DCT

1:18-cv-01820

Guyzar LLC v. Yelp Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:18-cv-01820, D. Del., 11/19/2018
  • Venue Allegations: Venue is asserted on the basis that Defendant is a Delaware corporation, is subject to personal jurisdiction in the district, and has regularly conducted business within the district.
  • Core Dispute: Plaintiff alleges that Defendant’s user sign-in system, which utilizes third-party authentication services, infringes a patent related to methods for securely conducting online transactions.
  • Technical Context: The technology at issue addresses the security of online authentication, particularly methods that allow users to access a service without directly sharing their primary credentials with that service.
  • Key Procedural History: The complaint does not reference any prior litigation, inter partes review proceedings, or licensing history related to the patent-in-suit.

Case Timeline

Date Event
1996-12-18 ’070 Patent Priority Date
1998-12-01 ’070 Patent Issue Date
2016-11-29 Earliest Date of Accused Functionality Evidenced in Complaint
2018-11-19 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

  • Patent Identification: U.S. Patent No. 5,845,070, "Security System for Internet Provider Transaction," issued December 1, 1998.

The Invention Explained

  • Problem Addressed: The patent describes the risk faced by internet users who must disclose confidential information, such as credit card details, to purchase goods or services online, exposing them to potential misappropriation and financial loss ('070 Patent, col. 1:18-27). The background notes the shortcomings of existing systems that either exposed this information or required users to manage encryption software ('070 Patent, col. 1:31-37).
  • The Patented Solution: The invention proposes a centralized authentication method managed by an internet provider. A user logs in with a "first data set" (e.g., ID and password), which is validated by a "tracking and authentication module." Upon successful validation, the system issues a temporary "second data set" (described as a "framed IP address") for use in a specific online session. This second data set is used to authorize transactions with a merchant (an "Internet Entity"), while the user's core confidential information is kept shielded within the provider's database and is not disclosed to the merchant ('070 Patent, Abstract; col. 2:1-10, 2:28-36; Fig. 3).
  • Technical Importance: The described system provided a framework for insulating a user's permanent financial credentials from individual online merchants, a significant security concern during the early commercialization of the internet ('070 Patent, col. 1:59-64).

Key Claims at a Glance

  • The complaint asserts independent Claim 1 ('070 Patent, Compl. ¶14).
  • The essential elements of Claim 1 include:
    • Accessing the internet by a user entering a "first data set" into a controller.
    • Establishing a database with confidential information authenticated by the first data set.
    • Submitting the first data set to a "tracking and authentication control module" which includes a database, an "authentication server," and a "certification server."
    • Comparing the first data set to information in the database for a "validating match."
    • Issuing a "second data set" in real time, usable for the transaction.
    • Submitting the second data set to the "certification server" to initiate a transaction.
    • Consummating the transaction based on validation of the second data set, while the confidential information remains undisclosed in the database.
  • The complaint does not explicitly reserve the right to assert other claims.

III. The Accused Instrumentality

Product Identification

  • The accused instrumentality is Yelp's "Sign In" feature, which allows users to authenticate using third-party services such as Google and Facebook (Compl. ¶14).

Functionality and Market Context

  • The complaint alleges that this feature operates using the OAuth open standard, which it describes as a "delegation protocol" (Compl. ¶14; p. 4, Fig. 1). In this system, a user grants Yelp (the "client") permission to access certain information from a third-party provider like Facebook (the "resource server") without giving Yelp their Facebook password. The process involves an "authorization server" issuing an "access token" to Yelp, which Yelp then uses to request the user's information from the resource server (Compl. p. 5, Fig. 2). The complaint asserts this functionality allows for user authentication for transactions on Yelp while keeping the user's third-party login credentials confidential from Yelp (Compl. p. 6). Figure 5 shows the Yelp login interface, providing users with options to log in via a third-party platform such as Facebook or Google (Compl. p. 8, Fig. 5).

