DCT

2:24-cv-00627

Headwater Research LLC v. Samsung Electronics Co Ltd

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:24-cv-00627, E.D. Tex., 08/02/2024
  • Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Samsung Electronics America, Inc. maintains a regular and established place of business in the district, and because Samsung Electronics Co., Ltd. is a foreign corporation. The complaint also alleges that Samsung has transacted business and committed acts of infringement in the district.
  • Core Dispute: Plaintiff alleges that Defendant’s mobile electronic devices, including smartphones and tablets, infringe patents related to securely managing and allocating accounting for wireless data services on a device.
  • Technical Context: The technology addresses the need to separate, secure, and account for different types of data usage (e.g., personal vs. enterprise) on a single mobile device, a key challenge in an era of ubiquitous connectivity and "Bring Your Own Device" (BYOD) corporate policies.
  • Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history concerning the patents-in-suit.

Case Timeline

Date Event
2009-01-28 Earliest Priority Date for ’144 Patent
2009-01-28 Earliest Priority Date for ’250 Patent
2018-07-17 ’144 Patent Issued
2018-09-18 ’250 Patent Issued
2024-08-02 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 10,028,144 - "Security techniques for device assisted services" (Issued July 17, 2018)

The Invention Explained

  • Problem Addressed: As mobile data consumption grows, there is a need for on-device service management, but performing these functions securely is a challenge. The patent addresses the problem of how to implement on-device service measurement and control in a way that is resistant to hacking, malware, and other security threats that could compromise these functions (’144 Patent, col. 3:10-15, col. 5:21-24).
  • The Patented Solution: The invention proposes a device architecture with multiple, distinct software execution environments, or partitions (’144 Patent, col. 5:25-34). Standard user applications run in an "application execution partition." The operating system and low-level drivers run in a "kernel execution partition." Critically, sensitive tasks like measuring data usage and enforcing access policies are handled by "device assisted service agents" that run in a separate "protected execution partition." This protected partition is isolated and has limited, privileged access to the kernel, making it difficult for malware in the application partition to tamper with service control functions (’144 Patent, Fig. 1; col. 6:11-24).
  • Technical Importance: This architectural separation provides a secure framework for carriers or enterprises to manage data policies and accurately measure usage directly on end-user devices, a foundational requirement for implementing flexible data plans and corporate BYOD policies (’144 Patent, col. 3:9-15).

Key Claims at a Glance

  • The complaint asserts infringement of multiple claims, including independent claim 1 (Compl. ¶55).
  • Independent Claim 1 requires:
    • A wireless end-user device with a WWAN modem.
    • One or more processors configured to execute processes in a kernel execution partition, an application execution partition, and a protected execution partition.
    • The kernel partition includes an operating system packet network stack to pass internet data.
    • An application identification agent, a service measurement agent, and a policy control agent to classify, measure, and control data traffic.
    • The protected execution partition includes one or more device agents having "limited privileges" to access the kernel partition, including privileges to configure the policy control agent and receive traffic data from the network stack.
  • The complaint reserves the right to assert additional claims (Compl. ¶55).

U.S. Patent No. 10,080,250 - "Enterprise access control and accounting allocation for access networks" (Issued September 18, 2018)

The Invention Explained

  • Problem Addressed: Enterprises need to allow employees to use personal devices for work but must separate and properly allocate the costs for business versus personal use. The patent addresses the need for a system to manage this "dual persona" usage and correctly allocate billing for wireless services (’250 Patent, col. 3:51-4:5).
  • The Patented Solution: The patent describes a method and system for allocating billing for a device's service usage between an enterprise and a consumer. The system involves monitoring a device's service usage activity, determining an allocation between enterprise and consumer accounts, and implementing that allocation (’250 Patent, Abstract). A key component is a "service design center," which is a configuration tool allowing an enterprise administrator to define the policies that govern this allocation for a fleet of devices (’250 Patent, Fig. 1; col. 5:5-13).
  • Technical Importance: The invention provides a framework for implementing and managing BYOD policies, allowing enterprises to sponsor work-related mobile data usage while ensuring employees are responsible for their personal usage on the same device (’250 Patent, col. 4:1-5).

Key Claims at a Glance

  • The complaint asserts infringement of multiple claims, including independent claim 1 (Compl. ¶¶ 38, 41).
  • Independent Claim 1 is a method claim requiring the steps of:
    • Monitoring a service usage activity of a wireless device associated with an enterprise account.
    • Determining an enterprise and consumer billing allocation for that activity.
    • Providing a service design center for configuring the billing allocation for multiple devices.
    • Implementing the configured billing allocation for those devices.
  • The complaint reserves the right to assert additional claims (Compl. ¶41).

III. The Accused Instrumentality

Product Identification

  • The complaint identifies the Accused Instrumentalities as "mobile electronic devices, including mobile phones and tablets" sold by Samsung (Compl. ¶¶ Intro, 22). It specifically calls out "Samsung Knox-enabled devices" as infringing products (Compl. ¶¶ 42, 56).

Functionality and Market Context

  • The complaint alleges these devices provide a wide range of data-intensive functionalities such as calling, messaging, application use, and media streaming over wireless and cellular networks (Compl. ¶11). The complaint highlights the massive growth in mobile data traffic, underscoring the market need for technologies that manage data consumption (Compl. ¶¶ 12-13). A pie chart included in the complaint illustrates the breakdown of monthly data consumption by activity type, such as video streaming and app traffic (Compl. p. 6, "Ericsson Mobility Calculator"). The complaint does not describe the specific technical operation of Samsung Knox, but public information indicates it is a security platform that creates an encrypted, isolated environment on Samsung devices to separate work applications and data from personal use.

