2:17-cv-07305
Vanadium LLC v. Campmor Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Venadium LLC (Texas)
- Defendant: Campmor, Inc. (New Jersey)
- Plaintiff’s Counsel: Zimmerman Law Group; Corcoran IP Law, PLLC
 
- Case Identification: 2:17-cv-07305, D.N.J., 09/20/2017
- Venue Allegations: Venue is alleged to be proper in the District of New Jersey because the defendant is a New Jersey corporation with an established place of business in the district.
- Core Dispute: Plaintiff alleges that Defendant’s e-commerce website infringes a patent related to methods for protecting computer software from unauthorized use via digitally signed authorization messages.
- Technical Context: The technology at issue falls within the domain of digital rights management (DRM) and software licensing, specifically concerning systems to control software functionality based on remote authorization.
- Key Procedural History: The complaint does not reference any prior litigation, inter partes review (IPR) proceedings, or specific licensing history concerning the patent-in-suit.
Case Timeline
| Date | Event | 
|---|---|
| 1997-10-30 | '549 Patent Priority Date | 
| 2001-12-11 | '549 Patent Issue Date | 
| 2017-09-20 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,330,549 - “Protected Shareware”
Issued December 11, 2001
The Invention Explained
- Problem Addressed: The patent addresses the challenge of protecting computer software, particularly informally distributed "shareware," from unauthorized use without resorting to physically restrictive or inconvenient measures like hardware "dongles" or traditional copy protection schemes ( Compl. ¶7; ’549 Patent, col. 1:11-36). The goal was to create a cost-effective, built-in mechanism for software suppliers to enforce compensation expectations (’549 Patent, col. 1:57-65).
- The Patented Solution: The invention proposes a system where an executable program contains "protective code" that controls its functionality. This code communicates with a trusted remote entity (e.g., a "billing agency") to manage user authorization (’549 Patent, col. 2:38-44). The program's functionality is limited until it receives a digitally signed "authorization message" from the trusted source. The program contains a public key to verify the message's authenticity and an "integrity self-checking routine" to ensure the protective code itself has not been tampered with (’549 Patent, col. 2:44-56; Fig. 1).
- Technical Importance: This approach aimed to provide a more flexible and robust software protection model than simple encryption, allowing for dynamic, network-based authorization suitable for the shareware distribution model.
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" without specifying which ones (Compl. ¶9). The analysis below focuses on the first independent claim, Claim 1.
- Independent Claim 1:- inhibiting via embedded protective code at least one functional feature of a computer program from running on a user computer until the user computer receives an authorization message that is digitally signed by an authorized party using a secret signing key;
- providing the embedded protective code with access to the corresponding public checking key;
- running an integrity self-check over the computer program to confirm it is in an anticipated state;
- communicating the authorization message to the user computer;
- applying the public checking key to the authorization message for authenticating it; and
- enabling the functional feature if the message is authenticated and the integrity self-check confirms the program is in the anticipated state.
 
- The complaint reserves the right to modify its infringement theories as discovery progresses (Compl. ¶15).
III. The Accused Instrumentality
Product Identification
The accused instrumentality is Defendant's website, https://www.campmor.com/ (Compl. ¶10).
Functionality and Market Context
The complaint identifies the accused product as a website through which Defendant "makes, uses, sells, offers for sale, or imports one or more products" that allegedly infringe (Compl. ¶9, ¶12). No specific technical features or operational details of the website are described in the complaint. The complaint does not provide sufficient detail for analysis of the website's specific allegedly infringing functionality or its market positioning. No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint does not provide an element-by-element breakdown of its infringement theory or include the referenced Exhibit B containing claim charts (Compl. ¶14, ¶15). A claim chart summary is therefore not possible. The infringement theory must be inferred from the identification of the patent and the accused website. The plaintiff's theory appears to be that the server-side and/or client-side code of the Campmor website constitutes the claimed "computer program," and that certain interactions, such as a user logging in or completing a transaction, function as the claimed "authorization message" that "enables" a "functional feature" of the website.
- Identified Points of Contention:- Scope Questions: A primary issue will be whether the term "computer program," as used in the patent in the context of "shareware" and installed software, can be construed to cover the distributed, server-client architecture of a modern e-commerce website (’549 Patent, col. 1:11, col. 1:50-52). A related question is whether standard web protocols for user authentication (e.g., session cookies, login confirmations) meet the specific definition of a digitally signed "authorization message" as contemplated by the patent (’549 Patent, col. 2:41-49).
- Technical Questions: A key factual question is what evidence the plaintiff can provide that the accused website performs an "integrity self-check" to confirm that its own code is in an "anticipated state," as required by Claim 1 (’549 Patent, col. 8:52-54). The complaint provides no factual allegations to support the existence of this claimed function within the accused website.
 