IV. Analysis of Infringement Allegations

’070 Patent Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
accessing the Internet by the user entering a first data set into a computer based controller to control modems and communication protocols; The user enters a first data set, such as third-party log-in credentials, into a computer-based controller. ¶15 col. 21:12-16
establishing a data base containing confidential information subject to authentication with a user's first data set; The OAuth standard is used to establish a database containing confidential information (e.g., user address, email, profile) subject to authentication. ¶16 col. 21:17-19
submitting said first data set to a tracking and authentication control module... including a data base... an authentication server... and a certification server...; The OAuth standard submits the first data set to a module alleged to be a "tracking and authentication control module," identified as a dedicated "Authorization Server" and "Resource Server." ¶17 col. 21:20-29
comparing the user's first data set input to the authentication server incident to accessing the internet with the I.D. and password in the data base and subject to a validating match; The OAuth standard compares the user's input with the I.D. and password in the database for a validating match. ¶18 col. 21:30-34
issuing a second data set in real time by the authentication server... usable for the instant transaction; The OAuth protocol issues a "second data set," identified as an "Access Token and Authorization Code," after a successful validation. ¶19 col. 21:35-39
submitting the second data set to the certification server upon the initiation of a transaction by the user; The OAuth standard submits the "second data set" (Access Token) to the "certification server," which the complaint alleges is functionally the "Resource Server." ¶20 col. 21:40-42
consummating the transaction subject to validation of the second data set by tying the confidential information in the data base to the user whereby the confidential information is retained undisclosed in the data base. The transaction is consummated using third-party credentials and profile information, subject to validation of the second data set, while the user's confidential login information is kept undisclosed from Yelp. ¶21 col. 21:43-48

Identified Points of Contention

  • Scope Questions: A primary issue may be whether the claim terminology, drafted in the context of 1990s dial-up and ISP architecture (e.g., "computer based controller to control modems"), can be construed to read on the modern, distributed, application-layer OAuth protocol. Figure 4 is a protocol flow diagram from the OAuth standard illustrating the interaction between the client, resource owner, authorization server, and resource server (Compl. p. 6, Fig. 4). The mapping of this modern flow to the patent's architecture will be central.
  • Technical Questions: The complaint's infringement theory relies on mapping distinct roles in the OAuth protocol to specific claim elements. This raises the question of whether there is a functional match. For example, does an OAuth "Resource Server," whose role is to provide protected data in response to a valid access token, perform the same function as the claimed "certification server," which the patent describes as "containing validation data for authenticating an internet entity" ('070 Patent, col. 21:26-28)?

V. Key Claim Terms for Construction

  • The Term: "tracking and authentication control module"

    • Context and Importance: This term defines the core architectural component of the claimed invention. The viability of Plaintiff's infringement case depends on successfully mapping the distributed components of the OAuth system (e.g., the Authorization Server) to this single, integrated-sounding module.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The patent describes the module functionally as comprising "a certification server, an authentication server and a database" ('070 Patent, col. 2:7-9). Plaintiff may argue that any system performing these discrete functions, regardless of how they are distributed, satisfies the limitation.
      • Evidence for a Narrower Interpretation: The specification consistently discusses the module in the context of a service provided by a single internet provider via its Point of Presence (POP) ('070 Patent, col. 2:1-10; Fig. 3). This may support an interpretation that the module is a unified system under the control of one entity, not a federated system involving independent clients and authorization servers like Yelp and Facebook.
  • The Term: "second data set"

    • Context and Importance: Plaintiff equates this term with an OAuth "Access Token and Authorization Code" (Compl. ¶19). The dispute will likely focus on whether this application-layer token is equivalent to the data set contemplated by the patent.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The abstract suggests flexibility, stating the second data set "can be any form of alpha-numerical designation" ('070 Patent, Abstract). Claim 1 itself does not further limit the term's structure, which could support its application to a token.
      • Evidence for a Narrower Interpretation: Dependent claim 2 specifies that the "second data set is a framed-IP-address" ('070 Patent, col. 22:1-2). The specification also repeatedly refers to it as a "new framed IP address" issued by the POP ('070 Patent, col. 2:30). This may support a narrower construction limited to a network-layer identifier issued by an ISP, not an application-layer credential like an OAuth token.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges that Defendant "conditions end-users' use" of the sign-in feature and "establishes the manner or timing of end-users' performance," which requires them to perform the claimed steps (Compl. ¶¶23-24). These allegations appear to lay the groundwork for a claim of induced infringement by asserting that Yelp provides the means and instruction for users to carry out the allegedly infringing method.
  • Willful Infringement: The complaint alleges that Defendant "has had knowledge of infringement of the '070 Patent at least as of the service of the present complaint" (Compl. ¶27). This allegation, if proven, could only support a finding of post-filing willfulness.

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: can the claim terms of the '070 patent, which describe a centralized, ISP-based authentication architecture from the dial-up internet era, be construed to encompass the distributed, application-layer protocols of the modern web, such as OAuth? The construction of "tracking and authentication control module" and "second data set" will be decisive.
  • A key evidentiary question will be one of functional equivalence: does the accused OAuth system's "Resource Server," which primarily serves protected data, perform a function substantially similar to the patent's "certification server," which is described as authenticating the merchant ("Internet Entity") itself? The outcome may depend on whether the court finds a direct correspondence or a fundamental mismatch in technical operation and purpose between the claimed and accused components.