1:25-cv-00473
Telsync Tech LLC v. Ge Vernova Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Telsync Technologies LLC (Delaware)
- Defendant: GE Vernova Inc. (Delaware)
- Plaintiff’s Counsel: Garibian Law Offices, P.C.; Rabicoff Law LLC
 
- Case Identification: 1:25-cv-00473, D. Del., 04/17/2025
- Venue Allegations: Plaintiff alleges venue is proper in the District of Delaware because Defendant has an established place of business in the district, has committed acts of infringement there, and Plaintiff has suffered harm there.
- Core Dispute: Plaintiff alleges that unspecified products and services from Defendant infringe a patent related to maintaining communication sessions for mobile devices as they move within a wireless network.
- Technical Context: The technology concerns methods for managing network connectivity for mobile devices, a foundational issue for ensuring stable real-time applications like video conferencing or data streaming in cellular or Wi-Fi environments.
- Key Procedural History: The complaint does not mention any prior litigation, inter partes review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event | 
|---|---|
| 2009-01-23 | ’263 Patent Priority Date | 
| 2014-11-25 | U.S. Patent No. 8,897,263 Issues | 
| 2025-04-17 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,897,263 - "Interactions among mobile devices in a wireless network," issued November 25, 2014
The Invention Explained
- Problem Addressed: The patent addresses the challenge of maintaining stable, real-time data exchanges (e.g., video conferencing) for mobile devices in a wireless network (Compl. ¶9; ’263 Patent, col. 1:35-44). As a device moves, it may be assigned different network identifiers at different locations, and the connection quality can vary, complicating continuous communication sessions (’263 Patent, col. 1:38-44).
- The Patented Solution: The invention describes a method for managing this mobility. When a mobile device leaves a first wireless area (e.g., covered by a first base station) and enters a second one, the system accesses a new "second identification information" (e.g., a "guest IP address") associated with the device's original "first identification information" (e.g., a "home IP address") (’263 Patent, col. 5:1-9, col. 5:46-67). This second identifier is then used in a signaling protocol to maintain the communication session, effectively handing off the connection without termination (’263 Patent, col. 5:26-32, col. 11:20-35).
- Technical Importance: This approach provides a mechanism for session continuity in mobile networks, a critical function for enabling seamless user experiences in applications that are sensitive to network interruptions.
Key Claims at a Glance
- The complaint does not specify which claims are asserted, referring only to "Exemplary '263 Patent Claims" identified in an external exhibit not attached to the pleading (Compl. ¶11). Independent claim 1, a method claim, is representative of the core invention.
- Independent Claim 1: A method to maintain a communication session, comprising the steps of:- determining a first identification information associated with a mobile device;
- in response to the mobile device leaving a first wireless range associated with the wireless network, accessing a second identification information associated with the first identification information, wherein the second identification information is assigned to the mobile device when the mobile device is in a second wireless range associated with the wireless network and registers itself to a stationary device covering the second wireless range; and
- maintaining the communication session with the mobile device by utilizing the second identification information in a signaling protocol.
 
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific accused products, services, or methods. It refers generally to "Exemplary Defendant Products" that are purportedly detailed in "charts incorporated into this Count" (Compl. ¶11, ¶16).
Functionality and Market Context
- The complaint does not provide the referenced charts (Exhibit 2) or any other details about the functionality or market context of the accused instrumentalities (Compl. ¶17). Analysis of the accused functionality is therefore not possible based on the provided document.
IV. Analysis of Infringement Allegations
The complaint alleges that Defendant directly infringes by making, using, and selling products that practice the technology claimed by the ’263 Patent (Compl. ¶11). It incorporates by reference claim charts from an "Exhibit 2" to support its allegations, but this exhibit was not included with the filed complaint (Compl. ¶16-17). As a result, a detailed analysis of the infringement allegations is not possible. The infringement theory appears to be that Defendant's products, when operating in a wireless network, maintain communication sessions for mobile or roaming devices using a handoff mechanism that meets the limitations of the asserted claims.
No probative visual evidence provided in complaint.
Identified Points of Contention
- Evidentiary Questions: The central threshold question is identifying the accused products and their specific functionalities. Without this information, which Plaintiff states is contained in the un-provided Exhibit 2, no meaningful infringement analysis can occur (Compl. ¶16).
- Technical Questions: A key question will concern how the accused products, once identified, actually manage network handoffs. The analysis will focus on whether they perform the specific sequence of accessing a "second identification information" in response to a device changing location and then "utilizing" that information in a "signaling protocol" as claimed (’263 Patent, col. 11:20-35).
V. Key Claim Terms for Construction
The Term: "identification information"
- Context and Importance: This term appears in the phrases "first identification information" and "second identification information" and is the core of the claimed invention. Its construction will determine whether the claim is limited to specific types of network addresses or covers a broader range of device identifiers. Practitioners may focus on this term because its scope will be pivotal to whether the accused technology, once revealed, falls within the claims.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The claim itself uses the general term "identification information" without explicit limitation, suggesting any data that serves to identify a device in a network could be covered (’263 Patent, col. 11:22). The specification also refers generally to "identification information" in the context of device registration (’263 Patent, col. 2:60-61).
- Evidence for a Narrower Interpretation: The specification repeatedly provides specific examples, stating that the first identification information can be a "home Internet Protocol (IP) address" and the second can be a "guest IP address" (’263 Patent, col. 11:61-67, col. 5:7-9). A defendant may argue these examples limit the claim scope to this type of IP address-based handoff mechanism.
 
The Term: "maintaining the communication session ... by utilizing the second identification information in a signaling protocol"
- Context and Importance: This limitation defines the final, active step of the claimed method. The dispute will likely center on what actions constitute "maintaining" the session and what qualifies as a "signaling protocol." The interpretation will determine if the claim requires a specific type of formal protocol or covers more general handoff signaling.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The term "signaling protocol" is used generally, and the patent suggests it is for the purpose of establishing a communication session, without limiting it to a specific standard in the claim language itself (’263 Patent, col. 5:28-32).
- Evidence for a Narrower Interpretation: The specification gives the "Session Initiation Protocol (SIP)" as an example of a signaling protocol (’263 Patent, col. 5:31-32). A party could argue that this context implies the claimed "signaling protocol" must be a formal, standardized protocol of a similar nature to SIP, rather than any proprietary or informal exchange of information.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials" that instruct end users on how to use the accused products in an infringing manner (Compl. ¶14).
- Willful Infringement: The complaint alleges that Defendant has had "actual knowledge" of its infringement since at least the service of the complaint and has "actively, knowingly, and intentionally continued to induce infringement" (Compl. ¶13, ¶15). This forms the basis for a claim of post-suit willfulness.
VII. Analyst’s Conclusion: Key Questions for the Case
- An Evidentiary Question of Fact: The immediate and central issue is the lack of specificity regarding the accused instrumentality. Until Plaintiff clarifies which of Defendant’s products are accused and provides the infringement contentions purportedly contained in Exhibit 2, the case cannot meaningfully proceed. 
- A Definitional Question of Scope: A core legal issue will be the construction of the term "identification information". The case may turn on whether this term is broad enough to read on modern network identifiers used in Defendant's systems or is limited by the specification's examples of "home" and "guest" IP addresses. 
- A Technical Question of Infringement: Once the accused products are identified, the key technical question will be whether their method for handling network roaming and device handoffs performs the specific steps recited in the claims. The analysis will likely focus on whether the accused systems "access" a "second" identifier and "utilize" it in a "signaling protocol" in the manner claimed, or if they operate via a technically distinct mechanism.