DCT

2:17-cv-00291

Soverain IP LLC v. Episerver Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:17-cv-00291, E.D. Tex., 04/12/2017
  • Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendant is registered to do business in Texas and directs activities to customers located in the state.
  • Core Dispute: Plaintiff alleges that Defendant’s content management and digital commerce platforms infringe patents related to foundational e-commerce technologies, including network-based data extraction and the management of web access requests.
  • Technical Context: The technology at issue addresses core problems of the early commercial internet, such as managing user sessions, authenticating users across different services, and dynamically integrating web data into other applications.
  • Key Procedural History: The complaint notes that U.S. Patent No. 7,191,447 survived an inter partes reexamination where all original claims were confirmed patentable and 83 additional claims were added. The complaint also highlights a history of prior licensing, including a payment of $40,000,000 from Amazon.com to license patents from the same portfolio.

Case Timeline

Date Event
1995-06-07 ’900 Patent Priority Date
1995-10-25 ’447 and ’706 Patents Priority Date
2007-03-13 ’447 Patent Issue Date
2012-10-05 ’447 Patent Reexamination Certificate Issue Date
2013-12-10 ’900 Patent Issue Date
2015-01-13 ’706 Patent Issue Date
2017-04-12 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 7,191,447 - Managing Transfers of Information in a Communications Network, Issued Mar. 13, 2007

The Invention Explained

  • Problem Addressed: The patent describes the difficulty of extracting specific data from sources of network-based information (like a web page) for use in other applications, such as a spreadsheet, without also including extraneous content or losing the ability for the data to update automatically (’447 Patent, col. 1:35-44).
  • The Patented Solution: The invention proposes a system where an "object embedding program" (exemplified by OLE, Object Linking and Embedding) within a compound document (e.g., a spreadsheet) contains a link to a "script program." This script program is designed to access the network-based data source, extract only the desired information, and embed it back into the compound document. This allows for dynamic, "live" data to be integrated from a web page into a local application (’447 Patent, Abstract; Fig. 6; col. 2:50-col. 3:17).
  • Technical Importance: This technology provided a method for creating dynamic links between web content and local software applications, a foundational concept for integrating live data into business and personal productivity tools in the early commercial internet (Compl. ¶¶2, 24).

Key Claims at a Glance

  • The complaint asserts infringement of at least claim 5, which depends from independent method claim 1 and system claim 6 (Compl. ¶68).
  • Independent method claim 1 includes the core elements of:
    • Executing an object embedding program to locate a script program from a link.
    • Applying the script program to network-based information.
    • Executing the script program to extract data from the network-based information.
    • Embedding the extracted data within a compound document.
  • Independent system claim 6 recites a system comprising:
    • A computer and a compound document.
    • A script program structured to extract data.
    • An object embedding program with links to locate both the network-based information and the script program.

U.S. Patent No. 8,606,900 - Method and System for Counting Web Access Requests, Issued Dec. 10, 2013

The Invention Explained

  • Problem Addressed: The patent identifies the challenge for internet servers to control access to information and track user activity in a cost-free and open network environment. Specifically, it notes the difficulty in identifying clients, managing sessions, and preventing unwanted intrusions without complex client-side software (’900 Patent, col. 2:41-67).
  • The Patented Solution: The invention describes a server-side method for managing user sessions by generating and appending a session identification (SID) to a client's web page requests. This SID allows the server to track a sequence of requests from a single client and can contain an authorization identifier for accessing controlled files. The system also teaches a method for counting page requests for analytics while excluding repeated, non-substantive requests from a single client to avoid distorting the data (’900 Patent, Abstract; col. 3:5-col. 4:35).
  • Technical Importance: This server-side session management was a key enabling technology for e-commerce, user personalization, and web analytics at a time when web browsers had limited or no native state-management capabilities (Compl. ¶¶45, 79-80).

Key Claims at a Glance

  • The complaint asserts infringement of at least claims 1 and 5 (Compl. ¶89).
  • Independent method claim 1 includes the core elements of:
    • Generating a plurality of session identifiers at the web server.
    • Storing the session identifiers at client web browsers.
    • Receiving web page requests that include a session identifier.
    • Storing information about the requests (e.g., the requested page and the SID).
    • Tracking the requests by counting them, exclusive of repeated requests from a particular client.
  • Independent system claim 12 recites a web server comprising:
    • Means for generating session identifiers.
    • Means for receiving web page requests including the identifiers.
    • A database for storing information regarding the requests.
    • Means for tracking the requests by counting, exclusive of repeated requests.

