DCT
2:23-cv-00244
Winterspring Digital LLC v. Check Point Software Tech Ltd.
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Winterspring Digital LLC (Texas)
- Defendant: Check Point Software Technologies Ltd. (Israel)
- Plaintiff’s Counsel: Fabricant LLP; Truelove Law Firm, PLLC
- Case Identification: 2:23-cv-00244, E.D. Tex., 05/28/2023
- Venue Allegations: Venue is alleged to be proper because the Defendant is not a resident of the United States and may therefore be sued in any judicial district.
- Core Dispute: Plaintiff alleges that Defendant’s network security products, including its firewalls and gateways, infringe two patents related to high-speed data transmission and hardware-based packet tagging.
- Technical Context: The technology at issue relates to methods for efficiently processing and routing high-speed (e.g., 10-Gigabit) Ethernet traffic over wide area networks and classifying data packets at line speed.
- Key Procedural History: The complaint does not mention any prior litigation, inter partes review proceedings, or licensing history related to the patents-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2002-04-08 | Priority Date for U.S. Patent No. 7,164,692 |
| 2002-12-20 | Priority Date for U.S. Patent No. 7,420,975 |
| 2007-01-16 | Issue Date for U.S. Patent No. 7,164,692 |
| 2008-09-02 | Issue Date for U.S. Patent No. 7,420,975 |
| 2023-05-28 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,164,692 - “Apparatus and Method for Transmitting 10 Gigabit Ethernet LAN Signals Over a Transport System” (Issued Jan. 16, 2007)
The Invention Explained
- Problem Addressed: The patent describes the historical incompatibility between high-speed local area network (LAN) technologies like Ethernet and long-distance, carrier-grade wide area network (WAN) technologies like SONET. To bridge this gap, Ethernet data was typically "encapsulated" within a WAN protocol, a process the patent characterizes as adding unnecessary cost, complexity, and inefficiency, particularly as data traffic began to dominate traditional voice traffic on carrier networks (’692 Patent, col. 1:26-2:6).
- The Patented Solution: The invention proposes a transceiver and method for transmitting native 10-Gigabit Ethernet (10GE) LAN signals over a transport system without encapsulating them in a different protocol like SONET. The system receives a standard 10GE LAN signal, converts it to an intermediate electrical form, re-clocks and regenerates the signal, and then transmits it over the long-haul transport system, thereby preserving the native Ethernet frame format end-to-end (’692 Patent, Abstract; col. 5:18-34).
- Technical Importance: This approach aimed to create a more streamlined, cost-effective, and higher-performance network architecture by eliminating the protocol conversion layers required by legacy systems (’692 Patent, col. 6:9-16).
Key Claims at a Glance
- The complaint asserts independent method claim 10 (Compl. ¶17).
- Claim 10 Elements:
- Receiving a 10GE LAN client signal transmitted over a transport system.
- Converting the signal to an intermediate signal.
- Recovering clock data from the intermediate signal.
- Recovering a data stream from the intermediate signal.
- Reconverting the intermediate signal back to a 10GE LAN client signal.
- Transferring the reconverted signal to a client system.
- Monitoring the intermediate form with a monitoring device, which is specified to be a 10GE LAN media access controller (MAC).
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 7,420,975 - “Method and Apparatus for a High-Speed Frame Tagger” (Issued Sep. 2, 2008)
The Invention Explained
- Problem Addressed: In high-speed networks, network processors can become a bottleneck because they must inspect all incoming data to differentiate between control information and user data. This processing overhead often prevents the system from operating at the full "line speed" of the network connection (’975 Patent, col. 1:30-41).
- The Patented Solution: The patent discloses a dedicated hardware apparatus, a "frame tagger," that offloads the initial packet inspection from the main processor. This apparatus examines an incoming data packet, compares its protocol information against predetermined values in a series of "passes," and assigns a "tag" based on the results. This tag efficiently informs downstream components how to handle the packet, such as steering it to a central processor or a network processor, without requiring them to re-inspect the packet headers (’975 Patent, Abstract; col. 2:58-65).
- Technical Importance: By using dedicated hardware for high-speed, multi-pass packet classification, this method allows network systems to categorize and route traffic more efficiently, freeing up the main processor and enabling performance closer to the network's line speed (’975 Patent, col. 1:32-41).
Key Claims at a Glance
- The complaint asserts independent apparatus claim 5 (Compl. ¶28).
- Claim 5 Elements:
- A network processor interface for coupling to a network processor.
- A central processor interface for coupling to a central processor.
- A "protocol determination logic block" that performs a multi-pass comparison: it compares packet protocol information to values in a first pass to get a first result; if that result is positive, it compares information in a second pass to get a second result.
