DCT
3:18-cv-01534
Coding Tech LLC v. SAS Institute Inc
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Coding Technologies, LLC (Texas)
- Defendant: SAS Institute, Inc. (North Carolina)
- Plaintiff’s Counsel: Kizzia Johnson, PLLC
- Case Identification: 3:18-cv-01534, N.D. Tex., 06/13/2018
- Venue Allegations: Plaintiff alleges venue is proper in the Northern District of Texas because Defendant maintains a "regular and established place of business" in the district.
- Core Dispute: Plaintiff alleges that Defendant's use of QR codes in promotional media for its business analytics software infringes a patent related to methods and systems for providing mobile services by scanning a code pattern.
- Technical Context: The technology involves using a camera-equipped mobile device to scan a code (such as a QR code) on a physical object, which then directs the device to corresponding online content.
- Key Procedural History: The asserted patent is a continuation of a series of applications originating from a PCT application filed in 2004, which itself claims priority to several Korean patent applications filed in 2003.
Case Timeline
| Date | Event |
|---|---|
| 2003-03-07 | U.S. Patent No. 8,540,159 Earliest Priority Date |
| 2013-09-24 | U.S. Patent No. 8,540,159 Issued |
| 2018-02-23 | Date of alleged infringement evidence capture (QR code scan) |
| 2018-06-13 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,540,159 - Method for Providing Mobile Service Using Code-pattern
The Invention Explained
- Problem Addressed: The patent describes the inconvenience and difficulty for users of mobile terminals to access online content related to a physical advertisement, as they would have to remember and manually type in a URL ('159 Patent, col. 1:44-50). It also notes a demand for more convenient ways to access services like travel information or taxi dispatch via a mobile device ('159 Patent, col. 1:51-61, col. 2:1-8).
- The Patented Solution: The invention provides a method where a user terminal with a camera obtains a photographic image of a "code pattern" (e.g., a barcode). The terminal's processor then decodes this pattern to obtain information, such as a URL, and uses that information to send a request to a server, which in turn provides content back to the user's device ('159 Patent, Abstract; Fig. 5).
- Technical Importance: The technology aimed to bridge the gap between physical media (e.g., print advertisements, guidebooks) and digital content by automating the process of accessing relevant online information with a mobile device ('159 Patent, col. 1:36-43).
Key Claims at a Glance
- The complaint asserts independent claims 1 (method), 8 (user terminal), 15 (non-transitory medium), and 16 (method) ('159 Patent, col. 38:32 - col. 40:50; Compl. ¶13).
- Independent Claim 1 (Method) Essential Elements:
- obtaining a photographic image of a code pattern by a camera of the user terminal;
- processing, by a processor of the user terminal, the photographic image of the code pattern to extract the code pattern from the photographic image;
- decoding the extracted code pattern by the processor of the user terminal into code information;
- transmitting a content information request message to a server based on the code information; and
- receiving content information from the server in response to the content information request message.
- Independent Claim 8 (Apparatus) Essential Elements:
- a camera configured to obtain a photographic image of a code pattern;
- a processor comprising an image processor (to extract the code pattern) and a decoder (to decode it into code information); and
- a transceiver configured to transmit a request to a server and receive content information in response.
- The complaint also asserts dependent claims 2, 3, 9, and 10 (Compl. ¶13).
III. The Accused Instrumentality
Product Identification
The accused instrumentalities are Defendant's "promotional media" that incorporate "code patterns," specifically a QR code used to promote "SAS Business Analytics Software" (Compl. ¶13, p. 3).
Functionality and Market Context
- The complaint alleges that Defendant distributes promotional materials, such as a poster, containing a QR code (Compl. p. 3). A user with a smartphone can scan this QR code, which directs the phone's browser to a specific URL ("http://go.sas.com/gd3085") on Defendant's servers (Compl. ¶14, ¶17). In response, the server delivers promotional content, which the complaint illustrates as a YouTube video titled "Business Analytics & Data Can Transform Your Business" (Compl. ¶19, p. 5, p. 11). This process of scanning a QR code on a physical advertisement to retrieve online video content is alleged to infringe the ’159 Patent. The complaint provides a screenshot of the promotional poster, which claims the software can help organizations "increase profits, reduce risk, [and] predict trends" (Compl. p. 3).
