1:23-cv-00050
DataCloud Tech LLC v. 8x8 Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: DataCloud Technologies, LLC (Georgia)
- Defendant: 8x8, Inc. (Delaware)
- Plaintiff’s Counsel: Stamoulis & Weinblatt, LLC; Rozier Hardt McDonough PLLC
- Case Identification: 1:23-cv-00050, D. Del., 01/13/2023
- Venue Allegations: Venue is asserted on the basis that Defendant 8x8, Inc. is incorporated in the State of Delaware and therefore resides in the District.
- Core Dispute: Plaintiff alleges that Defendant’s unified communications products, services, and underlying website infrastructure infringe four patents related to data organization, remote file access, and anonymous network communication.
- Technical Context: The patents address methods for managing digital information, controlling remote access to data, and anonymizing a user's identity during network communications, technologies fundamental to modern cloud-based communication and data hosting platforms.
- Key Procedural History: U.S. Patent No. 8,762,498, one of the four patents-in-suit, was the subject of an ex parte reexamination proceeding that concluded after the complaint was filed. The resulting Reexamination Certificate, issued July 12, 2024, cancelled all claims of the patent, including the single claim asserted in this litigation. U.S. Patent No. 7,398,298 is a continuation of an earlier application that issued as a patent. U.S. Patent No. 6,651,063 was subject to a Certificate of Correction.
Case Timeline
| Date | Event |
|---|---|
| 1996-10-24 | Defendant 8x8, Inc. incorporation date |
| 2000-01-28 | U.S. Patent No. 6,651,063 Priority Date |
| 2000-04-04 | U.S. Patent No. 7,209,959 Priority Date |
| 2000-04-04 | U.S. Patent No. 8,762,498 Priority Date |
| 2002-03-29 | U.S. Patent No. 7,398,298 Priority Date |
| 2003-11-18 | U.S. Patent No. 6,651,063 Issue Date |
| 2004-02-03 | U.S. Patent No. 6,651,063 Certificate of Correction Issued |
| 2007-04-24 | U.S. Patent No. 7,209,959 Issue Date |
| 2008-07-08 | U.S. Patent No. 7,398,298 Issue Date |
| 2014-06-24 | U.S. Patent No. 8,762,498 Issue Date |
| 2023-01-13 | Complaint Filing Date |
| 2024-07-12 | U.S. Patent No. 8,762,498 Reexamination Certificate Issued |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,651,063 - "Data Organization And Management System And Method"
- Patent Identification: U.S. Patent No. 6,651,063, "Data Organization And Management System And Method," issued November 18, 2003.
The Invention Explained
- Problem Addressed: The patent describes the difficulty for consumers and businesses to collect and organize vast amounts of information (e.g., product manuals, warranties, service guides) which are often received in non-digital, decentralized formats, making later retrieval difficult (’063 Patent, col. 1:14-44).
- The Patented Solution: The invention proposes a system where a provider of information sends an "information pack" to a recipient's "User Data Repository." This pack is pre-tagged with a generic category identifier, which automatically files the information in the correct location within the repository, removing the organizational burden from the user (’063 Patent, Abstract; col. 2:36-44). The user can then create "custom categories" and instruct the system to automatically place future information from that provider into the custom location, with this preference being communicated back to a central processing station or the provider (’063 Patent, col. 4:5-12, 45-58).
- Technical Importance: The system aimed to shift the burden of initial data categorization from the end-user to the information provider, streamlining the management of digital records associated with products and services (’063 Patent, col. 2:5-10).
Key Claims at a Glance
- The complaint asserts independent claim 4 (Compl. ¶22).
- Essential elements of claim 4 include:
- Storing information in an "information pack."
- Associating the pack with a user destination address, a category identifier, and a provider identifier.
- Communicating the pack to a user data repository and locating it based on the category identifier.
- Creating a custom location and placing the information pack there.
- Associating a "custom category identifier" with the pack.
- Sending a "custom category signal" to a processing station for analyzing subsequent information packs.
- The complaint reserves the right to assert other claims (Compl. ¶23).
