DCT
3:24-cv-00104
Autoscribe Corp v. Paysafe Ltd
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Autoscribe Corporation (Maryland)
- Defendant: Paysafe Limited (Bermuda); Paysafe Holdings (US) Corp. (Delaware); Paysafe Merchant Services Corp. (Delaware); Paysafe Payment Processing Solutions LLC (Delaware)
- Plaintiff’s Counsel: AHMAD, ZAVITSANOS & MENSING, PLLC
 
- Case Identification: 3:24-cv-00104, S.D. Tex., 04/11/2024
- Venue Allegations: Venue is alleged to be proper for the U.S.-based defendants as they have regular and established places of business within the Southern District of Texas. For the foreign defendant, Paysafe Limited, venue is alleged to be proper in any district where it is subject to personal jurisdiction, as it is an alien corporation.
- Core Dispute: Plaintiff alleges that Defendant’s payment processing platform infringes a patent related to methods for securely processing online payments by architecturally separating the handling of sensitive financial data from the merchant's primary server.
- Technical Context: The technology addresses the reduction of Payment Card Industry Data Security Standard (PCI DSS) compliance scope for online merchants through tokenization, where sensitive payment data is isolated on a secure third-party server, and the merchant interacts only with a non-sensitive token.
- Key Procedural History: The asserted patent is a continuation of a chain of applications, with the complaint asserting an effective priority date derived from a provisional application filed in 2012. The complaint does not mention any prior litigation or post-grant proceedings involving the patent.
Case Timeline
| Date | Event | 
|---|---|
| 2012-06-05 | Earliest Patent Priority Date ('621 Patent) | 
| 2023-04-04 | U.S. Patent No. 11,620,621 Issued | 
| 2024-04-11 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 11,620,621 - "Enrolling a payer by a merchant server operated by or for the benefit of a payee and processing a payment from the payer by a secure server," issued April 4, 2023
The Invention Explained
- Problem Addressed: The patent’s background section identifies the major problem of credit card fraud in online transactions and the substantial cost, complexity, and effort required for merchants and processors to achieve and maintain compliance with the Payment Card Industry Data Security Standard (PCI DSS) (’621 Patent, col. 1:22-52).
- The Patented Solution: The invention describes a system and method where a "secure server" is responsible for handling a payer's sensitive financial information, while a "merchant server" handles other aspects of a transaction without ever receiving or storing that sensitive data (’621 Patent, col. 2:35-44). The merchant server initiates an enrollment process, but the sensitive data is provided by the payer directly to the secure server, which then returns a non-sensitive "token" to the merchant server. The merchant can then use this token to request payment processing by the secure server, thereby isolating its own systems from the scope of PCI DSS audits (’621 Patent, Abstract; Fig. 2).
- Technical Importance: This tokenization approach allows merchants to outsource the most sensitive aspects of payment data security, reducing their compliance burdens and potential liability from data breaches (’621 Patent, col. 1:53-65).
Key Claims at a Glance
- The complaint asserts infringement of one or more claims, including representative independent Claim 1 (Compl. ¶25, ¶27).
- The essential elements of independent Claim 1 include:- A method performed by one or more secure servers for processing a payment.
- Providing an API to a merchant server that has financial account registration and token retrieval functions.
- The API receives data from the merchant server, authenticates the payee, and executes a financial account registration function.
- The registration function involves generating a URL, establishing a secure connection with the payer's computer within a frame on the merchant's webpage, rendering a form for the payer to enter sensitive financial information, and outputting instructions to encrypt and transmit that information to the secure server.
- Receiving and storing the sensitive information.
- Executing a token retrieval function that provides a non-sensitive token to the merchant server (but not the payer).
- Processing the payment transaction using the stored sensitive information upon request from the merchant.
 
