4:18-cv-03432
Uniloc 2017 LLC v. Box Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Uniloc 2017 LLC and Uniloc Licensing USA LLC (Delaware)
- Defendant: Box, Inc. (Delaware)
- Plaintiff’s Counsel: Prince Lobel Tye LLP
 
- Case Identification: Uniloc 2017 LLC et al v. Box, Inc., 3:18-cv-03432, N.D. Cal., Filed 11/01/2018
- Venue Allegations: Venue is alleged based on Defendant’s principal place of business being located in the Northern District of California, as well as its continuous and systematic business contacts within the district.
- Core Dispute: Plaintiff alleges that Defendant’s cloud-based content management and file-sharing software infringes a patent related to methods for improving file system performance by replacing textual file and directory path substrings with numeric tokens.
- Technical Context: The technology concerns foundational computer file system operations, specifically optimizing the process of resolving and validating file pathnames to enhance speed and overcome limitations of legacy systems.
- Key Procedural History: The operative complaint is a Second Amended Complaint. Plaintiff alleges that Defendant has been on notice of the patent-in-suit at least since the service of the original complaint in the case, which may form the basis for a willfulness claim.
Case Timeline
| Date | Event | 
|---|---|
| 2000-01-04 | '345 Patent Priority Date | 
| 2002-10-22 | '345 Patent Issue Date | 
| 2018-11-01 | Second Amended Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,470,345 - "REPLACEMENT OF SUBSTRINGS IN FILE/DIRECTORY PATHNAMES WITH NUMERIC TOKENS"
- Patent Identification: U.S. Patent No. 6,470,345, "REPLACEMENT OF SUBSTRINGS IN FILE/DIRECTORY PATHNAMES WITH NUMERIC TOKENS," issued October 22, 2002.
The Invention Explained
- Problem Addressed: The patent’s background section describes performance and compatibility problems in computer file systems, particularly in networked or client-server environments. These problems include the inefficiency of repeatedly comparing lengthy text-based path strings for validation and the limitations imposed by certain native file systems on name length and character sets (e.g., "8.3" format) (’345 Patent, col. 1:46-51; col. 2:1-11).
- The Patented Solution: The invention proposes a method and system to improve performance and flexibility by abstracting the file path. It works by parsing a full pathname (e.g., \directory\file.ext) into its component substrings ("directory", "file.ext"), looking up or creating a unique numeric token for each substring in a "string dictionary," and then using the resulting list of efficient numeric tokens for subsequent file operations like validation and comparison (’345 Patent, Abstract; col. 2:26-41). Figure 8B illustrates this concept, showing a traditional file structure (8A) transformed into one using tokens (t1, t2, t3) that point to a separate string dictionary (98) (’345 Patent, Fig. 8B).
- Technical Importance: This token-based approach offers a substantial improvement in performance by replacing slow, character-by-character string comparisons with faster arithmetic comparisons of numeric tokens, and it reduces storage requirements by storing each unique path substring only once in the dictionary (’345 Patent, col. 2:32-41).
Key Claims at a Glance
- The complaint asserts independent claims 1, 9, 17, 25, 33, and 41, and reserves the right to assert other claims (Compl. ¶13). The lead asserted method claim, Claim 1, recites the following essential elements:- reading a name string to be converted into a list of tokens;
- canonicalizing a current working directory and the name string to form a pathname containing a plurality of substrings;
- parsing the pathname and replacing each substring with an associated token; and
- validating the parsed pathname containing the list of tokens.
 
