5:25-cv-03738
Netflix Inc v. Broadcom Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Netflix, Inc. (Delaware)
- Defendant: Broadcom Inc. (Delaware), VMware LLC (Delaware)
- Plaintiff’s Counsel: Baker Botts L.L.P.
 
- Case Identification: 3:25-cv-03738, N.D. Cal., 05/22/2025
- Venue Allegations: Venue is alleged to be proper as Defendants maintain principal places of business within the Northern District of California and have committed acts of infringement in the district.
- Core Dispute: Plaintiff alleges that Defendant’s virtualization and ethernet switching products, many acquired through its acquisition of VMware, infringe five patents related to virtual machine service availability, subnet provisioning, and high-precision network time synchronization.
- Technical Context: The technologies at issue concern foundational aspects of cloud computing infrastructure and high-performance networking, which are critical for data centers, industrial automation, and large-scale content delivery.
- Key Procedural History: The complaint notes that Defendant Broadcom acquired Defendant VMware in a transaction that closed in November 2023. Plaintiff also alleges that VMware has a "culture of copying" and points to prior litigation where juries found VMware committed willful infringement, which may be presented to support allegations of willfulness in this case.
Case Timeline
| Date | Event | 
|---|---|
| 2003-03-17 | ’102 Patent Priority Date | 
| 2005-04-27 | ’912 Patent Priority Date | 
| 2005-12-09 | ’931 and ’751 Patents Priority Date | 
| 2007-12-25 | ’102 Patent Issue Date | 
| 2008-11-04 | ’931 Patent Issue Date | 
| 2010-01-19 | ’912 Patent Issue Date | 
| 2010-02-02 | ’751 Patent Issue Date | 
| 2014-08-29 | ’472 Patent Priority Date | 
| 2019-06-25 | ’472 Patent Issue Date | 
| 2022-05-26 | Broadcom and VMware Merger Agreement announced | 
| 2023-11-22 | Broadcom completes acquisition of VMware | 
| 2024-12-23 | Netflix sends first notice letter to Defendants | 
| 2025-04-15 | Netflix sends second notice letter to Defendants | 
| 2025-05-22 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,331,472 - "Virtual Machine Service Availability"
The Invention Explained
- Problem Addressed: The patent describes a problem in virtualized network environments where providing service redundancy through simple duplication (e.g., one active server and one standby server) can be inefficient and risky. If the primary server fails, the system operates without a backup during the downtime, and a second failure would cause a service interruption, which is particularly undesirable for "real-time or critical services." (Compl. ¶24; ’472 Patent, col. 1:44-61).
- The Patented Solution: The invention proposes a method to improve service availability without requiring costly, fully redundant hardware. A "service availability controller" monitors services running on virtual machines. If it detects that a high-priority service's availability is reduced (e.g., due to a server failure), it identifies a lower-priority service that has excess availability. It then deactivates the lower-priority service to free up resources and activates an instance of the high-priority service on the newly available server, thereby restoring redundancy and improving reliability. (Compl. ¶¶25-27; ’472 Patent, col. 1:65-2:8, 9:32-45).
- Technical Importance: This approach allows for dynamic, policy-based resource reallocation in virtualized environments to maintain high availability for critical applications while optimizing hardware usage and cost. (Compl. ¶25; ’472 Patent, col. 2:5-8).
Key Claims at a Glance
- The complaint asserts independent Claim 6 and dependent Claims 7-10. (Compl. ¶100).
- Independent Claim 6 recites a method comprising the essential elements:- Monitoring a first availability of a first service, where the service has a defined availability requirement and tolerance.
- Detecting a reduction in the first availability of the first service.
- Creating capacity for the first service by deactivating a second service on a first active virtual machine on a server, where the second service has availability exceeding its tolerance and a lower availability requirement than the first service.
- Activating a second active virtual machine executing the first service on the server.
 
- The complaint states Plaintiff reserves the right to assert additional claims.
U.S. Patent No. 7,313,102 - "System and Method for Subnet Configuration and Selection"
The Invention Explained
- Problem Addressed: The patent notes that prior art tools for managing IP subnets were separate from provisioning systems, requiring network managers to manually determine and assign available subnets that met a consumer's requirements. This process was inefficient, error-prone, and lacked the ability to manage related characteristics like performance and security policies. (Compl. ¶34; ’102 Patent, col. 1:29-48).
- The Patented Solution: The invention describes a method and system that integrates subnet management and provisioning. It involves first grouping subnets based on "logical properties" (e.g., security level, performance characteristics, or user department). These groups are then made accessible to specific network consumers. The system provides a graphical user interface (GUI) that guides the consumer through a "constrained selection" process to provision a subnet, including selecting the address type (public/private), gateway device, subnet group, and subnet mask (size). (Compl. ¶35; ’102 Patent, col. 9:13-29).
