DCT

2:24-cv-10320

IoT Innovations LLC v. Lutron Electronics Co Inc

Key Events
Amended Complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:24-cv-10320, U.S. District Court for the Central District of California (C.D. Cal.), Filed 03/26/2025
  • Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains regular and established places of business within the district and has committed acts of patent infringement in the district.
  • Core Dispute: Plaintiff alleges that Defendant’s smart home product ecosystems—including lighting controls, thermostats, and associated hubs and software—infringe seven U.S. patents related to mobile device security, proactive data caching, data synchronization across disparate devices, and network communication management.
  • Technical Context: The dispute centers on foundational technologies for the "Internet of Things" (IoT) and smart home automation, a market sector characterized by interconnected devices managed through centralized software and cloud services.
  • Key Procedural History: The operative pleading is a First Amended Complaint. The complaint does not mention any prior litigation or post-grant administrative proceedings involving the asserted patents.

Case Timeline

Date Event
2000-08-23 Priority Date for U.S. Patent No. 6,801,933
2000-09-11 Priority Date for U.S. Patent No. 7,526,762
2001-11-26 Priority Date for U.S. Patent No. 7,539,212
2002-05-20 Priority Date for U.S. Patent No. 6,920,486
2002-11-27 Priority Date for U.S. Patent No. 7,263,102
2004-04-16 Priority Date for U.S. Patent No. RE44,191
2004-10-05 U.S. Patent No. 6,801,933 Issued
2005-07-19 U.S. Patent No. 6,920,486 Issued
2005-08-10 Priority Date for U.S. Patent No. 7,304,570
2007-08-28 U.S. Patent No. 7,263,102 Issued
2007-12-04 U.S. Patent No. 7,304,570 Issued
2009-04-28 U.S. Patent No. 7,526,762 Issued
2009-05-26 U.S. Patent No. 7,539,212 Issued
2013-04-30 U.S. Patent No. RE44,191 Issued
2025-03-26 First Amended Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 7,304,570: Methods, Systems, And Computer Program Products For Providing Context-Based, Hierarchical Security For A Mobile Device (Issued Dec. 4, 2007)

The Invention Explained

  • Problem Addressed: The patent's background describes the inadequacy of mobile device security measures circa 2005. It notes that "all-or-nothing" solutions, like services that erase all data from a lost device, were too blunt and failed to "define a hierarchy of security actions depending on the context of loss of the mobile device" (Compl. ¶34; ’570 Patent, col. 2:4-8). Existing systems could not apply a less severe action for temporary misplacement and a more severe one for a confirmed theft (Compl. ¶34; ’570 Patent, col. 2:11-15).
  • The Patented Solution: The invention proposes a system that stores a "hierarchy of security actions" across multiple levels, where each level is associated with a specific "context" (Compl. ¶36; ’570 Patent, col. 2:34-45). As illustrated in the flowchart of Figure 3, the system first stores this hierarchy, then performs a security action from a first, lower-security level in response to a first context (e.g., device missing for 30 minutes), and later performs an action from a second, higher-security level in response to a second context (e.g., device missing for one hour) (Compl. ¶49-50; ’570 Patent, Fig. 3).
  • Technical Importance: This approach provided a more granular and intelligent security response that could be tailored to the likely severity of a device's loss, an improvement over conventional systems where "only a single action, such as deleting all of the data, is all that is available" (Compl. ¶45; ’570 Patent, col. 7:43-47).

Key Claims at a Glance

  • The complaint asserts independent claim 1 (Compl. ¶55, ¶69).
  • Essential elements of Claim 1 include:
    • storing a hierarchy of security actions for at least one of protecting data stored on a mobile device and preventing unauthorized use of the mobile device, the hierarchy including a plurality of security levels, each security level including at least one context-based security action;
    • performing at least one security action associated with a first security level in response to the existence of a first context associated with the first security level; and
    • performing at least one security action associated with a second security level in response to the existence of a second context associated with the second security level.
  • The complaint reserves the right to assert dependent claims (Compl. ¶55).

U.S. Patent No. 6,801,933: System And Method For Proactive Caching Employing Graphical Usage Description (Issued Oct. 5, 2004)

The Invention Explained

  • Problem Addressed: The patent addresses the problem that servers supporting websites were "often slow to respond to a user's request for data" because they had to retrieve it reactively after the request was made (Compl. ¶87; ’933 Patent, col. 1:21-23).
  • The Patented Solution: The invention describes a proactive caching system that anticipates a user's navigation. As shown in the architecture of Figure 2, an "application state controller" uses a "graphical usage description"—a diagram representing the functional flow of the application—to determine a user's likely next state based on their current state (Compl. ¶96-97; ’933 Patent, col. 3:6-24). A "data generator" then preprocesses and caches the data for that predicted next state "before the user accesses the next state," aiming to improve response time (Compl. ¶91; ’933 Patent, col. 2:65-67).
  • Technical Importance: By proactively caching data based on a defined application flow, the invention sought to improve server performance and deliver faster response times, particularly for complex web applications under heavy user load (Compl. ¶93; ’933 Patent, col. 3:38-46).

