1:23-cv-00852
Digital Verification Systems LLC v. Odoo Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Digital Verification Systems, LLC (Texas)
- Defendant: Odoo, Inc. (Delaware, with principal place of business in California and an office in New York)
- Plaintiff’s Counsel: Kluger Healey, LLC; Garteiser Honea—IP Trial Boutique
- Case Identification: 1:23-cv-00852, W.D.N.Y., 08/18/2023
- Venue Allegations: Venue is alleged to be proper in the Western District of New York because Defendant has a regular and established place of business in the district and is deemed to be a resident there.
- Core Dispute: Plaintiff alleges that Defendant’s process for e-signing digital documents infringes a patent related to a system for creating and embedding verifiable digital identifications within electronic files.
- Technical Context: The technology addresses the need for reliable authentication of electronic signatures by binding a visible signature object to underlying metadata that can verify the signatory's identity and the context of the signing event.
- Key Procedural History: The complaint notes that the asserted patent was examined and allowed by the USPTO after consideration of numerous prior art references. The provided patent document also includes an Inter Partes Review (IPR) Certificate from IPR2018-00746, which indicates that claims 23-39 of the patent were cancelled as of May 1, 2020. This is significant because the complaint, filed in 2023, identifies claims 23, 26, and 39 as independent claims of the patent, suggesting a potential discrepancy between the patent's current legal status and the allegations.
Case Timeline
| Date | Event |
|---|---|
| 2008-01-02 | Priority Date for U.S. Patent No. 9,054,860 |
| 2015-06-09 | U.S. Patent No. 9,054,860 Issued |
| 2018-03-06 | Inter Partes Review (IPR2018-00746) Filed against '860 Patent |
| 2020-05-01 | IPR Certificate Issued, Cancelling Claims 23-39 |
| 2023-08-18 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 9,054,860 - Digital Verified Identification System and Method
The Invention Explained
- Problem Addressed: The patent's background section identifies a problem with then-existing methods of electronic signing, such as a signatory typing their name between slashes (e.g., "/John Doe/"), which were "rather difficult to authenticate" and made it an "arduous, if not impossible task to verify and/or authenticate the identity of the signatory to a respectable degree" (’860 Patent, col. 1:25-36).
- The Patented Solution: The invention proposes a system to solve this problem by using a "module generating assembly" to create a "digital identification module" ('860 Patent, Abstract). This module is generated using "verification data element(s)" from the user (e.g., name, login, SSN) and consists of two main parts: a "primary component" (such as a graphical representation of a signature) that is visible in the electronic document, and one or more "metadata components" (such as date, time, location, or user IP address) ('860 Patent, col. 2:25-37). This module is then embedded into an electronic file, and a user can later reveal the hidden metadata by hovering a mouse over or clicking on the primary component, thereby facilitating verification ('860 Patent, col. 2:38-44).
- Technical Importance: The system aimed to create a more secure and verifiable electronic signature by cryptographically and functionally binding a visible signature element to a set of hidden, verifiable data about the signatory and the signing event itself ('860 Patent, col. 1:37-49).
Key Claims at a Glance
- The complaint asserts infringement of at least independent Claim 1 (Compl. ¶33). It also identifies claims 1, 23, 26, and 39 as the patent's independent claims (Compl. ¶14), though an IPR certificate attached to the patent indicates claims 23-39 were cancelled.
- Independent Claim 1 requires:
- A "digital identification module" associated with an entity.
- A "module generating assembly" that receives a "verification data element" from the entity to create the digital identification module.
- The digital identification module being "disposable within at least one electronic file."
- The module comprising a "primary component" that associates the module with the entity.
- A final limitation wherein the module is "cooperatively structured to be embedded within only a single electronic file."
- The complaint does not explicitly reserve the right to assert dependent claims but incorporates all allegations generally (Compl. ¶29).
III. The Accused Instrumentality
Product Identification
The complaint identifies the accused instrumentality as Defendant's "Product(s)," which it describes as a "process method for e-signing digital documents safely" (Compl. ¶33). No specific product name, such as "Odoo Sign," is mentioned.
