T. Sycamore Networks was not a member of the ITU, and neither Sycamore Networks nor
Dr. Tsang was listed in connection with the draft ITU-T recommendation or the June 2001 ITUT meeting.
2. Discussion
The defendants have moved for summary judgment of invalidity of the ’405 patent under
35 U.S.C. §§ 102(a) and 102(f). Their claim of invalidity focuses on the use of the term
“transition indicator” in the ’405 patent.
Based on the language of the patent, the Court
42
construed “transition indicator” to mean “one or more bits that indicate the occurrence of a final
control code in an encoded information stream.” Dkt. No. 110, at 11.
The defendants argue that the Provisional Application does not contain a written
description of the claimed “transition indicator” and that, as a result, the ’405 patent is not
entitled to priority as of the December 5, 2000, filing date of the Provisional Application.
Instead, the defendants contend that the “transition indicator” was invented only when Dr.
Gorshe devised his byte-aligned revision to Dr. Tsang’s encoding scheme. 8 Accordingly, the
defendants argue that the asserted claims of the ’405 patent are invalid under 35 U.S.C. § 102(f)
because the patent fails to name Dr. Gorshe as one of the joint inventors. In addition, they
contend that the asserted claims are invalid under 35 U.S.C. § 102(a) because the submission
made to the working group by Dr. Gorshe, Dr. Tsang, and Mr. Scholten on December 29, 2000,
anticipates the claims of the ’405 patent if that patent is not entitled to the priority date of the
Provisional Application. Sycamore responds that the Provisional Application provides written
description support for the transition indicator, and that Dr. Gorshe was not a co-inventor of the
’405 patent because his revisions of Dr. Tsang’s coding scheme merely rearranged elements of
Dr. Tsang’s invention in a way that was not required by any limitation of the asserted claims.
The term “transition indicator” appears in three of the asserted claims. Independent claim
1 recites “generating a transition indicator based on the number of control characters for
indicating the occurrence of a final control code in the encoded information stream.” Claim 7,
which depends from claim 1, recites “based on the value of said transition indicator, determining
8
The defendants do not argue that the ’405 patent is invalid because Dr. Gorshe invented
the byte-aligned modification, presumably because the patent does not claim byte alignment as a
limitation. Rather, Dr. Gorshe claimed the byte-aligned encoding in U.S. Patent No. 7,127,653,
which issued in October 2006 but claims priority to a provisional application filed on July 5,
2001.
43
the locations of said location pointers, said control codes, and said data words in said encoded
information stream.” And independent claim 8 recites “encoding control characters to control
codes, generating a transition indicator and location pointers, and combining said control codes,
said transition indicator, said location points, and any data words present in said information
group to form said encoded information stream when one or more control characters are included
in said information group.” As the Court stated in its claim construction order, the ’405 patent’s
specification supports the description of the transition indicator as referring to the portion of the
encoded information stream that indicates the occurrence of the final control code in the stream.
Dkt. No. 110, at 7 (citing ’405 patent, col. 5, ll. 20–22; id., col. 5, ll. 38–39; id., col. 5, ll. 41–43;
id., col. 6, ll. 17–20).
For the ’949 application to claim priority to the Provisional Application, “the
specification of the provisional must contain a written description of the invention . . . in such
full, clear, concise, and exact terms, to enable an ordinarily skilled artisan to practice the
invention claimed in the non-provisional application.” New Railhead Mfg., L.L.C. v. Vermeer
Mfg. Co., 298 F.3d 1290, 1294 (Fed. Cir. 2002) (quoting 35 U.S.C. § 112 ¶ 1) (quotation marks
and citation omitted). In other words, “the written description of the provisional must adequately
support the claims of the non-provisional application.” Id. To satisfy the written description
requirement of 35 U.S.C. § 112, “the disclosure of the application relied upon [must] reasonably
convey[] to those skilled in the art that the inventor had possession of the claimed subject matter
as of the filing date.” Ariad Pharm., Inc. v. Eli Lilly & Co., 598 F.3d 1336, 1351 (Fed. Cir.
2010) (en banc). The written description requirement does “not demand any particular form of
disclosure, or that the specification recite the claimed invention in haec verba.” Id. at 1352
44
(citation omitted). However, “a description that merely renders the invention obvious does not
satisfy the requirement.” Id.
The question, therefore, is whether the Provisional Application conveys that the inventors
of the ’405 patent possessed the idea of what is disclosed in the Non-Provisional Application as
the “transition indicator,” i.e., one or more bits that indicate the occurrence of the final control
code in an encoded information stream.
The defendants argue that the Provisional Application’s description of the structure that
Sycamore contends became the transition indicator is fundamentally different from the
“transition indicator” that is described and claimed in the ’405 patent. The defendants point to
the following text in the Provisional Application:
However, if the rate optimizing encoder determines that control code words are
present, the control location field is generated. The first part of the control
location field includes a variable number of bits, each indicating the presence of a
corresponding code word.
