2:25-cv-00555
Malikie Innovations Ltd v. Vivint Smart Home Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Malikie Innovations Ltd. and Key Patent Innovations Ltd. (Ireland)
- Defendant: Vivint Smart Home, Inc. and NRG Energy, Inc. (United States)
- Plaintiff’s Counsel: Reichman Jorgensen Lehman & Feldberg LLP; Miller Fair Henry PLLC
 
- Case Identification: 2:25-cv-00555, E.D. Tex., 05/19/2025
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas based on Defendants' business locations in Plano, Texas, and their advertising, sales, and services directed to residents of the district, including in Marshall and Tyler.
- Core Dispute: Plaintiff alleges that Defendant’s smart home products, including doorbell cameras, infringe four patents related to wireless communication error correction, user interface gestures, and Internet-of-Things (IoT) device management.
- Technical Context: The patents address foundational technologies in wireless networking (error correction for Wi-Fi), touch-based user interfaces, and the remote management of connected devices, which are core components of the modern smart home market.
- Key Procedural History: Plaintiff, the successor-in-interest to a BlackBerry patent portfolio, alleges it sent multiple notice letters to Defendants identifying the asserted patents beginning in September 2024. Plaintiff also states that some of its patents, including those asserted, may be essential to the IEEE 802.11 (Wi-Fi) standard and that it offered Defendants a license on reasonable and non-discriminatory (RAND) terms, which was not accepted.
Case Timeline
| Date | Event | 
|---|---|
| 2004-10-12 | Earliest Priority Date for ’829 and ’980 Patents | 
| 2007-10-19 | Earliest Priority Date for ’847 Patent | 
| 2011-03-29 | ’829 Patent Issued | 
| 2012-12-18 | ’847 Patent Issued | 
| 2013-11-12 | ’980 Patent Issued | 
| 2018-08-03 | Earliest Priority Date for ’756 Patent | 
| 2021-09-14 | ’756 Patent Issued | 
| 2024-09-11 | Plaintiff sends first notice letter to Defendants | 
| 2024-10-18 | Plaintiff sends follow-up letter offering RAND license terms | 
| 2025-04-04 | Plaintiff sends exemplary claim charts to Defendants’ counsel | 
| 2025-05-19 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,917,829 - “Low Density Parity Check (LDPC) Code,” Issued March 29, 2011
The Invention Explained
- Problem Addressed: The patent describes challenges in designing Low-Density Parity-Check (LDPC) codes, a type of forward error correction used in digital communications. Specifically, it notes that prior art LDPC code designs could be complex to encode and that the structure of their defining "parity check matrix" did not always allow for simple, efficient hardware implementation (U.S. 7,917,829, col. 2:17-24).
- The Patented Solution: The invention proposes a method for constructing a structured LDPC code using a "base parity check matrix" that is divided into a data portion and a parity portion. This base matrix is then expanded into a larger matrix by replacing its non-zero elements with shifted identity matrices. The specific structure of the parity portion is designed to allow for a "simple recursive encoding algorithm," which simplifies the hardware required to generate the error-correcting code (U.S. 7,917,829, col. 2:26-48; Fig. 2).
- Technical Importance: This method provides a structured and efficient way to create LDPC codes, which are crucial for reliable data transmission in high-speed wireless standards like IEEE 802.11 (Wi-Fi) (Compl. ¶17, 28).
Key Claims at a Glance
- The complaint asserts independent claim 6 (Compl. ¶28).
- Claim 6 is a method claim directed to constructing an LDPC code, with key elements including:- Constructing a base parity check matrix "H=[Hd|Hp]" of a specific size and structure.
- The base matrix having a specified coding rate (e.g., R=1/2, 2/3, 3/4, 5/6, or 7/8).
- Expanding the base parity check matrix into an expanded parity check matrix.
- The expansion involves replacing each non-zero element with a "shifted identity matrix" and each zero element with a "zero matrix."
 