Key Claims at a Glance

  • The complaint asserts independent claims 1 and 7 (Compl. ¶101, ¶113).
  • Essential elements of Claim 1 (a system) include:
    • a graphical usage description of a plurality of states of an application;
    • a request handler, which retrieves data based on a request and produces an indication of a current state of a user;
    • an application state controller, which determines a next state based on the current state and the graphical usage description; and
    • a data generator, which caches data based on the current state and the next state.
  • Claim 7 recites a corresponding method. The complaint reserves the right to assert other claims (Compl. ¶101).

Multi-Patent Capsules

  • U.S. Patent No. 6,920,486 (Method And Apparatus For Enabling Synchronizing Data In Different Devices Having Different Capabilities And Unmatched Data Fields, issued Jul. 19, 2005)

    • Technology Synopsis: The patent addresses the challenge of synchronizing data between devices with different data fields (e.g., one device's contact application has a field the other lacks) (Compl. ¶125; ’486 Patent, col. 2:8-16). The invention proposes a "sync field scanner" on a server that detects the use of such a "problem field" on one device and alerts the user to establish a mapping correspondence only when the field is first used, avoiding a tedious upfront setup process (Compl. ¶129; ’486 Patent, col. 5:32-42).
    • Asserted Claims: Independent Claim 1 is asserted (Compl. ¶138, ¶149).
    • Accused Features: The complaint alleges that Defendant's provision of its smart home systems, which synchronize data between various devices and a central server, infringes the claimed method (Compl. ¶149).
  • U.S. Patent No. 7,263,102 (Multi-Path Gateway Communications Device, issued Aug. 28, 2007)

    • Technology Synopsis: The patent addresses the difficulty of sharing up-to-date personalized information (e.g., contacts, passwords) across multiple, disparate communications devices with varying capabilities (Compl. ¶158; ’102 Patent, col. 1:57-2:7). The invention discloses a "personal digital gateway" (PDG) that provides a central interface to manage this data, using "rule-based profiles" to categorize and route information to different devices in a compatible format (Compl. ¶163, ¶185; ’102 Patent, col. 2:54-3:4).
    • Asserted Claims: Independent Claim 14 is asserted (Compl. ¶189, ¶199).
    • Accused Features: The accused products are alleged to include a personal digital gateway, such as a Lutron smart hub, that uses a rule-based dataserver to manage communications with various smart devices like lights and thermostats (Compl. ¶200).
  • U.S. Patent No. RE44,191 (Electric Device, Computer, Program, System And Method Of Setting Up User Applications, issued Apr. 30, 2013)

    • Technology Synopsis: The patent addresses the complexity of setting up user applications that share data across different electronic devices, which can require "complex actions from the users" (Compl. ¶217; ’191 Patent, col. 1:28-36). The invention simplifies setup by evaluating a "correspondence indicator value" that characterizes the readiness of two devices to interact. Based on this value, the system can decide whether to execute a command that "replaces a series of actions of the user," such as navigating through a complex menu structure (Compl. ¶221; ’191 Patent, col. 3:48-58).
    • Asserted Claims: Independent Claim 19 is asserted (Compl. ¶235).
    • Accused Features: The complaint alleges that the Accused Products include a computer program for executing a process of setting up and pairing devices that replaces a series of user actions, enabling interactive operation between applications on different devices (Compl. ¶236).
  • U.S. Patent No. 7,526,762 (Network With Mobile Terminals As Browsers Having Wireless Access To The Internet And Method For Using Same, issued Apr. 28, 2009)

    • Technology Synopsis: The patent addresses problems with "thin client" mobile terminals that rely on a remote server for browser functionality, including security risks and configuration challenges (Compl. ¶255-257; ’762 Patent, col. 2:35-55). The solution is a system where a configuration server manages software upgrades for a plurality of users, providing the upgrade to respective terminal servers for subsequent distribution to the terminals, and tracking which servers have not yet received the upgrade (Compl. ¶262; ’762 Patent, claim 7).
    • Asserted Claims: Independent Claim 7 is asserted (Compl. ¶278, ¶287).
    • Accused Features: The Accused Products are alleged to comprise a system with a configuration server unit (Lutron's cloud/server infrastructure) that manages and distributes software upgrades to terminal servers (Lutron hubs/bridges) for subsequent distribution to end-user terminals (Lutron devices) (Compl. ¶288).
  • U.S. Patent No. 7,539,212 (Method And Apparatus For Mac Layer Inverse Multiplexing In A Third Generation Radio Access Network, issued May 26, 2009)

