DCT
2:24-cv-00504
DataCloud Tech LLC v. Zscaler Inc
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: DataCloud Technologies, LLC (Georgia)
- Defendant: Zscaler, Inc. (Delaware)
- Plaintiff’s Counsel: Rozier Hardt McDonough PLLC
- Case Identification: 2:24-cv-00504, E.D. Tex., 07/09/2024
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas based on Defendant’s substantial business in the district, including maintaining an office in Plano, Texas, and committing the alleged acts of infringement within the state and district.
- Core Dispute: Plaintiff alleges that Defendant’s cloud security platform and related applications infringe four patents related to network data management, virtual domain communication, and remote file access.
- Technical Context: The technology relates to methods for managing, securing, and routing network data, which are foundational elements of modern cloud-based security services and zero-trust network access platforms.
- Key Procedural History: The complaint notes that Defendant was informed of Plaintiff's patent portfolio, including the Asserted Patents, by a letter dated December 15, 2020, which may form the basis for a willfulness allegation.
Case Timeline
| Date | Event |
|---|---|
| 2000-01-28 | Priority Date for U.S. Patent No. 6,651,063 |
| 2000-04-04 | Priority Date for U.S. Patent No. 7,209,959 |
| 2000-04-04 | Priority Date for U.S. Patent No. 8,370,457 |
| 2002-03-29 | Priority Date for U.S. Patent No. 7,398,298 |
| 2003-11-18 | U.S. Patent No. 6,651,063 Issues |
| 2007-04-24 | U.S. Patent No. 7,209,959 Issues |
| 2008-07-08 | U.S. Patent No. 7,398,298 Issues |
| 2013-02-05 | U.S. Patent No. 8,370,457 Issues |
| 2020-12-15 | Plaintiff sends letter to Defendant regarding patent portfolio |
| 2024-07-09 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,651,063 - "Data Organization And Management System And Method"
- Patent Identification: U.S. Patent No. 6,651,063, "Data Organization And Management System And Method," issued November 18, 2003. (Compl. ¶21).
The Invention Explained
- Problem Addressed: The patent describes the difficulty for businesses and consumers to collect and organize an overwhelming amount of information, such as product manuals and warranties. Existing methods like physical filing cabinets or basic computer programs are described as "cumbersome, decentralized and otherwise inefficient" (’063 Patent, col. 1:16-54).
- The Patented Solution: The invention proposes a system where information providers send pre-categorized "information packs" to a recipient's "User Data Repository." These packs contain identifiers for the provider and the information category, allowing the system to automatically file the data. The system also allows the user to create custom categories and communicate this custom organization scheme back to a central processing station or the provider, so that subsequent information can be automatically routed to the user-defined custom location (’063 Patent, Abstract; Fig. 1; col. 4:3-12).
- Technical Importance: The technology aimed to automate the organization of digital information by shifting the initial categorization burden from the end-user to the information provider, streamlining the management of electronic records in an era of expanding digital communication (’063 Patent, col. 1:29-44).
Key Claims at a Glance
- The complaint asserts infringement of at least independent method Claim 4 (Compl. ¶27).
- The essential elements of Claim 4 include:
- Storing information in an "information pack."
- Associating the pack with a "user destination address," a "category identifier," and a "provider identifier."
- Communicating the pack over a network to a "user data repository" and locating it in a pre-reserved category location.
- A further series of steps where a user creates a "custom location" for the pack and associates it with a "custom category identifier."
- Sending a "custom category signal" to a "processing station," which then stores the custom category and provider identifiers and uses them to automatically place subsequent matching information packs into that same custom location.
U.S. Patent No. 7,209,959 - "Apparatus, System, And Method For Communicating To A Network Through A Virtual Domain Providing Anonymity To A Client Communicating On The Network"
- Patent Identification: U.S. Patent No. 7,209,959, "Apparatus, System, And Method For Communicating To A Network Through A Virtual Domain Providing Anonymity To A Client Communicating On The Network," issued April 24, 2007. (Compl. ¶31).