- Technical Importance: This invention streamlines network administration by automating and simplifying subnet provisioning, reducing the potential for user error and allowing for enforcement of network policies through the logical grouping of resources. (Compl. ¶38; ’102 Patent, col. 1:55-2:13).
Key Claims at a Glance
- The complaint asserts independent Claim 1 and dependent Claims 2-11. (Compl. ¶151).
- Independent Claim 1 recites a method for provisioning subnets comprising the essential elements:- Grouping the subnets into subnet groups based on logical properties of the subnets.
- Assigning to each network consumer those subnet groups that are accessible to that network consumer.
- Providing for constrained selection of a particular subnet by a network consumer through a GUI with selectable fields, which includes the steps of selecting (i) a public or private address space, (ii) an applicable gateway device, (iii) an accessible subnet group, and (iv) a subnet mask representing the size.
 
- The complaint states Plaintiff reserves the right to assert additional claims.
U.S. Patent No. 7,649,912 - "Time Synchronization, Deterministic Data Delivery and Redundancy for Cascaded Nodes on Full Duplex Ethernet Networks"
- Technology Synopsis: The patent addresses the technical challenge of maintaining precise, sub-microsecond time synchronization across multiple network devices connected in a "daisy-chain" configuration, which is critical for industrial control and robotics. It proposes a method where each node in the chain adjusts the timestamp in a time synchronization message frame to account for the delay it introduces, ensuring accuracy without the performance issues of prior art solutions. (Compl. ¶¶45-48).
- Asserted Claims: Claims 1-3 and 5-12. (Compl. ¶193).
- Accused Features: The complaint alleges that Broadcom's ethernet switching products (e.g., StrataDNX devices) and associated software/firmware (e.g., BroadPTP, BroadSync) that support the IEEE 1588 time protocol infringe this patent. (Compl. ¶193).
U.S. Patent No. 7,447,931 - "Step time change compensation in an industrial automation network"
- Technology Synopsis: This patent addresses the "step change problem" in synchronized networks, where a sudden change in the master clock (e.g., from a manual reset or losing a satellite reference) can cause system-wide timing errors. The invention discloses a method for detecting such a step change by comparing successive timestamps and their associated offsets, and then selectively updating subsequent timestamps to compensate for the change, thereby maintaining accurate time synchronization. (Compl. ¶¶64-66, 73).
- Asserted Claims: Claims 27-32. (Compl. ¶241).
- Accused Features: The complaint accuses Broadcom's Switching Accused Products, which implement the IEEE 1588 protocol, of infringing by performing methods of detecting and compensating for step changes in time. (Compl. ¶¶241, 244).
U.S. Patent No. 7,656,751 - "Step time change compensation in an industrial automation network"
- Technology Synopsis: Sharing a common specification with the ’931 Patent, this patent also targets the "step change problem." It claims a system comprising a "timestamp component" to capture timestamps and offsets from network nodes, and a "time synch component" that identifies step changes to a master clock and synchronizes the local clock of a network node with the identified change. (Compl. ¶¶78-79, 86).
- Asserted Claims: Claims 1-14. (Compl. ¶306).
- Accused Features: The complaint accuses the same family of Broadcom Switching Accused Products of infringing the system claims of this patent. (Compl. ¶306).
III. The Accused Instrumentality
Product Identification
The complaint identifies two main categories of accused products. The ’472 and ’102 Patents are asserted against the "Broadcom Load Balancing Accused Products" and "Broadcom Subnet Provisioning Accused Products," respectively, which include products like VMware Cloud Foundation, VMware Cloud on AWS, and services incorporating VMware NSX/NSX-T Data Center and VMware Avi Load Balancer. (Compl. ¶¶100, 151). The ’912, ’931, and ’751 Patents are asserted against "Broadcom Switching Accused Products," which include ethernet switch chips (e.g., BCM56070, StrataDNX series), related software (BroadPTP), and firmware (BroadSync). (Compl. ¶¶193, 241, 306).
Functionality and Market Context
- The virtualization products (e.g., VMware Cloud, NSX, Avi Load Balancer) provide the software infrastructure for building and managing private and hybrid cloud environments. The complaint alleges these products enable automated load balancing by using virtual machines called "Service Engines" to run services and scale them based on performance metrics. (Compl. ¶¶103-104, 107). They also provide networking capabilities like Virtual Private Clouds (VPCs) that allow users to provision and configure subnets through a graphical interface. (Compl. ¶¶154, 157).
