BOUNTS TECHNOLOGIES LTD. v. CONNECTIFY, INC, ETAL

CourtDistrict Court, E.D. Pennsylvania
DecidedApril 30, 2025
Docket2:23-cv-00890
StatusUnknown

This text of BOUNTS TECHNOLOGIES LTD. v. CONNECTIFY, INC, ETAL (BOUNTS TECHNOLOGIES LTD. v. CONNECTIFY, INC, ETAL) is published on Counsel Stack Legal Research, covering District Court, E.D. Pennsylvania primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
BOUNTS TECHNOLOGIES LTD. v. CONNECTIFY, INC, ETAL, (E.D. Pa. 2025).

Opinion

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

: BOUNTS TECHNOLOGIES LTD., : CIVIL ACTION : Plaintiff, : v. : : CONNECTIFY, INC. and DOES 1–100, : NO. 2:23-cv-890-MRP : Defendants. :

Perez, J. April 30, 2025 MEMORANDUM

Plaintiff Bounts Technologies, Ltd. (“Plaintiff”) brings this action against Defendants Connectify, Inc. (“Defendant” or “Connectify”), and Does 1–100, believed to be distributors, resellers, or end users of Connectify’s network hotspot products. Plaintiff alleges Defendant has directly infringed and induced third parties to infringe upon a patent in which Plaintiff owns all rights. Presently before the Court is Defendant’s Motion to Dismiss Plaintiff’s Second Amended Complaint. For the reasons set forth below, the motion is denied. I. BACKGROUND Plaintiff is the owner of all rights in U.S. Patent No. 9,258,309, titled “Method and System for Operating a Wireless Access Point for Providing Access to a Network” (“‘309 Patent”). ECF No. 26 ¶ 6; ECF No. 26-1 at 2. The ‘309 Patent “relates to a method of operating a wireless access point,” such as a computer linked to a wireless router, to provide other wireless-enabled devices with “access to a network,” such as the Internet—commonly known as a “hotspot.” ECF No. 26- 1 at 1:7–10; see also id. at 4:16–23. The ‘309 Patent purports to improve “prior art hotspot arrangements,” which require “a separate router . . . and a wireless access point,” by “allowing the use of a standard wireless router to provide a hotspot for guest access,” id. at 2:4–9: Alleged Invention A We Se Be OK Mig tM “146 116 ie St — □□ | | □□

13 | me aN ye 7 AK >) Figure 2 \ J) Figure 1 NAT Lo +112 | 11 ‘ Esasl Sale 1 3 | | oe i fou 7! iat 108¢ Es fy \ | MS Ma ---f---.} == = LS □ — 19 21 23 119 121 123

Id. at 3-4. Figure 1 illustrates a prior art “system for connecting a wireless enabled device to a network via a wireless local area network.” /d. at 1:14-15. The wireless access point (3) comprises the wireless access point controller (5)—e.g., a computer—and the base station (7)—e.g., a wireless router. /d. at 1:19-22. The wireless access point controller (5) controls the connection of wireless enabled devices (9) to the network (13)—e.g., the Internet. /d. at 1:21—22. It (5) connects to the modem (11) at its first port (6a) and to the base station (7) at its second port (6b). /d. at 1:23-25. Thus, using the first port (6a), the wireless access point controller (5) is connected via a modem (11) to the network (13) and the server (15), comprising the server processor (16) and storage (17). Id. at 1:16-19, 31-32. The storage means (17) stores information about wireless access points (3)

and subscription data associated with users of wireless enabled devices (9). Id. at 1:34–37. Using the second port (6b), the wireless access point controller (5) is connected via the base station (7) to one or more wireless enabled devices (9). Id. at 1:19–21. In this configuration, each port (6a, 6b) has its own Internet Protocol (“IP”) address. Id. at

