2:23-cv-00522
DataCloud Tech LLC v. ESET Spol SRO
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: DataCloud Technologies, LLC (Georgia)
- Defendant: ESET Spol. SRO. (Slovak Republic)
- Plaintiff’s Counsel: Rozier Hardt McDonough PLLC
- Case Identification: 2:23-cv-00522, E.D. Tex., 11/14/2023
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendant conducts substantial business in the district, commits acts of infringement there, and derives revenue from goods and services provided to individuals in the state.
- Core Dispute: Plaintiff alleges that Defendant’s suite of security and management software products infringes six patents related to data organization, file synchronization, remote data management, and anonymous network communication.
- Technical Context: The asserted patents concern foundational methods for managing, synchronizing, and routing data within networked computer systems, a technology area central to modern enterprise security and device management software.
- Key Procedural History: The complaint alleges that Defendant was informed of Plaintiff’s patent portfolio, including the patents-in-suit, by a letter dated December 14, 2020, which may form the basis for a claim of willful infringement.
Case Timeline
| Date | Event |
|---|---|
| 2000-01-28 | U.S. Patent No. 6,651,063 Priority Date |
| 2000-04-04 | U.S. Patent No. 7,209,959 and 8,370,457 Priority Date |
| 2000-04-25 | U.S. Patent No. 8,156,499 Priority Date |
| 2002-03-29 | U.S. Patent No. 7,398,298 Priority Date |
| 2002-12-30 | U.S. Patent No. 7,139,780 Priority Date |
| 2003-11-18 | U.S. Patent No. 6,651,063 Issued |
| 2006-11-21 | U.S. Patent No. 7,139,780 Issued |
| 2007-04-24 | U.S. Patent No. 7,209,959 Issued |
| 2008-07-08 | U.S. Patent No. 7,398,298 Issued |
| 2012-04-10 | U.S. Patent No. 8,156,499 Issued |
| 2013-02-05 | U.S. Patent No. 8,370,457 Issued |
| 2020-12-14 | Defendant allegedly informed of Plaintiff’s patent portfolio |
| 2023-11-14 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,651,063 - "Data Organization And Management System And Method"
Issued November 18, 2003.
The Invention Explained
- Problem Addressed: The patent’s background section describes the difficulty businesses and consumers face in collecting and organizing an overwhelming amount of information, much of which is provided in non-digital formats that are cumbersome to manage (’063 Patent, col. 1:15-30).
- The Patented Solution: The invention proposes a system where information providers send data in pre-categorized "information packs" to a user's digital "Data Repository." The system automatically places the information into a generic category location, and the user can then choose to accept, discard, or move the information to a custom-created category (’063 Patent, Abstract; Fig. 1). This user-defined custom categorization can then be communicated back to a central processing station to automatically route future information from the same provider to the custom location (’063 Patent, col. 4:31-43).
- Technical Importance: The technology aimed to shift the burden of initial data categorization from the end-user to the information provider, streamlining the management of electronic records like warranties, manuals, and receipts (’063 Patent, col. 2:40-45).
Key Claims at a Glance
- The complaint asserts independent claim 4 (Compl. ¶25).
- Essential elements of Claim 4 include:
- Storing information in an "information pack."
- Associating the pack with a user destination address, a category identifier, and a provider identifier.
- Communicating the pack over a network to a user data repository.
- Placing the pack in a location within the repository corresponding to the category identifier.
- Creating a custom location in the repository and placing the information pack there.
- Sending a "custom category signal" to a processing station, which includes a custom category identifier and a provider identifier, to direct subsequent information packs.
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 7,139,780 - "System And Method For Synchronizing Files In Multiple Nodes"
Issued November 21, 2006.
The Invention Explained
- Problem Addressed: In distributed network environments, such as a large enterprise with multiple branch offices, ensuring that shared files are consistent across all locations can lead to excessive network traffic from unneeded, system-wide file synchronization (’780 Patent, col. 1:12-40, 1:53-62).
