1:26-cv-00316
Kmizra LLC v. Amazon.com Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: K.Mizra LLC (Delaware)
- Defendant: Amazon.com, Inc. and Amazon Web Services, Inc. (Delaware)
- Plaintiff’s Counsel: Scheef & Stone, LLP; Sheridan Ross P.C.; Miller Fair Henry PLLC
- Case Identification: 1:26-cv-00316, W.D. Tex., 02/10/2026
- Venue Allegations: Venue is alleged based on Defendants’ commission of infringing acts within the district and their maintenance of a regular and established place of business at the Amazon Tech Hub in Austin, Texas.
- Core Dispute: Plaintiff alleges that a range of Amazon and AWS products—including cloud security, AI, smart home, and network monitoring services—infringes six patents related to network security, wireless communication protocols, machine learning, audio processing, and network management architecture.
- Technical Context: The asserted patents cover foundational technologies in enterprise cloud computing, the Internet of Things (IoT), artificial intelligence, and network reliability.
- Key Procedural History: The complaint notes that U.S. Patent No. 8,234,705 has previously survived an Inter Partes Review (IPR) proceeding where the Patent Trial and Appeal Board (PTAB) found the challenged claims not unpatentable. Subsequent IPR petitions were also reportedly denied or withdrawn. The complaint also states that in separate litigation, a motion to dismiss claims involving the '705 patent on patent-eligibility grounds was denied. For U.S. Patent No. 8,782,282, the complaint highlights that the patent examiner allowed the claims over prior art specifically due to a limitation concerning failover when a server instance becomes disabled.
Case Timeline
| Date | Event |
|---|---|
| 2003-12-19 | '282 Patent Priority Date |
| 2004-09-27 | '705 Patent Priority Date |
| 2005-12-30 | '717 Patent Priority Date |
| 2008-04-25 | '120 Patent Priority Date |
| 2010-07-23 | '649 Patent Priority Date |
| 2010-11-26 | '259 Patent Priority Date |
| 2012-03-27 | '717 Patent Issue Date |
| 2012-07-31 | '705 Patent Issue Date |
| 2013-05-07 | '120 Patent Issue Date |
| 2014-07-15 | '282 Patent Issue Date |
| 2016-01-12 | '259 Patent Issue Date |
| 2017-03-21 | '649 Patent Issue Date |
| 2025-01-06 | Alleged Pre-Suit Notice of '705 Patent Infringement |
| 2026-02-10 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,234,705 - "Contagion Isolation and Inoculation"
The Invention Explained
- Problem Addressed: The patent addresses the security threat posed by mobile devices, such as laptops, that connect to both untrusted public networks and protected enterprise networks Compl. ¶25 Such devices can become infected with viruses or worms on unsecured networks and subsequently introduce these threats into the secure network upon reconnection, before preventative measures can be taken (’705 Patent, col. 1:14-38). The patent identifies a need for a reliable method to prevent a connecting system from harming network resources ’705 Patent, col. 1:38-41
- The Patented Solution: The invention proposes a system to automatically detect an "insecure condition" on a host computer attempting to connect to a protected network Compl. ¶¶33-34 This is achieved by contacting a "trusted computing base" on the host to receive a digitally signed "attestation of cleanliness" ’705 Patent, claim 19 If the host cannot provide a valid attestation, it is "quarantined," with its network access restricted to a "remediation host." This allows the host to download necessary software patches or updates to resolve the security issue before being granted full network access Compl. ¶33 Figure 10A illustrates this three-step process of detection, quarantine, and remediation Compl. ¶30 Compl. p. 11
- Technical Importance: The technology provides a framework for automated network access control, a crucial component of enterprise security in an era of increasing device mobility and bring-your-own-device (BYOD) policies Compl. ¶24
Key Claims at a Glance
- The complaint asserts independent Claim 19, a computer program product claim Compl. ¶¶27, 89
- The essential elements of Claim 19 include instructions for:
- Detecting an insecure condition on a host, which includes contacting a trusted computing base and determining if a response contains a valid digitally signed attestation of cleanliness.
