2:17-cv-00364
Guyzar LLC v. Zinio LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Guyzar LLC (Texas)
- Defendant: Zinio, LLC (Delaware)
- Plaintiff’s Counsel: Ferraiuoli LLC
- Case Identification: 2:17-cv-00364, E.D. Tex., 04/28/2017
- Venue Allegations: Plaintiff alleges venue is proper because Defendant is subject to personal jurisdiction in the district, has regularly conducted business in the district, and certain alleged acts of infringement occurred there.
- Core Dispute: Plaintiff alleges that Defendant’s website authentication features, specifically its "Sign In With" functionality, infringe a patent related to securing online transactions.
- Technical Context: The patent addresses methods for authenticating users and securing their confidential information during online transactions in the early commercial internet era.
- Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 1996-12-18 | U.S. Patent No. **5,845,070** Priority Date (Filing) |
| 1998-12-01 | U.S. Patent No. **5,845,070** Issued |
| 2017-04-28 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 5,845,070 - "Security System for Internet Provider Transaction"
- Patent Identification: U.S. Patent No. **5,845,070**, “Security System for Internet Provider Transaction,” issued December 1, 1998.
The Invention Explained
- Problem Addressed: The patent describes a growing need for individuals to purchase goods and services over the Internet, which exposes users to the risk of their confidential information (e.g., credit card details, social security numbers) being misappropriated during a transaction (**ʼ070** Patent, col. 1:12-29). Existing security controls at the time were considered insufficient to protect this information from potential misuse (**ʼ070** Patent, col. 1:52-64).
- The Patented Solution: The invention proposes a security system that authenticates a user and authorizes a transaction without exposing the user’s underlying confidential data to the merchant ("Internet Entity") (**ʼ070** Patent, Abstract). The system uses a "tracking and authentication module" which includes a database, an authentication server, and a certification server (**ʼ070** Patent, col. 2:6-9; Fig. 3). A user logs in with a "first data set" (e.g., ID and password), and the system then issues a "second data set" (e.g., a temporary, session-specific "framed IP address") that is used to conduct the transaction, thereby shielding the user's permanent confidential data stored in the database (**ʼ070** Patent, col. 2:3-10, col. 2:45-50).
- Technical Importance: The invention aimed to provide a method for conducting secure online commerce by separating the authentication credentials from the sensitive financial information, enabling transactions where the merchant would not directly handle or see the user's credit card data (**ʼ070** Patent, col. 2:51-60).
Key Claims at a Glance
- The complaint asserts at least independent claim 1 (Compl. ¶27).
- Claim 1 (Method) requires the following essential steps:
- accessing the Internet by a user entering a first data set into a computer based controller;
- establishing a data base containing confidential information;
- submitting the first data set to a tracking and authentication control module (which includes the data base, an authentication server, and a certification server);
- comparing the user's first data set with the I.D. and password in the data base;
- issuing a second data set in real time subject to a validating match;
- submitting the second data set to the certification server upon initiation of a transaction; and
- consummating the transaction subject to validation of the second data set, which ties the confidential information to the user while keeping it undisclosed.
- The complaint does not explicitly reserve the right to assert dependent claims, but the prayer for relief is general (Compl. p. 8, ¶a).
III. The Accused Instrumentality
Product Identification
- The accused instrumentality is identified as the “Sign In With” feature on Defendant Zinio's website (Compl. ¶13).
Functionality and Market Context
- The complaint alleges that the accused feature allows for the authentication of a user's confidential information to facilitate Internet transactions between a log-in and log-out session (Compl. ¶13).
- It is alleged that the accused feature utilizes the "OAuth open standard" to provide its authentication method (Compl. ¶13). The complaint includes a screenshot of the Zinio login page, which shows fields for email and password entry alongside a button for an alternative "Create Account" path (Compl. p. 4).
- The complaint asserts that this functionality is essential, as without it, users cannot access the service (Compl. ¶23).
IV. Analysis of Infringement Allegations
'070 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| accessing the Internet by the user entering a first data set into a computer based controller to control modems and communication protocols | The user enters a first data set, such as third-party log-in credentials, to access the internet. | ¶14 | col. 21:11-14 |
| establishing a data base containing confidential information subject to authentication with a user's first data set | The accused feature uses the OAuth standard to establish a database with the user's confidential information (e.g., address, email, profile) subject to authentication. | ¶15 | col. 21:15-17 |
| submitting said first data set to a tracking and authentication control module...said...module including a data base...an authentication server...and a certification server...for authenticating and internet entity approved for conducting internet transaction | The accused feature implements the OAuth standard to submit the first data set to a module alleged to be a "tracking and authentication control module," comprised of an "Authorization Server" and a "Resource Server." | ¶16 | col. 21:18-29 |
| comparing the user's first data set input to the authentication server incident to accessing the internet with the I.D. and password in the data base and subject to a validating match | The OAuth standard is implemented to compare the user's input (first data set) to the authentication server with the ID and password stored in the database for a validating match. | ¶17 | col. 21:30-34 |
| issuing a second data set in real time by the authentication server subject to a validation match of the I.D. and password with the data in the database usable for the instant transaction | The OAuth standard is implemented to issue a "second data set," alleged to be an "Access Token and Authorization Code," after a successful validation. | ¶18 | col. 21:35-39 |
| submitting the second data set to the certification server upon the initiation of a transaction by the user | The OAuth standard is implemented to submit the second data set (Access Token) to the certification server (Resource Server) when a user initiates a transaction. | ¶19 | col. 21:40-42 |
| consummating the transaction subject to validation of the second data set by tying the confidential information in the data base to the user whereby the confidential information is retained undisclosed in the data base | The OAuth standard is implemented to consummate a transaction (e.g., using third-party credentials) subject to validation of the second data set, retaining the confidential information undisclosed in the database. | ¶20 | col. 21:43-48 |
- Identified Points of Contention:
- Scope Questions: Does the term "second data set" in Claim 1, which dependent Claim 2 specifies is a "framed-IP-address" (**ʼ070** Patent, col. 22:2-3), read on an "Access Token and Authorization Code" from the OAuth protocol as alleged (Compl. ¶18)?
