2:21-cv-00418
Telecom Network Solutions LLC v. T-Mobile
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Telecom Network Solutions, LLC (Texas)
- Defendant: T-Mobile USA, Inc., T-Mobile US, Inc., and Sprint Corp. (Delaware)
- Plaintiff’s Counsel: Ahmad, Zavitsanos, Anaipakos, Alavi & Mensing P.C.; Heim, Payne & Chorush LLP; Ward, Smith & Hill, PLLC
 
- Case Identification: 2:21-cv-00418, E.D. Tex., 11/09/2021
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas based on Defendant’s operation of wireless networks, retail stores, offices, and research and development facilities within the district, constituting a regular and established place of business where alleged acts of infringement occur.
- Core Dispute: Plaintiff alleges that Defendant’s wireless network management systems, which prioritize and throttle data traffic based on customer plans and real-time network congestion, infringe a patent related to dynamic network resource allocation.
- Technical Context: The technology concerns methods for managing limited bandwidth in cellular networks by creating a feedback loop that adjusts user service parameters in response to changing network load.
- Key Procedural History: The patent-in-suit is a reissue of U.S. Patent No. 8,600,850, a procedural step taken to correct a perceived error in the original patent, which may be relevant to the interpretation of the asserted claims.
Case Timeline
| Date | Event | 
|---|---|
| 2009-12-10 | '813 Patent Priority Date | 
| 2020-01-14 | U.S. Patent No. RE47,813 Issues | 
| 2021-02-24 | "Heavy Data User" threshold for new Magenta plans activated | 
| 2021-11-09 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Reissue Patent No. RE47,813 - "Feedback Loop for Dynamic Network Resource Allocation"
- Patent Identification: U.S. Reissue Patent No. RE47,813, "Feedback Loop for Dynamic Network Resource Allocation," issued January 14, 2020.
The Invention Explained
- Problem Addressed: The patent addresses the challenge of managing unpredictable network congestion, which can compromise the quality of service for mobile users who may have different allocated service levels ('813 Patent, col. 1:28-33).
- The Patented Solution: The invention proposes a feedback loop for dynamically allocating a shared network resource. The system receives service and billing profiles for multiple devices, generates a prioritization list, and then repeatedly monitors real-time traffic ('813 Patent, Abstract). If the network resource is over- or under-utilized by that traffic, the system dynamically modifies the service or billing profiles of selected devices to better align resource usage with available capacity, using the prioritization list to determine which devices are modified first ('813 Patent, col. 2:32-40; Fig. 4).
- Technical Importance: This technology describes a reactive, closed-loop system for network management that allows an operator to respond to real-time conditions by adjusting user-level service parameters, rather than relying on static quality-of-service policies ('813 Patent, col. 1:23-28).
Key Claims at a Glance
- The complaint asserts representative independent claim 1 (Compl. ¶84).
- Essential elements of claim 1 include:- Receiving a service profile and a billing profile for each of a plurality of devices sharing a network resource.
- Generating a prioritization list based on the billing profiles and billing history.
- Repeating a process that involves:- Receiving traffic profiles for the devices.
- Managing the network resource according to the profiles if it is fully utilized.
- Selecting at least one device from the prioritization list and dynamically modifying its service or billing profile if the network resource is under- or over-utilized.
 
- Continuing this process until the devices no longer share the resource.
- Clearing the prioritization list when the devices are no longer sharing the resource.
 
