DCT
1:23-cv-09902
IoT Innovations LLC v. Leviton Mfg Co Inc
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: IoT Innovations LLC (Texas)
- Defendant: Leviton Manufacturing Co., Inc. (Delaware)
- Plaintiff’s Counsel: Rozier Hardt McDonough PLLC
- Case Identification: 1:23-cv-09902, N.D. Ill., 09/12/2023
- Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains a regular and established place of business in the district, the "Leviton Live Chicago" Customer Experience Center, and has committed acts of infringement within the district.
- Core Dispute: Plaintiff alleges that Defendant’s smart home platform, including its Decora Smart® devices and associated cloud services and mobile applications, infringes five patents related to proactive data caching, context-based security, and various network communication methods.
- Technical Context: The lawsuit concerns the Internet of Things (IoT) and smart home automation market, where network-connected devices like switches, plugs, and sensors are managed and controlled centrally via applications and cloud infrastructure.
- Key Procedural History: The complaint notes that a Certificate of Correction was issued for U.S. Patent No. 7,304,570 on November 4, 2008. No other procedural events, such as prior litigation or administrative proceedings involving the asserted patents, are mentioned.
Case Timeline
| Date | Event |
|---|---|
| 2000-08-23 | U.S. Patent No. 6,801,933 Priority Date |
| 2002-11-27 | U.S. Patent No. 7,379,464 Priority Date |
| 2004-10-05 | U.S. Patent No. 6,801,933 Issue Date |
| 2004-10-13 | U.S. Patent No. 7,394,798 Priority Date |
| 2005-08-10 | U.S. Patent No. 7,304,570 Priority Date |
| 2007-01-09 | U.S. Patent No. 7,593,428 Priority Date |
| 2007-12-04 | U.S. Patent No. 7,304,570 Issue Date |
| 2008-05-27 | U.S. Patent No. 7,379,464 Issue Date |
| 2008-07-01 | U.S. Patent No. 7,394,798 Issue Date |
| 2008-11-04 | U.S. Patent No. 7,304,570 Certificate of Correction |
| 2009-09-22 | U.S. Patent No. 7,593,428 Issue Date |
| 2023-09-12 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,801,933 - "System And Method For Proactive Caching Employing Graphical Usage Description," issued October 5, 2004
The Invention Explained
- Problem Addressed: The patent describes that servers supporting web-based applications are often slow to respond to user requests because they must reactively retrieve the necessary data after a request is made (’933 Patent, col. 1:21-27).
- The Patented Solution: The invention proposes a system for "proactive" caching. It utilizes a "graphical usage description," which is a diagram representing the functional flow of an application (e.g., a state diagram), to anticipate a user's likely next action. Based on the user's current state within the application, the system predicts the "likely next state" and pre-emptively caches the data required for that state, thereby improving system responsiveness ('933 Patent, Abstract; col. 2:56-65).
- Technical Importance: This approach sought to reduce latency in server-client interactions by shifting from a reactive "request-and-respond" model to a predictive, proactive data-caching model ('933 Patent, col. 1:11-20).
Key Claims at a Glance
- The complaint asserts independent method claim 7 (Compl. ¶25).
- Essential elements of claim 7 include:
- receiving a request for data;
- producing a current state based on the request;
- determining a next state based on the current state;
- caching data based on the current state and the next state; and
- associating the request with a user of an application having a plurality of states, wherein the user is located in one of the plurality of states.
- Plaintiff alleges infringement of "one or more claims" generally, suggesting other claims may be asserted later (Compl. ¶24).
U.S. Patent No. 7,304,570 - "Methods, Systems, And Computer Program Products For Providing Context-Based, Hierarchical Security For A Mobile Device," issued December 4, 2007
The Invention Explained
- Problem Addressed: The patent identifies a lack of nuance in conventional mobile device security. Actions like deleting all data are often too severe for a temporarily misplaced device, yet necessary for a stolen one. Existing security measures do not adequately distinguish between different contexts of device loss (’570 Patent, col. 2:4-16).
- The Patented Solution: The invention describes a system of "context-based, hierarchical security." It establishes multiple security levels, where each level is tied to a specific "context" (e.g., time elapsed since being reported lost, failure to receive a polling signal). Different security actions are performed depending on the level, allowing for an escalating response that can range from a simple notification to a complete data wipe ('570 Patent, Abstract; col. 7-8, Table 1).
- Technical Importance: The invention provides a flexible and graduated security response for mobile devices, allowing the protective measures to adapt to the perceived severity of the threat ('570 Patent, col. 2:24-30).
Key Claims at a Glance
- The complaint asserts independent method claim 1 (Compl. ¶35).
- Essential elements of claim 1 include:
- storing a hierarchy of security actions for protecting a mobile device, where the hierarchy includes multiple security levels, each having at least one context-based security action;
- performing at least one security action associated with a first security level in response to the existence of a first context; and
- performing at least one security action associated with a second security level in response to the existence of a second context.
- Plaintiff alleges infringement of "one or more claims" generally (Compl. ¶34).
