2:23-cv-00068
Dynapass IP Holdings LLC v. Simmons First National Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Dynapass IP Holdings LLC (Delaware)
- Defendant: Simmons First National Corporation and Simmons Bank (Arkansas)
- Plaintiff’s Counsel: Williams Simons & Landis PLLC
 
- Case Identification: 2:23-cv-00068, E.D. Tex., 02/20/2023
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendants conduct substantial business in the district, derive revenue from Texas customers, and maintain a regular and established place of business in Frisco, Texas.
- Core Dispute: Plaintiff alleges that Defendants' online and mobile banking systems, which utilize two-factor authentication, infringe a patent related to using personal communication devices to authenticate users to secure systems.
- Technical Context: The technology at issue is two-factor authentication (2FA), a security method that uses a second factor, such as a code sent to a mobile phone, to verify a user's identity in addition to a standard password.
- Key Procedural History: While not mentioned in the complaint, the front matter of the patent-in-suit includes an Inter Partes Review (IPR) Certificate issued September 25, 2024. The IPR proceedings resulted in the cancellation of Claim 5, the primary claim detailed in the complaint's infringement allegations. Claims 1, 3, 4, and 6 of the patent were found patentable.
Case Timeline
| Date | Event | 
|---|---|
| 2000-03-06 | ’658 Patent Priority Date | 
| 2006-01-31 | ’658 Patent Issue Date | 
| c. 2020-10-19 | Accused Simmons Bank online banking platform upgrade launched | 
| 2023-02-20 | Complaint Filing Date | 
| 2024-09-25 | IPR Certificate issued, cancelling Claim 5 of the '658 Patent | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,993,658 - "Use of Personal Communication Devices for User Authentication"
- Patent Identification: U.S. Patent No. 6,993,658, "Use of Personal Communication Devices for User Authentication," issued January 31, 2006.
The Invention Explained
- Problem Addressed: The patent identifies the security risks of traditional password-only systems and the inconvenience of then-existing two-factor authentication methods that required users to carry a dedicated, separate hardware token generator ('658 Patent, col. 2:13-43, 2:56-60).
- The Patented Solution: The invention proposes using a device most people already possess—a personal communication device like a mobile phone—as the second authentication factor. A server generates a temporary "token" and sends it to the user's phone via a cellular network. The user then combines this received token with a secret, memorized "passcode" to form a valid password, which is submitted over a separate computer network to gain access to a secure system ('658 Patent, Abstract; Fig. 1).
- Technical Importance: This approach aimed to make strong, two-factor authentication more convenient and widely adoptable by eliminating the need for specialized hardware tokens ('658 Patent, col. 2:56-60).
Key Claims at a Glance
- The complaint bases its infringement allegations on at least independent Claim 5 ('658 Patent, Compl. ¶26).
- The essential elements of Claim 5, a system claim, include:- A computer processor and a user database that associates a user with their personal communication device (PCD).
- The PCD communicates over a cell phone network.
- A control module that creates a new password based on a token (unknown to the user) and a passcode (known to the user).
- A communication module that transmits the token to the PCD over the cell phone network.
- An authentication module that receives the created password from the user via a secure computer network (which is different from the cell phone network) to grant access.
- The system is configured to deactivate access after a predetermined time.
 
