2:25-cv-00012
Secure Matrix LLC v. TGI Fridays Franchisor LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Secure Matrix LLC (DE)
- Defendant: TGI Friday's Inc. (NY)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 2:25-cv-00012, E.D. Tex., 05/04/2025
- Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains an established place of business in the Eastern District of Texas and has committed acts of infringement within the district.
- Core Dispute: Plaintiff alleges that unspecified products and services offered by Defendant infringe a patent related to methods for multi-device user authentication and verification.
- Technical Context: The technology concerns systems for securely authenticating users for online services, such as website logins or electronic payments, using a primary computer and a secondary personal device (e.g., a smartphone).
- Key Procedural History: The complaint is a First Amended Complaint. Plaintiff alleges that the filing of the Original Complaint on January 6, 2025, provided Defendant with actual knowledge of the alleged infringement.
Case Timeline
| Date | Event | 
|---|---|
| 2012-11-21 | '116 Patent Priority Date | 
| 2013-08-09 | '116 Patent Application Filing Date | 
| 2014-03-18 | '116 Patent Issue Date | 
| 2025-01-06 | Original Complaint Filing Date | 
| 2025-05-04 | First Amended Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,677,116 - "Systems and methods for authentication and verification"
The Invention Explained
- Problem Addressed: The patent identifies a growing need for methods to securely authenticate users accessing services over the internet, such as logging into a website or making an electronic payment, where traditional password-based systems may be vulnerable. (’116 Patent, col. 1:20-29).
- The Patented Solution: The invention describes a three-party authentication system involving a service provider's computer, a user's electronic device (e.g., a smartphone), and a separate verification server. The service provider's computer sends a "reusable identifier" (e.g., a QR code) to the user; the user's device captures this identifier, combines it with "user verification information," and sends the combined data to the verification server. This server then evaluates the information from both sources to authorize or deny the transaction, sending an authorization signal back to the service provider and/or the user's device. (’116 Patent, Abstract; Fig. 2).
- Technical Importance: The use of a "reusable identifier" that does not contain sensitive user or transaction-specific data is presented as a key advantage, simplifying the identifier, making it more robust for scanning by mobile devices, and increasing security by not transmitting private information in the initial step. (’116 Patent, col. 6:35-62).
Key Claims at a Glance
- The complaint does not specify which claims are asserted, referring only to the "Exemplary '116 Patent Claims" in a referenced exhibit not attached to the pleading (Compl. ¶11). The patent contains two independent claims, Claim 1 (method) and Claim 11 (system).
- Independent Claim 1 (Method) requires:- Receiving a first signal from a computer providing a secured capability, the signal comprising a "reusable identifier" assigned for a "finite period of time".
- Receiving a second signal from a user's electronic device, the signal comprising a copy of the "reusable identifier" and "user verification information".
- Using a processor to evaluate the first and second signals to determine if the user is authorized.
- Transmitting a third signal with authorization information in response to a successful evaluation.
 
- Independent Claim 11 (System) requires:- A "first input" to receive signals from service-providing computers, containing a "reusable identifier".
- A "second input" to receive signals from user devices, containing a copy of the "reusable identifier" and "user verification information".
- A "storage device" with associations between secured capabilities and reusable identifiers, and between user information and verified users.
- A "processor" to evaluate the signals to determine if a user is authorized.
- An "output" to transmit an authorization signal.
 
