DCT

2:25-cv-00907

Headwater Research LLC v. DISH Network Corp

Key Events
Amended Complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:25-cv-00908, E.D. Tex., 10/31/2025
  • Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains a regular and established place of business in the Eastern District of Texas, has committed acts of infringement in the district, advertises its services including Xfinity Mobile within the district, and maintains a permanent physical presence in the district.
  • Core Dispute: Plaintiff alleges that Defendant’s mobile electronic devices operating on its Xfinity Mobile network infringe three patents related to managing wireless network access, service usage, and data consumption.
  • Technical Context: The technology addresses the management of mobile device data usage and network policy enforcement, a critical area given the exponential growth in mobile data demand on wireless networks.
  • Key Procedural History: The complaint notes that Headwater’s intellectual property was previously licensed to ItsOn Inc., a company that implemented the technology into software for cellular service plan offerings and data management.

Case Timeline

Date Event
2009-01-28 U.S. Patent No. 8,666,364 Priority Date
2010-05-25 U.S. Patent No. 9,143,976 Priority Date
2010-05-25 U.S. Patent No. 9,647,918 Priority Date
2014-03-04 U.S. Patent No. 8,666,364 Issues
2015-09-22 U.S. Patent No. 9,143,976 Issues
2017-05-09 U.S. Patent No. 9,647,918 Issues
2025-10-31 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 8,666,364 - “Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account,” issued March 4, 2014

The Invention Explained

  • Problem Addressed: The patent background describes the increasing strain on user capacity for various access networks, including wireless, cable, and DSL, due to the growth of mass-market digital communications and content distribution (’364 Patent, col. 1:33-47).
  • The Patented Solution: The invention proposes a system architecture where a “service processor” operating on a user’s device communicates with a network-side “service controller” (’364 Patent, Abstract). This processor contains various software agents that monitor and control the device’s network traffic according to policies received from the controller, enabling granular, verifiable, device-assisted management of network service usage (’364 Patent, Fig. 16; col. 35:36-67).
  • Technical Importance: This device-assisted approach allows for more dynamic and flexible policy enforcement than traditional, purely network-centric control systems, which is critical for managing resources efficiently amid rapidly growing mobile data demand (’364 Patent, col. 11:10-30).

Key Claims at a Glance

  • The complaint asserts infringement of independent claim 1 (Compl. ¶38).
  • The essential elements of claim 1 include:
    • A wireless device capable of communicating with at least two wireless networks.
    • A user interface and memory for storing a “first service policy” associated with a first wireless network.
    • A definition of a “first service activity” and a “first low-level policy” for enabling user control.
    • One or more processors executing agents, including an application interface agent and a policy control agent.
    • A software component for obtaining user input through the user interface.
    • The processors are configured to identify connection to the first wireless network, identify an attempted data communication, and apply the first service policy to that communication.

U.S. Patent No. 9,143,976 - “Wireless end-user device with differentiated network access and access status for background and foreground device applications,” issued September 22, 2015

The Invention Explained

  • Problem Addressed: The patent background describes the user capacity constraints on access networks like wireless, cable, and DSL, which are "pressed for user capacity" due to the growth in digital communications and content distribution (’976 Patent, col. 1:11-21).
  • The Patented Solution: The invention is a wireless device with both WWAN (cellular) and WLAN (Wi-Fi) modems. Its processors classify whether an application is actively "interacting in the device foreground with a user." Based on this classification, the device applies a "differential traffic control policy" to selectively block or allow network access for that application, particularly over the WWAN modem. It also uses an Application Programming Interface (API) to inform the application about its network access status (’976 Patent, Abstract; col. 2:20-30).
  • Technical Importance: This technology enables the conservation of metered cellular data and reduces network congestion by intelligently restricting data-intensive background processes, a foundational feature for modern smartphones and mobile operating systems (’976 Patent, col. 3:20-28).

Key Claims at a Glance

  • The complaint asserts infringement of independent claim 1 (Compl. ¶49).
  • The essential elements of claim 1 include:
    • A wireless end-user device with a WWAN modem, a WLAN modem, and a device display.
    • One or more processors configured to “classify” whether a first end-user application is “interacting in the device display foreground with the user.”
    • When using the WWAN modem, the processors apply a “first differential traffic control policy” that disallows internet service activity for the application when it is classified as not interacting in the foreground.
    • The processors indicate network access conditions to the application via an API, including indicating unavailability when access is disallowed.

Multi-Patent Capsule

  • Patent Identification: U.S. Patent No. 9,647,918, “Mobile device and method attributing media services network usage to requesting application,” issued May 9, 2017 (Compl. ¶19).
  • Technology Synopsis: The patent describes a method for accurately attributing network data usage to the specific application that initiates a request, particularly when the data is delivered through a separate media service or proxy function on the device. The invention uses APIs to create an association between the initial request from an application and the resulting data flows, ensuring that usage is billed or accounted to the correct source (’918 Patent, Abstract; col. 2:1-15).
  • Asserted Claims: The complaint asserts infringement of independent claim 1 (Compl. ¶60).
  • Accused Features: The complaint alleges that the accused mobile devices on the Xfinity Mobile network infringe by attributing media service network usage to the specific application that requests the media (Compl. ¶60).

III. The Accused Instrumentality

Product Identification

The accused instrumentalities are “mobile electronic devices, including mobile phones and tablets” sold or supplied by Comcast for use on its Xfinity Mobile network (Compl. ¶1).