- The complaint does not explicitly reserve the right to assert dependent claims, but the prayer for relief seeks a judgment that "one or more claims" have been infringed (Compl. p. 9(a)).
III. The Accused Instrumentality
Product Identification
- The systems and applications that provide access and authorization to Defendants' online banking system, including the Simmons Bank mobile application and online banking website (the "Accused Instrumentalities") (Compl. ¶¶20-21).
Functionality and Market Context
- The Accused Instrumentalities provide a two-factor authentication service, which Defendants refer to as "Two-Factor Authentication ('2FA')" or "Two-Step Verification," to their banking customers (Compl. ¶¶21, 24). The complaint presents a screenshot from the Defendants' website explaining that this security process involves sending "a code delivered by text message after entering your username and password" (Compl. p. 7). This screenshot, taken from an FAQ about Defendants' online banking, describes the system as providing "improved security" (Compl. p. 6). The system is alleged to be used for authenticating customers to access their financial accounts (Compl. ¶21).
IV. Analysis of Infringement Allegations
’658 Patent Infringement Allegations
| Claim Element (from Independent Claim 5) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| a user authentication system comprising: a computer processor; a user database configured to associate a user with a personal communication device possessed by the user, said personal communication device configured to communicate over a cell phone network... | The Accused Instrumentalities allegedly include a computer processor and a user database that associates banking customers with their mobile phones, which communicate via a cell phone network. | ¶22 | col. 12:21-29 | 
| a control module...configured to create a new password based at least upon a token and a passcode, wherein the token is not known to the user and wherein the passcode is known to the user... | The Accused Instrumentalities allegedly include a control module that creates new passwords based on a "token" (the access code sent to the user's phone) and a "passcode" (the user's standard password). | ¶23 | col. 12:30-38 | 
| a communication module configured to transmit the token to the personal communication device through the cell phone network; | The Accused Instrumentalities allegedly include a communication module that transmits the token (access code) to the user's mobile phone via SMS text message. This is supported by an FAQ on Defendants' website. | ¶24, p. 7 | col. 12:39-42 | 
| an authentication module configured to receive the password from the user through a secure computer network, said secure computer network being different from the cell phone network... | The Accused Instrumentalities allegedly include an authentication module that receives the user's password through the online banking system (a secure computer network), which is distinct from the cell phone network used for token delivery. | ¶25 | col. 12:43-48 | 
| ...wherein the authentication module activates access to the account in response to the password and deactivates the account within a predetermined amount of time after activating the account... | The authentication module allegedly activates account access upon successful authentication and deactivates it after a set time, preventing future access with the same password. | ¶25 | col. 12:49-55 | 
- Identified Points of Contention:- Scope Questions: Claim 5 recites receiving "the password" which is "based at least upon the token and a passcode." The patent specification describes a user concatenating the passcode and token to form a single password string for submission ('658 Patent, col. 4:52-59). The complaint alleges the accused system functions by having the user enter a password, then separately enter a code received via text message (Compl. p. 7). A central question may be whether this two-step, sequential entry of two separate pieces of information meets the limitation of receiving a single "password" that is "based upon" both components.
- Technical Questions: The complaint alleges the accused system's "control module" is "configured to create a new password" (Compl. ¶23). A factual dispute may arise over whether the accused server-side logic actually "creates" a new, combined password for validation, or whether it simply performs two separate checks: one for the user's static password and a second for the temporary token. The evidence required to resolve this question would likely depend on discovery into the internal workings of Defendants' authentication servers.
 
V. Key Claim Terms for Construction
- The Term: "password" 
- Context and Importance: The construction of this term is critical to the infringement analysis. The dispute may center on whether the claimed "password" must be a single data string formed by the user (e.g., by concatenation) before submission, or if it can encompass a process where a pre-existing password and a temporary token are submitted and validated as separate inputs in a single login session. 
- Intrinsic Evidence for Interpretation: - Evidence for a Narrower Interpretation: The specification provides an example where a user "can combine a valid, memorized passcode of 'abcd' with a valid token of '1234' to form a valid password of 'abcd1234'" ('658 Patent, col. 4:54-57). Figure 2A also depicts a login screen with a single "PASSWORD" field, which could suggest the entry of a single, combined string.
- Evidence for a Broader Interpretation: Claim 5 requires the password to be "based at least upon the token and a passcode." A party might argue that this "based upon" language is broader than strict concatenation and could cover any authentication value or process that logically depends on both the passcode and the token for successful validation.
 
- The Term: "control module... configured to create a new password" 
- Context and Importance: This term defines a key server-side function. Practitioners may focus on this term because the infringement argument depends on whether the accused system's server performs an act of "creating" a password, or merely validates two separate data fields against stored values. 
- Intrinsic Evidence for Interpretation: - Evidence for a Narrower Interpretation: The process flowchart in Figure 3 shows a discrete step where the "TOKEN SERVER GENERATES PASSWORD BASED UPON PASSCODE AND TOKEN" and then "UPDATES PASSWORD... IN USER DATABASE" ('658 Patent, Fig. 3, steps 306-308). This may suggest an explicit act of generation and storage, even if temporary.
- Evidence for a Broader Interpretation: A party could argue that "create" should be interpreted functionally to mean the generation of an ephemeral, combined data object within the server's memory for the sole purpose of an authentication check, without requiring it to be formally stored or "set" in a database.
 
VI. Other Allegations
- Indirect Infringement: The complaint does not plead a separate count for indirect infringement.
- Willful Infringement: The complaint does not contain an allegation of willful infringement. It does, however, request that the court declare the case "exceptional" and award attorneys' fees under 35 U.S.C. § 285 (Compl. p. 9(d)).
VII. Analyst’s Conclusion: Key Questions for the Case
- Primary Procedural Question: The most immediate and critical issue is the effect of the post-filing IPR decision that cancelled Claim 5, the only claim specifically detailed in the complaint. A threshold question is whether the Plaintiff can, or will be permitted to, amend its infringement contentions to assert one of the surviving patent claims and articulate a viable infringement theory based on them.
- Claim Construction Question: If the case proceeds on other claims with similar language, a core issue will be one of definitional scope: can the term "password", described in the patent's preferred embodiment as a single string concatenated by the user, be construed to cover the accused two-step verification process where a user enters a static password and a separate verification code in sequence?
- Evidentiary Question: The case may also turn on a question of technical operation: does the server-side architecture of the accused banking system functionally "create a new password" by combining the user's credentials and the temporary token for a unified check, as required by the claim, or does it perform a less integrated, sequential validation of two independent inputs?