2:25-cv-00568
WebSock Global Strategies LLC v. Fleetpride Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: WebSock Global Strategies LLC (Delaware)
- Defendant: Fleetpride, Inc. (Alabama)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 2:25-cv-00568, E.D. Tex., 05/22/2025
- Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains an established place of business in the Eastern District of Texas and has allegedly committed acts of patent infringement in the district.
- Core Dispute: Plaintiff alleges that Defendant’s unspecified "Defendant Products" infringe a patent related to methods for reversing client-server roles in a network communication session to enable symmetrical, bi-directional communication.
- Technical Context: The technology addresses the inherent asymmetry of network protocols like HTTP, where a "server" typically cannot initiate communication with a "client," a limitation that complicates peer-to-peer applications and communications with devices behind firewalls.
- Key Procedural History: The patent-in-suit is a continuation of an earlier application that issued as U.S. Patent No. 7,403,995. The patent-in-suit is also subject to a terminal disclaimer, which may limit the patent's enforceable term to that of the parent patent.
Case Timeline
| Date | Event | 
|---|---|
| 2003-01-08 | '983 Patent Priority Date | 
| 2008-04-24 | '983 Patent Application Filing Date | 
| 2010-07-13 | '983 Patent Issue Date | 
| 2025-05-22 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,756,983 - "Symmetrical bi-directional communication" (Issued July 13, 2010)
The Invention Explained
- Problem Addressed: The patent describes a "fundamental problem" in network communications where protocols like Hypertext Transfer Protocol (HTTP) enforce asymmetric roles: a "client" initiates requests, and a "server" responds (’983 Patent, col. 2:5-12). This structure prevents a server from initiating a spontaneous request to a client, a significant hurdle for applications requiring peer-to-peer interaction, especially when one device is on a private network behind a firewall or Network Address Translator (NAT) (’983 Patent, col. 2:45-52). The conventional workaround, frequent "polling" by the client, is described as inefficient and wasteful of network bandwidth (’983 Patent, col. 3:4-11).
- The Patented Solution: The invention enables symmetrical communication by "flipping" the transactional roles of the client and server within an existing connection. A client first establishes a standard network connection (e.g., a TCP/IP socket) with a server. The parties then negotiate a role reversal at the application (HTTP) layer. This involves terminating the initial HTTP session while preserving the underlying TCP/IP connection, and then creating a new HTTP session over that same connection where the original server now acts as the client (and can initiate requests) and the original client acts as the server (’983 Patent, col. 4:26-31; Fig. 9, steps 512, 514).
- Technical Importance: This method allows devices to engage in true bi-directional, peer-like communication using the ubiquitous HTTP protocol, effectively bypassing the one-way communication restrictions typically imposed by network infrastructure like NATs and firewalls (’983 Patent, col. 1:49-57).
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" without specifying them, incorporating by reference an unattached exhibit of claim charts (Compl. ¶¶ 11, 13). Independent method claim 1 is representative of the core invention.
- Independent Claim 1: The key elements include:- First and second network nodes engaging in an asymmetric HTTP transactional session over an underlying network connection, with one node acting as a client and the other as a server.
- Terminating the asymmetric HTTP session while maintaining the underlying network connection.
- The two nodes negotiating a transactional role reversal.
- The nodes further communicating under a reversed protocol where the original client acts as the server and vice versa.
- The session being uniquely identifiable and using a network connection that traverses hardware enforcing asymmetric communication (e.g., a NAT router).
 
