1:23-cv-11351
Alto Dynamics LLC v. Wayfair LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Alto Dynamics, LLC (Georgia)
- Defendant: Wayfair LLC (Delaware)
- Plaintiff’s Counsel: Rozier Hardt McDonough PLLC
- Case Identification: 1:22-cv-00829, W.D. Tex., 08/12/2022
- Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Defendant maintains regular and established places of business in the district, including facilities in Austin and San Antonio, and has committed acts of patent infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s e-commerce websites and associated backend systems infringe six patents related to database query methods, user activity monitoring, and stateless user authentication.
- Technical Context: The patents relate to foundational web technologies for managing data, tracking user behavior for personalization, and authenticating users in distributed computing environments.
- Key Procedural History: The complaint does not mention any prior litigation, inter partes review proceedings, or licensing history related to the asserted patents.
A. Case Timeline
| Date | Event |
|---|---|
| 2000-02-09 | Priority Date for U.S. Patent No. 6,604,100 |
| 2001-04-19 | Priority Date for U.S. Patent Nos. 7,657,531; 8,051,098; RE46,513 |
| 2001-12-21 | Priority Date for U.S. Patent Nos. 7,152,018; 7,392,160 |
| 2003-08-05 | U.S. Patent No. 6,604,100 Issued |
| 2006-12-19 | U.S. Patent No. 7,152,018 Issued |
| 2008-06-24 | U.S. Patent No. 7,392,160 Issued |
| 2010-02-02 | U.S. Patent No. 7,657,531 Issued |
| 2011-11-01 | U.S. Patent No. 8,051,098 Issued |
| 2016-01-01 | Defendant allegedly began doing business in Texas |
| 2017-08-15 | U.S. Patent No. RE46,513 Issued |
| 2022-08-12 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
A. U.S. Patent No. 6,604,100, "Method For Converting Relational Data Into A Structured Document," issued August 5, 2003
The Invention Explained
- Problem Addressed: The patent describes the technical challenge of automatically converting data stored in traditional flat, tabular relational databases into the nested, structured format of XML (eXtensible Markup Language) (ʼ100 Patent, col. 1:38-44). This is difficult because the structure of relational databases is often proprietary and does not directly match the public, standardized structures (Document Type Definitions or DTDs) required for data exchange between different applications (ʼ100 Patent, col. 1:45-54).
- The Patented Solution: The invention proposes a system, referred to as "SilkRoute," that acts as a middleware to solve this problem efficiently (ʼ100 Patent, Abstract). It allows an administrator to define a virtual XML "view" of the relational data using a special query language (RXL) (ʼ100 Patent, col. 3:15-19). An application can then send a query (e.g., in XML-QL) against this virtual view. The system composes the view definition and the user query to generate a new, optimized query that is translated into standard SQL. This SQL query is then sent to the relational database, ensuring that only the specific data requested by the user is retrieved and converted to XML, rather than having to materialize the entire XML document (ʼ100 Patent, FIG. 1).
- Technical Importance: This approach provided a general, dynamic, and efficient method for making vast stores of legacy relational data available for modern XML-based web applications without requiring costly data migration or inefficient, full-database conversions (ʼ100 Patent, col. 1:33-37).
Key Claims at a Glance
- Asserted Independent Claim: 1
- Claim 1 Elements:
- A method for converting relational data from a relational database into a structured document, comprising the steps of:
- storing a view query that defines a structured document view of the relational database, a structure of the view query being independent of a structure of data in the relational database;
- receiving a user query against the structured document view;
- forming an executable query by determining a composition of the view query and the user query;
- partitioning the executable query into a data extraction portion and a construction portion;
- transmitting the data extraction portion to the relational database;
- receiving at least one tuple stream from the relational database according to the data extraction portion; and
- merging the at least one tuple stream and the construction portion to generate a structured document, wherein the structured document view is capable of defining a document of arbitrary nesting depth.
B. U.S. Patent No. 7,152,018, "System And Method For Monitoring Usage Patterns," issued December 19, 2006
The Invention Explained
- Problem Addressed: The patent addresses the use of "cookies" for tracking user activity on the internet (ʼ018 Patent, col. 1:33-39). It notes that while cookies using unique user identifiers are common for personalization, this practice can be undesirable because it reduces user anonymity and creates computational and storage burdens for processing large histories of user data tied to single identifiers (ʼ018 Patent, col. 2:6-19).
