DCT

4:25-cv-05479

Factor2 Multimedia Systems LLC v. TikTok Inc

Key Events
Amended Complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:24-cv-133, D.D.C., 08/25/2024
  • Venue Allegations: Venue is alleged to be proper in the District of Columbia because Defendant TikTok maintains a regular and established place of business in the District.
  • Core Dispute: Plaintiff alleges that Defendant’s TikTok application and associated backend systems infringe six U.S. patents related to systems and methods for user authentication using dynamic, time-sensitive codes.
  • Technical Context: The technology at issue involves two-factor authentication, where a user's identity is verified using both something they know (like a username) and something they possess temporarily (like a single-use code sent to their phone), a practice central to securing modern online services.
  • Key Procedural History: The complaint notes that all six patents-in-suit are members of the same patent family, which may suggest that claim terms and specification disclosures could be interpreted consistently across the asserted patents.

Case Timeline

Date Event
2001-08-29 Earliest Patent Priority Date ('129, '938, '864, '453, '285, '297 Patents)
2012-10-02 U.S. Patent No. 8,281,129 Issues
2017-07-11 U.S. Patent No. 9,703,938 Issues
2017-07-19 U.S. Patent No. 9,727,864 Issues
2017-12-27 U.S. Patent No. 9,870,453 Issues
2018-09-05 U.S. Patent No. 10,083,285 Issues
2020-08-19 U.S. Patent No. 10,769,297 Issues
2024-08-25 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 10,769,297 - "Centralized Identification and Authentication System and Method", Issued August 19, 2020

The Invention Explained

  • Problem Addressed: The patent describes the increasing risk of releasing confidential personal and financial information to businesses in e-commerce, noting that traditional identification methods are "not only unsafe but also it is not fool proof that the user is really the person he says he is" (’297 Patent, col. 1:40-51).
  • The Patented Solution: The invention proposes a centralized system where a "Central-Entity" manages user accounts and generates a dynamic, non-predictable, and time-dependent "SecureCode" upon a user's request. The user provides this temporary SecureCode, along with their username, to a third-party "External-Entity" (e.g., a merchant), which then forwards the information to the Central-Entity for verification. This process authenticates the user for a transaction without exposing their permanent credentials to the External-Entity (’297 Patent, Abstract; Fig. 2).
  • Technical Importance: This architecture centralizes trust and uses temporary, single-use codes to mitigate the risks associated with the theft and reuse of static credentials, a foundational problem in securing online transactions (Compl. ¶21).

Key Claims at a Glance

  • The complaint asserts infringement of at least Claim 1 (Compl. ¶21, ¶67).
  • Independent Claim 1 recites an authentication system comprising computing devices configured to perform operations including:
    • Electronically receiving a request for a SecureCode while an online computer system is connected to a user's device.
    • Generating the SecureCode.
    • Electronically providing the SecureCode to the user.
    • Wherein the SecureCode is invalid after a predetermined time, invalid after one use, and valid only for authenticating that user.
    • Electronically receiving from the online computer system a digital authentication request that includes the user's digital identity and the SecureCode.
    • Authenticating the user by evaluating the validity of the SecureCode included in the request.
  • The complaint reserves the right to assert claims 2-29 (Compl. ¶67).

U.S. Patent No. 8,281,129 - "Direct Authentication System and Method Via Trusted Authenticators", Issued October 2, 2012

The Invention Explained

  • Problem Addressed: The patent identifies the flaws of "knowledge-based authentication," where identity is verified based on information (e.g., SSN, mother's maiden name) that is "supposed to be confidential" but is often compromised, leading to fraud and identity theft (’129 Patent, col. 5:26-42).
  • The Patented Solution: The invention describes a two-factor authentication method that leverages an existing trust relationship between an individual and a "trusted-authenticator" (such as a bank). An individual requests a temporary "dynamic code" from their trusted-authenticator. This dynamic code, along with static user information, is provided to a third-party "entity" (such as a merchant). The entity then sends an authentication request to the trusted-authenticator, which verifies both pieces of information before confirming the individual's identity to the entity (’129 Patent, Abstract; col. 7:1-16).
  • Technical Importance: The method proposes to secure transactions by using existing, trusted financial institutions as identity brokers, avoiding reliance on easily compromised personal data or the creation of a new, centralized identity system (Compl. ¶22).

