4:23-cv-01292
Electrical Controller Products Co v. JS2 Logistic Solutions LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Electrical Controller Products Company, d.b.a. ECP Solutions (Texas)
- Defendant: JS2 Logistic Solutions, LLC (Ohio)
- Plaintiff’s Counsel: Port & Bumgarner LLP
 
- Case Identification: 4:23-cv-01292, S.D. Tex., 04/06/2023
- Venue Allegations: Plaintiff ECP Solutions alleges venue is proper in the Southern District of Texas based on Defendant JS2’s alleged continuous and systematic contacts with the state, including business activities and patent enforcement efforts against residents.
- Core Dispute: This is a declaratory judgment action in which Plaintiff seeks a court ruling that its "On Demand (OD) Pod" product does not infringe Defendant's patent related to mobile inventory tracking systems, and that the patent is invalid.
- Technical Context: The technology concerns automated, secure, and portable storage units that use RFID technology to track inventory items as they are checked in and out, primarily for use at remote jobsites.
- Key Procedural History: The action was prompted by a cease-and-desist letter sent by Defendant JS2 to Plaintiff ECP Solutions on March 27, 2023, which alleged that ECP’s product infringes U.S. Patent No. 10,777,056 and included a detailed claim chart comparing the product to Claim 20 of the patent.
Case Timeline
| Date | Event | 
|---|---|
| 2017-12-05 | U.S. Patent No. 10,777,056 Priority Date | 
| 2020-09-15 | U.S. Patent No. 10,777,056 Issued | 
| 2023-03-27 | JS2 sends cease-and-desist letter to ECP Solutions | 
| 2023-04-06 | Complaint for Declaratory Judgment filed by ECP Solutions | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,777,056 - "Mobile Storage, Tracking and Security System and Method Thereof"
The patent-in-suit is U.S. Patent No. 10,777,056, issued September 15, 2020 (the "’056 Patent").
The Invention Explained
- Problem Addressed: The patent’s background section identifies difficulties companies face in tracking inventory items and their usage at jobsites, noting that items are often "misused, misplaced, and improperly tracked" and that conventional systems using keypads or barcodes lack robust, automatic tracking and security. (’056 Patent, col. 1:20-37).
- The Patented Solution: The invention is a portable asset dispensing device, such as a modified shipping container, that integrates a security access system with an automated inventory management system. (’056 Patent, Abstract). An authorized user gains entry via a security device, and a network of RFID readers within the container automatically detects which tagged items are removed or returned, associating those transactions with the specific user and updating an inventory system without manual scanning. (’056 Patent, col. 1:46-col. 2:3).
- Technical Importance: The described solution aims to provide a secure, portable, and fully automated system for tracking high-value assets at temporary or remote locations like construction sites, linking asset movement directly to individual user access for accountability. (’056 Patent, col. 1:24-42).
Key Claims at a Glance
- The complaint identifies Claim 20 as a primary claim asserted by Defendant JS2. (Compl. ¶12).
- Independent Claim 20 (Method of Tracking Inventory) is a method claim with the following essential steps:- Providing a container with a door, locking mechanism, and security access device.
- Detecting RFID tags on items within the container using a "plurality of radio frequency identification (RFID) readers."
- Identifying "only an authorized user" based on information entered at the security access device.
- Sending a command to unlock the door for the authorized user.
- "Comparing: (a) the plurality of items detected by the RFID readers... before the authorized user entered information... to, (b) the plurality of items detected... after the authorized user exits the interior of the container."
 
