2:23-cv-00150
Foras Tech Ltd v. Toyota Motor North America Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Foras Technologies Ltd. (Ireland)
- Defendant: Toyota Motor North America, Inc. (California / Texas) and Denso Corporation (Japan)
- Plaintiff’s Counsel: BC LAW GROUP, Group
 
- Case Identification: 2:23-cv-00150, E.D. Tex., 04/05/2023
- Venue Allegations: Venue is alleged to be proper for Toyota based on its registration to do business in Texas and its regular and established place of business in the district (Plano, TX). Venue for Denso, a foreign corporation, is alleged to be proper in any judicial district.
- Core Dispute: Plaintiff alleges that electronic control units and sensors supplied by Denso for use in Toyota and Lexus vehicles infringe three patents related to fault-tolerant "lockstep" processing technology.
- Technical Context: The patents address methods for detecting and recovering from processor errors in real-time, a technology critical for the reliability and safety of high-availability systems, including modern automotive Advanced Driver-Assistance Systems (ADAS).
- Key Procedural History: The complaint notes that Defendants have not contested personal jurisdiction or venue in the Eastern District of Texas in prior, separate litigation, but mentions no other substantive procedural history such as prior licensing or administrative patent challenges.
Case Timeline
| Date | Event | 
|---|---|
| 2004-10-25 | Priority Date for ’958, ’781, and ’302 Patents | 
| 2009-03-10 | ’958 Patent Issue Date | 
| 2009-11-24 | ’302 Patent Issue Date | 
| 2009-12-01 | ’781 Patent Issue Date | 
| 2023-04-05 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,502,958 - "System and method for providing firmware recoverable lockstep protection," Issued March 10, 2009
The Invention Explained
- Problem Addressed: The patent identifies the problem of "Silent Data Corruption" (SDC), where a processor produces erroneous results undetected (’958 Patent, col. 1:40-44). While using a redundant "lockstep" processor pair can detect discrepancies, the traditional response of crashing the entire system is unacceptable for high-availability systems where uptime is critical (’958 Patent, col. 3:4-13).
- The Patented Solution: The invention proposes a firmware-level solution that avoids a system crash. Upon detecting a loss of lockstep, the firmware interacts with the operating system (OS) using standard interfaces (e.g., ACPI) to temporarily "idle" the faulty processor pair, attempts to recover lockstep between the two processors, and then triggers the OS to recognize the pair as operational again (’958 Patent, Abstract; Fig. 1). This process is designed to be transparent to the OS, which does not need specialized knowledge of the lockstep recovery mechanism (’958 Patent, col. 5:6-12).
- Technical Importance: This approach enables fault recovery without a system-wide shutdown, significantly increasing the reliability and availability of multi-processor systems. (’958 Patent, col. 3:6-13).
Key Claims at a Glance
- The complaint asserts independent claim 19 (’Compl. ¶17).
- The essential elements of system claim 19 include:- A pair of lockstep processors.
- Computer-executable firmware code stored on a computer-readable medium.
- Firmware code responsive to a detected loss of lockstep for determining if the error is recoverable.
- Firmware code that, if the error is determined to be recoverable, (1) triggers an operating system to idle the processors, (2) attempts to recover lockstep, and (3) if successful, triggers the operating system to recognize the processors as available again.
 
- The complaint reserves the right to assert additional claims (’Compl. ¶16).
U.S. Patent No. 7,627,781 - "System and method for establishing a spare processor for recovering from loss of lockstep in a boot processor," Issued December 1, 2009
The Invention Explained
- Problem Addressed: The patent addresses the specific challenge of a lockstep failure occurring in the system's "boot processor." A boot processor is critical for system operation and generally cannot be idled or "ejected" using standard OS commands, making the recovery technique of the ’958 Patent difficult to apply. (’781 Patent, col. 5:26-30).
- The Patented Solution: The invention describes a system where a "spare processor" is established to take over for the boot processor if it fails. This assignment of "boot" and "spare" roles is stored in a data structure, such as a "device tree," that is accessible to the firmware (’781 Patent, col. 4:55-65). When a lockstep failure is detected in the boot processor, the firmware manages the handoff, transferring the boot role to the spare processor during runtime to avoid a system crash (’781 Patent, Abstract; Fig. 6).
- Technical Importance: This method provides a fault-tolerance mechanism for the single most critical processor in a system, ensuring continuity of operations even if the original boot processor fails.
Key Claims at a Glance
- The complaint asserts independent claim 1 (’Compl. ¶24).
- The essential elements of system claim 1 include:- A plurality of processors.
- Data storage that stores information assigning a "role of boot processor" to one processor and a "role of spare processor" to another.
- Logic that responds to a detected loss of lockstep in the boot processor by transferring the boot processor role to the spare processor during system runtime.
- A specific limitation that the spare processor is held in reserve as a "hot spare" until the loss of lockstep is detected.
 
