DCT

2:24-cv-00753

Wilus Institute Of Standards Technology Inc v. Askey Computer Corp

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:24-cv-00753, E.D. Tex., 09/13/2024
  • Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendants have committed acts of infringement in the district, conduct extensive business in Texas, and have purposefully placed the accused products into the stream of commerce with the expectation they will be used there. For Defendant Askey Computer Corp., a foreign corporation, venue is alleged to be proper in any judicial district.
  • Core Dispute: Plaintiff alleges that Defendant’s Wi-Fi 6 (802.11ax) enabled devices infringe three patents related to methods for ensuring coexistence between new and legacy wireless communication terminals.
  • Technical Context: The technology relates to the physical layer (PHY) of the Wi-Fi 6 standard, which defines how devices transmit and receive signals to enable higher speeds and efficiency while maintaining backward compatibility with older Wi-Fi standards.
  • Key Procedural History: The complaint alleges that Plaintiff’s licensing agent, Sisvel International, sent a series of letters to Defendant Askey Computer Corp. beginning on April 8, 2022. These letters allegedly provided notice of the asserted patents, identified them as essential to the Wi-Fi 6 standard, and offered a license, forming the basis for the allegations of willful infringement.

Case Timeline

Date Event
2015-06-29 Earliest Priority Date for ’077, ’992, and ’421 Patents
2019-06-04 U.S. Patent No. 10,313,077 Issues
2020-05-12 U.S. Patent No. 10,651,992 Issues
2021-09-21 U.S. Patent No. 11,128,421 Issues
2022-04-08 First alleged notice letter sent to Defendant
2022-08-24 Alleged follow-up notice letter sent to Defendant
2023-01-18 Alleged follow-up notice letter sent to Defendant
2023-09-19 Alleged follow-up notice letter sent to Defendant
2023-10-25 Alleged follow-up notice letter sent to Defendant
2024-09-13 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 10,313,077 - "Wireless communication method and wireless communication terminal for coexistence with legacy wireless communication terminal"

The Invention Explained

  • Problem Addressed: The patent addresses the challenge of introducing new, high-throughput wireless LAN technologies (like Wi-Fi 6) into an environment where older "legacy" devices (like those using Wi-Fi 4 or 5) are also present. A new "non-legacy" device must be able to transmit its advanced data frames without causing collisions with legacy devices that cannot understand the new frame format. (’077 Patent, col. 1:8-2:51).
  • The Patented Solution: The invention proposes a method for a non-legacy terminal to receive and interpret a specially constructed data frame. The frame begins with a "legacy signaling field" (L-SIG) that legacy devices can understand, which contains "length information" indicating the frame's duration in legacy terms. The non-legacy terminal then uses this length information in a specific mathematical equation to calculate the number of data symbols in the subsequent, non-legacy portion of the frame, allowing it to correctly decode the advanced data while legacy devices defer access for the calculated duration. (’077 Patent, Abstract; col. 3:1-4:40; Fig. 26).
  • Technical Importance: This method provides a mechanism for backward compatibility, which is essential for the incremental adoption of new Wi-Fi standards by allowing new and old devices to share the same wireless spectrum efficiently. (Compl. ¶6).

Key Claims at a Glance

  • The complaint’s allegations map to independent claim 1.
  • Independent Claim 1 of the ’077 Patent recites:
    • A wireless communication terminal comprising a transceiver and a processor.
    • The processor is configured to receive a non-legacy physical layer frame and obtain a legacy signaling field from it.
    • The processor obtains "length information" indicating the frame's duration from the legacy signaling field.
    • The processor obtains "information other than information on the duration" of the frame through a "remaining value" derived from dividing the length information by the data size transmittable by a legacy symbol (specified as 3 octets at a 6 Mbps rate).
    • The processor determines the number of data symbols in the non-legacy frame according to a specific equation that uses the length information and other values.
  • The complaint does not explicitly reserve the right to assert dependent claims.

U.S. Patent No. 10,651,992 - "Wireless communication method and wireless communication terminal for coexistence with legacy wireless communication terminal"

The Invention Explained

  • Problem Addressed: Like the ’077 patent, this patent addresses the problem of enabling coexistence between new (non-legacy) and old (legacy) Wi-Fi devices by ensuring the new devices can correctly interpret complex frame structures. (’992 Patent, col. 1:8-2:51).
  • The Patented Solution: The solution in this patent adds a layer of signaling to the method described in the ’077 patent. In addition to using a "remaining value," the processor obtains "information other than information on the duration" based on the modulation method of a specific symbol that appears after the legacy signaling field. This modulation method (e.g., BPSK vs. QBPSK) indicates the format of the subsequent non-legacy signaling field, which the processor then uses in a specific equation to determine the number of data symbols. (’992 Patent, Abstract; col. 4:1-17).
  • Technical Importance: This use of modulation as a signaling mechanism allows for greater flexibility and complexity in non-legacy frame formats while still grounding the initial interpretation in the legacy-compatible portion of the frame. (Compl. ¶66).