After all of the input words have been received and
therefore all of the control code words have been detected, a zero is inserted in
this field to indicate the end of the first part of the variable field. For example, if
three control code words are detected, the first part of the control location field is
1110 and if seven control code words are detected, the field is 11111110.
Provisional Application at 15 (emphasis added). The defendants point out that the Provisional
Application’s “encoding scheme begins with a variable length field that is used to count control
codes, and the ‘0’ bit is used to end the counting. The scheme has no need for a bit that
‘indicate[s] the occurrence of a final control code.’ Instead, the rules of this scheme rely on
beginning the encoded stream with a variable number of ‘1’ bits that indicate how many control
codes are present when counted.” Dkt. No. 179, at 14. The defendants contend that the function
described in the Provisional Application “is indisputably different than the function of the
claimed transition indicator.” Dkt. No. 281, at 2. Specifically, the defendants argue that the “0”
bit in the Provisional Application indicates “stop counting”—that is, the previous “1” bit
45
indicates the occurrence of the last control code—whereas in the ’405 patent, the “0” bit itself
indicates the last control code.
The defendants’ argument distinguishing the Provisional Application’s encoding scheme
from the ’405 patent is strained, as the encoding scheme described in the Provisional Application
is identical to the one described in the specification of the ’405 patent:
The rate optimizing encoder 210 detects the control characters present in the
information group and generates the information for storing in the first and second
fields 414 and 418. When at least one control code is detected, the first field 414
includes a variable number of bits 4141, . . . 414w including a transition indicator
(preferably the last bit of the first field 414) for indicating that no more control
characters are present in the information group. For instance, the first field 414
may include bits 4141 . . . 414w-1 set to a first logical level for each time that a
control character is detected, to function as control code counters. The last bit
414w (the transition indicator) is set to a second logical level opposite to the first
logical level when there are no more control characters within the information
group, to indicate the end of the first field 414. . . . For example, if four control
characters are detected in the information group, the first field 414 includes five
bits set to “11110”, where the first “1” bit indicates that at least one control code
is present, the next three “1” bits each indicate the presence of control codes, and
the “0” bit or transition indicator 414w indicates the last control code within the
encoded information stream 400 . . . .
’405 patent, col. 5, ll. 15–39 (emphasis added).
The defendants’ characterization of the disclosure of the Provisional Application takes an
unjustifiably restrictive view of the Provisional Application’s disclosure.
The Provisional
Application makes clear that the first variable field of the “data/control sequence field” serves to
“indicate[] where the control code words are positioned in the data stream.”
Provisional
Application at 12–13. That variable field is a “set of bits for indicating which of the signal
blocks contains a control code.” Id. at 7; see also id. at 8 (“The position of the data and encoded
control code words corresponding to their positions indicated by the data/control sequence
field.”). Accordingly, “[t]he number of consecutive set bits before the first zero bit occurs are
counted to determine the number of control fields that are present.” Id. at 16–17. The “0” bit at
46
the end of the variable field is therefore necessary to determine which control code is the final
one, thereby indicating the occurrence of the final control code in the stream. Although the
language was revised, the scope of the disclosure is the same.
In sum, the evidence before the Court does not support the defendants’ argument that the
Provisional Application lacks written description support for the ’405 patent’s “transition
indicator.” For that reason, the evidence offered by the defendants fails to show that the ’405
patent is not entitled to the Provisional Application’s priority date. Accordingly, the defendants
have failed to show that the ’405 patent is anticipated by the December 29, 2000, submission to
the T1X1.5 working group. For similar reasons, the Court concludes that the defendants have
failed to show that Dr. Gorshe must be regarded as the inventor of the “transition indicator.” The
patent has therefore not been shown to be invalid under 35 U.S.C. § 102(f), for failure to name
Dr. Gorshe as an inventor. Accordingly, the defendants’ motion for summary judgment of
invalidity under sections 102(a) and 102(f) is DENIED.
B. Invalidity Under Section 101
The defendants have moved for summary judgment invalidating all the asserted claims of
the ’405 patent as patent ineligible under 35 U.S.C. § 101. The defendants contend that the
claims of the ’405 patent fail to satisfy the eligibility requirement of section 101 because they are
directed to an abstract idea and lack an inventive concept. Dkt. No. 180. Because the encoding
procedure claimed in the ’405 patent effectively reduces the bandwidth of certain
communications without sacrificing the content of the communicated information, Sycamore
argues that the invention solves a technical problem in the computer networking field in an
inventive manner, rather than simply claiming an abstract idea as the patentable invention. See
Amdocs (Israel) Ltd. v. Openet Telecom, Inc., 841 F.3d 1288, 1300 (Fed. Cir. 2016) (holding an
invention patentable if claims are “directed to an improvement in computer functionality” or
47
“solve a technology-based problem, even with conventional, generic components, combined in
an unconventional manner”). For that reason, Sycamore contends that the defendants are not
entitled to summary judgment of patent ineligibility with respect to the asserted claims of the
’405 patent.
