2:24-cv-00047
Secure Wi Fi LLC v. Samsung Electronics Co Ltd
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Secure Wi-Fi LLC (Texas)
- Defendant: Samsung Electronics Co. Ltd. (Republic of Korea); Samsung Electronics America, Inc. (New York)
- Plaintiff’s Counsel: Bunsow De Mory LLP
 
- Case Identification: 2:24-cv-00047, E.D. Tex., 01/25/2024
- Venue Allegations: Venue is alleged to be proper in the Eastern District of Texas because Defendant Samsung Electronics America, Inc. maintains a regular and established place of business in the district and has allegedly committed acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s smartphones running Android 10 or later, which utilize randomized Media Access Control (MAC) addresses for Wi-Fi connections, infringe three patents related to secure wireless networking schemes.
- Technical Context: The technology at issue addresses user privacy vulnerabilities in Wi-Fi communications by replacing a device's permanent, trackable MAC address with a temporary, randomized one during the network discovery process.
- Key Procedural History: The complaint alleges that Samsung had pre-suit knowledge of the patent family, asserting that Samsung analyzed and discussed a related patent application that matured into the ’005 patent as early as March 26, 2018, which may be relevant to the allegations of willfulness.
Case Timeline
| Date | Event | 
|---|---|
| 2012-11-21 | Earliest Priority Date ('005, ’552, ’384 Patents) | 
| 2017-07-25 | '005 Patent Issue Date | 
| 2018-03-26 | Samsung's alleged pre-suit knowledge of '005 patent family | 
| 2018-05-01 | '552 Patent Issue Date | 
| 2020-06-23 | '384 Patent Issue Date | 
| c. 2023-02-01 | Accused Product (Galaxy S23) announced | 
| 2024-01-25 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,694,384
- Patent Identification: U.S. Patent No. 10,694,384, titled “Schemes for Connecting to Wireless Network,” issued on June 23, 2020 (Compl. ¶15).
The Invention Explained
- Problem Addressed: The patent’s background section describes that when a device searches for Wi-Fi networks, it broadcasts probe requests containing its permanent Media Access Control (MAC) address, which can be intercepted by any nearby access point, exposing the user's location and creating a privacy risk ('384 Patent, col. 3:11-23).
- The Patented Solution: The invention proposes a system where an end device generates a "fake" or temporary MAC address to use in initial probe requests. Upon receiving a response and determining that the access point is "authenticated" (e.g., one to which it has previously connected), the device can then proceed with the connection process, potentially using its authentic identifier. This method shields the device's permanent identity during the vulnerable public discovery phase ('384 Patent, Abstract; col. 4:5-22; Fig. 3).
- Technical Importance: This approach sought to enhance user privacy by preventing passive tracking of mobile devices via their static Wi-Fi MAC addresses, a growing concern with the proliferation of public Wi-Fi networks ('384 Patent, col. 3:11-23).
Key Claims at a Glance
- The complaint asserts at least independent claim 17 (Compl. ¶16).
- The essential elements of independent claim 17, an end device, include:- A hardware network interface with an actual MAC address.
- A processor that generates a new MAC address distinct from the actual one.
- A transmitter to send a probe request with the generated MAC address.
- A receiver to get a probe response from an access point.
- The processor then determines if the access point is "authenticated" based on the probe response indicating a previous connection.
- The hardware interface then connects to the authenticated access point.
 
U.S. Patent No. 9,961,552
- Patent Identification: U.S. Patent No. 9,961,552, titled “Schemes for Connecting to Wireless Network,” issued on May 1, 2018 (Compl. ¶51).
The Invention Explained
- Problem Addressed: Like its continuation, the ’384 patent, the ’552 Patent addresses the privacy risks associated with broadcasting a device's static MAC address during Wi-Fi scanning ('552 Patent, col. 3:18-28).
- The Patented Solution: This invention describes a server-centric method where a device receives an "authenticated access point list" and a "fake device identifier" from a server. The device uses this fake ID to probe for networks. If a responding access point is on the authenticated list, the device initiates a connection using an "authentic device identifier." This architecture centralizes the management of trusted networks and temporary identifiers ('552 Patent, Abstract; col. 4:4-19).
- Technical Importance: By involving a server, this system could allow for more sophisticated, centrally managed privacy and security policies than a standalone device could implement on its own ('552 Patent, col. 4:4-19).
Key Claims at a Glance
- The complaint asserts at least independent claim 10 (Compl. ¶52).
- The essential elements of independent claim 10, a method performed by a device, include:- Receiving an authenticated access point list from a server.
- Receiving a fake device identifier from the server.
- Transmitting a probe request frame with the received fake identifier.
- Receiving a probe response frame from an access point.
- Determining if the access point is authenticated by checking if its information is on the received list.
- Transmitting a connection request with an authentic device identifier to the authenticated access point.
 
