DCT
1:25-cv-08080
Encryptawave Tech LLC v. Gao Tek Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Encryptawave Technologies LLC (Illinois)
- Defendant: GAO Tek Inc. (Delaware)
- Plaintiff’s Counsel: Loaknauth Law, P.C.
 
- Case Identification: 1:25-cv-08080, S.D.N.Y., 09/30/2025
- Venue Allegations: Plaintiff alleges venue is proper in the Southern District of New York because Defendant has committed acts of infringement within the district.
- Core Dispute: Plaintiff alleges that Defendant’s Wi-Fi modules and access points infringe a patent related to dynamic security authentication for wireless communication networks.
- Technical Context: The technology concerns methods for securing wireless networks by moving beyond static encryption keys to a system of dynamically regenerated keys to protect against eavesdropping and unauthorized access.
- Key Procedural History: The complaint notes that during the patent's prosecution, the examiner allowed the relevant claims because the prior art of record did not teach the claimed combination of installing a node identifier, sending that information between nodes, and synchronously regenerating an authentication key based on that information.
Case Timeline
| Date | Event | 
|---|---|
| 2003-03-13 | ’664 Patent Priority Date | 
| 2007-06-19 | ’664 Patent Issue Date | 
| 2025-09-30 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,233,664 - "Dynamic Security Authentication for Wireless Communication Networks"
The Invention Explained
- Problem Addressed: The patent addresses security vulnerabilities in then-contemporary wireless communication systems, which often relied on static or semi-static encryption keys (’664 Patent, col. 1:55-57). These systems were described as susceptible to eavesdropping, unauthorized access, and "insider" or "super-user" attacks, where an attacker with privileged access could steal the key and compromise the entire system (’664 Patent, col. 2:1-6, col. 4:18-24). The patent specifically identifies weaknesses in the Wired Equivalent Privacy (WEP) standard (’664 Patent, col. 3:60-61).
- The Patented Solution: The invention proposes a method to overcome these issues by providing "continuous encryption key modification" (’664 Patent, col. 4:28-29). The system assigns a "node identifier," comprising an address and an initial authentication key, to network nodes (e.g., a user device and an access point) (’664 Patent, col. 6:35-38). Based on this shared identifier, the two nodes can "synchronously regenerate" new authentication keys, making the key lifetime too short for an intruder to effectively break (’664 Patent, col. 4:29-31, col. 6:46-50). This process is designed to be clock-free and fully automated (’664 Patent, col. 4:44-47).
- Technical Importance: This approach provided a conceptual framework for dynamic key management to enhance security beyond the static shared keys that proved to be a significant weakness in early Wi-Fi security protocols (Compl. ¶17).
Key Claims at a Glance
- The complaint asserts independent claim 1 (Compl. ¶20).
- The essential steps of claim 1 are:- providing a node identifier comprising an address and an initial authentication key;
- installing the node identifier at a first network node;
- storing the node identifier at a second network node;
- sending node identifier information from a first network node to a second network node; and
- synchronously regenerating an authentication key at two network nodes based upon node identifier information.
 
