3:22-cv-00970
ZT IP LLC v. VMware Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: ZT IP, LLC (Texas)
- Defendant: VMware, Inc. (Delaware)
- Plaintiff’s Counsel: Ramey LLP
- Case Identification: 3:22-cv-00970, N.D. Tex., 05/02/2022
- Venue Allegations: Plaintiff alleges venue is proper because Defendant has a regular and established place of business in the district, has committed acts of infringement in the district, and conducts substantial business in Texas and the district.
- Core Dispute: Plaintiff alleges that Defendant’s systems for developing real-time operating systems infringe a patent related to emulating a hardware/software system on a standard computer.
- Technical Context: The technology concerns software development tools that allow embedded system software, which is typically designed for specialized hardware, to be run and tested on a conventional personal computer.
- Key Procedural History: The complaint does not mention any prior litigation, inter partes review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2003-05-20 | ’583 Patent Priority Date |
| 2010-01-12 | ’583 Patent Issue Date |
| 2022-05-02 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,647,583 - Method and Apparatus For Emulating A Hardware/Software System Using A Computer
- Patent Identification: U.S. Patent No. 7,647,583, Method and Apparatus For Emulating A Hardware/Software System Using A Computer, issued January 12, 2010.
The Invention Explained
- Problem Addressed: The patent’s background section describes the significant challenges in developing software for embedded systems. Traditional methods like using demo boards, hardware emulators, or instruction set simulators were often slow, expensive, unable to test real-time timing requirements, or required the system hardware to be nearly complete before software debugging could begin (’583 Patent, col. 1:19-24, col. 2:1-8, col. 2:15-16).
- The Patented Solution: The invention proposes a software-based platform to run embedded software on an inexpensive, conventional personal computer (PC). The solution involves two main components: a "compiler assist component" and a "runtime component" (’583 Patent, col. 4:45-55). The compiler assist component modifies the embedded software’s source code, replacing its original hardware device drivers with calls to the runtime component (e.g., as shown in Fig. 3). The runtime component then executes on the PC and interfaces with the PC’s standard operating system and hardware drivers, allowing the emulated embedded system to communicate with real or virtual hardware peripherals as if it were running on its intended target system (’583 Patent, Abstract; col. 6:11-19).
- Technical Importance: This method allows software developers to write, test, and debug embedded software in parallel with hardware development, using readily available PCs instead of costly, specialized equipment (’583 Patent, col. 1:16-18).
Key Claims at a Glance
- The complaint asserts infringement of claims 1-12 (Compl. ¶9). Independent claim 1 is representative.
- Independent Claim 1: A method comprising the essential elements of:
- Providing a first operating system (e.g., a real-time OS) and first computer code configured to run on it.
- Providing a second operating system (e.g., a general-purpose PC OS) that is different from the first.
- Providing an executable runtime component to control the physical input/output devices of the second computer system.
- Modifying the first computer code by replacing its device drivers with "substituted device drivers" that call the runtime component.
- Executing the first operating system and modified code "on top of" the second operating system.
- Using the runtime component to "bypass said second operating system" and take control of the physical input/output devices.
- The complaint reserves the right to assert dependent claims 2-12 (Compl. ¶9, ¶11).
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific VMware products by name. It broadly accuses "systems, products, and services that facilitate developing real time operating system" (Compl. ¶9).
Functionality and Market Context
- The complaint alleges that the accused instrumentalities are used for "facilitating the platform for running embedded software in real time" (Compl. ¶11). No specific technical functionalities, operational details, or market context for any VMware product are provided in the complaint.
IV. Analysis of Infringement Allegations
The complaint references an "exemplary table included as Exhibit A" to support its infringement allegations but does not attach the exhibit (Compl. ¶10). In the absence of a claim chart, the infringement theory must be inferred from the complaint's narrative allegations. Plaintiff alleges that Defendant "maintains, operates, and administers systems, products, and services that facilitate developing real time operating system that infringes one or more of claims 1-12" (Compl. ¶9).
