DCT

2:25-cv-00564

Focus Global Solutions LLC v. Zyxel Communications Corp

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:25-cv-00564, E.D. Tex., 05/21/2025
  • Venue Allegations: Venue is alleged to be proper in the Eastern District of Texas because the Defendant has an established place of business in the District and has allegedly committed acts of patent infringement there.
  • Core Dispute: Plaintiff alleges that Defendant’s network products infringe a patent related to methods for centrally managing and redirecting data dumps from network devices.
  • Technical Context: The patent addresses the management of diagnostic data, such as core dumps, in large-scale computer networks, a critical function for maintaining network reliability and performance.
  • Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit.

Case Timeline

Date Event
2000-12-06 Patent Application Filing / Priority Date
2012-07-10 U.S. Patent No. 8,219,662 Issues
2025-05-21 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 8,219,662 - "Redirecting data generated by network devices"

  • Patent Identification: U.S. Patent No. 8219662, "Redirecting data generated by network devices," issued July 10, 2012.

The Invention Explained

  • Problem Addressed: The patent’s background section describes the challenges of capturing "data dumps" (e.g., core dumps for error analysis) from network devices like routers. Prior methods were either administratively burdensome, requiring each device to be hardwired with a specific storage address, or expensive, requiring storage to be integrated directly into each network device, which increased its cost and size (’662 Patent, col. 2:3-56).
  • The Patented Solution: The invention proposes a centralized "storage management device" that sits logically between network devices and long-term storage devices (’662 Patent, Abstract). Network devices are configured to send data dumps to a single "virtual address" corresponding to the storage manager. The storage manager then receives the dump, identifies its source, and redirects it to an appropriate physical storage location, simplifying network administration and reducing hardware costs (’662 Patent, col. 3:60-col. 4:13; Fig. 3).
  • Technical Importance: This architecture offered a more scalable and cost-effective solution for network diagnostics by decoupling the data-generating devices from the physical storage infrastructure, addressing a key pain point for administrators of growing networks (’662 Patent, col. 2:49-56).

Key Claims at a Glance

  • The complaint does not specify which claims are asserted in its main body, referring to "Exemplary '662 Patent Claims" detailed in an external exhibit (Compl. ¶11). The first independent method claim is Claim 1.
  • Independent Claim 1 recites a method with the following essential elements:
    • Receiving, at a location remote from the router, the error data generated by the router;
    • Recording an identity indicator for the router from which the error data was received;
    • Redirecting the received error data to a storage location; and
    • Recording, in a configuration record for the router, the identity of the storage location to which the error data was transferred.
  • The complaint alleges infringement of "one or more claims," suggesting the right to assert dependent claims is reserved (Compl. ¶11).

III. The Accused Instrumentality

Product Identification

  • The complaint does not identify specific accused products by name or model number in the main body, instead referring generally to "Exemplary Defendant Products" (Compl. ¶11).

Functionality and Market Context

  • The complaint incorporates by reference an "Exhibit 2" that purportedly contains charts identifying the accused products and their infringing functionality (Compl. ¶16, ¶17). As this exhibit was not included with the public filing, the specific technical features and market context of the accused instrumentalities cannot be analyzed based on the provided documents. The complaint makes only conclusory allegations that these products "practice the technology claimed by the '662 Patent" (Compl. ¶16).

IV. Analysis of Infringement Allegations

The complaint references a claim-chart exhibit that is not provided, summarize the narrative theory in prose and omit the table.

The complaint alleges that Defendant's "Exemplary Defendant Products" directly infringe the '662 Patent by satisfying all elements of certain "Exemplary '662 Patent Claims" (Compl. ¶16). The detailed, element-by-element mapping of accused functionality to the claim limitations is contained in claim charts within an "Exhibit 2," which is incorporated by reference but not included in the filed document (Compl. ¶17). Therefore, a detailed analysis of the infringement allegations is not possible from the complaint itself.

No probative visual evidence provided in complaint.

  • Identified Points of Contention: Based on the technology, infringement disputes may center on the following questions:
    • Scope Questions: A primary question may concern the architectural implementation of the claimed "location remote from the router." The analysis will likely depend on whether the accused products centralize data handling in a logically and/or physically separate component that meets this limitation, or whether similar functions are performed within the router itself in a manner outside the claim's scope.
    • Technical Questions: A key technical question may be whether the accused products perform the claimed step of "redirecting" data from a virtual address to a separate physical storage location, as opposed to simply logging data to a local or network-attached file system without the intermediate redirection step taught by the patent (’662 Patent, Abstract; col. 4:20-23).

V. Key Claim Terms for Construction

  • The Term: "error data" (from Claim 1)

    • Context and Importance: The scope of this term is fundamental, as it defines the type of information the claimed method is designed to capture. Whether it is limited to data from actual errors or includes broader diagnostic information will be critical to the infringement analysis.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The specification explicitly states that "data dumps can include core dump information, system information, event logs, web site content, customer information, application programs, etc." (’662 Patent, col. 4:16-19). This language may support a construction that is not limited to data generated by a fault condition.
      • Evidence for a Narrower Interpretation: The claim itself uses the specific term "error data," and the background of the invention focuses heavily on "core dumps" as a tool for engineers to "identify errors" and "debug" programs and operating systems (’662 Patent, col. 1:35-46). This context could support a narrower definition tied to fault conditions.
  • The Term: "redirecting" (from Claim 1)

    • Context and Importance: This term describes the core function of the invention. Practitioners may focus on this term because its construction will determine whether a simple data forwarding operation infringes, or if a more complex process involving address translation is required.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The specification uses the phrase "redirect or otherwise transfer the data," which could suggest that "redirecting" is part of a larger, more general category of data movement (’662 Patent, col. 3:13-14).
      • Evidence for a Narrower Interpretation: The patent's summary and abstract describe a specific mechanism where network devices write to a "virtual address" which is then mapped by the storage manager to a physical storage location (’662 Patent, Abstract; col. 3:1-12). This suggests "redirecting" is not just forwarding, but a process of receiving data at one logical address and routing it to a different physical one.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials" that instruct and encourage end users to use the accused products in a manner that directly infringes the ’662 Patent (Compl. ¶14, ¶15).
  • Willful Infringement: The complaint alleges that Defendant gained "Actual Knowledge of Infringement" upon being served with the complaint and the accompanying (but un-filed) claim charts (Compl. ¶13). It further alleges that Defendant has continued its infringing activities despite this knowledge, which forms a basis for a claim of post-suit willful infringement (Compl. ¶14).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A central issue will be one of architectural correspondence: Does the accused system's data handling architecture map onto the claimed three-part structure of a router, a "remote" management location, and a separate "storage location," or does it utilize a different, potentially non-infringing architecture, such as fully integrated storage or direct-to-storage logging?
  • A second key question will concern definitional scope: Can the term "error data," as used in Claim 1, be construed broadly to cover routine system logs and other diagnostic information, consistent with language in the specification, or will it be limited by its plain meaning to data generated only as the result of a fault condition?
  • Given the complaint's reliance on an un-filed exhibit, a threshold question will be evidentiary sufficiency: What specific evidence will Plaintiff produce to demonstrate that the accused products actually perform the claimed steps of "receiving" at a remote location and "redirecting" data, as opposed to performing a technically distinct logging function?