1:60–63. A disadvantage of this arrangement is that each port 6a, 6b requires a network adaptor, such as a network card. As commonly available personal computers and laptops are not conventionally provided with two network adaptors the requirements [sic] for two network adaptors is an impediment to commissioning of conventional wireless access points 3 . . . . [I]n such prior art hotspot arrangements, it is necessary to have a separate router (for internet access) such as a modem 11 and a wireless access point 3. Id. at 1:63–2:6. The connections in Figure 2 similarly run through a wireless access point controller (105)—e.g., a computer—and a wireless router (110). Id. at 4:15–16. As in Figure 1, the wireless access point controller (105) controls wireless enabled devices’ (109) access to the network (113)—e.g., the Internet. Id. at 4:23–28. But it (105) connects to the wireless router (110) at its only port (106c). Id. at 4:64–66. The wireless router (110) itself comprises a modem (111) and a wireless access point (112). Id. at 4:16–18. Thus, using the only port (106c), the wireless access point controller is connected via modem (111) to the network (113) and the server (115), comprising the server processor (116) and storage (117). The storage means (117) contains information relating to the operation of the wireless router (110), wireless access points (112), and subscription data associated with users of wireless enabled devices (109). Id. at 5:1–4. Also using port 106(c), the wireless access point controller (105) is connected via modem (111) to the wireless access point (112) and, ultimately, wireless enabled devices (109). Id. at 5:38–41. Because the claimed method involves a single port (6c), only one network adaptor is necessary to receive and transmit data between the two sub-networks. Id. at 2:6–9, 2:13–15. When a wireless enabled device (109) is in range of the wireless router (110), it (109) can connect to the wireless access point (112). Id. at 5:5–9. When a web browser application is run on the wireless enabled device (109), software on the wireless access point controller (105) causes a

“login/sign-up page” to be displayed. Id. at 5:9–12. If the end user of the wireless enabled device (109) is not subscribed to the network (113), they can register by entering personal information that is transmitted via the wireless router (110) and network (113) to the server (115), and stored on the storage means (117). Id. at 5:13–19. When the registered user of a wireless enabled device (109) logs in, the wireless access point controller (105) authenticates the user with the server (115) by confirming against the subscription information in the server storage (117). Id. at 5:27–32. If confirmed, the server (115) authorizes the wireless access point controller (105) to grant the wireless enabled device (109) full access to the network (113). Id. at 5:32–34. Claims 1, 13, and 19 of the ‘309 Patent are independent. Id. at 8:62–11:25. Claim 1 recites:

A method of operating a single network adaptor, comprising a single network interface card or module, to communicate wirelessly with a first sub-network and a second sub-network, the method comprising: setting up a first network address and routing table in the network interface card or module for use in the first sub-network; setting up a second network address and routing table in the network interface card or module for use in the second sub-network; using said single network interface card or module to receive data for one of the first and second sub-networks, and to re-transmit the data to the other of the first and second sub-network, using the network addresses and routing tables, wherein the first sub-network includes a network gateway and the network adaptor is configured to control access from the second sub-network to the network gateway, and wherein the step of receiving data comprises receiving a request from a user via the second sub-network to access the gateway on the first sub-network, verifying the user’s access rights, and allowing the user to access the gateway if and only if the user is entitled to access the gateway. Id. at 8:63–9:21. “At the time of the ‘309 invention, a single network card could potentially support two IP addresses and subnets. However, there was no functionality or need to route traffic between these two subnets or to verify or authenticate the traffic.” ECF No. 42-1 ¶ 9. Claim 13 recites an apparatus for performing the method recited in Claim 1. See ECF No. 26-1 at 10:7–32. Claim 19 recites a method that limits the scope of the sub-networks recited in Claim 1. Id. at 10:63–11:26. Plaintiffs do not dispute Claim 1 is a representative claim. See Content Extraction & Transmission LLC v. Wells Fargo Bank, Nat.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Bell Atlantic Corp. v. Twombly
550 U.S. 544 (Supreme Court, 2007)
Ashcroft v. Iqbal
556 U.S. 662 (Supreme Court, 2009)
Autogiro Company of America v. The United States
384 F.2d 391 (Court of Claims, 1967)
Vitronics Corporation v. Conceptronic, Inc.
90 F.3d 1576 (Federal Circuit, 1996)
Ultramercial, Inc. v. Hulu, LLC
772 F.3d 709 (Federal Circuit, 2014)
Intellectual Ventures I LLC v. Capital One Bank (USA)
792 F.3d 1363 (Federal Circuit, 2015)
Enfish, LLC v. Microsoft Corporation
822 F.3d 1327 (Federal Circuit, 2016)
Electric Power Group, LLC v. Alstom S.A.
830 F.3d 1350 (Federal Circuit, 2016)
McRO, Inc. v. Bandai Namco Games America Inc.
837 F.3d 1299 (Federal Circuit, 2016)
Affinity Labs of Texas, LLC v. Directv, LLC
838 F.3d 1253 (Federal Circuit, 2016)
Microsoft Corporation v. Enfish, LLC
662 F. App'x 981 (Federal Circuit, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
BOUNTS TECHNOLOGIES LTD. v. CONNECTIFY, INC, ETAL, Counsel Stack Legal Research, https://law.counselstack.com/opinion/bounts-technologies-ltd-v-connectify-inc-etal-paed-2025.