DCT

1:18-cv-10656

Rothschild Digital Confirmation LLC v. Fingent Corp

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:18-cv-10656, D. Mass., 04/04/2018
  • Venue Allegations: Plaintiff alleges venue is proper in the District of Massachusetts because Defendant has committed alleged acts of infringement in the district and maintains a regular and established place of business in Cambridge, Massachusetts.
  • Core Dispute: Plaintiff alleges that Defendant’s "Fingent ReachOut Suite" field service software infringes a patent related to a device for capturing digital images and securely embedding verifiable metadata, such as user identity, location, and time.
  • Technical Context: The technology provides a method for creating authenticated digital records, where an image is cryptographically bound to contextual data, a function with applications in compliance, evidence gathering, and field service verification.
  • Key Procedural History: An Inter Partes Review (IPR) proceeding (IPR2015-00624) concluded approximately two months before this complaint was filed. The IPR resulted in the cancellation of claims 27, 28, 38, and 39 of the asserted patent. The cancellation of independent method claim 27 may narrow the scope of the dispute to the infringement of the asserted independent device claim, Claim 1.

Case Timeline

Date Event
2004-11-29 '872 Patent Priority Date
2008-11-25 '872 Patent Issue Date
2015-01-26 IPR Filed for '872 Patent (IPR2015-00624)
2018-01-30 Date of Communication Regarding Accused Product's Encryption
2018-02-08 '872 Patent IPR Certificate Issued, Cancelling Claims 27, 28, 38, and 39
2018-04-04 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 7,456,872 - "Device and method for embedding and retrieving information in digital images," issued November 25, 2008

The Invention Explained

  • Problem Addressed: The patent identifies the difficulty in organizing and associating contextual information with digital images and notes a "critical need" for a system to securely capture images with verifiable time, location, and user identification data to authenticate the activities of a user (’872 Patent, col. 1:47-54, col. 2:59-65).
  • The Patented Solution: The invention is a "Locational Image Verification Device" (LIVD) that captures a digital image and associates it with metadata. The device integrates several key modules: a user verification module to confirm the operator's identity, a locational module (e.g., GPS) to determine the device's position, a date and time module, and an encryption module to secure the image and its associated metadata, preventing tampering (’872 Patent, Abstract; Fig. 2). This creates a verifiable, tamper-resistant digital record of an event at a specific time and place by a specific person (’872 Patent, col. 14:38-54).
  • Technical Importance: The technology aimed to provide a trusted method for creating digital evidence, where the authenticity of an image and its associated context (who, where, when) could be reliably established for commercial or official purposes (’872 Patent, col. 2:62-65).

Key Claims at a Glance

  • The complaint asserts infringement of "at least claim 1" of the ’872 patent (Compl. ¶35, 43). Claim 1 is one of two independent claims in the originally issued patent (Compl. ¶21).
  • The essential elements of independent Claim 1 are:
    • A "user verification module" for verifying a user's identity, which enables device operation and provides an "assignment" to the user.
    • A "capture module" for capturing an image related to the "assignment", where the user's identity is verified "at a time of the image capture".
    • A "locational information module" for determining the device's location when capturing the image.
    • A "date and time module" for determining the date and time of the image capture.
    • A "processing module" for associating the "assignment", user identity, location, and time/date with the digital image file.
    • An "encryption module" for encrypting the image file and associated information "upon image capture".

III. The Accused Instrumentality

Product Identification

The "Fingent ReachOut Suite," which the complaint characterizes as a software application ("ReachOut app") installed on a mobile device (Compl. ¶24).

Functionality and Market Context

The ReachOut Suite is described as field service management software (Compl. ¶24, fn. 2). According to the complaint, it allows users (e.g., field technicians) to log in to an app to verify their identity (Compl. ¶25), receive job assignments (Compl. ¶26), use the mobile device's camera to capture photos related to their work (Compl. ¶27), and associate those photos with location and time data (Compl. ¶28). The complaint alleges this data is encrypted before being sent to a back office (Compl. ¶30). The complaint provides a screenshot of a communication from a representative of the Accused Product confirming that on-device encryption is an option on certain versions of the software (Compl. p. 7).

