1:24-cv-01218
Fraud Free Transactions LLC v. Ping Identity Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Fraud Free Transactions LLC (Delaware)
- Defendant: Ping Identity Corporation (Delaware)
- Plaintiff’s Counsel: Pinckney, Weidinger, Urban & Joyce LLC; Brooks Kushman P.C.
 
- Case Identification: 1:24-cv-01218, D. Del., 11/04/2024
- Venue Allegations: Venue is alleged to be proper as Defendant is a Delaware corporation and thus resides in the district.
- Core Dispute: Plaintiff alleges that Defendant’s identity management services infringe patents related to systems and methods for deterring fraud in electronic transactions.
- Technical Context: The technology relates to adaptive, risk-based user authentication and out-of-band transaction verification, fields critical for securing online commerce and enterprise access against fraud.
- Key Procedural History: The named inventor, Dr. Michael Sasha John, is alleged to have co-founded Koakia in 2009, the predecessor-in-interest to Plaintiff FFT. Dr. John assigned the Asserted Patents to FFT on March 22, 2023.
Case Timeline
| Date | Event | 
|---|---|
| 2007-05-04 | Earliest Priority Date ('950 & '215 Patents) | 
| 2009-01-01 | Plaintiff's predecessor-in-interest, Koakia, co-founded | 
| 2023-01-10 | '215 Patent Issued | 
| 2023-03-22 | Asserted Patents Assigned to Plaintiff FFT | 
| 2024-09-17 | '950 Patent Issued | 
| 2024-11-04 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 12,093,950 - "Fraud Deterrence for Secure Transactions"
- Issued: September 17, 2024
The Invention Explained
- Problem Addressed: The patent addresses the problem of online fraud, where criminals use stolen credit card information or other credentials to make unauthorized purchases or access secure systems. It notes that prior solutions, such as software license managers, were often cumbersome for users and could be bypassed ('950 Patent, col. 1:40-59).
- The Patented Solution: The invention describes a sophisticated, risk-based authentication system. Instead of a one-size-fits-all security approach, it uses a configurable rule set that analyzes characteristics of an access request—such as the user's IP address, device ID, and geographic location—to assess the risk level. Based on this risk analysis, the system automatically selects one of several predefined actions, such as granting access without further checks, requiring a standard multi-factor authentication (MFA) step, or triggering a more stringent MFA action for high-risk scenarios ('950 Patent, Abstract; col. 17:15-20:50).
- Technical Importance: This adaptive approach allows for a frictionless user experience in low-risk situations while applying stronger security measures only when circumstances warrant, balancing security with usability.
Key Claims at a Glance
- The complaint asserts independent claim 1 and dependent claim 2 (Compl. ¶27).
- The essential elements of independent claim 1 include:- Receiving a request to access a software program having an associated rule set.
- The rule set including configurable rules that define determinations for user identity verification based on characteristics like originating IP address, device ID, and geographic location.
- Defining at least three distinct types of actions to be taken based on the determinations:- A "first action" for a low-risk condition, permitting access without MFA.
- A "second action" for a moderate-risk condition, requiring at least one configurable MFA action.
- A "third action" for a high-risk/potential fraud condition, requiring a second, different configurable MFA action.
 
- Analyzing data from the request to derive an applicable rule set.
- Analyzing the determinations from the rule set to identify if a first, second, or third condition is met.
- Instructing the user to undertake the appropriate MFA action if a second or third condition is indicated.
 
- The complaint reserves the right to assert additional claims (Compl. ¶27).
U.S. Patent No. 11,551,215 - "Fraud Deterrence for Secure Transactions"
- Issued: January 10, 2023
The Invention Explained
- Problem Addressed: The patent confronts the challenge of verifying that a person requesting access to a secure system (e.g., making a purchase, logging into a bank account) is the legitimate user, especially when the request comes from an unrecognized device ('215 Patent, col. 1:31-44).
- The Patented Solution: The invention proposes an "out-of-band" verification method. When a request for access is received from a first computing device, the system communicates with a fraud prevention application installed on a separate, predefined mobile phone associated with the user. The system then obtains approval or denial from the application on that second device before permitting access on the first device ('215 Patent, Abstract; col. 40:1-40:39). This creates a secondary, independent channel for authentication.
- Technical Importance: By requiring confirmation on a separate, trusted device, this solution makes it significantly harder for a fraudster who has only compromised a user's primary device or credentials to gain unauthorized access.
Key Claims at a Glance
- The complaint asserts claim 22, which depends from independent claim 20 (Compl. ¶34, ¶36).
- The essential elements of independent claim 20 include:- Receiving a request from an identified requestor for access to software from a first computing device.
- Communicating with a fraud prevention application installed on a predefined out-of-band mobile phone, which is different from the first computing device.
- Obtaining approval or denial of the request from the application on the mobile phone.
- Determining whether the request was approved or denied.
- Processing the request to permit access in response to an approval.
 