Multi-Patent Capsule: U.S. Patent No. 9,717,005
- Patent Identification: U.S. Patent No. 9,717,005, titled “Schemes for Connecting to Wireless Network,” issued on July 25, 2017 (Compl. ¶87).
Technology Synopsis
The ’005 patent, the parent of the other two asserted patents, discloses a method for secure Wi-Fi connections where a device receives a fake identifier from a "mobile operating server" to use in probe requests. After determining an access point is controlled by that server and was previously connected, the device uses an "authentic device identifier" to connect, thereby protecting its identity during the initial scanning process ('005 Patent, Abstract; col. 10:50-12:6).
Asserted Claims
The complaint asserts at least independent claim 1 (Compl. ¶88).
Accused Features
The complaint alleges that Samsung smartphones running Android 10 or later infringe by using the operating system's MAC randomization functionality. The complaint characterizes the Android OS components that provide these services as the claimed "mobile operating server" (Compl. ¶¶91, 104).
III. The Accused Instrumentality
Product Identification
The accused instrumentalities are Samsung Galaxy smartphones that include Android 10 or later versions of the Android operating system, with the Galaxy S23 cited as a specific example (Compl. ¶¶16, 52, 88).
Functionality and Market Context
- The accused products are modern smartphones featuring advanced Wi-Fi hardware, such as the Qualcomm FastConnect 7800 system integrated into the Snapdragon 8 Gen 2 chipset (Compl. ¶¶17, 18).
- The core accused functionality is the "MAC randomization behavior" native to the Android 10 (and later) operating system, which is enabled by default (Compl. ¶¶21, 42). This feature generates a randomized MAC address for Wi-Fi connections to enhance user privacy by masking the device's permanent, factory-set hardware address (Compl. ¶¶19-21). A screenshot from a YouTube video included in the complaint shows the user-selectable "Randomized MAC" option in the Galaxy S23 settings (Compl. p. 15).
- The complaint alleges that for reconnecting to known networks, the accused devices use a "persistent randomization" scheme, where the same randomized MAC address is used for a specific network, but this address remains distinct from the device's permanent hardware MAC address (Compl. ¶33).
IV. Analysis of Infringement Allegations
10,694,384 Patent Infringement Allegations
| Claim Element (from Independent Claim 17) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| a hardware network interface associated with an actual media access control (MAC) address | The Galaxy S23 includes a Wi-Fi interface (Qualcomm FastConnect) with a factory-set, globally unique hardware MAC address. | ¶¶18-20 | col. 12:56-57 | 
| a processor coupled to the hardware network interface and operable to generate a MAC address for the end device that is distinct from the actual MAC address | The device's Snapdragon processor executes the Android OS, which generates randomized MAC addresses distinct from the factory-set hardware MAC address for Wi-Fi connections. | ¶21 | col. 12:58-62 | 
| a transmitter coupled to the processor and operable to transmit... a probe request that includes the generated MAC address | The device's transmitter sends Wi-Fi probe requests that contain the generated randomized MAC address to discover nearby access points. | ¶¶22, 24-25 | col. 12:63-66 | 
| a receiver coupled to the processor and operable to receive... a probe response that includes information regarding the access point | The device's receiver is configured to receive probe responses from access points containing information such as SSID and supported data rates. An included diagram illustrates the contents of such a probe response (Compl. p. 28). | ¶¶29-30 | col. 12:67-13:3 | 
| the processor is further operable to determine that the access point is an authenticated access point based, at least in part, on the information... being indicative that the access point was connected with the end device previous to when the access point received the probe request... | The processor, via the Android OS, confirms the SSID from the probe response against a stored list of previously-connected networks to determine the access point is authenticated. | ¶¶32-33, 37 | col. 13:4-12 | 
| the hardware network interface is operable to connect... the end device to a wireless local area network provided by the access point | After the processor determines the access point is authenticated, the FastConnect hardware interface connects the device to the Wi-Fi network. | ¶34 | col. 13:13-18 | 
- Identified Points of Contention:- Scope Questions: Claim 17 requires the determination of authentication to be based on the "information regarding the access point being indicative" of a prior connection. The complaint alleges this is met by comparing the SSID from the probe response to a stored list of known networks (Compl. ¶37). A potential dispute is whether the SSID in the response, by itself, is "indicative" of a prior connection, or if the authentication is actually based on the separate, stored list.
- Technical Questions: The complaint alleges that for known networks, a "persistent" randomized MAC is used (Compl. ¶33). A technical question for the court will be how this maps to the claim's sequence of using a generated MAC for a probe request and then connecting. The claim does not distinguish between initial and subsequent connections to the same network.
 