Key Claims at a Glance

  • The complaint’s allegations map to independent claim 1.
  • Independent Claim 1 of the ’992 Patent recites:
    • A wireless communication terminal comprising a transceiver and a processor.
    • The processor is configured to receive a non-legacy physical layer frame and obtain a legacy signaling field.
    • The processor obtains "length information" from the legacy signaling field.
    • The processor obtains "information other than information on the duration" of the frame based on both a "modulation method of a third symbol after the legacy signaling field" and a "remaining value," where this other information indicates the format of the non-legacy signaling field.
    • The processor determines the number of data symbols in the non-legacy frame according to a specific equation.
  • The complaint does not explicitly reserve the right to assert dependent claims.

U.S. Patent No. 11,128,421 - "Wireless communication method and wireless communication terminal for coexistence with legacy wireless communication terminal"

  • Technology Synopsis: This patent also relates to ensuring coexistence between legacy and non-legacy devices. The claimed invention involves a non-legacy terminal interpreting a received frame by obtaining "information other than information on the duration" based on the modulation method (BPSK or QBPSK) of a symbol following the legacy signaling field, where this information indicates the format of the subsequent non-legacy signaling field. (’421 Patent, Abstract; col. 4:1-26).
  • Asserted Claims: The complaint generally alleges infringement, with specific allegations mapping to independent claim 1. (Compl. ¶¶78-83).
  • Accused Features: The complaint alleges that Askey's Wi-Fi 6 devices, by complying with the 802.11ax standard, use BPSK and QBPSK modulation in the HE-SIG-A field to differentiate between different types of high-efficiency frames, thereby practicing the claimed method. (Compl. ¶¶81-82).

III. The Accused Instrumentality

Product Identification

  • The complaint accuses all of Askey's Wi-Fi 6 (802.11ax) enabled devices, including routers and other access point devices, sold or imported into the United States (Compl. ¶15). The complaint provides an image of the Askey RT5010W router as a representative example. (Compl. p. 8).

Functionality and Market Context

  • The Accused Products are wireless networking devices that operate according to the IEEE 802.11ax (Wi-Fi 6) standard (Compl. ¶15). They are alleged to use chipsets such as the Qualcomm IPQ8074 to transmit and receive data packets whose physical layer frame structure is defined by the standard (Compl. ¶31). This structure allegedly includes both legacy-compatible fields and High Efficiency (HE) fields that practice the patented inventions (Compl. ¶¶32-37). The complaint alleges these products are sold to original equipment manufacturers and resellers such as Spectrum and Verizon (Compl. ¶29).

IV. Analysis of Infringement Allegations

U.S. Patent No. 10,313,077 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
A wireless communication terminal that communicates wirelessly, the terminal comprising: a transceiver; and a processor... The Accused Products, such as the Askey RT5010W router shown in the complaint, are wireless communication terminals containing transceivers and processors (e.g., Qualcomm IPQ8074). ¶¶30-31 col. 3:1-3
receive a non-legacy physical layer frame by using the transceiver and obtains a legacy signaling field including information decodable by a legacy wireless communication terminal from the non-legacy physical layer frame... The Accused Products receive 802.11ax physical layer frames, which include a legacy preamble (L-STF, L-LTF, L-SIG) decodable by legacy devices. The complaint includes a timing diagram of the frame structure. ¶¶32-33 col. 3:4-9
obtain length information indicating information on a duration of the non-legacy physical layer frame, from the legacy signaling field... The processor obtains the LENGTH field from the L-SIG, which is used to calculate the frame's duration (TXTIME) according to standard-defined equations. ¶34 col. 3:9-12
obtain information other than information on the duration ... through a remaining value obtained by dividing the length information by a data size transmittable by a symbol of a legacy physical layer frame, wherein the data size ... is 3 octets when a data rate ... is 6 Mbps... The processor is alleged to perform calculations defined in the standard where the data size per symbol is 3 octets at a 6 Mbps rate. ¶35 col. 3:12-19
determine the number of symbols of data of the non-legacy physical layer frame according to a following equation... The processor determines the number of data symbols (NSYM) using an equation from the 802.11ax standard, which the complaint alleges corresponds to the claimed equation. ¶36 col. 3:19-25