V. Key Claim Terms for Construction
- The Term: "computer program" 
- Context and Importance: The applicability of the patent to the accused website hinges on this term's scope. Practitioners may focus on this term because the patent repeatedly frames the invention in the context of "shareware," "executable computer programs," and software that is "installed," which may suggest a standalone application rather than a web-based service. - Evidence for a Broader Interpretation: The defense may argue for the plain and ordinary meaning, suggesting any set of computer-executable instructions, including website code, falls within the term's scope.
- Evidence for a Narrower Interpretation: The patent’s consistent use of "shareware" (’549 Patent, Abstract; col. 1:50), "executable computer program" (col. 1:14), and discussion of distribution models where users "install" programs may support a narrower construction limited to local, installable software applications (’549 Patent, col. 2:21-22).
 
- The Term: "authorization message that is digitally signed" 
- Context and Importance: This term is critical because infringement requires a specific cryptographic process. The dispute may turn on whether a standard website login confirmation or session token can be considered a "digitally signed" message in the manner claimed. - Evidence for a Broader Interpretation: A plaintiff might argue that modern secure communication protocols (e.g., within TLS/SSL) that implicitly authenticate a server can satisfy this limitation.
- Evidence for a Narrower Interpretation: The patent describes a specific protocol where a message is signed with a "secret signing key" and verified by the program using a "public checking key" to authenticate the message's origin and integrity, a process distinct from general secure session establishment (’549 Patent, col. 2:41-49; col. 8:49-51).
 
- The Term: "integrity self-check" 
- Context and Importance: This is a distinct technical requirement of the claim. Infringement cannot be found without evidence of this step. The complaint’s lack of factual allegations on this point makes the term's construction and its application to the accused product a central issue. - Evidence for a Broader Interpretation: A plaintiff might argue that any standard file or code integrity check performed by a web server or browser could meet this limitation.
- Evidence for a Narrower Interpretation: The patent specification describes this as a specific mechanism, such as a "check sum routine," embedded within the program to prevent tampering with the "protective code" itself, suggesting a function designed to protect against user modification of the program, not general operational checks (’549 Patent, col. 4:3-16; col. 8:52-54).
 
VI. Other Allegations
- Indirect Infringement: The complaint does not contain allegations of indirect or induced infringement. The single count is for direct infringement under 35 U.S.C. § 271(a) (Compl. ¶12).
- Willful Infringement: The complaint does not explicitly allege "willful infringement." However, it alleges that the defendant has had knowledge of infringement since being served with the complaint, which could form the basis for a future claim of post-filing willfulness (Compl. ¶16). The prayer for relief also requests a finding that the case is "exceptional" under 35 U.S.C. § 285, which allows for an award of attorneys' fees (Compl. Prayer ¶D).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: Can key claim terms like "computer program" and "authorization message," which are described in the patent in the specific context of protecting 1990s-era installable shareware, be construed broadly enough to read on the technical architecture and operation of a modern e-commerce website?
- A key evidentiary question will be one of technical proof: Can the plaintiff produce evidence that the accused website performs the specific, discrete functions required by the asserted claims, particularly the "integrity self-check" and the use of a "digitally signed" message for authorization, for which the complaint currently provides no factual support?