Multi-Patent Capsule: U.S. Patent No. 8,935,706 - Managing Transfers of Information in a Communications Network, Issued Jan. 13, 2015

  • Technology Synopsis: This patent addresses the problem of managing user authentication credentials across multiple network services. The invention describes a system, such as a proxy server, that centrally stores and manages a user's credentials, automatically providing them to different network servers upon request. This is intended to solve the problem of users having to re-enter credentials for each service and to mitigate the security risks of reusing the same credentials across different services (Compl. ¶¶48-49).
  • Asserted Claims: The complaint asserts infringement of at least claims 1-5 (Compl. ¶113).
  • Accused Features: The Episerver Digital Experience Cloud is accused of infringing by providing technology for managing authentication credentials for access to data stored on a network, including enabling a single password to authenticate a user for multiple sources of network-based information (Compl. ¶¶98, 100, 111).

III. The Accused Instrumentality

Product Identification

  • Episerver CMS (Versions 7.5, 8.0, and 9.0) and the Episerver Digital Experience Cloud Service (Compl. ¶¶53, 77, 98).

Functionality and Market Context

  • The complaint alleges that the accused products provide a suite of content management, digital marketing, and e-commerce functionalities (Compl. ¶¶53, 77). The accused functionality for the ’447 patent involves technology for extracting data from network-based sources using script and object embedding programs (Compl. ¶¶55-56). For the ’900 patent, the accused functionality includes website analytics and tracking webpage requests using session identifiers that are generated by the server and stored on the client, with the ability to exclude multiple requests from the same computer (Compl. ¶¶80, 82, 86). The complaint provides a screenshot of the 'FastCGI Settings' interface from the original Open Market Transaction System, which shows configuration options for server processes, illustrating the type of network management environment the patents address (Compl. p. 8, Image 1).
  • The complaint frames Episerver as a market competitor that has utilized the patented technology without obtaining the licenses that other major technology companies have allegedly paid for (Compl. ¶¶72, 93, 114).

IV. Analysis of Infringement Allegations

’447 Patent Infringement Allegations

Claim Element (from Independent Claim 6) Alleged Infringing Functionality Complaint Citation Patent Citation
a script program, implemented on a computer in said communications network, structured to extract data from network-based information The Episerver ‘447 Products are alleged to contain a script program structured to extract data from network-based information provided by a networked server. ¶60 col. 10:45-49
an object embedding program... comprising a link to said network-based information, and a link from which said object embedding program can locate said script program The accused products allegedly enable an object embedding program that contains a link to network-based information and can locate the script program via a link. ¶¶61, 62 col. 10:56-62
said object embedding program further applying said script program to said network-based information to extract data... and to embed said data within the compound document The accused products are alleged to enable an object embedding program that applies the script program to the network-based information, causing data to be extracted and embedded in a compound document. ¶¶63, 64, 66 col. 10:60-67
  • Identified Points of Contention:
    • Scope Questions: A central question for the court will be whether the term "object embedding program," which the patent exemplifies with 1990s-era OLE technology, can be construed to read on the modern components of the Episerver platform, which may use different technologies like JavaScript modules or APIs to achieve a similar result.
    • Technical Questions: The complaint's allegations are conclusory. A key factual question will be whether Soverain can present evidence that the Episerver platform employs a distinct "script program" that is located and executed by a separate "object embedding program" as required by the claim's specific architecture, or if the functionality is integrated differently.

