DCT
2:24-cv-00824
EasyWeb Innovations LLC v. Synccom Inc
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: EasyWeb Innovations, LLC (New York)
- Defendant: Sync.com Inc. (Canada)
- Plaintiff’s Counsel: Hecht Partners LLP
- Case Identification: 2:24-cv-00824, E.D. Tex., 10/07/2024
- Venue Allegations: Venue is alleged on the basis that Defendant is a foreign corporation that has committed acts of patent infringement in the district and manages the marketing and sale of its services to customers in Texas.
- Core Dispute: Plaintiff alleges that Defendant’s cloud storage platform infringes a patent related to methods for providing user-selectable, multi-level security for accessing a computer system.
- Technical Context: The technology concerns computer security systems that allow individual users to choose their preferred level of authorization, balancing convenience against security strength.
- Key Procedural History: The complaint notes that the patent-in-suit overcame a rejection under 35 U.S.C. § 101 during prosecution by arguing that providing user-customizable security schemes was a concrete technological improvement and "significantly more" than an abstract idea, analogizing its position to the Federal Circuit's decision in Bascom Global Internet Servs., Inc. v. AT&T Mobility LLC.
Case Timeline
| Date | Event |
|---|---|
| 1999-03-11 | U.S. Patent No. 10,114,905 Priority Date |
| 2016-05-06 | Earliest date alleged for infringement by Accused Product |
| 2018-10-30 | U.S. Patent No. 10,114,905 Issue Date |
| 2024-10-07 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,114,905 - "Individual User Selectable Multi-Level Authorization Method for Accessing a Computer System"
- Patent Identification: U.S. Patent No. 10,114,905, entitled “Individual User Selectable Multi-Level Authorization Method for Accessing a Computer System,” issued on October 30, 2018 (the "'905 Patent"). (Compl. ¶8).
The Invention Explained
- Problem Addressed: The complaint asserts that at the time of the invention, computer access security systems were typically rigid and system-wide, forcing all users of a system to use a single, pre-determined security method without the ability to choose a different level of security for themselves. (Compl. ¶16). The patent's background describes prior art systems as lacking user-level customization for balancing security and convenience. (’905 Patent, Abstract).
- The Patented Solution: The invention is a method for providing user-customizable security by allowing each user of a computer system to select a security scheme from a plurality of available schemes, where different schemes require different amounts or types of identification information. (’905 Patent, Abstract). This selection is then stored in the user's account and used to authorize that specific user's access, independent of the schemes chosen by other users on the same system. (Compl. ¶17; ’905 Patent, col. 45:10-44).
- Technical Importance: The complaint alleges that this approach represented a technological improvement by moving away from inflexible, one-size-fits-all security to a model where individual users could control the "strength" of their own authorization process. (Compl. ¶¶17, 20).
Key Claims at a Glance
- The complaint asserts direct and indirect infringement of claims 1-20. (Compl. ¶36). Independent claims 1, 9, and 18 are asserted.
- Independent Claim 1 (method) includes the elements of:
- Providing a plurality of security schemes, with a first scheme requiring a specific number of identification information and a second scheme requiring additional identification information.
- Prompting a user to select a particular security scheme.
- Storing the user's selection as a preference in the user's storage area.
- Authorizing the user's access to the computer system upon satisfaction of the selected scheme.
- Independent Claim 9 (method) includes the elements of:
- Providing a plurality of security schemes, where first and second schemes require a different number of identification information.
- Prompting a first user to select a first security scheme and a second user to select a second security scheme, independent of each other.
- Storing each user's selection in their respective storage area.
- Authorizing access for each user based on their individually selected scheme.
- The complaint reserves the right to assert all dependent claims. (Compl. ¶36).
III. The Accused Instrumentality
Product Identification
- All versions and variants of the Sync.com Web and Mobile Applications (the "Accused Products"). (Compl. ¶25).
Functionality and Market Context
- The Accused Products provide access to Defendant's cloud platform for secure document storage, file sharing, and collaboration. (Compl. ¶25). The complaint alleges that the Accused Products allow each user to choose between different security levels. A user can select a standard scheme (email and password only, described as "2-FA disabled") or a more secure two-factor authentication (2FA) scheme that requires an additional piece of identification information (a code from an email or an authenticator app). (Compl. ¶¶26, 28). This choice is allegedly stored as a user preference for subsequent logins. (Compl. ¶¶29, 32). A screenshot from a Sync.com help page illustrates the user interface for selecting between different 2FA options. (Compl. p. 10).