- The valid attestation must confirm the host is not infested and/or has a certain patch level.
- If no valid attestation is received, quarantining the host by preventing it from sending data to other network hosts.
- This prevention includes intercepting service requests (like web server or DNS queries) and serving a quarantine notification page or providing the IP address of a quarantine server.
- Permitting the quarantined host to communicate with a remediation host to fix the insecure condition.
- The complaint reserves the right to assert additional dependent and independent claims Compl. ¶27
U.S. Patent No. 8,144,717 - "Initialization of a Wireless Communication Network"
The Invention Explained
- Problem Addressed: The patent describes challenges in forming wireless networks where stations must transmit information before routing paths are established Compl. ¶44 This process can be complicated, inefficient, and power-intensive, particularly for low-power devices, as it may require supporting multiple communication modes simultaneously (’717 Patent, col. 2:59-63).
- The Patented Solution: The invention discloses a method for dynamically building a wireless network topology. The network comprises an "association unit" and multiple "stations" ’717 Patent, abstract A new station begins in a "not-associated state" and transmits "association request messages" Compl. ¶46 Upon receiving an "association grant" from either the central association unit or another already-associated station, it switches to an "associated state," which establishes a communication route Compl. ¶48 ’717 Patent, col. 3:20-36 A key aspect is that newly associated stations can then be enabled to issue their own association grants, allowing the network to expand organically from node to node Compl. ¶48
- Technical Importance: This approach facilitates the scalable and efficient formation of ad-hoc or mesh-style wireless networks, which is foundational for modern IoT technologies Compl. ¶50
Key Claims at a Glance
- The complaint asserts independent Claim 1, a wireless communication network claim Compl. ¶¶42, 107
- The essential elements of Claim 1 include:
- An association unit and a plurality of stations.
- Stations configured to start in a "not-associated state," transmit association requests, and switch to an "associated state" upon receiving an association grant.
- The request/grant process establishes an operating route to the association unit.
- The association unit is configured to transmit association grants.
- A portion of the stations are configured to become active to transmit their own association grants, but only after they have successfully switched to the associated state.
- The complaint reserves the right to assert additional dependent and independent claims Compl. ¶42
U.S. Patent No. 8,438,120 - "Machine Learning Hyperparameter Estimation"
Technology Synopsis
The patent addresses the challenge of determining optimal "hyperparameters," which are high-level parameters used to train machine learning systems Compl. ¶54 It proposes an iterative method that improves upon conventional techniques by drawing a random sample of hyperparameter vectors, selecting the vector that produces the best result from the current and all previous iterations, and using that "best" vector to update the estimate for the next iteration, thereby preserving the best performance found so far Compl. ¶¶54-55
Asserted Claims
Claim 1 Compl. ¶52
Accused Features
The "automatic model tuning" (AMT) feature of Amazon SageMaker AI, which is alleged to find the best version of a model by running training jobs using various hyperparameter values Compl. ¶127 The complaint specifically points to SageMaker's "random search" and "warm start" functionalities as implementing the claimed iterative process Compl. ¶¶128, 130
U.S. Patent No. 9,235,259 - "Method for Detecting Audio Ticks in a Noisy Environment"
Technology Synopsis
The patent describes a solution for reliably detecting specific short audio sounds ("ticks") in noisy environments while minimizing processor and power consumption Compl. ¶¶59, 63 It proposes a two-tiered system where a computationally inexpensive "coarse tick detection processor" first analyzes an audio signal to decide if it likely includes a tick. Only if a likely tick is found is a more computationally intensive "fine tick detection processor" enabled to perform a more thorough analysis to confirm the tick's presence Compl. ¶¶61, 63
