DCT

1:23-cv-00230

Web 20 Tech LLC v. 37signals LLC

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:23-cv-00230, N.D. Ill., 04/15/2024
  • Venue Allegations: Venue is alleged to be proper in the Northern District of Illinois because Defendant is an Illinois limited liability corporation with its principal place of business in Chicago, and the acts of alleged infringement are asserted to have occurred within the district.
  • Core Dispute: Plaintiffs allege that Defendant’s Basecamp project management platform infringes two patents related to methods for managing, securing, and collaborating on information stored in an online repository.
  • Technical Context: The patents address foundational client-server technologies for providing users with centralized control over their personal or collaborative data, including permission-based access and modification rights.
  • Key Procedural History: The operative pleading is a Second Amended Complaint, filed pursuant to a court order. The complaint alleges that Defendant has had actual knowledge of the patents-in-suit since at least June 15, 2021, a date which may be significant for allegations of willfulness and the calculation of potential damages.

Case Timeline

Date Event
2000-01-07 Priority Date for '448 and '644 Patents
2005-01-18 U.S. Patent No. 6,845,448 Issues
2012-02-14 U.S. Patent No. 8,117,644 Issues
2021-06-15 Alleged Date of Notice of Infringement
2024-04-15 Second Amended Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 6,845,448 - “Online Repository for Personal Information” (Issued Jan. 18, 2005)

The Invention Explained

  • Problem Addressed: The patent's background section identifies the inefficiency and annoyance of users repeatedly entering personal information into different web forms and the lack of a centralized method for a user to store their information in a single location and selectively authorize its distribution to different entities (Compl. ¶20; ’448 Patent, col. 1:41-58).
  • The Patented Solution: The invention describes a server-based system where a user can establish an account and store various "information objects" (e.g., contact details, preferences, demographics) in a database. The core of the solution is enabling the user to assign different "security levels" to individual information objects, thereby controlling which authorized "requesters" can access specific pieces of information. The system retrieves and transmits information only after verifying a requester's authorization based on the user-defined security settings (’448 Patent, Abstract; col. 2:23-43).
  • Technical Importance: The technology provided a framework for user-centric data control, aiming to give users confidence that their personal information stored online would not be misused by providing granular, user-defined access permissions (’448 Patent, col. 1:58-65).

Key Claims at a Glance

  • The complaint asserts infringement of at least independent Claim 1 (’448 Patent, col. 14:28-15:2).
  • Essential Elements of Claim 1 (as corrected):
    • A method performed by a server computer for disbursing a first party's personal information to a second party.
    • Establishing an account for the first party and assigning an identifier.
    • Entering the first party's personal information, comprising a plurality of information objects.
    • Receiving, from the first party, an assignment of at least one of a plurality of security levels to each information object.
    • Storing the first party identifier, the information object, and its assigned security level in a database.
    • Receiving a request from a second party that includes the first party identifier.
    • Selecting and retrieving a portion of the personal information objects.
    • Securely transmitting the retrieved portion to the second party.
    • Obtaining a second party identifier.
    • If the second party is not authorized, recording the second party's identifier and rejecting the request.
  • The complaint reserves the right to assert other claims (Compl. ¶53).

U.S. Patent No. 8,117,644 - “Method and System for Online Document Collaboration” (Issued Feb. 14, 2012)

The Invention Explained

  • Problem Addressed: As a continuation-in-part of the '448 Patent, this invention addresses challenges specific to online document collaboration. The background notes that prior methods like bookmarking web pages were inadequate for persistent access and sharing, as links could become "stale," and there was a need for better systems to manage collaborative access to documents (’644 Patent, col. 1:48-64).
  • The Patented Solution: The patent describes a method for an "online personal library" where a first user can store a document on a server and associate it with "a set of access restrictions," including the ability for a "first group of users" to modify it. The system then manages the process of a second user requesting to modify the document, verifying that user's identity, permitting the modification based on their access rights, and centrally "receiving approval or disapproval for the modifications" from one or more users (’644 Patent, Abstract; col. 2:50-3:3).
  • Technical Importance: The invention provides a technical method for managing permission-based, multi-user online document workflows, including versioning and approval cycles, which are central features of modern collaborative software (’644 Patent, col. 2:46-49).