U.S. Patent No. 7,379,464 - "Personal Digital Gateway," issued May 27, 2008
- Patent Identification: U.S. Patent No. 7,379,464, "Personal Digital Gateway," issued May 27, 2008 (Compl. ¶46).
- Technology Synopsis: The patent addresses the challenge of managing personalized information across a user's various communications devices. It discloses a "personal digital gateway" to serve as a centralized interface for controlling access to, and management of, personalized data, using a rule-based engine and profiles to tailor data presentation and functionality for each specific device (’464 Patent, Abstract; col. 2:30-44).
- Asserted Claims: At least independent claim 1 (Compl. ¶51).
- Accused Features: The complaint alleges that the Leviton smart home platform functions as a personal digital gateway, managing user profiles and data flow between the My Leviton App and various connected smart devices (Compl. ¶16, ¶52).
U.S. Patent No. 7,394,798 - "Push-To Talk Over Ad-Hoc Networks," issued July 1, 2008
- Patent Identification: U.S. Patent No. 7,394,798, "Push-To Talk Over Ad-Hoc Networks," issued July 1, 2008 (Compl. ¶63).
- Technology Synopsis: The patent seeks to improve Push-To-Talk (PTT) services that traditionally rely on cellular network infrastructure. The invention enables network nodes (e.g., mobile phones) to form temporary, direct "ad-hoc" network groups that can communicate via radio connections without necessarily using the central network, thereby saving network resources and enabling localized communication (’798 Patent, Abstract; col. 2:1-8).
- Asserted Claims: At least independent claim 16 (Compl. ¶68).
- Accused Features: The complaint accuses the Leviton smart home products, which allegedly use Wi-Fi, Zigbee, and/or Z-Wave capabilities to form temporary groups and communicate directly with each other via radio connections (Compl. ¶16, ¶69).
U.S. Patent No. 7,593,428 - "Apparatus, And Associated Method, For Forming, And Operating Upon, Multiple-Checksum-Protected Data Packet," issued September 22, 2009
- Patent Identification: U.S. Patent No. 7,593,428, "Apparatus, And Associated Method, For Forming, And Operating Upon, Multiple-Checksum-Protected Data Packet," issued September 22, 2009 (Compl. ¶79).
- Technology Synopsis: The patent addresses the inflexibility of standard data packet checksums (e.g., in UDP), where an error in any part of a payload can cause the entire packet to be discarded. The invention proposes a method for creating a data packet with multiple, distinct portions, each protected by its own dynamically selectable checksum. This allows for differentiated error protection within a single packet, improving efficiency for real-time applications (’428 Patent, Abstract; col. 2:48-53).
- Asserted Claims: At least independent claim 14 (Compl. ¶84).
- Accused Features: The complaint accuses the Leviton platform's method of data communication, alleging it involves formatting data into packets with multiple, separately-protected portions (Compl. ¶85).
III. The Accused Instrumentality
- Product Identification: The accused instrumentalities are "Leviton's Smart Home control platform and systems" (Compl. ¶16). This ecosystem includes the "Decora Smart® Devices" (such as switches, dimmers, plugs, and sensors), the "My Leviton Cloud Service," the "My Leviton App," and associated hardware and software (Compl. ¶16).
- Functionality and Market Context: The accused products constitute a smart home automation system. Hardware devices are installed in a home and communicate using various wireless protocols, including Wi-Fi, Zigbee, and Z-Wave/Z-Wave Plus (Compl. ¶16). Users interact with and control these devices through the "My Leviton App" on a mobile device, with the "My Leviton Cloud Service" providing the backend infrastructure for management and communication (Compl. ¶16). The complaint notes that Leviton markets these products as transforming residential and commercial spaces "from ordinary to extraordinary" (Compl. ¶11).
IV. Analysis of Infringement Allegations
No probative visual evidence provided in complaint.
U.S. Patent No. 6,801,933 Infringement Allegations
| Claim Element (from Independent Claim 7) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| receiving a request for data | The Accused Products perform a method that includes receiving a request for data. | ¶26 | col. 3:7-9 |
| producing a current state based on the request | The method includes producing a current state based on the request. | ¶26 | col. 3:19-22 |
| determining a next state based on the current state | The method includes determining a next state based on the current state. | ¶26 | col. 3:23-26 |
| caching data based on the current state and the next state | The method includes caching data based on the current state and the next state. | ¶26 | col. 3:29-32 |
| associating the request with a user of an application having a plurality of states, wherein the user is located in one of the plurality of states | The method includes associating the request with a user of an application having a plurality of states, where the user is located in one of those states. | ¶26 | col. 3:7-9 |
- Identified Points of Contention:
- Technical Question: The complaint's allegation tracks the claim language without detailing how the accused system performs the claimed steps (Compl. ¶26). A key technical question will be what evidence demonstrates that the Leviton platform uses a predictive mechanism equivalent to the patent's "graphical usage description" to determine a "next state" for proactive caching, as opposed to employing a more conventional or generic caching algorithm.
- Scope Question: The '933 Patent's specification is framed in the context of a user navigating web pages ('933 Patent, col. 2:10-15). A potential dispute may arise over whether the "plurality of states" of an "application" as claimed can be read to cover the user interactions and device statuses within a smart home IoT ecosystem.
