3:20-cv-00856
WSOU Investments LLC v. F5 Networks
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: WSOU Investments, LLC d/b/a Brazos Licensing and Development (Delaware)
- Defendant: F5 Networks, Inc. (Washington)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 3:20-cv-00856, E.D. Va., 11/06/2020
- Venue Allegations: Venue is alleged to be proper based on Defendant having an established place of business in the Eastern District of Virginia and having committed acts of patent infringement within the district.
- Core Dispute: Plaintiff alleges that Defendant’s unspecified network products infringe a patent related to methods for managing network overload and auditing resources in telecommunications systems.
- Technical Context: The technology at issue addresses resource management in networks that use the Diameter protocol, a framework for authentication, authorization, and accounting (AAA) in IP-based multimedia systems.
- Key Procedural History: The complaint does not reference any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit. The claim of knowledge for post-filing damages is based solely on the service of the complaint itself.
Case Timeline
| Date | Event |
|---|---|
| 2006-12-29 | ’884 Patent Priority Date |
| 2007-04-09 | ’884 Patent Application Date |
| 2011-05-31 | ’884 Patent Issue Date |
| 2020-11-06 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,953,884 - *“Method and apparatus for overload control and audit in a resource control and management system”*
- Patent Identification: U.S. Patent No. 7,953,884, issued May 31, 2011.
The Invention Explained
- Problem Addressed: The patent asserts that the standard Diameter protocol, widely used in telecommunications for managing network access, lacks native mechanisms to handle resource overload or to audit and synchronize the state of multimedia sessions between a gateway and its controller (’884 Patent, col. 1:55-64). This deficiency could lead to inefficient resource use or system instability when gateways are under stress (’884 Patent, col. 1:55-64).
- The Patented Solution: The invention proposes extending the Diameter protocol to add specific overload control and audit functionalities (’884 Patent, Abstract). A ‘border gateway’ (client) under strain sends a new type of ‘overload message’ to a ‘controller’ (server), which may include a ‘reduction percentage’ to specify how many new sessions should be blocked (’884 Patent, col. 2:6-15). The system also introduces an ‘audit sequence’ to identify and release resources associated with improperly connected or ‘hanging’ sessions, thereby cleaning up network state and freeing resources (’884 Patent, col. 2:7-11, col. 6:62-65). Figure 1 illustrates a system architecture where a controller (PCRF 14) manages multiple border gateways (BGW 18) using this extended protocol (’884 Patent, Fig. 1).
- Technical Importance: The described solution provides a formal mechanism within a Diameter-based architecture to proactively manage network congestion and maintain system integrity, which is critical for carrier-grade services like IP Multimedia Subsystem (IMS) (’884 Patent, col. 1:26-34).
Key Claims at a Glance
The complaint does not specify which claims are asserted, instead referencing an unprovided "Exhibit 2" containing claim charts (Compl. ¶17). Independent claims 1 and 11 are representative of the patented technology.
- Independent Claim 1 (System):
- A resource control and management system, comprising:
- a border gateway acting as a client for Diameter protocol configured with an overload extension to the Diameter protocol to send an overload message; and
- a controller acting as a server for Diameter protocol configured with the overload extension to receive said overload message, block a number of sessions to said border gateway and configured with an audit extension to the Diameter protocol to perform an audit sequence, said audit sequence including clearing media resource ports.
- Independent Claim 11 (Method):
- A method for border gateway resource management, comprising:
- performing an audit sequence in response to a trigger, the audit sequence includes clearing media resource ports that are not fully connected by implementing an audit extension to a Diameter protocol;
- detecting an overload status from an overloaded gateway that has taken excess load;
- determining a reduction percentage that corresponds with a percentage of calls that will be blocked; and
- blocking calls routed through the gateway with respect to the reduction percentage by implementing an overload extension to the Diameter protocol;
- wherein determining the reduction percentage is based, at least in part, on available central processing unit memory.
The complaint appears to reserve the right to assert additional claims (Compl. ¶11).
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific accused products by name. It refers generally to "Exemplary Defendant Products" that are detailed in an external "Exhibit 2," which was not filed with the complaint (Compl. ¶11, ¶17).
Functionality and Market Context
- The complaint does not provide sufficient detail for analysis of the accused product's specific functionality or market context. It makes only the conclusory allegation that the "Exemplary Defendant Products practice the technology claimed by the '884 Patent" (Compl. ¶17). No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint’s infringement allegations are contained entirely within an unprovided exhibit (Exhibit 2), and the body of the complaint offers no specific factual mapping of accused product features to claim elements (Compl. ¶17-18). The narrative theory is that Defendant's "Exemplary Defendant Products" infringe by performing the functions claimed in the ’884 Patent, thereby satisfying all claim elements literally or under the doctrine of equivalents (Compl. ¶11, ¶17). Due to the lack of specific factual allegations in the provided document, a claim chart cannot be constructed.