- The Patented Solution: The invention proposes a method for monitoring usage patterns using a "state object" (e.g., a cookie) that contains a "profile representative of user usage" rather than just a unique ID (ʼ018 Patent, Abstract). This state object is stored on the client's machine. With each subsequent interaction, the client sends the state object to the server. A key aspect of the invention is that the profile is modified "by one of one or more scripts within or included in information/resources provided to the client location by the central server, and one or more programs executed at the client location, thus precluding manipulation of the profile by the server" (ʼ018 Patent, col. 6:63-col. 7:1). This client-side modification updates the profile to reflect user interactions, creating a dynamic record of usage patterns.
- Technical Importance: This method allows for the creation of aggregate user profiles for marketing and content targeting without necessarily relying on unique, personally identifiable user tracking, thereby addressing some of the privacy and efficiency concerns of prior art systems (ʼ018 Patent, col. 2:6-14).
Key Claims at a Glance
- Asserted Independent Claim: 1
- Claim 1 Elements:
- A method of monitoring user usage patterns of a system, comprising the steps of:
- providing at least one state object, the object including a profile representative of user usage;
- storing the state object at a client location;
- passing, to a central server, the state object with each subsequent interaction initiation; and
- receiving, from the central server, the state object along with the response of the central server,
- wherein the profile is modified, to reflect the interaction between the client location and the central server, by one of one or more scripts within or included in information/resources provided to the client location by the central server, and one or more programs executed at the client location, thus precluding manipulation of the profile by the server.
C. Multi-Patent Capsules
Patent Identification: U.S. Patent No. 7,392,160, "System And Method For Monitoring Usage Patterns," issued June 24, 2008
- Technology Synopsis: This patent is related to the ʼ018 Patent and describes a similar method for monitoring user usage patterns with a state object containing a user profile. A distinguishing feature is the explicit step where the central server "audits the state object/profile passed to it, and performs analysis on the audited profile in order to direct services and/or information suited to the profile to the client location" (ʼ160 Patent, Claim 1).
- Asserted Claims: At least Claim 1 (Compl. ¶54).
- Accused Features: The complaint accuses Defendant's deployment of cookies to monitor user usage patterns, audit user profiles, and use that analysis to direct targeted content and services to users (Compl. ¶¶53, 55).
Patent Identification: U.S. Patent No. 7,657,531, "Systems And Methods For State-Less Authentication," issued February 2, 2010
- Technology Synopsis: This patent addresses state-less user authentication in a distributed computing environment. The invention provides a method for enabling access to a resource by using a "security-context" that is provided to the user. A key feature is the ability to renew an expired security-context by comparing a renewal request with stored user identity and authorization information and generating an updated security-context (ʼ531 Patent, Abstract).
- Asserted Claims: At least Claim 1 (Compl. ¶71).
- Accused Features: The complaint alleges infringement by systems that enable user access to Wayfair's servers using a security context, and specifically accuses the "renewal of cookies after their expiration" (Compl. ¶¶70, 72).
Patent Identification: U.S. Patent No. 8,051,098, "Systems And Methods For State-Less Authentication," issued November 1, 2011
- Technology Synopsis: This patent, related to the ʼ531 Patent, describes a method for accessing multiple, disparate resources without requiring repeated authorization. The invention involves establishing a secure communication session between a user device and a logon component, which verifies the user's logon information and in response generates a unique "security context" for that user device, which can then be used to access resources without further communication with the logon component (ʼ098 Patent, Abstract).
- Asserted Claims: At least Claim 1 (Compl. ¶83).
- Accused Features: The complaint accuses the "single login process" on Wayfair's websites that allows users to access multiple domains after one authentication event (Compl. ¶¶82, 84).
Patent Identification: U.S. Patent No. RE46,513, "Systems And Methods For State-Less Authentication," issued August 15, 2017
- Technology Synopsis: This patent, a reissue of a patent in the same family as the ʼ531 and ʼ098 patents, describes a processing system for state-less authentication. The system includes a communication device, an information database, and a logon component. The logon component receives logon information during a secure session, verifies it against the database, and generates a "security context" that it provides to the user's device for subsequent access requests (ʼ513 Patent, Abstract).
