DCT
2:15-cv-00054
Wetro LAN LLC v. EnGenius Tech Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Wetro Lan LLC (Texas)
- Defendant: EnGenius Technologies, Inc. (Delaware)
- Plaintiff’s Counsel: Austin Hansley PLLC.
 
- Case Identification: 2:15-cv-00054, E.D. Tex., 01/23/2015
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendant has transacted business and committed acts of patent infringement within the district.
- Core Dispute: Plaintiff alleges that Defendant’s wireless router products infringe a patent related to a non-user-configurable network security apparatus.
- Technical Context: The technology concerns network security devices, commonly known as firewalls, designed to protect small office/home office (SOHO) computer networks from unauthorized access over the internet.
- Key Procedural History: The complaint does not reference any prior litigation, inter partes review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event | 
|---|---|
| 2000-03-07 | U.S. Patent No. 6,795,918 Priority Date | 
| 2004-09-21 | U.S. Patent No. 6,795,918 Issues | 
| 2015-01-23 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,795,918 - "Service Level Computer Security"
- Patent Identification: U.S. Patent No. 6,795,918, "Service Level Computer Security," issued September 21, 2004.
The Invention Explained
- Problem Addressed: The patent describes a growing security threat to home and small business computers from hackers, exacerbated by the rise of "always-on" high-speed internet connections like DSL and cable modems. It posits that existing firewall solutions were often too complex for non-technical users to install and maintain, and could be accidentally disabled or misconfigured, leaving networks vulnerable (col. 2:21-53).
- The Patented Solution: The invention proposes a hardware-based security apparatus that filters network traffic based on "service level" information (e.g., protocol type, source port, destination port) rather than complex IP address rules. A central feature is a "non-user configurable" decision-making component, such as a lookup table, that contains pre-set rules about which internet services are permitted. This design is intended to provide a simple, effective, "plug-and-play" security solution that a user cannot accidentally misconfigure or disable (col. 3:11-21; FIG. 2).
- Technical Importance: The described approach aimed to simplify network security for the growing SOHO market by removing the need for user configuration, which was identified as a primary source of security vulnerabilities in other firewall products of the era (col. 3:4-9).
Key Claims at a Glance
- The complaint asserts "one or more claims" and specifically recites the language of independent claim 10 (Compl. ¶10-11).
- Independent Claim 10 recites a computer security apparatus with the following essential elements:- A first communication interface to receive data packets from a public network.
- A packet analyzer coupled to the interface, which includes:- a protocol storage device;
- a source port storage device;
- a destination port storage device;
- a lookup table device coupled to the storage devices to determine if a data packet is authorized.
 
- A second communication interface to send authorized data to a private network.
- A limitation that the packet analyzer only permits data for a "selected group of Internet services."
- A limitation that the "lookup table device is non-configurable by a computer user."
- A limitation that the protocol information includes "transport types."
 