U.S. Patent No. 7,209,959 - "Apparatus, System, And Method For Communicating To A Network Through A Virtual Domain Providing Anonymity To A Client Communicating On The Network"
- Patent Identification: U.S. Patent No. 7,209,959, "Apparatus, System, And Method For Communicating To A Network Through A Virtual Domain Providing Anonymity To A Client Communicating On The Network," issued April 24, 2007.
The Invention Explained
- Problem Addressed: The patent addresses privacy threats on the internet, where a user's activity, identity, and computer information can be recorded and traced by web servers via protocols like HTTP, leading to unwanted solicitations and "cookies" (’959 Patent, col. 1:56-65). Existing proxy servers merely provide an alternate identity, which itself becomes the target (’959 Patent, col. 2:1-7).
- The Patented Solution: The invention describes a system using three main components—a "deceiver," a "controller," and a "forwarder"—to create an ad hoc, anonymous communication session. When a client requests a website, the deceiver intercepts the request and passes it to the controller. The controller resolves the true destination IP, selects a forwarder, and tells the deceiver to respond to the client with the forwarder's IP address instead of the destination's (’959 Patent, col. 3:45-4:1). The client then communicates with the forwarder, believing it to be the destination server. The forwarder relays traffic between the client and the actual destination, masking the client's identity from the destination server and vice-versa (’959 Patent, Fig. 1; col. 4:21-29).
- Technical Importance: This architecture provides session-specific anonymity by creating a virtual domain where neither the client nor the destination server are directly aware of each other's true network address (’959 Patent, col. 4:46-53).
Key Claims at a Glance
- The complaint asserts independent claim 1 (Compl. ¶33).
- Essential elements of claim 1 include:
- Setting up a forwarding session in response to a client request.
- Employing a "forwarder" to transfer packets between the client and a destination server.
- Ensuring neither the client nor the destination server is aware of the forwarder's employment.
- Employing a "controller" that communicates with the forwarder and a domain name server (DNS).
- The controller queries the DNS to resolve the destination website name.
- Employing a "deceiver" that communicates with the controller and the client.
- The deceiver receives the client's request and initiates the controller's query to the DNS.
- The forwarding session is initiated in response to the controller receiving the answer from the DNS.
- The complaint reserves the right to assert other claims (Compl. ¶34).
U.S. Patent No. 7,398,298 - "Remote Access And Retrieval Of Electronic Files"
- Patent Identification: U.S. Patent No. 7,398,298, "Remote Access And Retrieval Of Electronic Files," issued July 8, 2008.
- Technology Synopsis: The patent describes a system for remotely managing data and directory structures over a communications network. A computing application on a server processes requests from users, who can view and modify data and directories stored in various locations, with the system providing notification of data delivery to intended targets (’298 Patent, Abstract). The system is intended to give users remote control over not just data, but the directory structures that contain it, a feature described as lacking in prior systems (’298 Patent, col. 2:15-24).
- Asserted Claims: The complaint asserts at least claim 13 (Compl. ¶44).
- Accused Features: The accused instrumentality is the "8x8 eXperience Communications Platform / 8x8 Admin Console ('XCP')," which allegedly provides a method for remotely controlling data directory structures via a remote management application operating on a server (Compl. ¶¶43, 45).
U.S. Patent No. 8,762,498 - "Network Communication Through A Virtual Domain"
- Technology Synopsis: This patent, which shares a specification with the ’959 patent, describes a method for network communication through a "virtual domain." The invention focuses on the role of a "controller" device that determines a destination IP address based on a "virtual namespace" provided in a user's request. It establishes a correlation between the true destination IP and a "forwarder" IP, and then instructs the forwarder to send the request data to the true destination (’498 Patent, Abstract).
- Asserted Claims: The complaint asserts at least claim 1 (Compl. ¶55).
- Accused Features: The accused instrumentality is "8x8's website infrastructure employing TLS," where a router allegedly acts as the claimed controller to determine a destination IP based on a virtual namespace and instruct a forwarder via SNI Routing (Compl. ¶¶54, 56).
III. The Accused Instrumentality
Product Identification
- The accused instrumentalities are the "8x8 Work, 8x8 Spaces, and 8x8 Meet applications"; the "8x8 eXperience Communications Platform/8x8 Admin" console; and "8x8's website infrastructure and its employ of TLS" (Compl. ¶14).
