DCT

1:19-cv-02175

Pivital IP LLC v. ACT On Software Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:19-cv-02175, D. Del., 11/21/2019
  • Venue Allegations: Venue is alleged to be proper in the District of Delaware because Defendant is a Delaware corporation.
  • Core Dispute: Plaintiff alleges that Defendant’s email marketing platform infringes a patent related to embedding recipient-specific, encrypted comments within a general electronic message.
  • Technical Context: The technology relates to marketing automation platforms, which enable businesses to send personalized and segmented email campaigns to large audiences.
  • Key Procedural History: The complaint notes that during the patent’s prosecution, the applicant distinguished the invention from prior art by arguing that the claims uniquely require transmitting an "icon or instruction" with an encrypted comment and then determining if a user selected it to trigger decryption.

Case Timeline

Date Event
1999-03-31 Priority Date, U.S. Patent No. 6,636,965
2003-10-21 Issue Date, U.S. Patent No. 6,636,965
2016-03-22 Earliest Alleged Infringement Date (via archived webpage)
2019-11-21 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 6,636,965 - "Embedding Recipient Specific Comments in Electronic Messages Using Encryption"

  • Patent Identification: U.S. Patent No. 6,636,965, "Embedding Recipient Specific Comments in Electronic Messages Using Encryption", issued October 21, 2003.

The Invention Explained

  • Problem Addressed: The patent addresses the inefficiency of sending customized messages to subsets of recipients within a larger group. Conventional methods required sending multiple separate messages, which was inconvenient for the sender and consumed unnecessary network bandwidth (’965 Patent, col. 1:15-42).
  • The Patented Solution: The invention proposes a method and system for creating a single electronic message that contains both a "common message portion" for all recipients and a separate, selectively-accessible "comment" for a subset of those recipients. The comment is encrypted, and authorized recipients are provided with a means (such as an icon or prompt) to access and decrypt it, while unauthorized recipients cannot ('965 Patent, Abstract; col. 1:51-67). This allows a sender to create the appearance of a single, universally distributed message while privately communicating additional information to specific individuals.
  • Technical Importance: This approach aimed to streamline mass-communication workflows by consolidating a base message and targeted addendums into a single transmission, saving sender effort and network resources ('965 Patent, col. 1:43-47).

Key Claims at a Glance

  • The complaint asserts independent claims 1 (a method) and 11 (a system) (Compl. ¶¶ 16, 24).
  • Independent Claim 1 (Method): The essential elements are:
    • creating an electronic message with a common message portion for a number of recipients;
    • creating a comment for the message, receivable only by a selected subset of recipients;
    • determining the recipient lists (the total number and the selected subset);
    • delivering the message by encrypting the comment and transmitting it; and
    • determining if a particular recipient is allowed to decode the comment by transmitting an "icon or instruction" and then determining if the recipient selected it and is on the authorized list.
  • Independent Claim 11 (System): The essential elements are:
    • a plurality of user stations for sending/receiving messages;
    • a message processor coupled to the stations, programmed to:
      • transmit the common message portion to all recipients;
      • transmit an encrypted comment along with an "icon or instruction" to a selected subset; and
      • determine if a recipient has selected the icon/instruction and, if so, decode the comment for that recipient.
  • The complaint does not explicitly reserve the right to assert dependent claims.

III. The Accused Instrumentality

Product Identification

  • The "Act-On email marketing platform" ("Accused Instrumentality") (Compl. ¶16).

Functionality and Market Context

  • The Accused Instrumentality is a marketing automation platform that allows users to create and send email campaigns (Compl. ¶17). A key feature is "Dynamic Content," which enables a user to define a base or default email message and then insert conditional content blocks that are only displayed to recipients who meet specific criteria (e.g., belonging to a certain customer segment like "VIP") (Compl. ¶¶18-19). This allows for the creation of a single email template that automatically personalizes its content for different recipients based on data known about them (Compl. ¶¶ 7-8). The complaint provides a screenshot of the user interface for creating dynamic content, where a user drags a "Dynamic Content" block into a message composer. (Compl. p. 6). Another screenshot shows how this dynamic content can be conditioned on recipient data, such as "If [customerType is "VIP"]". (Compl. p. 7).

IV. Analysis of Infringement Allegations

’965 Patent Infringement Allegations (Claim 1 - Method)

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
creating an electronic message with a common message portion that is to be delivered to a number of recipients Creating a marketing email with a base or default portion intended for a list of customers. This is illustrated by a screenshot showing a "Default message" area in the email composer (Compl. p. 6). ¶18 col. 5:11-13
creating a comment to said common message portion in said electronic message, wherein said comment can be received only by a selected subset of said number of recipients Creating "dynamic content," such as a special offer or coupon, that can be added to the base email but is configured to be sent only to a specific subset of the recipient list. ¶19 col. 5:13-17
determining said number of recipients and said selected subset by creating a first address list that specifies said number of recipients and creating a second address list that specifies said selected subset The platform's use of a main customer list (the first address list) and the creation of a segmented list (the second address list) of customers who will receive the dynamic content. A visual of the segmentation tool is provided to show how lists are created based on attributes and behaviors (Compl. p. 8). ¶20 col. 5:18-21
delivering said common message portion and said comment to said number of recipients by: encrypting said comment The platform allegedly encrypts the dynamic content, such as a discount code or a hyperlink, into a "clickable button" within the email. A screenshot of the "Insert Act-On Bullet-Proof Button" tool is referenced to support this allegation (Compl. p. 14). ¶21 col. 5:24
transmitting said common message portion and said encrypted comment to said number of recipients Transmitting the marketing email, which contains the base portion and the "encrypted" dynamic content (the clickable button), to the full recipient list. ¶22 col. 5:25-27
determining whether a particular recipient is allowed to decode said encrypted comment by transmitting an icon or instruction... and determining if said particular recipient has selected the icon or performed the instruction and if so, determining if said particular recipient is on said second address list... to review said comment The platform transmits a "clickable link" (the icon or instruction) and determines if a user clicked it. If the user clicks the link, the platform determines if that user is on the authorized list for the dynamic content (e.g., the discount or offer), thereby allowing them to access it. ¶23 col. 5:28-35