- The switching products are hardware components (chips) and associated software/firmware that form the basis of high-speed network equipment. The complaint alleges these products implement the IEEE 1588 Precision Time Protocol (PTP) to enable highly accurate time synchronization across network devices. (Compl. ¶¶196, 244).
- The complaint positions the accused virtualization products as highly significant to Broadcom's business, noting that the VMware Cloud Foundation product line represented 80% of total VMware product bookings in Broadcom's third fiscal quarter of 2024. (Compl. ¶119).
IV. Analysis of Infringement Allegations
U.S. Patent No. 10,331,472 Infringement Allegations
| Claim Element (from Independent Claim 6) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| A method comprising: monitoring a first availability of a first service, the first service having a first availability requirement and a first availability tolerance; | The Accused Products monitor "virtual services" and display a numeric, color-coded "health" status, and also allow configuration of minimum and maximum scale-out settings per service. | ¶102, 103 | col. 9:32-35 | 
| detecting a reduction in the first availability of the first service; | The Accused Products detect a reduction when a virtual service's health status indicates it is "down," or when performance metrics like "SE CPU exceeds an 80% average" cross a predefined threshold. The complaint provides a flowchart from Defendant’s documentation showing this decision logic. (Compl., Fig. 7). | ¶103, 105, 107, 108 | col. 9:35-37 | 
| creating capacity for the first service by deactivating a second service on a first active virtual machine on a server, the second service having a second availability exceeding a second availability tolerance and having a second availability requirement lower than the first availability requirement; | When CPU usage is high but no single virtual service is the cause, the system performs a "migration process" where a virtual service is moved to a new Service Engine (SE). The complaint alleges that as part of this process, the old SE is "removed from the virtual service configuration," which deactivates it. | ¶109, 110 | col. 9:38-42 | 
| and activating a second active virtual machine executing the first service on the server. | When traffic increases beyond the capacity of a single SE, the system performs a "scale out" operation where the controller adds one or more new SEs (which are virtual machines) to the virtual service to process traffic. | ¶112, 113 | col. 9:43-45 | 
Identified Points of Contention
- Scope Questions: A primary dispute may arise over the "creating capacity" limitation. The complaint alleges that migrating a service from an overloaded virtual machine (the old SE) to a new one satisfies the claim element of "deactivating a second service on a first active virtual machine." A court may need to determine if this "migration" process, where capacity is created on a new machine, can be construed as the claimed step of deactivating a service on a first machine to create capacity on that machine for a higher-priority service.
- Technical Questions: The patent describes deactivating a lower-priority service to make room for a higher-priority one. The complaint's infringement theory is based on load management (high CPU usage). It is an open question whether the accused migration or scaling decisions are based on the relative priority and availability requirements specified in the claim, or on different technical criteria like resource utilization alone.
U.S. Patent No. 7,313,102 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| A method for provisioning subnets, the method comprising: grouping the subnets into subnet groups based on logical properties of the subnets; | The Accused Products (VMware NSX) group subnets into "tier-0" and "tier-1" categories. These tiers have distinct logical properties, such as tier-0 connecting to physical routers and tier-1 connecting to tier-0. | ¶153-155 | col. 9:15-17 | 
| assigning to each network consumer those subnet groups that are accessible to that network consumer; | In NSX, users are assigned to a Virtual Private Cloud (VPC) and "can add subnets (networks) inside the NSX VPC that is assigned to them." The complaint provides a screenshot showing different users assigned to different IP address blocks. (Compl., Fig. 19). | ¶156, 157 | col. 9:18-20 | 
| and providing for constrained selection of a particular subnet by a network consumer accomplished by way of a graphical user interface with selectable fields, wherein the constrained selection includes (i) selecting a public or private type address space, | The accused NSX product provides a GUI for adding a subnet where a user can specify the "access mode" as "Private, Public, Isolated." The complaint includes a screenshot of this user interface. (Compl., Fig. 20). | ¶158, 160 | col. 9:21-25 | 
| (ii) if applicable, selecting a gateway device... | The Accused Products provide a GUI where a user can specify the "Gateway IP" for a new subnet. | ¶160 | col. 9:25-27 | 
| (iii) selecting a subnet group... | Users select from available IP Address Pools, which the complaint maps to the concept of subnet groups. | ¶154, 160 | col. 9:27-29 | 
| and (iv) selecting a subnet mask that represents a size of the particular subnet. | The Accused Products' GUI allows a user to specify the size of the subnet via an "IP CIDR" field. | ¶159, 160 | col. 9:29-31 | 
Identified Points of Contention
- Scope Questions: Does NSX's architectural division of subnets into "tier-0" and "tier-1" routing layers meet the claim limitation of "subnet groups based on logical properties"? The patent specification describes groupings based on security, performance, and organizational workgroups (e.g., finance, HR), which may suggest a different scope than the fixed network topology tiers alleged to infringe.