- The Patented Solution: The invention describes a system comprising multiple "local nodes" and a "central node," connected by a network. Each local node maintains its own file server and a local database table tracking its files. The central node maintains a central database with a second table tracking update information for files across all local nodes (’780 Patent, Abstract; Fig. 1). Synchronization is performed on-demand: when a local node needs to access a file, it checks timestamps in the local and central tables to determine if its version is outdated; if so, it downloads the latest version from the central server, which in turn has already retrieved the most recent update from the relevant local node (’780 Patent, col. 2:40-68).
- Technical Importance: This method provides an on-demand synchronization model intended to reduce network traffic by avoiding constant, unnecessary updates across all nodes in a distributed system (’780 Patent, col. 2:9-12).
Key Claims at a Glance
- The complaint asserts independent claim 1 (Compl. ¶36).
- Essential elements of Claim 1 include:
- Storing one copy of a shared file in each local file server.
- Creating a first table in each local database to store information on local file copies.
- Creating a second table in a central database to record update information for files across all local servers.
- Updating a file copy on one local server.
- Adding a new update information item to the second (central) table.
- Downloading the updated file from the local server and uploading it to the central server as the "latest edition."
- Determining if another local server's copy needs to be updated.
- Downloading the latest edition from the central server to the other local server if an update is needed.
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 7,209,959 - "Apparatus, System, And Method For Communicating To A Network Through A Virtual Domain Providing Anonymity To A Client Communicating On The Network"
Issued April 24, 2007.
Technology Synopsis
The patent describes a system to provide client anonymity during network communications. It employs three components—a "deceiver," a "controller," and a "forwarder"—that collectively establish an ad hoc virtual domain for a communication session, routing traffic through the forwarder to mask the client's IP address from the destination server and vice versa (’959 Patent, Abstract).
Asserted Claims
Claim 1 (Compl. ¶53).
Accused Features
The complaint accuses ESET's website infrastructure, which supports multiple domains, of infringing this patent (Compl. ¶52, ¶54).
U.S. Patent No. 7,398,298 - "Remote Access And Retrieval Of Electronic Files"
Issued July 8, 2008.
Technology Synopsis
The patent addresses the need for users to remotely access and manage files and their corresponding directory structures, including receiving notification of data delivery. The invention comprises a server-based application that coordinates data delivery and manages directory structures based on user profiles, allowing users to control their data storage organization from a remote device (’298 Patent, Abstract).
Asserted Claims
Claim 13 (Compl. ¶64).
Accused Features
The complaint accuses the ESET MSP Administrator product of infringing this patent (Compl. ¶63, ¶65).
U.S. Patent No. 8,156,499 - "Methods, Systems And Articles Of Manufacture For Scheduling Execution Of Programs On Computers Having Different Operating Systems"
Issued April 10, 2012.
Technology Synopsis
The patent discloses a distributed computing system for scheduling processes on computers with different operating systems. A central scheduling computer uses a "master schedule" to define an execution sequence for processes on various client machines, including defining conditional relationships where the execution of one process depends on the outcome of another (’499 Patent, Abstract).
Asserted Claims
Claim 1 (Compl. ¶75).
Accused Features
The complaint accuses the task scheduler function within the ESET Security Management Center of infringing this patent (Compl. ¶74, ¶75).
U.S. Patent No. 8,370,457 - "Network Communication Through A Virtual Domain"
Issued February 5, 2013.
Technology Synopsis
This patent, related to the ’959 Patent, describes a system for providing client anonymity during network communications by creating a virtual domain. The technology involves establishing a forwarding internet protocol (IP) address for a pre-defined combination of a client IP address and a destination IP address to route traffic and mask the client's identity (’457 Patent, Abstract).
Asserted Claims
Claim 9 (Compl. ¶85).
Accused Features
The complaint accuses the ESET Server Security product's TLS protocol filtering/scanning feature of infringing this patent (Compl. ¶84, ¶86).
III. The Accused Instrumentality
Product Identification
The complaint accuses six categories of products and services: ESET Android App; ESET remote management platforms; ESET website infrastructure supporting multiple domains; ESET MSP Administrator; ESET Security Management Center; and ESET Server Security (Compl. ¶16).
