1:23-cv-00169
Auth Token LLC v. Total System Services LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Auth Token LLC (Delaware)
- Defendant: Total System Services LLC (Delaware)
- Plaintiff’s Counsel: Sand, Sebolt & Wernow Co., LPA
 
- Case Identification: 1:23-cv-00169, N.D. Ohio, 01/27/2023
- Venue Allegations: Venue is alleged to be proper because Defendant, through its parent company Global Payments, Inc., owns and/or operates an established place of business in the district and has allegedly committed acts of patent infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s financial products and services infringe patents related to a secure, one-time method for personalizing smart card-based authentication tokens.
- Technical Context: The technology addresses the secure provisioning of cryptographic keys and other secret data onto smart cards after they have been manufactured and issued, preventing subsequent modification.
- Key Procedural History: The complaint notes that during the prosecution of the lead patent, claims were amended to include a limitation that once an authentication token is personalized, it can no longer re-enter the personalization mode. The second asserted patent is a continuation of the application that led to the first and shares an identical specification.
Case Timeline
| Date | Event | 
|---|---|
| 2002-05-10 | Priority Date (’212 & ’990 Patents) | 
| 2010-12-27 | ’212 Patent Application Filing Date | 
| 2013-02-12 | ’212 Patent Issue Date | 
| 2013-02-12 | ’990 Patent Application Filing Date | 
| 2014-04-01 | ’990 Patent Issue Date | 
| 2023-01-27 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,375,212 - "Method for personalizing an authentication token," issued Feb. 12, 2013
The Invention Explained
- Problem Addressed: The patent describes a problem arising from the increased capability of smart cards. As smart cards evolved to use rewritable memory (EEPROM), applications could be loaded or modified after manufacture, creating a security risk during post-issuance personalization in a multi-party environment (Compl. ¶17; ’212 Patent, col. 3:36-45). Prior art allegedly failed to provide a secure way to remotely personalize these tokens without risk of third-party interference (Compl. ¶18, ¶27).
- The Patented Solution: The invention is a method for securely personalizing an "authentication token" (such as a smart card) after it has been issued. The method involves a "personalization device" establishing a private, encrypted communication session with the token. Through this secure channel, the device sends an initial seed value and a secret key to the token. A critical feature is that once the token stores this secret data, it is permanently locked out of "personalization mode," preventing any further changes to this core personalization (Compl. ¶31; ’212 Patent, col. 6:5-16, col. 12:4-7).
- Technical Importance: The claimed method purports to offer a specific technical improvement to computer security by providing a concrete process to lock down an authentication token, thereby reducing the risk of unauthorized replacement or removal of the personalized authentication data after issuance (Compl. ¶27, ¶32).
Key Claims at a Glance
- The complaint asserts independent Claim 1.
- The essential elements of Claim 1, a method claim, include:- An authentication token entering a "personalization mode."
- A personalization device requesting the token's serial number.
- The device encrypting the serial number with a personalization key and sending it to the token for validation, confirming both parties have the correct key.
- Establishing an encrypted session between the device and the token using a "transport key."
- Sending an "initial seed value" and an "initial Secret key" from the device to the token over the encrypted session.
- The token storing this initial seed and secret key.
- A "wherein" clause specifying that once personalized, the token "can no longer enter the personalization mode."
 
U.S. Patent No. 8,688,990 - "Method for personalizing an authentication token," issued Apr. 1, 2014
The Invention Explained
- Problem Addressed: The ’990 Patent shares an identical specification with the ’212 Patent and thus addresses the same technical problems related to secure, post-issuance personalization of authentication tokens (Compl. ¶45-46).
- The Patented Solution: The ’990 Patent claims a system that implements the secure personalization process. This system comprises three distinct components: an "interface device," the "authentication token," and a "personalization device." These components work together to perform the same secure key exchange and one-way lock-out function described in the ’212 Patent (Compl. ¶48; ’990 Patent, col. 11:2-12:12).
- Technical Importance: The claimed system provides the hardware and configured-software architecture for implementing the secure personalization method, aiming to solve the identified security vulnerability in a multi-component environment (Compl. ¶49).
Key Claims at a Glance
- The complaint asserts independent Claim 1.
- The essential elements of Claim 1, a system claim, include:- A system comprising an "interface device," an "authentication token," and a "personalization device," configured to establish an encrypted session.
- The authentication token having a "personalization mode" and a serial number.
- The personalization device being configured to encrypt the serial number.
- The authentication token being configured to perform a series of steps when in personalization mode, including validating a key, receiving an initial seed value and secret key, and storing them.
- A "wherein" clause specifying that once personalized, the authentication token is "configured to be unable to again enter to the personalization mode."
 