No probative visual evidence provided in complaint.
Identified Points of Contention
- Evidentiary Questions: A primary issue for the court will be establishing the specific identity and functionality of the accused VMware products. The complaint's lack of specificity raises the question of what evidence Plaintiff will produce to demonstrate how an unnamed VMware product practices each element of the asserted claims.
- Scope Questions: The claim language recites executing a "first operating system" and its code "on top of said second operating system" (’583 Patent, col. 10:21-22). This suggests a software architecture where the embedded system runs as an application on a host OS like Windows or Linux (as depicted in Fig. 9 of the patent). A key question will be whether VMware’s virtualization architecture, which may involve a hypervisor operating at a different level in the system stack, falls within the scope of this "on top of" limitation.
- Technical Questions: Claim 1 requires using a runtime component to "bypass said second operating system" to control hardware devices (’583 Patent, col. 10:28-34). The court will need to determine what constitutes a "bypass." Does the accused technology, which likely uses controlled interfaces managed by a hypervisor, perform a "bypass" in the manner described by the patent, or does it operate through a fundamentally different technical mechanism?
V. Key Claim Terms for Construction
The Term: "executable runtime component"
- Context and Importance: This component is the core of the claimed invention, acting as the intermediary between the emulated software and the host PC's hardware. Its construction will be central to determining whether any part of the accused VMware architecture performs the functions required by the claims. Practitioners may focus on this term because its definition will dictate the required structure and function of the allegedly infringing software module.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claims describe the component functionally as being "configured to take control of the physical input/output devices" (’583 Patent, col. 10:11-14). This functional language could support a construction that is not limited to a specific implementation.
- Evidence for a Narrower Interpretation: The specification describes the runtime component as a program that "injects the data into the driver" and "extracts the data... without the knowledge of the underlying PC operating system" (’583 Patent, col. 8:19-24). This could support a narrower construction requiring a specific mechanism that operates independently of, and invisibly to, the host OS.
The Term: "bypassing said second operating system"
- Context and Importance: This term defines the key action of the runtime component. The infringement analysis will turn on whether the accused VMware products "bypass" the host operating system in the manner contemplated by the patent. This is critical because modern hypervisors manage, rather than completely bypass, hardware access.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim language itself does not specify the mechanism of the bypass. A party could argue it covers any method that avoids using the standard application-level I/O functions of the second operating system.
- Evidence for a Narrower Interpretation: The specification suggests a direct hand-off of data to hardware drivers, stating the runtime component "bypasses the PC operating system 1003" to access hardware drivers 1005 directly (’583 Patent, Fig. 10; col. 8:56-60). This suggests a more complete circumvention than the managed hardware access typically provided by a hypervisor.
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, stating that Defendant "actively encouraged or instructed others (e.g., its customers...)" on how to use its systems in an infringing manner (Compl. ¶11). It also alleges contributory infringement, claiming there are "no substantial noninfringing uses" for the accused products and services (Compl. ¶12).
- Willful Infringement: The complaint alleges that Defendant has known of the ’583 patent "from at least the filing date of the lawsuit" (Compl. ¶11, ¶12). This appears to be a claim for post-suit willfulness, with Plaintiff reserving the right to prove pre-suit knowledge if revealed during discovery (Compl. ¶11, fn. 1).
VII. Analyst’s Conclusion: Key Questions for the Case
An Evidentiary Question of Specificity: The most immediate question is evidentiary: which specific VMware products are accused of infringement, and what technical evidence will be presented to show how their architecture maps to the elements of the patent’s claims? The complaint’s failure to name a product or provide its promised claim chart (Exhibit A) leaves the entire infringement theory undefined.
A Definitional Question of Architecture: A central legal issue will be one of claim scope: can the patent’s architectural model, which describes an embedded OS running "on top of" a host PC OS and using a component to "bypass" it, be construed to cover modern virtualization systems? The case may turn on whether VMware’s hypervisor-based architecture is fundamentally different from the software-on-application model described and claimed in the ’583 patent.