DCT
2:23-cv-00035
ThroughTEK Co Ltd v. Amcrest Tech LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: ThroughTEK Co., Ltd. (Taiwan)
- Defendant: Amcrest Technologies, LLC (Texas); Amazon.com Inc. (Delaware); eBay Inc. (Delaware); Home Depot USA Inc. (Delaware); Micro Center Inc. (Delaware); Target Corporation (Minnesota); and Walmart Inc. (Delaware/Arizona)
- Plaintiff’s Counsel: WPAT, P.C. Law Group Virginia; Ramey & Flock, P.C.
 
- Case Identification: 2:23-cv-00035, E.D. Tex., 01/30/2023
- Venue Allegations: Venue is alleged to be proper because Defendants have committed acts of infringement in the Eastern District of Texas by advertising, offering to sell, selling, and distributing the accused products within the district.
- Core Dispute: Plaintiff alleges that Defendants’ network monitoring devices, such as security cameras, infringe a patent related to a method for establishing a peer-to-peer (P2P) connection by scanning an image pattern like a QR code.
- Technical Context: The technology at issue addresses the simplification of connecting Internet-of-Things (IoT) devices to a network, a critical step for user adoption in the consumer electronics market.
- Key Procedural History: The patent-in-suit, RE47,842, is a reissue of U.S. Patent No. 9,787,498. The complaint alleges that Plaintiff provided defendant Amcrest with pre-suit notice of infringement via a cease-and-desist letter, and also provided pre-suit notice to defendant Amazon.
Case Timeline
| Date | Event | 
|---|---|
| 2013-04-16 | '842 Patent Priority Date | 
| 2017-10-10 | Original U.S. Patent No. 9,787,498 Issued | 
| 2020-02-04 | U.S. Reissued Patent No. RE47,842 Issued | 
| 2022-09-20 | Cease-and-desist letter sent to Defendant Amcrest | 
| 2022-10-28 | First notice of infringement sent to Defendant Amazon | 
| 2022-11-03 | Second notice of infringement sent to Defendant Amazon | 
| 2023-01-30 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Reissued Patent No. RE47,842 - System and Method of Identifying Networked Device for Establishing a P2P Connection
- Patent Identification: U.S. Reissued Patent No. RE47,842, “System and Method of Identifying Networked Device for Establishing a P2P Connection,” issued February 4, 2020.
The Invention Explained
- Problem Addressed: The patent’s background section describes the difficulty and complexity for users seeking to establish a network connection between a terminal device (e.g., a smartphone) and a networked device (e.g., a security camera). This process often required manually inputting a lengthy and complicated identification code, which was "complicated and cumbersome." (’842 Patent, col. 1:63-68).
- The Patented Solution: The invention automates this process. An "image pattern," such as a barcode or QR code, containing the networked device’s identification is physically attached to the device. A user’s terminal device captures this image, which triggers a connection request to a central network server. The server uses the identification information from the request to look up the networked device's IP address and then transmits "hole-punching messages" to both devices to establish a direct P2P connection. (’842 Patent, Abstract; col. 5:48-65). This obviates the need for manual ID entry.
- Technical Importance: The described method streamlined the initial setup and onboarding experience for networked devices, which may be seen as a key factor in improving usability for a mass-market audience. (’842 Patent, col. 2:3-7).
Key Claims at a Glance
- The complaint asserts infringement of at least claim 12, an independent method claim. (Compl. ¶22).
- The essential elements of independent claim 12 include:- (a) Connecting a networked monitoring device to a server, where the server maintains a pre-registered list associating device identifications with IP addresses.
- (b) Registering the monitoring device's identification in the server's list.
- (c) Providing an image pattern on the monitoring device that includes its identification.
- (d) A terminal device captures the image pattern, generates a connection request signal, and transmits it to the server.
- (e) The server identifies the monitoring device using the request signal, obtains its IP address, and transmits "hole-punching messages" to both devices to establish a P2P connection, wherein the monitoring device "does not capture any image pattern associated with the terminal device."
 
