1:24-cv-01087
IBM Corp v. Take Two Interactive Software Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: International Business Machines Corporation (New York)
- Defendant: Take-Two Interactive Software, Inc. (Delaware)
- Plaintiff’s Counsel: Potter Anderson & Corroon LLP
 
- Case Identification: 1:24-cv-01087, D. Del., 09/30/2024
- Venue Allegations: Venue is alleged to be proper in the District of Delaware because Defendant is a Delaware corporation that resides in, conducts business in, and offers products for sale in the district.
- Core Dispute: Plaintiff alleges that Defendant’s digital storefronts, online games, and websites infringe three patents related to presenting online advertisements, aggregating user authentication identities, and managing virtual world server queries.
- Technical Context: The technologies at issue relate to foundational methods for operating large-scale interactive online services, including client-side processing, flexible user identity management, and efficient server resource allocation for virtual environments.
- Key Procedural History: The complaint alleges that the parties engaged in licensing discussions beginning in May 2021. It also references prior litigation involving one of the patents-in-suit, U.S. Patent No. 7,072,849, against Zynga, Inc., which is now a subsidiary of the Defendant. In that case, a jury found the ’849 patent to be infringed and not invalid. The complaint further notes several other prior unsuccessful validity challenges against the ’849 patent in other judicial and administrative proceedings.
Case Timeline
| Date | Event | 
|---|---|
| 1988-07-15 | ’849 Patent Priority Date | 
| 2000-12-07 | ’704 Patent Priority Date | 
| 2006-07-04 | ’849 Patent Issue Date | 
| 2008-04-08 | ’704 Patent Issue Date | 
| 2010-08-24 | ’209 Patent Priority Date | 
| 2013-06-04 | ’209 Patent Issue Date | 
| 2021-05-01 | IBM allegedly informs Take-Two of infringement | 
| 2021-12-17 | Parties meet; IBM provides infringement evidence for ’849 and ’704 patents | 
| 2022-01-01 | Take-Two announces anticipated acquisition of Zynga | 
| 2022-05-01 | IBM files complaint against Zynga; Take-Two completes Zynga acquisition | 
| 2022-11-07 | Parties meet; IBM presents overview including the ’209 patent | 
| 2024-05-17 | IBM provides detailed infringement evidence for the ’209 patent | 
| 2024-09-13 | Jury verdict returned in IBM v. Zynga finding ’849 patent infringed and not invalid | 
| 2024-09-30 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,072,849 - "Method for presenting advertising in an interactive service," Issued July 4, 2006
The Invention Explained
- Problem Addressed: The patent describes the technical limitations of early interactive computer networks (e.g., pre-World Wide Web services) where a central host computer handled all user requests, creating processing bottlenecks and slow response times, a problem exacerbated by competition for limited bandwidth between application data and advertising data (Compl. ¶¶39, 41; ’849 Patent, col. 1:34-58).
- The Patented Solution: The invention proposes structuring both applications and advertisements as self-contained "objects" of data and code that can be processed by the user's local personal computer rather than the central host. By pre-fetching and selectively storing advertising objects on the user's machine, advertisements can be displayed concurrently with applications without consuming network resources at the time of presentation, thus reducing server load and improving performance (Compl. ¶36; ’849 Patent, Abstract, col. 4:36-65).
- Technical Importance: This client-server model, which leverages local processing power and storage, represented a departure from the "dumb terminal" approach and was a key innovation for enabling interactive online services to scale to large numbers of users (Compl. ¶37).
Key Claims at a Glance
- The complaint asserts independent claim 1 (Compl. ¶61).
- Essential elements of claim 1 include: (a) a method of presenting advertising on a network; (b) structuring applications for display in a first portion of a screen; (c) structuring advertising compatibly for concurrent display in a second portion; (d) wherein the advertising is configured as "objects" containing advertising data; and (e) "selectively storing" these advertising objects at a local store on the user's system.
- The complaint alleges infringement of "one or more of the claims" of the patent (Compl. ¶60).
U.S. Patent No. 7,356,704 - "Aggregated authenticated identity apparatus for and method therefor," Issued April 8, 2008
The Invention Explained
- Problem Addressed: The patent addresses the inconvenience and security risks associated with users managing multiple digital identities. In conventional systems, a user needing permissions from a second identity had to log out of the first, while systems that simply combined all permissions into one super-identity created security vulnerabilities (Compl. ¶¶49-50; ’704 Patent, col. 2:22-27, 2:52-67).
- The Patented Solution: The invention describes a method where, upon a second logon, the system creates a new, temporary "aggregate" security context that combines the authorizations from the user's first identity with those of the second. This allows the user to access resources tied to both identities simultaneously. When the user logs out of the second identity, the system can revert to the original security context, which was saved rather than destroyed (Compl. ¶51; ’704 Patent, Abstract, col. 5:41-6:21).