Functionality and Market Context
- The complaint describes the accused products as a suite of unified communications tools that allow for storing and accessing data (like image files), managing user and data structures (like contact centers and agent groups), and routing network traffic (Compl. ¶¶23, 34, 45). The complaint alleges these products are advertised, sold, and offered for sale through the www.8x8.com website (Compl. ¶13). The allegations group the products into three categories, each accused of infringing a different family of patents: the user applications for data organization, the admin platform for remote directory control, and the underlying network infrastructure for anonymous communication.
- No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
'063 Patent Infringement Allegations
| Claim Element (from Independent Claim 4) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| a method for providing information... comprising the steps of: storing information to be provided in an information pack; | The 8x8 applications provide a method for storing and controlling access to data by storing information (e.g., uploading to servers/saving image files). | ¶23 | col. 10:27-30 |
| associating with said information pack at least a user destination address..., a category identifier..., and a provider identifier; | The stored information is associated with the address of a data repository, a category identifier (e.g., "data" directory), and a provider identifier (8x8). | ¶23 | col. 10:30-45 |
| communicating said information pack... to said user data repository... locating said information pack in a location... reserved for information corresponding to a category to which said category identifier corresponds; | The information pack is sent to the specified data repository and stored in a location reserved for the specified category. | ¶23 | col. 10:54-65 |
| placing said information pack in said custom location; associating a custom category identifier with said information pack; | A file folder is reserved for the information, and a custom category identifier, alleged to be the digital signature of the 8x8 application, is assigned to the pack. | ¶23 | col. 12:20-30 |
| sending a custom category signal to a processing station... whereby said processing station... analyzes the provider identifier of subsequent... information packs... placing said one of the subsequent information packs in said custom location... | The custom category identifier (digital signature) is used to identify other packs from the same author (e.g., for application updates), allowing them to be stored in the same location based on matching identifiers. | ¶23 | col. 24:1-10 |
- Identified Points of Contention:
- Scope Questions: The infringement theory hinges on whether routine software functions can be mapped onto the patent's specific terminology. A key question is whether an "information pack," described in the patent as a discrete package of static and dynamic information, can be read on the general act of "uploading to servers/saving image files" (Compl. ¶23).
- Technical Questions: The complaint alleges a "custom category identifier" is a "digital signature" of an application, and that the "custom category signal" is the process of using that signature to verify updates (Compl. ¶23). A central technical question will be whether this software update verification process performs the function required by the claim: signaling a "processing station" to analyze and route subsequent, separate information packs into a custom folder based on a user's organizational choice, as described in the patent (’063 Patent, col. 9:22-31).
'959 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| setting up a forwarding session between the client and a destination server... the forwarding session employing a forwarder disposed between the client and the destination server to forward packets... | In response to a "Client Hello" request, a forwarding session is set up from the internet to a WWW server, employing a front-end server switch as the "forwarder" to handle packet forwarding. | ¶34 | col. 8:50-58 |
| wherein the forwarding session is set up and implemented such that neither the client or the destination server is aware of the employment of the forwarder; | The session is allegedly set up such that the WWW server has a direct TCP connection to the client IP, making both parties unaware of the intermediate forwarder. | ¶34 | col. 8:60-64 |
| employing a controller configured to communicate with the forwarder and a domain name server, wherein the controller queries the domain name server to resolve the name of the destination website... and initiates communication with the forwarder... | A firewall, acting as the "controller," communicates with the front-end server switch ("forwarder") and a DNS. The firewall queries the DNS to resolve the website name and then initiates communication with the forwarder. | ¶34 | col. 8:65-col.9:3 |
| employing a deceiver configured to communicate with the controller and the client, wherein the deceiver receives the request by the client... and initiates the controller to query the domain name server... | A router, acting as the "deceiver," communicates with the firewall ("controller") and client. The router receives the client's request and initiates the controller to query the DNS. | ¶34 | col. 9:4-9 |
| in response to the controller receiving the answer from the domain name server and initiating communication with the forwarder, initiating the forwarding session. | In response to the firewall ("controller") receiving the DNS answer and communicating with the switch ("forwarder"), the forwarding session is initiated. | ¶34 | col. 9:10-14 |
- Identified Points of Contention:
- Scope Questions: The complaint maps the claimed "deceiver," "controller," and "forwarder" to standard network components: a router, a firewall, and a front-end server switch, respectively (Compl. ¶34). A primary issue will be whether these general-purpose components, in their ordinary operation, perform the specific, coordinated, and distinct roles required by the claims. The roles appear to overlap in the complaint's description (e.g., both the "router" and "firewall" are involved in initiating the session).