- A "tag select logic block" that applies a tag based on the results. If the first result is negative, it applies an "unknown protocol type" tag. If the first result is positive, it sends the packet to either the central or network processor interface based on the set of results.
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
- The complaint names a range of Defendant's network security products, including Check Point Quantum, CloudGuard, Harmony, and Horizon product lines. It specifically identifies the Check Point Quantum 6200 Security Gateway, its associated accessories (e.g., SFP+ interface cards and transceivers), the Check Point Gaia Operating System (e.g., R80.30), and the Checkpoint Identity Agent (Compl. ¶¶ 13, 16, 19, 27, 29-30).
Functionality and Market Context
- The accused products are network firewalls, gateways, and related software that allegedly perform high-speed network traffic management. The Quantum 6200 Security Gateway is accused of performing a method of transferring 10GE LAN signals (Compl. ¶18). The Gaia Operating System is alleged to include a "Packet Tagging" feature, which Defendant's own documentation describes as a "patent pending technology that prevents spoofed connections from passing through the Identity Awareness Gateway" (Compl. ¶30). A diagram in the complaint illustrates a high-level user authentication workflow involving an "Identity Awareness Gateway" (Compl. p. 8).
IV. Analysis of Infringement Allegations
’692 Patent Infringement Allegations
| Claim Element (from Independent Claim 10) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| receiving the 10GE LAN client signal transmitted over the transport system | The Check Point Quantum 6200 Security Gateway allegedly performs a method including "receiving the 10GE LAN client signal transmitted over the transport system." | ¶18 | col. 14:58-59 |
| converting the 10GE LAN client signal to an intermediate signal | The accused gateway allegedly performs "converting the 10GE LAN client signal to an intermediate signal." | ¶18 | col. 14:60-61 |
| recovering clock data from the intermediate signal | The accused gateway allegedly performs "recovering clock data from the intermediate signal." | ¶18 | col. 14:62-63 |
| recovering a data stream from the intermediate signal | The accused gateway allegedly performs "recovering a data stream from the intermediate signal." | ¶18 | col. 14:64-65 |
| reconverting the intermediate signal to the 10GE LAN client signal | The accused gateway allegedly performs "reconverting the intermediate signal to the 10GE LAN client signal." | ¶18 | col. 14:66 - col. 15:1 |
| transferring the 10GE LAN client signal to a client system | The accused gateway allegedly performs "transferring the 10GE LAN client signal to a client system." | ¶18 | col. 15:2-3 |
| monitoring the intermediate form with a monitoring device, wherein the monitoring device is a 10GE LAN media access controller | The accused gateway allegedly performs "monitoring the intermediate form with a monitoring device wherein the monitoring device is a 10GE LAN media access controller." | ¶18 | col. 15:4-8 |
- Identified Points of Contention:
- Evidentiary Questions: The complaint's allegations for infringement of claim 10 track the claim language almost verbatim (Compl. ¶18). A central question will be what technical evidence exists to demonstrate that the Quantum 6200 Security Gateway performs each of these specific internal steps, such as "recovering clock data" and "recovering a data stream" from an "intermediate signal", as opposed to employing a more generic data processing architecture.
- Scope Questions: Does the internal data processing pipeline of a security firewall constitute the "transport system" and "intermediate signal" as contemplated by the patent, which is focused on solving a LAN-to-WAN interoperability problem? The infringement theory appears to re-contextualize the invention from a carrier transport context to an enterprise security appliance context, raising questions about the intended scope of these terms.
’975 Patent Infringement Allegations
| Claim Element (from Independent Claim 5) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| a network processor interface suitable for coupling to a network processor | The Check Point 6200 Security Gateway is alleged to include "a network processor interface suitable for coupling to a network processor." | ¶29 | col. 2:58-60 |
| a central processor interface suitable for coupling to a central processor | The accused gateway is alleged to include "a central processor interface suitable for coupling to a central processor." | ¶29 | col. 2:61-62 |
| a protocol determination logic block to determine a protocol type... wherein the protocol determination logic compares the protocol information in a first pass... and, if the first result is positive, compares the protocol information in a second pass... | The accused gateway allegedly includes a "protocol determination logic block" that "compares the protocol information in a first pass to predetermined values to procedure a first result and, if the first result is positive, compares the protocol information in a second pass to predetermined values to produce a second result, the first and second results forming a set of results (e.g., VLAN tagging)." | ¶29 | col. 10:1-7 |
| a tag select logic block to apply a tag... indicating that the packet has an unknown protocol type if the first result is negative and if the first result is positive the packet should be sent to either the central processor interface or the network processor interface... | The accused gateway allegedly includes a "tag select logic block to apply a tag to the packet indicating that the packet has an unknown protocol type if the first result is negative and if the first result is positive, the packet should be sent to either the central processor interface or the network processor interface based on the set of results." | ¶29 | col. 10:8-11 |
- Identified Points of Contention:
- Technical Questions: The complaint alleges, "upon information and belief," that the accused products contain the specific "protocol determination logic" and "tag select logic" blocks (Compl. ¶29). However, the cited supporting documentation describes a "Packet Tagging" feature for a security purpose—preventing spoofed connections by signing packets (Compl. ¶30). A key technical question is whether this security function operates using the specific two-pass comparison and conditional steering logic required by claim 5.
