1:26-cv-00382
Cascade Systems LLC v. Shutterstock Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Cascade Systems LLC (New Mexico)
- Defendant: Shutterstock, Inc. (Delaware)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 1:26-cv-00382, S.D.N.Y., 01/15/2026
- Venue Allegations: Venue is based on Defendant maintaining an established place of business in the Southern District of New York.
- Core Dispute: Plaintiff alleges that Defendant’s digital media platform infringes a patent related to methods for managing file sharing and compensating content owners in a network environment.
- Technical Context: The dispute concerns the architecture of online digital content marketplaces, which facilitate the licensing and distribution of media like photos, videos, and music from creators to end-users.
- Key Procedural History: The complaint does not allege any significant procedural history, such as prior litigation or post-grant proceedings involving the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2005-03-14 | ’238 Patent Priority Date |
| 2007-05-24 | ’238 Patent Application Filing Date |
| 2010-06-15 | ’238 Patent Issue Date |
| 2026-01-15 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,739,238 - "Method of digital media management in a file sharing system,"
- Patent Identification: U.S. Patent No. 7,739,238, "Method of digital media management in a file sharing system," issued on June 15, 2010.
The Invention Explained
- Problem Addressed: The patent addresses the problem of illegal peer-to-peer (P2P) file sharing, which results in lost income for content creators and owners, and exposes users to risks such as computer viruses and malicious software ’238 Patent, col. 1:20-34
- The Patented Solution: The invention describes a method for operating a "legal" file-sharing network that compensates content owners and creators for each transaction ’238 Patent, Abstract The system provides incentives for users to share files, such as earning credits that can be redeemed for future downloads or merchandise, while ensuring that rights holders are paid a license fee for each exchange ’238 Patent, col. 1:40-52; FIG. 2 A key feature is the ability to track a file's chain of ownership to prevent the exchange of uncompensated files ’238 Patent, Abstract
- Technical Importance: The technology proposes a business and technical model to legitimize P2P file sharing, a dominant form of content distribution in the early 2000s that was beset by widespread copyright infringement claims ’238 Patent, col. 1:20-29
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" of the ’238 Patent, with specific claims identified in an exhibit not attached to the publicly filed complaint Compl. ¶¶11, 16-17 Independent claim 1 is representative of the patent's method claims.
- The essential elements of independent claim 1 include:
- Receiving a request from a first user computing device for a file.
- Searching for a second user computing device that possesses a copy of the file.
- Allowing the first user to download the file, provided the file does not have a tag indicating a "gap in ownership" where a content owner was not compensated.
- Processing a debit of an account corresponding to the first user.
- Processing a credit of an account corresponding to the second user.
- Processing a license fee to at least one content owner of the file.
III. The Accused Instrumentality
Product Identification
The complaint accuses "Exemplary Defendant Products" which it states are identified in charts incorporated by reference but not attached to the complaint Compl. ¶11
Functionality and Market Context
The complaint does not describe the specific functionality of the accused products. It alleges generally that Defendant makes, uses, sells, and imports infringing products Compl. ¶11 Shutterstock operates a commercial platform for licensing and downloading digital media, including images, videos, and music, from contributing artists and creators. The complaint alleges that these products practice the technology claimed by the ’238 Patent Compl. ¶16
No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint states that claim charts comparing the asserted claims to the accused products are provided in an "Exhibit 2" Compl. ¶16 As this exhibit was not included with the filed complaint, the specific infringement theory cannot be charted. The complaint’s narrative theory alleges that the "Exemplary Defendant Products practice the technology claimed by the '238 Patent" and "satisfy all elements of the Exemplary '238 Patent Claims" Compl. ¶16
- Identified Points of Contention: Based on the patent's focus and the nature of Defendant's business, the infringement analysis raises several questions.
- Scope Questions: A central question may be whether the patent's claims, which describe a transaction between a "first user computing device" and a "second user computing device," can be read to cover a centralized, client-server architecture. The defense may argue that Defendant's platform, where contributors upload content to a central server from which customers later download it, does not involve a search for and download from a "second user computing device" as required by the claim.
- Technical Questions: What evidence does the complaint provide that Defendant's system performs the specific accounting steps of the claims? The patent requires processing a "debit" for the downloader, a "credit" for the uploader, and a "license fee" for the content owner. It remains a question for the court whether Defendant's system of charging customers for licenses and paying royalties to contributors meets these specific claim limitations in structure and sequence.
V. Key Claim Terms for Construction
The Term: "second user computing device possessing a copy of said file"
- Context and Importance: The construction of this term may be dispositive. The dispute may turn on whether this term is limited to a traditional peer-to-peer (P2P) architecture, where users connect directly to share files, or if it can be interpreted more broadly to include files stored on a central server that were originally provided by a second user (e.g., a contributor to a stock media service).
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: A party could argue that the essence of the invention is managing a file sharing system that properly compensates creators, regardless of the specific network architecture. The patent title, "Method of digital media management in a file sharing system," does not explicitly limit the invention to a P2P context ’238 Patent, Title
- Evidence for a Narrower Interpretation: The specification repeatedly refers to "peer-to-peer (P2P) websites" and a "peer-to-peer network" ’238 Patent, col. 1:21, 1:46 FIG. 1 depicts separate "User #1 Device" and "User #2 Device" entities connected over the internet, which may suggest a system architecturally distinct from a centralized server model ’238 Patent, FIG. 1
The Term: "a file tag indicating a gap in ownership"
- Context and Importance: Claim 1 includes the negative limitation that a download is permitted only if the file does not include such a tag. The infringement analysis will depend on whether this requires a specific data structure embedded in the file itself or can refer to any form of rights management data, and whether the absence of such a tag in the accused system satisfies the limitation.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The term could be argued to encompass any metadata or database record used by a system to verify that the chain of licensing and compensation is intact before permitting a download.
- Evidence for a Narrower Interpretation: The specification describes this tag as an "extension [that] may be added to each file as it is transferred" to identify information like author, content owner, and ownership history ’238 Patent, col. 9:55-66 This could support a narrower construction requiring a specific data tag affixed to the media file itself.
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, asserting that since the service of the complaint, Defendant has knowingly sold products to customers for use in a manner that infringes the ’238 Patent Compl. ¶15 It further alleges that Defendant's "product literature and website materials" induce end users, referencing the missing Exhibit 2 for support Compl. ¶14
- Willful Infringement: The complaint does not use the term "willful." It alleges that service of the complaint provides Defendant with "Actual Knowledge of Infringement," which may support a claim for enhanced damages for any post-filing infringement Compl. ¶¶13-14
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of architectural scope: can the patent’s claims, which appear rooted in the peer-to-peer (P2P) file sharing context of the early 2000s, be construed to cover Defendant’s modern, centralized client-server model for distributing digital media? The construction of "second user computing device" will likely be pivotal.
- A key evidentiary question will be one of functional mapping: assuming the architectural scope issue is overcome, does Defendant’s method of collecting license fees from customers and paying royalties to contributors perform the specific sequence of debiting, crediting, and license fee processing steps recited in the asserted claims? The complaint's reliance on an unattached exhibit leaves this question open.