DCT

1:19-cv-01474

Rothschild Digital Confirmation LLC v. Appsheet Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:19-cv-01474, D. Del., 08/06/2019
  • Venue Allegations: Venue is alleged to be proper in the District of Delaware because Defendant is a Delaware corporation with a registered agent in the district and continuously transacts business there.
  • Core Dispute: Plaintiff alleges that Defendant’s no-code application development platform infringes a patent related to a device that verifies a user's assignment by capturing a digital image and securely associating it with location, time, and user identity data.
  • Technical Context: The technology addresses the need for creating verifiable, time-stamped, and geo-tagged digital records, a function with significant applications in field service, logistics, compliance, and auditing.
  • Key Procedural History: The asserted patent, U.S. Patent No. 7,456,872, was the subject of an Inter Partes Review (Mitek Systems, Inc. v. Rothschild Mobile Imaging Innovations, LLC, IPR2015-00624), which resulted in the cancellation of method claims 27, 28, 38, and 39. The current complaint asserts device claim 1, which was not cancelled in the IPR proceeding.

Case Timeline

Date Event
2004-11-29 U.S. Patent No. 7,456,872 Priority Date
2008-11-25 U.S. Patent No. 7,456,872 Issue Date
2018-02-08 Inter Partes Review Certificate Issued, Cancelling Claims
2019-08-06 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 7,456,872 - "Device and method for embedding and retrieving information in digital images," issued November 25, 2008

The Invention Explained

  • Problem Addressed: The patent's background describes the difficulty of organizing digital images and associating them with verifiable information, noting that conventional digital cameras create generic file names that make images hard to retrieve and authenticate later ('872 Patent, col. 1:48-58). It identifies a "critical need" for a system to securely capture images with time, location, and user identification to "verify the activities of the user, or to authenticate various data points" ('872 Patent, col. 1:62-67).
  • The Patented Solution: The invention is a "locational image verification device" (LIVD) that integrates several functional modules into a single device ('872 Patent, Fig. 2). It combines a capture module for taking a picture, a user verification module to confirm the operator's identity, a locational information module (e.g., GPS) to get coordinates, and a date/time module. A processing module then associates all of this metadata with the image file, and an encryption module secures the combined data to prevent tampering ('872 Patent, Abstract; col. 13:46-14:14). This creates a secure, auditable record of an event.
  • Technical Importance: The technology provides a method for creating a tamper-resistant digital record that binds a photographic image to its context (who, what, where, when), which is valuable for any application requiring proof of presence or action. ('872 Patent, col. 2:30-41).

Key Claims at a Glance

  • The complaint asserts independent claim 1.
  • The essential elements of independent claim 1 are:
    • A locational image verification device for verifying an assignment of a user comprising:
    • a user verification module for verifying an identity of a user of the device, wherein upon verification, the user verification module enables operation of the device and provides an assignment to the user;
    • a capture module for capturing an image relating to the assignment and creating a digital image file, wherein the user verification module verifies the identity of the user of the device at a time of the image capture;
    • a locational information module for determining a location of the device when capturing the image;
    • a date and time module for determining a date and time of the image capture;
    • a processing module for associating the assignment, the user identity, location information and the time and date to the digital image file; and
    • an encryption module for encrypting the digital image file and associated information upon image capture.
  • The complaint does not explicitly reserve the right to assert dependent claims.

III. The Accused Instrumentality

Product Identification

  • The complaint identifies "Appsheet's The Appsheet Platform product" as the Accused Product (Compl. ¶25).

Functionality and Market Context

  • The Accused Product is a platform that allows users to create custom mobile applications without writing code (Compl. ¶30, p.8). These applications are used for tasks like field service, where technicians track jobs, record notes, and capture information (Compl. ¶26).
  • The complaint alleges that apps built on the platform include functions for user sign-in, capturing images, tracking the device's GPS location, and creating "reliable, time-stamped record[s] of who did what when" (Compl. ¶¶ 28, 30, p.6). A screenshot in the complaint shows a sample field service app with fields for job details, date, location, and notes, alongside an image capture button (Compl. p.6). The complaint alleges these features are used to create auditable records for businesses and their customers (Compl. ¶26, p.6).