    • Technology Synopsis: The patent addresses a data rate limitation in 3G radio access networks where a high-rate data flow from a core network exceeds the rate a user's device can accept on a single channel (Compl. ¶300, ¶315; ’212 Patent, col. 4:20-27). The solution involves an "inverse multiplexer" (IMUX) at the MAC sublayer that breaks the single high-rate flow into a plurality of lower-rate data flows and includes information telling the user's equipment how to recombine them (Compl. ¶303; ’212 Patent, col. 4:50-58).
    • Asserted Claims: Independent Claim 14 is asserted (Compl. ¶316, ¶326).
    • Accused Features: The complaint alleges that Defendant's products perform a method of receiving a data flow from a core network and preparing a plurality of lower-rate media access control data flows for conveyance to user equipment (Compl. ¶327).

III. The Accused Instrumentality

Product Identification

The complaint identifies Lutron's "Smart Home Systems" as the "Accused Products" (Compl. ¶19). This includes the Lutron Caséta, RA2 Select, RadioRA3, and Athena Smart Systems, along with their constituent components such as smart hubs, bridges, wireless thermostats, smart lighting, switches, dimmers, sensors, and keypads (Compl. ¶19, p. 4-6). Also accused are the "Lutron Smart Home Apps," the "Lutron Server(s)/Cloud/Communications Infrastructure," and "Lutron's Extensible Application Protocol (LEAP)" (Compl. ¶19, p. 6).

Functionality and Market Context

The Accused Products constitute integrated smart home ecosystems where a central controller (e.g., Caséta Smart Hub) communicates with numerous endpoint devices (e.g., lights, shades) (Compl. ¶19, p. 4). This system allows users to control devices locally and remotely via the Lutron App, which interfaces with Lutron's cloud infrastructure (Compl. ¶19, p. 6). The complaint alleges these systems are used for "home security and control" (Compl. ¶20).

IV. Analysis of Infringement Allegations

U.S. Patent No. 7,304,570 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
storing a hierarchy of security actions...the hierarchy including a plurality of security levels, each security level including at least one context-based security action The Accused Products store a hierarchy of security actions for protecting data on a mobile device and preventing unauthorized use, which includes multiple context-based security levels. ¶70 col. 5:28-33
performing at least one security action associated with a first security level in response to the existence of a first context associated with the first security level The Accused Products perform a security action associated with a first security level based on a first context. ¶70 col. 5:33-42
performing at least one security action associated with a second security level in response to the existence of a second context associated with the second security level The Accused Products perform a security action associated with a second security level based on a second context. ¶70 col. 5:43-50
  • Identified Points of Contention:
    • Scope Questions: The primary question is one of definitional scope. The patent's specification focuses heavily on protecting sensitive data (e.g., contacts, emails) on a lost or stolen "mobile device" like a PDA or phone (Compl. ¶30; ’570 Patent, col. 1:17-40). A point of contention will be whether the alleged functionality of a smart lighting system can be construed as providing "security for a mobile device" in the manner contemplated by the patent.
    • Technical Questions: The complaint's infringement allegation for this patent is conclusory (Compl. ¶70). A key question for the court will be what specific features of the Lutron systems constitute the "hierarchy of security actions" and the distinct first and second "contexts" required by the claim. The complaint alleges inducement through instructing on "multi-factor or two-factor authentication," which may be Plaintiff's proffered example of such a hierarchy (Compl. ¶71).

U.S. Patent No. 6,801,933 Infringement Allegations

Claim Element (from Independent Claim 7) Alleged Infringing Functionality Complaint Citation Patent Citation
receiving a request for data The Accused Products receive a request for data, for instance when a user interacts with the Lutron App. ¶113 col. 1:47-48
producing a current state based on the request Based on the request, the system produces a current state of the user within the application. ¶113 col. 1:49-50
determining a next state based on the current state The system determines a likely next state for the user based on their current state, allegedly using a graphical usage description. ¶113 col. 1:50-52
caching data based on the current state and the next state The system caches data for the determined next state in anticipation of the user's next action. ¶113 col. 1:53-54
associating the request with a user of an application having a plurality of states The request is associated with a specific user account and application that has multiple states (e.g., screens, views). ¶113 col. 4:54-58
  • Identified Points of Contention:
    • Technical Questions: The central issue will likely be evidentiary. Does the Lutron cloud infrastructure and app actually use a "graphical usage description" to predict a user's next state and proactively cache data as required by the claim? Figure 2 of the '933 patent, reproduced in the complaint, shows a specific architecture with a request handler, application state controller, and data generator working in concert (Compl. p. 37). The case may turn on whether the accused system's architecture and caching mechanism matches this claimed process or operates on a different, non-infringing principle.
    • Scope Questions: What constitutes a "graphical usage description" may be a key construction issue. The patent suggests it can be a "state diagram" or "a graph consisting of user interface screens linked together" that represents the "functional flow of the application" (’933 Patent, col. 1:35-41). Whether the accused system's internal logic or data structures meet this definition will be a point of contention.