U.S. Patent No. 7,304,570 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| storing a hierarchy of security actions for at least one of protecting data stored on a mobile device and preventing unauthorized use of the mobile device, the hierarchy including a plurality of security levels, each security level including at least one context-based security action | The Accused Products perform a method that stores a hierarchy of security actions with multiple security levels, each containing a context-based security action. | ¶36 | col. 2:32-38 |
| performing at least one security action associated with a first security level in response to the existence of a first context associated with the first security level | The method includes performing a security action for a first security level in response to a first context. | ¶36 | col. 2:40-43 |
| performing at least one security action associated with a second security level in response to the existence of a second context associated with the second security level | The method includes performing another security action for a second security level in response to a second context. | ¶36 | col. 2:43-46 |
- Identified Points of Contention:
- Scope Question: The '570 Patent is directed to "mobile device security," with a background focused on protecting data and preventing unauthorized use when a device like a phone or PDA is lost or stolen ('570 Patent, col. 1:15-27). This raises the question of whether the security functions of the accused Leviton home automation platform fall within the scope of the patent's claims, or if there is a fundamental mismatch between the problem the patent solves (securing a lost mobile device) and the functionality of the accused system (controlling a smart home).
- Technical Question: The complaint alleges the existence of "context-based, hierarchical security" but provides no specific examples of the "contexts," "security levels," or "security actions" implemented in the accused platform (Compl. ¶36). A central factual dispute will likely concern whether the accused products actually implement such a multi-leveled, context-aware security architecture as required by the claim.
V. Key Claim Terms for Construction
U.S. Patent No. 6,801,933
- The Term: "graphical usage description" (from claim 1, which claim 7 depends from)
- Context and Importance: This term is the central mechanism of the invention, enabling the prediction of a user's next state for proactive caching. The infringement analysis for the '933 Patent will likely depend heavily on whether the accused system uses a structure that meets this definition.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification describes it as a "flow diagram" that "graphically illustrates the flow of the application from state to state" ('933 Patent, col. 3:24-25). A plaintiff may argue this covers any data structure, not necessarily a literal graphic, that models user navigation paths and state transitions.
- Evidence for a Narrower Interpretation: A defendant may argue the term is limited by the embodiments shown, which are explicit state-transition diagrams with nodes and directed edges ('933 Patent, Figs. 3-4). The use of the word "graphical" could be argued to imply a representation with this specific structure.
U.S. Patent No. 7,304,570
- The Term: "context-based security action" (from claim 1)
- Context and Importance: This term defines the trigger for the claimed hierarchical security. The dispute will turn on what constitutes a "context" and whether the accused platform performs actions tied to such contexts. Practitioners may focus on this term because the patent's context is loss or theft of a mobile device.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent provides several examples of a "context," including a user notification, a time period elapsing, or the failure to receive an acknowledgement to a poll ('570 Patent, col. 7-8, Table 1; col. 10:56-62). This could support a broad reading covering various system triggers.
- Evidence for a Narrower Interpretation: A defendant could argue that, read in light of the entire specification, a "context" must relate to the physical security status of the mobile device (e.g., misplaced, likely stolen). The patent's background repeatedly frames the problem in these terms ('570 Patent, col. 2:4-16), suggesting the term should not be construed to cover generic software events unrelated to device loss.
VI. Other Allegations
- Indirect Infringement: Plaintiff alleges both induced and contributory infringement for the '570, '464, and '798 patents. Inducement is based on allegations that Defendant provides instructions, advertisements, and user guides that direct customers to use the accused products in an infringing manner (Compl. ¶37, ¶53, ¶70). Contributory infringement is based on allegations that the accused products contain special features specifically designed for infringing use that have no substantial non-infringing purpose (Compl. ¶38, ¶54, ¶71).
- Willful Infringement: Plaintiff alleges willful infringement for the '570, '464, and '798 patents. The allegations are based on both post-suit knowledge (Defendant's awareness of the patents "at least as of the date" of filing) and alleged pre-suit willful blindness, claiming Defendant has a "policy or practice of not reviewing the patents of others" (Compl. ¶39-41, ¶55-57, ¶72-74).
VII. Analyst’s Conclusion: Key Questions for the Case
- Evidentiary Sufficiency: A primary issue will be one of factual substantiation. The complaint makes broad, conclusory allegations that often mirror the language of the asserted claims without providing specific technical details about how the accused products allegedly operate. A key question for the court will be whether the plaintiff can produce sufficient evidence to support these theories, such as showing the Leviton platform uses a "graphical usage description" ('933 patent) or a hierarchical security structure based on device-loss "contexts" ('570 patent).
- Applicability of Technical Scope: The case raises a significant question of technological domain alignment. Several patents-in-suit were developed to solve problems in fields that may be distinct from smart home automation. A central point of contention will be whether claim terms and concepts rooted in contexts like web-page navigation ('933 patent), mobile phone theft protection ('570 patent), and PTT for handsets ('798 patent) can be construed to cover the inter-device communication and control functions of a fixed smart home ecosystem.
Analysis metadata