DCT

3:25-cv-02892

Secure Matrix LLC v. Tforce Logistics Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 3:25-cv-02892, N.D. Tex., 10/24/2025
  • Venue Allegations: Plaintiff alleges venue is proper in the Northern District of Texas because Defendant maintains an established place of business in the district and has committed alleged acts of infringement there.
  • Core Dispute: Plaintiff alleges that Defendant infringes a patent related to systems and methods for user authentication and verification.
  • Technical Context: The technology at issue addresses secure multi-factor user authentication, a critical component of online security for transactions, account access, and other sensitive digital interactions.
  • Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit.

Case Timeline

Date Event
2012-11-21 U.S. Patent No. 8,677,116 Priority Date
2014-03-18 U.S. Patent No. 8,677,116 Issued
2025-10-24 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 8,677,116 - "Systems and methods for authentication and verification"

  • Patent Identification: U.S. Patent No. 8,677,116, "Systems and methods for authentication and verification," issued March 18, 2014 (’116 Patent).

The Invention Explained

  • Problem Addressed: The patent describes a "growing need to authenticate users" attempting to access secure internet portals (e.g., websites) or real-world devices, particularly as consumer transactions increasingly move online (’116 Patent, col. 1:19-29).
  • The Patented Solution: The invention provides a multi-device authentication method. A first computer (e.g., a web server) provides a "reusable identifier" to the user. A separate electronic device (e.g., a smartphone) receives this identifier (for instance, by scanning a QR code), combines it with "user verification information," and sends the combined data to a verification server. This server then evaluates the signals from both the first computer and the user's device to determine if the user is authorized to access the secured capability (’116 Patent, Abstract; Fig. 2).
  • Technical Importance: This approach leverages a user's personal mobile device as a second factor of authentication, aiming to enhance security beyond a simple username and password system without requiring complex, single-use tokens (’116 Patent, col. 6:35-62).

Key Claims at a Glance

  • The complaint asserts infringement of one or more "exemplary claims" without specifying them (Compl. ¶11). The patent’s independent claims include Claim 1 (a method) and Claim 11 (a system).
  • Independent Claim 1 (Method):
    • Using a computer system to receive a first signal from a computer providing a secured capability, the signal comprising a reusable identifier assigned for a finite period of time.
    • Using the computer system to receive a second signal from a user's electronic device, the signal comprising a copy of the reusable identifier and user verification information.
    • Using a processor to evaluate whether the user is authorized based on the first and second signals.
    • Transmitting a third signal with authorization information to the electronic device and/or the computer in response to a positive evaluation.
  • The complaint does not explicitly reserve the right to assert dependent claims.

III. The Accused Instrumentality

Product Identification

  • The complaint does not name any specific accused products, methods, or services in its narrative text (Compl. ¶¶1-18). It refers to "Exemplary Defendant Products" that are purportedly identified in "charts incorporated into this Count," which are contained in an Exhibit 2 that was not filed with the complaint (Compl. ¶11, ¶15).

Functionality and Market Context

  • The complaint does not provide sufficient detail for analysis of the functionality or market context of any accused instrumentality.

IV. Analysis of Infringement Allegations

The complaint alleges that Defendant directly infringes the ’116 Patent by "making, using, offering to sell, selling and/or importing" the accused products and by having its employees "internally test and use" them (Compl. ¶¶11-12). The complaint states that infringement details are provided in claim charts in Exhibit 2, but this exhibit was not provided with the complaint (Compl. ¶15). Therefore, a detailed claim chart summary cannot be constructed.

Identified Points of Contention

Based on the general nature of the technology and the patent's claims, the dispute may raise several questions once the accused products are identified.

  • Scope Questions: How the accused system generates and uses its identifiers will be critical. The analysis may question whether an identifier used in the accused system, which might contain session-specific or user-specific data, qualifies as a "reusable identifier" that "does not contain user-specific or interaction-specific information" as described in the patent (’116 Patent, col. 33:40-42).
  • Technical Questions: A central technical question will be whether the architecture of the accused system maps onto the three-part structure claimed in the patent: a computer providing the capability, a separate user device, and a verification system that receives signals from both. The complaint does not provide evidence to analyze how Defendant's systems are structured or operate.

No probative visual evidence provided in complaint.

V. Key Claim Terms for Construction

The Term: "reusable identifier" (Claim 1)

  • Context and Importance: This term is the core of the invention, distinguishing it from systems that use "one-time-use" tokens. The definition will be critical to determining infringement, as it defines the nature of the token passed between the systems. Practitioners may focus on this term because the patent's specification appears to give it a specific definition that could be narrower than its plain meaning.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: Claim 2 states the "reusable identifier does not contain user-specific or interaction-specific information" (’116 Patent, col. 33:40-42). Under the doctrine of claim differentiation, a defendant might argue that the absence of this limitation in independent Claim 1 implies that a "reusable identifier" in Claim 1 can contain such information.
    • Evidence for a Narrower Interpretation: The specification contrasts the invention with conventional systems and emphasizes that by "not including user-specific or transaction-specific information in the reusable identifier, the QR code... can be much simpler" and safer (’116 Patent, col. 6:39-42, col. 6:58-62). Plaintiff may argue this context limits the term to identifiers devoid of user or session data.

The Term: "user verification information" (Claim 1)

  • Context and Importance: The scope of this term defines the second factor of authentication sent from the user's device. Determining what constitutes "verification information" will be key to mapping the accused functionality onto the claim.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The plain meaning suggests any information used to verify a user could suffice.
    • Evidence for a Narrower Interpretation: The specification provides specific examples, including information "specific to the user (e.g., the user's first name, family name, email address, phone number)" or "specific to the first electronic device (e.g., a device identification character string, hardware-specific information...)" (’116 Patent, col. 12:5-15). A defendant may argue the term should be limited to these disclosed categories.

VI. Other Allegations

Indirect Infringement

  • The complaint alleges inducement of infringement, stating on "information and belief" that Defendant distributes "product literature and website materials" that instruct end users to use the accused products in an infringing manner (Compl. ¶14).

Willful Infringement

  • The basis for willfulness is alleged post-suit knowledge. The complaint asserts that "service of this Complaint... constitutes actual knowledge of infringement," and that Defendant’s continued alleged infringement thereafter is willful (Compl. ¶¶13-14).

VII. Analyst’s Conclusion: Key Questions for the Case

  1. Evidentiary Sufficiency: A threshold issue is the complaint's lack of specificity regarding the "Exemplary Defendant Products." A primary question is what products are actually accused and whether the complaint, which relies entirely on an unattached exhibit for its infringement contentions, provides sufficient notice under federal pleading standards.
  2. Definitional Scope: The case will likely hinge on the construction of "reusable identifier." The central question is whether this term is limited to identifiers that are generic and devoid of user-specific or session-specific data, as suggested by the patent's specification, or if it can be construed more broadly to cover a wider range of authentication tokens.
  3. Architectural Congruence: Once the accused technology is identified, a key technical question will be one of system equivalence: does the Defendant's authentication architecture rely on the distinct three-component communication path recited in the claims (computer-to-user, user-device-to-verifier, verifier-to-computer), or does it operate in a fundamentally different manner that falls outside the claim scope?