2:24-cv-00294
Telsync Tech LLC v. Accenture PLC
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Telsync Technologies LLC (Delaware)
- Defendant: Accenture PLC (Ireland)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 2:24-cv-00294, E.D. Tex., 04/30/2024
- Venue Allegations: Plaintiff alleges venue is proper because Defendant has an established place of business in the district and has committed acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s unnamed products and services infringe a patent related to maintaining communication sessions for mobile devices in a wireless network.
- Technical Context: The technology concerns session persistence for mobile devices, a foundational element for ensuring uninterrupted service for applications like real-time video or voice calls as a user moves between different network coverage areas.
- Key Procedural History: The asserted patent is a divisional of a prior application that issued as U.S. Patent No. 8,306,013. The complaint does not mention any prior litigation, inter partes review proceedings, or licensing history related to the patent family.
Case Timeline
| Date | Event |
|---|---|
| 2009-01-23 | '263 Patent Priority Date (via parent application) |
| 2014-11-25 | '263 Patent Issue Date |
| 2024-04-30 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,897,263 - “Interactions among mobile devices in a wireless network”
- Patent Identification: U.S. Patent No. 8,897,263, “Interactions among mobile devices in a wireless network,” issued November 25, 2014.
The Invention Explained
- Problem Addressed: In wireless networks, mobile devices are assigned different network identification information (e.g., IP addresses) as they move between different locations or network cells. This mobility can disrupt real-time applications like video conferencing, as the change in identification can interrupt the continuous flow of data (’263 Patent, col. 1:36-44).
- The Patented Solution: The patent describes a method to maintain a continuous communication session despite this movement. The system assigns a mobile device a permanent "first identification information" (e.g., a "home IP address") and a temporary "second identification information" (e.g., a "guest IP address") when it enters a new network range. By using both identifiers, a central controller or stationary device can continue to route data packets to the mobile device's new location without terminating the original session, enabling a seamless handoff (’263 Patent, col. 5:1-30).
- Technical Importance: This technology addresses the challenge of session persistence, which is critical for the reliable operation of mobile voice-over-IP (VoIP), streaming, and other interactive services that require an unbroken connection while a user is in motion (’263 Patent, col. 5:26-32).
Key Claims at a Glance
- The complaint does not specify which claims are asserted, instead referring to "Exemplary '263 Patent Claims" in an unattached exhibit (Compl. ¶11). The first independent method claim, Claim 1, is representative of the core invention.
- Independent Claim 1:
- determining a first identification information associated with a mobile device;
- in response to the mobile device leaving a first wireless range, accessing a second identification information associated with the first, where the second identification is assigned when the device enters a second wireless range and registers with a new stationary device; and
- maintaining the communication session with the mobile device by utilizing the second identification information in a signaling protocol.
- The complaint’s broad language suggests it may reserve the right to assert other independent or dependent claims.
III. The Accused Instrumentality
Product Identification
- The complaint does not name any specific accused products, methods, or services from Defendant Accenture PLC (Compl. ¶11).
Functionality and Market Context
- The complaint refers generally to "Exemplary Defendant Products" that are identified in "charts incorporated into this Count" (Compl. ¶11, ¶16). However, these charts were filed as Exhibit 2 and are not attached to the publicly available complaint. Therefore, the complaint does not provide sufficient detail for analysis of the accused instrumentality's functionality or market context.
IV. Analysis of Infringement Allegations
The complaint’s infringement allegations are made entirely by reference to an unattached exhibit (Exhibit 2), which purportedly contains claim charts (Compl. ¶16-17). Without this exhibit, a direct comparison of claim elements to accused functionality is not possible based on the provided documents. The analysis below outlines the infringement theory for the representative independent claim and identifies the key questions that will arise.
No probative visual evidence provided in complaint.
Narrative Infringement Theory (based on Claim 1): To establish infringement of Claim 1, the Plaintiff would need to demonstrate that Accenture's accused products or systems perform a method of mobile session management that includes: (1) determining an initial identifier for a mobile device; (2) accessing a second, new identifier for that same device after it moves to a new network area; and (3) using that second identifier within a signaling protocol to ensure the original communication session remains active.
Identified Points of Contention:
- Evidentiary Question: The primary issue is the lack of factual allegations in the complaint itself. A threshold question for the court will be whether the complaint, which relies solely on an external document to provide the factual basis for infringement, meets federal pleading standards.
- Technical Question: Assuming an accused product is identified, a key technical dispute will be whether its session handoff mechanism operates in the manner claimed. For instance, does the accused system actually assign and utilize a distinct "second identification information" for session maintenance, or does it achieve session persistence through a different technical approach not covered by the claims?
- Scope Questions: A central dispute may concern the meaning of "identification information." The question will be whether this term, as used in the patent, is limited to the "home" and "guest" IP addresses described in the specification or if it can be read more broadly to cover other types of session or device identifiers used in modern mobile networks.
V. Key Claim Terms for Construction
The Term: "identification information"
Context and Importance: This term is the foundation of the claims. The infringement case depends on whether the accused system uses two distinct sets of "identification information" (a first and a second) to manage handoffs. The definition of this term will determine what types of network identifiers fall within the patent's scope.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The term itself is generic and not explicitly limited in the claims. The patent refers to "identification information" generally before providing specific examples, which may support an interpretation not strictly tied to the examples.
- Evidence for a Narrower Interpretation: The specification consistently and repeatedly uses "home Internet Protocol (IP) address" and "guest IP address" as the embodiment of the "first" and "second" identification information, respectively (’263 Patent, col. 5:1-5; claims 12-13). A defendant may argue this context limits the claim term to this specific type of network address.
The Term: "maintaining the communication session... by utilizing the second identification information in a signaling protocol"
Context and Importance: This functional language is critical because it requires a specific link between the "second identification information" and the act of session maintenance. Infringement requires not just the existence of a second identifier, but its specific use in a protocol to keep the session alive. Practitioners may focus on this term because modern network architectures may use various identifiers for different purposes (e.g., location tracking, authentication), and not all of them are necessarily "utilized" for "maintaining the communication session."
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The term "signaling protocol" is not defined and could be argued to encompass any set of rules governing session control in a network.
- Evidence for a Narrower Interpretation: The specification explicitly mentions the Session Initiation Protocol (SIP) as an example of a signaling protocol (’263 Patent, col. 5:30-32). A defendant may argue that this limits the scope to protocols that function similarly to SIP, where session parameters are actively managed.
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials" that instruct end users on how to use its products in a manner that infringes the ’263 Patent (Compl. ¶14).
- Willful Infringement: The complaint does not contain a separate count for willful infringement. However, it alleges that service of the complaint provides Defendant with "actual knowledge" and that any subsequent infringement is intentional, which lays the groundwork for a claim of post-filing willfulness (Compl. ¶13-15).
VII. Analyst’s Conclusion: Key Questions for the Case
- An Evidentiary and Pleading Question: The most immediate issue is whether the complaint's complete reliance on an unattached exhibit to supply the factual basis for infringement satisfies the plausibility requirements of federal pleading standards, and what specific products and functionalities will be identified as the "Exemplary Defendant Products."
- A Question of Definitional Scope: The case will likely turn on claim construction, specifically: can the term "identification information", which is exemplified in the patent as home/guest IP addresses, be construed to cover the session management identifiers and techniques used in Accenture’s modern networking services and platforms?
- A Question of Functional Operation: A core technical question will be whether the accused systems, once identified, actually perform the claimed function of "maintaining" a session "by utilizing" a second identifier in a signaling protocol, or if they achieve session persistence through a fundamentally different mechanism that falls outside the scope of the claims.