2:24-cv-00396
Stingray IP Solutions LLC v. Allegion Public Ltd Co
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Stingray IP Solutions LLC (Texas)
- Defendant: Allegion Public Limited Company (Ireland) and Schlage Lock Company LLC (Delaware)
- Plaintiff’s Counsel: Bragalone Olejko Saad PC; Ward, Smith, & Hill, PLLC
 
- Case Identification: 2:24-cv-00396, E.D. Tex., 05/31/2024
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas based on Defendants’ sales and distribution of accused products within the district. It further alleges that Defendants' U.S. subsidiaries maintain a regular and established place of business in Plano, Texas. For the foreign parent company, Plaintiff also invokes the alien-venue rule.
- Core Dispute: Plaintiff alleges that Defendants’ smart access control products, including smart locks and related accessories that utilize Wi-Fi and Zigbee protocols, infringe four U.S. patents concerning wireless network security, dynamic channel allocation, and tamper resistance.
- Technical Context: The technology at issue relates to securing and managing the performance of wireless networks, such as those fundamental to the operation of Internet of Things (IoT) devices like smart locks and home security systems.
- Key Procedural History: The complaint alleges that Defendants had pre-suit knowledge of the asserted patent portfolio dating back to at least July 21, 2020, through correspondence and a subsequent presentation regarding a portfolio acquired by Plaintiff. This history forms the basis for allegations of willful infringement.
Case Timeline
| Date | Event | 
|---|---|
| 2001-01-16 | Priority Date for ’572 and ’126 Patents | 
| 2002-04-29 | Priority Date for ’961 Patent | 
| 2002-08-12 | Priority Date for ’678 Patent | 
| 2007-05-29 | U.S. Patent No. 7,224,678 Issues | 
| 2008-10-21 | U.S. Patent Nos. 7,440,572 and 7,441,126 Issue | 
| 2009-11-10 | U.S. Patent No. 7,616,961 Issues | 
| 2020-07-21 | Plaintiff alleges first notice of patent portfolio sent to Allegion | 
| 2021-08-20 | Plaintiff alleges follow-up call and presentation with Allegion | 
| 2024-05-31 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,224,678 - "Wireless local or metropolitan area network with intrusion detection features and related methods"
- Patent Identification: U.S. Patent No. 7,224,678, "Wireless local or metropolitan area network with intrusion detection features and related methods," issued May 29, 2007 (’678 Patent).
- The Invention Explained:- Problem Addressed: The patent’s background section describes the vulnerability of wireless networks to unauthorized "rogue stations" that may attempt to compromise network security, noting that conventional security measures might not detect intrusions if a rogue station has obtained an authorized address or ID (’678 Patent, col. 1:39-2:32).
- The Patented Solution: The invention proposes a "policing station" within the wireless network that monitors transmissions for patterns indicative of an intrusion, rather than relying solely on credentials. This policing station can detect anomalies such as a high number of failed MAC address authentications, and upon detecting a number of failures exceeding a threshold, it generates an intrusion alert (’678 Patent, Abstract; col. 2:50-58). This creates a behavioral-based security layer.
- Technical Importance: This approach added a layer of anomaly detection to wireless network security, aiming to identify malicious activity based on network behavior rather than just cryptographic authentication. (Compl. ¶34).
 
- Key Claims at a Glance:- The complaint asserts independent claim 51 (Compl. ¶66).
- The essential elements of claim 51, a method claim, are:- transmitting data between a plurality of stations using a media access layer (MAC), with each station having a respective MAC address;
- monitoring transmissions among the stations to detect failed attempts to authenticate MAC addresses; and
- generating an intrusion alert based upon detecting a number of failed attempts to authenticate a MAC address.
 
- The complaint does not explicitly reserve the right to assert dependent claims for this patent.
 
