2:25-cv-00138
Torus Ventures LLC v. Sha LLC
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Torus Ventures L.L.C. (Delaware)
- Defendant: Sha, LLC. (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 2:25-cv-00138, E.D. Tex., 05/30/2025
- Venue Allegations: Plaintiff alleges venue is proper in the Eastern District of Texas because Defendant maintains an established place of business in the District and has committed alleged acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant infringes a patent related to a recursive security protocol for digital copyright control.
- Technical Context: The technology at issue falls within the field of Digital Rights Management (DRM), a critical area for protecting copyrighted digital content like software and media from unauthorized access and duplication.
- Key Procedural History: The complaint is a First Amended Complaint. Plaintiff alleges that Defendant has had actual knowledge of the asserted patent and its alleged infringement since at least February 5, 2025, the filing date of the Original Complaint. This date forms the basis for Plaintiff's allegations of post-suit willful infringement.
Case Timeline
| Date | Event | 
|---|---|
| 2002-06-20 | '844 Patent Priority Date (Provisional App. 60/390,180) | 
| 2007-04-10 | '844 Patent Issued | 
| 2025-02-05 | Original Complaint Filed (establishing alleged knowledge) | 
| 2025-05-30 | First Amended Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,203,844 - “Method and system for a recursive security protocol for digital copyright control”
Issued April 10, 2007.
The Invention Explained
- Problem Addressed: The patent asserts that prior art DRM systems were flawed because they relied on simple access control that, once bypassed, offered no further protection. These systems also made "artificial distinctions between the various types of bit streams to be protected" instead of treating all digital data uniformly ('844 Patent, col. 2:28-32; Compl. ¶¶10-12).
- The Patented Solution: The invention proposes a "recursive security protocol" where a digital bitstream is encrypted, and then that encrypted bitstream and its corresponding decryption algorithm are encrypted together by a second encryption algorithm ('844 Patent, Abstract). This creates nested layers of security. The protocol is "recursive" because it treats all data as a uniform bitstream, allowing the security protocol itself to be updated and protected by newer versions of the protocol without altering hardware, as "the 'older' security system is 'subsumed' as a part of the newer security system" ('844 Patent, col. 4:32-43; Compl. ¶¶14-15).
- Technical Importance: This approach offered a more flexible and robust security framework that could be securely updated to fix vulnerabilities and could support various business models like time-limited rentals and pay-per-view ('844 Patent, col. 4:44-48).
Key Claims at a Glance
- The complaint asserts at least Claim 1 (Compl. ¶21).
- Independent Claim 1 recites a method for protecting digital content with the essential elements:- encrypting a bitstream with a first encryption algorithm;
- associating a first decryption algorithm with the encrypted bit stream;
- encrypting both the encrypted bit stream and the first decryption algorithm with a second encryption algorithm to yield a second bit stream;
- associating a second decryption algorithm with the second bit stream.
 
- The complaint reserves the right to assert other claims (Compl. ¶24).
III. The Accused Instrumentality
Product Identification
The complaint refers to "Exemplary Defendant Products" but does not name specific products in its text (Compl. ¶24). It states these products are identified in charts incorporated by reference from an Exhibit 2, which was not attached to the filed complaint (Compl. ¶¶29-30).
Functionality and Market Context
The complaint does not provide sufficient detail for analysis of the accused products' specific functionality. It alleges that Defendant distributes "product literature and website materials" that direct end users to use the products in an infringing manner (Compl. ¶27). The complaint makes no specific allegations regarding the products' market positioning.
IV. Analysis of Infringement Allegations
The complaint alleges infringement but incorporates the details into an external Exhibit 2, which is not provided. Therefore, a claim chart cannot be constructed. The narrative infringement theory alleges that Defendant's products practice the "recursive" security protocol captured in the limitations of Claim 1, specifically the steps of "encrypting both the encrypted bit stream and the first decryption algorithm with a second encryption algorithm" and "associating a second decryption algorithm with the second bit stream" (Compl. ¶21). The complaint asserts that the unidentified "Exemplary Defendant Products" satisfy all elements of the asserted claims (Compl. ¶29).
No probative visual evidence provided in complaint.
Identified Points of Contention
- Technical Questions: A primary question will be evidentiary: what proof does Plaintiff possess that Defendant's products perform the specific, nested encryption process recited in Claim 1? The complaint itself offers no technical details about the operation of the accused products, instead relying on unattached exhibits and unspecified "product literature" (Compl. ¶¶27, 29).
- Scope Questions: The dispute may center on whether the accused functionality, once revealed, constitutes "encrypting...the first decryption algorithm" itself, as required by the claim, or merely encrypting data using a key that is managed by a separate, unencrypted security module.
V. Key Claim Terms for Construction
The Term: "recursive security protocol"
- Context and Importance: This term appears in the patent's title and is described as a core inventive concept (Compl. ¶14). Its construction will be central to the dispute, as infringement depends on whether the accused system embodies such a "recursive" protocol.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The Summary of the Invention describes systems that "allow one to encode any bit stream," suggesting the protocol is broadly applicable to any layered encryption scheme ('844 Patent, col. 2:54-62).
- Evidence for a Narrower Interpretation: The detailed description repeatedly links the term to the specific capability of using the protocol to update itself, where an "older" security system is "subsumed" by a newer one ('844 Patent, col. 4:18-21, 4:35-43). A defendant may argue this self-updating feature is a required element of the "recursive" protocol.
 
The Term: "associating a...decryption algorithm with the...bit stream"
- Context and Importance: This step is recited twice in Claim 1. The nature of this "association" is undefined in the claim itself, and its meaning could determine whether the accused system infringes. Practitioners may focus on this term because its potential ambiguity could be pivotal.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification does not explicitly define "associating," which could support a plain-meaning interpretation where any logical link between the algorithm and the data suffices.
- Evidence for a Narrower Interpretation: Figure 2 depicts an "Application-Specific Decryption Key Data Structure," which includes the decryption key and other data like timestamps and identifiers ('844 Patent, Fig. 2). A party could argue that "associating" requires implementing such a specific data structure as taught in the patent's embodiments.
 
VI. Other Allegations
Indirect Infringement
The complaint alleges induced infringement, asserting that Defendant distributes "product literature and website materials" which instruct customers on how to use the accused products in a manner that directly infringes the '844 Patent (Compl. ¶27).
Willful Infringement
The willfulness allegation is based on alleged post-suit knowledge. The complaint asserts that Defendant has had "actual knowledge of infringement" since being served with the Original Complaint on February 5, 2025 (Compl. ¶26).
VII. Analyst’s Conclusion: Key Questions for the Case
- An Evidentiary Question of Operation: As the complaint provides no technical details on the accused products, a threshold issue will be whether Plaintiff can produce evidence demonstrating that Defendant’s products actually perform the specific nested encryption of a bitstream and its corresponding decryption algorithm, as strictly required by the elements of Claim 1.
- A Definitional Question of Scope: The case will likely hinge on the construction of "recursive security protocol." The central question for the court will be whether this term, as used in the patent, simply means any multi-layer encryption or if it is limited to the patent’s more specific teaching of a self-protecting, self-updating system where an older security protocol is "subsumed" by a newer one.