III. The Accused Instrumentality
Product Identification
- The complaint generically alleges infringement by "Defendant's financial products and services" (Compl. ¶60). It refers to "Exemplary Defendant Products" that are purportedly identified in Exhibits 5 and 6, which are incorporated by reference but were not filed with the public complaint (Compl. ¶61, ¶70).
Functionality and Market Context
- The complaint does not provide sufficient detail for analysis of the specific functionality of the accused instrumentalities. It alleges on information and belief that Defendant makes, uses, sells, and imports devices and systems that perform the claimed methods (Compl. ¶61-62).
IV. Analysis of Infringement Allegations
The complaint does not contain claim charts or detailed infringement allegations in its body. Instead, it states that external Exhibits 5 and 6 demonstrate how the "Exemplary Defendant Products" infringe Claim 1 of the ’212 Patent and Claim 1 of the ’990 Patent, respectively (Compl. ¶65, ¶70). As these exhibits were not provided, a detailed element-by-element analysis based on the complaint is not possible. The narrative infringement theory is that Defendant's products and services, in their customary operation, constitute a method and system for personalizing an authentication token that meets all limitations of the asserted claims (Compl. ¶61, ¶67).
No probative visual evidence provided in complaint.
- Identified Points of Contention:- Technical Questions: The infringement analysis may hinge on whether an accused token or system implements the specific one-time lock-out function recited in the "wherein" clause of both asserted claims. This clause requires that the token be unable to re-enter personalization mode after initial configuration (’212 Patent, col. 12:4-7; ’990 Patent, col. 12:9-12). The case may turn on evidence of this specific, irreversible functionality in the accused products.
- Scope Questions: A central question for the ’990 Patent will be whether the accused instrumentalities constitute the complete multi-component "system" recited in Claim 1, which requires an "interface device," an "authentication token," and a "personalization device" (Compl. ¶48). The complaint’s lack of specificity raises the question of whether Defendant provides a complete, infringing system or only a subset of the claimed components, which could introduce issues of divided infringement.
 
V. Key Claim Terms for Construction
- The Term: "personalization mode" 
- Context and Importance: This term defines the specific state that the token must enter to be personalized and, critically, be locked out of thereafter. The definition of this "mode" is central to the "wherein" clause, which Plaintiff identifies as a key inventive aspect conferring patent eligibility and non-obviousness (Compl. ¶31, ¶35). Practitioners may focus on this term to determine the trigger conditions for infringement and the nature of the required lock-out. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The specification suggests this is a functional state, stating that when the application is first loaded, "it is in Personalisation mode. In this mode it will respond only to a personalisation command" (’212 Patent, col. 6:6-9). This could support an interpretation covering any state where the token is receptive to initial keying commands.
- Evidence for a Narrower Interpretation: The description links this mode to a specific initial condition: "When the application is loaded onto the smart card it is in a non-personalised state" (’212 Patent, col. 5:19-21). This could support a narrower construction limited to the token's specific, pre-first-use state immediately after the application is loaded.
 
- The Term: "authentication token" 
- Context and Importance: This term defines the core object of the invention. The patents' specification heavily emphasizes smart cards as the primary embodiment. The scope of this term will be critical if the accused products are purely software-based tokens or other hardware form factors. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The claims themselves use the generic term "authentication token". The specification also contemplates other form factors, such as "Universal Serial Bus (USB) tokens that can plug directly into a USB port on a computer" (’212 Patent, col. 2:48-51).
- Evidence for a Narrower Interpretation: The background and detailed description are framed almost exclusively around the context of a "smart card" (’212 Patent, col. 1:12-13; Fig. 1). An argument could be made that the invention is meant to solve problems specific to smart cards, potentially limiting the term's scope to that context or its close technological equivalents.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement of infringement. The stated basis is that Defendant allegedly distributes "product literature and website materials" that instruct end users and others to use the accused products in a manner that directly infringes the patents (Compl. ¶65, ¶70).
- Willful Infringement: The complaint alleges that Defendant had knowledge of the infringement "given its relationship as the vendor of the instrumentality" (Compl. ¶64, ¶69). The pleading does not allege pre-suit notice or specific facts demonstrating knowledge of the patents themselves. The prayer for relief seeks a declaration that the case is exceptional under 35 U.S.C. § 285 (Compl. p. 15, ¶G.i).
VII. Analyst’s Conclusion: Key Questions for the Case
- A primary evidentiary question will be one of technical implementation: does the accused instrumentality, which is not detailed in the complaint, actually perform the irreversible, one-way lock-out from "personalization mode" that is the central feature of the asserted claims?
- A key legal issue will be one of system scope: does the Defendant make, use, or sell the complete, multi-device "system" as recited in the ’990 patent, or does it provide only a single component, raising potential questions of divided infringement and liability?
- A third question will concern definitional scope: can the term "authentication token," which is rooted in the patent's description of physical smart cards, be construed to cover the specific architecture of the accused financial products and services?