- The complaint does not explicitly reserve the right to assert other claims.
III. The Accused Instrumentality
Product Identification
The complaint accuses a range of Defendant's products, including the "GAO Tek 02.11ah Low Power IoT Wi-Fi module" and the "GAOTek Wi-Fi Wall Plate AP," among others ("Accused Instrumentalities") (Compl. ¶¶20, 29). The complaint presents a screenshot of Defendant's webpage for the IoT Wi-Fi module (Compl. p. 8).
Functionality and Market Context
- The complaint alleges the Accused Instrumentalities are Wi-Fi devices that support wireless connections using WPA2 (Wi-Fi Protected Access 2) security, based on the IEEE 802.11i standard (Compl. ¶21).
- This functionality allows the devices to connect securely to other Wi-Fi enabled devices, such as computers and access points, by using a device-specific address (MAC address) and an initial authentication key (e.g., a pre-shared key or password) to establish the connection (Compl. ¶22).
IV. Analysis of Infringement Allegations
’664 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| providing a node identifier comprising an address and an initial authentication key | The system utilizes a device MAC address and a pre-shared key (PSK), such as a Wi-Fi password, which together allegedly form the "node identifier." | ¶22 | col. 6:35-38 | 
| installing the node identifier at a first network node | A user installs the identifier on an Accused Instrumentality (the first node) by configuring it with the Wi-Fi password. The MAC address is installed at the time of manufacture. | ¶23 | col. 6:39-40 | 
| storing the node identifier at a second network node | The same MAC address and password (pre-shared key) are stored on a second network node, such as a Wi-Fi access point or another device. | ¶24 | col. 6:41-42 | 
| sending node identifier information from a first network node to a second network node | During the WPA2 4-Way Handshake, the devices exchange information, such as MAC addresses and key values derived from the initial key, to authenticate. The complaint provides a diagram from the IEEE 802.11i standard illustrating this message exchange (Compl. p. 16). | ¶25 | col. 6:43-45 | 
| synchronously regenerating an authentication key at two network nodes based upon node identifier information | Both the Accused Instrumentality and the second device allegedly regenerate temporal keys (e.g., the Pairwise Transient Key or PTK) for the session based on the shared initial key and exchanged information. | ¶26 | col. 6:46-50 | 
Identified Points of Contention
- Scope Questions: A potential dispute may arise over whether the WPA2 4-Way Handshake protocol constitutes "sending node identifier information" as required by the claim. The defense may argue that the protocol does not send the "initial authentication key" itself, but rather sends nonces and message integrity codes derived from it. The case may turn on whether sending information derived from the identifier meets this claim limitation.
- Technical Questions: The analysis may focus on whether the term "synchronously regenerating" can be read to cover the per-session key establishment process of WPA2. The patent specification discusses a "continuous" key modification process driven by daemons, which raises the question of whether the one-time generation of a session key at the start of a connection performs the same function as the claimed "regeneration." (’664 Patent, col. 4:28-29, col. 5:27-31).
V. Key Claim Terms for Construction
- The Term: "synchronously regenerating an authentication key" - Context and Importance: This term is central to the infringement theory. The plaintiff’s case appears to depend on this term covering the generation of a Pairwise Transient Key (PTK) during a WPA2 handshake. Defendant will likely argue that this process is a one-time key establishment for a session, not a continuous "regeneration" as the patent specification may suggest is the invention.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The plain language of the claim does not specify a frequency or continuous nature for the regeneration. Plaintiff may argue that creating a new, synchronized key at the start of each new session constitutes "regenerating" the key.
- Evidence for a Narrower Interpretation: The detailed description repeatedly refers to a more dynamic process, such as "continuous encryption key modification" and daemons that "regenerate new dynamic authentication keys (DAKs) every δt." (’664 Patent, col. 4:28-29, col. 5:29-31). This may support a construction requiring a periodic or ongoing process rather than a per-session setup.
 
 
- The Term: "node identifier information" - Context and Importance: The infringement allegation hinges on the data exchanged during the WPA2 handshake qualifying as "node identifier information." Practitioners may focus on this term because the WPA2 protocol does not transmit the password (initial key) directly; it transmits values calculated using the password.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The term "information" is broad and could be construed to include any data that is derived from or based upon the underlying node identifier (address and key).
- Evidence for a Narrower Interpretation: The patent abstract describes sending "the address along with information encrypted by the initial authentication key." This could be interpreted more narrowly to require sending a value that is a direct encryption of some data with the key, which may differ from the nonce-and-MIC-based exchange in WPA2.
 
 
VI. Other Allegations
Indirect Infringement
The complaint alleges that Defendant's customers infringe by using the Accused Instrumentalities as described and that Defendant induces this infringement by advertising, marketing, and offering the products for sale for such use (Compl. ¶27).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the term "synchronously regenerating," described in the patent's context of a continuous, daemon-driven process, be construed to cover the standardized, per-session key establishment protocol of WPA2?
- A key evidentiary question will be one of technical mapping: does the complex exchange of nonces, MAC addresses, and message integrity codes during the WPA2 4-Way Handshake constitute "sending node identifier information" as required by the claim, or is there a fundamental mismatch between the information the claim requires to be sent and the information that is actually transmitted in the accused protocol?