DCT

1:19-cv-01108

Rothschild Digital Confirmation LLC v. Epay Systems Inc

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:19-cv-01108, D. Del., 08/14/2019
  • Venue Allegations: Venue is alleged to be proper in the District of Delaware because Acumatica is a Delaware corporation that continuously transacts business in the state.
  • Core Dispute: Plaintiff alleges that Defendant’s cloud-based field service software infringes a patent related to devices that securely capture and associate an image with verified location, time, and user identity data to authenticate a user's assignment.
  • Technical Context: The technology addresses the need for creating authenticated, tamper-resistant records of field service activities by leveraging mobile device capabilities for imaging, location tracking, and data encryption.
  • Key Procedural History: The patent-in-suit, U.S. Patent No. 7,456,872, was the subject of an Inter Partes Review (IPR2015-00624), which concluded with the cancellation of several method claims. The asserted independent device claim and its dependents remained intact.

Case Timeline

Date Event
2004-11-29 '872 Patent Priority Date
2008-11-25 '872 Patent Issue Date
2018-02-08 IPR Certificate Issued for '872 Patent
2019-08-14 First Amended Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

  • Patent Identification: U.S. Patent No. 7,456,872, “Device and method for embedding and retrieving information in digital images,” issued November 25, 2008.

The Invention Explained

  • Problem Addressed: The patent background describes the process of manually cataloging photographs and associating information with them as a "time consuming and arduous affair" ('872 Patent, col. 2:42-43). It further identifies a "critical need" for a system that can securely capture information to "verify the activities of the user, or to authenticate various data points," such as time, location, and user identity ('872 Patent, col. 2:61-67).
  • The Patented Solution: The invention is a "Locational Image Verification Device" (LIVD) that integrates multiple functions to create a secure, verifiable record of an event ('872 Patent, col. 2:30-33). As detailed in the specification and illustrated in the block diagram of Figure 2, the device combines a user verification module, a capture module, a location module, and a time module to gather data concurrently with an image capture. A processing module then associates this data with the image file, and an encryption module secures the resulting record to prevent tampering ('872 Patent, col. 4:12-30, Fig. 2).
  • Technical Importance: This technology provides a method for creating authenticated proof of presence and action, which is valuable in commercial and governmental fields requiring verifiable documentation, such as insurance claim validation, field service reporting, or military operations ('872 Patent, col. 15:37-col. 16:53).

Key Claims at a Glance

  • The complaint asserts independent claim 1 ('Compl. ¶38).
  • The essential elements of independent claim 1 are:
    • A user verification module for verifying a user's identity, which enables device operation and provides an assignment to the user.
    • A capture module for capturing an image related to the assignment, where the user verification module verifies the user's identity at the time of capture.
    • A locational information module for determining the device's location at the time of capture.
    • A date and time module for determining the date and time of capture.
    • A processing module for associating the assignment, user identity, location, and time/date with the digital image file.
    • An encryption module for encrypting the digital image file and associated information upon image capture.
  • The complaint alleges infringement of "at least claim 1" without explicitly reserving the right to assert other claims (Compl. ¶38).

III. The Accused Instrumentality

Product Identification

  • Acumatica's Cloud ERP Field Service Edition ("the Accused Product") (Compl. ¶25).

Functionality and Market Context

  • The complaint describes the Accused Product as an Enterprise Resource Planning (ERP) software system that can be accessed on mobile devices like phones and tablets via a browser or dedicated mobile apps (Compl. ¶25). The software is designed for field service personnel to "capture and enter data wherever they are," including capturing images in the field and associating information with them (Compl. ¶25). The complaint alleges the product functions by having a user log in to verify their identity, which then allows them to view a work agenda, capture images related to an assignment, and have the device automatically determine and associate location, date, and time with the captured data, which is then encrypted for transmission to a server (Compl. ¶¶27-34).

IV. Analysis of Infringement Allegations

No probative visual evidence provided in complaint.

