DCT

1:12-cv-00117

Cyberfone Systems LLC v. Insight Communications Co Inc

Key Events
Complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:12-cv-00117, D. Del., 01/30/2012
  • Venue Allegations: Plaintiff alleges venue is proper because Defendant is subject to personal jurisdiction, has committed acts of infringement, and/or has a regular and established place of business in the District of Delaware.
  • Core Dispute: Plaintiff alleges that Defendant’s video-on-demand and related services infringe a patent concerning a system for entering transaction data and distributing it to multiple databases.
  • Technical Context: The technology relates to systems for capturing data from a user at a point of transaction and processing it through a tiered server architecture, a concept foundational to many distributed data and e-commerce systems.
  • Key Procedural History: The asserted patent is subject to a terminal disclaimer, which may limit its enforceable term to that of an earlier-expiring, related patent. The complaint does not reference any other significant procedural events.

Case Timeline

Date Event
1995-05-19 ’060 Patent Priority Date
2011-09-13 ’060 Patent Issue Date
2012-01-30 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 8,019,060 - "Telephone/Transaction Entry Device and System for Entering Transaction Data Into Databases"

The Invention Explained

  • Problem Addressed: The patent describes conventional point-of-entry data systems as being overly complex and expensive because they require a local operating system and substantial processing power on the user's device. (’060 Patent, col. 2:6-22). This high cost and complexity limited their widespread adoption in commercial and private settings. (’060 Patent, col. 2:28-32).
  • The Patented Solution: The invention proposes a simplified, lower-cost transaction entry device that functions without a conventional local operating system. (’060 Patent, col. 2:52-56). A user enters data into predefined forms or "templates," which is then assembled into a single "data transaction." (’060 Patent, col. 3:1-10). This single transaction is transmitted to a remote database server, which "explodes" it into its component parts and forwards those parts to other, separate databases for storage and processing. (’060 Patent, Abstract; Fig. 1). This architecture centralizes processing complexity on the server side, simplifying the end-user device.
  • Technical Importance: This approach aimed to reduce the cost and technical requirements of data-entry terminals by shifting processing intelligence to a central server, a model that presages modern thin-client and cloud-based computing architectures. (’060 Patent, col. 2:23-36).

Key Claims at a Glance

  • The complaint asserts independent claim 13. (Compl. ¶6).
  • The essential elements of Claim 13 are:
    • obtaining data transaction information;
    • based on the information, forming a plurality of different, exploded data transactions, where each has different data intended for a different destination;
    • sending the different exploded data transactions over a channel to their respective destinations; and
    • receiving data from at least one of those destinations, which is then used as part of the data transaction and sent to a second destination.
  • The complaint does not explicitly reserve the right to assert other claims.

III. The Accused Instrumentality

Product Identification

  • Defendant’s "On Demand video-on-demand services, and its Get Started, HD-DVR Lover, Sports Lover and HD-DVR & Best Channels services." (Compl. ¶6).

Functionality and Market Context

  • The complaint alleges these services infringe by performing a method that mirrors the language of claim 13, including “obtaining data transaction information, forming a plurality of different, exploded data transactions, sending different exploded data transactions over a channel to respective destinations, and receiving data from at least one of said destinations, which data is used as part of the data transaction and is sent to a second destination.” (Compl. ¶6). The complaint does not provide specific technical details on how the accused services operate or their market positioning. No probative visual evidence provided in complaint.

IV. Analysis of Infringement Allegations

The complaint does not provide sufficient detail for a full element-by-element analysis. It alleges infringement by reciting the claim language and mapping it wholesale to the accused services. The following table summarizes this high-level allegation.

