2:24-cv-00297
Telsync Tech LLC v. Ericsson Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Telsync Technologies LLC (Delaware)
- Defendant: Ericsson Inc. (Delaware)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 2:24-cv-00297, E.D. Tex., 05/01/2024
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendant maintains an established place of business in the District and has committed acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s wireless network products and services infringe a patent related to maintaining communication sessions for mobile devices as they move between different network locations.
- Technical Context: The technology addresses methods for ensuring uninterrupted connectivity for mobile devices, such as during handoffs between different cells in a wireless network, a fundamental challenge in mobile telecommunications.
- Key Procedural History: The complaint does not mention any prior litigation, licensing history, or post-grant proceedings related to the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2009-01-23 | ’263 Patent Priority Date |
| 2014-11-25 | ’263 Patent Issue Date |
| 2024-05-01 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,897,263 - Interactions among mobile devices in a wireless network
The Invention Explained
- Problem Addressed: In a wireless network, when a mobile device moves, it may be assigned different identification information at different locations, and the quality of its connection can vary. This mobility "exacerbate[s] several long existing issues for real time applications," such as video conferencing, making seamless data exchange challenging (’263 Patent, col. 1:36-44).
- The Patented Solution: The patent describes a method for maintaining a communication session with a mobile device as it moves from a first wireless range (e.g., a cell tower's coverage area) to a second. The system determines a "first identification information" (e.g., a home IP address) and, when the device moves, accesses a "second identification information" (e.g., a guest IP address) associated with the new location. This second ID is then used in a "signaling protocol" to maintain the original communication session, preventing interruption (’263 Patent, col. 3:45-4:4; col. 5:8-32). Figure 3 illustrates the high-level process of assigning a first ID, receiving a signal that the device is out of range, and then obtaining a second ID to maintain the session.
- Technical Importance: This approach provides a structured method for managing device identity across different network nodes, aiming to provide the session continuity required for real-time applications like VoIP and video streaming in mobile environments (’263 Patent, col. 5:28-32).
Key Claims at a Glance
- The complaint does not identify specific asserted claims, instead referring to "Exemplary '263 Patent Claims" detailed in a separate, unprovided exhibit (Compl. ¶11, ¶16). Claim 1, the first independent method claim, is representative of the core invention.
- Independent Claim 1 (Essential Elements):
- determining a first identification information associated with a mobile device;
- in response to the mobile device leaving a first wireless range, accessing a second identification information associated with the first, where the second ID is assigned when the device registers in a second wireless range; and
- maintaining the communication session with the mobile device by utilizing the second identification information in a signaling protocol.
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
The complaint does not identify specific accused products or services by name. It refers generally to "Exemplary Defendant Products" that are detailed in an unprovided claim chart exhibit (Compl. ¶11, ¶16).
Functionality and Market Context
Based on Defendant’s business as a telecommunications equipment provider and the nature of the patent, the accused instrumentalities are likely wireless network infrastructure components (e.g., base stations, switch centers) and related software systems that manage mobile device connectivity and handoffs within cellular networks (Compl. ¶11). The complaint makes no specific allegations regarding the products' commercial importance, beyond the general assertion of infringement by products made, used, and sold by Defendant (Compl. ¶11). No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint incorporates infringement allegations by reference to an external document, Exhibit 2, which was not provided (Compl. ¶16-17). The complaint itself contains no substantive claim chart or detailed infringement theory beyond the conclusory statement that the accused products "practice the technology claimed" and "satisfy all elements" of the asserted claims (Compl. ¶16). Therefore, a claim chart summary cannot be constructed.
- Identified Points of Contention: Lacking a detailed infringement theory, the analysis must focus on the likely points of dispute based on the claim language and the general nature of modern wireless networks.
- Technical Questions: A primary question will be whether Ericsson's accused network handoff mechanisms function in the manner described by the claims. Specifically, what evidence will show that Ericsson's systems "determine a first identification information," then "access[] a second identification information," and use that second ID in a "signaling protocol" to "maintain[] the communication session"? The patent describes a specific architecture involving home and guest IP addresses, and the plaintiff will need to map this claimed process onto the potentially different architecture of the accused systems.
- Scope Questions: The dispute may center on whether the term "identification information" can be construed to read on the specific types of identifiers used in modern 4G/5G network handoff procedures, which may differ from the "home IP address" and "guest IP address" examples provided in the patent (’263 Patent, col. 5:3-4, col. 12:12-14).
V. Key Claim Terms for Construction
"identification information"
- Context and Importance: This term is the central object of the claim. Its scope will determine whether the identifiers used in Defendant's modern network systems (e.g., temporary mobile subscriber identities, session IDs) fall within the patent's reach. Practitioners may focus on this term because the patent's examples are rooted in a specific "home IP" and "guest IP" architecture.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim language itself is broad, not limiting the "identification information" to any specific type. The term is used generally throughout the specification.
- Evidence for a Narrower Interpretation: The specification repeatedly provides specific examples, stating "the first identification information is a home Internet Protocol (IP) address, and the second identification information is a guest IP address" (e.g., ’263 Patent, col. 12:12-14, claim 12). A defendant could argue these examples limit the term to this specific IP-based handoff model.
"maintaining the communication session ... by utilizing the second identification information in a signaling protocol"
- Context and Importance: This limitation defines the action that constitutes infringement. The core of the dispute will be whether Defendant's handoff procedures "utilize" a new identifier in a "signaling protocol" in the way the patent contemplates. The patent provides Session Initiation Protocol (SIP) as an example (’263 Patent, col. 5:32).
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent does not limit the "signaling protocol" to SIP, suggesting other protocols could be covered. The term "utilizing" is general and could encompass a wide range of uses of the second ID to facilitate the handoff.
- Evidence for a Narrower Interpretation: A defendant may argue that "maintaining the communication session" requires a specific set of actions tied to the patent's disclosed embodiments, rather than any generic handoff process. The prosecution history, though not provided, may contain arguments that distinguish the claimed method from prior art handoff techniques, potentially narrowing its scope.
VI. Other Allegations
- Indirect Infringement: Plaintiff alleges induced infringement, asserting that Defendant distributes "product literature and website materials" that instruct end users and others to use the accused products in an infringing manner (Compl. ¶14).
- Willful Infringement: The willfulness allegations appear to be based on post-suit knowledge. Plaintiff alleges that Defendant has had "actual knowledge" of infringement from the service of the complaint (Compl. ¶13) and has "actively, knowingly, and intentionally continued to induce infringement" at least since that time (Compl. ¶15).
VII. Analyst’s Conclusion: Key Questions for the Case
Given the limited detail in the complaint, the litigation will likely focus on developing the factual record and resolving key claim scope disputes.
- A core issue will be one of technical mapping: Can Plaintiff demonstrate that the sequence of operations in Ericsson's modern, complex network handoff protocols is equivalent to the specific, sequential process recited in Claim 1, which involves determining a first ID, accessing a second ID upon moving, and using that second ID to maintain the session?
- A second key issue will be one of definitional scope: Does the term "identification information", as used and described in the patent with its "home/guest IP" examples, encompass the transient identifiers and session management techniques used in current 4G and 5G network architectures? The answer may determine whether this 2009-priority patent can read on today's technology.