U.S. Patent No. 7,440,572 - "Secure wireless LAN device and associated methods"
- Patent Identification: U.S. Patent No. 7,440,572, "Secure wireless LAN device and associated methods," issued October 21, 2008 (’572 Patent).
- The Invention Explained:- Problem Addressed: The patent notes that conventional wireless LAN security, such as the original Wired Equivalent Privacy (WEP) algorithm, only protects the data portion of a transmitted packet, leaving the physical layer header containing address and control information unencrypted and vulnerable (’572 Patent, col. 1:45-56).
- The Patented Solution: The invention describes a wireless LAN device containing a cryptography circuit connected to both the MAC controller and the wireless transceiver. This circuit is designed to encrypt both the address information and the data information for transmission, providing a more comprehensive security approach than systems that only encrypt the data payload (’572 Patent, Abstract; col. 2:3-15).
- Technical Importance: By encrypting address headers, the invention sought to prevent traffic analysis and other attacks that exploit unencrypted metadata, thereby enhancing the overall security of wireless communications. (Compl. ¶36).
 
- Key Claims at a Glance:- The complaint asserts independent claim 1 (Compl. ¶82).
- The essential elements of claim 1, a device claim, are:- a housing;
- a wireless transceiver carried by the housing;
- a medium access controller (MAC) carried by the housing; and
- a cryptography circuit connected to the MAC and transceiver for encrypting both address and data information for transmission.
 
- The complaint does not explicitly reserve the right to assert dependent claims for this patent.
 