’900 Patent Infringement Allegations

Claim Element (from Independent Claim 12) Alleged Infringing Functionality Complaint Citation Patent Citation
means for generating a plurality of session identifiers, each... having information associated with a particular client The Episerver products are alleged to generate multiple session identifiers, described as "text strings that identify a series of requests," which are associated with a particular accessing computer. ¶¶80, 81 col. 3:10-15
a database for storing information regarding the web page requests, the information including the requested web page and the session identifier The accused products allegedly enable the storing of data regarding web page requests, including keeping a log of access requests that includes the specific web pages and related session identifiers. ¶84 col. 3:40-42
means for tracking the web page requests by... counting the number of requests for particular web pages exclusive of repeated requests from a particular client The accused products are alleged to contain website analytics functionality that allows tracking the number of webpage requests while excluding multiple requests from the same computer associated with a unique session identifier. ¶86 col. 4:26-35
  • Identified Points of Contention:
    • Functional Questions: A primary issue will be whether the accused analytics functionality performs the specific "counting... exclusive of repeated requests" as claimed. The complaint alleges this functionality exists (Compl. ¶86) and further alleges, in relation to dependent claims, that it can exclude requests within a "predetermined period of time" (Compl. ¶87), but provides no technical detail. The evidence will need to show a direct operational match.
    • Scope Questions: The term "session identifier" will be a focus. The question will be whether the specific implementation used by Episerver (e.g., a modern browser cookie) falls within the scope of the SID described in the patent, which is taught in a preferred embodiment as being appended directly to the URL (’900 Patent, col. 3:37-45).

V. Key Claim Terms for Construction

For the ’447 Patent:

  • The Term: "object embedding program"
  • Context and Importance: This term is the central component of the asserted system claim. The viability of the infringement case depends on whether this term, rooted in older technology, can be construed to cover modern web development components. Practitioners may focus on this term because its construction will determine if the patent's scope extends beyond the specific OLE/OpenDoc examples cited in the specification.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification introduces object embedding tools generally, stating they "are known such as OLE (Object Linking and Embedding) and OpenDoc," which may suggest these are merely examples and not limitations (’447 Patent, col. 1:37-39).
    • Evidence for a Narrower Interpretation: The detailed description and Figure 6 focus heavily and specifically on an "OLE Object," which could be argued to limit the scope of the invention to the embodiments actually disclosed and described (’447 Patent, Fig. 6; col. 10:38-41).

For the ’900 Patent:

  • The Term: "counting the number of requests... exclusive of repeated requests from a particular client"
  • Context and Importance: This limitation defines the core analytic function of the invention. The infringement analysis will turn on whether the accused Episerver analytics perform this specific type of filtering, rather than a more general form of web traffic analysis.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The summary of the invention describes this function in general terms, aimed at providing "important marketing feedback" and avoiding distortions from users "stuffing the ballot box," suggesting the focus is on the purpose rather than a single method (’900 Patent, col. 4:26-35).
    • Evidence for a Narrower Interpretation: Asserted claim 5 adds the limitation that the exclusion occurs "during a predetermined period of time." A defendant may argue this dependency narrows the interpretation of "counting" in the independent claim to a specific, time-based filtering algorithm, as described in the complaint's own allegations (Compl. ¶87).

VI. Other Allegations

  • Indirect Infringement: The complaint alleges that Episerver induces infringement by providing its products along with "documentation and training materials," "user manuals, product support, [and] marketing materials" that allegedly instruct customers and end-users to use the products in a manner that directly infringes the patents-in-suit (Compl. ¶¶71, 92).
  • Willful Infringement: Willfulness is alleged based on knowledge of the patents acquired "since at least service of this Complaint or shortly thereafter" (Compl. ¶¶70, 91). The complaint further supports this allegation by claiming the patents are well-known, have been licensed by competitors, and that Episerver's infringement is "characteristic of a pirate" (Compl. ¶¶72, 93, 114).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of technological mapping: can the specific architectures described in these patents from the mid-1990s, such as the ’447 patent's "object embedding program" and the ’900 patent's method for "counting exclusive of repeated requests," be demonstrably mapped onto the integrated functions of the modern Episerver platform, or is there a fundamental mismatch in technical operation?
  • A key evidentiary question will be one of factual sufficiency: the infringement allegations in the complaint are highly conclusory. The case may turn on whether Soverain can produce specific, non-public evidence showing that the accused products actually operate in the precise manner required by each limitation of the asserted claims, a standard the complaint itself does not yet meet.
  • A central legal question will be one of claim scope: can claim terms rooted in the technological context of 1995 (e.g., systems exemplified by OLE, session identifiers appended to URLs) be construed broadly enough to cover the different technologies (e.g., integrated JavaScript, browser cookies, REST APIs) that are fundamental to modern web platforms like the accused products?