Key Claims at a Glance

  • The complaint asserts infringement of at least independent Claim 1 (’644 Patent, col. 25:52-26:22).
  • Essential Elements of Claim 1:
    • A method for online document collaboration performed by a server computer.
    • Establishing an account for a plurality of users.
    • Storing a document created by a first user.
    • Associating a set of access restrictions with the document, including an ability to access it for modification by a first group of users.
    • Receiving, from a second user, a request to modify the document, which accompanies the second user's identification information.
    • Verifying the identity of the second user.
    • Permitting the second user to modify the document based on a set of access rights granted to them.
    • Receiving approval or disapproval for the modifications from one or more users.
    • Storing identifying information of the user(s) who approved or disapproved of the modifications.
  • The complaint reserves the right to assert other claims (Compl. ¶73).

III. The Accused Instrumentality

Product Identification

  • Defendant’s Basecamp project management platform, including its constituent "projects," "reports," and "client" functionalities (Compl. ¶¶ 35, 57).

Functionality and Market Context

  • The complaint describes Basecamp as a web-based collaboration platform where an administrator can create an account and then create multiple "projects" (Compl. ¶¶ 58-59). The administrator can invite other users—categorized as internal employees, outside contractors, or clients—to these projects, with each user type having different default permissions (Compl. ¶39). Users can share documents, create to-do lists, post messages, and view activity reports (Compl. ¶¶ 38, 59). Access to information is controlled by user login credentials and the project-level permissions set by the administrator (Compl. ¶¶ 41, 60, 64). The complaint presents a screenshot of Basecamp's project interface, which shows distinct tools for "Message Board," "To-dos," and "Docs & Files," illustrating the platform's multi-faceted collaborative environment (Compl. p. 19).

IV. Analysis of Infringement Allegations

’448 Patent Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
establishing an account for the first party... assigning an identifier to the user Basecamp establishes an account for a user (first party) and assigns an identifier such as a user ID, name, and email. ¶¶ 36-37 col. 2:29-30
entering the first party's personal information... comprising at least one of a plurality of information objects Users enter personal information (e.g., name, photo, bio) and generate activity data (e.g., to-dos, comments, shared files), which are alleged to be "information objects." ¶38 col. 2:31-33
receiving, from the first party, assignment of at least one of a plurality of security levels to each information object An administrator ("first party") assigns other users to projects and can define their roles (e.g., coworker, contractor, client), which allegedly constitutes assigning a "security level" to the project information. The complaint includes a screenshot titled "Who are you inviting?" that depicts role-based user selection (Compl. p. 11). ¶¶ 39, 41 col. 2:33-35
storing in the database the user identifier, the information object and the security level Basecamp's database allegedly stores the user's identifier and the associated project access permissions that determine their access to information objects. ¶41 col. 2:35-37
receiving a request, said request message comprising at least the user identifier The system receives requests to view specific information, such as an activity report for a user identified by name. The complaint provides a screenshot of "Liza Randall's activity" as an example of a requested report (Compl. p. 14). ¶42 col. 2:37-39
securely transmitting the retrieved first portion of personal information objects to the second party In response to a request, Basecamp selects, transmits, and displays the user's personal information objects (e.g., their activity report) to the requesting party (second party) via SSL/TLS encryption. ¶¶ 43-45 col. 2:40-41
if the second party is not authorized... rejecting the second party's request for information The system is structured to permit access only based on granted permissions, which allegedly requires it to reject requests from unauthorized parties. ¶48 col. 14:46-51
  • Identified Points of Contention:
    • Scope Question: A central issue may be whether Basecamp's system of assigning users to projects and defining their roles (e.g., "client," "contractor") meets the claim limitation of "assigning... a plurality of security levels to each information object." A court may need to determine if this claim language requires a more formal, hierarchical data classification scheme applied directly to data objects, rather than role-based access control applied to users.
    • Technical Question: The complaint alleges that the system must reject unauthorized requests (Compl. ¶48). The evidence required to prove this negative limitation—that the system actually performs a rejection step for an unauthorized user—will be a key factual question for discovery.