As articulated by the Supreme Court, the analysis of patent eligibility under section 101
entails two steps. Step one requires the Court to “determine whether the claims at issue are
directed to a patent-ineligible concept” such as an abstract idea. Alice Corp. Pty. v. CLS Bank
Int’l, 134 S. Ct. 2347, 2355 (2014). If so, the Court proceeds to step two, which requires the
Court “to consider the elements of each claim both individually and ‘as an ordered combination’
to determine whether the additional elements ‘transform the nature of the claim’ into a patenteligible application.” Id. (quoting Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566
U.S. 66, 78–79 (2012)). In that step, the Court searches “for an ‘inventive concept’—i.e., an
element or combination of elements that is ‘sufficient to ensure that the patent in practice
amounts to significantly more than a patent upon the [ineligible concept] itself.’” Id. (alteration
in original) (quoting Mayo, 566 U.S. at 72–73).
In arguing that the ’405 patent is not directed to a patent-ineligible concept, Sycamore
points out that the patent identifies a problem that arose in the conversion of information from
one computer signal protocol to another. The patent, according to Sycamore, teaches a concrete
technical solution that reduces the number of bits required to transmit a particular
communication across those different protocols without losing any portion of the
communication. Moreover, even assuming the patent is regarded as being directed to an abstract
idea, such as merely encoding and decoding data, Sycamore argues that the evidence before the
48
Court shows that the patented method effects an improvement over the prior art and contains an
inventive concept.
The defendants begin by arguing that claim 1 of the ’405 patent does not expressly
require compression, i.e., a reduction in the number of bits without loss of content, and that in
light of dependent claim 4, which does require compression, claim 1 cannot be analyzed as if it
were directed to an encoding scheme that results in compression of the transported message. The
Court disagrees with the defendants’ characterization of claim 1. In describing the invention, the
specification of the ’405 patent states that as a consequence of the claimed coding protocol, “the
necessary bandwidth for transporting the information is reduced after the encoding is completed
without sacrificing any control information so that the information is transparently and
efficiently transported over the communications link.” ’405 patent, col. 2, ll. 36–40; see also id.,
col. 6, ll. 50–53 (“The coding scheme according to the embodiments of the present invention
allows information to be transparently transported across the network at a reduced data
rate . . . .”); id., Abstract (“[T]he necessary bandwidth for transporting the information is reduced
by using this encoded information stream without sacrificing any control information.”).
The ’405 patent is so clearly directed to a method for compression that it is difficult to
interpret claim 1 as serving any function other than compression. That is so even though
compression is not expressly required by claim 1 and even though dependent claim 4 adds the
requirement of compression, which would normally call for application of the doctrine of claim
differentiation. Indeed, the Court’s construction of the claim term “encoding control characters”
49
to mean “converting at least a portion of each present control character into a form that
comprises fewer bits” indicates that the Court construes claims 1 and 8 to require compression. 9
The defendants also argue that the claims of the ’405 patent “recite no computer” and “do
not call for any form of computer implementation of the claimed methods.” Dkt. No. 180, at 8.
For that reason, they argue that the claims cannot be defended on the ground that they address
computer-related functionality. That argument, however, is based on an unsupportable reading
of the claims. The defendants’ own proposed claim constructions repeatedly define particular
claim terms by reference to “bits” and “series of bits.”
See Dkt. No. 104 (e.g., defining
“information group” to mean “a series of bits comprising . . .”; “control characters” to mean “bits
in an information group . . .”; “location pointer” to mean “one or more bits . . .”; and “data
indicator” to mean “one or more bits . . .”). Those constructions effectively acknowledge that the
invention operates in a digital communication system that is, in all practical applications,
computer driven.
For purposes of the first step of the section 101 analysis, the Federal Circuit has
distinguished between claims that “are directed to an improvement to computer functionality
versus being directed to an abstract idea.” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335
(Fed. Cir. 2016); see Alice, 134 S. Ct. at 2358–59 (distinguishing the patent-ineligible claims at
issue in that case from claims that “purport to improve the functioning of the computer itself,” or
that “improved an existing technological process”); DDR Holdings, LLC v. Hotels.com, L.P.,
773 F.3d 1245, 1257 (Fed. Cir. 2014) (claims are not drawn to an abstract idea because “the
9
Even if claims 1 and 8 were invalidated as patent-ineligible based on the absence of an
express requirement of compression, the case against the defendants would not be affected in any
material respect, since claim 4 is asserted as well as claim 1, and claim 4 explicitly requires
compression. That claim recites: “The method according to claim 1, wherein the number of bits
in the encoded information stream is less than the number of bits in said information group.”