Functionality and Market Context
- The complaint alleges the accused products perform functions related to data storage, file synchronization, network traffic routing, remote administration, and task scheduling within ESET's suite of security and management software (Compl. ¶26, ¶37, ¶54, ¶65, ¶75, ¶86).
- For the ESET Android App, the accused functionality is storing information in a repository (e.g., saving image files) and using identifiers like directories and digital signatures for organization (Compl. ¶26).
- For ESET remote management platforms, the accused functionality is synchronizing files, such as endpoint certificates, between a central node and multiple local nodes using local and central databases to manage updates (Compl. ¶37).
- For the ESET website infrastructure, the accused functionality involves using components like front-end server switches, firewalls, and DNS to manage and anonymize the routing of network packets between a user's device and ESET's web servers (Compl. ¶54).
- For the ESET MSP Administrator, the accused functionality is a dashboard that allows users to remotely control access rights and data directory structures based on user roles and permissions stored in a profile database (Compl. ¶65).
- For the ESET Security Management Center, the accused functionality is its task scheduler, which can schedule a program (e.g., a security scan) on one computer, receive the result, and then schedule a second program on another computer based on that result, even if the computers have different operating systems (Compl. ¶75).
- For ESET Server Security, the accused functionality is TLS protocol filtering, which allegedly establishes a forwarding IP address based on a pre-defined combination of a client IP address and a destination IP address (Compl. ¶86).
- The complaint does not provide sufficient detail for analysis of the products' specific market positioning or commercial importance.
IV. Analysis of Infringement Allegations
No probative visual evidence provided in complaint.
’063 Patent Infringement Allegations
| Claim Element (from Independent Claim 4) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| storing information to be provided in an information pack | Storing information by uploading to servers or saving image files. | ¶26 | col. 6:29-31 |
| associating with said information pack at least a user destination address... a category identifier... and a provider identifier | Associating an "information pack" with the address of a data repository, a "data" directory as the category identifier, and "ESET" as the provider identifier. | ¶26 | col. 6:22-26 |
| communicating said information pack by means of a network to said user data repository | Sending the information pack to be stored in the specified data repository. | ¶26 | col. 3:25-27 |
| creating a custom location in said user data repository; placing said information pack in said custom location | Creating a file folder reserved for the information. | ¶26 | col. 9:11-23 |
| sending a custom category signal to a processing station uniquely associated with said user data repository | Using a digital signature on an Android APK file to identify other information packs for storage in the same location, which allegedly constitutes sending a custom category signal. | ¶26 | col. 24:51-56 |
’780 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| (a) storing one copy of each file that is shared between the local nodes in each of the local file servers | Storing a copy of an endpoint certificate that is shared between local nodes (e.g., networked devices). | ¶37 | col. 2:47-49 |
| (b) creating a first table in each of the local databases to store information on copies of files in its respective local file server | Creating a first table in local databases to store information on the certificate copies. | ¶37 | col. 2:49-52 |
| (c) creating a second table in the central database to record all update information on copies of files in all the local file servers | Creating a second table in a central database to record all certificate update information. | ¶37 | col. 2:52-55 |
| (d) updating a copy of a file in one of the local file servers | Updating a copy of the certificate in one of the devices using ESET remote management platforms. | ¶37 | col. 2:55-56 |
| (e) adding a new item of update information on the file in the second table | Adding a new item of update information about the certificate to the second (central) table. | ¶37 | col. 2:56-58 |
| (f) downloading the updated copy of the file from said one of the local file servers, and uploading the updated copy of the file to the central file server as the latest edition of the file | Downloading the updated certificate from a local file server and uploading it to the central file server as the latest version. | ¶37 | col. 2:58-62 |
| (g) determining whether a required copy of the file in another of the local file servers needs to be updated | Determining if a certificate on another local file server requires an update. | ¶37 | col. 2:62-64 |
| (h) downloading the latest edition of the file from the central file server to update said another of the local file servers if the required copy of the file needs to be updated | Downloading the latest version of the certificate from the central file server to update another local file server. | ¶37 | col. 2:64-68 |
Identified Points of Contention
- Scope Questions: A potential issue for the ’780 Patent is whether the term "file server" as used in the patent, which describes general file sharing in an enterprise, can be construed to cover the specialized systems alleged to be managing security "endpoint certificates".