U.S. Patent No. 10,651,992 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
A wireless communication terminal ... comprising: a transceiver; and a processor... The Accused Products are wireless terminals containing transceivers and processors. The complaint provides a photo of the Askey RT5010W router. ¶¶53-54 col. 3:41-43
receive a non-legacy physical layer frame ... and obtains a legacy signaling field... The Accused Products receive 802.11ax frames which contain a legacy preamble including the L-SIG field. ¶¶55-56 col. 3:44-49
obtain length information indicating information on a duration of the non-legacy physical layer frame, from the legacy signaling field... The processor obtains the LENGTH field from the L-SIG to determine the frame duration. ¶57 col. 3:49-52
obtain information other than information on the duration... based on a modulation method of a third symbol after the legacy signaling field and a remaining value... wherein the information other than information on the duration... indicates a format of a non-legacy signaling field... The complaint alleges the processor obtains format information for the non-legacy field (HE-SIG-A) based on the modulation (BPSK/QBPSK) of its constituent symbols, as shown in a data subcarrier constellation diagram. ¶58 col. 4:1-11
determine the number of symbols of data of the non-legacy physical layer frame according to a following equation... The processor is alleged to calculate the number of data symbols (NSYM) using an equation from the 802.11ax standard alleged to match the claimed formula. ¶59 col. 4:11-17

Identified Points of Contention

  • Scope Questions: A primary issue may be whether the equations and variables defined in the IEEE 802.11ax standard, upon which the complaint's allegations rely, map precisely onto the specific language and definitions of the asserted claims. For instance, a question for the court could be whether the standard's variable m is equivalent to the claimed "value obtained by subtracting the remaining value from the data size transmittable by a symbol of the legacy physical layer frame" (’077 Patent) or the claimed "value obtained by... a modulation method of a third symbol" (’992 Patent).
  • Technical Questions: The infringement theory rests on the Accused Products' compliance with the 802.11ax standard. A potential point of contention is whether compliance with the standard is sufficient to prove that the accused devices' processors actually perform every element of the claimed methods. For the ’992 patent specifically, a question arises as to whether using different modulation schemes (BPSK vs. QBPSK) for different HE frame types constitutes "obtain[ing] information... based on a modulation method" in the manner required by the claim.

V. Key Claim Terms for Construction

  • The Term: "obtain information other than information on the duration of the non-legacy physical layer frame through a remaining value..." (from Claim 1 of the ’077 Patent)

  • Context and Importance: This term describes the core calculation at the heart of the alleged invention. Its construction will be critical in determining whether the process defined in the 802.11ax standard for calculating frame length, which the complaint alleges is used by the Accused Products, falls within the scope of the claim.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The specification describes the general concept of using the legacy signaling field to determine the parameters of the non-legacy frame, which could support a construction that is not strictly limited to a single mathematical formula. (’077 Patent, col. 3:1-19).
    • Evidence for a Narrower Interpretation: The patent provides a very specific equation in Figure 26 and its detailed description, which defines how the number of symbols is calculated. A party may argue that the term should be limited to this specific embodiment and the precise mathematical relationships it discloses. (’077 Patent, col. 3:52-4:40).
  • The Term: "based on a modulation method of a third symbol after the legacy signaling field" (from Claim 1 of the ’992 Patent)

  • Context and Importance: This phrase distinguishes the invention of the ’992 patent. The dispute will likely focus on whether the Accused Products' alleged use of different modulation schemes for different frame types, as dictated by the standard, constitutes obtaining information "based on" that modulation in the claimed sense.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The term "based on" is typically given a broad construction. The specification discloses that the format of the non-legacy signaling field may be signaled through the modulation technique of a subsequent symbol. (’992 Patent, col. 13:20-33).
    • Evidence for a Narrower Interpretation: The specification describes specific embodiments where particular modulations (BPSK, QBPSK) are linked to particular frame formats. A party may argue that the term requires an active step of "obtaining" information derived from the modulation, rather than the modulation being a passive characteristic of a pre-determined frame type. (’992 Patent, col. 4:1-11).

VI. Other Allegations

  • Indirect Infringement: The complaint alleges Defendants induce infringement by encouraging and instructing customers to use the Accused Products in their normal, infringing manner, with knowledge of the patents from at least April 8, 2022 (Compl. ¶¶38-39, 61-62). It also alleges contributory infringement, stating the products are not staple articles of commerce and are especially adapted for use in an infringing manner (Compl. ¶40, 63).
  • Willful Infringement: The complaint alleges willful infringement based on Defendants' continued infringing conduct after receiving actual notice of the asserted patents and their alleged infringement via the series of letters from Sisvel, beginning on April 8, 2022 (Compl. ¶¶41, 64).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of claim scope versus standard implementation: do the specific mathematical formulas and variable definitions implemented in the IEEE 802.11ax standard, as alleged in the complaint, fall within the literal scope of the patents' claimed calculation steps and definitions?
  • A key evidentiary question will be one of proof by compliance: can the Plaintiff establish that mere compliance with the 802.11ax standard necessarily proves that the accused devices' processors perform every limitation of the asserted claims, or can the Defendant demonstrate that the standard permits non-infringing implementations?
  • The case will also present a question of willfulness based on notice: did the series of pre-suit letters alleging the patents were "essential" to the Wi-Fi 6 standard provide Defendants with knowledge of infringement sufficient to render their continued sales of standard-compliant products objectively reckless?