4:19-cv-01949
Uniloc 2017 LLC v. Apple Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Uniloc 2017 LLC (Delaware)
- Defendant: Apple Inc. (California)
- Plaintiff’s Counsel: Prince Lobel Tye LLP; Nelson Bumgardner Albritton P.C.
- Case Identification: 4:19-cv-01949, W.D. Tex., 11/17/2018
- Venue Allegations: Venue is alleged based on Defendant Apple Inc. having regular and established places of business in the district, including corporate offices and Apple Stores where accused products are used, offered for sale, and sold.
- Core Dispute: Plaintiff alleges that Defendant’s servers supporting the Apple FaceTime service infringe a patent related to network-based policy enforcement for features in IP telephony and multimedia networks.
- Technical Context: The technology concerns methods for a network operator to control which services (e.g., call waiting, caller ID) an end-user device can access over a packet-based network, preventing unauthorized use of paid features.
- Key Procedural History: A post-grant proceeding is highly relevant. U.S. Patent No. 8,539,552 was the subject of an Inter Partes Review (IPR2018-00884). The IPR resulted in the cancellation of claims 1-17 and 23-25. Claims 18-22, which are also asserted in this complaint, were found patentable and survive. The litigation, therefore, can only proceed on these surviving claims.
Case Timeline
| Date | Event |
|---|---|
| 2003-09-25 | '552 Patent Priority Date |
| 2013-09-17 | '552 Patent Issue Date |
| 2018-04-10 | Inter Partes Review IPR2018-00884 Filed |
| 2018-11-17 | Complaint Filing Date |
| 2022-01-24 | '552 Patent IPR Certificate Issued (Cancelling claims 1-17, 23-25) |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,539,552 - "SYSTEM AND METHOD FOR NETWORK BASED POLICY ENFORCEMENT OF INTELLIGENT-CLIENT FEATURES," Issued Sep. 17, 2013
The Invention Explained
- Problem Addressed: The patent describes a problem where "intelligent end-user clients" (e.g., advanced IP phones or software) can implement telephony services like call waiting or multi-party calling on their own, without involving the network provider. This allows users to potentially bypass service agreements and use features for which they have not paid, undermining the network provider's ability to generate revenue. (’552 Patent, col. 1:46-54).
- The Patented Solution: The invention proposes a "network policy enforcement point," such as a firewall or server controlled by the network operator, that sits in the communication path. (’552 Patent, col. 4:30-36). This entity intercepts signaling messages (e.g., a call setup request), checks a user profile to see what services the user is authorized to use, and then "filters" the message—either allowing it, blocking it, or modifying it—to enforce the network's policies before the message reaches its destination. (’552 Patent, col. 2:5-14; Fig. 3).
- Technical Importance: This approach allows network operators to retain control over service delivery and billing in an IP-based environment, even when end-user devices are increasingly sophisticated and capable of performing functions that were traditionally handled by the network. (’552 Patent, col. 1:46-54).
Key Claims at a Glance
- The complaint originally asserted claims 1, 5-9, 18-21, and 23. (’552 Patent, IPR Certificate, p. 2; Compl. ¶15). Following an Inter Partes Review, only claims 18-22 survive.
- Independent Claim 18 requires:
- A network entity intercepting a message for establishing an IP telephony call, where the message is configured according to a protocol.
- The network entity requesting a user profile for a user associated with the message, where the profile specifies authorized services.
- The network entity determining from the profile if the user is authorized for the requested IP telephone services (which must include at least two of: caller-ID, call waiting, multi-way calling, multi-line service, and codec specification).
- The network entity filtering the message based on this authorization determination.
- The complaint alleges infringement of dependent claims 19-21, which further specify the user as the sender or recipient and identify the message as a Session Initiation Protocol (SIP) message. (’552 Patent, col. 21:55-col. 22:2).
III. The Accused Instrumentality
Product Identification
- The accused instrumentalities are Apple’s “FaceTime Server(s)” that establish and manage communications for the FaceTime service. (Compl. ¶8).
Functionality and Market Context
- The complaint alleges that FaceTime Servers are computer network servers that establish communications between FaceTime-enabled devices (e.g., iPhones, iPads, Macs) over packet-based networks like WiFi and cellular. (Compl. ¶¶8-9).
- According to the complaint, when a FaceTime-enabled device connects to a network, it registers with a FaceTime Server. (Compl. ¶10). The server stores identifiers (e.g., phone number, Apple ID) and uses them to authenticate users. (Compl. ¶10).
- To initiate a call, a user's device sends a query to a FaceTime Server, which then determines if the intended recipient is a "registered authorized FaceTime user." (Compl. ¶¶12-13). If authorized, the server "sets up the FaceTime connection" between the sender and the target. (Compl. ¶13).
- No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint was filed prior to the IPR that cancelled many of the original asserted claims. The following analysis maps the complaint’s general allegations to the elements of surviving independent claim 18.