Key Claims at a Glance

  • The complaint asserts infringement of at least Claim 1 (Compl. ¶22, ¶37).
  • Independent Claim 1 recites a computer-implemented method comprising:
    • Receiving electronically a request for a dynamic code for an individual, received by a trusted-authenticator's computer.
    • Calculating the dynamic code, which is valid for a predefined time and becomes invalid after being used.
    • Sending the dynamic code electronically to the individual.
    • Receiving by the trusted-authenticator's computer an authentication request from an entity, which includes user information and the dynamic code.
    • Authenticating the individual's identity based on the user information and the dynamic code, and providing the result to the entity.
  • The complaint reserves the right to assert claims 2-52 (Compl. ¶37).

Multi-Patent Capsule: U.S. Patent No. 9,703,938

  • Patent Identification: U.S. Patent No. 9,703,938, "Direct Authentication System and Method Via Trusted Authenticators", Issued July 11, 2017 (Compl. ¶15).
  • Technology Synopsis: Belonging to the same family as the ’129 Patent, this patent describes a method for enhancing network security by authenticating a user via a "trusted authentication system." The system generates and provides a time-sensitive, single-use dynamic code to a user, which is then used as part of a digital identity to complete an electronic transaction with a separate computer system (’938 Patent, col. 13:1-39).
  • Asserted Claims: Claims 1-26 (Compl. ¶43).
  • Accused Features: The "TikTok Apparatus" and its user authentication system (Compl. ¶2, ¶23).

Multi-Patent Capsule: U.S. Patent No. 8,727,864

  • Patent Identification: U.S. Patent No. 8,727,864, "Centralized identification and Authentication System and Method", Issued July 19, 2017 (Compl. ¶16).
  • Technology Synopsis: Belonging to the same family as the ’297 Patent, this patent describes a centralized authentication system where a "Central-Entity" provides a user with a dynamic "SecureCode." This code is combined with a "UserName" to form a digital identity that the user provides to an "External-Entity" for verification, enabling secure transactions without sharing underlying financial or personal information (’864 Patent, col. 2:23-43).
  • Asserted Claims: Claims 1-15 (Compl. ¶49).
  • Accused Features: The "TikTok Apparatus" and its user authentication system (Compl. ¶2, ¶23).

Multi-Patent Capsule: U.S. Patent No. 9,870,453

  • Patent Identification: U.S. Patent No. 9,870,453, "Direct Authentication System and Method Via Trusted Authenticators", Issued December 27, 2017 (Compl. ¶17).
  • Technology Synopsis: As a member of the same patent family, this patent describes a two-factor authentication method using a "trusted-authenticator" to issue a dynamic "SecureCode" to an individual. The individual provides this code along with a static key to a business, which communicates with the trusted-authenticator to verify the individual's identity for a transaction (’453 Patent, col. 7:20-41).
  • Asserted Claims: Claims 1-26 (Compl. ¶55).
  • Accused Features: The "TikTok Apparatus" and its user authentication system (Compl. ¶2, ¶23).

Multi-Patent Capsule: U.S. Patent No. 10,083,285

  • Patent Identification: U.S. Patent No. 10,083,285, "Direct Authentication System and Method Via Trusted Authenticators", Issued September 5, 2018 (Compl. ¶18).
  • Technology Synopsis: This patent, also in the same family, discloses a direct authentication method where an individual obtains a dynamic key ("SecureCode") from their "trusted-authenticator." The individual provides this dynamic key and a static key to a business, which then communicates with the trusted-authenticator to validate the user's identity, thereby securing the transaction (’285 Patent, Abstract; col. 7:17-41).
  • Asserted Claims: Claims 1-30 (Compl. ¶61).
  • Accused Features: The "TikTok Apparatus" and its user authentication system (Compl. ¶2, ¶23).