- The complaint reserves the right to assert additional claims (Compl. ¶84).
III. The Accused Instrumentality
Product Identification
- The "T-Mobile Network," which includes its 3G, 4G/LTE, and 5G wireless networks, along with the associated network management functionality (Compl. ¶¶11, 31, 83).
Functionality and Market Context
- The complaint alleges that the T-Mobile Network employs network management practices to handle congestion by prioritizing data traffic (Compl. ¶44). These practices include defining a "Heavy Data User" as a customer exceeding a certain data threshold (e.g., 50GB or 100GB per month on specific plans) and then reducing their data speeds during periods of network congestion (Compl. ¶¶43, 48). A screenshot from T-Mobile's website defines a "Heavy Data User" for most plans as a customer using more than 50GB of data in a billing cycle (Compl. ¶43, p. 17).
- Prioritization is also allegedly based on the customer's rate plan, with data for customers on certain plans (e.g., "Essentials") being prioritized below data for customers on other plans (Compl. ¶44). This system results in lower-priority users experiencing slower data speeds "at times and at locations where there are competing customer demands for network resources" (Compl. ¶48).
- The complaint alleges these functions are implemented within the network's 4G Evolved Packet Core (EPC) and 5G core architecture, which includes components like the Policy and Charging Rules Function (PCRF) and Policy Control Function (PCF) (Compl. ¶¶61-62, 66).
IV. Analysis of Infringement Allegations
RE47,813 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| receiving a service profile for each of a plurality of devices sharing a network resource; | The Accused Instrumentalities receive a service profile for each device, which includes parameters such as a data allotment or bit-rate cap associated with a customer's chosen plan (e.g., Essentials, Magenta). | ¶88 | col. 5:6-9 | 
| receiving a billing profile for each of said plurality of devices; | The Accused Instrumentalities receive a billing profile for each device, which includes the rate plan and associated payment terms. | ¶90 | col. 5:16-24 | 
| generating a prioritization list defining an order of said plurality of devices, based on said billing profiles and on a billing history for each of said plurality of devices; | The T-Mobile Network allegedly generates a prioritization order based on the user's plan (billing profile) and data usage history, including "Heavy Data User" status, and potentially on payment status (billing history). | ¶¶92, 93 | col. 11:14-23 | 
| repeating: receiving traffic profiles over said network resource for said plurality of devices; | The network receives traffic profiles by monitoring data usage and network congestion in real-time. A T-Mobile presentation diagram shows the 5G network architecture allegedly used for this monitoring (Compl. p. 30, ¶65). | ¶¶95, 96 | col. 7:45-48 | 
| managing said network resource according to said service profile and said billing profile if said network resource is fully utilized by said traffic profiles; and, | During network congestion ("fully utilized"), T-Mobile manages data delivery according to the established service profiles and prioritization rules. | ¶¶97, 98 | col. 7:49-55 | 
| selecting at least one of said devices based on said prioritization list and dynamically modifying at least one of said service profile and said billing profile... if said network resource would be over-utilized by said traffic profiles; | When the network is congested ("over-utilized"), T-Mobile selects lower-priority users (e.g., "Heavy Data Users") and throttles their data speeds, which the complaint alleges is a dynamic modification of their service profile's effective bit-rate cap. | ¶¶99, 100, 101 | col. 8:1-11 | 
| until said plurality of devices no longer continue to share said network resource; and | This process of monitoring and dynamic allocation allegedly continues as long as devices remain connected to and are actively using the shared network resource (e.g., a cell tower). | ¶102, ¶103 | col. 2:49-52 | 
| when said plurality of devices are no longer sharing said network resource, clearing said prioritization list. | When a device disconnects from the shared network resource, it is no longer subject to prioritization, which the complaint alleges constitutes clearing the list with respect to that device. | ¶104, ¶105 | col. 14:48-55 | 
- Identified Points of Contention:- Scope Questions: A primary question for the court will be whether T-Mobile's practice of temporarily throttling data speeds for certain users during congestion constitutes "dynamically modifying" a "service profile" as required by the claim. A defendant may argue that this action is merely the enforcement of a pre-existing, static service profile that explicitly allows for such throttling, rather than a modification of it.
- Technical Questions: The infringement allegation hinges on whether T-Mobile's network management system operates as the specific feedback loop claimed. A potential point of contention is what evidence demonstrates that T-Mobile's prioritization is based on "billing history" (e.g., a history of late payments) in addition to the user's plan type and data usage, as this is a specific input required for generating the claimed "prioritization list."
 
V. Key Claim Terms for Construction
- The Term: "dynamically modifying at least one of said service profile and said billing profile" 
- Context and Importance: This term is central to the infringement analysis. The dispute will likely focus on whether temporarily reducing a user's data speed, a practice known as throttling, qualifies as a "modification" of their service profile. The answer will determine whether T-Mobile's core network management practice falls within the scope of the claim. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The specification states that "dynamically modifying" can comprise "increasing or reducing an overall bit-rate cap or data volume cap in a service profile" ('813 Patent, col. 2:55-58). Plaintiff may argue that throttling a user's connection from 5G speeds to 2G speeds is a direct, albeit temporary, reduction of their effective bit-rate cap and thus constitutes a "modification."
- Evidence for a Narrower Interpretation: The specification also provides examples of modifying a profile by adjusting "a rate or a charge in a billing profile" ('813 Patent, col. 2:60-62) or adjusting data in the billing profile "to reflect a credit for the reduced maximum guaranteed bit rate" ('813 Patent, col. 9:10-12). A defendant may argue that "modifying" requires a change to the underlying contractual terms of the plan itself, not a temporary performance change that is already contemplated and permitted by the existing terms of service.
 
- The Term: "prioritization list" 
- Context and Importance: Practitioners may focus on this term because the infringement theory depends on T-Mobile's system of tiered data access being equivalent to the claimed "list." The construction of this term will determine whether a system of applying different rule sets to different classes of users meets the claim limitation. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The patent claims require the list to define "an order" for which devices are subject to modification ('813 Patent, col. 2:65-66). Plaintiff may argue that T-Mobile's tiered system (e.g., prioritizing Magenta plan users over Essentials plan users, and all users over "Heavy Data Users") creates a functional "order" and is therefore a "prioritization list," regardless of its specific implementation as a data structure.
- Evidence for a Narrower Interpretation: An embodiment described in the patent depicts a more formal process where a "metric" is generated for each device and the device identifier is "insert[ed]... into a prioritization list based on [the] metric" ('813 Patent, Fig. 6; col. 11:5-13). A defendant could argue that its system relies on applying static, pre-defined rules to user classes, which is distinct from the dynamically generated, ordered list described in the patent's embodiment.
 
VI. Other Allegations
- Indirect Infringement: The complaint does not plead separate counts for indirect infringement or provide specific factual allegations to support inducement or contributory infringement.
- Willful Infringement: The complaint does not allege that Defendant had pre-suit knowledge of the '813 Patent. Any claim for enhanced damages under 35 U.S.C. § 284 would likely be based on alleged post-suit continuation of the accused infringing conduct.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: Does the act of temporarily throttling a user's data speed, when such throttling is provided for in the user's service agreement, constitute "dynamically modifying" a "service profile" as the claim requires, or is it merely the enforcement of that profile?
- A key evidentiary question will be one of functional equivalence: Does T-Mobile's system of applying different priority rules to different customer tiers (e.g., based on plan type and data usage) perform the function of the claimed "prioritization list" which is generated based on both "billing profiles" and "billing history"? The case may turn on the evidence presented to show how closely the accused system's operation maps to the specific steps recited in the patent's claims.