’060 Patent Infringement Allegations

Claim Element (from Independent Claim 13) Alleged Infringing Functionality Complaint Citation Patent Citation
A method, comprising: obtaining data transaction information; Defendant performs a method that includes obtaining data transaction information through its accused services. ¶6 col. 26:42-43
based on said data transaction information, forming a plurality of different, exploded data transactions...each of said exploded data transactions having different data that is intended for a different destination... Defendant’s services form multiple, different "exploded data transactions" based on the initial information. ¶6 col. 26:44-53
sending said different exploded data transactions over a channel to said different destinations... Defendant’s services send these different transactions over a channel to different destinations. ¶6 col. 26:54-57
receiving data from at least one of said destinations, which data is used as part of the data transaction, and is sent to a second of said destinations different than said one of said destinations... Defendant’s services receive data back from one destination and send it to a second destination as part of the transaction. ¶6 col. 27:1-6
  • Identified Points of Contention:
    • Scope Questions: A primary question will be whether the backend data processing of a video-on-demand service falls within the scope of the patent's claims. The patent’s specification heavily emphasizes a "transaction entry device" used to fill out "forms" and "templates." (’060 Patent, col. 3:1-10). The dispute may turn on whether a user's selection of content in a VOD interface can be considered "obtaining data transaction information" in the manner contemplated by the patent, and whether the subsequent server-side data routing constitutes the claimed "exploded data transactions."
    • Technical Questions: The complaint lacks factual allegations detailing how the accused services perform the claimed steps. A key technical question for discovery will be to identify the specific data flows that allegedly correspond to the claim elements. In particular, the final limitation—receiving data from a first destination and sending it to a second as part of the original transaction—is a highly specific process that will require concrete evidentiary support.

V. Key Claim Terms for Construction

  • The Term: "exploded data transactions"

  • Context and Importance: This term is central to the invention's contribution of processing a single user-facing transaction into multiple, distinct backend transactions. The case may depend on whether the automated data exchanges in Defendant's VOD system meet this definition. Practitioners may focus on this term because its construction will likely determine whether the patent reads on modern, distributed software architectures beyond the form-based hardware device explicitly described.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The specification describes the server's function as exploding a transaction "into its component parts for updating all databases containing data to which the data in the component parts pertain." (’060 Patent, col. 2:48-51). This could support a construction that covers any system where one user action triggers updates across multiple backend data stores.
    • Evidence for a Narrower Interpretation: The patent’s figures and description illustrate a specific process of deconstructing a data form. Figure 3, for example, shows a single "Data Transaction (Fields 1-N)" being broken into discrete, new transactions for different servers, each containing a specific subset of the original fields. This may support a narrower construction requiring a structured decomposition of a user-submitted form, rather than any general set of triggered server-side events.
  • The Term: "data transaction information"

  • Context and Importance: This term defines the input to the claimed method. Its scope will determine whether the claims are limited to data manually entered by a user into a form, as shown in the embodiments, or if it can cover more abstract inputs like a user's click on a "play" icon in a software interface.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The claim term itself is not explicitly limited. Claim 13 recites simply "obtaining data transaction information," without specifying the source or format.
    • Evidence for a Narrower Interpretation: The specification consistently describes the invention in the context of a "transaction entry device" where a user provides input in response to "prompts in the template or form." (’060 Patent, col. 3:6-8). The detailed description of operation centers on filling out fields in a form displayed on a screen. (’060 Patent, Fig. 2; col. 9:34-41). This context may support an interpretation limiting the term to data entered into a structured form.

VI. Other Allegations

  • Willful Infringement: The complaint alleges willful infringement based on Defendant's awareness of the ’060 patent "since at least the filing of this complaint." (Compl. ¶7). This is an allegation of post-suit willfulness.

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: can the term "exploded data transactions," which is described in the patent in the context of decomposing user-filled data forms, be construed to cover the automated, server-side data routing that occurs when a user interacts with a modern video-on-demand service?
  • A second issue will be one of evidentiary sufficiency: The complaint’s infringement theory is conclusory and mirrors the claim language. A key question for the litigation will be whether Plaintiff can produce evidence showing that Defendant’s systems perform the specific, multi-step method of Claim 13, particularly the final step of receiving data from a first backend destination and forwarding it to a second.