III. The Accused Instrumentality
Product Identification
- The "Box content management and file sharing software, including Business, Individual and Enterprise Editions" (the "Accused Products") (Compl. ¶12).
Functionality and Market Context
- The complaint alleges that the Accused Products are cloud-based software that infringes by performing the core functions of the patented method (Compl. ¶12). Specifically, the complaint alleges the products "replace substrings in file and directory pathnames with tokens" by executing a process of reading a name string, canonicalizing it to a full pathname, parsing the pathname, replacing substrings with tokens, and validating the result (Compl. ¶12). No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint references a claim chart (Exhibit B) that was not provided with the filing (Compl. ¶13). The narrative infringement theory presented in the complaint directly tracks the language of the asserted claims.
The complaint alleges that the Accused Products directly infringe the ’345 Patent by implementing the claimed method. The infringement allegations are framed as a four-step process: (1) reading a name string to be converted into a list of tokens; (2) canonicalizing a current working directory and the name string to form a full pathname with substrings; (3) parsing that pathname and replacing each substring with an associated token; and (4) validating the resulting parsed pathname that contains the list of tokens (Compl. ¶12). The complaint further alleges that should the Accused Products not be found to literally infringe, they infringe under the doctrine of equivalents by performing substantially the same function, in substantially the same way, to achieve substantially the same result (Compl. ¶14).
- Identified Points of Contention:- Scope Questions: The infringement allegations in the complaint are stated in conclusory terms that mirror the language of Claim 1 (Compl. ¶12). A primary point of contention may be whether the architecture of a modern cloud storage platform like Box, which manages file objects and permissions in a distributed environment, can be fairly characterized as performing the specific sequence of steps recited in the claims, which appear to contemplate a more traditional client-server or local file system structure.
- Technical Questions: The complaint does not provide technical evidence detailing how the Accused Products allegedly perform the claimed steps. A key technical question will be whether the internal identifiers (e.g., object IDs, database keys) used by the Box platform for file management constitute "tokens" that "replace... substring[s]" of a "pathname" in the manner required by the claims, or if the underlying technical mechanism is fundamentally different from the "string dictionary" model described in the patent.
 
V. Key Claim Terms for Construction
- The Term: "token" 
- Context and Importance: This term is the central inventive concept. Its definition will be critical to the infringement analysis. The dispute will likely focus on whether the term is limited to the specific "numeric tokens" described in the patent's embodiments or can encompass any unique identifier used in a file system. Practitioners may focus on this term because its scope will determine whether the patent can read on modern cloud architectures that may not use a "string dictionary" but do use other forms of unique identifiers for file objects. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: Claim 1 itself refers more generally to "an associated token," without an explicit numeric limitation, which may support a construction covering any unique identifier mapped to a path component (’345 Patent, col. 16:58-59).
- Evidence for a Narrower Interpretation: The patent’s Abstract, Summary, and detailed description consistently refer to the invention in terms of "numeric tokens" and a "string dictionary" where substrings are mapped to numeric values (’345 Patent, Abstract; col. 2:29; Fig. 9). This may support an argument that the term "token" should be limited to this specific implementation.
 
- The Term: "canonicalizing a current working directory and the name string" 
- Context and Importance: This is the first operative step of the claimed method. Its construction is important for determining what activity constitutes the start of the infringing process. The dispute will likely concern whether the path resolution process in the accused cloud platform is equivalent to the patent's description of combining a "current working directory" with a partial name string. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The specification introduces the term by noting it is "sometimes referred to as 'canonicalization'," suggesting it refers to a generally understood process of creating a complete, unique file path specification (’345 Patent, col. 1:14-16).
- Evidence for a Narrower Interpretation: The patent provides a specific flowchart (Figure 5) detailing the steps of this process, including explicit reliance on a "current working directory" (CWD) (’345 Patent, Fig. 5; col. 11:3-7). This could support a narrower construction requiring a process analogous to the CWD-based model, which may differ from how paths are resolved in a distributed cloud environment.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement under 35 U.S.C. § 271(b), asserting that Box intentionally encourages infringement by providing customers with "training videos, demonstrations, brochures, installation and/or user guides" that instruct on the use of the accused functionality (Compl. ¶15). It also pleads contributory infringement under § 271(c), alleging the Accused Products are especially made for infringement and are not a staple article of commerce (Compl. ¶16).
- Willful Infringement: The complaint alleges willfulness based on Defendant’s knowledge of the ’345 Patent "since, at the latest, the service upon Box of the original complaint in this case" (Compl. ¶17). The allegation is based on post-suit conduct, asserting that Box "has refused to discontinue its infringing acts" despite having notice of the patent (Compl. ¶17).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of technical mapping: does the operational logic of the accused modern cloud storage platform—which manages data as objects with unique identifiers—perform the specific sequence of "canonicalizing", "parsing", "replacing" substrings with "tokens", and "validating" that is described in the ’345 patent, an invention seemingly grounded in the architecture of older, path-centric file systems?
- The outcome of the case may depend on claim construction, particularly of the term "token". A central question for the court will be whether the term is limited to the "numeric tokens" generated from a "string dictionary" as detailed in the patent’s embodiments, or if it can be construed more broadly to cover the types of unique object identifiers potentially used in the accused cloud system.
- A key evidentiary question will be what specific proof Plaintiff can adduce to connect its infringement allegations to the actual functionality of the accused software. Given that the complaint’s technical allegations are conclusory and track the claim language, the case will turn on whether discovery yields evidence of a direct operational correspondence.