IV. Analysis of Infringement Allegations

'872 Patent Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
a user verification module for verifying an identity of a user of the device, wherein upon verification, the user verification module enables operation of the device and provides an assignment to the user The ReachOut application requires user login details to verify identity, which enables operation and provides the job assigned to the user. ¶25, 26 col. 5:28-31
a capture module for capturing an image relating to the assignment and creating a digital image file, wherein the user verification module verifies the identity of the user of the device at a time of the image capture The mobile device's camera captures a photo documenting a finished job, with user identity verified via the login page before the photo is captured. ¶27 col. 4:13-17
a locational information module for determining a location of the device when capturing the image Location services in the mobile device determine the location where the finished job photo is captured. ¶28 col. 5:52-56
a date and time module for determining a date and time of the image capture The mobile device's internal clock determines the date and time of the photo, which is stored in the image properties. ¶28 col. 6:4-8
a processing module for associating the assignment, the user identity, location information and the time and date to the digital image file The mobile device's processor associates the current assignment, user identity, location, and time/date with the photo's digital image file. ¶29 col. 3:51-54
an encryption module for encrypting the digital image file and associated information upon image capture An encryption module in the ReachOut app encrypts the captured photo and associated data before sending it to the back office. ¶30 col. 6:31-35
  • Identified Points of Contention:
    • Scope Questions: Claim 1 requires a "user verification module" that both "enables operation" and "provides an assignment." A question for the court may be whether a standard application login and a separate task list function together meet this integrated limitation as described in the patent.
    • Technical Questions: The claim requires user identity to be verified "at a time of the image capture". The complaint alleges verification occurs via login "before capturing the photo" (Compl. ¶27). This raises the question of whether a one-time login for a session satisfies this temporal requirement, or if the claim requires a more contemporaneous verification event tied to the image capture itself, as described in certain patent embodiments (’872 Patent, col. 14:30-32).
    • Technical Questions: The claim requires an encryption module that encrypts the image and data "upon image capture". The complaint's evidence suggests "on-device encryption" is an "option" for an "Enterprise version" of the accused product (Compl. p. 7). This raises factual questions about whether this functionality is universally present and whether encryption performed "before sending to back office" (Compl. ¶30) is functionally equivalent to the claimed "upon image capture."

V. Key Claim Terms for Construction

  • The Term: "at a time of the image capture"

  • Context and Importance: This phrase sets a critical temporal condition for when the user's identity must be verified relative to the act of taking a picture. Its construction will determine whether a single login at the start of a user session is sufficient to meet the claim, or if a more immediate, recurring verification is needed.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The claim language does not specify a maximum duration between verification and capture, which could support an interpretation where verification within the same operational session is sufficient.
    • Evidence for a Narrower Interpretation: The specification describes an embodiment where a user may be "asked to use the user verification module 132 to re-verify the user's identity at the time of image capture" and that the device might only give the user a "certain time interval to use the capture module" after verification, suggesting a tight temporal link (’872 Patent, col. 14:30-35).
  • The Term: "assignment"

  • Context and Importance: The "assignment" is a central element that the claimed device captures, verifies, and associates with an image. Practitioners may focus on this term because its definition will clarify whether it covers any generic task or is limited to the structured, pre-loaded missions described in the patent's detailed examples.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The term is not explicitly defined in the patent, which may support giving it a broad, plain, and ordinary meaning that could encompass any task assigned to a user.
    • Evidence for a Narrower Interpretation: The specification repeatedly uses "assignment" in the context of specific, pre-loaded information, such as a field agent receiving "geographic directions to his specific assignments" from a supervisor via the device (’872 Patent, col. 14:10-20, Fig. 8). This may support a narrower construction limited to such structured, pre-defined tasks.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges inducement of infringement, stating that Defendant encourages its customers to use the Accused Product in an infringing manner through its marketing and by specifically intending for customers to use the software on mobile devices (Compl. ¶43).
  • Willful Infringement: The complaint does not plead a separate count for willfulness but seeks "enhanced damages" in the prayer for relief (Compl. p. 10, ¶5). The factual allegations assert knowledge of infringement "at least as of the service of the present complaint," which supports a claim for post-suit willfulness (Compl. ¶34, 42).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of claim construction and temporal scope: can the requirement to verify a user's identity "at a time of the image capture" be satisfied by a single login at the start of a software session, or does the patent demand a more immediate re-authentication tied to the specific moment of image capture?
  • A key evidentiary question will be one of infringing functionality: does the accused product’s encryption feature operate "upon image capture" for all users as claimed, or is it, as the complaint's own evidence suggests, an optional feature limited to certain product tiers, a fact that could affect the scope of direct infringement by Defendant's customers?
  • A central dispute will likely involve inducement of infringement: given that the asserted claim is a device claim and the accused product is software, the case will turn on whether Plaintiff can prove Defendant's customers' use of the ReachOut app on mobile hardware directly infringes Claim 1, and that Defendant knowingly encouraged this specific infringing configuration and use.