2:24-cv-00830
Lab Technology LLC v. AT&T Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Lab Technology LLC (New Mexico)
- Defendant: AT&T, Inc. (Delaware)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 2:24-cv-00830, E.D. Tex., 10/11/2024
- Venue Allegations: Plaintiff alleges venue is proper because Defendant has an established place of business in the district, has committed acts of patent infringement in the district, and Plaintiff has suffered harm there.
- Core Dispute: Plaintiff alleges that Defendant’s unspecified telecommunications products and services infringe a patent related to mapping a user's voice identity across different telephony networks using time-based rules.
- Technical Context: The technology addresses the problem of individuals having multiple phone numbers (e.g., work, mobile, home), aiming to consolidate them under a single, policy-driven "voice identity" to ensure callers can reach the user efficiently.
- Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2004-11-02 | Earliest Priority Date for U.S. Patent No. 8,483,102 |
| 2013-07-09 | U.S. Patent No. 8,483,102 Issued |
| 2024-10-11 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,483,102 - System and method for mapping a voice identity across multiple telephony networks with time attributes, issued July 9, 2013
The Invention Explained
- Problem Addressed: The patent describes the inefficiency and confusion that arises when a person has multiple telephone numbers for different contexts (e.g., office, cellular, home), requiring callers to try several numbers and leaving the user to check multiple voicemail systems (’102 Patent, col. 1:26-43).
- The Patented Solution: The invention is a system that uses a "voice identity mapping policy" to automatically route incoming calls to a user's currently active phone number. This policy links a primary "search voice identity" to one or more "target voice identities" based on time-based rules, such as the time of day or date ranges (’102 Patent, col. 4:6-20; Abstract). A central "policy processor" consults a database of these rules to determine where to forward a call at any given moment, transparently connecting the caller to the user regardless of which physical phone the user is near (’102 Patent, col. 6:21-34; Fig. 4a).
- Technical Importance: This approach sought to create a unified and intelligent layer on top of disparate telephony networks (PSTN, VoIP, cellular), allowing for a single point of contact that could adapt to a user's schedule and location (’102 Patent, col. 9:41-54).
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims," including "exemplary claims," but does not specify any particular claim numbers (Compl. ¶11). Independent claim 1 is representative of the system claimed.
- Independent Claim 1, Essential Elements:
- One or more phone systems with telephony switches for call routing.
- At least one policy processor coupled to the switches.
- A data storage accessible to the policy processor, storing a voice identity mapping policy.
- The policy comprises a plurality of "search voice identities" mapped to "target voice identities" for multiple users, along with "time attributes" indicating when the mappings are valid.
- The policy processor matches a received voice identity to a "given search voice identity."
- The processor maps the "given search voice identity" to a "given target voice identity" according to the policy.
- The voice identity, given search voice identity, and given target voice identity each "comprises a username."
- The processor sends the "given target voice identity comprising the username" to the telephony switches, which then route the call using that username.
- The complaint does not explicitly reserve the right to assert dependent claims but refers generally to "one or more claims" (Compl. ¶11).
III. The Accused Instrumentality
Product Identification
The complaint does not identify any specific accused products or services by name. It refers to them generically as "Exemplary Defendant Products" and "numerous other devices that infringe" (Compl. ¶11).
Functionality and Market Context
The complaint alleges that the accused instrumentalities "practice the technology claimed by the '102 Patent" (Compl. ¶16). Based on the nature of the patent, these instrumentalities are likely telecommunications services offered by AT&T that involve features such as call forwarding, find-me/follow-me, unified communications, or other systems that route calls based on user-defined rules. The complaint does not provide further detail on the technical operation or market position of any specific AT&T product.
IV. Analysis of Infringement Allegations
The complaint alleges that infringement is detailed in claim charts provided in an "Exhibit 2" (Compl. ¶16). However, Exhibit 2 was not filed with the complaint, and its contents are not otherwise described. No probative visual evidence provided in complaint. Without these charts, a detailed comparison of the claim elements to the accused products is not possible. The narrative allegation is that the "Exemplary Defendant Products incorporated in these charts satisfy all elements of the Exemplary '102 Patent Claims" (Compl. ¶16). Analysis is therefore limited to the general theory of infringement. The core allegation appears to be that AT&T provides systems that allow users to define rules for routing incoming calls to different destination numbers or services, and that this functionality is covered by the claims of the ’102 Patent (Compl. ¶11, ¶16).
V. Key Claim Terms for Construction
"username"
- Context and Importance: Claim 1 requires that the initial voice identity, the "search voice identity," and the "target voice identity" all comprise a username (’102 Patent, col. 10:35-37). The definition of this term is critical, as it may determine whether the claim applies to standard telephone numbers or is limited to more specific types of identifiers. The dispute will likely center on whether AT&T's accused services utilize an identifier that meets this "username" limitation at each stage of the call mapping process.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification states that a voice identity is "typically" a telephone number but is a "designation assigned to a specific user" generally (’102 Patent, col. 2:57-59). This could support an argument that any user-associated identifier, even one derived from a phone number, qualifies as a "username."
- Evidence for a Narrower Interpretation: The specification provides specific examples of usernames, such as an "IM identity," "email account identity," or an "employee's computer user identity" (’102 Patent, col. 10:59-62). Defendant may argue these examples limit the term "username" to identifiers associated with data networks or computer systems, rather than conventional telephone numbers.
"voice identity mapping policy"
- Context and Importance: The heart of the invention is the application of a "policy" to route calls. Practitioners may focus on this term because its construction will define the level of complexity required to infringe. The question is whether any simple call-forwarding rule constitutes a "policy," or if a more structured set of rules with specific attributes is required.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The term is defined broadly as "a group of one or more voice identity mappings" (’102 Patent, col. 4:47-49). This could suggest that even a single rule mapping one number to another could constitute a "policy."
- Evidence for a Narrower Interpretation: The patent's detailed examples show policies with multiple, interlocking rules, time attributes, and transitive mappings (e.g., "Voice Identity Mapping Policy 1" at col. 5:12-col. 6:13). Defendant could argue that a "policy" requires this level of structured, conditional logic, not just a simple, static forwarding command.
VI. Other Allegations
- Indirect Infringement: Plaintiff alleges induced infringement, stating that Defendant distributes "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the '102 Patent" (Compl. ¶14).
- Willful Infringement: The willfulness allegation appears to be based on post-suit conduct. The complaint alleges that service of the complaint itself provides Defendant with "actual knowledge of infringement" and that any continued infringement thereafter is willful (Compl. ¶13-¶15).
VII. Analyst’s Conclusion: Key Questions for the Case
- Pleading Sufficiency: A threshold issue for the court may be whether the complaint, which fails to identify any specific accused products or asserted claims and relies on an un-filed exhibit, provides sufficient notice to Defendant under federal pleading standards.
- Definitional Scope: A core technical question will be the construction of the term "username". The case may turn on whether AT&T's call routing services can be shown to use an identifier that qualifies as a "username"—as defined by the patent—for the inbound number, the search key, and the final destination.
- Functional Mismatch: An evidentiary battle may arise over the functionality of the "policy processor." The central question will be whether the accused AT&T systems perform the specific mapping process described in the patent—which involves applying time attributes and potentially resolving transitive-mapping chains—or if they operate as more conventional call-forwarding systems that fall outside the scope of the claims.