The Invention Explained
- Problem Addressed: Standard internet protocols expose a client's identity (e.g., IP address) to web servers, creating privacy risks like tracking and unwanted solicitations. The patent notes that existing proxy servers merely substitute one identity for another without providing true, flexible anonymity, especially for groups (’959 Patent, col. 1:57-2:28).
- The Patented Solution: The patent describes a three-part architecture—a "deceiver", a "controller", and a "forwarder"—that works together to create an anonymous communication session. The "deceiver" intercepts a client's request and, via the "controller", provides the client with the "forwarder"'s IP address instead of the true destination's address. All subsequent traffic is routed through the "forwarder", which masks the client's identity from the destination server and vice-versa, effectively creating a temporary, anonymous virtual domain (’959 Patent, Abstract; Fig. 1; col. 2:33-51).
- Technical Importance: This architecture offered a method for establishing ad hoc, anonymous communication channels, enhancing user privacy and enabling the creation of "virtual namespaces" for isolated group activities on the network (’959 Patent, col. 2:48-54).
Key Claims at a Glance
- The complaint asserts infringement of at least independent method Claim 1 (Compl. ¶37).
- The essential elements of Claim 1 include:
- In response to a client request, setting up a "forwarding session" using a "forwarder" placed between the client and destination server.
- Implementing the session such that "neither the client or the destination server is aware of the employment of the forwarder."
- Employing a "controller" that communicates with the forwarder and a domain name server (DNS) to resolve the destination website's name.
- Employing a "deceiver" that communicates with the client and controller, receiving the initial client request and initiating the controller's query to the DNS.
- Initiating the forwarding session after the controller receives the DNS response and communicates with the forwarder.
U.S. Patent No. 7,398,298 - "Remote Access And Retrieval Of Electronic Files"
- Patent Identification: U.S. Patent No. 7,398,298, "Remote Access And Retrieval Of Electronic Files," issued July 8, 2008. (Compl. ¶41).
- Technology Synopsis: The patent addresses shortcomings in remote data access systems, where users often lack granular control over directory structures and do not receive confirmation of data delivery (’298 Patent, col. 1:15-2:37). The invention provides a server-based application that allows authenticated users to remotely manage data directory structures, with access rights governed by a "profile data store," and enables users to modify these structures and receive delivery notifications (’298 Patent, Abstract).
- Asserted Claims: At least independent system Claim 13 (Compl. ¶47).
- Accused Features: "Zscaler web-based creation and configuration of user accounts including roles ('Zscaler roles management')," specifically within the ZIA Admin Portal, is accused of providing a system for remotely controlling user-accessible webpages and functions based on role definitions stored in a database (Compl. ¶46-47).
U.S. Patent No. 8,370,457 - "Network Communication Through A Virtual Domain"
- Patent Identification: U.S. Patent No. 8,370,457, "Network Communication Through A Virtual Domain," issued February 5, 2013. (Compl. ¶51).
- Technology Synopsis: This patent, which shares a specification with the ’959 patent, also addresses user anonymity on networks. The invention focuses on a method for establishing a "forwarding internet protocol (IP) address" that is specifically created for a "pre-defined combination of a client IP address and a destination IP address." Data requests matching this combination are then routed via the special forwarding IP address, creating a virtual communication path (’457 Patent, Abstract; Claim 9).
- Asserted Claims: At least independent method Claim 9 (Compl. ¶57).
- Accused Features: "Zscaler firewalls including filtering policies ('Zscaler firewalls with policies')" are accused of infringing by establishing forwarding IP addresses (translated IP addresses) for pre-defined combinations of client and destination IPs and forwarding data requests accordingly (Compl. ¶56-57).
III. The Accused Instrumentality
Product Identification
The complaint targets four functionalities within Defendant's product suite: the "Zscaler Android Client Connector app," "Zscaler systems for supporting multiple domain names on the same website infrastructure," "Zscaler web-based creation and configuration of user accounts including roles," and "Zscaler firewalls including filtering policies" (Compl. ¶18). These appear to be components of Zscaler's broader Zero Trust Exchange cloud security platform (Compl. ¶37, fn. 5).