- The complaint reserves the right to assert other claims (Compl. ¶28).
U.S. Patent No. 8,583,980 - “Low Density Parity Check (LDPC) Code,” Issued November 12, 2013
The Invention Explained
- Problem Addressed: Like the ’829 Patent from the same family, this patent addresses the need for LDPC codes that are efficient to implement in hardware and can be adapted for various code rates and block sizes without significant redesign (U.S. 8,583,980, col. 2:5-14).
- The Patented Solution: The patent discloses specific example methods for decoding LDPC encoded data by applying a particular expanded parity check matrix. The claims define a specific matrix structure (represented by a table of integer shift values) for a given code length and expansion factor, such as a code length of 1944 bits using an expansion factor of 81. The matrix is defined by its specific integer values, where "-1" represents an all-zero sub-matrix and other integers represent circularly shifted identity matrices (U.S. 8,583,980, col. 13:49-14:21).
- Technical Importance: This patent provides concrete implementations of the LDPC coding schemes foundational to high-throughput wireless communications, allegedly used in the IEEE 802.11 standard (Compl. ¶17, 36).
Key Claims at a Glance
- The complaint asserts independent claim 31 (Compl. ¶36).
- Claim 31 is a device claim comprising:- A low-density parity-check (LDPC) encoder.
- The encoder is "configured to" encode data using a specific expanded parity check matrix.
- The matrix is defined by a table of shift values where "-1" represents an all-zero square matrix and other integers represent an identity matrix circularly shifted by that integer's amount.
 
- The complaint reserves the right to assert other claims (Compl. ¶36).
U.S. Patent No. 8,334,847 - “System Having User Interface Using Object Selection and Gestures,” Issued December 18, 2012 (Multi-Patent Capsule)
- Technology Synopsis: This patent describes a user interface system for touchscreen devices. The system distinguishes between a user selecting a UI object (like a button) and performing a gesture (like a swipe) by measuring the "motion magnitude" of the user's touch. If the movement is below a set threshold, the system registers it as a selection of an object at that location; if it exceeds the threshold, it is identified as a gesture to trigger a different function (U.S. 8,334,847, Abstract; col. 1:44-55).
- Asserted Claims: Independent claim 14 (Compl. ¶44).
- Accused Features: The complaint alleges infringement by Defendants' hardware and software that uses a touchscreen interface to detect and execute functions based on user contact (Compl. ¶44).
U.S. Patent No. 11,119,756 - “System and Method for Controlling Updates to Internet-of-Things Devices,” Issued September 14, 2021 (Multi-Patent Capsule)
- Technology Synopsis: The patent discloses a three-party system for managing software updates on IoT devices. A server acts as an intermediary between a user's primary device (e.g., a smartphone) and the secondary IoT device to be updated (e.g., a smart appliance). The server receives a request from the user's device, queries the IoT device for its "state information" (e.g., whether it is in use), determines if the IoT device is ready for an update, and only then commands the IoT device to begin the update, all without requiring the user to interact directly with the IoT device (U.S. 11,119,756, Abstract; col. 8:25-48).
- Asserted Claims: Independent claim 14 (Compl. ¶52).
- Accused Features: The complaint accuses Defendants' systems and methods for "initiating and controlling updates of Internet-of-Things (IoT) devices" (Compl. ¶50, 52).
III. The Accused Instrumentality
Product Identification
- The complaint specifically names the "Vivint Doorbell Camera Pro (VS-DBC350-WHT)" as an exemplary product accused of infringing the ’829 and ’980 patents (Compl. ¶28, 36). For the ’847 and ’756 patents, the allegations are broader, targeting Defendants' "hardware and/or software" systems that provide touchscreen UIs and control updates to IoT devices, respectively (Compl. ¶44, 52).
Functionality and Market Context
- The complaint alleges that the accused products are compliant with IEEE 802.11 (Wi-Fi) standards, which allegedly practice the claimed LDPC coding technology (’829 and ’980 patents) (Compl. ¶28, 36). The infringement allegations against the ’847 and ’756 patents target the fundamental operation of Vivint’s smart home ecosystem: how users interact with devices via touch and how those devices are updated remotely (Compl. ¶42, 50). Vivint is positioned as a major provider of smart home technology, with NRG Energy as its parent company (Compl. ¶3). No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint references exemplary claim charts attached as Exhibits 5, 6, 7, and 8, but these exhibits were not filed with the complaint itself. The following is a summary of the narrative infringement theories.
’829 Patent Infringement Allegations
The complaint alleges that Defendants directly infringe at least claim 6 by making, using, and selling devices compliant with IEEE 802.11 standards, such as the Vivint Doorbell Camera Pro (Compl. ¶28). The theory appears to be that practicing the 802.11 standard necessarily requires performing the patented method of constructing an LDPC code. The complaint refers to Exhibit 5 for a detailed mapping of claim 6 to the accused product (Compl. ¶28).
- Identified Points of Contention:- Scope Question: A primary issue will be whether compliance with the IEEE 802.11 standard is sufficient to prove infringement of the specific method steps of claim 6. The court may need to determine if the claimed method of constructing and expanding a base matrix is mandatory for standard compliance or merely one of several optional implementations.
- Evidentiary Question: Plaintiff will need to provide evidence that the accused doorbell camera, in its actual operation, performs each step of the claimed method, including the specific acts of "constructing a base parity check matrix" and "expanding" it by replacing elements with "shifted identity" and "zero" matrices.
 