U.S. Patent No. 7,616,961 - "Allocating channels in a mobile ad hoc network"
- Patent Identification: U.S. Patent No. 7,616,961, "Allocating channels in a mobile ad hoc network," issued November 10, 2009 (’961 Patent).
- Technology Synopsis: The patent addresses the problem of maintaining network performance in mobile ad hoc networks that operate over multiple frequency channels. The proposed solution involves each network node monitoring its communication link performance against a Quality of Service (QoS) threshold; if performance degrades, the node actively "scouts" other available channels to find a better one, thereby dynamically managing channel allocation to optimize network stability and throughput (Compl. ¶35; ’961 Patent, Abstract).
- Asserted Claims: Independent claim 1 is asserted (Compl. ¶100).
- Accused Features: The complaint accuses Zigbee-compliant products, such as the Schlage Connect™ lock, of infringement. It alleges that the Zigbee protocol's functions for detecting channel interference via energy scans and subsequently changing channels to maintain network quality practice the claimed method (Compl. ¶43-45, 101). A screenshot from Schlage's website shows the "Schlage Connect Zigbee lock FAQs" page, identifying the product's use of the accused protocol (Compl. p. 25).
U.S. Patent No. 7,441,126 - "Secure wireless LAN device including tamper resistant feature and associated method"
- Patent Identification: U.S. Patent No. 7,441,126, "Secure wireless LAN device including tamper resistant feature and associated method," issued October 21, 2008 (’126 Patent).
- Technology Synopsis: The patent describes a secure wireless LAN device designed to protect sensitive cryptographic information from physical tampering. The invention stores cryptographic keys and/or algorithms in volatile memory powered by a battery. The device's housing includes a switch mechanism that, if breached, disconnects the battery, thereby erasing the contents of the volatile memory and destroying the sensitive cryptographic data (’126 Patent, Abstract; Compl. ¶37).
- Asserted Claims: Independent claim 1 is asserted (Compl. ¶116).
- Accused Features: The complaint accuses Wi-Fi enabled products that use a battery, such as the Schlage NDE wireless lock and Schlage Encode Plus™ Smart WiFi Deadbolt. It alleges these products use a battery to maintain cryptographic data in volatile memory to facilitate secure wireless network operations (Compl. ¶57-58, 117). Product specification sheets are referenced, showing that the accused devices are Wi-Fi compatible and use AA batteries (Compl. p. 40, 44).
III. The Accused Instrumentality
Product Identification
The complaint collectively refers to the "Accused Products," which include Defendants' smart locks, access control systems, and related accessories that are enabled with Wi-Fi and/or Zigbee wireless communication protocols (Compl. ¶40). Specific examples cited include the Schlage Encode Plus™ Smart WiFi Deadbolt, the Schlage Connect™ Smart Deadbolt (Zigbee), the Schlage Sense™ Wi-Fi Adapter, and the Schlage Engage™ software application (Compl. ¶24, 40).
Functionality and Market Context
The Accused Products are smart electronic locks and access control devices that connect to wireless networks (Wi-Fi, Zigbee) to enable remote control, monitoring, and updates via mobile applications and smart home hubs (Compl. ¶5, 39). The complaint states these products operate according to industry standards, including IEEE 802.11 for Wi-Fi and IEEE 802.15.4 for Zigbee, and support security protocols such as WPA and WPA2 (Compl. ¶41, 54). A product page for the Schlage Wi-Fi adapter is shown to advertise its support for WPA and WPA2 authentication networks (Compl. p. 39). Defendants are positioned as a major global provider of security products, with U.S. sales exceeding $2.75 billion in 2023 (Compl. ¶4, 38).
IV. Analysis of Infringement Allegations
’678 Patent Infringement Allegations
| Claim Element (from Independent Claim 51) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| transmitting data between the plurality of stations using a media access layer (MAC)... | Accused Products operate on IEEE 802.11 (Wi-Fi) networks, which use a MAC layer for communication between stations (e.g., lock and router). | ¶67 | col. 2:40-42 | 
| monitoring transmissions among the plurality of stations to detect failed attempts to authenticate MAC addresses | The IEEE 802.11 TKIP protocol, used by the Accused Products, employs a Message Integrity Code (MIC). A failed MIC check indicates a probable attack and is logged as a failure event. | ¶50, ¶52 | col. 2:50-54 | 
| generating an intrusion alert based upon detecting a number of failed attempts to authenticate a MAC address | Upon detecting a second MIC failure within 60 seconds, the protocol mandates deauthentication of the station and the generation of a Michael MIC Failure Report frame, which allegedly constitutes an "intrusion alert." | ¶52, ¶67 | col. 2:54-58 | 
- Identified Points of Contention:- Scope Questions: A central question may be whether a "MIC failure" under the IEEE 802.11 standard constitutes a "failed attempt to authenticate [a] MAC address" as recited in the claim. A court may need to determine if an integrity check on a data packet is functionally equivalent to an authentication of the MAC address itself for the purposes of this patent.
- Technical Questions: What evidence does the complaint provide that the deauthentication process and failure report generation within the 802.11 standard's countermeasures function as the "intrusion alert" claimed in the patent? The analysis will likely focus on whether this automated network response serves the same purpose as the alert generated by the patent's "policing station."
 
’572 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| a housing | The Accused Products are physical devices with an external casing or housing. | ¶83 | col. 2:3-4 | 
| a wireless transceiver carried by said housing | The products are Wi-Fi enabled and thus contain a wireless transceiver to send and receive 2.4 GHz radio signals. | ¶55, ¶83 | col. 2:4-5 | 
| a medium access controller (MAC) carried by said housing | As IEEE 802.11 compliant devices, the products contain a MAC controller to manage network access. | ¶83 | col. 2:5-6 | 
| a cryptography circuit...for encrypting both address and data information... | The complaint alleges the TKIP protocol functions as the cryptography circuit. It points to a TKIP block diagram showing that the source address (SA) and destination address (DA) are inputs to the "Michael" algorithm, which generates the MIC. This process is alleged to meet the limitation of encrypting both address and data. A diagram illustrating the TKIP encapsulation block is provided as evidence (Compl. p. 42). | ¶56, ¶83 | col. 2:7-15 | 
- Identified Points of Contention:- Scope Questions: The dispute may center on the meaning of "encrypting." Does using address fields as inputs to generate a Message Integrity Code (MIC) constitute "encrypting" the address information itself? Defendants may argue that encryption requires rendering information confidential, whereas a MIC provides integrity and authenticity without concealing the address, which remains transmitted in the clear.
- Technical Questions: Does the operation of the "Michael" algorithm within the TKIP protocol, as depicted in the cited IEEE standard, align with the description of the "cryptography circuit" in the ’572 patent’s specification? The analysis will likely scrutinize whether the function performed—generating an integrity check—is the same as the function claimed—encryption of address information.
 