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
- The "Accused Instrumentalities" are identified as network monitoring devices, including but not limited to the "IP8M series products," related software, and associated backend services. (Compl. ¶¶25, 27).
Functionality and Market Context
- The complaint alleges that the accused products, which include cameras and network video recorders (NVRs), establish a P2P connection "via scanning an image." (Compl. ¶25). Specifically, Defendant Amcrest provides an application ("App") for consumers to scan a QR code on the camera. (Compl. ¶30). The complaint includes a diagram from the patent, Figure 3, illustrating the flow of information between a networked device (20), a terminal device (30), and a server (10) to establish a connection. (Compl. ¶23). After scanning, the app allegedly receives and plays the video image from the camera once a connection is established. (Compl. ¶30).
- The accused products are allegedly manufactured by Amcrest and sold by Amcrest and other retailer defendants, including Amazon, Home Depot, and Walmart. (Compl. ¶¶28-29, 32-33).
IV. Analysis of Infringement Allegations
'842 Patent Infringement Allegations
| Claim Element (from Independent Claim 12) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| (a) connecting a first networked monitoring device to a network server through the Internet, wherein the network server has a list of networked devices that are pre-registered... | The accused Amcrest cameras and NVRs connect to Amcrest's servers, which support the monitoring functions. | ¶¶26-27 | col. 4:36-38 | 
| (b) registering a first identification of the first networked monitoring device into the list of networked devices of the server; | The accused system registers the devices to enable P2P connections. | ¶¶22(b), 27 | col. 4:46-49 | 
| (c) providing an image pattern comprising the first identification, wherein the image pattern is attached on the first networked monitoring device... | The accused Amcrest products provide an image, such as a QR code, on the product for establishing a P2P connection. | ¶30 | col. 4:51-58 | 
| (d) generating a connection request signal by a terminal device when the image pattern is captured to the terminal device and transmitting the connection request signal to the network server... | A consumer uses the Amcrest app on a smartphone to scan the QR code on the camera, which sends a connection request. | ¶30 | col. 8:41-45 | 
| (e) identifying the first networked monitoring device...to obtain the first identification...and obtain the corresponding IP address...wherein the network server respectively transmits hole-punching messages...and wherein the first networked monitoring device does not capture any image pattern associated with the terminal device... | The complaint alleges the system establishes a P2P connection, which is the result of the claimed server-side identification and message transmission. | ¶¶25, 30 | col. 5:48-65 | 
Identified Points of Contention
- Technical Questions: The complaint alleges the system functions according to the claim, but a central question for discovery will be whether the accused Amcrest system technically operates as claimed. For example, does the server backend use the specific technique of "hole-punching messages" for NAT traversal, or does it employ an alternative method (e.g., a TURN relay) that may not fall within the scope of the claim?
- Scope Questions: Claim 12 contains the negative limitation "wherein the first networked monitoring device does not capture any image pattern associated with the terminal device." A dispute may arise over both the factual basis for this element and its legal scope. The question is what technical activity this limitation is intended to exclude and whether the accused cameras, which transmit video but may not "capture" data from the phone's screen, satisfy this requirement.
V. Key Claim Terms for Construction
"hole-punching messages"
- Context and Importance: This term describes a specific technique for establishing P2P connections across network address translators (NATs). The infringement analysis for claim 12 directly depends on whether the accused system transmits messages that meet the technical definition of "hole-punching." Practitioners may focus on this term because if the accused system uses a different, non-infringing NAT traversal technique, the infringement case could fail.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent does not provide its own definition, stating only that hole-punching is "well known in the field." (’842 Patent, col. 5:58-59). A party might argue this incorporates a functional understanding, covering any messages sent to the devices that result in a direct P2P connection by traversing a NAT.
- Evidence for a Narrower Interpretation: A party could argue that because the patent refers to the technique as "well known," the term should be given its specific, established meaning in the field of computer networking at the time of the invention. This could limit the claim to a particular class of NAT traversal protocols, potentially excluding others like server-relayed connections.
 
"image pattern"
- Context and Importance: This term defines the object on the networked device that is captured by the terminal device to initiate the connection. Its scope is critical because it defines the trigger for the entire patented method.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The claim language itself uses the general term "image pattern." (’842 Patent, col. 10:24). This suggests a meaning not limited to any specific format.
- Evidence for a Narrower Interpretation: The specification repeatedly provides "a QR code or one-dimensional bar-code" as the primary examples of the "connection barcode." (’842 Patent, col. 3:28-29; col. 4:56-59). A party may argue that the invention is limited to these types of machine-readable codes rather than any generic image.
 
VI. Other Allegations
Indirect Infringement
- The complaint alleges inducement of infringement, stating that Defendants provide consumers with the accused products and an App, along with instructions in product manuals and quick start guides that direct users to perform the patented method by scanning the QR code to establish a connection. (Compl. ¶¶30, 41-42). Contributory infringement is also alleged on the basis that the accused products "are solely for the purpose of practicing the patented method." (Compl. ¶48).
Willful Infringement
- The complaint alleges willful infringement against Defendants Amcrest and Amazon. (Compl. ¶¶51-54). The basis for this allegation is purported actual notice, citing a cease-and-desist letter sent to Amcrest on September 20, 2022, and two notices sent to Amazon on October 28 and November 3, 2022, followed by Defendants' alleged continued infringing activities. (Compl. ¶¶31, 34, 52).
VII. Analyst’s Conclusion: Key Questions for the Case
- A key evidentiary question will be one of technical operation: What evidence will demonstrate that the accused Amcrest system uses the specific "hole-punching messages" required by claim 12 to establish a P2P connection, as opposed to another form of NAT traversal or server-relayed communication?
- The case may also turn on a question of negative limitation: Can Plaintiff prove that the accused cameras satisfy the claim requirement that the "networked monitoring device does not capture any image pattern associated with the terminal device," and how will the court construe the scope of that phrase?
- Finally, a central issue will be one of claim scope: Will the term "image pattern" be construed broadly to cover various visual identifiers, or will it be limited to the specific barcode and QR code examples emphasized in the patent's specification?