3:24-cv-02563
DatRec LLC v. Orangehrm Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: DatRec, LLC (Texas)
- Defendant: OrangeHRM, Inc. (Delaware)
- Plaintiff’s Counsel: Ramey LLP
 
- Case Identification: 3:24-cv-02563, N.D. Tex., 10/11/2024
- Venue Allegations: Plaintiff alleges venue is proper in the Northern District of Texas because Defendant maintains a "regular and established place of business" in the district and has committed alleged acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s "OrangeHRM Mobile App" infringes a patent related to methods for secure communication over a public network by verifying user identities.
- Technical Context: The technology at issue involves systems that authenticate individuals in online networks by creating and cross-referencing profiles based on data provided by multiple, related users to establish varying levels of trust.
- Key Procedural History: The complaint states that Plaintiff is a non-practicing entity and that it and its predecessors-in-interest have entered into settlement licenses with other entities. The complaint asserts that these licenses did not grant rights to produce a patented article and thus do not trigger patent marking requirements.
Case Timeline
| Date | Event | 
|---|---|
| 2006-12-07 | ’309 Patent Priority Date | 
| 2013-02-19 | ’309 Patent Issue Date | 
| 2024-10-11 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
- Patent Identification: U.S. Patent No. 8,381,309, "Method and System for Secure Communication Over a Public Network," issued February 19, 2013.
The Invention Explained
- Problem Addressed: The patent addresses the problem of individuals and businesses being "exposed to non-secure connections and to communications from unreliable or falsely-identified senders" in modern internet communications ('309 Patent, col. 1:21-25).
- The Patented Solution: The invention proposes a system that builds a database of verified user identities to improve confidence and security ('309 Patent, col. 2:62-65). It works by permitting a "plurality of individuals" to enter data about themselves and other related individuals, forming an "individual-associated data set" (IDS) ('309 Patent, col. 2:26-31). The system then verifies an individual's identity and assigns a "level of reliability" by assessing the "degree of similarity between data on the individual entered by different users" ('309 Patent, col. 2:36-40). Based on this verification, the system defines "one or more levels of permitted communications" between users ('309 Patent, Abstract).
- Technical Importance: This approach seeks to create a trusted communication environment by filtering or flagging electronic interactions based on a crowd-sourced, relationship-based system of identity verification rather than relying solely on credentials provided by a single user ('309 Patent, col. 2:4-16).
Key Claims at a Glance
- The complaint asserts infringement of claims 1-17 ('Compl. ¶9). Independent claim 1 is representative.
- The essential elements of independent claim 1 include:- Providing a database with verified data to authenticate an individual.
- Constructing the database by:- Permitting multiple related individuals to enter "individual-associated data bits (IDB) comprising a personal identifier and relationship data indicative of a family tree."
- Generating an "individual-associated data set (IDS)" from the IDB.
- "Verifying the IDS" by "determining the level of reliability based on a degree of similarity between data on the individual entered by different individuals."
 
- Compiling the IDSs to construct the database.
- Defining "one or more levels of permitted communication" between individuals based on the verification.
 
- The complaint reserves the right to assert additional claims ('Compl. ¶11).
III. The Accused Instrumentality
- Product Identification: The "OrangeHRM Mobile App" and related systems ('Compl. ¶10, ¶12).
- Functionality and Market Context: The complaint alleges the accused product is a "system and method for secure communication over a public network" ('Compl. ¶9). The complaint cites Defendant's websites, which describe the product in the context of people and human resources management ('Compl. ¶12). The complaint does not provide sufficient detail for analysis of the specific technical operations of the app's security or authentication features beyond these general characterizations.
IV. Analysis of Infringement Allegations
The complaint refers to a "preliminary exemplary table attached as Exhibit B" to support its infringement allegations but does not include the exhibit in the provided filing ('Compl. ¶10). Therefore, a claim chart summary cannot be provided. The complaint's narrative theory is that Defendant "maintains, operates, and administers a system and method for secure communication... that infringes one or more of claims of the ’309 patent" by putting the claimed inventions "into service" ('Compl. ¶9). No probative visual evidence provided in complaint.
- Identified Points of Contention:- Scope Questions: The patent's claims and specification repeatedly use familial terms like "family tree" ('309 Patent, claim 1) and provide examples such as "parents, brothers and sisters, spouse, children" ('309 Patent, col. 5:44-46). A central dispute may arise over whether the term "relationship data indicative of a family tree" can be construed to read on the corporate hierarchies and employee data structures presumably managed by the accused "OrangeHRM Mobile App".
- Technical Questions: Claim 1 requires "verifying the IDS... by determining the level of reliability based on a degree of similarity between data on the individual entered by different individuals." A key factual question will be what evidence shows that the accused HR application performs this specific crowd-sourced verification method, as opposed to employing more conventional enterprise authentication protocols.
 
V. Key Claim Terms for Construction
- The Term: "relationship data indicative of a family tree" (from claim 1) - Context and Importance: The construction of this term is critical because the accused product is a corporate HR application, not a social or genealogical platform. The infringement case may depend on whether this term can extend beyond its literal, familial meaning.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification notes that "relationship data" can include "business colleagues or associates" ('309 Patent, col. 5:51-52), which may support an argument that the invention is not strictly limited to family contexts.
- Evidence for a Narrower Interpretation: The claim itself uses the specific phrase "family tree." The detailed description consistently uses familial relationships as the primary examples for building the data set, such as "mother's maiden name" and "grandparents' names" ('309 Patent, col. 7:42-45), which could support a construction tied more closely to kinship.
 
 
- The Term: "determining the level of reliability based on a degree of similarity between data on the individual entered by different individuals" (from claim 1) - Context and Importance: This term defines the core technical mechanism for verification. The dispute will likely focus on whether the accused product's security model performs this specific function. Practitioners may focus on this term because it describes a novel verification process that may differ significantly from standard authentication in enterprise software.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent's general description refers simply to determining reliability based on "correspondence between data" ('309 Patent, col. 4:5-6), which could be argued to encompass a wide range of data-comparison techniques.
- Evidence for a Narrower Interpretation: The specification describes a detailed process involving comparing data strings from multiple users, ascribing a reliability score, and iteratively requesting more data if confidence is low, as illustrated in the flowchart of Figure 3A ('309 Patent, Fig. 3A; col. 10:55-65). This could support a narrower construction requiring this specific, multi-step comparative logic.
 
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement by asserting that Defendant actively instructs customers on how to use the "OrangeHRM Mobile App" for "secure communication" through its "website and product instruction manuals" ('Compl. ¶11, ¶12). It alleges contributory infringement by claiming the product is not a staple and its only reasonable use is an infringing one ('Compl. ¶12).
- Willful Infringement: The complaint pleads willfulness based on knowledge of the '309 patent "from at least the filing date of the lawsuit" ('Compl. ¶11, ¶12). This establishes a basis for potential post-filing willful infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the claim term "relationship data indicative of a family tree," which is heavily contextualized with familial examples in the patent, be construed broadly enough to cover the organizational employee data managed by the accused corporate human resources application?
- A key evidentiary question will be one of functional operation: what evidence will be presented to demonstrate that the accused product performs the specific verification method of "determining the level of reliability based on a degree of similarity between data on the individual entered by different individuals," as required by the claim, rather than using a technically distinct security and authentication model?