1:25-cv-03866
Auth Token LLC v. Citizens Financial Group Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Auth Token LLC (Delaware)
- Defendant: Citizens Financial Group, Inc. (Delaware)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 1:25-cv-03866, S.D.N.Y., 05/08/2025
- Venue Allegations: Venue is asserted based on Defendant having an established place of business in the district, having committed alleged acts of infringement in the district, and Plaintiff having suffered harm there.
- Core Dispute: Plaintiff alleges that Defendant’s products and services infringe a patent related to a method for securely personalizing an authentication token.
- Technical Context: The technology concerns secure, a two-factor authentication, specifically the process of provisioning a hardware or software token with the secret keys necessary for it to generate one-time passwords.
- Key Procedural History: The complaint does not mention any prior litigation, inter partes review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event | 
|---|---|
| 2002-05-10 | '212 Patent Priority Date (via GB 0210692.0) | 
| 2010-12-27 | '212 Patent Application Filing Date | 
| 2013-02-12 | U.S. Patent No. 8,375,212 Issues | 
| 2025-05-08 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,375,212 - "Method for personalizing an authentication token", Issued February 12, 2013
The Invention Explained
- Problem Addressed: The patent describes the security risks of single-factor authentication (e.g., passwords alone) and the corresponding need for stronger, dual-factor systems that combine "something you know" with "something you have" (e.g., a physical token) (’212 Patent, col. 1:20-40). It notes that deploying dedicated authentication tokens can be costly and seeks a way to leverage existing, widely distributed smart cards (such as bank-issued credit/debit cards) for this purpose (’212 Patent, col. 3:20-28).
- The Patented Solution: The invention is a specific, one-time method for securely provisioning a generic token (like a smart card) with secret cryptographic data, thereby "personalizing" it for a user. A "personalization device" and the token first establish a secure, temporary communication channel using a shared "transport key" (’212 Patent, col. 7:7-12). Over this encrypted channel, the personalization device sends an "initial secret key" and an "initial seed value" to the token, which stores them permanently. Once this process is complete, the token exits "personalization mode" forever and can then be used in "normal mode" to generate secure passwords for authentication (’212 Patent, col. 11:1-12:8).
- Technical Importance: This method allows organizations to add strong authentication functionality to existing, mass-produced smart cards after they have been manufactured, potentially reducing the cost and logistical complexity of deploying a secure authentication system (’212 Patent, col. 3:20-28).
Key Claims at a Glance
- The complaint asserts "one or more claims" and references "Exemplary '212 Patent Claims" in an external exhibit not filed with the court (Compl. ¶11, ¶13). The sole independent claim is Claim 1.
- Independent Claim 1 recites a method with the essential steps of:- An authentication token entering a "personalization mode."
- A "personalization device" requesting a serial number from the token.
- The personalization device encrypting the serial number with a "personalization key" and sending it back to the token.
- The token decrypting the serial number to validate that the personalization key is correct.
- Establishing an "encrypted session" between the token and the device using a "transport key."
- The personalization device sending an "initial seed value" and an "initial secret key" to the token over the encrypted session.
- The token storing the initial seed value and secret key, after which it can "no longer enter the personalization mode."
 
- The complaint does not specify any dependent claims but reserves the right to assert them.
III. The Accused Instrumentality
Product Identification
The complaint does not identify any specific accused products, methods, or services by name. It refers generally to "Exemplary Defendant Products" that are identified in charts within an external "Exhibit 2," which was not filed with the complaint (Compl. ¶11, ¶13).
Functionality and Market Context
The complaint does not provide sufficient detail for analysis of the accused instrumentality's functionality or market context.
IV. Analysis of Infringement Allegations
The complaint alleges direct infringement by incorporating by reference external claim charts (Exhibit 2), which were not provided with the filed document (Compl. ¶13-14). As such, a detailed claim chart summary cannot be constructed. The infringement theory appears to be that Defendant's systems for provisioning customer authentication credentials practice the method of the ’212 Patent (Compl. ¶11). No probative visual evidence provided in complaint.
- Identified Points of Contention:- Scope Questions: A central question will be whether the accused systems, which are likely server-based software processes for managing digital credentials, fall within the scope of the patent's claims. For example, does the term "authentication token," which the patent specification consistently describes as a physical smart card with a microchip, read on a mobile banking application or a software-based authenticator? (’212 Patent, col. 4:56-67; FIG. 1). Similarly, what component of Defendant's infrastructure constitutes the claimed "personalization device"?
- Technical Questions: An evidentiary question will be whether Plaintiff can prove that Defendant's processes perform the specific, ordered cryptographic steps recited in Claim 1. For example, the claim requires establishing a temporary "transport key" for the express purpose of transferring the "initial secret key" and "initial seed value" (’212 Patent, col. 11:13-21). The case may turn on whether Defendant's system architecture includes this specific two-step key exchange mechanism or uses a different security protocol.
 
V. Key Claim Terms for Construction
- The Term: "authentication token" - Context and Importance: The construction of this term is critical to determining the scope of the patent. Practitioners may focus on this term because the patent's viability against a modern financial institution likely depends on whether the term can cover software-based authenticators in addition to the physical smart cards described in the specification.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The term itself is technologically neutral. Plaintiff may argue that any system or device component that receives and stores secret keys for later use in authentication meets the functional definition of a "token."
- Evidence for a Narrower Interpretation: The specification consistently and repeatedly describes the "authentication token" as a "smart card" (’212 Patent, col. 1:13, 3:10), detailing its physical components like a "microchip," "ROM," and "EEPROM" (’212 Patent, col. 4:65-67; FIG. 1). This consistent description may support a narrower construction limited to physical hardware.
 
 
- The Term: "personalization device" - Context and Importance: This term defines the entity that securely provisions the "authentication token". Its construction is important because infringement requires showing that Defendant uses a system that qualifies as a "personalization device".
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: Plaintiff may argue that any server or system that executes the claimed programming steps—requesting a serial number, establishing a secure channel, and transmitting initial keys—is a "personalization device", regardless of its physical form.
- Evidence for a Narrower Interpretation: The patent describes the "personalization device" and the "authentication token" as two distinct entities communicating with each other (’212 Patent, FIG. 2; col. 6:25-31). Defendant may argue this implies a system architecture with at least two separate components performing these roles, potentially precluding a finding of infringement by a single, monolithic software system.
 
 
VI. Other Allegations
- Willful Infringement: The complaint does not allege facts to support a claim for willful infringement, such as pre-suit knowledge of the patent. However, the prayer for relief requests that the case be declared "exceptional" under 35 U.S.C. § 285, which provides for an award of attorneys' fees (Compl., Prayer for Relief ¶E.i).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the claim terms "authentication token" and "personalization device", which are rooted in the patent's disclosure of physical smart card hardware, be construed broadly enough to read on the modern, likely software-based, authentication and credentialing systems used by a large financial institution?
- A key evidentiary question will be one of procedural and technical mapping: assuming the definitional scope is met, can Plaintiff produce evidence from discovery showing that Defendant’s systems perform the specific, sequential cryptographic protocol recited in Claim 1, particularly the two-stage process of using a "personalization key" to authenticate and then a "transport key" to transfer secret data?