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
- The "EnGenius ESR300H Wireless Router and similarly situated EnGenius Wireless Routers" (Compl. ¶11).
Functionality and Market Context
- The complaint identifies the accused instrumentalities as wireless routers, which are network devices that manage traffic between a local private network and a public network like the internet (Compl. ¶11). The complaint alleges these products are "apparatuses that infringe the '918 patent" by incorporating the features recited in the patent's claims (Compl. ¶10-11). No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint provides a "notice pleading" that recites the language of claim 10 and alleges that the Accused Instrumentality infringes, but it does not map specific product features to claim elements.
’918 Patent Infringement Allegations
| Claim Element (from Independent Claim 10) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| A computer security apparatus comprising: (1) a first communication interface coupled to a public network, the first communication interface configured to receive data from the public network, the public network data including a plurality of data packets; | The complaint alleges the Accused Instrumentality is an apparatus possessing a first communication interface for receiving data from a public network (e.g., a WAN port). | ¶10, ¶11 | col. 4:37-43 | 
| (2) a packet analyzer coupled to the first communication interface, the packet analyzer configured to receive and analyze the data packets from the public network, the packet analyzer including: (3) a protocol storage device... (4) a source port storage device... (5) a destination port storage device... | The complaint alleges the Accused Instrumentality contains a packet analyzer with distinct storage devices for protocol, source port, and destination port information. | ¶10, ¶11 | col. 5:36-40 | 
| (6) a lookup table device coupled to the protocol storage, the source port storage, and the destination port storage devices, the lookup table configured to determine based on the data within the first data packet whether the first data packet should be authorized to be transferred through the computer security apparatus; | The complaint alleges the Accused Instrumentality uses a lookup table device to authorize or block packets based on the stored protocol and port information. | ¶10, ¶11 | col. 6:6-12 | 
| (7) a second communication device interface coupled to a private network and the packet analyzer, the second communication interface configured to receive the authorized data from the packet analyzer for sending to the private network; | The complaint alleges the Accused Instrumentality has a second communication interface for sending authorized data to a private network (e.g., LAN ports). | ¶10, ¶11 | col. 4:45-48 | 
| (8) wherein the packet analyzer only permits data packets for a selected group of Internet services to be transferred to the private network and the lookup table device is non-configurable by a computer user; | The complaint alleges the Accused Instrumentality restricts traffic to selected services and that its lookup table is non-configurable by the user. | ¶10, ¶11 | col. 8:26-34 | 
| and (9) the communication protocol information includes information about transport types. | The complaint alleges the Accused Instrumentality's protocol information includes transport types (e.g., TCP, UDP). | ¶10, ¶11 | col. 8:35-37 | 
- Identified Points of Contention:- Scope Questions: The complaint's allegation that the router's lookup table is "non-configurable by a computer user" raises a significant question, as commercial routers are typically designed to be highly configurable by end-users. The case may depend on whether any specific, immutable security function within the router can satisfy this limitation.
- Technical Questions: A potential dispute may arise over whether the architecture of the accused router, likely based on a general-purpose processor running software, maps onto the patent’s more rigid structure of discrete components like a "protocol storage device," "source port storage device," and a "lookup table device." The complaint provides no specific evidence on how the router’s internal operations correspond to these claimed hardware elements.
 
V. Key Claim Terms for Construction
- The Term: "non-configurable by a computer user"
- Context and Importance: This term appears to be the central inventive concept distinguishing the patent from prior art firewalls that required complex user setup. Its construction will be critical to the infringement analysis, as the Accused Instrumentality is a commercial router, a class of products generally defined by their configurability. Practitioners may focus on this term because the viability of the infringement claim appears to hinge on its interpretation.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The complaint does not provide sufficient detail for analysis of this element. However, a party could argue that the term does not require the entire device to be non-configurable, but only the specific "lookup table device" that authorizes a pre-set list of fundamental internet services.
- Evidence for a Narrower Interpretation: The patent specification repeatedly emphasizes the non-configurable nature of the invention as a key benefit, stating "the user does not have to adjust settings on the present device" (col. 3:16-19) and that the "non-user configurable decision block" operates without user adjustment (col. 8:26-30). This could support an interpretation that requires the core security authorization logic to be fixed and inaccessible to the user.
 
VI. Other Allegations
- Indirect Infringement: The complaint does not allege induced or contributory infringement.
- Willful Infringement: The complaint does not include explicit allegations of willful infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the term "non-configurable by a computer user," which is central to the patent's claims, be construed to read on a commercial wireless router that is, by its nature, designed for extensive user configuration? The case may turn on whether Plaintiff can identify a specific, immutable security function within the accused product that meets this limitation.
- A key evidentiary question will be one of "structural correspondence": does the architecture of the accused router, which likely uses a general-purpose processor and integrated software, map onto the discrete hardware components recited in Claim 10 (e.g., separate "storage devices" for protocol, source, and destination ports coupled to a "lookup table device")? The complaint’s lack of technical detail on this point suggests that establishing this correspondence will be a central task for the Plaintiff.