’980 Patent Infringement Allegations
The complaint alleges that Defendants directly infringe at least claim 31 by making and selling devices like the Vivint Doorbell Camera Pro that are compliant with IEEE 802.11 standards (Compl. ¶36). The theory is that the LDPC encoder within the accused device is "operable to" apply the specific expanded parity check matrix defined in the claim. The complaint refers to Exhibit 6 for a detailed mapping (Compl. ¶36).
- Identified Points of Contention:- Technical Question: The dispute will likely focus on the precise structure of the LDPC encoder implemented in the accused product. The analysis will require a technical comparison of the product's internal workings to the highly specific matrix structure laid out in claim 31.
- Scope Question: The claim term "operable to apply" may become a point of contention. The parties may dispute whether this requires the accused device to actively use the claimed matrix structure in all modes of operation, or if merely having the latent capability to do so is sufficient for infringement.
 
V. Key Claim Terms for Construction
’829 Patent (Claim 6)
- The Term: "expanding the base parity check matrix into an expanded parity check matrix by replacing each non-zero element by a shifted identity matrix"
- Context and Importance: This term defines the core manipulative step of the claimed method. The infringement analysis for this standards-based patent will depend on whether the method of expansion mandated by the IEEE 802.11 standard is coextensive with the method defined by this claim language.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification describes the concept generally, stating "expansion may be done for example by replacing each non-zero element with a permutation matrix" (U.S. 7,917,829, col. 10:9-12), which could suggest that "shifted identity matrix" is just one example of a broader class of "permutation matrices."
- Evidence for a Narrower Interpretation: The claim itself explicitly recites "shifted identity matrix," not the broader "permutation matrix." A defendant may argue this was a deliberate choice to narrow the claim scope to a specific, computationally simple type of permutation matrix, as distinguished from more complex permutations.
 
’756 Patent (Claim 14)
- The Term: "a computer-implemented method comprising: receiving, from a device for which an update is available, state information about the device"
- Context and Importance: This term is central to the claimed three-party update architecture. The infringement case hinges on whether Vivint's system involves a central server that actively "receives" status information from the IoT device before deciding to proceed with an update, as opposed to a different architecture (e.g., where the user's phone queries the device directly). Practitioners may focus on this term because it defines the specific data flow required for infringement.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification provides varied examples of "state information," such as whether a car is in motion, a washing machine is in a cycle, or a refrigerator's compressor is running, suggesting the "state information" itself can be diverse (U.S. 11,119,756, col. 8:28-39).
- Evidence for a Narrower Interpretation: The claim requires that the "state information" is received from the device to be updated, and is then used to "determine... that the device is in a condition where the device is ready to perform the update." A defendant might argue that this requires a specific logical determination of "readiness" based on the received state, not just a simple data pass-through. Figure 5 depicts this as a distinct communication flow (530) from the second device (120) to the switchboard server (110) (U.S. 11,119,756, Fig. 5).
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges both induced and contributory infringement for all four patents. The inducement theory is based on Defendants allegedly encouraging infringement by selling products compliant with the IEEE 802.11 standard and providing access to their products and services (Compl. ¶30, 38, 46, 54). The contributory infringement allegations state that Defendants supply a material part of the invention (e.g., the devices) that is not a staple article of commerce and is incapable of substantial non-infringing use (Compl. ¶31, 39, 47, 55).
- Willful Infringement: The complaint alleges willful infringement based on pre-suit knowledge for the ’829, ’980, and ’847 patents, citing notice letters sent starting on September 11, 2024, and the subsequent provision of exemplary claim charts on April 4, 2025 (Compl. ¶27, 35, 43). For the ’756 patent, willfulness is alleged to have begun upon the filing of the complaint itself, which served as notice (Compl. ¶51, 56).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of standard-essentiality and proof: For the ’829 and ’980 patents, can the Plaintiff prove that compliance with the IEEE 802.11 standard, as implemented in the accused products, necessarily requires practicing the specific matrix construction and expansion methods recited in the claims, or does the standard allow for non-infringing alternatives?
- A second key question will be one of architectural mapping: For the ’756 patent, does Vivint’s IoT update architecture function as the three-party system claimed—with a central server receiving specific "state information" from the target device to determine "readiness"—or does it operate on a different, non-infringing model of communication and control?
- A third question will concern definitional scope: For the ’847 patent, the case may turn on whether the accused interface's process for distinguishing a tap from a swipe is technically equivalent to the claimed method of comparing the "magnitude of the movement" of the touch against a "threshold value."