IV. Analysis of Infringement Allegations
’905 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| a computer-implemented method for... allowing each particular user to select a security scheme to be associated with that particular user independent of the security scheme selected by a remainder of the plurality of users... | The Sync.com platform allegedly allows each individual user to choose their own security settings (e.g., enabling or disabling 2FA) independently of the choices made by other users on the platform. (Compl. ¶26). | ¶26 | col. 45:13-19 |
| prompting the particular user of the computer system for a selection of a particular security scheme from among the plurality of security schemes, wherein a first... requires a specific number... and a second... requires additional identification information... | The Accused Products allegedly prompt users in an "Account Settings" menu to select a security scheme. (Compl. ¶28). The options include a "first security scheme" (2-FA disabled, requiring email and password) and a "second security scheme" (2-FA enabled, requiring email, password, and a third piece of information like a 2FA code). (Compl. ¶¶30-31). The visual evidence on page 10 shows the prompt to enable 2FA via email or Google Authenticator. (Compl. p. 10). | ¶28, ¶30-31 | col. 18:61-65 |
| storing the selection as a preference in the particular user's storage area | The complaint alleges on information and belief that the user's choice of security scheme is stored in the user's storage area and used to determine which scheme is applied during subsequent login attempts. (Compl. ¶¶29, 32). | ¶29, ¶32 | col. 45:38-39 |
| thereafter authorizing the particular user to access the computer system when the selected security scheme of the particular user is satisfied. | Access is allegedly granted when the user provides the identification information required by their selected scheme—either just an email/password, or an email/password plus a 2FA code. (Compl. ¶33). A screenshot shows an example of a 2FA code sent via email to satisfy the scheme. (Compl. p. 11). | ¶33 | col. 1 (Abstract) |
Identified Points of Contention
- Scope Questions: The ’905 Patent claims priority to 1999 and its specification is replete with examples involving contemporaneous technologies like fax machines, pagers, and PSTN-based IVR systems. A potential question for the court is whether the scope of the claims, when interpreted in light of this specification, can be construed to cover the architecture of a modern, web-based cloud storage service.
- Technical Questions: The complaint frames the "2-FA disabled" state as a selectable "first security scheme." A technical question is whether the baseline state of requiring only a password constitutes a distinct "scheme" a user "selects," or if it is merely the absence of any additional, optional security layers. The infringement analysis may turn on whether providing an option to add more security is functionally equivalent to providing a choice among a plurality of schemes.
V. Key Claim Terms for Construction
The Term: "security scheme"
- Context and Importance: This term is the core of the claimed invention. Its construction will determine whether the accused product's options—a baseline password-only state ("2-FA disabled") and optional 2FA methods—qualify as the "plurality of security schemes" from which a user makes a selection as required by the claims.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claims do not narrowly define the term, requiring only that different schemes have different requirements for "identification information." (’905 Patent, col. 45:31-37; col. 46:29-37). This could support a broad reading where any distinct set of access credentials qualifies as a "scheme."
- Evidence for a Narrower Interpretation: The specification's examples heavily feature security for publishing content via legacy systems, such as using Caller ID or DTMF tones to validate a user sending a fax or audio message. (’905 Patent, col. 11:37-12:12). This context may support a narrower construction tied to the specific authentication methods and purposes disclosed in the embodiments.
The Term: "prompting the particular user... for a selection"
- Context and Importance: The complaint identifies a settings page as the location of the "prompt." The interpretation of "prompting" is critical to determining whether making options available in a user-navigated settings menu meets this claim limitation.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: A plaintiff may argue that presenting selectable options on a user interface, regardless of location, constitutes "prompting" the user to make a choice.
- Evidence for a Narrower Interpretation: The patent's primary embodiment describes an Interactive Voice Response (IVR) system that actively "announces" a menu and "prompt[s]" the user for a selection at each step. (’905 Patent, col. 18:57-65). This may support a narrower interpretation requiring an active or mandatory step, rather than a passive option within a settings menu.
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement, stating that Defendant provides instructions, online documentation (such as the help page referenced as evidence), and technical support that encourage customers to use the Accused Products in an infringing manner. (Compl. ¶40). It also alleges contributory infringement on the basis that the accused features are not staple articles of commerce and are known to be especially adapted for infringement. (Compl. ¶41).
- Willful Infringement: The complaint alleges that Defendant's indirect infringement is performed with knowledge of the ’905 Patent and with the intent, or willful blindness, that the induced acts constitute infringement. (Compl. ¶¶40-41).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of technological scope and validity: Given the ’905 Patent’s 1999 priority date and its specification’s focus on PSTN, IVR, and fax-based systems, can the claims be validly construed to cover the architecture and functionality of a modern, web-based cloud storage service without raising questions of patentability under 35 U.S.C. §§ 101 or 112?
- A key evidentiary question will be one of functional interpretation: Does presenting a baseline password-only access state alongside optional two-factor authentication methods within a settings menu meet the claim requirement of "prompting" a user to "select" from a "plurality of security schemes"? The case may turn on whether the accused functionality is seen as a choice among distinct schemes or merely an option to augment a default state.
Analysis metadata