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific accused products, methods, or services. It refers generally to "Defendant Products" and "Exemplary Defendant Products" (Compl. ¶¶ 11, 13).
Functionality and Market Context
- The complaint provides no description of the technical functionality, operation, or market context of the accused instrumentalities. It only makes the conclusory allegation that the "Exemplary Defendant Products practice the technology claimed by the '983 Patent" (Compl. ¶13).
IV. Analysis of Infringement Allegations
The complaint alleges infringement but incorporates its substantive theory into an unattached exhibit, "Exhibit 2" (Compl. ¶¶ 13-14). The analysis below is based on the complaint's conclusory assertion that the accused products practice every element of the claims.
No probative visual evidence provided in complaint.
'983 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| first and second network nodes engaging in an asymmetric hypertext transfer protocol (HTTP) transactional session with an underlying network connection... | The complaint alleges that the Defendant Products engage in an initial asymmetric HTTP session. | ¶13 | col. 4:32-35 | 
| terminating said asymmetric HTTP transactional session while maintaining said underlying network connection; | The complaint alleges that the Defendant Products terminate the initial HTTP session layer while preserving the underlying network connection. | ¶13 | col. 9:51-52 | 
| said first and second network nodes negotiating transactional role reversal; | The complaint alleges that the Defendant Products' nodes negotiate to reverse their client-server roles. | ¶13 | col. 9:2-3 | 
| said first and second network nodes further communicating under a reversed asymmetric transactional protocol...wherein each network node enacts the initial transactional role of the other... | The complaint alleges that the Defendant Products subsequently communicate using reversed roles over the preserved connection. | ¶13 | col. 9:53-56 | 
| wherein said uniquely identifiable session uses a network connection traversing hardware enforcing asymmetric communication. | The complaint alleges that the Defendant Products' session is uniquely identifiable and traverses hardware, such as a NAT router, that enforces asymmetry. | ¶13 | col. 7:12-19 | 
- Identified Points of Contention:- Evidentiary Questions: The primary issue is evidentiary. The complaint makes allegations of complex technical operations (e.g., terminating an HTTP layer while preserving a TCP layer) without providing any factual support or identifying a single accused product. A central question will be: What evidence can Plaintiff provide to show that any specific Fleetpride product performs these intricate, multi-step method claims?
- Technical Questions: A key technical question, once a product is identified, will be whether the accused system actually performs the specific steps claimed. For instance, does the system achieve bi-directional communication by "negotiating" a role "reversal" on a single underlying connection, or does it use a different architecture, such as establishing two separate, simultaneous connections for communication in each direction?
 
V. Key Claim Terms for Construction
The complaint's lack of detail on the accused technology makes it difficult to pinpoint specific disputes. However, based on the patent's language, the following terms may be central to the case.
- The Term: "negotiating transactional role reversal" - Context and Importance: This phrase describes the core inventive step that enables the role-flipping mechanism. The definition of "negotiating" will be critical to determining infringement. Practitioners may focus on this term because its interpretation will dictate whether a simple, pre-programmed command constitutes negotiation or if a more dynamic, multi-step agreement is required.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent repeatedly uses the general verb "negotiate" without defining a specific protocol, which may support a construction covering any communication process that results in an agreed-upon role reversal (e.g., ’983 Patent, col. 4:30-31).
- Evidence for a Narrower Interpretation: The flowcharts depict a specific sequence of a "FLIP REQUEST" from one party, followed by a decision to "ACCEPT" or "REFUSE" by the other (’983 Patent, Fig. 10, blocks 534-538). This could support a narrower construction requiring an explicit request-and-response protocol for the negotiation to occur.
 
 
- The Term: "terminating said asymmetric HTTP transactional session while maintaining said underlying network connection" - Context and Importance: This limitation distinguishes the invention from less sophisticated methods, such as opening a second, independent connection. Proving that the accused system terminates the application-layer session while explicitly preserving the transport-layer connection is essential for infringement.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The claim language itself does not specify how the termination and maintenance must occur, potentially allowing for any technical implementation that achieves this result.
- Evidence for a Narrower Interpretation: The detailed description illustrates a specific sequence: "TERMINATE EXISTING HTTP LAYER SESSION WHILE PRESERVING TCP CONNECTION" followed by "CREATE NEW HTTP LAYER SESSION" (’983 Patent, Fig. 9, steps 512, 514). A party could argue this requires two distinct actions—an explicit termination and a new creation—rather than merely modifying the state of the original session.
 
 
VI. Other Allegations
- Indirect Infringement: The complaint states that "numerous other devices that infringed the claims... have been made, used, sold, imported, and offered for sale by Defendant and/or its customers" (Compl. ¶11). This mention of "customers" may suggest a future theory of indirect infringement, but the complaint does not allege the specific elements of inducement or contributory infringement, such as knowledge or intent.
- Willful Infringement: The complaint does not formally allege willful infringement. However, in its prayer for relief, it requests that the case be declared "exceptional" under 35 U.S.C. § 285, which would allow for the recovery of attorney's fees (Compl. Prayer for Relief E.i). The complaint pleads no specific facts to support a finding of willfulness or egregious conduct, such as pre-suit knowledge of the patent.
VII. Analyst’s Conclusion: Key Questions for the Case
The complaint's minimal nature frames the initial phase of the litigation around fundamental evidentiary and procedural questions.
- Evidentiary Foundation: The most immediate question is evidentiary. Can Plaintiff substantiate its conclusory allegations, which currently rely on an unattached exhibit, with specific facts demonstrating how an identified "Defendant Product" actually performs the multi-step method of negotiating and reversing client-server roles?
- Technical Congruence: A core substantive issue will be one of technical implementation: assuming a product is identified, does its architecture map onto the patent's specific claim limitations? The case may turn on whether the accused system achieves bi-directional communication by "terminating" an HTTP session while "maintaining" the underlying connection, or if it employs an alternative design that falls outside the scope of the claims.