V. Key Claim Terms for Construction
- Term: "encrypting both address and data information" (’572 Patent, Claim 1) 
- Context and Importance: This term is the central point of novelty asserted for the ’572 patent. The infringement theory depends on construing the function of the accused TKIP protocol (specifically, its MIC generation) as falling within the scope of this term. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The patent abstract states the circuit is for "encrypt[ing] both address and data information," and the claim uses the same broad language (’572 Patent, Abstract; col. 2:7-9). Plaintiff may argue that any cryptographic process that protects both address and data, including an integrity function that uses the address as a key input, satisfies this general language.
- Evidence for a Narrower Interpretation: The specification describes providing a "higher level of security" by encrypting header portions that are "not encrypted in conventional LAN cryptographic devices" (’572 Patent, col. 2:10-14). This suggests the invention is about confidentiality, not just integrity. A defendant may argue that in the context of cryptography, "encrypting" implies scrambling data to ensure confidentiality, a function distinct from generating a MIC, which verifies authenticity and integrity but does not hide the address.
 
- Term: "failed attempts to authenticate MAC addresses" (’678 Patent, Claim 51) 
- Context and Importance: Plaintiff’s infringement case for the ’678 patent equates the "MIC failure" mechanism in the IEEE 802.11 standard with this claim term. The viability of this infringement theory hinges on this construction. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The patent’s summary describes detecting intrusions by monitoring for "failed attempts to authenticate MAC addresses" in general terms, without specifying a particular authentication protocol (’678 Patent, col. 2:50-54). Practitioners may focus on this term because Plaintiff could argue that a MIC failure is a functional failure of authentication, as it indicates the message did not originate from the claimed MAC address in an unaltered state.
- Evidence for a Narrower Interpretation: The patent describes a "policing station" that actively monitors transmissions (’678 Patent, col. 2:43-44). A defendant might argue this implies monitoring for explicit authentication protocol failures (e.g., a challenge-response) rather than a passive data integrity check that occurs after a device has already been associated with the network.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges Defendants induce infringement by providing products with instructions, user guides, software applications (e.g., Schlage Engage™), technical support, and marketing materials that encourage and instruct customers to set up and use the accused products' Wi-Fi and Zigbee functionalities in an infringing manner (Compl. ¶70-72, 104-106).
- Willful Infringement: The complaint alleges willful infringement based on pre-suit notice. It claims that correspondence beginning on July 21, 2020, followed by a call and presentation on August 20, 2021, made Allegion aware of the patent portfolio acquired by Stingray and its relevance to Defendants' products (Compl. ¶68-69, 86-87, 102-103, 118-119).
VII. Analyst’s Conclusion: Key Questions for the Case
This case appears to present several core disputes that will turn on claim construction and the technical operation of industry-standard wireless protocols. The key questions for the court will likely include:
- A primary issue will be one of definitional scope: Can the term “encrypting... address... information,” as used in the ’572 patent, be construed to cover the generation of a Message Integrity Code (MIC) where the address is used as an input but is not itself rendered confidential?
- A second core issue will be one of functional equivalence: Does an automated network protection mechanism within the IEEE 802.11 standard, such as deauthentication following repeated MIC failures, perform the same function as the “monitoring... to detect failed attempts to authenticate MAC addresses” and “generating an intrusion alert” as claimed by the ’678 patent?
- An underlying evidentiary question will be one of standard compliance versus specific action: To what extent can the Plaintiff rely on the accused products' compliance with the Zigbee and IEEE 802.11 standards to prove the specific, multi-step methods recited in the asserted claims are actually performed, absent direct evidence of the products' specific operations?