2:25-cv-00014
Secure Matrix LLC v. Twin Peaks Restaurants LP
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Secure Matrix LLC (DE)
- Defendant: Twin Peaks Restaurants, LP (TX)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 2:25-cv-00014, E.D. Tex., 01/06/2025
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendant has an established place of business in the District and has committed alleged acts of patent infringement there.
- Core Dispute: Plaintiff alleges that Defendant infringes a patent related to systems and methods for user authentication and verification.
- Technical Context: The technology at issue involves multi-factor or multi-device authentication, typically where a user employs a personal device (like a smartphone) to authorize an action initiated on a separate computer or system (like a website login or a payment terminal).
- Key Procedural History: The complaint does not allege any prior litigation, inter partes review (IPR) proceedings, or specific licensing history related to the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2012-11-21 | '116 Patent Priority Date (from Provisional App. 61/729,266) |
| 2013-08-09 | '116 Patent Application Filing Date |
| 2014-03-18 | '116 Patent Issue Date |
| 2025-01-06 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,677,116 - "Systems and methods for authentication and verification"
- Patent Identification: U.S. Patent No. 8,677,116, "Systems and methods for authentication and verification", issued March 18, 2014.
The Invention Explained
- Problem Addressed: The patent describes a "growing need to authenticate users trying to access a secured internet portal (e.g., website) or a real-world secured device (e.g., lock, door)" and a parallel need for "a secure and fast online electronic payment capability" as internet transactions increase (’116 Patent, col. 1:19-28).
- The Patented Solution: The invention provides a method for authenticating a user by coordinating signals between three distinct entities: the computer providing the secured service, the user's personal electronic device, and a central verification server (’116 Patent, Abstract). A computer (e.g., a web server) first sends a "reusable identifier" (such as a QR code) to both the user's screen and a verification server. The user then uses their personal electronic device (e.g., a smartphone) to scan the identifier and send it, along with their own "user verification information," to the same verification server. The verification server then compares the two signals to determine if the user is authorized and, if so, sends an authorization signal back to the computer and/or the user's device (’116 Patent, Fig. 2; col. 6:4-33).
- Technical Importance: The approach aims to provide security without requiring the "reusable identifier" itself to contain sensitive user- or transaction-specific information, which can simplify the process and reduce server load compared to generating unique, complex identifiers for every transaction (’116 Patent, col. 6:35-62).
Key Claims at a Glance
- The complaint refers to "Exemplary '116 Patent Claims" identified in an external chart but does not specify them in the body of the complaint (Compl. ¶11). Independent claim 1 is representative of the patented method.
- Independent Claim 1 (Method) Elements:
- using the computer system to receive a first signal from the computer providing the secured capability, the first signal comprising a reusable identifier... assigned for use... for a finite period of time;
- using the computer system to receive a second signal from an electronic device being used by the user, the second signal comprising a copy of the reusable identifier and user verification information;
- using a processor of the computer system to evaluate, based at least on the first signal and the second signal, whether the user is authorized to conduct the at least one interaction...; and
- in response to an indication from the processor that the user is authorized..., using the computer system to transmit a third signal comprising authorization information to at least one of the electronic device and the computer.
- The complaint does not explicitly reserve the right to assert dependent claims but refers generally to infringement of "one or more claims" (Compl. ¶11).
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific accused product, method, or service by name (Compl. ¶11). It refers to "Exemplary Defendant Products" that are detailed in an incorporated but unprovided exhibit (Compl. ¶16-17).
Functionality and Market Context
- The complaint does not provide sufficient detail for analysis of the accused instrumentality's functionality or market context.
IV. Analysis of Infringement Allegations
The complaint alleges that Defendant directly infringes by "making, using, offering to sell, selling and/or importing" infringing products and by having its employees "internally test and use" them (Compl. ¶11-12). It further alleges induced infringement through the distribution of "product literature and website materials" (Compl. ¶14). However, the complaint's specific technical theory of infringement is contained entirely within "the charts of Exhibit 2," which were not included with the pleading (Compl. ¶17). As such, a detailed, element-by-element analysis of the infringement allegations is not possible from the provided documents.
No probative visual evidence provided in complaint.
V. Key Claim Terms for Construction
The Term: "reusable identifier"
Context and Importance: This term is the core of the claimed invention, representing the token (e.g., QR code) that initiates the authentication process. Its definition is critical because the infringement analysis will depend on whether the defendant's system uses an "identifier" that is "reusable" in the manner contemplated by the patent. Practitioners may focus on this term because the patent contrasts it with "one-time-use" or "unique" identifiers used in other systems (’116 Patent, col. 9:15-22).
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification suggests the term has a broad meaning, stating it "can be used more than once" and is "not unique to one particular user or transaction" (’116 Patent, col. 9:8-12).
- Evidence for a Narrower Interpretation: The specification also provides limiting context, explaining that the identifier "does not contain user-specific or transaction-specific information" and may be "assigned for use by the secured capability for a finite period of time" (’116 Patent, col. 9:12-14, col. 33:24-25). This suggests reusability may be constrained by time and a lack of embedded personal data.
The Term: "user verification information"
Context and Importance: This term defines what the user's personal device contributes to the authentication, beyond just the "reusable identifier". The scope of this term will be central to determining if the accused system performs the claimed verification step.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent provides a non-exhaustive list that could support a broad reading, including "information regarding... the user (e.g., the user's first name, family name, email address, phone number)" or "information regarding... the first electronic device 20 (e.g., a device identification character string, hardware-specific information)" (’116 Patent, col. 12:5-13).
- Evidence for a Narrower Interpretation: An argument could be made that the term requires information sufficient to "verify and authenticate the user," potentially implying more than just a simple device ID and requiring information that uniquely ties the device to a specific, pre-registered person (’116 Patent, col. 12:4-6).
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the '116 Patent" (Compl. ¶14).
- Willful Infringement: Willfulness is alleged based on knowledge obtained from the service of the complaint itself. The complaint states that Defendant has "actively, knowingly, and intentionally continued to induce infringement" at least "since being served by this Complaint and corresponding claim charts" (Compl. ¶15).
VII. Analyst’s Conclusion: Key Questions for the Case
- A primary issue will be one of pleading sufficiency: Does a complaint that outsources its entire technical basis for infringement to an unprovided external exhibit meet the plausibility standard required by federal pleading rules? The initial phase of litigation may focus on whether the complaint provides the defendant with fair notice of the specific infringement theory.
- A central technical question will be one of architectural mapping: Assuming an accused product is identified, the case will turn on whether its architecture maps to the three-party system of the '116 patent. Specifically, does the defendant's system utilize a distinct "verification server" that receives separate signals from both the service-providing computer and the user's personal device to perform the claimed evaluation, or does it use a different, more integrated authentication flow?
- A key definitional question will be the scope of "reusable identifier": Can the term, as defined and used in the patent, be construed to read on the specific authentication tokens or protocols used by the defendant's system, especially if those tokens have characteristics not explicitly described in the patent's preferred embodiments?