50
claimed solution is necessarily rooted in computer technology in order to overcome a problem
specifically arising in the realm of computer networks”).
The defendants argue that the claims in this case, unlike claims in other cases that have
survived challenge under section 101, do not recite any features directed to improving computer
functionality. That argument is unpersuasive. Compression of signals can be important to
computer-driven communication functions, as is the case with increasing the speed of searching,
reducing the need for memory, and increasing the efficiency of storage and retrieval of data. See
Enfish, 822 F.3d at 1337. In that regard, a compression protocol is not fundamentally different
from other computer-driven programs that improve the accuracy, speed, and security of
communications such as error correction programs, encryption protocols, and methods for
synchronizing data, all of which have been held to survive section 101 challenges without
serious doubts as to their patentability. See Synchronoss Techs., Inc. v. DropBox Inc., 226 F.
Supp. 1000, 1007–09 (N.D. Cal. 2016); MAZ Encryption Techs. LLC v. Blackberry Corp., C.A.
No. 13-304, 2016 WL 5661981, at *5–8 (D. Del. Sept. 29, 2016); France Telecom S.A. v.
Marvell Semiconductor Inc., 82 F. Supp. 3d 987, 1004 (N.D. Cal. 2015); TQP Dev., LLC v.
Intuit Inc., No. 2:12-cv-180, 2014 WL 651935, at *2–7 (E.D. Tex. Feb. 19, 2014).
Citing several Federal Circuit decisions, the defendants argue that in similar
circumstances, the Federal Circuit has held analogous claims patent-ineligible. None of the
cases cited by the defendants, however, compels the conclusion that the claims of the ’405 patent
are patent-ineligible under section 101.
The case on which the defendants most heavily rely is RecogniCorp, LLC v. Nintendo
Co., 855 F.3d 1322 (Fed. Cir. 2017). The patent claims in that case were very general. In
essence, the claims were drawn to a method and apparatus for building a composite facial image
51
by taking facial features on a display, assigning them image codes using a mathematical
operation, and reproducing the image on another display based on the codes. Id. at 1324. The
Federal Circuit upheld the district court’s determination that the claims were unpatentable. It
concluded that the claims were directed to an abstract idea—the mere operation of encoding and
decoding data, “an abstract concept long used to transmit information.” Id. at 1326. Citing
Digitech Image Technologies, LLC v. Electronics for Imaging, Inc., 758 F.3d 1344 (Fed. Cir.
2014), the court explained that a process that “starts with data, adds an algorithm, and ends with
a new form of data is directed to an abstract idea.” RecogniCorp, 855 F.3d at 1327.
The defendants say that is this case. While it is true that the invention in this case
involves the manipulation of data, the point of the invention is not simply the transmission of
data in coded form, but the conversion of the data into a form that makes the communication of
the data more efficient. The specific function of the recited encoding scheme is to add efficiency
to the process in a particular manner. As such, the recited protocol, even though expressed (as
are all computer operations) as an algorithm, is a concrete technical contribution and not simply
the embodiment of an abstract idea.
A recent decision from this court is on point and illustrates the distinction nicely. In that
case, Realtime Data, LLC v. Carbonite, Inc., Case No. 6:17-cv-121, 2017 WL 4693969 (E.D.
Tex. Sept. 20, 2017), the court held a patent on a system for compressing data to be patent
eligible. The court distinguished RecogniCorp on the ground that the invention was “not simply
encoding and decoding,” but made a technical improvement in the process of data compression,
resulting in real-time or pseudo-real-time compression. Id. at *5.
Essentially the same analysis applies to the other two cases on which the defendants
principally rely, Synopsys, Inc. v. Mentor Graphics Corp., 839 F.3d 1138 (Fed. Cir. 2016), and
52
Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307 (Fed. Cir. 2016). The Synopsys
court described the claims at issue as “drawn to the abstract idea of translating a functional
description of a logic circuit into a hardware component description of the logic circuit.” 839
F.3d at 1150. That translation, the court explained, is a mental process. Id. Moreover, the court
concluded that the asserted claims failed step two of the section 101 analysis because they lacked
an inventive concept. As the court put it, the claim did not involve a “technical solution [that]
overcame defects in prior art embodiments.” In addition, as the court noted, the claims added
nothing inventive that took the asserted claims “beyond their abstract idea.” Id. at 1152.
