DCT
1:20-cv-01316
Kwality IP LLC v. ShopKeep Inc
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Kwality IP LLC (Texas)
- Defendant: ShopKeep, Inc. (Delaware)
- Plaintiff’s Counsel: Chong Law Firm PA; Sand, Sebolt & Wernow Co., LPA
- Case Identification: 1:20-cv-01316, D. Del., 09/29/2020
- Venue Allegations: Plaintiff alleges venue is proper in the District of Delaware because Defendant is a Delaware corporation.
- Core Dispute: Plaintiff alleges that Defendant’s ShopKeep Point of Sale (POS) system infringes a patent related to methods for securely delegating portions of a transaction to a mobile device.
- Technical Context: The technology addresses the challenge of conducting secure financial transactions that involve both a secure, feature-rich computing device and a less-secure or less-capable mobile device.
- Key Procedural History: The asserted patent, U.S. Patent No. 8,719,165, was the subject of a subsequent Inter Partes Review (IPR) proceeding (IPR2021-00658) initiated after the filing of this complaint. The U.S. Patent and Trademark Office issued a certificate on December 20, 2022, confirming the cancellation of claims 1-8 and 15-18, which includes the only claim asserted in this litigation (Claim 1). This post-filing event fundamentally impacts the viability of the infringement action.
Case Timeline
| Date | Event |
|---|---|
| 2009-07-13 | ’165 Patent Priority Date |
| 2014-05-06 | ’165 Patent Issue Date |
| 2020-09-29 | Complaint Filing Date |
| 2021-03-12 | IPR Petition Filed for ’165 Patent |
| 2022-12-20 | IPR Certificate Issued Cancelling Asserted Claim 1 |
II. Technology and Patent(s)-in-Suit Analysis
- Patent Identification: U.S. Patent No. 8,719,165, “DELEGATED TRANSACTIONS OVER MOBILE,” issued May 6, 2014.
The Invention Explained
- Problem Addressed: The patent identifies a "computing gap" between fully-featured, secure computers (like desktops) and mobile devices which, at the time, were often less powerful and less secure, making them less suitable for completing complex electronic transactions (Compl. ¶14-15; ’165 Patent, col. 2:10-14).
- The Patented Solution: The invention proposes a method to bridge this gap by splitting a transaction. A "customer secure computing device" handles sensitive data and initiates the transaction, but "delegates" a specific operation to a "delegate mobile device." After the mobile device completes its task (e.g., confirming receipt of goods), it sends a communication back to the secure device, which then automatically completes the payment. This allows the convenience of a mobile device to be incorporated into a transaction flow without requiring the mobile device itself to handle the entire secure process (’165 Patent, Abstract; col. 2:35-47). Figure 1 of the patent illustrates this architecture, separating the roles of the customer's secure device, the delegate mobile device, and the merchant's systems.
- Technical Importance: This approach sought to enable secure, high-value transactions to leverage the growing ubiquity of mobile devices for specific tasks like in-person verification or interaction, without exposing the entire transaction to the potential vulnerabilities of the mobile device (’165 Patent, col. 2:31-35).
Key Claims at a Glance
- The complaint asserts independent Claim 1 (’165 Patent, Compl. ¶26).
- The essential elements of Claim 1 include:
- A method performed by a "customer secure computing device".
- Acquiring "customer delegate mobile device identification information" and "secure transaction data".
- This acquisition includes receiving secure transaction data (with a merchant ID) and receiving mobile device identification information for an authorized device.
- Storing this combined information.
- Subsequent to acquisition, "automatically completing the secure transaction" in response to receiving a communication from the authorized delegate mobile device.
- This completion step includes receiving the communication, "checking... a status identifier" in that communication, and "automatically initiating... payment" when the status identifier indicates the delegated transaction is complete.
- The complaint’s infringement allegations focus exclusively on Claim 1.
III. The Accused Instrumentality
Product Identification
- The "ShopKeep Point of Sale (POS)" system (the "Accused Product") (Compl. ¶27).
Functionality and Market Context
- The complaint alleges the Accused Product enables secure transactions using a system that includes what it maps to a "customer secure computing device (e.g., POS device)" and a "delegate mobile device (e.g., iPads/android tablet... connected to the POS device via Bluetooth)" (Compl. ¶28). The system allegedly acquires transaction data (e.g., credit card number) and mobile device identification (e.g., Bluetooth address) (Compl. ¶29). It then completes the transaction after receiving an "authentication for the delegated transaction via customer's signature" from the mobile device (Compl. ¶33, 35). The complaint alleges the system is used "at least in internal testing and usage" (Compl. ¶28).
IV. Analysis of Infringement Allegations
No probative visual evidence provided in complaint.
Claim Chart Summary
The complaint references an exemplary claim chart in "Exhibit B," but the exhibit is not attached to the provided document. The narrative infringement theory from the complaint body is summarized below.
