1:19-cv-00631
Encoditech LLC v. Weber Stephen Products LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Encoditech LLC (Texas)
- Defendant: Weber-Stephen Products LLC (Delaware)
- Plaintiff’s Counsel: RABICOFF LAW LLC
 
- Case Identification: 1:19-cv-00631, N.D. Ill., 02/01/2019
- Venue Allegations: Venue is asserted based on Defendant Weber-Stephen Products LLC having its principal place of business and headquarters within the Northern District of Illinois.
- Core Dispute: Plaintiff alleges that Defendant’s iGRILL line of wireless thermometers, when used with their corresponding mobile application, infringe a patent related to establishing direct, secure wireless communications between two mobile devices.
- Technical Context: The technology concerns methods for two mobile wireless devices to create a direct peer-to-peer communication link, including secure encryption, without relying on a centralized network infrastructure like a cellular base station.
- Key Procedural History: The asserted patent was subject to a Certificate of Correction, issued nearly 16 years after the patent originally granted. This certificate substantially amended the language of the asserted claim, which may significantly influence its scope and the infringement analysis.
Case Timeline
| Date | Event | 
|---|---|
| 1999-03-26 | Priority Date (’095 Patent) | 
| 2001-11-20 | Issue Date ('095 Patent) | 
| 2017-05-23 | Certificate of Correction Issued ('095 Patent) | 
| 2019-02-01 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,321,095 - "Wireless Communications Approach", issued November 20, 2001
The Invention Explained
- Problem Addressed: The patent identifies drawbacks in existing wireless technologies. Traditional two-way radios are often not private and only allow one person to speak at a time (half-duplex), while digital cellular systems require costly infrastructure and "air time" fees, limiting their use in remote areas ('095 Patent, col. 1:24-51, col. 2:1-6).
- The Patented Solution: The invention describes a system where two "mobile stations" can establish a direct, digital, and secure communication link without an intermediary base station ('095 Patent, col. 4:51-56). The system uses a multiple access protocol (dividing a radio frequency band into circuits and time slots) to manage communications ('095 Patent, col. 4:20-30). To ensure privacy, it details a "common key encryption approach" where one device (acting as a "pseudo base station") securely distributes a shared encryption key ("Ckey") to another device using a public/private key cryptographic exchange ('095 Patent, col. 15:52-67, col. 16:12-24).
- Technical Importance: The approach aimed to combine the infrastructure-free mobility of two-way radios with the security and call-service features of digital cellular phones ('095 Patent, col. 4:56-61).
Key Claims at a Glance
- The complaint asserts independent claim 7 ('Compl. ¶17).
- Claim 7, as modified by a 2017 Certificate of Correction, requires a wireless communication system comprising:- A first mobile station and a second mobile station.
- The first mobile station is configured to select a portion of an RF band, transmit a request signal, and establish a direct communication link after receiving an acknowledge signal.
- The first mobile station receives a public encryption key from the second mobile station.
- The first mobile station generates a message containing a common encryption key (Ckey).
- The first mobile station encrypts that message using the received public key and provides the encrypted message to the second mobile station.
- The second mobile station can then decrypt the message to extract the Ckey.
- Subsequent messages between the stations are encrypted using the Ckey.
- The second mobile station is configured to transmit the acknowledge signal in response to the first request signal.
 