’965 Patent Infringement Allegations (Claim 11 - System)

Claim Element (from Independent Claim 11) Alleged Infringing Functionality Complaint Citation Patent Citation
a plurality of user stations at which a user enters and receives electronic messages... The computers used by the merchant to create campaigns on the Act-On platform and the computers used by customers to receive the marketing emails. ¶25 col. 6:38-40
a message processor coupled to the plurality of user stations, the message processor being programmed to: transmit said common message portion without said comment to said recipients and transmit an encrypted comment along with an icon or instruction to said selected subset of recipients The Act-On platform's servers (the message processor) are programmed to send the base email to recipients not on the dynamic content list, and to send the email containing an "encrypted" comment (e.g., a clickable button with a discount offer) and an "icon or instruction" (the button itself) to the targeted subset of recipients. ¶26 col. 6:41-50
and determine whether a particular recipient has selected the icon or performed the instruction and if so to decode the encrypted comment for review by the particular recipient. The Act-On platform determines when a user clicks on the button/link tied to the dynamic content. It then allegedly "decodes" the comment by, for example, displaying a webpage with the special offer or automatically applying a discount code for that specific user, thereby allowing the recipient to review the previously inaccessible content. ¶27 col. 6:50-54

Identified Points of Contention

  • Scope Questions: A central dispute may arise over the meaning of "encrypting" and "encrypted comment." The complaint's theory appears to equate embedding a hyperlink into a button or delivering conditional content with "encryption" (Compl. ¶21). The defense may argue that "encryption" in the context of the patent requires a cryptographic process, not merely conditional access logic.
  • Technical Questions: What evidence does the complaint provide that the Act-On platform's standard conditional content feature performs the specific function of "decoding" an "encrypted" comment, as opposed to simply directing a user to a pre-existing URL? The analysis will question whether the platform’s click-tracking and segmentation logic is functionally the same as the patent's described process of decrypting a comment after verifying a recipient's identity or authorization.

V. Key Claim Terms for Construction

The Term: "encrypting said comment" / "encrypted comment"

  • Context and Importance: This term is the lynchpin of the infringement case. Whether the accused "dynamic content" feature can be considered to "encrypt" a comment will likely determine the outcome. Practitioners may focus on this term because the complaint's theory (that embedding a hyperlink in a button is encryption) appears to be a non-standard interpretation that will be heavily contested.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The patent's goal is to make a comment accessible only to "intended recipient(s)" ('965 Patent, col. 1:56-58). A party could argue that any technical means of preventing access to non-selected recipients, including server-side conditional logic, achieves this goal and thus falls within the spirit of "encryption" as used in the patent.
    • Evidence for a Narrower Interpretation: The patent repeatedly uses the terms "encrypt," "decrypt," and "decryption" in contexts that suggest a cryptographic process, such as prompting a recipient for a "password or other security code" before the system "enables the decryption of the comment" ('965 Patent, col. 4:20-30; Fig. 4). The abstract contrasts including decrypted comments for some with simply sending the common portion to others, implying a transformation of the comment's data itself.

The Term: "icon or instruction"

  • Context and Importance: The complaint alleges that a "clickable link" or "clickable button" is the claimed "icon or instruction" (Compl. ¶¶ 23, 26). The definition of this term is critical because it is the mechanism that a recipient must select to trigger the determination and decoding steps.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The patent provides examples like a "visual icon" in an e-mail system or a "voice prompt" in a voice mail system, suggesting the term is meant to cover various user interface elements that prompt an action ('965 Patent, col. 4:15-18). A hyperlink or button could be argued to be a modern form of a "visual icon" that serves as an "instruction" to the system when clicked.
    • Evidence for a Narrower Interpretation: The defense may argue that the term implies a special element indicating the presence of a hidden comment, distinct from a standard hyperlink which simply directs to a web address. The patent describes the icon as "accompanying the message" and "indicating that there is a comment attached" ('965 Patent, col. 4:11-13), which could be interpreted as requiring more than just a hyperlink that is itself the content.

VI. Other Allegations

  • Indirect Infringement: The complaint does not plead separate counts for indirect infringement. The allegations focus on Defendant's direct infringement by performing the method of claim 1 and making/selling the system of claim 11.
  • Willful Infringement: Willful infringement is not alleged in the complaint. The pleading only references "constructive notice" of the patent (Compl. ¶29).

VII. Analyst’s Conclusion: Key Questions for the Case

This dispute appears to center on claim interpretation and the application of pre-smartphone era patent language to modern cloud-based marketing software. The key questions for the court will likely be:

  1. A core issue will be one of definitional scope: Can the term "encrypted comment", which in the patent is associated with passwords and decryption, be construed to cover conditional content (like a hyperlink) that is delivered or withheld by server-side logic without cryptographic transformation?
  2. A related question of scope is whether a standard HTML hyperlink or button in an email constitutes an "icon or instruction" for the purpose of indicating an attached, secret comment, as described in the patent.
  3. An ultimate evidentiary question will be one of functional operation: Assuming the claim terms are construed broadly enough, does the accused Act-On platform’s process of tracking a click on a dynamic link and serving a corresponding webpage perform the same function, in substantially the same way, as the patent’s claimed method of "decoding" a comment for an authorized recipient?