’165 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| A method for completing, by a customer secure computing device, a secure transaction... wherein the customer is associated with the customer secure computing device and a delegate mobile device | The Accused Product (ShopKeep POS) practices a method for completing a secure transaction using a POS device (as the "customer secure computing device") and a connected tablet/iPad (as the "delegate mobile device"). | ¶28 | col. 2:40-44 |
| acquiring customer delegate mobile device identification information and secure transaction data... | The system acquires information such as the Bluetooth address of a smartphone and credit card data. | ¶29 | col. 4:10-25 |
| receiving, by the customer secure computing device, secure transaction data associated with a delegated transaction, the secure transaction data comprising a merchant identification... | The POS device/credit card reader receives transaction data (credit card number, expiry, CVV) and merchant device details (e.g., device address) that identify the merchant. | ¶30 | col. 4:1-10 |
| receiving, by the customer secure computing device, customer delegate mobile device identification information associated with a customer delegate mobile device authorized by the customer... | The POS device/credit card reader receives the Bluetooth address of a smartphone that has been authorized by the customer (e.g., by pairing). | ¶31 | col. 4:43-49 |
| storing, by the customer secure computing device, the secure transaction data and customer delegate mobile device identification information | The POS device/credit card reader stores the credit card number and the smartphone's Bluetooth address in its memory. | ¶32 | col. 4:19-20 |
| automatically completing the secure transaction... in response to receiving a communication from the identified previously authorized customer delegate mobile device | The POS device automatically completes the transaction after receiving an authentication (e.g., customer's signature) from the smartphone/tablet. | ¶33 | col. 6:3-10 |
| checking, by the customer secure computing device, a status identifier in the communication from the identified previously authorized customer delegate mobile device | The system checks the communication, which the complaint identifies as "authentication for the delegated transaction via customer's signature," treating it as a status identifier. | ¶35 | col. 5:58-67 |
| automatically initiating... payment... when the status identifier indicates that the delegated transaction is complete. | When the authentication/signature is received, the system automatically initiates payment to the merchant, which the complaint alleges occurs when the status indicates completion. | ¶36 | col. 6:7-10 |
Identified Points of Contention
- Scope Questions: A primary question relates to the roles of the devices. The complaint alleges the merchant's POS terminal is the "customer secure computing device", while the patent's examples describe this device as being personal to the customer (e.g., a home PC). This raises the question: Does the patent’s architectural model, which distinguishes between a customer's device and a merchant's device, read on a system where the merchant's terminal is alleged to be the "customer's" secure device?
- Technical Questions: The complaint alleges that a "customer's signature" serves as the claimed "status identifier". The patent describes the "status identifier" as indicating whether a transaction is "complete" or "incomplete." This raises an evidentiary question: What proof demonstrates that a signature for authentication performs the specific function of being a "status identifier" that indicates the completion state of the delegated task, as required by the claim?
V. Key Claim Terms for Construction
The Term: "customer secure computing device"
- Context and Importance: The construction of this term is central, as the Plaintiff's infringement theory depends on casting the merchant's POS terminal in the role of the "customer secure computing device". Practitioners may focus on this term because the patent's specification appears to draw a clear distinction between the customer's and merchant's hardware.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim term itself is not explicitly defined with a limitation on ownership or location. A party could argue it refers to any secure device used by a customer to effectuate their side of a transaction, even if that device is owned by a merchant.
- Evidence for a Narrower Interpretation: The specification's primary example describes "a secure personal computer (PC) in the customer's home or office" (’165 Patent, col. 2:42-43). Further, Figure 1 depicts "Customer Secure Computing Device 103" as distinct from "Merchant Secure Computing Device 108," with each associated with "Customer 150" and "Merchant 152" respectively, suggesting the device is on the customer's side of the system architecture, not the merchant's.
The Term: "status identifier"
- Context and Importance: Plaintiff’s theory equates this term with a "customer's signature" used for authentication. The viability of the infringement claim may depend on whether a signature can be considered a "status identifier" within the meaning of the patent.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent does not restrict the format of the identifier, stating only that it is "in the communication" and is "checked." One could argue that any data from the mobile device that allows the secure device to proceed with payment functions as a status identifier.
- Evidence for a Narrower Interpretation: The specification gives specific examples of the identifier's function, such as a flag indicating the transaction was "
complete... orincomplete" (’165 Patent, col. 5:58-63). This language may support a narrower construction requiring a specific state-based indicator, as opposed to a piece of biometric or authentication data like a signature.
VI. Other Allegations
Indirect Infringement
- The complaint includes a conclusory allegation of induced and contributory infringement, stating Defendant encouraged acts that constitute infringement (Compl. ¶42). The complaint does not, however, plead specific facts to support the requisite knowledge and intent, such as referencing specific user manuals, marketing materials, or instructions that direct users to perform the claimed steps.
Willful Infringement
- The complaint alleges Defendant had knowledge of the ’165 Patent "at least as of the service of the present Complaint" (Compl. ¶40). This allegation, if proven, would only support a claim for post-suit willful infringement, as it does not assert pre-suit knowledge of the patent or infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
- Case Viability Post-IPR: The most dispositive issue arises from procedural history outside the complaint. Given that the sole asserted claim (Claim 1) was cancelled during an Inter Partes Review, the central question is whether the plaintiff's cause of action remains viable.
- Architectural Scope: A core claim construction issue will be one of definitional scope: can the term "customer secure computing device", described in the patent's specification as a customer's personal computer, be construed to cover a merchant-owned and operated Point of Sale terminal as alleged by the plaintiff?
- Functional Equivalence: A key evidentiary question will be whether the accused product's use of a "customer's signature" for authentication is functionally equivalent to the claimed step of "checking... a status identifier" that "indicates that the delegated transaction is complete," or if this represents a fundamental mismatch in technical operation.
Analysis metadata