The Symantec case involved claims directed to methods of screening e-mails that the
court characterized as “receiving e-mail (and other data file) identifiers, characterizing e-mail
based on the identifiers, and communicating the characterization—in other words, filtering
files/e-mail.” 833 F.3d at 1313. That function, the court explained, was an abstract idea, akin to
an individual discarding certain mail from unwanted sources based on the relevant characteristics
of the letters. Id. at 1314. A recent decision by the author of Symantec summarized the holding
of that case succinctly: “We determined in [Symantec] that ‘[b]y itself, virus screening is wellknown and constitutes an abstract idea.’ We also found that performing the virus scan on an
intermediary computer—so as to ensure that files are scanned before they can reach a user’s
computer—is a ‘perfectly conventional’ approach and is also abstract.” Finjan, Inc. v. Blue Coat
Sys., Inc., 879 F.3d 1299, 1304 (Fed. Cir. 2018). In Finjan, however, the court held that the
claimed “behavior-based” approach to virus scanning constituted an improvement to computer
functionality and was patent-eligible subject matter. Id. at 1304–05; see also id. at 1305 (“Here,
the claims recite more than a mere result. Instead, they recite specific steps . . . that accomplish
the desired result.”).
53
The invention at issue in this case, unlike the inventions in Synopsys and Symantec,
proposed a specific technical solution to a specific problem in telecommunications, i.e., creating
a method for compressing data in a transparent manner. Unlike the invention in Symantec, the
invention in this case has no direct analog outside the computer-driven communications field.
And like Finjan and unlike the invention in Synopsys, the invention in this case was not simply
to substitute one description of a circuit component for another, but entailed a technical solution
for a problem that resulted in a physical reduction in the bandwidth necessary to send particular
communications.
Even if the asserted claims of the ’405 patent are regarded as directed to an abstract idea,
such as compressing data to facilitate network communications, the defendants must establish
that the claims fail step two of the section 101 analysis. That step provides that even when
claims are deemed to be directed to an abstract idea, they are not patent ineligible if they embody
an inventive concept by reciting a “specific, discrete implementation of the abstract idea.” See
BASCOM Global Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1350 (Fed. Cir.
2016).
The claimed invention recites a specific method of coding to effect compression,
including the use of specific field types, including a data indicator, a transition indicator, and a
location pointer, which provide information regarding the presence and location of control
characters. In their summary judgment motion, the defendants have not shown that the claims
lack a sufficiently specific inventive concept and thus do no more than “simply instruct the
practitioner to implement the abstract idea” on generic components. Alice, 134 S. Ct. at 2359.
In sum, the Court holds that, at a minimum, it is not clear on the summary judgment
record before the Court that the asserted claims of the ’405 patent are directed to an abstract idea
and do not embody an inventive concept, within the meaning of section 101. See Berkheimer v.
54
HP Inc., No. 2017-1437, 2018 WL 774096, at *6–8 (Fed. Cir. Feb. 8, 2018). The motion for
summary judgment invalidating all of the asserted claims as patent-ineligible is therefore
DENIED.
C. Invalidity Under Equitable Estoppel, Fraud, Patent Misuse, Laches, Unclean
Hands, and Waiver
Sycamore has moved for summary judgment on the defendants’ affirmative defenses of
equitable estoppel, fraud, patent misuse, laches, unclean hands, and waiver. Dkt. No. 183. In
opposition, the defendants indicate that they do not intend to pursue their defenses of fraud or
unclean hands. Dkt. No. 256, at 2 n.2. With respect to the defendants’ laches defense, the
parties agree that it is a defense only as to claims for equitable relief, and Sycamore has not
moved for summary judgment on that ground. See Dkt. No. 291, at 5 n.10 (“Sycamore disputes
that Defendants would have a laches defense if Sycamore were to later seek equitable relief for
Defendants’ infringement. But the Court need not decide that issue now.” (citation omitted));
see also Dkt. No. 256, at 15.
The Court holds that the defendants have not presented a
cognizable theory of patent misuse.
The Court concludes, however, that disputes of fact
preclude summary judgment as to waiver and equitable estoppel for some, but not all, of the
defendants’ theories. 10 Accordingly, Sycamore’s motion is GRANTED as to fraud, unclean
hands, and patent misuse, DENIED as to laches and waiver, and GRANTED IN PART and
DENIED IN PART as to equitable estoppel.
The defendants’ equitable estoppel, patent misuse, and waiver defenses are predicated
primarily on Dr. Tsang’s conduct in connection with the T1X1.5 working group. They argue
that Sycamore Networks had a duty under the T1 Standards Committee’s patent policy to
disclose Dr. Tsang’s provisional application when he proposed its use to the working group, and
10
CenturyLink does not assert the defense of equitable estoppel.
55
that his failure to disclose renders the patent unenforceable. In addition, the defendants argue
that even absent a duty to disclose, Dr. Tsang’s conduct in the working group was so inequitable
and anticompetitive as to bar the recovery of royalties in this case.
A participant in a standard-setting organization may be equitably estopped or may waive
its right to assert infringement claims against products that practice the standard.