Functionality and Market Context

The complaint describes the accused instrumentalities as modern smartphones and tablets that connect to the internet over wireless and cellular networks to perform a wide range of functions, contributing to a massive increase in mobile data demand (Compl. ¶¶11-13). The complaint includes a chart illustrating the projected exponential growth in mobile data traffic to provide market context for the importance of managing data consumption (Compl. p. 6). Comcast advertises its Xfinity Mobile service as having nationwide 5G and 4G LTE coverage, including in the Eastern District of Texas (Compl. p. 11).

IV. Analysis of Infringement Allegations

The complaint references claim chart exhibits that are not provided with the filed document (Compl. ¶¶38, 49, 60). The infringement allegations are therefore summarized based on the complaint’s narrative descriptions.

’364 Patent Infringement Allegations

The complaint alleges that the accused devices and network implement a system of device-assisted service control that infringes the ’364 Patent (Compl. ¶37). The theory suggests that the accused mobile devices contain a "service processor" functionality (e.g., software agents running on the device's main processor) that monitors and controls network usage based on a "service policy." This policy is allegedly provided by the Xfinity Mobile network, which performs the role of the claimed "service controller." The complaint alleges that Comcast's devices and network thereby create a verifiable, device-assisted system for managing service usage as claimed.

’976 Patent Infringement Allegations

The complaint alleges that the accused devices infringe the ’976 Patent by implementing differentiated network access for foreground and background applications (Compl. ¶48). The theory posits that the operating systems on the accused devices are capable of "classifying" whether an application is actively being used by a user in the "foreground" or is running in the "background." Based on this classification, the devices allegedly apply a "differential traffic control policy" that restricts or disallows network access—particularly over the cellular (WWAN) network—for background applications, while informing the application of its network status via an API, thereby practicing the patented invention.

Identified Points of Contention

  • Scope Questions: A central dispute may concern whether standard features in modern mobile operating systems, such as background app refresh or data saver modes, meet the specific definitions of a "service policy" ('364 Patent) or the act of "classify[ing]" an application as "interacting in the device display foreground" (’976 Patent). The interpretation of these terms will be critical to the infringement analysis.
  • Technical Questions: A key technical question for the '976 patent will be whether the accused devices provide the claimed "application program interface (API)" that "indicate[s]" the specific network access conditions to the applications themselves. For the '364 patent, a question will be whether the accused devices' software architecture contains the claimed "one or more agents" and "software component" that perform the specific, claimed steps of policy enforcement and user interaction.

V. Key Claim Terms for Construction

’364 Patent, Claim 1

  • The Term: "a first service policy"
  • Context and Importance: This term is foundational to the claim, as the device's infringement depends on its ability to store and "apply" this policy. Practitioners may focus on this term because its construction will determine whether generic device settings (e.g., a user's choice to connect to Wi-Fi over cellular) or more complex, network-provided rule sets are required to meet the limitation.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification describes "service policy" in broad terms, encompassing settings for "network access, network service usage, service activity monitoring and reporting, resource management and monitoring, filtering, adaptive service policy control," and more (’364 Patent, col. 9:4-12).
    • Evidence for a Narrower Interpretation: Embodiments often describe the policy as part of a "service profile" that is "downloaded" to the device from a "service controller," suggesting a specific client-server relationship may be required to define the policy (’364 Patent, col. 35:60-67).

’976 Patent, Claim 1

  • The Term: "classify... whether or not the first end-user application... is interacting in the device display foreground with the user"
  • Context and Importance: This "classify" step is the trigger for the claimed "differential traffic control." The infringement analysis will likely turn on whether the accused devices' method for managing background data performs this specific function.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The patent abstract states the processors "classify when an application is interacting in the device foreground with a user" without specifying the technical method, which may support a broader reading that covers any technical means of distinguishing active from inactive applications (’976 Patent, Abstract).
    • Evidence for a Narrower Interpretation: The precise phrase "interacting... with the user" could be interpreted to require more than an application simply being visible on screen. A defendant may argue this requires active user input, potentially narrowing the scope to exclude scenarios where content is passively displayed in the foreground.

VI. Other Allegations

Indirect Infringement

For all three patents, the complaint alleges induced infringement. The stated basis is that Comcast provides the accused devices to its customers and provides "information and instructions on the use" of those devices, allegedly encouraging and instructing customers to use them in an infringing manner (Compl. ¶¶42, 53, 64).

Willful Infringement

Willfulness is alleged for all patents based on knowledge "at least as of the filing and service of this Complaint" (Compl. ¶¶39, 50, 61). The complaint also asserts that "patents assigned to Defendants also cite family members" of the '364 and '976 patents, which may be used to suggest the possibility of pre-suit knowledge (Compl. ¶¶39, 50).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: can the patents' specific claim terms, such as "service policy" and "classify... interacting in the device... foreground," be construed to cover the generalized data management and network preference features found in the standard operating systems of modern mobile devices, or do they require a more specific, non-conventional implementation?
  • A key evidentiary question will be one of architectural mapping: does the complaint provide sufficient evidence to demonstrate that the interaction between the accused devices and the Xfinity Mobile network mirrors the claimed "service processor" and "service controller" architecture, and does it show that the devices provide the claimed application-facing API for communicating network status?
  • A central technical question will be one of functional operation: what is the precise mechanism by which the accused devices distinguish between foreground and background application activity, and does that mechanism perform the specific function of "classify[ing]" interaction "with the user" as required by Claim 1 of the '976 patent, or is there a fundamental mismatch in technical operation?