- Asserted Claims: At least Claim 16 (Compl. ¶95).
- Accused Features: The complaint accuses Wayfair's systems that "employ of secure communication sessions" to receive and verify logon information and generate security contexts for users (Compl. ¶¶94, 96).
III. The Accused Instrumentality
A. Product Identification
The accused instrumentalities are Defendant's websites, including www.wayfair.com and www.aboutwayfair.com, along with the "associated hardware, software, and functionality" that operate them (Compl. ¶16).
B. Functionality and Market Context
The complaint alleges the accused instrumentalities provide a range of e-commerce and corporate functionalities. These include allowing users to view, search, save, and purchase items; tracking user activities and preferences, allegedly through the use of cookies; providing user authentication through login processes and secured sessions; employing internal analytics; and delivering customized advertisements and product placements (Compl. ¶16). The complaint provides a screenshot of Wayfair's Cookie Policy, which describes its use of cookies for functions like remembering items in a shopping cart and for advertising purposes (Compl. ¶16; Ex. J).
IV. Analysis of Infringement Allegations
A. U.S. Patent No. 6,604,100 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| storing a view query that defines a structured document view of the relational database... | Wayfair stores a view query that defines a structured document view of its relational database. | ¶26 | col. 3:15-19 |
| receiving a user query against the structured document view; | Wayfair's systems receive a user query against the structured document view. | ¶26 | col. 3:20-25 |
| forming an executable query by determining a composition of the view query and the user query; | Wayfair's systems form an executable query by determining a composition of the view query and the user query. | ¶26 | col. 4:48-53 |
| partitioning the executable query into a data extraction portion and a construction portion; | The systems partition the executable query into a data extraction portion and a construction portion. | ¶26 | col. 5:26-30 |
| transmitting the data extraction portion to the relational database; | The data extraction portion is transmitted to the relational database. | ¶26 | col. 5:36-40 |
| receiving at least one tuple stream from the relational database according to the data extraction portion; | The systems receive at least one tuple stream from the relational database. | ¶26 | col. 5:40-42 |
| and merging the at least one tuple stream and the construction portion to generate a structured document... | The tuple stream and construction portion are merged to generate a structured document. | ¶26 | col. 5:43-47 |
- Identified Points of Contention:
- Scope Questions: A central question may be whether a typical user's interaction with the Wayfair e-commerce website (e.g., clicking on a product category) constitutes "receiving a user query against the structured document view" as that term is used in the patent. The patent specification appears to contemplate a more formal query submitted in a specific language like XML-QL, raising the question of whether browsing actions meet this limitation (ʼ100 Patent, col. 3:22-23).
- Technical Questions: The complaint alleges in a conclusory manner that Wayfair's systems perform each step of the claimed method, including "forming an executable query by determining a composition of the view query and the user query." The case may turn on what evidence shows that Wayfair's backend architecture actually performs this specific "composition" step, as opposed to using other conventional methods for retrieving data to populate a webpage.
B. U.S. Patent No. 7,152,018 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| providing at least one state object, the object including a profile representative of user usage; | Wayfair provides at least one state object (e.g., a cookie) that includes a profile of user usage. | ¶38 | col. 2:21-24 |
| storing the state object at a client location; | The state object is stored at a client location (e.g., in a user's browser). | ¶38 | col. 2:24-25 |
| passing, to a central server, the state object with each subsequent interaction initiation; | The state object is passed to a central Wayfair server with each subsequent user interaction. | ¶38 | col. 2:25-28 |
| and receiving, from the central server, the state object along with the response of the central server, | The state object is received back from the server along with the server's response. | ¶38 | col. 2:28-31 |
| wherein the profile is modified... by one of one or more scripts within or included in information/resources provided to the client location by the central server, and one or more programs executed at the client location, thus precluding manipulation of the profile by the server. | The profile is modified by scripts or programs at the client location, which precludes manipulation by the server. The complaint alleges this occurs at least during internal testing by employees or through Wayfair's direction and control of its customers. | ¶38 | col. 2:63-col. 3:1 |
- Identified Points of Contention:
- Technical Questions: The final limitation requires that the user profile is modified by scripts or programs "executed at the client location," and that this method "preclud[es] manipulation of the profile by the server." A key technical question will be whether Wayfair's system actually performs profile modification on the client side. Many web applications modify cookies and user profiles via server-side logic, which would appear to be the opposite of what is claimed.