Hynix
Semiconductor Inc. v. Rambus Inc., 645 F.3d 1336, 1348 (Fed. Cir. 2011); see also Qualcomm
Inc. v. Broadcom Corp., 548 F.3d 1004, 1020–24 (Fed. Cir. 2008). To establish implied waiver,
the defendants must show that the patentee’s “conduct was so inconsistent with an intent to
enforce its rights as to induce a reasonable belief that such right has been relinquished.” Hynix,
645 F.3d at 1348 (quoting Qualcomm, 548 F.3d at 1020). And to establish equitable estoppel,
the defendants must show that the patentee, “through misleading conduct, led the alleged
infringer to reasonably infer that the patentee does not intend to enforce its patent against the
alleged infringer.” Id. (quoting A.C. Aukerman Co. v. R.L. Chaides Constr. Co., 960 F.2d 1020,
1028 (Fed. Cir. 1992) (en banc)). Such misleading conduct can include “specific statements,
action, inaction, or silence where there was an obligation to speak.” Id. (quoting Aukerman, 960
F.2d at 1028).
The defendants have raised triable disputes of fact as to this theory of waiver and
equitable estoppel. First, there is a dispute of fact as to the scope of the ANSI patent policy.
Both Sycamore and the defendants contend that the language of the ANSI patent policy
unambiguously supports its own interpretation of the policy. Dkt. No. 183, at 8 (Sycamore: “The
written policy is clear on its face: only disclosure of ‘patented items’ is required. Because the
policy is unambiguous . . . .”); Dkt. No. 256, at 10 (Defendants: “Defendants agree with
Sycamore IP that the Committee T1 patent policy is unambiguous. . . . The plain language of the
56
Committee T1 policy required the disclosure of Sycamore Networks’ patent application.”). The
Court finds that the language of the patent policy is not unambiguous.
On the one hand, the policy is limited to a “patent holder” and a “patentee”: “ANSI shall
receive from the patent holder . . . assurance . . . that the patentee does not hold and does not
anticipate holding any invention whose use would be required for compliance with” the proposed
standard. Dkt. No. 257-15, at ATIS002562 (emphasis added). These terms generally apply only
to parties who have been granted a patent or have acquired ownership of a patent. See 35 U.S.C.
§ 100(d) (defining “patentee” to include “not only the patentee to whom the patent was issued
but also the successors in title to the patentee”). Dr. Tsang and Sycamore Networks, having only
filed a provisional application at the time the presentation was made to the working group, would
not be considered “patentees” under the statutory definition of that term.
On the other hand, the ANSI patent policy requires an assurance that the patentee “does
not hold and does not anticipate holding any invention whose use would be required for
compliance with the proposed” standard. Dkt. No. 257-15, at ATIS002562 (emphasis added).
The defendants argue that Dr. Tsang anticipated holding a patent on his encoding scheme, as
evidenced by his provisional and subsequent non-provisional patent applications. According to
the defendants, Dr. Tsang therefore had a duty under the terms of the patent policy to disclose
that he anticipated holding a patent on the invention at issue. Although the policy does not use
the term “patent application,” the use of the term “anticipates holding” suggests that the policy is
not limited to patents that the participants presently hold, and could include pending or
provisional applications. Sycamore’s suggested reading of the phrase “anticipate holding”—to
mean that the policy imposes a duty on patentees “who anticipate that a standard might
57
encompass their patent,” Dkt. No. 291, at 3—contorts the phrase “anticipates holding,” which
appears to refer to a person who does not presently hold a patent.
Given the tension between those two readings of the text, the Court turns to extrinsic
evidence, which is not conclusive in support of either interpretation.
Sycamore presents
evidence from ANSI in 2002, 2003, and 2004, including ANSI documents and testimony from
its General Counsel, to support its contention that ANSI’s patent policy did not apply to pending
patent applications. Dkt. No. 182-12, at SYC0026714; Dkt. No. 182-13, at 6; Dkt. No. 182-20,
at SYC0026698. For their part, the defendants offer testimony from two participants in the
T1X1.5 working group—Dr. Gorshe and Deborah Brungard, the chair of the T1X1.5 working
group in 2000—that they understood that patent applications were covered by the policy. Dkt.
No. 256-3, at 244:13–246:17; Dkt. No. 257-17, at 260:20–261:14. Given the existence of this
contested material fact, the Court is not prepared to conclude, for purposes of summary
judgment, that Dr. Tsang and Sycamore Networks did not have a duty to disclose the Provisional
Application.
Even if the ANSI patent policy did not impose a duty to disclose, other conduct by Dr.
Tsang could give rise to a defense of waiver. At the least, Dr. Tsang’s representations to Dr.