9,961,552 Patent Infringement Allegations
| Claim Element (from Independent Claim 10) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| receiving, from a server, an authenticated access point list that includes information regarding one or more access points that are controlled by the server | The device receives a list of previously connected networks, such as a WiFiConfigStore.xmlfile, from what the complaint defines as the "server": components of the Android OS providing these services. A provided screenshot shows the structure of such a file (Compl. p. 49). | ¶¶54-55 | col. 11:59-62 | 
| receiving, from the server, a fake device identifier for the device... | The Android OS components (the "server") provide a randomized MAC address, which functions as the "fake device identifier," to be used for the Wi-Fi connection. | ¶¶56-57 | col. 11:63-12:3 | 
| transmitting, to at least one access point, the probe request frame that includes the received fake device identifier | The device transmits a standard Wi-Fi probe request using the randomized MAC address provided by the Android OS. | ¶¶59-60 | col. 12:4-6 | 
| receiving, from the at least one access point... a probe response frame... | The device receives a probe response from the access point, which includes information such as the access point's SSID and supported data rates. | ¶¶62-63 | col. 12:7-9 | 
| determining... whether the at least one access point is an authenticated access point... [by] determining whether the information... is included in the authenticated access point list... | The device confirms the SSID from the probe response against the WiFiConfigStore.xmllist to determine if the access point is authenticated. | ¶¶65, 68 | col. 12:10-17 | 
| transmitting... a connection request that includes an authentic device identifier for the device | After authenticating the network, the device initiates a connection request using a "previously authenticated MAC address" (the persistent randomized MAC for that network). | ¶70 | col. 12:18-21 | 
- Identified Points of Contention:- Scope Questions: A central dispute may be whether the "components for providing services of the Android Operating system" operating locally on the device (Compl. ¶54) can be construed as a "server" as required by claim 10. The patent figures illustrate the "mobile operating server" as an entity distinct from the "end device" ('552 Patent, Fig. 1).
- Scope Questions: The claim requires transmitting a connection request with an "authentic device identifier" after using a "fake device identifier." The complaint alleges the "persistent randomized MAC" used for known networks is the "authentic" one (Compl. ¶70). A question arises as to whether this temporary, albeit persistent, address qualifies as "authentic," or if both it and the initial random MAC are "fake" relative to the true hardware MAC address.
 
V. Key Claim Terms for Construction
- The Term: "server" ('552 Patent, claim 10) - Context and Importance: This term is critical to the infringement theory for the ’552 patent. Claim 10 requires the device to receive both the authenticated access point list and the fake device identifier from a "server." The complaint alleges that software components within the Android OS on the device itself constitute this "server" (Compl. ¶54). The viability of this infringement count may depend on this construction.
- Intrinsic Evidence for a Broader Interpretation: The patent does not provide a formal definition of "server," which could leave room for an interpretation where any component providing a service (e.g., managing network profiles and identifiers) qualifies, regardless of its physical location relative to the client.
- Intrinsic Evidence for a Narrower Interpretation: The specification and figures consistently depict a "mobile operating server" (110) as a distinct network entity separate from the "end device" (130), suggesting a client-server architecture between two physically separate systems ('552 Patent, Fig. 1; col. 4:4-10). This evidence may support a narrower construction requiring a remote entity.
 
- The Term: "authentic device identifier" ('552 Patent, claim 10) - Context and Importance: The claim requires using a "fake" identifier for probing and an "authentic" one for connecting. The complaint alleges that the "persistent randomized MAC address" used for known networks serves as the "authentic device identifier" (Compl. ¶70). Practitioners may focus on this term because if "authentic" is construed to mean only the permanent hardware MAC address, the infringement allegation could fail, as the accused devices are alleged to use a randomized (though persistent) address for reconnection.
- Intrinsic Evidence for a Broader Interpretation: The specification contrasts the "fake device identifier" with an "original MAC address" and an "authentic device identifier" somewhat interchangeably, but does not strictly define "authentic." One could argue that in the context of a known, trusted connection, the persistent (and therefore verifiable) randomized MAC acts as the "authentic" identifier for that session or network, as opposed to the non-persistent one used for unknown networks.
- Intrinsic Evidence for a Narrower Interpretation: The specification states that if an access point is authenticated, "the end device may transmit a connection request including an authentic device identifier for the end device, such as an original MAC address" ('552 Patent, col. 3:24-27). This explicit equation of "authentic" with "original" could support a narrow construction that excludes any form of randomized address.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Samsung induces infringement by providing user manuals, support websites, and other documentation that instruct and encourage customers to use the accused MAC randomization features of their devices (Compl. ¶¶41, 77, 116). It further alleges contributory infringement, arguing that the MAC randomization software is a material component especially made for infringement and is not a staple article of commerce suitable for substantial non-infringing use (Compl. ¶¶45, 81, 120).
- Willful Infringement: Willfulness is alleged for all three patents based on Samsung’s continued conduct after the filing of the complaint, which establishes knowledge (Compl. ¶¶48, 84, 123). For the ’005 patent, the complaint additionally alleges pre-suit knowledge dating to at least March 26, 2018, based on Samsung's alleged analysis and citation of the parent application during the prosecution of its own patents (Compl. ¶119).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the term "server" in the ’552 patent, which the patent specification depicts as a separate network entity, be construed to cover software components operating locally on the accused smartphone itself, as the plaintiff’s infringement theory requires?
- A second pivotal issue will be a question of identity: can the "persistent randomized MAC address" used by the accused devices for reconnecting to known networks satisfy the patents' requirement for an "authentic device identifier", or must "authentic" be construed narrowly to mean only the device's permanent, unchangeable hardware MAC address?
- A key evidentiary question will concern pre-suit knowledge: for the purposes of willfulness, what evidence will demonstrate that Samsung's alleged analysis of a related patent application in 2018 provided it with knowledge of the specific patented invention and an objectively high likelihood that its actions constituted infringement?