Functionality and Market Context
- The Android Client Connector is accused of implementing a method for storing and communicating categorized information to user repositories (Compl. ¶27).
- The Website Infrastructure is alleged to create anonymous communication links between users and Zscaler's various web domains (e.g., zscaler.com, api.zscaler.com) by using a forwarder, controller, and deceiver architecture to manage traffic (Compl. ¶37).
- The Roles Management functionality, within the ZIA Admin Portal, is described as a system for controlling remote user access to different webpages and functions based on assigned roles, with permissions managed in a profile data store (Compl. ¶47).
- The Firewalls with Policies feature is alleged to establish and use specific forwarding IP addresses to route network traffic based on configured rules matching client and destination IP addresses (Compl. ¶57).
- The complaint alleges Zscaler is a provider of "website hosting platforms and networking solutions," positioning it as a significant entity in the cloud security and network services market (Compl. ¶17).
IV. Analysis of Infringement Allegations
The complaint's infringement allegations consist of prose that largely tracks the language of the asserted claims for each patent. No probative visual evidence provided in complaint.
U.S. Patent No. 6,651,063 Infringement Allegations
| Claim Element (from Independent Claim 4) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| storing information to be provided in an information pack; | The Zscaler Android Client Connector app stores information to be provided. | ¶27 | col. 6:20-22 |
| associating with said information pack at least a user destination address...and a category identifier; | The app associates a user destination address and category identifier with the information pack. | ¶27 | col. 6:26-38 |
| associating with said information pack a provider identifier; | The app associates a provider identifier with the information pack. | ¶27 | col. 6:30-38 |
| communicating said information pack by means of a network to said user data repository associated with the user destination address; | The app communicates the information pack over a network to the user data repository. | ¶27 | col. 6:55-59 |
| creating a custom location in said user data repository; placing said information pack in said custom location; associating a custom category identifier with said information pack; | The app creates a custom location, places the pack in it, and associates a custom category identifier with it. | ¶27 | col. 9:1-24 |
| sending a custom category signal to a processing station...said data storage means storing together said custom category identifier and said provider identifier, and said data processing means analyzing the provider identifier of subsequent...information packs...and in the event of a match...placing said one of the subsequent information packs in said custom location. | The app sends a signal to a processing station that analyzes subsequent packs and, upon a provider match, places them in the custom location. | ¶27 | col. 10:30-50 |
Identified Points of Contention
- Scope Questions: Do the functions of the "Zscaler Android Client Connector app," a modern security tool, align with the patent's concept of an "information pack" system designed for organizing consumer data like receipts and manuals? The complaint's allegations are generalized and do not specify the nature of the "information" being stored or categorized.
- Technical Questions: What evidence does the complaint provide that the accused app performs the complex back-end function of communicating with a "processing station" that analyzes subsequent data transfers and automatically routes them to a "custom location" based on a "provider identifier" match, as required by the final limitation of claim 4?
U.S. Patent No. 7,209,959 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| ...setting up a forwarding session...employing a forwarder disposed between the client and the destination server... | Zscaler's infrastructure sets up a forwarding session using a "front-end server switch" as the forwarder. | ¶37 | col. 2:39-44 |
| ...wherein the forwarding session is set up and implemented such that neither the client or the destination server is aware of the employment of the forwarder; | The destination server has a direct TCP connection with a local IP address, thus neither it nor the client is aware of the forwarder. | ¶37 | col. 8:51-54 |
| ...employing a controller configured to communicate with the forwarder and a domain name server, wherein the controller queries the domain name server to resolve the name of the destination website... | Zscaler employs a "firewall" as the controller, which communicates with the "front-end server switch" (forwarder) and a DNS. | ¶37 | col. 2:39-44 |
| ...employing a deceiver configured to communicate with the controller and the client, wherein the deceiver receives the request by the client...and initiates the controller to query the domain name server... | Zscaler employs a "router" as the deceiver, which communicates with the "firewall" (controller) and the client. | ¶37 | col. 2:36-39 |
Identified Points of Contention
- Scope Questions: Does the alleged use of a generic "firewall" and "router" in Zscaler's system satisfy the specific functional roles of the "controller" and "deceiver" as defined by the patent's three-part architecture?
