DCT

2:25-cv-00906

Headwater Research LLC v. Charter Communications Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:25-cv-00906, E.D. Tex., 08/28/2025
  • Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendants have regular and established places of business in the district, have committed acts of infringement in the district, and have placed accused products into the stream of commerce with the expectation they will be used by consumers there.
  • Core Dispute: Plaintiff alleges that Defendant’s mobile electronic devices, such as those used for its Spectrum Mobile service, infringe patents related to verifiable service usage billing, differentiated network access for applications, and attribution of network usage.
  • Technical Context: The technology concerns the management of data consumption on mobile devices, which has become a critical area for network operators and consumers due to the rapid growth of mobile data usage.
  • Key Procedural History: The complaint alleges that the inventor, Dr. Gregory Raleigh, founded multiple influential wireless technology companies that were later acquired by Cisco and Qualcomm. It also alleges that patents assigned to Defendants cite family members of the patents-in-suit, a fact which may be used to support allegations of pre-suit knowledge.

Case Timeline

Date Event
2009-01-28 Earliest Priority Date for ’364, ’976, and ’918 Patents
2014-03-04 U.S. Patent No. 8,666,364 Issued
2015-09-22 U.S. Patent No. 9,143,976 Issued
2017-05-09 U.S. Patent No. 9,647,918 Issued
2025-08-28 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 8,666,364 - Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account

Issued March 4, 2014 (’364 Patent)

The Invention Explained

  • Problem Addressed: The patent background describes a need for communication systems that can both offer consumers more choice in service plans and help network providers manage network usage more effectively in the face of increasing demand (’364 Patent, col. 5:14-20, col. 6:4-14).
  • The Patented Solution: The invention proposes a system where a "service processor" (an agent or software component) resides on the wireless device and communicates securely with a "service controller" on the network (’364 Patent, col. 37:35-42). This on-device processor monitors network usage, applies service policies, and reports usage data, enabling a verifiable and granular billing system that is assisted by the device itself rather than relying solely on network-side measurements (’364 Patent, Fig. 16).
  • Technical Importance: This device-assisted approach enables more flexible and complex service offerings beyond simple data caps, allowing carriers to manage network resources with greater precision as smartphone usage patterns became more varied (Compl. ¶9, 15).

Key Claims at a Glance

  • The complaint asserts infringement of at least independent claim 1 (Compl. ¶42).
  • The essential elements of independent claim 1, a wireless device, include:
    • One or more processors configured for executing one or more agents.
    • At least two wireless modems for connecting to at least two wireless networks.
    • A user interface.
    • A first service policy associated with the first wireless network, controlling at least a service activity associated with a software component and enabling control of the first service activity differently from a second service activity.
    • One or more processors configured for executing one or more agents, including an application interface agent, to identify the wireless device is connected to the first wireless network and apply the first service policy.

U.S. Patent No. 9,143,976 - Wireless end-user device with differentiated network access and access status for background and foreground device applications

Issued September 22, 2015 (’976 Patent)

The Invention Explained

  • Problem Addressed: The patent identifies the problem of increasing network capacity constraints caused by high-bandwidth applications, which can degrade the overall network service experience for all users (’976 Patent, col. 1:10-21).
  • The Patented Solution: The invention describes a method within a wireless device for classifying whether an application is interacting with a user in the "foreground" or operating in the "background" (’976 Patent, Abstract). Based on this classification, the device applies a "differential traffic control policy" that can selectively block or allow network access, particularly on a cellular (WWAN) network. The system also uses an Application Program Interface (API) to inform the application of its current network access status under the policy (’976 Patent, col. 41:56-42:14).
  • Technical Importance: This allows network operators to preserve network capacity and the quality of the active user experience by de-prioritizing or blocking data-intensive background tasks (e.g., automatic updates, cloud syncing) that the user is not directly engaged with (Compl. ¶15).

Key Claims at a Glance

  • The complaint asserts infringement of at least independent claim 1 (Compl. ¶53).
  • The essential elements of independent claim 1, a method, include:
    • Classifying, by one or more processors of a wireless end-user device, when a first end-user application is interacting in the device foreground with a user.
    • Applying, for a time period when data is communicated through a WWAN modem, a first differential traffic control policy to Internet service activity for the application.
    • The policy disallows Internet service activity for the application when it is classified as not interacting in the device foreground.
    • Indicating to the application, via an API, one or more network access conditions based on the applied policy, including indicating unavailability of Internet data service when the application is classified as not interacting in the foreground.

U.S. Patent No. 9,647,918 - Mobile device and method attributing media services network usage to requesting application

Issued May 9, 2017 (’918 Patent)

Technology Synopsis

This patent addresses the technical challenge of correctly attributing network data usage to the specific application that initiated the request, particularly when a media service or proxy is involved. The solution involves a device with two APIs and a service classification agent that work together to track and associate data transfers for media objects with the original requesting application, enabling accurate per-application usage accounting.

Asserted Claims

The complaint asserts infringement of at least independent claim 1 (Compl. ¶64).

Accused Features

The accused functionality is the capability of modern mobile operating systems on the accused devices to monitor, attribute, and report network data usage on a per-application basis (Compl. ¶1, 63).

III. The Accused Instrumentality

Product Identification

The Accused Instrumentalities are mobile electronic devices, including mobile phones and tablets, supplied by Defendants to customers for use on the Spectrum Mobile mobile virtual network operator (MVNO) network (Compl. ¶1).