- The complaint notes that JS2's letter also alleged infringement of "multiple" unspecified additional claims. (Compl. ¶12).
III. The Accused Instrumentality
Product Identification
The accused instrumentality is Plaintiff's "On Demand (OD) Pod." (Compl. ¶12).
Functionality and Market Context
The complaint does not provide sufficient detail for analysis of the technical functionality of the OD Pod. It is identified as the subject of JS2's infringement allegations, which prompted ECP to seek a declaratory judgment of non-infringement. (Compl. ¶12, 16). No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint states that JS2 provided a "detailed claim chart comparing Claim 20 of the '056 Patent against the accused product" in a pre-suit letter. (Compl. ¶12). As this exhibit is not attached to the publicly filed complaint, a detailed element-by-element analysis is not possible. The infringement dispute, as framed by the declaratory judgment action, centers on ECP's contention that its OD Pod does not practice one or more of the limitations of the asserted claims, including Claim 20. (Compl. ¶15, 19).
- Identified Points of Contention:- Procedural Question: The core of the case is a declaratory judgment action, meaning the initial burden is on ECP to establish an "actual controversy" between the parties, which it bases on JS2's cease-and-desist letter and threat of legal action. (Compl. ¶12-14, 18).
- Technical Question: A central technical question, based on the elements of Claim 20, will be whether ECP’s OD Pod performs the specific two-part comparison recited in the claim: a first RFID scan of items before the user is granted access, and a second scan after the user exits, followed by a comparison of the two scan results to determine which items were removed or added. (’056 Patent, col. 22:19-32). The infringement analysis will depend on evidence of how the OD Pod's inventory tracking process actually functions.
 
V. Key Claim Terms for Construction
- The Term: "comparing: (a) the plurality of items detected... before the authorized user entered information on the security access device to, (b) the plurality of items detected... after the authorized user exits"(’056 Patent, col. 22:19-32).
- Context and Importance: This limitation defines the core logic of the patented method. The infringement analysis will likely turn on whether the accused OD Pod performs this specific sequence of a "before" and "after" inventory snapshot and comparison. Practitioners may focus on this term because its temporal specificity (i.e., "before... entered information" and "after... exits") creates a precise operational sequence that the accused product must match for literal infringement.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent specification describes a more general process where an initial RFID read occurs "before the authorized user enters the container" and a second read occurs "after the authorized user leaves the container." (’056 Patent, col. 3:13-20). A party might argue this broader language informs the claim, suggesting the precise timing relative to entering information is not strictly required.
- Evidence for a Narrower Interpretation: The claim language itself is highly specific, tying the first scan to a moment "before the authorized user entered information" and the second scan to a moment "after the authorized user exits." (’056 Patent, col. 22:19-32). A party could argue this explicit sequence is a definitional requirement of the claim, distinguishing it from systems that might, for example, continuously monitor RFID tags or perform scans at different times.
 
VI. Other Allegations
The complaint is for declaratory judgment of non-infringement and invalidity and does not make affirmative allegations of infringement against the defendant. It seeks a declaration that ECP has not infringed, either directly or indirectly, and that it has not engaged in willful infringement. (Compl. ¶15; Prayer for Relief A). The complaint references JS2's allegations of inducement from the cease-and-desist letter, which demanded that ECP cease "inducement to use the OD Pod." (Compl. ¶13).
VII. Analyst’s Conclusion: Key Questions for the Case
- A central issue will be one of procedural and operational sequence: Does the evidence show that ECP's "OD Pod" system performs the specific method of Claim 20, particularly the step of "comparing"an inventory scan takenbeforea user enters access information to a second scan takenafterthe user exits? Or does the accused system use a different method to track inventory changes, such as continuous monitoring or scans triggered by other events?
- A secondary question will be one of claim scope: How will the court construe the temporal limitations within the "comparing"step? The resolution will depend on whether the specific timing laid out in the claim language is interpreted as a strict requirement or merely an exemplary embodiment of a more general "before and after" comparison.
- Finally, the case raises an invalidity question: ECP has sought a declaration that the ’056 Patent is invalid under 35 U.S.C. §§ 101, 102, 103, and/or 112. (Compl. ¶22). This broad challenge will require the court to consider whether the patented invention was truly novel and non-obvious over the prior art at the time of the invention, or whether it claims an abstract idea without a sufficient inventive concept.