- The complaint reserves the right to assert additional claims (’Compl. ¶23).
U.S. Patent No. 7,624,302 - "System and method for switching the role of boot processor to a spare processor responsive to detection of loss of lockstep in a boot processor," Issued November 24, 2009
- Technology Synopsis: This patent describes a method for ensuring system resilience when a lockstep error affects the boot processor (’302 Patent, Abstract). The system firmware detects the error, determines it involves the boot processor, and then switches the boot processor role to a pre-designated spare processor, allowing the system to continue functioning without a shutdown (’302 Patent, col. 4:4-9).
- Asserted Claims: The complaint asserts independent claim 21 (Compl. ¶31).
- Accused Features: The complaint specifically accuses the Denso front radar, which contains an Infineon SAK TC356TD chipset and is used in vehicles like the Lexus NX350h (Compl. ¶30).
III. The Accused Instrumentality
Product Identification
- The accused instrumentalities are Toyota-branded and Lexus-branded automobiles that contain specific Denso-made electronic components, including Electronic Control Units (ECUs), Monocular Forward ADAS Cameras, front radars, and Advanced Drive Cameras (Compl. ¶¶4, 16). The complaint names the Toyota Rav4, Toyota Camry, Lexus NX350h, and Lexus LS500h as representative products (Compl. ¶16).
Functionality and Market Context
- The accused components are alleged to contain chipsets from manufacturers like Renesas and Infineon (e.g., Renesas R7F701202, Infineon SAK TC356TD) (Compl. ¶16, ¶23, ¶30). These components are integral to modern vehicle functions, particularly Advanced Driver-Assistance Systems (ADAS), where computational reliability and fault tolerance are critical for safety. The complaint alleges these components practice the patented lockstep processing and recovery methods. No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint references claim charts in Exhibits 4, 5, 7, and 9, but these exhibits were not filed with the complaint. The infringement theory must therefore be summarized from the text of the complaint itself.
The complaint alleges that the accused ECUs, cameras, and radar sensors directly infringe the asserted patents because the chipsets within them are configured to operate as lockstep processor pairs (Compl. ¶¶16, 23, 30). For the ’958 Patent, the infringement theory is that these systems use firmware to detect lockstep errors and manage a recovery sequence that idles and re-enables the processor pair without crashing the system (Compl. ¶17). For the ’781 and ’302 Patents, the theory is that these systems establish a spare processor for a designated boot processor and switch roles if the boot processor fails, thereby ensuring continuous operation (Compl. ¶¶24, 31).
V. Key Claim Terms for Construction
For the ’958 Patent:
- The Term: "triggering an operating system to idle the processors" (from claim 19)
- Context and Importance: This term defines the crucial interaction between the patented firmware and the system's OS. The infringement analysis will turn on whether the accused systems perform this specific interaction. Practitioners may focus on this term because the Defendants could argue their firmware recovers from errors at a level below the OS, without any OS-level "trigger" to "idle" the processor.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent states that firmware "triggers OS 11 to idle the master processor 12A" by using a standard ACPI method to "eject" it (’958 Patent, col. 6:10-15). A broader reading could argue that any firmware action that causes the OS to stop scheduling tasks for the processor meets this limitation, regardless of the specific command used.
- Evidence for a Narrower Interpretation: The specification explicitly links the "triggering" to an "ACPI method... to 'eject' master processor 12A" (’958 Patent, col. 6:12-14). A narrower interpretation could require proof of this specific two-step sequence: an "eject" command from firmware that, in turn, causes the OS to idle the processor.
 
For the ’781 Patent:
- The Term: "data storage storing information that assigns a role of boot processor... and assigns a role of spare processor" (from claim 1)
- Context and Importance: This term requires a specific, pre-defined assignment of roles in memory. Infringement depends on finding such a data structure in the accused products. Practitioners may focus on this term because its construction will determine whether a dynamic, on-the-fly role assignment could infringe, or if a pre-configured data structure is strictly required.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification discloses that a "device tree" stores this information, and that this tree can be presented to the OS via ACPI tables (’781 Patent, col. 12:60-65). This could support an interpretation where any form of non-volatile configuration data (e.g., firmware flags, configuration registers) that the system uses to identify boot and spare roles constitutes the claimed "data storage."
- Evidence for a Narrower Interpretation: The patent consistently refers to a "device tree" as the mechanism for storing role assignments and teaches that firmware accesses this tree to manage the recovery (’781 Patent, col. 13:1-15). This could support a narrower reading requiring a dedicated, structured data map akin to a device tree, not just scattered configuration bits.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Denso induces infringement by supplying the accused components to Toyota and other manufacturers with the knowledge and intent that they will be incorporated into infringing automobiles and used in an infringing manner (Compl. ¶5).
- Willful Infringement: The complaint does not contain a separate count for willful infringement or plead specific facts supporting it. However, the prayer for relief requests a finding that the case is "exceptional" under 35 U.S.C. § 285, which is the legal standard for awarding attorneys' fees and is often predicated on findings of willful infringement or litigation misconduct (Compl. p. 10, ¶e).
VII. Analyst’s Conclusion: Key Questions for the Case
- A central evidentiary question will be one of technical implementation: what do the firmware and hardware of the accused Renesas and Infineon chipsets actually do? The case will depend on evidence from reverse engineering to determine if the accused systems perform the specific, multi-step recovery processes of the asserted claims, such as using an OS-level trigger to idle a processor or maintaining a "device tree" to manage a boot-to-spare processor handoff.
- A key legal issue will be one of claim scope: can the term "data storage storing information that assigns a role," as used in the ’781 Patent, be construed broadly to cover any method of role designation, or is it limited to a pre-configured, static data structure like the "device tree" described in the specification? The court’s construction of this and other terms will be critical in defining the line between infringing and non-infringing systems.
- An outstanding question of liability will be the division of responsibility between Denso, the component supplier, and Toyota, the integrator and seller. The court will need to examine the specific acts of each party to determine theories of direct and indirect infringement, particularly the evidence supporting Denso's alleged knowledge and intent to induce infringement.