- Technical Questions: The complaint makes a conclusory assertion that "neither the client or the destination server is aware of the employment of the forwarder." What technical evidence will be presented to prove this critical element of client/server isolation, which is a core feature of the claimed invention?
V. Key Claim Terms for Construction
For the '063 Patent
- The Term: "processing station"
- Context and Importance: This term is central to the final, and most complex, limitation of asserted Claim 4. The infringement case depends on proving the existence of a "processing station" that performs the claimed logic of receiving a "custom category signal," storing identifiers, and automatically routing subsequent information packs. The definition of what constitutes such a station will be critical.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification suggests the processing station can be a logically remote entity, stating it can be a "data storage and processing unit within the system, but remote from the Providers" and can be "associated directly with the Recipient's Firewall/Filter" (’063 Patent, col. 4:46-52). This may support an argument that its functions can be distributed.
- Evidence for a Narrower Interpretation: The patent figures depict the "processing station" (30) as a distinct architectural block, and the claims require it to include "a data storage means and a data processing means" with specific functions, suggesting it is a structured component rather than any generic server performing processing tasks (’063 Patent, Fig. 1; col. 7:27-34).
For the '959 Patent
- The Term: "deceiver"
- Context and Importance: The infringement theory for the '959 patent hinges on mapping Zscaler's components to the patent's three-part system. Practitioners may focus on this term because the complaint identifies a "router" as the "deceiver", and the viability of this assertion depends on whether a standard network router performs the specific functions claimed for the "deceiver".
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim describes the "deceiver"'s function as being "configured to communicate with the controller and the client" and receiving the client's request to "initiate the controller to query the domain name server" (’959 Patent, col. 8:55-63). This functional description could arguably be met by various network components.
- Evidence for a Narrower Interpretation: The patent's summary introduces the "deceiver", "controller", and "forwarder" as three distinct algorithms that collectively perform "DNS Misdirection" (’959 Patent, col. 2:33-39). The detailed description explains that the client is "deceived" into thinking the forwarder's IP is the destination IP, which is the core function of this component (’959 Patent, col. 4:43-47). This suggests the term requires a specific deceptive functionality, not just generic routing.
VI. Other Allegations
- Indirect Infringement: The complaint includes general allegations that Defendant contributes to and induces infringement by third parties, such as customers and intermediaries, by providing its products and services (Compl. ¶12). The complaint does not, however, allege specific facts supporting inducement for each patent, such as quoting from instructional materials.
- Willful Infringement: The complaint alleges that Defendant had pre-suit knowledge of the asserted patents via a letter sent on December 15, 2020 (Compl. ¶19). This allegation forms the basis for a potential claim of willful infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of architectural mapping: can the integrated functions of Zscaler's modern cloud security platform be fairly mapped onto the distinct, modular components (e.g., "deceiver", "controller", "forwarder", "processing station") described in patents from the early 2000s, or is there a fundamental mismatch in technical architecture and operation?
- A key evidentiary question will be one of functional specificity: can the Plaintiff provide sufficient technical evidence to demonstrate that the accused products perform the specific, multi-step logical functions required by the asserted claims—such as the '063 patent's requirement for a "processing station" that analyzes subsequent information packs for automatic custom routing—when the complaint primarily recites claim language without detailed factual support?
- A third question will concern claim scope: will terms like "information pack" in the '063 patent, described in the context of organizing consumer product data, be construed broadly enough to read on the data handled by a sophisticated enterprise security application like the Zscaler Android Client Connector?
Analysis metadata