Functionality and Market Context

The accused devices are modern smartphones and tablets that operate on both cellular (WWAN) and Wi-Fi (WLAN) networks. Their operating systems manage data connections and application behavior, including functions that track data usage by application and differentiate between foreground (active) and background application data access. The complaint notes that mobile data demand has grown exponentially, making such data management and accounting features critical for both network providers and consumers to manage costs and network congestion (Compl. ¶12-13). The complaint includes a screenshot from Spectrum's website showing its coverage map, which advertises 5G wireless coverage in Marshall, Texas, as evidence of its service offerings in the district (Compl. ¶36, p. 12). Another screenshot lists Spectrum's physical store locations in Texas, which is used to support venue allegations (Compl. ¶35, p. 11).

IV. Analysis of Infringement Allegations

The complaint references but does not attach claim chart exhibits (Compl. ¶42, 53). Therefore, the infringement theories are summarized in prose.

’364 Patent Infringement Allegations

Narrative Theory of Infringement

The complaint’s narrative suggests that the accused mobile devices embody the claimed "wireless device." These devices contain processors running software (the alleged "agents" or "service processor") that monitor data usage across different wireless networks (e.g., Spectrum's cellular network and a user's Wi-Fi network). This on-device software is alleged to apply distinct "service policies" for each network, thereby performing device-assisted service usage monitoring that enables the verifiable billing claimed by the patent.

Identified Points of Contention

A central question may be one of architectural equivalence: does the standard data usage accounting functionality built into a modern mobile operating system constitute the specific, interactive "service processor" and "service controller" architecture required by the claims? The analysis may turn on whether the device's functionality is merely reporting data usage or if it is actively assisting in the application of service policies in a "verifiable" manner as the patent describes.

’976 Patent Infringement Allegations

Narrative Theory of Infringement

The infringement theory posits that the accused devices perform the claimed method. The devices' operating systems are alleged to perform the "classifying" step by determining which application is active in the "foreground" and which are in the "background." The OS then allegedly "applies a...differential traffic control policy" by implementing features like "background app refresh" controls, which limit data access for background apps on the cellular (WWAN) network. Finally, the OS is alleged to "indicate" the network access condition to the application via a standard API that reports whether a network connection is available.

Identified Points of Contention

The dispute may focus on functional specificity. One question is whether an OS simply checking which application is active on screen meets the claim limitation of "classifying when an...application is interacting...with a user." Another is whether a generic API that reports general network availability performs the more specific claimed function of "indicating...network access conditions based on the applied first differential traffic control policy." The court may need to determine if there is a direct link between the access policy and the API notification, or if the API merely reports a general state.

V. Key Claim Terms for Construction

’364 Patent, Claim 1

The Term

"a first service policy associated with the first wireless network...and a second service policy associated with the second wireless network"

Context and Importance

This term is critical because infringement hinges on showing that the accused devices apply different, distinct sets of rules for different networks (e.g., cellular vs. Wi-Fi). The definition of "service policy" will determine whether simple differential connection settings qualify, or if a more complex, carrier-defined rule set is required.

Intrinsic Evidence for a Broader Interpretation

The specification describes a service policy as including "a set of policies for the device for service usage, network service access control settings, billing, system settings," which could be construed broadly to encompass any set of rules governing network access (’364 Patent, col. 8:58-62).

Evidence for a Narrower Interpretation

The specification repeatedly illustrates these policies as being implemented by a specific "service processor" on the device that communicates with a "service controller" in the network (’364 Patent, Fig. 16; col. 37:35-42). A party could argue the term is limited to policies defined and managed within this specific claimed architecture.

’976 Patent, Claim 1

The Term

"classifying when a first end-user application is interacting in the device foreground with a user"

Context and Importance

The infringement case for the ’976 patent depends on this initial classification step. The construction of "interacting" will define the scope of the required action—whether it is a simple check of the application's screen status or requires a more sophisticated analysis of user activity.

Intrinsic Evidence for a Broader Interpretation

The specification refers to "the application the user is currently interacting with" in a general sense, which could support a plain meaning where the application in the foreground is, by definition, the one with which the user is interacting (’976 Patent, col. 4:51-52).

Evidence for a Narrower Interpretation

The specification also discusses monitoring user history and CRM, stating that a "service monitor agent" can "observe and possibly record or report on user interaction with the device" (’976 Patent, col. 52:43-51). This might support a narrower construction requiring a more active assessment of user engagement beyond simply identifying which application is on screen.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges Defendants induce infringement by supplying the accused mobile devices to customers and providing instructions and user manuals that encourage use in an infringing manner (Compl. ¶43-44, 54-55, 65-66).
  • Willful Infringement: The complaint alleges willful infringement based on both pre- and post-suit knowledge. Pre-suit knowledge is alleged based on the fact that patents assigned to Defendants allegedly cite family members of the asserted patents. Post-suit knowledge is based on the filing and service of the complaint itself (Compl. ¶43, 45, 54, 56, 65, 67).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A central issue will be one of architectural mapping: can the standard, integrated functions of a modern mobile operating system (e.g., a data usage monitor or background refresh setting) be mapped onto the specific, distributed "service processor" and "service controller" architecture claimed in the patents, or does the patented invention require a distinct software agent architecture not present in the accused devices?
  • A key evidentiary question will be one of functional specificity: do the accused devices’ general-purpose features perform the specific, purpose-driven functions required by the claims? For example, does a generic API call that reports network availability satisfy a claim limitation requiring an indication of an access condition based on a specific traffic policy, or is there a fundamental disconnect between the policy's application and the API's function?
  • The dispute may also turn on the scope of common terms: can terms like "interacting with a user" and "service policy" be given their broad, plain meaning, or does the patent specification limit them to the specific technical embodiments described, thereby narrowing the claims in a way that might avoid infringement by the accused devices?