DCT
2:24-cv-00654
Authentixx LLC v. Huntington National Bank
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Authentixx LLC (Delaware)
- Defendant: The Huntington National Bank (Ohio)
- Plaintiff’s Counsel: Beusse Sanks; Rabicoff Law LLC
- Case Identification: 2:24-cv-00654, M.D. Fla., 07/17/2024
- Venue Allegations: Venue is based on Defendant maintaining an established place of business in the Middle District of Florida.
- Core Dispute: Plaintiff alleges that unidentified products and services of the Defendant infringe a patent related to methods for authenticating electronic content, such as web pages.
- Technical Context: The technology addresses the problem of online fraud, such as phishing, by providing a system to verify for a user that digital content originates from a legitimate source.
- Key Procedural History: The patent-in-suit is a continuation of an application filed in 2005, which itself is a continuation-in-part of an application filed in 2000 that claims priority to a 1999 provisional application. The patent’s front page references a history of prior litigation and post-grant proceedings involving related patents, which may inform future arguments regarding claim scope and validity.
Case Timeline
| Date | Event |
|---|---|
| 1999-09-09 | '863 Patent Earliest Priority Date (Provisional 60/153,004) |
| 2017-12-08 | '863 Patent Application Filing Date |
| 2019-07-16 | '863 Patent Issue Date |
| 2024-07-17 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,355,863 - “System and method for authenticating electronic content”
- Patent Identification: U.S. Patent No. 10,355,863, issued July 16, 2019.
The Invention Explained
- Problem Addressed: The patent’s background section describes the risk of consumers being defrauded by counterfeit web pages and emails that mimic legitimate entities to perform identity theft ('863 Patent, col. 1:24-54). It notes that consumers often cannot be confident that the web page being viewed is authentic ('863 Patent, col. 1:37-40).
- The Patented Solution: The invention proposes a system where an "authentication server" inserts an "authenticity key" into a web page before it is sent to a user. A software component on the user’s computer (e.g., a browser plug-in) then uses this key to verify the page's authenticity and display a user-defined "authenticity stamp" to confirm the page is legitimate ('863 Patent, Abstract; col. 2:12-23). The system architecture involves communication between the user, a web server, and a separate authentication server to complete this verification process ('863 Patent, Fig. 4). This system is illustrated in Figure 4 of the patent, which depicts a block diagram of the user, web server, authentication server, and security engine components (Compl., Ex. 1, p. 11).
- Technical Importance: The described technical approach aims to provide a more robust, dynamic authentication mechanism than simply checking a URL or relying on static security indicators, which are vulnerable to spoofing ('863 Patent, col. 1:31-40, col. 2:3-9).
Key Claims at a Glance
- The complaint does not identify specific asserted claims, instead referring to "Exemplary '863 Patent Claims" detailed in an unattached Exhibit 2 (Compl. ¶11, 13).
- Independent claim 1, a representative method claim, includes the following essential elements:
- Storing an "authenticity stamp" in a "preferences file" accessible by designated servers.
- Creating an "authenticity key" with information to locate the preferences file.
- Receiving a page request from a client, creating formatted data for the page, and receiving a separate request for the "authenticity key."
- Sending the formatted data and providing the authenticity key to the client computer.
- At the client, manipulating the key to locate the preferences file, retrieving the stamp, and displaying it with the web page data.
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific accused product, method, or service. It refers generically to "Exemplary Defendant Products" which are identified only in charts referenced as Exhibit 2, an exhibit not attached to the complaint filed on the public docket (Compl. ¶11, 13).
Functionality and Market Context
- The complaint does not provide any description of the accused instrumentality's technical functionality, operation, or market context.
IV. Analysis of Infringement Allegations
The complaint alleges direct infringement of exemplary method claims (Compl. ¶11), but incorporates its specific factual allegations by reference to an unattached Exhibit 2 (Compl. ¶13, 14). The body of the complaint does not contain factual allegations mapping specific features of an accused product to the limitations of any patent claim. Therefore, a claim chart summary cannot be constructed from the provided documents.