- Technical Questions: A critical evidentiary question will be proving the negative limitation that "neither the client or the destination server is aware of the employment of the forwarder" (Compl. ¶34). The complaint's basis for this—that the server has a "direct TCP connection" to the client—raises the question of what evidence will be offered to show this awareness is absent in the accused system, as opposed to merely being implicit in the network architecture.
V. Key Claim Terms for Construction
Patent: '063 Patent
- The Term: "information pack" (Claim 4)
- Context and Importance: The definition of this term is central to whether the accused data handling constitutes infringement. Plaintiff alleges it is as general as "uploading to servers/saving image files" (Compl. ¶23), while the patent describes it as a more structured object containing specific identifiers and information types. Practitioners may focus on this term because its construction will determine if the claim covers any generic data storage operation or is limited to the specific packaged-data system disclosed.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The term is not explicitly defined, which may support an interpretation based on its plain and ordinary meaning. The specification refers to information in various forms, including "digital form" generally (’063 Patent, col. 1:61-62).
- Evidence for a Narrower Interpretation: The abstract and summary describe the "information pack" as containing specific components like static/dynamic information and category/provider identifiers, and being sent as a unit to a repository (e.g., ’063 Patent, Fig. 1, item 18; col. 6:27-35). This suggests a specific data structure, not just any stored file.
Patent: '959 Patent
- The Term: "deceiver" (Claim 1)
- Context and Importance: The complaint maps "deceiver" to a "router" (Compl. ¶34). The patent defines a three-part system of deceiver, controller, and forwarder. The distinct function of the "deceiver" is critical; if its role collapses into the function of a standard router or firewall ("controller"), the claim may not be infringed.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent states the deceiver "provides name resolution for clients" and that the "routine works the same as a standard name server, except when a query is received from a client, the deceiver allows the controller to supply the information" (’959 Patent, col. 2:38-42). This could be read broadly to cover any device that intercepts a DNS query and hands it off.
- Evidence for a Narrower Interpretation: The detailed description explains a specific sequence: the client sends an unresolved packet to the "deceiver", the "deceiver" queries the "controller", the "controller" returns the "forwarder's" IP to the "deceiver", and the "deceiver" then returns that IP to the client (’959 Patent, col. 3:51-col. 4:1). This detailed, multi-step interaction suggests a more specialized function than that of a generic network router.
VI. Other Allegations
- Indirect Infringement: The complaint does not include counts for indirect infringement.
- Willful Infringement: The complaint does not explicitly allege willful infringement, but it does request that the Court "declare this to be an exceptional case and award Plaintiff its reasonable attorneys' fees and costs in accordance with 35 U.S.C. § 285" (Compl. ¶60.C). This request is typically, though not exclusively, associated with findings of willful infringement or other litigation misconduct.
VII. Analyst’s Conclusion: Key Questions for the Case
A question of claim vitality: Given that all asserted claims of the ’498 patent were cancelled in reexamination, its assertion in this case is moot. The key threshold question is whether the remaining asserted patents will survive validity challenges, particularly given that they belong to a heavily litigated technology space.
A core issue of definitional scope: The infringement allegations for the ’063 and ’959 patents rely on mapping claim-specific terms like "information pack", "deceiver", and "controller" onto general-purpose components like saved files, routers, and firewalls. The case will likely turn on claim construction: can these specialized terms be construed broadly enough to read on the accused generic functionalities, or are they limited to the specific, multi-component systems detailed in the patents' embodiments?
An evidentiary question of functional reality: For the ’959 patent, Plaintiff must prove that the accused network architecture performs the complex, three-part anonymization scheme as claimed, including the negative limitation that the client and server are unaware of the intermediary "forwarder." A central question will be what technical evidence is presented to demonstrate that standard network infrastructure components are in fact operating in the specific, coordinated manner required by the patent claims.