- Technical Questions: Does the accused GUI for adding a subnet perform the specific, ordered four-part "constrained selection" process required by the claim? A court will likely examine whether the user is guided through the distinct selection of (i) address space type, (ii) gateway, (iii) group, and (iv) mask, or if the interface is a more general configuration tool that simply provides fields for these properties.
V. Key Claim Terms for Construction
U.S. Patent No. 10,331,472
- The Term: "deactivating a second service"
- Context and Importance: The plaintiff's infringement theory hinges on equating the "migration" of a virtual service from one virtual machine to another with "deactivating" a service to "creat[e] capacity." The definition of this term is therefore critical to determining whether the accused product's load-balancing functionality meets the core mechanism of the claim.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The claim language itself is general. The specification states the service controller "may send an instruction to the virtual machine or the instance of the selected service to cease execution," which could be interpreted broadly to cover any action that stops the service's operation on a given VM. (col. 10:65-67).
- Evidence for a Narrower Interpretation: The patent's background and solution focus on freeing up resources on an existing server by stopping a lower-priority service to make room for a higher-priority one. (col. 9:1-9). This context may support a narrower interpretation where "deactivating" requires a service to be shut down specifically to make its underlying resources on that same server available to another service, as opposed to a managed handoff to a different server.
 
U.S. Patent No. 7,313,102
- The Term: "subnet groups based on logical properties"
- Context and Importance: The complaint alleges that the "tier-0" and "tier-1" routing layers in the accused NSX product satisfy this limitation. The viability of the infringement claim depends on whether these architectural tiers fall within the scope of "subnet groups."
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The claim term "logical properties" is facially broad and is not explicitly limited in the claim itself. An argument could be made that any non-physical basis for grouping, including a functional role in network topology (e.g., internal vs. external facing), constitutes a logical property.
- Evidence for a Narrower Interpretation: The specification provides numerous, more policy-oriented examples of "logical properties," such as "security characteristics," "performance characteristics," "subnet usage metering," and "workgroup types" like "human resources, finance, administration, and engineering." (col. 3:35-56). This detailed list may suggest the term was intended to cover flexible, administrative groupings rather than fixed architectural tiers.
 
VI. Other Allegations
Indirect Infringement
The complaint alleges both induced and contributory infringement for the asserted patents. The inducement allegations are based on Defendants providing marketing materials, installation guides, technical support, and interactive "Hands-on Labs" that allegedly instruct and encourage customers to use the accused products in an infringing manner (e.g., configuring auto-scaling or provisioning subnets). (Compl. ¶¶126-129, 171-175). Contributory infringement is alleged on the basis that the accused products are specially made or adapted to practice the claimed methods, are material components of the invention, and have no substantial non-infringing use, particularly when infringing features are enabled automatically. (Compl. ¶¶137-139, 182-184).
Willful Infringement
Willfulness is alleged for all five asserted patents. The allegations are based on pre-suit knowledge stemming from notice letters sent by Netflix to Defendants in December 2024 and April 2025, to which Defendants allegedly did not respond. (Compl. ¶¶143, 168, 219, 283, 329). The complaint further supports its willfulness claims by asserting that VMware has a "demonstrated culture of knowingly using patented technology" and a "culture of copying," citing adverse findings of willful infringement against VMware in prior, unrelated patent litigation. (Compl. ¶¶146-148).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the process of "migrating" a virtual service from an overloaded virtual machine to a new one, as performed by the accused load balancer, be construed to meet the claim limitation of "deactivating a second service on a first active virtual machine" to "creat[e] capacity"? The outcome may depend on whether the claim requires freeing resources on the original machine versus orchestrating a resource handoff to a new machine.
- A central claim construction question will be one of technical classification: are the fixed, architectural "tier-0" and "tier-1" routing layers in the accused VMware NSX product equivalent to the "subnet groups based on logical properties" described in the ’102 Patent? The case may turn on whether the patent's disclosure, rich with examples of policy-based groupings, limits the claim scope to administrative categories rather than network topology.
- A key question for damages and potential enhancement will be one of intent: does the evidence of pre-suit notice letters, combined with allegations of a "culture of copying" supported by prior adverse willfulness findings in unrelated cases, rise to the level of egregious conduct required to prove willful infringement?