'552 Patent Infringement Allegations
| Claim Element (from Independent Claim 18) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| a network entity intercepting a message associated with establishing an Internet Protocol (IP) telephony call between a sender of the message and an intended recipient of the message, the message configured according to a protocol; | FaceTime Servers receive encrypted queries from user devices to indicate a FaceTime session is desired over packet-based networks like WiFi, 3G, and LTE. | ¶¶9, 12, 14 | col. 21:37-41 |
| the network entity requesting a user profile of a user associated with the message, wherein the user profile specifies which of a plurality of services the user is authorized to use, including IP telephony services; | The FaceTime Server receives the query and determines if the intended target is a "registered authorized FaceTime user" based on stored caller IDs used for authentication. | ¶¶10, 13 | col. 21:42-46 |
| the network entity determining from the user profile whether the user is authorized to invoke or receive the IP telephone services...; | The FaceTime Server determines whether the intended target is a registered authorized FaceTime user before setting up the connection. | ¶13 | col. 21:47-49 |
| and the network entity filtering the message based on whether the user is authorized to invoke or receive the IP telephone services. | If the target user is determined to be authorized, the FaceTime Server "sets up the FaceTime connection." The conditional nature of this action constitutes the alleged filtering. | ¶13 | col. 21:51-54 |
- Identified Points of Contention:
- Scope Question: A dispute may arise over whether Apple's FaceTime, a video and audio communication service, constitutes an "IP telephony call" as contemplated by the patent. The defense may argue that "telephony" implies a narrower scope tied to traditional voice services, whereas the plaintiff may argue it covers any real-time voice communication over IP.
- Technical Question: The complaint alleges the FaceTime Server determines if a user is "authorized" and sets up a connection accordingly. (Compl. ¶13). A key question will be what this "authorization" entails. Does it correspond to the patent's concept of checking a profile for subscribed services (like call waiting or specific codecs), as required by claim 18, or is it a simpler authentication check (i.e., confirming the user exists in the FaceTime system)? The complaint does not specify that the FaceTime Server checks for authorization of specific features like "caller-ID, call waiting, multi-way calling" as required by the claim.
V. Key Claim Terms for Construction
The Term: "network entity"
Context and Importance: This term appears in the preamble of claim 18 and is the actor performing all steps of the method. Its definition is critical because the infringement theory identifies Apple's "FaceTime Server(s)" as this entity. (Compl. ¶8). The construction will determine what type of network component can meet this limitation.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification describes the "policy enforcement point" as a "logical localization of a set of tasks and functions that may actually be embodied in one or more physical devices, and/or in a distributed manner," suggesting it is not limited to a single, specific type of hardware. (’552 Patent, col. 8:61-66).
- Evidence for a Narrower Interpretation: The exemplary embodiments repeatedly show the "network entity" as a "border element" like a "SIP-aware firewall" or "SIP-aware NAT," located at the boundary between a local network and the core network. (’552 Patent, Figs. 5-7; col. 9:48-51). Apple may argue the term should be limited to such border elements.
The Term: "filtering the message"
Context and Importance: This is the final, active step of claim 18. The infringement allegation rests on the idea that "set[ting] up the FaceTime connection" only for authorized users constitutes "filtering." (Compl. ¶13). Practitioners may focus on this term because its construction will determine whether simply allowing or denying a connection satisfies the claim, or if a more complex action is required.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification states that filtering "may result in the message being forwarded on... [or] the message being discarded," supporting a simple allow/deny interpretation. (’552 Patent, col. 8:7-10).
- Evidence for a Narrower Interpretation: The specification also describes more complex filtering actions, such as "forwarding the message on, with alterations" or "returning an option message to the sender." (’552 Patent, col. 16:21-23, 5:3-14). An accused infringer may argue that "filtering" requires more than a simple binary pass/fail decision and must include the capability for these more nuanced alterations.
VI. Other Allegations
- Indirect Infringement: The complaint does not provide sufficient detail for analysis of indirect infringement. It contains no specific factual allegations regarding how Apple might instruct or encourage others to infringe.
- Willful Infringement: The complaint does not provide sufficient detail for analysis of willful infringement. It makes no allegations of pre-suit or post-suit knowledge of the patent or the alleged infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
Given the complaint's allegations and the surviving patent claims, the litigation will likely focus on fundamental questions of claim scope and evidentiary proof.
- A central issue will be one of definitional scope: Can the term "IP telephony call," as used in the patent, be construed broadly enough to encompass Apple's FaceTime audio/video communication service, or is it limited to services that more closely resemble traditional telephone calls?
- A second core issue is one of functional mapping: Do Apple's FaceTime Servers perform the specific type of "authorization" required by claim 18? The case may turn on whether Uniloc can produce evidence that the servers check a user profile for the right to use specific features (e.g., multi-way calling, specific codecs), or if the servers merely perform a basic authentication to confirm a valid user account, which may not meet the claim limitation.
- A final key question will be one of claim construction: Does the term "filtering" require only the binary act of allowing or blocking a connection, as Uniloc's theory appears to suggest, or does it require the more complex capability to alter the message content, as suggested by some embodiments in the patent?