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
The accused instrumentalities are Weber's iGRILL MINI, iGRILL 2, and iGRILL 3 wireless thermometers, which operate in conjunction with the Weber iGRILL mobile application ("app") on a smart device like an iPhone or Android phone (Compl. ¶17, p. 4, Fig. 1). Figure 1 in the complaint depicts the product line of accused thermometers (Compl. p. 4, Fig. 1).
Functionality and Market Context
The iGRILL system allows a user to monitor the temperature of food on a grill. A physical thermometer unit containing a probe transmits temperature data wirelessly via Bluetooth to a user's smartphone, which displays the information through the iGRILL app (Compl. ¶17). The complaint alleges the system functions by having the thermometer and the smart device communicate directly with each other using Bluetooth V4.0 low energy (Compl. ¶20). Figure 2 of the complaint provides a screenshot of instructions for connecting an iGRILL device to a smart device via the app, illustrating the Bluetooth pairing process (Compl. p. 5, Fig. 2).
IV. Analysis of Infringement Allegations
'095 Patent Infringement Allegations
| Claim Element (from Independent Claim 7, as corrected) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| a first mobile station; and a second mobile station | The system consists of two devices: a Weber iGRILL thermometer and a mobile device (e.g., iPhone or Android) running the Weber iGRILL app. | ¶¶18-19 | col. 4:1-4 | 
| wherein the first mobile station is configured to select a first portion of a radio frequency (RF) band to carry communications...transmit a first request signal...establish...a direct communication link | The iGRILL thermometers are alleged to select the 2.4 GHz ISM band and use Bluetooth V4.0 low energy to carry communications and establish a direct link between the mobile devices. | ¶20 | col. 15:39-49 | 
| receive from the second mobile station a public encryption key generated using a private encryption key associated with the second mobile station | "Upon information and belief," the iGRILL thermometers receive a public encryption key from the second device that was generated using a private key. | ¶21 | col. 16:1-11 | 
| generate a message containing a common encryption key (Ckey) | "Upon information and belief," the iGRILL thermometers generate a message with a common key, such as a Diffie-Hellman (DH) key, to be extracted by the other device. | ¶22 | col. 16:15-24 | 
| encrypt the message using the public encryption key to generate an encrypted message, provide the encrypted message to the second mobile station so that the second mobile station may decrypt...and extract the Ckey | "Upon information and belief," the iGRILL system uses a public-private key system where one device receives an encrypted message and decrypts it with its private key. | ¶23 | col. 16:25-32 | 
| wherein the second mobile station is configured to transmit, in response to receiving the first request signal...the first acknowledge signal | The iGRILL thermometers are alleged to establish a direct link upon receiving an acknowledgment signal from the second mobile station. | ¶24 | col. 2:21-25 | 
- Identified Points of Contention:- Scope Question: A central dispute may concern whether the combination of a special-purpose sensor (the iGRILL thermometer) and a general-purpose smartphone constitutes a system of two "mobile stations" as that term is used in the patent. The patent's specification repeatedly frames the invention in the context of voice communication handsets intended to replace two-way radios ('095 Patent, col. 1:24-29, col. 4:1-4). The defense may argue the claimed "mobile station" requires capabilities beyond what a temperature sensor possesses.
- Technical Question: The complaint alleges, "upon information and belief," a specific sequence for establishing a secure channel: one station generates a common key ("Ckey"), encrypts it with the other's public key, and sends it over. The actual operation of standard Bluetooth pairing protocols (like Secure Simple Pairing with ECDH) may differ. Such protocols typically involve both devices contributing to a shared secret, rather than one device generating and transmitting the final key to the other. Discovery will be needed to determine if the accused system's operation matches the specific sequence required by the claim.
 
V. Key Claim Terms for Construction
- The Term: "mobile station" 
- Context and Importance: The applicability of the patent to the accused iGRILL system hinges on the definition of this term. If construed narrowly to mean a device primarily for two-way voice communication, the patent may not read on a thermometer. If construed broadly to mean any portable wireless device, the infringement case may be stronger. Practitioners may focus on this term because the accused system pairs a general-purpose computing device with a special-purpose sensor, a configuration potentially outside what the patent's authors contemplated. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The term itself is general, and the patent abstract refers broadly to an "approach for providing communications between mobile stations" without an inherent limitation to voice ('095 Patent, Abstract).
- Evidence for a Narrower Interpretation: The detailed description explicitly links the term to a specific type of device, stating: "As used herein, the term 'mobile station' refers to a mobile communication device, for example a handset" ('095 Patent, col. 4:1-4). The background section's focus on solving problems with two-way radios and cellular phones further suggests a context of voice-centric communication devices ('095 Patent, col. 1:11-66).
 
- The Term: "generate a message containing a common encryption key (Ckey)" 
- Context and Importance: The claim recites a specific method where one station generates the Ckey and provides it to the other. This term is critical because standard, off-the-shelf protocols like Bluetooth may not implement this exact sequence. Infringement will depend on whether the accused system's key-exchange protocol can be accurately described as one station "generating" and "providing" the key, as opposed to both stations cooperatively calculating it. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The term "generate" could be interpreted broadly to include participating in a process that results in a key.
- Evidence for a Narrower Interpretation: The patent describes a specific architecture where one device, the "pseudo base station" (PBS), "privately determine[s]" the Ckey and then distributes it to other stations ('095 Patent, col. 15:61-67). This description of the PBS generating and sending the Ckey to the other stations ("TMSs") supports a narrower reading that requires a one-way transfer of the generated key, not a co-generation process ('095 Patent, col. 16:15-32).
 
VI. Other Allegations
The complaint does not contain specific factual allegations to support claims for indirect or willful infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
This case appears to center on two primary questions for the court:
- A core issue will be one of definitional scope: Can the term "mobile station", which is described in the patent specification in the context of voice-capable handsets, be construed to cover the accused system comprising a single-function temperature sensor and a general-purpose smartphone? 
- A key evidentiary question will be one of technical operation: Do the accused iGRILL products, which use the Bluetooth protocol, actually perform the specific, sequential cryptographic method recited in claim 7—namely, one device generating a "Ckey" and transmitting it to the other—or does the underlying protocol use a different, non-infringing method of establishing a shared secret key? The complaint's "information and belief" pleading for these technical steps suggests this will be a central point of discovery and expert testimony.