IV. Analysis of Infringement Allegations

The complaint references, but does not include, claim chart exhibits detailing the infringement allegations (Compl. ¶¶ 38, 52). The infringement theory is therefore summarized from the complaint’s narrative allegations.

  • ’144 Patent Infringement Allegations:
    The complaint alleges that the "normal and customary use" of Samsung mobile devices, particularly those enabled with the Samsung Knox security platform, infringes the ’144 Patent (Compl. ¶¶ 55-56). The central theory appears to be that the architecture of Samsung Knox, which creates a secure container for enterprise applications separate from the main user environment, embodies the claimed system of a "protected execution partition" that is distinct from the "application execution partition." The complaint suggests that this Knox environment performs the claimed secure device-assisted services, such as managing and controlling data access for enterprise applications, in a manner that meets the limitations of claim 1.

  • ’250 Patent Infringement Allegations:
    The complaint alleges that the use of Samsung mobile devices infringes the method claims of the ’250 Patent (Compl. ¶¶ 36, 41). The infringement theory likely centers on features within Samsung devices, potentially related to the Knox platform, that monitor and differentiate data usage between personal applications and enterprise applications running inside the secure Knox container. Plaintiff’s theory may be that this on-device monitoring and separation of data traffic constitutes the claimed steps of "monitoring a service usage activity" and "determining an enterprise and consumer billing allocation."

  • Identified Points of Contention:

    • Scope Questions: A primary question for the ’144 Patent will be whether the Samsung Knox container constitutes a "protected execution partition" as defined by the patent. This may involve disputes over the level of isolation, the specific "limited privileges" it has to the kernel, and whether its software components function as the claimed "device agents." For the ’250 Patent, a key question will be whether differentiating between work and personal data streams on a device satisfies the claim limitation of "determining an enterprise and consumer billing allocation," or if that term requires a more specific accounting or monetary calculation that the accused devices may not perform.
    • Technical Questions: A factual question for the court will be how Samsung's Knox technology technically operates. The analysis will require evidence of how Knox interacts with the device’s operating system (the "kernel execution partition") and whether it contains software modules that perform the specific functions of the "application identification agent," "service measurement agent," and "policy control agent" as required by claim 1 of the ’144 Patent.

V. Key Claim Terms for Construction

  • The Term: "protected execution partition" (’144 Patent, Claim 1)

    • Context and Importance: This term is the central architectural element of the ’144 Patent. The outcome of the infringement analysis for this patent will likely depend on whether Samsung’s Knox container technology falls within the scope of this term. Practitioners may focus on this term because the patent’s description of its "limited privileges" and interaction with the kernel partition could be a key point of distinction from general-purpose security containers.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The specification describes the partition in functional terms as an environment for executing service agents with "increased program execution protection" from "attacks, errors, malware, etc." (’144 Patent, col. 6:50-59). This functional language could support a construction that covers various security container technologies.
      • Evidence for a Narrower Interpretation: The claim requires this partition to have "limited privileges to access processes executing in the kernel execution partition" (’144 Patent, col. 20:54-58). The detailed description and figures show specific agents (e.g., policy implementation, service measure) residing in the partition, suggesting a specific structure and purpose beyond a generic container (’144 Patent, Fig. 4).
  • The Term: "determining an enterprise and consumer billing allocation" (’250 Patent, Claim 1)

    • Context and Importance: This term defines the core function of the method claimed in the ’250 Patent. Whether the accused devices perform this step will be a central issue. A defendant may argue its devices only separate data traffic, with any actual "billing allocation" occurring on a backend server, thus not infringing the device-centric method claim.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The abstract describes the invention as determining an "enterprise and consumer billing allocation," suggesting the determination is a key part of the invention, wherever it occurs. The specification discusses various scenarios, including device-based and network-based determinations, which may support a broader reading (’250 Patent, col. 5:29-44).
      • Evidence for a Narrower Interpretation: The term "billing allocation" itself may imply a financial or accounting function. The specification ties this allocation directly to "crediting a user bill" and "reimbursement" (’250 Patent, col. 4:59-65), which could support a narrower construction requiring more than mere technical data separation.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges that Samsung induces infringement by "actively encouraging and instructing" customers on how to use the accused devices in an infringing manner (Compl. ¶¶ 40, 54). It also alleges contributory infringement (Compl. ¶¶ 39, 53).
  • Willful Infringement: The complaint alleges willful infringement on the basis that Samsung has "known, or has been willfully blind to the fact," that selling the Accused Instrumentalities would lead to infringement (Compl. ¶¶ 42, 56). The complaint does not allege pre-suit knowledge from a notice letter or other specific communication.

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of architectural equivalence: Does the Samsung Knox security environment, which creates a separate container for work applications, technically operate as the multi-partition architecture claimed in the ’144 Patent, complete with agents possessing the claimed "limited privileges" to interact with the device kernel?
  • A key question of claim scope will be one of functional definition: Can the act of differentiating and measuring enterprise versus personal data streams on a mobile device be construed as "determining a... billing allocation" as required by the '250 Patent, or does that claim term necessitate a direct financial calculation or accounting function not performed by the accused products?
  • An evidentiary question will be one of locus of infringement: For the method claims of the ’250 Patent, where do the allegedly infringing acts occur? The case may turn on whether Plaintiff can prove that the accused devices themselves perform the claimed "determining" and "implementing" steps, or if those functions are primarily performed by network-side servers, potentially placing the infringement outside the scope of the asserted claims.