Claim Chart Summary

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
a user verification module for verifying an identity of a user of the device, wherein upon verification, the user verification module enables operation of the device and provides an assignment to the user; The mobile application checks entered login credentials to verify the user, and upon successful verification, displays a work agenda assigned to that individual. ¶28 col. 13:50-55
a capture module for capturing an image relating to the assignment and creating a digital image file, wherein the user verification module verifies the identity of the user of the device at a time of the image capture; After a successful login, the user can capture an image of the assignment, thereby creating a digital image file. ¶¶29, 30 col. 4:12-30
a locational information module for determining a location of the device when capturing the image; The mobile device uses its GPS signal to capture the real-time location of the device when an image is taken. ¶31 col. 5:52-61
a date and time module for determining a date and time of the image capture; The product associates the "job time spent" with the field data collected by the user, which includes the time of image capture. ¶32 col. 6:4-12
a processing module for associating the assignment, the user identity, location information and the time and date to the digital image file; The product collects information from the user and links the captured photos with real-time location, date, and time to complete assignments. ¶33 col. 17:1-5
an encryption module for encrypting the digital image file and associated information upon image capture. The product uses SSL technologies for encryption of the associated information and digital image file. ¶34 col. 6:31-42

Identified Points of Contention

  • Scope Questions: A primary issue may be whether the accused software application running on a general-purpose mobile device constitutes the claimed "locational image verification device." The defense may argue the patent requires a specific, integrated hardware apparatus, not just software.
  • Technical Questions: The complaint alleges that a standard user login that then "is displaying work agenda" satisfies the limitation that the "user verification module... provides an assignment to the user." A question arises as to whether this constitutes the verification module itself "providing" the assignment, as claimed, or merely granting access to a pre-existing list.
  • Technical Questions: Another question is whether the use of SSL for encrypting data during transmission meets the claim requirement of an "encryption module for encrypting the... file and associated information upon image capture." The timing and location of the encryption (e.g., at the moment of local storage vs. during later transmission) could be a point of dispute.

V. Key Claim Terms for Construction

The Term: "locational image verification device"

  • Context and Importance: This term defines the entire claimed apparatus. Its construction is critical to determining whether the patent's scope is limited to specialized hardware or can read on software applications installed on general-purpose devices like smartphones and tablets.
  • Intrinsic Evidence for a Broader Interpretation: The patent describes the invention's components as "modules" in a block diagram (Fig. 2) and states that the "method steps depicted in the accompanying figures may be implemented in software" ('872 Patent, col. 4:4-7), which could support an argument that a software-based system falls within the claim scope.
  • Intrinsic Evidence for a Narrower Interpretation: The specification repeatedly refers to a "hardware device" ('872 Patent, col. 2:30-33), provides illustrations of physical devices resembling a camera (Fig. 1A) and a mobile phone (Fig. 3A), and introduces the invention as a "hardware device or devices to be known as a Locational Image Verification Device, (LIVD)" ('872 Patent, col. 2:30-33). This language may support a narrower construction limited to an integrated physical apparatus.

The Term: "provides an assignment to the user"

  • Context and Importance: This phrase describes a key function of the "user verification module". The infringement theory depends on whether displaying a "work agenda" after login meets this limitation. Practitioners may focus on this term because it links the act of verification to the delivery of the task to be performed.
  • Intrinsic Evidence for a Broader Interpretation: The patent's flowchart in Figure 8 shows a step of "RECEIVING ASSIGNMENT INFORMATION" (step 704) after user verification (step 702), which could be interpreted broadly to include accessing an existing list of tasks after a successful login.
  • Intrinsic Evidence for a Narrower Interpretation: The claim ties the act of "providing" directly to the "user verification module". The patent's examples describe an employer downloading a "logical route" of residences for a user to visit ('872 Patent, col. 15:42-45), suggesting the assignment is a specific set of instructions actively delivered to or configured in the device for a particular job, rather than a user simply accessing a general work list.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges inducement of infringement, stating that Acumatica instructs its customers, through its website and other materials, to use the Accused Product in an infringing manner (Compl. ¶¶25, 38). It further alleges that Acumatica knew or should have known its actions would induce direct infringement by others and specifically intended that result (Compl. ¶38).
  • Willful Infringement: The complaint makes a claim for post-suit willfulness, alleging that any infringement occurring after Acumatica was served with the complaint is "intentional and knowing" (Compl. p. 11, ¶5). No specific facts are alleged to support pre-suit knowledge or willfulness.

VII. Analyst’s Conclusion: Key Questions for the Case

  • A central issue will be one of claim scope: can the term "locational image verification device," which is described in the patent's specification with reference to specific hardware embodiments, be construed to cover the accused functionality when provided by a software application running on a general-purpose mobile device?
  • A key evidentiary question will be one of functional correspondence: does the accused product's standard user login followed by the display of a "work agenda" perform the specific, integrated function of the claimed "user verification module" that "provides an assignment to the user", or does this represent a material operational difference from what the patent claims?
  • The infringement analysis may also turn on the technical specifics of encryption: does the accused product's alleged use of SSL for securing data during transmission satisfy the claim requirement of encrypting the image file and associated data "upon image capture," or does the claim necessitate that encryption occur locally on the device at or immediately after the moment of capture?