- Technical Questions: For the ’063 Patent, the infringement theory raises the question of whether a standard software security feature performs the specific function claimed. What evidence does the complaint provide that the "digital signature" of an Android application file functions as a "custom category identifier" that is used to send a "custom category signal" to a processing station, as opposed to serving as a conventional security and authenticity verification mechanism?
V. Key Claim Terms for Construction
The Term: "custom category signal" (’063 Patent, Claim 4)
Context and Importance
This term is central to the infringement allegation against the ESET Android App. The complaint alleges that using an APK's digital signature to identify other files that should be stored together constitutes sending this "signal." The construction of this term will determine whether a standard software authentication feature can meet this specific claim limitation.
Intrinsic Evidence for Interpretation
- Evidence for a Broader Interpretation: The specification describes "Feedback means" to "relay back to the Provider... specifics as to the reassignment or additional categorization of information performed by the Recipient" (’063 Patent, col. 4:31-36). This general language could be argued to encompass any automated communication of categorization information.
- Evidence for a Narrower Interpretation: The detailed description suggests a more deliberate user action, where a user creates a "custom location" and the system then communicates this choice to a processing station to direct "further Information Packs" (’063 Patent, col. 12:55-63). This may support a narrower construction requiring an explicit, user-initiated categorization choice, rather than a passive check of an inherent file property like a signature.
The Term: "file server" (’780 Patent, Claim 1)
Context and Importance
The accused functionality for the ’780 Patent involves synchronizing security certificates across a network. Defendant may argue that a specialized certificate management system is not a general-purpose "file server" as contemplated by the patent. Practitioners may focus on this term because its scope will determine if the patent applies to specialized data management systems or only to general-purpose file storage.
Intrinsic Evidence for Interpretation
- Evidence for a Broader Interpretation: The patent does not narrowly define the term, describing a file server's function simply as being "used for uploading and downloading files" (’780 Patent, col. 1:26-28). This broad functional description may support its application to any system component that stores and retrieves digital assets.
- Evidence for a Narrower Interpretation: The patent's background describes the problem in the context of a file that is "cooperatively shared among different LANs," suggesting general-purpose business documents or data files rather than highly specialized, system-critical security objects like certificates (’780 Patent, col. 1:30-32).
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Defendant induces infringement of the ’780 Patent by instructing customers on how to use its remote management platforms in an infringing manner through "support and sales activities" and information available on its website (Compl. ¶39-40, ¶42).
- Willful Infringement: Willful infringement is alleged for the ’780 Patent. The basis for this claim is Defendant's alleged knowledge of the patent as of a December 14, 2020 notice letter, and its continued alleged infringement thereafter (Compl. ¶41; Prayer for Relief ¶D).
VII. Analyst’s Conclusion: Key Questions for the Case
- A central issue will be one of technical and functional correspondence: can standard, modern software security and management features (e.g., an application's digital signature, a certificate management system) be shown to perform the specific functions of the purpose-built system elements described in the patents (e.g., a "custom category signal," a general-purpose "file server")? The resolution may depend on whether the complaint’s mapping of accused features to claim limitations is based on a fundamental operational match or a superficial linguistic one.
- A second core issue will be one of definitional scope: can terms rooted in the context of early-2000s enterprise networking and data management be construed broadly enough to cover the more specialized and distinct technologies present in contemporary security products? This question will likely be at the heart of claim construction for terms across several of the asserted patents.
- Finally, a key question for damages will be willfulness: given the allegation of a pre-suit notice letter sent nearly three years before the complaint was filed, the determination of whether Defendant's conduct after that date constituted willful infringement will significantly influence any potential damages award if liability is established.