2:25-cv-00008
Secure Matrix LLC v. Posados Cafe Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Secure Matrix LLC (DE)
- Defendant: Posados Cafe, Inc. (TX)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: [Secure Matrix LLC](https://ai-lab.exparte.com/party/secure-matrix-llc) v. Posados Cafe Inc, 2:25-cv-00008, E.D. Tex., 01/06/2025
- Venue Allegations: Venue is alleged to be proper based on Defendant having an established place of business in the district and having committed alleged acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s unspecified products infringe a patent related to systems and methods for user authentication and verification using a mobile device.
- Technical Context: The technology concerns two-factor authentication, where a user's mobile device interacts with a separate computer (e.g., a web browser) to securely log in or authorize a transaction, often using a displayed visual code.
- Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or specific licensing history related to the patent-in-suit.
Case Timeline
| Date | Event | 
|---|---|
| 2012-11-21 | Earliest Priority Date for U.S. Patent No. 8,677,116 | 
| 2013-08-09 | Application for U.S. Patent No. 8,677,116 filed | 
| 2014-03-18 | U.S. Patent No. 8,677,116 issued | 
| 2025-01-06 | Complaint filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,677,116 - "Systems and methods for authentication and verification," issued March 18, 2014
The Invention Explained
- Problem Addressed: The patent identifies a "growing need to authenticate users trying to access a secured internet portal (e.g., website) or a real-world secured device" and a need for "secure and fast online electronic payment capability" (ʼ116 Patent, col. 1:19-25).
- The Patented Solution: The invention describes a multi-device authentication method. A computer providing a "secured capability" (e.g., a web server hosting a login page) sends a "reusable identifier" to both a verification server and a user's computer display (e.g., as a QR code) (ʼ116 Patent, Fig. 2). The user employs a separate electronic device (e.g., a smartphone) to capture this identifier, combine it with "user verification information," and send the combined data to the verification server (ʼ116 Patent, col. 5:5-34). The verification server then evaluates all received signals to determine if the user is authorized and, if so, transmits an authorization signal to complete the process (ʼ116 Patent, Abstract).
- Technical Importance: This approach aims to provide a more secure authentication process than a simple password by requiring possession of a specific mobile device, while using "reusable identifiers" to simplify server-side processing compared to generating unique, transaction-specific codes for every interaction (ʼ116 Patent, col. 6:35-62).
Key Claims at a Glance
- The complaint does not specify which claims are asserted, referring only to "Exemplary '116 Patent Claims" contained in a non-provided exhibit (Compl. ¶11). The patent contains two independent claims, a method claim (Claim 1) and a system claim (Claim 11).
- Independent Claim 1 (Method):- using the computer system to receive a first signal from the computer providing the secured capability, the first signal comprising a reusable identifier...assigned for use...for a finite period of time;
- using the computer system to receive a second signal from an electronic device being used by the user, the second signal comprising a copy of the reusable identifier and user verification information;
- using a processor of the computer system to evaluate...whether the user is authorized; and
- in response to an indication from the processor that the user is authorized...using the computer system to transmit a third signal comprising authorization information.
 
- Independent Claim 11 (System):- a first input configured to receive a plurality of first signals from a plurality of computers...each first signal...comprising a reusable identifier...assigned for use...for a finite period of time;
- a second input configured to receive a plurality of second signals from a plurality of electronic devices...each second signal...comprising a copy of a reusable identifier and user verification information;
- a storage device comprising a first association of each secured capability...with...reusable identifier; and a second association of the user verification information with...verified users;
- a processor configured to evaluate...whether a user...is authorized; and
- an output configured to transmit a third signal comprising authorization information.
 
III. The Accused Instrumentality
- Product Identification: The complaint refers to the accused instrumentalities as "Exemplary Defendant Products" (Compl. ¶11).
- Functionality and Market Context: The complaint does not provide specific names, descriptions of functionality, or market context for the accused products. All details regarding the accused instrumentalities and their operation are incorporated by reference from "Exhibit 2," which was not provided with the complaint (Compl. ¶¶14, 16, 17).
IV. Analysis of Infringement Allegations
The complaint alleges that the "Exemplary Defendant Products practice the technology claimed by the '116 Patent" and that they "satisfy all elements of the Exemplary '116 Patent Claims" (Compl. ¶16). However, the complaint itself provides no specific factual allegations or element-by-element analysis of infringement. It states that claim charts comparing the asserted claims to the accused products are included in Exhibit 2, which is not publicly available (Compl. ¶16). Therefore, a detailed analysis of the infringement theory is not possible from the provided documents. No probative visual evidence provided in complaint.
V. Key Claim Terms for Construction
- The Term: "reusable identifier" 
- Context and Importance: This term is central to the claimed invention and appears in both independent claims. The patent distinguishes its "reusable" identifier from "one-time-use" or "unique" identifiers in conventional systems (ʼ116 Patent, col. 9:11-21). The scope of this term will be critical, as Defendant may argue its system uses identifiers that are not "reusable" in the manner contemplated by the patent. Practitioners may focus on this term because its definition appears to be a primary point of novelty asserted by the patentee. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The patent states the term has its "broadest reasonable interpretation" and includes an identifier that "can be used more than once" and is "not unique to one particular user or transaction" (ʼ116 Patent, col. 9:6-12).
- Evidence for a Narrower Interpretation: The specification describes a specific "round robin usage" where a list of identifiers is cycled through, and notes that while an identifier can be reused in a subsequent time period, it may not be reusable within the same time period (ʼ116 Patent, col. 9:46-54). This could support a narrower construction tied to specific reuse rules.
 
- The Term: "user verification information" 
- Context and Importance: This information is transmitted from the user's mobile device in the second signal and is used by the processor to evaluate authorization. Its definition is crucial for determining what type of data must be sent from the user's device to meet the claim limitation. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The specification provides a broad list of potential information, including data "specific to the user (e.g., the user's first name, family name, email address, phone number)" or "specific to the first electronic device 20 (e.g., a device identification character string, hardware-specific information)" (ʼ116 Patent, col. 12:6-14).
- Evidence for a Narrower Interpretation: The patent also describes derivable information, such as "predetermined portions of the user-specific information that would not themselves contain private information," which suggests the information does not have to be the user's raw personal data (ʼ116 Patent, col. 12:15-18). This could support a narrower reading that excludes certain types of raw data or requires a specific format.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the '116 Patent" (Compl. ¶14). The specific content of these materials is purportedly detailed in the non-provided Exhibit 2 (Compl. ¶14).
- Willful Infringement: The willfulness allegation is based on knowledge obtained from the service of the complaint itself (Compl. ¶¶ 13, 15). The complaint alleges that "at least since being served by this Complaint," Defendant has "actively, knowingly, and intentionally continued to induce infringement" (Compl. ¶15).
VII. Analyst’s Conclusion: Key Questions for the Case
Given the minimal detail in the complaint, the core of the dispute will be established during discovery and claim construction. Based on the patent and the nature of the allegations, the case raises several key questions:
- A central issue will be one of definitional scope: does the accused system's authentication token qualify as a "reusable identifier...assigned for use...for a finite period of time" as claimed in the patent, or does it operate in a fundamentally different manner (e.g., as a one-time-use or session-specific token) that falls outside the claim's scope?
- A key evidentiary question will be what specific "product literature and website materials" exist, as alleged in the complaint, and whether they provide sufficiently clear instructions to end-users to support a finding of induced infringement.
- The case may turn on a technical comparison: does the data transmitted from a user's device in the accused system constitute "user verification information" as described in the patent's specification, or is there a technical mismatch in the type, format, or function of the data used for authorization?