- Technical Importance: This technology allows for more flexible and granular control over user access rights in complex environments, enhancing user convenience without compromising security by unnecessarily escalating privileges (Compl. ¶52).
Key Claims at a Glance
- The complaint asserts independent claim 1 (Compl. ¶¶79, 80).
- Essential elements of claim 1 include: (a) an authentication method; (b) generating a first security context after a first user authentication; (c) generating a second security context after a second user authentication; (d) wherein the second security context is an "aggregate" of the first security context and the security context from the second authentication.
- The complaint alleges infringement of "one or more of the claims" of the patent (Compl. ¶78).
U.S. Patent No. 8,458,209 - "Virtual world query response system," Issued June 4, 2013
- Patent Identification: U.S. Patent No. 8,458,209, "Virtual world query response system," Issued June 4, 2013 (Compl. ¶94).
- Technology Synopsis: The patent addresses inefficient server load balancing and user navigation in large-scale virtual worlds. The invention provides a system for querying a database of virtual worlds and their entry points, and then dynamically generating or assigning a server instance ("shard") that contains portals to the queried content, allowing users to seamlessly navigate between worlds and enabling more efficient resource management (Compl. ¶¶53-55; ’209 Patent, Abstract).
- Asserted Claims: The complaint asserts independent claim 11 (Compl. ¶96).
- Accused Features: The "fast travel" system within Defendant's Red Dead Online game is alleged to be an infringing virtual world query response system (Compl. ¶96).
III. The Accused Instrumentality
Product Identification
The accused instrumentalities are Defendant's "Rockstar Games Launcher" and "Rockstar Store" website; the "NBA 2K Mobile Basketball" game and "Rockstar Social Club" website; and the "Red Dead Online" online game (Compl. ¶¶60, 78, 95).
Functionality and Market Context
The accused instrumentalities are central components of Defendant's digital gaming ecosystem. The Rockstar Games Launcher and Store are digital distribution platforms that present applications and concurrent promotional offers for games and in-game microtransactions (Compl. ¶¶61, 65). The NBA 2K Mobile game and Rockstar Social Club website allegedly allow users to link multiple third-party accounts (e.g., Facebook, Google, Epic Games), which the complaint claims results in the aggregation of security contexts (Compl. ¶¶79-80). Red Dead Online is an online multiplayer game featuring a "fast travel" system that allegedly allows users to query for and be transported to specific game sessions, which the complaint maps to the claimed virtual world query system (Compl. ¶96). The complaint states that Defendant generates billions of dollars in annual revenue from these and other products (Compl. ¶3).
No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
’849 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| a method comprising the steps of: structuring applications ... so that they may be presented, through the network, at a first portion ... of one or more screens of display; | The Rockstar Games Launcher and Rockstar Store present their primary application interface (the storefront) in a main portion of the user's screen. | ¶61(b), ¶65(b) | col. 3:10-23 | 
| and structuring advertising ... in a manner compatible to that of the applications so that it may be presented ... at a second portion ... of one or more screens of display concurrently with applications, | Product and microtransaction offers are presented in a second portion of the display concurrently with the main storefront application. | ¶61(c), ¶65(c) | col. 4:36-42 | 
| wherein structuring the advertising includes configuring the advertising as objects that include advertising data | The advertising offers are configured as objects, such as image data stored in a .jpg file format that includes advertising data. | ¶61(c), ¶65(c) | col. 11:1-8 | 
| and; selectively storing advertising objects at a store ... established at the reception system. | The advertising objects are stored locally on the user's system using caching parameters and/or code. | ¶61(d), ¶65(d) | col. 6:58-65 | 
Identified Points of Contention
- Scope Question: A potential dispute may arise over the definition of "advertising." The court may need to determine if the patent's use of the term, conceived in an era of third-party ads, can be construed to cover the first-party "products or microtransaction offers" presented within Defendant's proprietary storefronts (Compl. ¶61(c)).
- Technical Question: The infringement reading hinges on whether modern web caching constitutes the "selectively storing" of "objects" as required by the claim. A technical question is what evidence the complaint provides that the accused systems perform the specific pre-fetching and management of a local advertising store as taught in the patent's detailed description, beyond implementing standard browser or application caching (Compl. ¶61(d)).
