DCT

2:25-cv-00060

FrameTech LLC v. Inspur Group Co Ltd

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:25-cv-00060, E.D. Tex., 01/21/2025
  • Venue Allegations: Venue is asserted based on the defendant being a foreign corporation and its alleged commission of infringing acts within the district.
  • Core Dispute: Plaintiff alleges that Defendant’s unspecified products and services infringe a patent related to the automated installation and configuration of mainframe computer operating systems.
  • Technical Context: The technology addresses the complex, time-consuming, and highly specialized process of upgrading mainframe computer operating systems, a task critical for enterprise-level computing.
  • Key Procedural History: The complaint does not mention any prior litigation, inter partes review proceedings, or licensing history related to the patent-in-suit.

Case Timeline

Date Event
2002-10-02 '737 Patent Priority Date
2007-03-20 U.S. Patent No. 7,194,737 Issued
2025-01-21 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 7,194,737 - "SYSTEM AND METHOD FOR EXPEDITING AND AUTOMATING MAINFRAME COMPUTER SETUP"

  • Issued: March 20, 2007

The Invention Explained

  • Problem Addressed: The patent's background describes the installation and configuration of mainframe computer operating systems as an "arduous task" that is "considerably complex and time-consuming," requiring skilled programmers whose availability is diminishing as the workforce ages ('737 Patent, col. 1:30-44, col. 2:1-12).
  • The Patented Solution: The invention provides a system and method where a client computer (e.g., a PC) automates the mainframe upgrade process. It first performs a "discovery" to gather "profile information" about the target mainframe's existing hardware and software configuration, then uses that information to generate and transfer a customized "base operating system," and finally automates the steps required to prepare the mainframe for an Initial Program Load (IPL), or reboot ('737 Patent, Abstract; col. 2:28-50). The process is depicted in the system diagram of Figure 2, which shows a client computer (4) connected to a mainframe (2) via a network (10).
  • Technical Importance: This automated approach was designed to decrease the time, cost, and level of specialized human expertise required to perform essential system maintenance on high-value mainframe computers ('737 Patent, col. 4:5-12).

Key Claims at a Glance

  • The complaint does not specify which claims it asserts but alleges infringement of "one or more claims" (Compl. ¶11). The first independent method claim, Claim 1, is representative of the invention.
  • The essential elements of independent Claim 1 include:
    • automatically receiving source profile information representing an existing hardware and software configuration on a mainframe computer system;
    • using a client computer system to generate a base operating system;
    • transferring the base operating system from the client computer system to the mainframe computer; and
    • using the client computer system to automatically customize the base operating system to incorporate elements from the source profile information, such that the mainframe is "automatically adapted for an initial program load."
  • The complaint does not explicitly reserve the right to assert dependent claims.

III. The Accused Instrumentality

Product Identification

  • The complaint does not identify any specific accused products by name. It refers generally to "Exemplary Defendant Products" that are purportedly detailed in claim charts within an "Exhibit 2" (Compl. ¶11, ¶16). This exhibit was not filed with the complaint.

Functionality and Market Context

  • The complaint does not provide sufficient detail for analysis of the accused instrumentality's functionality or market position. It alleges only that the "Exemplary Defendant Products practice the technology claimed by the '737 Patent" (Compl. ¶16).

IV. Analysis of Infringement Allegations

The complaint alleges that infringement is detailed in claim charts attached as Exhibit 2, which is incorporated by reference (Compl. ¶17). As this exhibit is not available, a detailed element-by-element analysis is not possible. The infringement theory is based on the general allegation that Defendant's unidentified products "satisfy all elements of the Exemplary '737 Patent Claims" (Compl. ¶16).

No probative visual evidence provided in complaint.

  • Identified Points of Contention:
    • Evidentiary Question: The primary issue is the lack of identification of the accused instrumentalities. A threshold question for the court will be what specific products or services are accused of infringement and what evidence Plaintiff can produce to show they perform the claimed methods.
    • Technical Question: Assuming an accused product is identified, a key technical question will be whether it performs the complete, end-to-end automated process recited in the claims—from discovery and generation through transfer and final customization—or if it only performs discrete portions of that workflow.

V. Key Claim Terms for Construction

  • The Term: "source profile information"

    • Context and Importance: The scope of this term is critical to defining the first step of the claimed method. The dispute will likely center on how much and what type of data must be collected from the target mainframe to satisfy this limitation.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The specification describes the information broadly as "profile information of the configuration of the mainframe computer system" ('737 Patent, col. 2:31-33).
      • Evidence for a Narrower Interpretation: Practitioners may argue that the term is implicitly defined by the detailed "Quickload Discovery" flowchart in Figure 3, which lists numerous specific data types to be retrieved, such as "RACF Database Information," "Parmlib," and "UCB and EDT Tables" ('737 Patent, Fig. 3, S102-S140).
  • The Term: "base operating system"

    • Context and Importance: This term defines the core software package that is generated and transferred. Its construction will determine what constitutes the object of the claimed method's central steps.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The claims describe it as "a configuration of operating system software components" ('737 Patent, col. 17:58-60). This language suggests any collection of necessary OS components could suffice.
      • Evidence for a Narrower Interpretation: The specification repeatedly uses specific, period-relevant IBM mainframe operating systems like "OS/390" and "z/OS" as examples, which could support an argument that the term is limited to such comprehensive, pre-packaged commercial operating systems ('737 Patent, col. 3:36-37, col. 10:52).
  • The Term: "automatically adapted for an initial program load"

    • Context and Importance: This phrase describes the required outcome of the entire process. Its definition is central to determining whether infringement has occurred, as it sets the standard for successful completion of the claimed method.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The term could be construed broadly to mean simply being placed in a state where an IPL is possible, without prescribing the exact steps.
      • Evidence for a Narrower Interpretation: The detailed flowcharts in Figures 4A-5C show a multi-step process for customization, including creating catalog volumes, defining data sets, and creating specific system members ('737 Patent, Figs. 4C, 5C). A party could argue these detailed steps define what it means to be "automatically adapted."

VI. Other Allegations

  • Indirect Infringement: The complaint alleges induced infringement, asserting that Defendant distributes "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the '737 Patent" (Compl. ¶14).
  • Willful Infringement: A claim for willful infringement is premised on post-suit conduct. The complaint alleges that its service "constitutes actual knowledge of infringement" and that Defendant's continued infringing activities despite this notice are willful (Compl. ¶13-14).

VII. Analyst’s Conclusion: Key Questions for the Case

  1. A Primary Evidentiary Question: The case currently hinges on an evidentiary void. Can the Plaintiff identify the accused "Exemplary Defendant Products" with specificity and produce evidence that they perform the functions generally alleged in the complaint, given the absence of such details in the pleading itself?

  2. A Core Question of Claim Scope: The dispute may turn on the definition of "source profile information". Will the court construe this term to require the comprehensive, multi-point data discovery illustrated in the patent’s specific embodiments (e.g., Fig. 3), or will a more basic form of configuration scanning suffice to meet the claim limitation?

  3. A Key Technical Question: A central issue of fact will be whether any identified accused product performs the entire, integrated process claimed—from automated discovery through final customization—that results in a mainframe being "automatically adapted for an initial program load", or whether there is a fundamental mismatch in the technical operation and level of automation.