III. The Accused Instrumentality

Product Identification

  • The accused instrumentality is the "TikTok Apparatus" (Compl. ¶2).

Functionality and Market Context

  • The complaint defines the "TikTok Apparatus" as including "not only the phone app portion... but also the backend systems and backbone which provides access and functionality to TikTok and distributes content and authenticates users" (Compl. ¶23). The specific accused functionality is the user authentication system where a user logs in by providing a phone number, receiving a temporary verification code via SMS, and entering that code into the application to gain access (Compl. ¶29, pp. 10-12). The complaint provides a screenshot of an SMS message containing a 6-digit verification code from TikTok (Compl. p. 10).

IV. Analysis of Infringement Allegations

10,769,297 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
...electronically receiving a request for a SecureCode; A user enters their phone number into the TikTok app and taps "Send code," which sends an electronic request to TikTok's servers. ¶29; p. 10 col. 5:21-24
generating the SecureCode; TikTok's backend system generates a unique, 6-digit verification code in response to the user's request. ¶29; p. 10 col. 5:30-32
...electronically providing to the user the SecureCode... TikTok sends the generated code to the user's mobile device via an SMS message. A screenshot shows an SMS stating "[TikTok] 015647 is your verification code..." ¶29; p. 10 col. 5:34-37
...the SecureCode is invalid after a predetermined time passes... The SMS message accompanying the code states it is "valid for 5 minutes." ¶29; p. 11 col. 6:1-3
...the SecureCode is invalid after one use of the SecureCode for authentication... The complaint provides a screenshot showing an "Incorrect code" error message, which is alleged to demonstrate that the code is invalid after one use. ¶29; p. 11 col. 6:3-5
...receiving from the online computer system a digital authentication request for authenticating the user...wherein...the digital identity includes the SecureCode... The user enters the received 6-digit code into the TikTok app, which transmits it to TikTok's backend servers as part of the authentication request. ¶29; p. 12 col. 6:7-17
...authenticating the user by evaluating a validity of the SecureCode... TikTok's backend system validates the submitted code to grant the user access to their account. ¶29; p. 12 col. 6:18-21

8,281,129 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
receiving electronically a request for a dynamic code for the individual, which request is received...by a trusted-authenticators computer... A user enters their phone number and requests a code from the TikTok app; this request is received by TikTok's backend servers, which allegedly function as the "trusted-authenticator's computer." ¶22; ¶23; p. 10 col. 12:44-48
calculating by the trusted-authenticators computer the dynamic code...wherein the dynamic code is valid for a predefined time and becomes invalid after being used; TikTok's backend system generates a 6-digit code that is valid for a limited time (e.g., 5 minutes) and is intended for a single use. ¶22; p. 11 col. 12:51-54
sending by the trusted-authenticator's computer electronically the dynamic code to the individual... TikTok's system sends the generated code via SMS to the user's phone number. ¶22; p. 10 col. 12:55-58
receiving by the trusted-authenticator's computer electronically an authentication request from the entity...wherein the entity receives the user information and the dynamic code from the individual; The user enters the code into the app, which sends it to TikTok's backend. The complaint's theory appears to treat TikTok's system as both the "entity" and the "trusted-authenticator." ¶22; p. 12 col. 12:59-65
authenticating by the trusted-authenticator's computer an identity of the individual based on the user information and the dynamic code... TikTok's backend system verifies the code and associates it with the user's account to grant access. ¶22; p. 12 col. 12:66-68
  • Identified Points of Contention:
    • Scope Questions: A principal question for the ’129 Patent is whether its claim language, which recites a "trusted-authenticator's computer" receiving a request "from the entity," can read on an integrated system like TikTok's. The defense may argue that the patent contemplates three distinct parties (user, entity, authenticator), whereas TikTok's system involves only two (user, TikTok), with TikTok acting as both entity and authenticator.
    • Technical Questions: What evidence does the complaint provide that the SecureCode is "invalid after one use" as required by Claim 1 of the ’297 Patent? The complaint shows a screenshot of an "Incorrect code" error, but the court may need further evidence to determine if this error is because the code was single-use or for another reason, such as a mistyped entry (Compl. p. 11).