’704 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| an authentication method comprising the steps of: generating a first security context ... in response to a first user authentication | A user logs into the accused services using a first account (e.g., a Facebook account), which generates a first security context for Facebook access authorization. | ¶79(a), ¶80(a) | col. 1:15-22 | 
| generating a second security context ... in response to a second user authentication | The user then logs in using a second account (e.g., a Games Center account or Google account). | ¶79(b), ¶80(b) | col. 1:61-2:4 | 
| wherein said second security context is an aggregate of said first security context and a security context corresponding to an identity in said second user authentication. | The second security context is alleged to be an aggregate of the first (Facebook) and second (Games Center/Google) access authorizations. | ¶79(b), ¶80(b) | col. 5:41-6:21 | 
Identified Points of Contention
- Scope Question: The central issue is the meaning of "aggregate." The court will have to decide if this term, which implies a combination, reads on the functionality of modern federated identity or single sign-on (SSO) systems. It raises the question of whether linking accounts is the same as creating an "aggregate" security context.
- Technical Question: The case may turn on the technical implementation of Defendant's multi-login feature. A key factual question is whether the system truly creates a new, distinct data structure that combines permissions from both authentications (an "aggregate context"), or if it employs a different mechanism such as switching between contexts, linking them, or using one as a primary identity that does not meet the claim limitation. The complaint asserts aggregation occurs but does not detail the underlying mechanism (Compl. ¶¶79(b), 80(b)).
V. Key Claim Terms for Construction
For the ’849 Patent
- The Term: "objects"
- Context and Importance: The patent describes a specific object-oriented architecture. Practitioners may focus on this term because its construction will determine if modern web assets, which the complaint identifies as ".jpg file format" objects and code like JavaScript, fall within the scope of the claims (Compl. ¶¶61(c), 69).
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification suggests objects are a means of "packaging and distributing partitioned applications" and can be "nested within one another" ( ’849 Patent, col. 6:18-24). This could support a reading on modular web components.
- Evidence for a Narrower Interpretation: The specification discloses a highly specific structure for an "object header," defining it as a fixed 18-byte field with specific byte allocations for access control, versioning, and storage characteristics (’849 Patent, Fig. 4b, col. 13:3-48). This detailed embodiment could support a narrower construction that excludes generic file types.
 
For the ’704 Patent
- The Term: "aggregate"
- Context and Importance: This term is the crux of the infringement allegation for the ’704 patent. Its definition will determine whether Defendant’s system, which allows logins from multiple third-party services, performs the claimed invention.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent states the invention leverages methodology "that could dynamically combine the authorization access information in existing security contexts to create a new 'aggregate' security context" (’704 Patent, col. 12:12-16). This could be argued to encompass any system where permissions from multiple identities are concurrently active.
- Evidence for a Narrower Interpretation: The abstract describes creating a "composite or aggregate security context" that is later "destroyed," and the detailed description discusses creating this new context "based on the existing security contexts" (’704 Patent, Abstract; col. 5:41-51). This language may support a narrower definition requiring the creation of a distinct, temporary data structure that merges permissions, rather than simply linking two separate, co-existing authentication tokens.
 
VI. Other Allegations
Indirect Infringement
For all three patents, the complaint alleges both contributory and induced infringement. The allegations are based on Defendant supplying the necessary software code (e.g., HTML, JavaScript) for users to directly infringe, with the code allegedly having no substantial non-infringing use, and Defendant encouraging and instructing users to use the accused products in an infringing manner (Compl. ¶¶67-72, 83-88, 99-104).
Willful Infringement
The complaint alleges willful infringement for all three patents. The allegations are based on Defendant’s alleged pre-suit knowledge of the patents, stemming from licensing communications that began in May 2021. For the ’849 patent, the willfulness claim is further supported by the recent jury verdict against Defendant’s subsidiary, Zynga, which found willful infringement of the same patent (Compl. ¶¶23-26, 66, 75, 82, 91, 98, 107).
VII. Analyst’s Conclusion: Key Questions for the Case
- A primary issue will be one of technological translation: can claim terms rooted in the context of older computing paradigms—such as the 1980s client-server "objects" of the ’849 patent and the 2000-era "aggregate" security contexts of the ’704 patent—be construed to cover their modern, ubiquitous counterparts like web caching and federated single sign-on? The resolution will depend on whether the accused systems are found to be mere evolutions or fundamentally different technologies.
- A key evidentiary question for the ’704 patent will be one of functional operation: does Take-Two’s system for handling multiple user logins actually create a new, temporary, and combined "aggregate" security context as described by the patent, or does it utilize an alternative mechanism, such as identity linking or context switching, that operates outside the claimed method?
- A significant legal question, particularly for the ’849 patent, will be the preclusive or persuasive effect of prior litigation. The court will need to consider how the recent jury verdict finding the ’849 patent valid and willfully infringed by Defendant’s own subsidiary, Zynga, will influence the present case, especially with respect to willfulness allegations and the viability of any invalidity defenses.