’644 Patent Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
establishing, on the server computer... an account for each of a plurality of users Basecamp allows multiple users, including unlimited users under certain plans, to establish accounts on its servers. ¶58 col. 25:56-58
storing, on the server computer, a document created by a first user An "Admin" user can create and store "projects," which contain constituent documents, files, and other components, on Basecamp's servers. ¶59 col. 25:59-60
associating a set of access restrictions with the document... for modification by one of a first group of users An administrator controls which users are added to a project, thereby setting access permissions for modifying the project's documents and components. ¶60 col. 25:61-65
receiving, from a second user, a request to modify the document Users with appropriate permissions can access and modify project components, such as by adding comments, sharing files, or updating to-do lists. ¶61 col. 26:1-4
verifying the identity of the second user Basecamp verifies user identity through a login process using a username and password, as shown in a screenshot of the login form (Compl. p. 22). ¶¶ 63-64 col. 26:5-6
permitting the second user to modify the document based on a set of access rights granted to the second user The platform provides customizable permissions that determine a user's ability to modify documents and other project items based on their assigned role and access rights. ¶65 col. 26:7-9
receiving approval or disapproval for the modifications from one or more users Basecamp's document versioning feature, which tracks changes, and its to-do list functionality, where users can be assigned tasks to "approve," are alleged to constitute receiving approval or disapproval. The complaint includes a screenshot of a "History of changes" log (Compl. p. 23). ¶¶ 66-67 col. 26:10-12
storing identifying information of the one or more users who approved or disapproved the modifications The platform's revision control log allegedly stores the identifying information of users who created or saved new versions of a document. ¶68 col. 26:13-16
  • Identified Points of Contention:
    • Scope Question: The key dispute will likely focus on the interpretation of "receiving approval or disapproval for the modifications." A court will need to decide if this requires a formal, explicit "approve/disapprove" workflow, or if it can be read more broadly to cover general collaboration features like creating a new document version, commenting, or checking off a to-do item.
    • Technical Question: What evidence demonstrates that checking off a to-do item in Basecamp, as described in a help article (Compl. ¶67), functions as a system for "receiving approval or disapproval" of a "modification" to a "document," as those terms are used in the patent, rather than simply a task management feature?

V. Key Claim Terms for Construction

For the '448 Patent:

  • The Term: "security level"
  • Context and Importance: This term is the lynchpin of the infringement allegation for the '448 patent. The case may turn on whether Basecamp's role-based access control (where a user's access is determined by their role and the projects they are assigned to) can be considered a system of "security levels" assigned to "information objects." Practitioners may focus on this term because its construction will determine if a fundamental element of the claim is met.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification refers to "a classification of information according to a security or other hierarchical class structure" (’448 Patent, col. 1:58-60), suggesting that any system creating a hierarchy of access could fall within the term's scope.
    • Evidence for a Narrower Interpretation: The repeated use of the phrase "security level assigned to the information object" (’448 Patent, col. 14:38-39) could support an interpretation that the security classification must be an attribute of the data object itself, not just a consequence of a user's role.

For the '644 Patent:

  • The Term: "receiving approval or disapproval for the modifications"
  • Context and Importance: Plaintiff’s infringement theory relies on mapping this claim element to Basecamp's general versioning and task-tracking features. The definition of this term is critical because if it is construed to require a formal, binary approval/disapproval mechanism, the plaintiff's current allegations may not suffice.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The patent does not explicitly define the term or show a specific user interface for approval/disapproval, leaving the scope open. Plaintiff may argue that the term should be interpreted functionally to cover any mechanism that achieves the same result, such as tracking changes and marking related tasks complete.
    • Evidence for a Narrower Interpretation: The specific words "approval or disapproval" suggest a more explicit action than merely creating a new version or completing a task. A defendant might argue that the plain and ordinary meaning of the term requires a dedicated function for users to formally signal their assent or dissent to a specific modification.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges that Defendant "directly and jointly (e.g., with its users and customers) infringed" (Compl. ¶¶ 35, 57). This language suggests a theory of induced infringement, wherein Defendant is alleged to provide the Basecamp platform and encourage or instruct its users, via help articles and product functionality, to perform the steps of the claimed methods.
  • Willful Infringement: The complaint alleges that Defendant has had "actual knowledge" of both the '448 and '644 patents since receiving notice from the Plaintiffs on or about June 15, 2021 (Compl. ¶¶ 34, 56). This allegation of pre-suit knowledge of the patents and the ongoing nature of the accused activity forms the basis for the claim of willful infringement.

VII. Analyst’s Conclusion: Key Questions for the Case

  1. A core issue will be one of definitional scope: can the term "security level", as used in the '448 patent, be construed to cover the user-role and project-based access permissions of the accused Basecamp platform, or does it require a more formal data-centric classification system?

  2. A key evidentiary question will be one of functional mapping: does Basecamp’s combination of document versioning and to-do list features perform the specific function of "receiving approval or disapproval for the modifications" as required by Claim 1 of the '644 patent, or is there a fundamental mismatch in technical operation between the accused features and the claimed function?

  3. A third question pertains to damages and willfulness: assuming infringement is found, the allegation of actual notice as of June 15, 2021, will be central. This date may establish the start of the period for which willful infringement could be found and will likely serve as a key temporal boundary in damages calculations.