Gorshe and members of the T1X1.5 working group that Sycamore Networks would not charge
royalties to chip vendors who supported integrating Dr. Tsang’s encoding scheme into the
standard and that there would not be “big royalties in any case” raise triable questions of fact of
the existence of express waiver. Dkt. No. 257-6, at MC000006. As Sycamore now seeks
royalties on products made by the same chip vendors that supported Dr. Tsang’s proposed
encoding scheme, such conduct could be sufficient to satisfy the defendants’ burden to show
conduct “so inconsistent with an intent to enforce [Sycamore’s] rights as to induce a reasonable
58
belief that such right has been relinquished.” Hynix, 645 F.3d at 13489; see also Mars, Inc. v.
TruRx LLC, No. 6:13-cv-526-RWS-KNM, 2016 WL 4055676, at *2 (E.D. Tex. Apr. 29, 2016)
(“[N]othing in the [Federal Circuit’s opinion in Qualcomm] indicated that implied waiver can
only be established if a patentee is under a duty to disclose information to a standard setting
organization . . . .”).
Finally, AT&T and Level 3 raise another theory of equitable estoppel: that Sycamore
Networks, in its business dealings with each company, failed to disclose that it had a patent that
might cover the accused standards. Level 3 has been a customer of Sycamore Networks since
2005; a predecessor of AT&T installed Sycamore Networks equipment in its network; and
Sycamore Networks submitted bids in response to AT&T’s requests for information regarding
network equipment. Sycamore notes, however, that the network equipment in question did not
use any of the accused mappings.
This theory of equitable estoppel is unsuccessful. Equitable estoppel applies where a
patent holder engages in misleading conduct that leads the alleged infringer “to reasonably infer
that the patentee does not intend to enforce its patent against the alleged infringer.” Hynix, 645
F.3d at 1348. “[S]ilence alone does not generate an estoppel,” and the alleged infringer “‘must
show that, in fact, it substantially relied on the misleading conduct of the patentee in connection
with taking some action.’” Aspex Eyewear Inc. v. Clariti Eyewear, Inc., 605 F.3d 1305, 1311
(Fed. Cir. 2010) (quoting Aukerman, 960 F.2d at 1042); see also Aukerman, 960 F.2d at 1043–
44 (“[S]ilence alone will not create an estoppel unless there was a clear duty to speak or
somehow the patentee’s continued silence reenforces the defendant’s inference from the
plaintiff’s known acquiescence that the defendant will be unmolested.” (citation omitted)); Mars,
Inc. v. TruRx LLC, 2016 WL 4034789, at *5. Here, the misleading conduct alleged by AT&T or
59
Level 3 consists only of Sycamore Networks’ failure to volunteer information about a patent it
held while it was conducting everyday business transactions unrelated to the patent. Under these
circumstances, Sycamore Networks’ silence cannot give rise to a viable defense of equitable
estoppel.
Sycamore’s motion is therefore DENIED as to waiver, and is GRANTED IN PART and
DENIED IN PART as to equitable estoppel.
The Court reaches a different conclusion, however, with respect to the defendants’ theory
of patent misuse. The doctrine of patent misuse arose “from the desire to restrain practices that
did not in themselves violate any law, but that drew anticompetitive strength from the patent
right, and thus was deemed to be contrary to public policy.” Qualcomm, 548 F.3d at 1025
(quoting B. Braun Med., Inc. v. Abbott Labs., 124 F.3d 1419, 1427 (Fed. Cir. 1997)). The
doctrine was construed narrowly in Princo Corp. v. International Trade Commission, where the
en banc Federal Circuit “emphasized that the defense of patent misuse is not available to a
presumptive infringer simply because a patentee engages in some kind of wrongful commercial
conduct, even conduct that may have anticompetitive effects.” 616 F.3d 1318, 1328 (Fed. Cir.
2010) (en banc) (citing C.R. Bard, Inc. v. M3 Sys., Inc., 157 F.3d 1340, 1373 (Fed. Cir. 1998));
see also, e.g., Soverain Software LLC v. J.C. Penney Corp., 899 F. Supp. 2d 574, 582 (E.D. Tex.
2012), rev’d on other grounds sub nom. Soverain Software LLC v. Victoria’s Secret Direct
Brand Mgmt., LLC, 778 F.3d 1311 (Fed. Cir. 2015). As explained in Princo, “the key inquiry
under the patent misuse doctrine is whether . . . the patentee has impermissibly broadened the
physical or temporal scope of the patent grant and has done so in a manner that has
anticompetitive effects. Where the patentee has not leveraged its patent beyond the scope of
rights granted by the Patent Act, misuse has not been found.” 616 F.3d at 1328.
60
Here, the defendants have not set forth a theory of patent misuse that is consistent with
the governing case law. The defendants’ asserted defense of patent misuse is based solely on Dr.
