DCT

2:25-cv-00780

Secure Matrix LLC v. Cavender Stores LP

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 2:25-cv-00780, E.D. Tex., 08/12/2025
  • Venue Allegations: Venue is alleged to be proper based on Defendant maintaining an established place of business within the Eastern District of Texas.
  • Core Dispute: Plaintiff alleges that Defendant’s products and/or services infringe a patent related to multi-factor user authentication systems, particularly those using a personal electronic device to verify access to a secured capability.
  • Technical Context: The technology involves using a secondary device, such as a smartphone, to authenticate a user for online services or payments, often by scanning a visual code like a QR code.
  • Key Procedural History: The complaint does not allege any pre-suit knowledge of the patent by the Defendant; it asserts that actual knowledge of infringement began with the service of the complaint.

Case Timeline

Date Event
2012-11-21 Earliest Priority Date (U.S. Provisional App. 61/729,266)
2014-03-18 U.S. Patent No. 8,677,116 Issued
2025-08-12 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 8,677,116 - Systems and methods for authentication and verification

Issued: March 18, 2014

The Invention Explained

  • Problem Addressed: The patent identifies a "growing need to authenticate users" for access to secured online portals or real-world devices, as well as a need for "secure and fast online electronic payment" systems (ʼ116 Patent, col. 1:19-28).
  • The Patented Solution: The invention proposes a multi-component authentication method. A central computer system (e.g., a verification server) receives a first signal from a service provider's computer (e.g., a website) containing a "reusable identifier." The system then receives a second signal from the user's personal electronic device (e.g., a smartphone) which includes a copy of that same reusable identifier plus "user verification information." A processor evaluates these two signals to determine if the user is authorized and, if so, transmits a third signal to grant access (ʼ116 Patent, Abstract; col. 2:30-49; Fig. 3A).
  • Technical Importance: The patent emphasizes the use of a "reusable identifier" that does not contain sensitive user-specific or transaction-specific information. This approach is described as enabling the use of simpler, more reliable visual codes (like QR codes), reducing server processing loads, and enhancing security by not exposing sensitive data in the initial authentication steps (ʼ116 Patent, col. 6:35-62).

Key Claims at a Glance

  • The complaint asserts infringement of at least exemplary claims of the ʼ116 Patent, which would include one or more independent claims (Compl. ¶11). Independent Claim 1 is representative of the patented method.
  • Independent Claim 1 (Method) requires:
    • Using a computer system to receive a first signal from a computer providing a secured capability, where the signal comprises a "reusable identifier" assigned for a "finite period of time."
    • Using the computer system to receive a second signal from a user's electronic device, where the signal comprises a copy of the reusable identifier and "user verification information."
    • Using a processor to evaluate whether the user is authorized based on the first and second signals.
    • Transmitting a third signal with authorization information to the user's device and/or the initial computer in response to a successful evaluation.
  • The complaint reserves the right to assert other claims, including dependent claims (Compl. ¶11).

III. The Accused Instrumentality

Product Identification

The complaint does not specifically name the accused products or services, referring to them generally as the "Exemplary Defendant Products" identified in charts that were referenced as an exhibit but not provided with the complaint (Compl. ¶11, ¶16).

Functionality and Market Context

The complaint does not provide sufficient detail for analysis of the accused instrumentality's specific functionality or market context.

IV. Analysis of Infringement Allegations

The complaint references infringement claim charts in an "Exhibit 2" but does not include this exhibit with the publicly filed document (Compl. ¶16). The narrative infringement theory is limited to the assertion that the "Exemplary Defendant Products practice the technology claimed by the '116 Patent" and "satisfy all elements of the Exemplary '116 Patent Claims" (Compl. ¶16). Without the referenced charts or a more detailed description of the accused products, a specific analysis of the infringement allegations is not possible.

No probative visual evidence provided in complaint.

V. Key Claim Terms for Construction

"reusable identifier"

  • Context and Importance: This term is central to the patent's asserted novelty over prior art systems that may have used one-time or user-specific tokens. Its construction will determine whether the claims cover modern session-based identifiers. Practitioners may focus on this term because its scope dictates whether a broad range of authentication tokens fall within the claims.
  • Intrinsic Evidence for a Broader Interpretation: The specification states that "reusable" means an identifier that "can be used more than once" and is "not unique to one particular user or transaction" (ʼ116 Patent, col. 9:8-12). This language could support a construction that includes identifiers reused across multiple users or transactions.
  • Intrinsic Evidence for a Narrower Interpretation: The claims require the identifier to be "assigned for use... for a finite period of time" (ʼ116 Patent, col. 33:24-25). A party could argue this temporal limitation, combined with the specification's distinction from "transaction-specific information" (ʼ116 Patent, col. 9:18-22), narrows the term to exclude identifiers that are dynamic or tied to a single user session.

"user verification information"

  • Context and Importance: The definition of this term is critical for determining what the user's device must transmit to the verification server to meet the claim limitations.
  • Intrinsic Evidence for a Broader Interpretation: The specification discloses that this information can comprise "information regarding... the user," "information regarding... the first electronic device," or "both" (ʼ116 Patent, col. 12:8-13). This could support a broad interpretation that includes passive data like a device hardware ID or other machine-generated signifiers.
  • Intrinsic Evidence for a Narrower Interpretation: The use of the word "verification" and references to "verified users" (ʼ116 Patent, col. 8:52) could suggest that the information must be something that actively confirms the identity of the human user (e.g., a PIN, biometric data, or credentials), rather than just an identifier for the device itself.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges induced infringement, asserting that Defendant distributes "product literature and website materials" that instruct customers and end users on how to use the accused products in a manner that directly infringes the ʼ116 Patent (Compl. ¶14-15).
  • Willful Infringement: The complaint alleges that Defendant has had "actual knowledge of infringement" since "being served by this Complaint" and has continued its infringing activities despite this knowledge, which may form the basis for a claim of post-suit willful infringement (Compl. ¶13-14).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A primary issue will be one of evidentiary sufficiency. The complaint lacks specific allegations regarding the accused products' functionality. Consequently, a key question is what facts discovery will yield regarding the operational architecture of the accused systems and whether those facts map onto the multi-signal authentication process recited in the patent's claims.
  • The case will likely involve a significant dispute over definitional scope. The construction of the term "reusable identifier" will be a central legal question. How the court interprets this term, particularly in light of the "finite period of time" limitation, will be critical in determining whether the patent's claims are broad enough to cover the potentially wide array of token- and session-based authentication technologies used in modern e-commerce.