- Scope Questions: Does the accused "Packet Tagging" security feature, which authenticates a connection, constitute a "protocol determination logic block" as claimed? The dispute may hinge on whether a security-oriented function falls within the scope of a claim that describes a more general mechanism for classifying and steering packets based on their protocol type.
V. Key Claim Terms for Construction
For the ’692 Patent: "monitoring the intermediate form with a monitoring device, wherein the monitoring device is a 10GE LAN media access controller"
- Context and Importance: This limitation is critical because it defines the nature of the required monitoring. The infringement analysis will depend on whether any monitoring function within the accused gateway can be characterized as a "10GE LAN media access controller" (MAC) monitoring an "intermediate form" of the signal.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification states that the MAC "monitors the packet data, idle, preamble and the remaining sections of the standard 10GE LAN signals" and performs functions like CRC checks (’692 Patent, col. 10:2-8). This could support an interpretation that any device performing these standard packet-level monitoring functions meets the limitation.
- Evidence for a Narrower Interpretation: The claim explicitly requires the monitoring device to be a "10GE LAN media access controller." This could be argued to require a component that strictly adheres to the functions and standards of an IEEE 802.3 MAC, not just a generic monitoring circuit within a firewall's custom ASIC.
For the ’975 Patent: "protocol determination logic block"
- Context and Importance: The case may turn on the definition of this term. Practitioners may focus on this term because the plaintiff's theory equates the defendant's security-focused "Packet Tagging" feature with the claimed logic block for determining protocol type. The construction will determine whether the claim is limited to general protocol classification or if it can also read on specialized security functions.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent states in general terms that the invention is for determining "what type of control or data bytes are received" (’975 Patent, col. 1:36-41). This could support a reading where any logic that inspects a packet to classify it (including for security purposes) constitutes a "protocol determination logic block."
- Evidence for a Narrower Interpretation: The claim requires a specific multi-pass comparison and the detailed embodiments show logic for steering packets between a central processor and a network processor based on the outcome (’975 Patent, col. 10:1-11; Fig. 4). This may support a narrower construction requiring the logic block to perform this specific multi-pass comparison and routing function, not just a single-purpose security check.
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Defendant induces infringement of both patents by providing its products to customers and end-users (Compl. ¶¶ 20, 31). For the ’975 patent, this allegation is supported by a reference to Defendant's "Identity Awareness R80.40 Administration Guide," which allegedly instructs users on how to enable the accused "Packet Tagging" feature (Compl. ¶30, p. 7 fn. 2).
- Willful Infringement: For both patents, the complaint alleges that Defendant had knowledge of its infringement "at least as of the date of this Complaint" (Compl. ¶¶ 21, 32). It further pleads that Defendant acted with intent or, alternatively, with willful blindness to the infringement (Compl. ¶¶ 22, 33). The allegations primarily support a theory of post-filing willfulness.
VII. Analyst’s Conclusion: Key Questions for the Case
- Evidentiary Sufficiency: A primary issue will be whether the plaintiff can produce technical evidence beyond the high-level marketing datasheets and user guides cited in the complaint. The case will likely depend on whether discovery reveals that the internal hardware and software architecture of Defendant's products, developed for security purposes, in fact practice the specific signal processing methods and hardware logic structures recited in the patent claims.
- Definitional Scope: The dispute raises a core question of claim interpretation: can claim terms rooted in one technical context (LAN-to-WAN transport for the ’692 patent; general-purpose protocol classification for the ’975 patent) be construed to cover the functionalities of an enterprise security appliance? The outcome may turn on whether Defendant's "Packet Tagging" security feature is determined to be the same as, or merely analogous to, the claimed inventions.
- Functional Mismatch: An important technical question will be one of operational equivalence. Does the accused security feature in the Gaia OS, which signs packets with a key to prevent spoofing, perform the specific "two-pass comparison" and "CPU/NP interface steering" function required by claim 5 of the ’975 patent, or is there a fundamental mismatch in technical operation and purpose?
Analysis metadata