V. Key Claim Terms for Construction

  • The Term: "trusted-authenticator" (’129 Patent)

  • Context and Importance: The definition of this term is central to the infringement analysis for the '129, '938, '453, and '285 patents. If "trusted-authenticator" is construed to require a separate legal and technical entity from the "entity" a user is transacting with (e.g., a bank vs. a merchant), it could present a challenge to the plaintiff's infringement theory against TikTok's integrated system.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The patent claims do not explicitly state that the "entity" and the "trusted-authenticator" must be different, separate companies. A party could argue that these terms refer to functionally distinct computer systems or modules, which could exist within a single corporate structure.
    • Evidence for a Narrower Interpretation: The specification repeatedly uses a bank as an example of a "trusted authenticator" with which an individual has a pre-existing relationship, distinguishing it from a "creditor" or "business" (’129 Patent, col. 4:48-51, Fig. 1b). This context suggests the invention was conceived as a three-party system involving distinct commercial actors.
  • The Term: "online computer system" (’297 Patent)

  • Context and Importance: This term appears in Claim 1 of the ’297 Patent as the entity that receives the request for the SecureCode, receives the authentication request, and performs the authentication. Practitioners may focus on whether this term can refer to the collection of backend servers and services operated by a single company like TikTok, or if the prosecution history limits it to a more specific architecture.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The term itself is general, and the claim language does not appear to impose structural limitations. The specification uses the term "Central-Entity" to describe a party that "centralizes users personal and financial information in a secure environment," a role consistent with a platform like TikTok (’297 Patent, col. 3:1-5).
    • Evidence for a Narrower Interpretation: An opposing party might argue that the patent's consistent reference to a "Central-Entity" distinct from an "External-Entity" implies a specific client-server relationship that must be maintained, potentially limiting how broadly "online computer system" can be interpreted in the context of the claim as a whole (’297 Patent, col. 2:24-36).

VI. Other Allegations

  • Indirect Infringement: The complaint alleges inducement by providing accused products "with instructions" to use them in an infringing manner, which may refer to the on-screen prompts guiding users through the authentication process (Compl. ¶32). It also alleges contributory infringement by supplying the "technology that allows infringement" (Compl. ¶25).
  • Willful Infringement: The complaint alleges that "Defendants have no good faith defense to Plaintiff's infringement allegations" (Compl. ¶34) and seeks enhanced damages in its prayer for relief (Compl. ¶73). The allegations are made "upon information and belief," suggesting no specific pre-suit knowledge is alleged, but the filing of the complaint itself serves as notice for potential post-suit willful infringement.

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of architectural scope: can the claim language of the "trusted authenticator" patents (e.g., '129, '938), which describes a system with a distinct "entity" and "trusted-authenticator," be construed to cover TikTok's integrated platform where TikTok's own servers perform both roles?
  • A key question of claim construction will be whether terms like "trusted-authenticator" and "online computer system," as used across the single patent family, require a specific multi-party commercial relationship or can simply refer to different functional modules within a single company's technical infrastructure.
  • An evidentiary question will be one of technical proof: what evidence will be presented to demonstrate that the accused TikTok system meets specific claimed functionalities, such as rendering a code "invalid after one use," beyond the screenshots provided in the initial complaint?