Tsang’s purported violation of his duty to disclose the provisional patent to the T1X1.5 working
group. Dkt. No. 256, at 12 (citing Qualcomm, 548 F.3d at 1022). Even assuming that Dr. Tsang
had such a duty and a violation of that duty had anticompetitive effects, the evidence would be
insufficient to support a defense of patent misuse, as there would be an absence of any factual
allegation that Sycamore “impermissibly broadened the physical or temporal scope of the patent
grant,” particularly given the fact that the ’405 patent had not issued at the time of the allegedly
anticompetitive conduct. The Federal Circuit’s 2008 opinion in Qualcomm only discussed
patent misuse as an analogy in defining the scope of the defense of waiver, see 548 F.3d at 1024–
27; the Federal Circuit’s 2010 en banc decision in Princo expressly adopted the standard for
patent misuse set forth above, see 616 F.3d at 1329, and that decision governs here.
Accordingly, the Court holds that the defendants have not identified a viable theory of patent
misuse, and Sycamore’s motion for summary judgment is therefore GRANTED as to patent
misuse.
D. Unenforceability for Inequitable Conduct
Sycamore has moved for summary judgment of no inequitable conduct, targeting the
defendants’ affirmative defense that all the claims of the ’405 patent are unenforceable because
of inequitable conduct by Sycamore. In particular, the defendants contend that Sycamore’s
claim of small entity status—and its payment of reduced fees to the United States Patent and
Trademark Office (“PTO”) based on its asserted entitlement to small entity status—was
unjustified and constituted inequitable conduct as a matter of law. Dkt. No. 186; Dkt. No. 260.
The Federal Circuit has ruled on several occasions that, in the right circumstances, the
improper invocation of small entity status by an inventor not entitled to that status can constitute
61
inequitable conduct sufficient to render the inventor’s patent unenforceable. See Nilssen v.
Osram Sylvania, Inc., 504 F.3d 1223 (Fed. Cir. 2007); Ulead Sys., Inc. v. Lex Computer &
Mgmt. Corp., 351 F.3d 1139 (Fed. Cir. 2003); DH Tech., Inc. v. Synergystek Int’l, Inc., 154 F.3d
1333 (Fed. Cir. 1998). In the Nilssen case, the court noted that the district court had found clear
and convincing evidence of the patent owner’s “obvious intent to mislead.” 504 F.3d at 1231. In
both Ulead and DH Technology, the Federal Circuit reversed trial courts that had entered
judgments of inequitable conduct based on the improper payment of small entity fees and held
that further proceedings were required in order to determine whether the patentee had acted with
intent to deceive the PTO. It is clear that in this case similar evidence would be required before
the Court could find inequitable conduct based on the claim of entitlement to small entity status.
At the motions hearing, the Court ruled that the defendants have adduced sufficient
evidence about the activities of Sycamore’s general counsel and managing partner, Dr. Kai Zhu,
from which a finder of fact could conclude that Sycamore acted with the level of intent necessary
to constitute inequitable conduct under the governing standards. See Therasense, Inc. v. Becton,
Dickinson & Co., 649 F.3d 1276, 1290–91 (Fed. Cir. 2011) (en banc). That evidence includes
the fact that Dr. Zhu is a patent attorney who is familiar with patent prosecution, and that in light
of Sycamore’s financial situation, he had a significant incentive to avoid paying more than the
small entity fee. While the evidence of intent to deceive is not especially strong, such evidence
is often difficult to develop except from the person who is accused of deceitful intent. An issue
such as this one therefore is particularly appropriate for resolution after a trial. Accordingly, the
Court therefore DENIES the motion to hold, on summary judgment, that the ’405 patent is not
unenforceable for inequitable conduct.
62
E. Exhaustion
The Court will not at this time address Defendants’ Motion for Summary Judgment that
Sycamore’s Rights in the ’405 Patent Are Exhausted, Dkt. No. 178, which was filed only on
behalf of AT&T and CenturyLink.
CONCLUSION
This order resolves all of Sycamore’s claims against each of the defendants. However,
Level 3, AT&T, and CenturyLink have each raised a number of counterclaims, including for
invalidity and unenforceability, that are not fully resolved by this order.
Therefore, it is
ORDERED that the parties shall promptly meet and confer to determine whether the trial set for
April 23, 2018, is necessary. If trial in the Level 3 case is not necessary, the Court will conduct
the trial in the AT&T case (if necessary) on that date or, if not necessary, the CenturyLink case
(if necessary).
By 3 p.m. Eastern Time on February 23, 2018, Sycamore and each of the remaining sets
of defendants are directed to advise the Court whether trial will be necessary at this time in any
of the three remaining cases. If additional motions are contemplated, the parties shall so advise
the Court and propose a briefing schedule.
IT IS SO ORDERED.
SIGNED this 16th day of February, 2018.
_____________________________
WILLIAM C. BRYSON
UNITED STATES CIRCUIT JUDGE
63