- Technical Questions: Does the accused system's architecture, described as implementing the OAuth standard with an "Authorization Server" and "Resource Server" (Compl. ¶16), meet the specific tripartite structure of the claimed "tracking and authentication control module," which requires an "authentication server," a "certification server," and a "data base" (**ʼ070** Patent, col. 21:21-25)? The complaint appears to equate the "Resource Server" with the "certification server," a point which may be contested.
V. Key Claim Terms for Construction
The Term: "tracking and authentication control module"
Context and Importance: This term is the central architectural component of the claimed invention. The infringement case depends on whether the accused OAuth-based system (Compl. ¶16) can be mapped onto this claimed structure. Practitioners may focus on this term because its construction will determine if a modern, standardized protocol like OAuth falls within the scope of a system patented in 1996.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim language itself describes the module functionally as "requesting authentication of the user" and containing components "for authenticating" (**ʼ070** Patent, col. 21:18-29). A party might argue that any collection of servers that performs these functions meets the limitation, regardless of their specific names or arrangement.
- Evidence for a Narrower Interpretation: The claim explicitly recites that the module includes three distinct components: "a data base containing user's confidential information, an authentication server for authenticating said first data set and a certification server, said certification server containing validation data for authenticating and internet entity" (**ʼ070** Patent, col. 21:21-29). The specification further illustrates this tripartite structure in Figure 3, which distinctly shows database 52, authentication server 53, and certification server 54 as separate but linked parts of module 50.
The Term: "second data set"
Context and Importance: This term is critical to the infringement analysis, as the complaint alleges it is met by an "Access Token and Authorization Code" issued by the OAuth protocol (Compl. ¶18). The patent's scope hinges on whether this term is limited to the specific examples in the specification or can be read more broadly.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: Independent Claim 1 uses the generic term "second data set" without defining its format (**ʼ070** Patent, col. 21:35). The specification notes that it "can comprise any form of alpha or numeric data and it is intended that it not be limited to an address form" (**ʼ070** Patent, col. 3:29-32). This language may support an argument that an OAuth token, being an alphanumeric data set, falls within the claim's scope.
- Evidence for a Narrower Interpretation: Dependent Claim 2, which narrows Claim 1, states, "The method as claimed in claim 1 wherein the second data set is a framed-IP-address" (**ʼ070** Patent, col. 22:2-3). Under the doctrine of claim differentiation, this suggests the independent claim is broader, but a defendant may argue the specification as a whole discloses only a "framed IP address" as the invention. The abstract and summary repeatedly highlight the "framed IP address" as the core of the security feature (**ʼ070** Patent, Abstract; col. 2:4-6).
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Defendant induces infringement by its end-users. The factual basis for this claim is that Defendant "conditions end-users' use of the Accused Instrumentality upon the end-users'...performance of the method" and that the service "will not be available" if users do not follow the claimed steps (Compl. ¶22, ¶23).
- Willful Infringement: The complaint alleges that Defendant has had knowledge of infringement "at least as of the service of the present complaint" (Compl. ¶26). This allegation supports a claim for post-filing willfulness but does not plead facts supporting pre-suit knowledge of the patent or infringement. The prayer for relief seeks enhanced damages (Compl. p. 8, ¶d).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the term "second data set," which the patent’s dependent claims and specification strongly link to a session-specific "framed-IP-address," be construed broadly enough to cover the "Access Token" and "Authorization Code" generated by the modern OAuth standard?
- A second central question will be one of structural equivalence: does the accused system's architecture, described as including an "Authorization Server" and a "Resource Server," perform the functions of and map onto the specific tripartite structure of the claimed "tracking and authentication control module," which expressly requires a distinct "authentication server" and "certification server"?
- An underlying technical question will be one of technological translation: can the specific steps and components of a 1996-era patent, conceived in the context of dial-up "point of presence" (POP) servers, be legitimately mapped onto the distributed, API-driven architecture of the modern OAuth authentication protocol, or is there a fundamental mismatch in technical operation and structure?