IV. Analysis of Infringement Allegations
- Claim Chart Summary:
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| obtaining a photographic image of a code pattern by a camera of the user terminal; | A user obtains a photographic image of the QR code on Defendant's promotional media using a smartphone camera. This is depicted in a screenshot of a phone's camera view framing the QR code. | ¶15, p. 6 | col. 38:36-38 |
| processing, by a processor of the user terminal, the photographic image of the code pattern to extract the code pattern from the photographic image; | A processor of the smartphone processes the image to extract the QR code. The complaint alleges this extraction with a screenshot showing a scanning reticle over the code. | ¶16, p. 6-7 | col. 38:39-42 |
| decoding the extracted code pattern by the processor of the user terminal into code information; | The processor decodes the extracted QR code into "code information," which is the URL for Defendant's promotional webpage. A screenshot shows the decoded URL. | ¶17, p. 8-9 | col. 38:43-45 |
| transmitting a content information request message to a server based on the code information; and | The smartphone transmits an HTTP request to Defendant's server using the decoded URL to access the promotional webpage. | ¶18 | col. 38:46-48 |
| receiving content information from the server in response to the content information request message. | The smartphone receives the webpage from Defendant's server, which contains promotional content such as a video. A screenshot shows the resulting video playing on YouTube. | ¶19, p. 11 | col. 38:49-51 |
- Identified Points of Contention:
- Scope Questions: A central question may be whether the now-ubiquitous process of scanning a standard QR code with a smartphone infringes the specific sequence of limitations in the claims. The patent's priority date (2003) predates the widespread adoption of QR codes and smartphones.
- Technical Questions: Claim 1 recites two distinct steps: "processing... to extract the code pattern" and then "decoding the extracted code pattern." A key technical question will be whether standard QR code reader applications perform these as two separate, identifiable steps as the claim language suggests, or as a single, integrated "scan-and-decode" function. The complaint alleges these are distinct steps, but this division will likely be a point of dispute (Compl. ¶16-17).
V. Key Claim Terms for Construction
- The Term: "processing... to extract the code pattern from the photographic image"
- Context and Importance: This term appears in Claim 1 before the separate "decoding" step. Its construction is critical because if it is construed to require a specific technical action beyond what is inherent in decoding, it could create a significant hurdle for the infringement case. Conversely, if it is construed broadly or as being redundant with the decoding step, the claim may be easier to infringe but potentially more vulnerable to an invalidity challenge.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification does not appear to provide a special definition for "extract," which may support giving the term its plain and ordinary meaning. A plaintiff may argue that simply isolating the code pattern within the camera's field of view for the decoder to process constitutes "extraction."
- Evidence for a Narrower Interpretation: The claim structure itself, which lists "processing to extract" and "decoding" as sequential and distinct steps, is evidence that the two terms are not synonymous and describe different functions. A defendant may argue that "extract" requires a discrete pre-processing step (e.g., image cleanup, normalization, isolation of the pattern into a separate data object) before the "decoding" algorithm is run, and that standard QR readers do not perform such a separate step. The patent's own flowcharts (e.g., Fig. 5) move from "Photograph Barcode" directly to "Decode Barcode," which could be used to argue against the necessity of a distinct, intervening extraction step.
VI. Other Allegations
- Indirect Infringement: The complaint does not explicitly plead indirect infringement. It alleges direct infringement by Defendant "at least through internal testing" (Compl. ¶13). For infringement by end-users scanning the QR codes, which requires actions by both the user (scanning) and the Defendant (providing the code and server content), questions of divided infringement under 35 U.S.C. § 271(a) may arise.
- Willful Infringement: The complaint does not plead any facts suggesting Defendant had pre-suit knowledge of the patent or engaged in conduct that would rise to the level of willful infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of claim construction and technical scope: can the phrase "processing... to extract the code pattern," when followed by a separate "decoding" step, be read upon the integrated function of a standard smartphone QR code reader? The viability of the infringement case may depend on whether these are proven to be distinct, practiced steps.
- A key evidentiary question will concern direct infringement: while the complaint alleges direct infringement via "internal testing," the primary commercial activity involves third-party users. This raises a central question of whether Plaintiff can prove that Defendant itself performs every step of the asserted method claims or controls and directs users in a manner sufficient to be held liable for direct infringement.
Analysis metadata