V. Key Claim Terms for Construction

For the ’570 Patent:

  • The Term: "context-based, hierarchical security for a mobile device"
  • Context and Importance: This phrase defines the invention's core concept. Its construction will be critical to determining whether the patent's scope, seemingly focused on data protection for lost phones, can extend to the control and automation functions of a smart home system. Practitioners may focus on this term because the alleged infringement theory requires a broad interpretation that goes beyond the specification's primary examples.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The claims themselves do not limit "security" to data protection, also reciting "preventing unauthorized use of the mobile device" (Claim 1). This could be argued to cover unauthorized use of home controls via a mobile app. The patent also lists "deactivating one or more functions of the mobile device" as a possible security action (’570 Patent, col. 3:12-14).
    • Evidence for a Narrower Interpretation: The patent's "Background Art" section exclusively discusses problems related to sensitive data (pictures, emails, contacts) on devices like "mobile telephone handsets, personal digital assistance (PDAs), portable computers," and the risk of this data being subject to "unauthorized access" if the device is "lost or stolen" (’570 Patent, col. 1:17-27). This context may support a narrower construction limited to data security on personal computing devices.

For the ’933 Patent:

  • The Term: "graphical usage description"
  • Context and Importance: This is the specific tool the patent claims for predicting user behavior. The infringement analysis hinges on whether the accused system employs such a mechanism. Practitioners may focus on this term because it appears to require a specific, pre-defined map of application flow, which may or may not be present in the accused system's architecture.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification describes the concept broadly as a representation of "how the user was going to navigate through the Web site" and notes that "such an application can easily be represented as a state diagram: e.g., as a graph consisting of user interface Screens linked together" (’933 Patent, col. 1:24-25, 1:35-38). This could support an interpretation covering any internal data structure that maps application states.
    • Evidence for a Narrower Interpretation: The specification suggests the "graphical usage description" is a formal tool, noting that "if a developer uses a Web development tool to describe the logic of the application in a flow diagram...the logic...can be used to improve the performance" (’933 Patent, col. 2:57-62). This could support a narrower reading requiring a specific, developer-created diagram, as opposed to a dynamically generated map of user behavior. The patent's Figure 4, shown in the complaint, depicts a classic state-transition diagram for a messaging application (Compl. p. 38).

VI. Other Allegations

  • Indirect Infringement: For each asserted patent, the complaint alleges induced infringement, stating that Defendant took active steps with the specific intent to cause infringement by "advising or directing personnel, contractors, or end-users to use the Accused Products in an infringing manner" through advertising, user manuals, and training (Compl. ¶71, ¶201, ¶237). It also alleges contributory infringement, claiming the Accused Products have "special features that are specially designed to be used in an infringing way and that have no substantial uses other than ones that infringe" (Compl. ¶72, ¶202, ¶238).
  • Willful Infringement: Willfulness is alleged for all asserted patents based on Defendant having knowledge of the patents "at least as of the date when it was notified of the filing of the original complaint" (Compl. ¶73, ¶203, ¶239). The complaint further alleges that Defendant has a "policy or practice of not reviewing the patents of others... and thus have been willfully blind" to Plaintiff's patent rights (Compl. ¶74, ¶204, ¶240).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: can claim terms rooted in specific technical contexts of the early 2000s—such as "security for a mobile device" from the world of lost PDAs, or "graphical usage description" from early web application servers—be construed broadly enough to read on the integrated functionalities of a modern smart home ecosystem?
  • A second central question will be one of technical evidence: the complaint makes numerous allegations about the internal operations of the accused systems (e.g., that they use predictive caching based on application flow diagrams). The case will likely depend on whether discovery uncovers evidence that Lutron's systems operate in the specific manner required by the claims, or if they achieve similar user experiences through different, non-infringing technical implementations.
  • Finally, the assertion of seven patents covering a wide array of technologies raises a question of case strategy and focus. A key development to watch will be whether the litigation proceeds on all fronts or narrows to the one or two patents that present the most colorable infringement theories against the accused smart home products.