Functionality and Market Context
The complaint does not describe the specific functionality of the accused product. Instead, it alleges that the product practices the technology of the ’860 Patent and refers to an attached "Claim Chart" (Exhibit B) for a detailed infringement analysis (Compl. ¶33). However, Exhibit B was not filed with the complaint and is not available for review. No probative visual evidence provided in complaint. The complaint makes no allegations regarding the accused product's commercial importance or market position.
IV. Analysis of Infringement Allegations
The complaint alleges that Defendant's e-signing products infringe at least Claim 1 of the ’860 Patent (Compl. ¶33). It states that a detailed comparison of the claim elements to the accused product is contained in a claim chart (Exhibit B), which was incorporated by reference but not provided with the filed complaint (Compl. ¶39). In the absence of the claim chart, the infringement theory is based on the general allegation that Defendant's e-signing method embodies the system and method claimed in the ’860 Patent.
Identified Points of Contention
- Scope Questions: A central dispute may arise over the claim limitation requiring the "digital identification module" to be "cooperatively structured to be embedded within only a single electronic file" ('860 Patent, col. 9:18-20). The case may turn on whether this requires a specific one-time-use technical feature that prevents the same signature module from being copied and pasted into another document. The patent specification lends some support to this interpretation by describing an embodiment where the module becomes "inoperable" after being used a pre-selected number of times (col. 4:33-37).
- Technical Questions: Without the claim chart, a primary question is what evidence Plaintiff will offer to show that the accused Odoo product contains a "module generating assembly" and a "digital identification module" with distinct "primary" and "metadata" components, as defined by the patent. The infringement analysis will depend on whether the architecture of Odoo's software maps onto the specific component structure required by the claims.
V. Key Claim Terms for Construction
- The Term: "cooperatively structured to be embedded within only a single electronic file"
- Context and Importance: This limitation, appearing at the end of independent Claim 1, is highly specific and will be critical to the infringement analysis. Practitioners may focus on this term because if the accused Odoo signature object is not technically restricted to a single file instance, infringement may be avoided. The definition of "cooperatively structured" will determine whether this is a statement of intended use or a mandatory technical constraint.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: A plaintiff could argue that "structured for" a single file does not require a technological lock, but rather that the module is generated with unique metadata (like a timestamp) for a specific signing event, making that instance inherently unique to one file at one point in time.
- Evidence for a Narrower Interpretation: The specification provides support for a narrower reading, stating that in one embodiment, "when the digital identification module 20 has been embedded or disposed into electronic documents totaling the pre-selected number, the digital identification module 20 may be automatically deleted, become inoperable, or otherwise be disposed in an inactive state" (’860 Patent, col. 4:33-37). A defendant would likely argue this language requires a technical one-time-use or self-destruct mechanism.
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement of infringement, stating that Defendant distributes "product literature and website materials" that instruct and encourage end users to use the accused products in a manner that directly infringes the ’860 Patent (Compl. ¶36).
- Willful Infringement: Willfulness is alleged based on Defendant's continued infringement after receiving notice of its infringement via the service of the complaint and the attached (but un-filed) claim chart (Compl. ¶¶ 31, 35, 37). The allegation is based on post-suit knowledge only; no pre-suit knowledge is alleged.
VII. Analyst’s Conclusion: Key Questions for the Case
- Validity and Diligence: A threshold issue is the complaint's identification of claims 23, 26, and 39 as active independent claims, when an IPR certificate attached as part of the patent exhibit shows they were cancelled in 2020. While the infringement count focuses on the surviving Claim 1, this discrepancy raises questions for the court regarding the Plaintiff's pre-suit investigation and the overall strength of the asserted patent portfolio.
- Claim Scope and Technical Limitation: The case will likely turn on a question of definitional scope: how the court construes the term "cooperatively structured to be embedded within only a single electronic file." The viability of the infringement claim depends on whether this phrase requires a specific, technically enforced one-time-use limitation—a feature that may or may not be present in the accused e-signature product.
- Evidentiary Sufficiency: With the complaint lacking a detailed technical breakdown of the accused product or a public claim chart, a key question will be one of evidentiary proof: whether discovery will uncover evidence demonstrating that the architecture of Odoo's e-signature service maps directly onto the "module generating assembly" and "digital identification module" structure recited in Claim 1.