Asserted Claims
Claim 1 Compl. ¶57
Accused Features
The Alexa Emergency Assist service (formerly Alexa Guard), which detects sounds such as smoke alarms and glass breaking Compl. ¶140 The complaint alleges this service uses a two-step system where a neural network on the local Echo device performs coarse, on-device processing, and only "potential triggers" are sent to the cloud for more powerful, "second verification" processing, mirroring the claimed coarse/fine detection architecture Compl. ¶¶141-142
U.S. Patent No. 9,602,649 - "Event Disambiguation"
Technology Synopsis
The patent addresses the problem of unreliably pairing electronic devices that use sensory identifiers (e.g., a sound), which can be prone to errors from non-proximate devices Compl. ¶67 The invention proposes a method where devices not only detect a common sensory identifier (a "trigger") but also compare audio samples recorded during a common time interval relative to that trigger. If the ambient audio samples are sufficiently similar, it confirms the devices are in the same acoustic environment and thus truly proximate Compl. ¶¶69, 71
Asserted Claims
Claim 1 Compl. ¶152
Accused Features
The "Echo Spatial Perception" (ESP) feature in Amazon Echo devices, which determines which of several devices is closest to a user who speaks the "wake word" Compl. ¶153 The complaint alleges this system uses the wake word as the "sensory identifier" or "trigger" and then compares audio characteristics (e.g., volume, proximity of the spoken request) across multiple devices to decide which one should respond, thereby performing the claimed method of identifying proximate devices Compl. ¶¶155, 157
U.S. Patent No. 8,782,282 - "Network Management System"
Technology Synopsis
The patent addresses scalability and robustness challenges in conventional Network Management Systems (NMS) that can become overwhelmed as networks grow Compl. ¶77 The proposed solution is a distributed NMS architecture using server clusters, load balancing, and distributed adapters to manage network events efficiently Compl. ¶78 A key aspect is its fault tolerance, where associated software modules can automatically re-establish a connection with a different server instance if the primary one becomes disabled, ensuring uninterrupted functionality (Compl. ¶79; ’282 Patent, col. 9:58-65).
Asserted Claims
Claim 1 Compl. ¶74
Accused Features
The Amazon CloudWatch service for monitoring network and application performance Compl. ¶166 The complaint alleges CloudWatch implements the claimed distributed architecture using Amazon EC2 instances as "application server instances," Elastic Load Balancing for selecting servers, and agents such as Logstash as "adapters" Compl. ¶¶170-171 The use of AWS Availability Zones for failover is alleged to meet the claim limitation of re-establishing an association when a server instance becomes disabled Compl. ¶174
III. The Accused Instrumentality
Product Identification
The complaint identifies six distinct "Accused Instrumentalities" or services Compl. ¶82:
- AWS Verified Access (accused of infringing the ’705 Patent)
- Thread-enabled Amazon devices, such as Echo devices (accused of infringing the ’717 Patent)
- Amazon SageMaker AI (accused of infringing the ’120 Patent)
- Alexa Emergency Assist (accused of infringing the ’259 Patent)
- Amazon Echo devices incorporating Echo Spatial Perception (accused of infringing the ’649 Patent)
- Amazon CloudWatch (accused of infringing the ’282 Patent)
Functionality and Market Context
- AWS Verified Access is described as a cloud-based service that provides secure access to corporate applications without a traditional VPN. It functions by evaluating each access request against fine-grained policies based on user identity and device security state, a model known as "zero trust" Compl. ¶¶90-91 A diagram in the complaint shows Verified Access acting as a gatekeeper between trust providers and a private corporate network Compl. p. 37
- Thread-enabled Amazon devices are identified as products like the Amazon Echo that implement the Thread networking protocol Compl. ¶105 Thread is a low-power, IPv6-based wireless mesh networking protocol designed for IoT devices Compl. ¶110
- The functionalities of the other accused products are described in their respective capsules in Section II. The complaint positions these products as significant offerings in Amazon's consumer electronics and cloud computing portfolios.