III. The Accused Instrumentality
Product Identification
The complaint does not name any specific accused products, methods, or services. It refers generally to "Defendant products identified in the charts incorporated into this Count below (among the 'Exemplary Defendant Products')" and incorporates by reference an "Exhibit 2" containing claim charts. (Compl. ¶¶ 11, 16).
Functionality and Market Context
The complaint does not provide sufficient detail for analysis of the accused instrumentality's functionality or market context, as this information was purportedly contained in the unprovided Exhibit 2.
IV. Analysis of Infringement Allegations
The complaint alleges that the "Exemplary Defendant Products practice the technology claimed by the '116 Patent" and "satisfy all elements of the Exemplary '116 Patent Claims," but it supports this assertion only by reference to claim charts in an unprovided "Exhibit 2." (Compl. ¶¶ 16-17). No probative visual evidence provided in complaint. A detailed claim chart comparison is therefore not possible based on the provided documents.
Identified Points of Contention
Based on the patent claims and the abstract nature of the complaint, the infringement analysis raises several potential questions for the court:
- Scope Questions: A central issue will likely be whether the identifier used in Defendant's system qualifies as a "reusable identifier" as contemplated by the patent. This may involve determining if the identifier is devoid of user-specific or transaction-specific information, a feature emphasized in the patent's specification. (’116 Patent, col. 9:10-16).
- Technical Questions: The analysis may hinge on the architecture of the accused system. A key question is whether Defendant's system employs a three-party structure (service computer, user device, verification server) that maps to the claim elements and the embodiments described in the ’116 Patent, or if the functions are consolidated in a way that falls outside the claim scope. For example, the role of the claimed "computer system" in Claim 1 will be compared to the actual function of Defendant's servers.
V. Key Claim Terms for Construction
1. The Term: "reusable identifier" (Claim 1, 11)
- Context and Importance: This term is the technological core of the invention. Its construction will be critical to determining infringement, as it distinguishes the claimed invention from systems using single-use or user-specific tokens. Practitioners may focus on this term because the patent repeatedly contrasts it with "one-time-use" identifiers and those containing "user-specific or transaction-specific information." (’116 Patent, col. 9:10-16).
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The term itself suggests any identifier that can be used more than once. The claims do not explicitly forbid the inclusion of any particular data type.
- Evidence for a Narrower Interpretation: The specification states that a reusable identifier "does not contain user-specific or transaction-specific information" and that this provides advantages in safety and simplicity. (’116 Patent, col. 6:57-62; col. 9:14-16). A party could argue the term is limited to identifiers that conform to this description. The patent also describes using identifiers in a "round robin" fashion, which could be argued as a required characteristic. (col. 9:42-43).
 
2. The Term: "computer system" (Claim 1)
- Context and Importance: In Claim 1, a "computer system" performs the central evaluation method. The specification and figures, however, consistently depict this role being performed by a "verification server" (60) that is distinct from the "computer" (50) providing the secured capability. (’116 Patent, Fig. 2; col. 5:24-25). The definition will determine whether a single, integrated server can infringe or if a distributed, multi-server architecture is required.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The term "computer system" is generic and, on its face, could read on a single server, a distributed system, or a cloud environment performing the claimed steps. The claim itself does not require the system to be separate from the computer providing the secured capability.
- Evidence for a Narrower Interpretation: The Abstract and Detailed Description consistently describe a three-party system where the verification function is separate from the initial service. A defendant may argue that the term "computer system" should be construed in light of these consistent descriptions to mean a system that is architecturally separate from the computer providing the initial reusable identifier.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, asserting that Defendant distributes "product literature and website materials" that instruct and encourage end users to use the accused products in an infringing manner. (Compl. ¶¶ 14-15).
- Willful Infringement: The willfulness allegation is based on alleged post-suit knowledge. The complaint asserts that Defendant gained "actual knowledge of infringement" upon service of the Original Complaint on January 6, 2025, and that its continued infringement thereafter has been willful. (Compl. ¶¶ 13-14).
VII. Analyst’s Conclusion: Key Questions for the Case
Given the limited detail in the complaint, the case will likely turn on fundamental questions of evidence and claim scope that emerge during discovery. The central issues for the court can be framed as follows:
- A core issue will be one of definitional scope: Can the term "reusable identifier", as defined by the patent’s specification, be construed to cover the specific type of token or identifier used in the Defendant's authentication system, particularly with respect to the presence or absence of user-specific data?
- A key evidentiary question will be one of architectural mapping: Once the accused system is identified, does its technical architecture align with the multi-party structure recited in the claims and described in the patent, or is there a fundamental mismatch in the number and function of the computer systems involved in the authentication process?
- A primary factual dispute will be one of functionality: What specific data constitutes the "user verification information" in the accused system, and does the system's processor "evaluate" the various signals in the specific manner required by the patent claims?