- Scope Questions: The complaint's allegation that this limitation is met "at least during testing of the relevant functionality by Defendant's employees" and "by virtue of Defendant's direction and control of customers" raises the question of whether such limited or directed actions can satisfy a method claim that describes the standard operation of a system (Compl. ¶38).
V. Key Claim Terms for Construction
A. For the ’100 Patent
- The Term: "user query against the structured document view"
- Context and Importance: This term is central to the infringement analysis. The defendant will likely argue its system does not receive a "user query" in the formal sense, but rather receives standard HTTP requests as a user navigates a website. The construction of this term will determine whether routine e-commerce interactions fall within the scope of the claims.
- Intrinsic Evidence for Interpretation:
- Evidence for a Narrower Interpretation: The patent specification repeatedly uses the example of "XML-QL" as the language for the user query (ʼ100 Patent, col. 3:22; Abstract). This suggests the term may be limited to a structured, declarative query submitted in a specific format, not general web browsing.
- Evidence for a Broader Interpretation: The patent describes the invention as a "general, dynamic, and efficient tool for viewing and querying relational data in XML" (ʼ100 Patent, col. 2:31-33). This broader framing could support an interpretation where any user action that results in a request for data from the underlying database could be considered a "query" against the "view" presented by the website.
B. For the ’018 Patent
- The Term: "precluding manipulation of the profile by the server"
- Context and Importance: This negative limitation appears to be a critical point of novelty. The patent distinguishes itself by describing a client-side profile modification mechanism. If Wayfair's systems modify user profiles on the server, as is common, it would suggest non-infringement. Practitioners may focus on this term because it defines a specific technical architecture that the complaint must prove the accused system practices.
- Intrinsic Evidence for Interpretation:
- Evidence for a Narrower Interpretation: The claim language requires that the modification is performed by scripts or programs "executed at the client location," and that this action is what "preclud[es]" server-side manipulation. The specification reinforces this, stating that modification is "effected by one or more scripts... provided to the client location... thus precluding manipulation of the profile by the server" (ʼ018 Patent, col. 2:63-col. 3:1). This strongly suggests the inventive step is the relocation of modification logic from the server to the client.
- Evidence for a Broader Interpretation: A plaintiff might argue that "precluding manipulation" does not require that server-side manipulation be technically impossible, but only that the ordinary and intended operation of the system relies on the client-side script for modification. However, the claim's structure—linking the preclusion to the client-side execution—may make such an argument difficult.
VI. Other Allegations
- Indirect Infringement: For the ʼ018 patent and others, the complaint alleges induced infringement by "advising or directing personnel, contractors, or end-users to make or use the Accused Instrumentalities in an infringing manner" and by "distributing instructions" (Compl. ¶39). Contributory infringement is alleged on the basis that the accused systems have "special features that are specially designed to be used in an infringing way and that have no substantial uses other than" infringing (Compl. ¶40).
- Willful Infringement: The complaint alleges willfulness based on two theories. First, it alleges post-suit willfulness, stating Defendant had knowledge of the patents "at least as of the date when it was notified of the filing of this action" (Compl. ¶41). Second, it alleges pre-suit willfulness through willful blindness, claiming on "information and belief" that Defendant has a "policy or practice of not reviewing the patents of others" (Compl. ¶42).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the term "user query against the structured document view" from the ʼ100 patent, which is described in the context of formal query languages like XML-QL, be construed to cover a consumer's general browsing and clicking on an e-commerce website?
- A second key issue will be one of technical operation: for the user monitoring patents (ʼ018 and ʼ160), does the complaint provide a factual basis to believe that Wayfair’s system modifies user profiles via client-side scripts in a manner that "preclud[es] manipulation of the profile by the server," as the claims require, or do its systems use conventional server-side logic?
- A third central question will be one of architectural equivalence: for the state-less authentication patents (ʼ531, ʼ098, RE46,513), what evidence supports the allegation that Wayfair's standard user login and session cookie management systems implement the specific "security context" generation, verification, and renewal architecture described in the patents?