2:24-cv-01044
Torus Ventures LLC v. Lone Star National Bank
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Torus Ventures LLC (Delaware)
- Defendant: Lone Star National Bank (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 2:24-cv-01044, E.D. Tex., 12/12/2024
- Venue Allegations: Plaintiff alleges venue is proper because Defendant has an established place of business in the district and has committed acts of infringement in the district.
- Core Dispute: Plaintiff alleges that unspecified products and services offered by Defendant infringe a patent related to a recursive security protocol for digital copyright control.
- Technical Context: The technology concerns methods for protecting digital data through multiple layers of encryption, where the security protocol itself can be updated and secured recursively.
- Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit. The complaint’s infringement allegations rely entirely on external exhibits that were not filed with the complaint.
Case Timeline
| Date | Event |
|---|---|
| 2002-06-20 | U.S. Patent No. 7,203,844 Earliest Priority Date |
| 2007-04-10 | U.S. Patent No. 7,203,844 Issues |
| 2024-12-12 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
- U.S. Patent No. 7,203,844, Method and system for a recursive security protocol for digital copyright control, issued April 10, 2007.
- The Invention Explained:
- Problem Addressed: The patent describes the challenge of protecting digital content in an era where perfect, cost-free duplication is possible, rendering traditional copyright enforcement difficult (’844 Patent, col. 1:24-44). It notes that prior security protocols often make "artificial distinctions between the various types of bit streams to be protected" and are not capable of securing themselves (’844 Patent, col. 2:30-49).
- The Patented Solution: The invention proposes a "Recursive Security Protocol" where a digital bitstream is encrypted with a first algorithm, and that encrypted result is then associated with a decryption algorithm. This entire package—the encrypted data and its decryption method—is then encrypted again using a second algorithm (’844 Patent, Abstract; col. 2:55-68). This recursive structure allows the protocol to be updated to fix security holes without requiring hardware changes, as the new security system can "subsume" the old one (’844 Patent, col. 4:32-42).
- Technical Importance: The protocol's ability to protect itself and be updated via software was designed to provide more durable and flexible security than static, hardware-based systems (’844 Patent, col. 4:18-31).
- Key Claims at a Glance:
- The complaint does not identify any specific claims asserted against the Defendant (Compl. ¶¶ 11, 16). It refers generally to "one or more claims" and to "Exemplary '844 Patent Claims" that are purportedly identified in an external exhibit not provided with the complaint.
- The Invention Explained:
III. The Accused Instrumentality
Product Identification
The complaint does not specifically name any accused products or services. It refers to "the Defendant products identified in the charts incorporated into this Count below (among the 'Exemplary Defendant Products')" (Compl. ¶11). These charts are part of an external exhibit (Exhibit 2) that was not filed with the complaint.
Functionality and Market Context
The complaint does not provide any description of the functionality or market context of the accused instrumentalities.
IV. Analysis of Infringement Allegations
The complaint does not provide sufficient detail for analysis of infringement. It states that "the Exemplary Defendant Products practice the technology claimed by the '844 Patent" and "satisfy all elements of the Exemplary '844 Patent Claims," but these claims and products are identified only in an external exhibit not filed with the complaint (Compl. ¶16). No specific infringement theory is articulated in the body of the complaint itself.
No probative visual evidence provided in complaint.
V. Key Claim Terms for Construction
The complaint does not identify any asserted claims, which precludes the identification of key claim terms for construction.
VI. Other Allegations
Indirect Infringement
The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the '844 Patent" (Compl. ¶14). The complaint alleges Defendant has knowledge of its infringing activity at least as of the service of the complaint (Compl. ¶15).
Willful Infringement
While the complaint does not use the word "willful," it alleges that service of the complaint constitutes "actual knowledge of infringement" and that despite this knowledge, Defendant "continues to make, use, test, sell, offer for sale, market, and/or import" infringing products (Compl. ¶¶ 13-14). These allegations may form the basis for a claim of post-filing willful infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
- Pleading Sufficiency: A threshold issue will be whether the complaint, by failing to identify any asserted claims or accused products within the document itself and instead relying entirely on un-filed external exhibits, provides sufficient notice to satisfy the pleading standards established by Twombly and Iqbal.
- Definitional Scope: Assuming the case proceeds, a central question will likely be one of claim scope. The court may need to determine if the patent's claims, which are described in the context of "digital copyright control" and media streams (’844 Patent, Title; col. 1:39-44), can be construed to read on the technologies used by a financial institution like Lone Star National Bank.
- Technical Infringement: A key evidentiary question will be whether Defendant’s systems actually perform the "recursive" encryption required by the patent. For example, Plaintiff would need to prove that an accused system encrypts not just data, but also the combination of an already-encrypted bitstream and its associated decryption algorithm, as recited in claims such as independent claim 1 (’844 Patent, col. 29:15-26).