- Identified Points of Contention:
- Technical Questions: A primary factual dispute will concern whether the accused products perform the specific functions required by the claims. For example, regarding claim 11, the complaint provides no evidence that the accused products determine a ‘reduction percentage’ that is "based, at least in part, on available central processing unit memory" (’884 Patent, col. 10:20-22). Likewise, it is unclear what evidence supports the allegation that the products perform an ‘audit sequence’ that includes "clearing media resource ports" as claimed (’884 Patent, col. 8:65 - col. 9:2).
- Scope Questions: The dispute may raise questions about the scope of the claim terms relative to the accused technology. For instance, does the architecture of the accused F5 products include distinct components that meet the definitions of a ‘border gateway’ and a ‘controller’ as those terms are used in the patent, or are the claimed functions performed in a more integrated or distributed manner that does not map to the claimed system structure?
V. Key Claim Terms for Construction
The Term: ‘controller’ (Claim 1)
Context and Importance: The identity and structure of the ‘controller’ is central to Claim 1. The infringement analysis will depend on whether this term is construed broadly to cover any network element performing the recited server functions, or more narrowly to align with the specific embodiments described in the patent. Practitioners may focus on this term because its scope could determine whether F5's potentially different network architecture falls within the claim.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim language itself is functional, defining the controller as an entity "acting as a server for Diameter protocol" and configured to perform certain actions (blocking sessions, performing audits) (’884 Patent, col. 8:59-65). This could support an interpretation covering any component that meets these functional requirements, regardless of its specific name or implementation.
- Evidence for a Narrower Interpretation: The specification consistently identifies the controller with a specific network entity: the Policy and Charging Rules Function (PCRF) (’884 Patent, col. 4:13, 20). The detailed description states, "In this embodiment the controller is represented by the PCRF 14" (’884 Patent, col. 4:30-32). This repeated association could be used to argue that the term ‘controller’ should be limited to a PCRF or a structurally equivalent entity.
The Term: ‘audit sequence’ (Claims 1, 11)
Context and Importance: This term defines a core function of the invention. The dispute will likely focus on what specific set of actions is required to constitute an ‘audit sequence.’ A narrow definition could allow Defendant to design around the claim, while a broad one would cover a wider range of diagnostic and cleanup routines.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim states the audit sequence "including clearing media resource ports," which suggests clearing ports is a required part of the sequence but does not preclude other steps or variations (’884 Patent, col. 8:65).
- Evidence for a Narrower Interpretation: The specification describes the purpose of the audit as a way to "‘clean up’ the system and release the resources that are associated with an improperly connected call" (’884 Patent, col. 6:62-65). A defendant might argue that to be an ‘audit sequence,’ the accused process must be specifically directed at identifying and rectifying such ‘hanging’ or improperly state-managed sessions, not just any general system check.
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement by asserting that Defendant provides "product literature and website materials" that instruct customers on how to use the products in an infringing manner (Compl. ¶14). It alleges contributory infringement by claiming the products are "especially made or adapted for infringing the '884 Patent and have no substantial non-infringing use" (Compl. ¶16). These allegations are not supported by specific factual assertions in the complaint.
- Willful Infringement: The complaint does not allege pre-suit willfulness. It alleges "Actual Knowledge of Infringement" arises exclusively from "The service of this Complaint" (Compl. ¶13), which may support a claim for enhanced damages for any infringement that occurs post-filing but does not establish pre-suit knowledge.
VII. Analyst’s Conclusion: Key Questions for the Case
An Evidentiary Question of Functionality: As the complaint provides no factual detail, the case will depend entirely on whether discovery yields evidence that F5’s products actually perform the specific technical functions recited in the claims. A central question will be whether Plaintiff can demonstrate that the accused systems block sessions based on a ‘reduction percentage’ that is calculated using "available central processing unit memory," as explicitly required by method claim 11.
A Definitional Question of Architectural Scope: The case will likely involve a significant claim construction dispute over whether the patent’s architectural terms can be mapped onto the accused products. A key question for the court will be one of definitional scope: can the terms ‘controller’ and ‘border gateway,’ described in the patent within the context of a 3GPP IMS architecture, be construed to read on the components and software functions within F5 Networks' product ecosystem?