- Identified Points of Contention: Based on the language of the '863 Patent and the general nature of the dispute, the infringement analysis raises several potential questions:
- Scope Questions: A central question may be whether the term "authenticity stamp" as used in the patent, which is described with examples like a visual "seal of approval" ('863 Patent, Fig. 2), can be construed to read on modern, non-visual authentication data like security tokens or session identifiers. Further, it raises the question of whether a "preferences file" stored locally on a user's machine ('863 Patent, col. 6:37-39) can read on server-side user profiles or browser-based data stores like cookies.
- Technical Questions: A key technical question is what evidence the complaint can provide that the accused system performs the specific multi-step communication sequence recited in the claims. For example, Claim 1 requires the server to receive a page request and then receive a separate request from the client for the "authenticity key" ('863 Patent, Claim 1). The analysis may focus on whether the accused system follows this specific architecture or uses a different, more integrated authentication workflow.
V. Key Claim Terms for Construction
The Term: "authenticity stamp"
- Context and Importance: This term defines the ultimate indicator of authenticity delivered to the user. Its construction is critical because it will determine the type of security feature that can be accused of infringement. Practitioners may focus on this term to dispute whether modern security data elements fall within the scope of what the patent describes.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification suggests the stamp can be configured in an "unlimited number of variations," including "graphics only, text only or a combination thereof" and can even be audio ('863 Patent, col. 4:18-25). It can also comprise "personal information relating to the user's account" ('863 Patent, col. 4:62-64), which may support a broader definition covering various forms of user-specific data.
- Evidence for a Narrower Interpretation: The primary embodiments and figures describe and depict a distinct, user-configured visual mark, such as a diamond-shaped "SEAL OF APPROVAL" or an "A-OKAY" text overlay on an image ('863 Patent, Fig. 2, Fig. 3, col. 4:10-20). This could support a narrower construction requiring a discrete, human-perceptible indicator.
The Term: "preferences file"
- Context and Importance: The location, storage, and retrieval of this "file" are recited as distinct steps in the asserted claims. The definition of this term will be central to determining whether modern data storage methods (e.g., server-side databases, browser local storage) meet this limitation.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The file's stated purpose is to "store information, such as a user's secure word" and user configuration preferences ('863 Patent, col. 11:59-65). An argument could be made that any data structure that performs this function meets the claim's objective.
- Evidence for a Narrower Interpretation: The specification explicitly describes this as a file "stored on the user's 110 file system" and states that it is "placed in a random directory to help obscure the location" ('863 Patent, col. 6:37-39; col. 11:64–12:3). This language may support a narrower definition requiring a discrete file stored on the client machine's local file system.
VI. Other Allegations
- Willful Infringement: The complaint does not contain an explicit allegation of willful infringement. However, the prayer for relief requests a judgment awarding enhanced damages under 35 U.S.C. § 284 and a declaration that the case is "exceptional" under § 285 (Compl., Prayer for Relief ¶D, E.i). These requests imply an allegation of egregious conduct, but the complaint pleads no specific facts to support pre-suit or post-suit knowledge of the patent or a deliberate disregard of Plaintiff's rights.
VII. Analyst’s Conclusion: Key Questions for the Case
- A threshold issue will be one of pleading sufficiency: Given that the complaint's factual allegations of infringement are made entirely by reference to an unattached exhibit, a central question is whether the pleading provides sufficient factual content on its face to state a plausible claim for relief.
- A key technical question will be one of architectural congruence: The case may turn on whether the accused banking platform utilizes the specific, multi-step client-server and authentication-server architecture required by the patent’s claims, or if its modern security protocols operate in a technically distinct manner.
- A core issue will be one of definitional scope: The dispute will likely involve determining whether claim terms rooted in the context of early-2000s web technology, such as a visual "authenticity stamp" and a local "preferences file," can be construed to cover the non-visual security tokens and server-side data profiles used in contemporary online systems.
Analysis metadata