IV. Analysis of Infringement Allegations

7,456,872 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
a user verification module for verifying an identity of a user of the device, wherein upon verification, the user verification module enables operation of the device and provides an assignment to the user The Accused Product requires user sign-in to access the app, which verifies the user's identity via login credentials and enables the user to access job assignments. ¶28 col. 13:50-54
a capture module for capturing an image relating to the assignment and creating a digital image file, wherein the user verification module verifies the identity of the user of the device at a time of the image capture The mobile device camera, enabled by the Accused Product, captures an image of the assignment; user identity is verified upon successful login, which precedes the ability to capture an image. ¶29 col. 5:27-31
a locational information module for determining a location of the device when capturing the image The Accused Product uses the mobile device's GPS signal to capture the real-time location of the device when an image is captured. ¶30 col. 5:52-61
a date and time module for determining a date and time of the image capture The Accused Product associates the job time with field data, providing a "reliable, time-stamped record." A screenshot shows a "Service Date" field. ¶31; p.6 col. 6:4-9
a processing module for associating the assignment, the user identity, location information and the time and date to the digital image file The mobile device's processor, running the Accused Product, collects and links field information, captured photos, location, and time to complete assignments. ¶32 col. 4:51-56
an encryption module for encrypting the digital image file and associated information upon image capture The Accused Product includes an "encryption module for storing and protecting the collected field information data in the database" and uses HTTPS for secure communications. ¶¶33, 40 col. 6:31-39

Identified Points of Contention

  • Scope Questions: The complaint alleges infringement by a mobile device running software created by the Appsheet platform (Compl. ¶26). This raises the question of whether a general-purpose smartphone loaded with third-party software constitutes the claimed special-purpose "locational image verification device." The defense may argue a mismatch between a claimed integrated "device" and a system comprising a general-purpose phone and a software application.
  • Technical Questions: A key technical question is whether the alleged functions occur at the specific times required by the claim. For example, the claim requires the user verification module to verify identity "at a time of the image capture." The complaint alleges this is met by a user logging into an app session (Compl. ¶28). A court may need to determine if a one-time session login is equivalent to verification "at the time of" each discrete image capture. Similarly, the claim requires encryption "upon image capture," whereas the complaint points to encryption for storage and HTTPS for communication (Compl. ¶¶ 33, 40), which may occur at a different time than the moment of capture.

V. Key Claim Terms for Construction

The Term: "user verification module ... verifies the identity of the user of the device at a time of the image capture"

  • Context and Importance: This limitation's timing element is critical. The complaint alleges that a standard user login to start an application session satisfies this element (Compl. ¶28). The defense may argue that "at a time of" requires verification concurrent with, or immediately preceding, each image capture, not a one-time login for a session. The construction of this temporal phrase will be central to the infringement analysis.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification describes a process where a user first initializes the device by registering their identity, and then later uses the device for assignments ( '872 Patent, col. 13:50-54). This could suggest that the initial verification to start a session is what was contemplated.
    • Evidence for a Narrower Interpretation: The patent repeatedly emphasizes security and authentication to "verify the activities of the user" ('872 Patent, col. 1:66-67). The abstract states the module is for "verifying an identity of a user of the device at a time of image capture," and the claim language mirrors this. This could support an interpretation that a re-verification is required for each capture to ensure the authorized user is still operating the device.

The Term: "encryption module for encrypting the digital image file and associated information upon image capture"

  • Context and Importance: Practitioners may focus on this term because the nature and timing of the "encryption" are specific. The complaint points to encryption for database storage and HTTPS for secure communications (Compl. ¶¶ 33, 40). The defense may argue this does not meet the "upon image capture" limitation, which could imply immediate encryption of the file on the device itself, rather than encryption for transmission or later storage.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The patent's goal is to create a secure record that has "not been tampered with" ('872 Patent, col. 2:36-37). An interpretation where encryption occurs at any point before the data is exposed to potential tampering (e.g., before network transmission) could be argued to serve this purpose.
    • Evidence for a Narrower Interpretation: Claim 1 specifies encryption "upon image capture." Furthermore, the specification states that information captured would be "immediately encrypted by the encryption module 140" ('872 Patent, col. 14:55-56). This language suggests an action that happens as a direct and immediate consequence of the capture event itself, potentially on the local device.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges that Appsheet induces infringement by instructing its customers to install and use the Accused Product on mobile devices in a manner that directly infringes claim 1 (Compl. ¶¶ 25, 52). The complaint alleges Appsheet "knew or should have known" its actions would induce infringement by others (Compl. ¶52).
  • Willful Infringement: Willfulness is alleged based on knowledge that "will be" acquired upon service of the complaint, making subsequent infringement "knowing and intentional" (Compl. ¶44; Request for Relief ¶5).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of structural interpretation: can the claim limitations for discrete "modules" in a "device" be met by the software functionalities of an application running on a general-purpose smartphone, or is there a fundamental structural difference between the claimed invention and the accused system?
  • A key evidentiary question will be one of temporal correlation: does the accused product perform the claimed functions of user verification and encryption "at a time of" and "upon" image capture as required by the claim? The case may turn on whether a one-time session login and encryption-in-transit/storage satisfy these specific timing requirements.
  • The case will also present a question of infringement liability: since the primary infringement appears to be performed by Defendant’s customers using their own mobile devices, Plaintiff's ability to hold Appsheet liable will depend heavily on proving the elements of induced infringement, particularly Appsheet's specific intent to cause its customers to perform the claimed steps.