IV. Analysis of Infringement Allegations
'705 Patent Infringement Allegations
| Claim Element (from Independent Claim 19) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| [A] detecting an insecure condition on a first host that has connected or is attempting to connect to a protected network, | AWS Verified Access enforces fine-grained access policies based on a user's identity and "device security state" for every access request. | ¶91 | col. 22:18-21 |
| [B1] contacting a trusted computing base associated with a trusted platform module within the first host, | AWS Verified Access integrates with trust providers like JumpCloud, which accesses a hardware "Secure Enclave" (macOS) or "Trusted Platform Module (TPM)" (Windows) on the host device. | ¶92 | col. 22:23-25 |
| [B2] receiving a response, and determining whether the response includes a valid digitally signed attestation of cleanliness, | The JumpCloud integration creates a signed JSON Web Token (JWT) using a certificate unique to the device, and the JWT's signature is validated to authenticate the device. | ¶93 | col. 22:26-28 |
| [D] when it is determined that the response does not include a valid digitally signed attestation of cleanliness, quarantining the first host... | If a user's device fails to meet the specified security requirements, AWS Verified Access denies the application request by default, preventing access to the protected network. | ¶95 | col. 22:33-37 |
| [E1] receiving a service request sent by the first host, serving a quarantine notification page to the first host when the service request comprises a web server request, | A user attempting to access a protected application with a non-compliant device is served a "403 Unauthorized error" message. A screenshot illustrates the access denial process. (Compl. p. 45). | ¶96 | col. 22:40-42 |
| [F] permitting the first host to communicate with the remediation host. | AWS Verified Access permits communication with its integrated "Trust Providers" (e.g., JumpCloud, CrowdStrike), which the complaint alleges act as remediation hosts. | ¶98 | col. 22:48-49 |
- Identified Points of Contention:
- Scope Questions: The analysis may turn on whether the functions of a modern "zero trust" architecture map onto the patent's "quarantine-and-remediate" terminology. For instance, does serving a generic "403 Unauthorized error" message constitute "serving a quarantine notification page" as required by the claim? Does a third-party identity and device management service (a "Trust Provider") function as a "remediation host" in the manner contemplated by the patent?
- Technical Questions: The complaint alleges that in the event of a DNS query, AWS provides an IP address of a quarantine server (Compl. ¶97). The technical evidence supporting how AWS Verified Access specifically intercepts and responds to DNS queries in the claimed manner, as distinct from general HTTP request denials, is not detailed.
'717 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| [A] an association unit and [B] a plurality of stations, | The accused Thread-enabled wireless network includes a "Leader," which acts as the "association unit," and multiple "Thread Devices," which are the "stations." | ¶¶109-110 | col. 14:29-30 |
| [C] each station being configured to start up in a not-associated state and to transmit association request messages in the not-associated state, | Thread devices are configured to start in a "Detached" state and transmit "Parent Request" signals to join the network. | ¶111 | col. 14:31-34 |
| [D] each station being configured to switch to an associated state upon reception of an association grant in response to one of its association request messages, | Thread devices switch to an "Attached" state upon receiving a "Child ID Response" from the Leader, which functions as the association grant. | ¶112 | col. 14:35-38 |
| [E] the association request message and/or the association grant... establishing an operating route associated with the station for exchanging operating messages with the association unit... | Following the Child ID Response, a "Route64 TLV" link is established between the station and the association unit, creating an operating route. | ¶113 | col. 14:39-44 |
| [I] at least part of the stations is configured to become active to transmit association grants... but only after switching to the associated state... | Accused Thread-enabled devices, once associated with the network, are configured to act as routers, enabling them to extend the network to new devices. | ¶117 | col. 14:48-52 |
- Identified Points of Contention:
- Scope Questions: A central issue is one of definitional mapping. The case will likely require determining whether the specific roles, states, and messages defined in the Thread networking standard (e.g., "Leader," "Detached" state, "Parent Request," "Child ID Response") fall within the scope of the broader, functional terms used in Claim 1 (e.g., "association unit," "not-associated state," "association request message," "association grant").
- Technical Questions: The infringement theory relies on the accused devices implementing the Thread Specification as described. The analysis will depend on evidence showing that the accused Amazon Echo and other devices practice these specific parts of the standard.