- The complaint reserves the right to assert additional claims (Compl. ¶34).
III. The Accused Instrumentality
Product Identification
The accused products are Ping Identity's identity management services, specifically including the PingOne system ("PingOne"), which is offered in both cloud-based and customer-hosted versions (Compl. ¶18).
Functionality and Market Context
- PingOne is described as a cloud-based Identity as a Service (IdaaS) framework for secure identity and access management (Compl. ¶19).
- The complaint alleges that PingOne's threat protection functionality uses "risk policies defined by different predicators to determine a risk level associated with a user attempting to access an application" (Compl. ¶21). Based on this risk level, PingOne allegedly determines whether to grant access or require "a secondary verification," such as multi-factor authentication (MFA) (Compl. ¶22).
- The accused services include the PingOne MFA service and the PingID service and mobile application, which together provide adaptive MFA solutions and facilitate various authentication methods on mobile devices (Compl. ¶23-25).
- No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint states that exemplary claim charts are attached as Exhibits 3 and 4, which detail the infringement of the ’950 and ’215 Patents, respectively (Compl. ¶30, ¶37). However, these exhibits were not included with the filed complaint document. The infringement theory must therefore be summarized from the complaint’s narrative allegations.
For the ’950 Patent, the complaint alleges that the Ping Accused Products directly infringe at least claims 1 and 2 by making, using, or selling the services in the United States (Compl. ¶27). The narrative theory is that PingOne's use of "risk policies defined by different predicators" to determine when secondary verification is needed constitutes the practice of the claimed method (Compl. ¶21-22).
For the ’215 Patent, the complaint alleges that the Ping Accused Products directly infringe at least claim 22 by making, using, or selling the services (Compl. ¶34). The narrative theory is that PingOne's MFA and PingID services, which "facilitate a variety of authentication methods using mobile applications to be installed on various devices," practice the claimed out-of-band verification method (Compl. ¶25).
- Identified Points of Contention:- Structural Correspondence (’950 Patent): A central question will be whether PingOne's risk-based authentication system maps onto the specific, three-tiered structure recited in claim 1. The claim requires a "first action" (no MFA), a "second action" (MFA), and a "third action" (a different MFA for potential fraud). The analysis may focus on whether Ping's system is merely a flexible risk engine or if it contains this specific tripartite logic.
- Scope and Equivalence (’215 Patent): The infringement analysis will likely turn on the meaning of "predefined out-of-band mobile phone." A key question is whether modern adaptive MFA systems, which can send push notifications or codes to various user devices (laptops, tablets, phones) via different applications, fall within the scope of this term, which suggests a single, pre-registered mobile phone.
 
V. Key Claim Terms for Construction
’950 Patent, Claim 1
- The Term: "one first action... one second action... one third action"
- Context and Importance: This sequence defines the core logic of the claim. The case may hinge on whether Defendant's system, which is described as using "risk policies," implements this exact three-part conditional structure or a different, more generalized risk model. Practitioners may focus on this term because it appears to be a highly specific architectural limitation.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The detailed description discusses adjusting fraud deterrents based on a "fraud deterrent strength parameter which can be increased (e.g., if the risk of fraud... increases)" ('950 Patent, col. 3:58-62). This could suggest that any system with escalating responses to risk meets the spirit of the invention.
- Evidence for a Narrower Interpretation: The claim language itself is highly structured, explicitly defining three distinct rule types, conditions, and resulting actions. An argument for a narrower construction may be that this precise tripartite framework is what distinguishes the invention, and any system lacking this specific structure does not infringe.
 
’215 Patent, Claim 20
- The Term: "predefined out-of-band mobile phone"
- Context and Importance: This term is critical to defining the scope of the claimed security method. The dispute will likely involve whether this term is limited to a specific mobile phone formally registered for out-of-band verification, or if it can be read more broadly to cover any secondary device (including tablets or other computers) that receives an MFA challenge via an application.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent's background discusses deterring fraud in general electronic commerce, a broad context that may support interpreting the claim to cover modern equivalents that achieve the same security goal ('215 Patent, col. 1:31-34).
- Evidence for a Narrower Interpretation: The claim repeatedly and specifically recites a "mobile phone" that is "different from the first computing device" ('215 Patent, col. 42:2-4). This explicit language, combined with the term "predefined," suggests an intentional limitation to a specific type of device that is designated in advance, potentially excluding other forms of adaptive MFA.
 
VI. Analyst’s Conclusion: Key Questions for the Case
- A question of structural mapping: Does the accused PingOne platform, described as using flexible "risk policies," implement the specific three-tiered conditional logic required by claim 1 of the '950 patent (no MFA for low risk, standard MFA for medium risk, and a different MFA for high risk), or is there a fundamental architectural mismatch? 
- A question of technological scope: Can the term "predefined out-of-band mobile phone" from the '215 patent, which has a 2007 priority date, be construed to cover modern, application-based multi-factor authentication systems that can operate across a range of user devices, or is its scope limited to the specific device and communication channel envisioned in the patent?