2:24-cv-01085
Secure Matrix LLC v. Dickey's Barbecue Restaurants Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Secure Matrix LLC (Delaware)
- Defendant: Dickey's Barbecue Restaurants, Inc. (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 2:24-cv-01085, E.D. Tex., 12/30/2024
- Venue Allegations: Venue is alleged to be proper in the Eastern District of Texas because the Defendant has an established place of business in the District and has allegedly committed acts of patent infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s products and systems directly and indirectly infringe a patent related to user authentication and verification.
- Technical Context: The technology concerns methods for authenticating users who are seeking to access a secured capability, such as a website or an online payment system, by using a multi-device process involving a reusable identifier.
- Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2012-11-21 | '116 Patent Priority Date (provisional app. 61/729,266) |
| 2013-08-09 | '116 Patent Application Filing Date |
| 2014-03-18 | '116 Patent Issue Date |
| 2024-12-30 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,677,116 - “Systems and methods for authentication and verification”
- Issued: March 18, 2014
The Invention Explained
- Problem Addressed: The patent identifies a growing need to securely and efficiently authenticate users who are attempting to access secured resources, such as internet portals or online payment systems, often using a mobile device (’116 Patent, col. 1:19-28).
- The Patented Solution: The invention describes a multi-device authentication method where a computer providing a "secured capability" (e.g., a web server) sends a "reusable identifier" (e.g., a QR code) to a user's device. The user then uses a second electronic device (e.g., a smartphone) to capture this identifier and send it, along with user verification information, to a separate verification server. This server evaluates the information and, if the user is authorized, sends an authorization signal to grant access (’116 Patent, col. 2:30-45, Fig. 2). The reusability of the identifier is noted as an advantage over systems requiring a unique identifier for every transaction (’116 Patent, col. 6:35-41).
- Technical Importance: This approach aims to provide enhanced security for online transactions without requiring users to remember complex passwords, while also reducing the server-side computational load associated with generating unique, single-use transaction identifiers (’116 Patent, col. 6:51-57).
Key Claims at a Glance
- The complaint asserts infringement of "exemplary claims" without specifying claim numbers, but independent method claim 1 is foundational to the patent (’116 Patent, col. 33:18-40).
- The essential elements of independent claim 1 include:
- using a computer system to receive a first signal from a computer providing a secured capability, the signal comprising a "reusable identifier" assigned for a "finite period of time"
- using the computer system to receive a second signal from a user's electronic device, the signal comprising a copy of the reusable identifier and "user verification information"
- using a processor to evaluate, based on the first and second signals, whether the user is authorized
- transmitting a third signal with authorization information to the electronic device and/or the computer providing the secured capability
- The complaint reserves the right to assert other claims, which could include dependent claims (’116 Patent, col. 34:1-41:67).
III. The Accused Instrumentality
Product Identification
The complaint refers to "Exemplary Defendant Products" and "numerous other devices that infringe" but does not name any specific product, system, or service offered by Dickey’s Barbecue Restaurants, Inc. (Compl. ¶11).
Functionality and Market Context
The complaint alleges that the unidentified "Exemplary Defendant Products" practice the technology claimed by the ’116 Patent (Compl. ¶16). It states that Defendant makes, uses, sells, and/or imports these products, and that its employees internally test and use them (Compl. ¶¶11-12). However, the complaint does not provide any specific details about the technical functionality, operation, or market context of the accused instrumentalities.
IV. Analysis of Infringement Allegations
The complaint incorporates infringement allegations by reference to claim charts in an "Exhibit 2" (Compl. ¶¶16-17). As this exhibit was not filed with the complaint, a detailed element-by-element analysis is not possible. The narrative alleges that Defendant's unidentified products "satisfy all elements of the Exemplary '116 Patent Claims" (Compl. ¶16). No probative visual evidence provided in complaint.
Identified Points of Contention
Given the nature of the patent and the defendant, the dispute may center on how a restaurant chain's systems (e.g., online ordering platforms, customer loyalty applications, or point-of-sale systems) could be argued to practice the claimed authentication method.
- Scope Questions: A primary question will be whether the Defendant's systems, which may use conventional login or payment authorization flows, can be characterized as performing the specific three-party communication (user device, service computer, verification server) described in the patent.
- Technical Questions: A key evidentiary question will be whether any identifier used in the Defendant's systems functions as a "reusable identifier" that is "assigned for a finite period of time" as required by claim 1. Further, it raises the question of what specific data transmitted by a user's device constitutes the "user verification information" distinct from the identifier itself.
V. Key Claim Terms for Construction
"reusable identifier"
- Context and Importance: This term is central to the claimed invention, which distinguishes itself from prior art systems using "one-time-use" or "unique" identifiers (e.g., ’116 Patent, col. 9:14-21). The infringement analysis will depend on whether an identifier in the accused system can be shown to be "reusable" in the manner contemplated by the patent.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification states the term has its "broadest reasonable interpretation" and is not unique to one user or transaction, suggesting it could cover any session token or credential used more than once (’116 Patent, col. 9:6-12).
- Evidence for a Narrower Interpretation: The patent frequently describes the reusable identifier in the context of a "round robin" queue of predefined identifiers or a QR code that is displayed to a user and valid for a "finite and predetermined period of time," potentially limiting the term to identifiers used in such a specific cyclical or time-limited system (’116 Patent, col. 9:36-54).
"finite period of time"
- Context and Importance: Claim 1 requires the "reusable identifier" be "assigned for use... for a finite period of time." This limitation may be a key point of dispute, as its presence or absence in the accused systems could be determinative of infringement.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The term itself is not explicitly defined, which may support an argument that any identifier that eventually expires or is replaced (e.g., a session cookie with an expiration date) meets the limitation.
- Evidence for a Narrower Interpretation: The specification provides examples of this period as "one or more minutes, one or more hours, one or more days" and links it to a "round robin usage" system where identifiers are cycled, suggesting a more structured and predetermined time limit rather than an indefinite session that simply ends upon logout (’116 Patent, col. 9:42-49).
VI. Other Allegations
Indirect Infringement
The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials" that instruct end users to use the accused products in a manner that infringes the ’116 Patent (Compl. ¶14). The claim is based on knowledge acquired "at least since being served by this Complaint" (Compl. ¶15).
Willful Infringement
The complaint does not contain an explicit count for willful infringement, but the allegations of continued infringement despite "actual knowledge" from the service of the complaint could form the basis for a future claim of post-filing willfulness (Compl. ¶¶13-14).
VII. Analyst’s Conclusion: Key Questions for the Case
- Evidentiary Sufficiency: A threshold issue will be whether the Plaintiff can identify specific functionalities within the Defendant’s commercial systems (e.g., online ordering, loyalty programs) that map to the patent's three-party architecture involving a distinct "verification server," a "reusable identifier," and separate "user verification information."
- Definitional Scope: The case will likely hinge on claim construction, particularly whether the term "reusable identifier... assigned for a finite period of time" can be construed to read on the types of session tokens or login credentials commonly used in web and mobile applications, or if it is limited to the specific cyclical, time-boxed systems described in the patent's embodiments.
- Indirect Infringement Proof: For its inducement claim, a central question will be whether the Plaintiff can demonstrate that Defendant’s user-facing materials specifically instruct customers to perform the claimed multi-step authentication method, and that Defendant possessed the requisite intent to encourage infringement.