V. Key Claim Terms for Construction
- Patent: '705 Patent
- The Term: "trusted computing base"
- Context and Importance: This term is the technical core of the patent's security model, as it is the entity that provides the "attestation of cleanliness." The scope of this term will be critical to determining infringement, as the Plaintiff alleges it reads on hardware security modules like a TPM or Secure Enclave, which are accessed via a third-party cloud service. Practitioners may focus on this term because its definition will determine whether a distributed, service-based trust verification system meets a limitation grounded in hardware security modules.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claims do not appear to limit the "trusted computing base" to a single, monolithic component, stating it is "associated with a trusted platform module within the first host" ’705 Patent, col. 22:23-25, suggesting the base and the module can be distinct but related entities.
- Evidence for a Narrower Interpretation: The specification does not provide an explicit definition. A defendant may argue that the context implies a component that is entirely self-contained within the host and performs all attestation functions locally, potentially distinguishing it from a system that relies on an external service like JumpCloud for signature validation.
- Patent: '717 Patent
- The Term: "association unit"
- Context and Importance: This is the root node from which the wireless network topology is formed. The complaint alleges that the "Leader" role in a Thread network satisfies this limitation. The construction of "association unit" will determine if this mapping is correct, which is central to the infringement case for the ’717 patent.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim language defines the unit by its function: it "is configured to transmit association grants as responses to received ones of the association request messages" ’717 Patent, col. 14:45-47 This functional definition could be read to encompass any network entity that performs this central arbitration role, such as a Thread "Leader."
- Evidence for a Narrower Interpretation: The background section of the patent refers to prior art systems using a "central panel" or "cluster head unit" ’717 Patent, col. 1:16-32 A defendant may argue these examples cabin the term to a more traditional, centralized controller, and raise questions as to whether the dynamically elected "Leader" in a mesh network fits that construction.
VI. Other Allegations
- Indirect Infringement:
- For the ’705 Patent, the complaint alleges active inducement, stating Amazon encourages infringement by promoting, advertising, and instructing customers on the use of AWS Verified Access Compl. ¶99
- For the ’717 Patent, similar inducement allegations are made regarding Amazon's promotion and instruction for using Thread-enabled devices Compl. ¶118
- Allegations of inducement are also made for the ’120, ’259, ’649, and ’282 patents based on similar grounds of promotion and instruction for the respective accused products Compl. ¶¶131, 144, 160, 175
- Willful Infringement:
- For the ’705 Patent, willfulness is alleged based on pre-suit knowledge from a letter sent to Amazon on or before January 6, 2025 Compl. ¶100
- For the remaining five patents (’717, ’120, ’259, ’649, and ’282), willfulness is alleged based on knowledge acquired "no later than the filing of this Complaint" Compl. ¶¶119, 132, 145, 161, 176
VII. Analyst’s Conclusion: Key Questions for the Case
This case presents a broad challenge to core features across Amazon's cloud and consumer device ecosystems. The outcome may turn on a few central questions for the court:
- A primary issue will be one of technological translation: do the architectures and terminologies of modern, complex systems—such as AWS's "zero trust" security, the "Thread" IoT standard, and Alexa's cloud-based audio processing—perform the functions described in the patent claims, which are drafted in more general, functional language? For example, does a "403 Unauthorized" error page function as the claimed "quarantine notification page," or is there a material difference in their technical operation and purpose?
- A second key question will involve definitional scope, particularly in the context of standardized technologies. Can functional claim terms like "association unit" (’717 Patent) be construed to read on specific roles like the "Leader" defined in the Thread specification? The resolution of this will likely determine the viability of the infringement theories that rely on standards compliance.
- Finally, the case raises an evidentiary question of functional equivalence and implementation. For patents covering distributed systems and AI (’282 and ’120 patents), the analysis will require detailed evidence of how services like CloudWatch and SageMaker AI actually implement their failover and model optimization processes, and whether those implementations match the specific, multi-step methods recited in the claims.