- The complaint focuses on Claim 1 as representative but alleges infringement of "one or more claims," suggesting the right to assert other claims, including dependent claims, may be invoked later (Compl. ¶25).
III. The Accused Instrumentality
Product Identification
- The accused instrumentalities are Defendants' "Paysafe JS" and "Payment API" products, which collectively form the "Infringing Methods" (Compl. ¶19, ¶26).
Functionality and Market Context
- The complaint describes the accused products as a "payments platform" that enables merchants to accept and process payments (Compl. ¶18). The "Paysafe JS" product is alleged to be a customizable payment form that "embeds seamlessly" into a merchant's website (Compl. ¶28).
- Technically, the complaint alleges that sensitive payment fields (card number, CVV, etc.) are displayed within an "iframe hosted on Paysafe servers," which ensures that "Paysafe Group handles the user input and storage of the data" rather than the merchant (Compl. ¶28, p. 8 visual). This system allegedly uses the "Payment API" to handle the payment, thereby insulating the merchant from handling sensitive data directly (Compl. ¶28). A visual from Defendants' documentation describes this iframe functionality for handling sensitive fields. (Compl. ¶28, p. 8 visual).
- The complaint alleges the platform is commercially significant, with an "annualized transaction volume of over $130 billion in 2022" (Compl. ¶18).
IV. Analysis of Infringement Allegations
'621 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| A method of processing a payment transaction from a payer to a payee, the method being performed by one or more secure servers... | Defendants perform the method through their "Paysafe JS" and "Payment API" products, which operate on one or more of their secure servers. | ¶28 | col. 17:1-3 | 
| providing... an application programming interface (API) that: provides financial account registration and token retrieval functions... | Defendants provide the "Payments API" which allegedly provides the claimed functions. A visual from the documentation states, "Connect your application directly to the Payments API to process a full suite of REST-based payment methods." | ¶29, ¶30, p. 13 visual | col. 6:58-62 | 
| receives, from the merchant server via the API, at least one data element associated with the payer and a payment amount... | The Payments API allegedly receives parameters such as "customerIp," "lastName," and "amount" from the merchant server. | ¶32 | col. 2:22-26 | 
| authenticates the payee; and | The API authenticates the payee (merchant) through the use of a "server-to-server API key." A visual from the documentation shows this authentication step. | ¶33, p. 16 visual | col. 14:35-41; Fig. 4f (578) | 
| executes the financial account registration function... by: generating a uniform resource locator (URL)... | The "Paysafe JS" product uses a URL ( https://hosted.paysafe.com/js/v1/latest/paysafe.min.js) to load the necessary scripts for the payment form. | ¶34.a, ¶17 | col. 17:5-12; Fig. 4g (430) | 
| establishing the secure socket layer connection... within a window or frame that is displayed within the webpage provided by the merchant server; | The system uses HTTPS URLs to establish secure connections for an iframe that is displayed within the merchant's webpage. | ¶34.b, ¶18 | col. 17:13-20; Fig. 4b (512) | 
| outputting instructions to the payer computing system... to render a financial account registration request form... | The Paysafe JS product renders a payment form within an iframe, allowing the payer to provide sensitive financial information directly to Paysafe's servers. | ¶34.c, ¶18 | col. 17:21-30; Fig. 4b (518) | 
| outputting instructions to the payer computing system... to encrypt the sensitive financial account information provided by the payer and transmit the encrypted financial account information to the secure server... | This is allegedly shown by Defendants' marketing materials regarding "PCI DSS compliance," which requires encryption of transmitted cardholder data. | ¶34.d, ¶19 | col. 17:31-38; Fig. 4c (534) | 
| receiving the sensitive financial account information provided by the payer via the secure socket layer connection; | Paysafe servers are alleged to receive and handle the user input and storage of sensitive data via the secure iframe. | ¶35 | col. 17:39-42 | 
| storing the sensitive financial account information in a secure storage location and performing each software process required to maintain compliance with... information security standards; | Defendants' documentation states that "Paysafe Group handles the user input and storage of the data" and that they maintain "PCI DSS compliance." | ¶36, ¶20, ¶21 | col. 17:43-47; Fig. 3 (310) | 
| executing a token retrieval function... by: providing a non-sensitive electronic data token... to the merchant server without providing the sensitive financial account information to the merchant server... | Documentation for the Paysafe SDK allegedly shows an instance.tokenizefunction that returns a "single-use payment handle token" to the merchant server for making a payment. A visual from the documentation illustrates this process. | ¶37, p. 24 visual | col. 17:48-56 | 
| processing the payment transaction using the sensitive financial account information... | The token sent to the merchant server is allegedly used with the "standard Payment API payment endpoint... to make payment," which processes the transaction using the stored sensitive data. | ¶37 | col. 17:57-65; Fig. 3 (314) | 
- Identified Points of Contention:- Scope Questions: A central question may be whether the term "secure server" as distinct from a "merchant server" can be read to cover the accused architecture, where Paysafe's server functionality is delivered via an iframe embedded within the merchant's own webpage. While the patent contemplates logical separation, the precise nature of this separation may be a point of dispute (’621 Patent, col. 2:45-51).
- Technical Questions: The complaint alleges the "authenticates the payee" limitation is met by a "server-to-server API key" (Compl. ¶33). The case may raise the question of whether this technical mechanism meets the full scope of the "authentication" contemplated by the patent, which illustrates a more detailed process involving a "user key registry" (’621 Patent, Fig. 4f, 580). Further, the complaint infers that the system performs encryption based on general statements about PCI compliance (Compl. ¶34.d); the actual technical implementation will likely be scrutinized.
 
V. Key Claim Terms for Construction
- The Term: "secure server" - Context and Importance: The invention's architecture is predicated on the functional separation between a "merchant server" and a "secure server." The definition of "secure server" and the required degree of separation from the "merchant server" is fundamental to the infringement analysis.
- Intrinsic Evidence for a Broader Interpretation: The specification states that the "merchant's server and secure server may operate in the same location or may be the same hardware using a separated volume or partition, or memory section" (’621 Patent, col. 2:45-49). This language may support an interpretation where logical separation is sufficient, without requiring distinct physical hardware or locations.
- Intrinsic Evidence for a Narrower Interpretation: The specification also notes that "particular advantages are realized through logical and/or physical separation" (’621 Patent, col. 2:49-51). The background's focus on reducing PCI-DSS scope could be argued to imply a more robust and complete separation than mere partitioning on a single machine, to ensure the merchant's environment is truly isolated.
 
- The Term: "authenticates the payee" - Context and Importance: This is an active step required of the claimed API. The complaint maps this to the use of an API key. Whether this common practice meets the claimed requirement will be critical. Practitioners may focus on this term because API key usage is ubiquitous, and its interpretation could impact the claim's breadth.
- Intrinsic Evidence for a Broader Interpretation: The patent does not explicitly define "authenticates." A party could argue that using an API key to verify the identity and permissions of the calling entity (the payee's merchant server) is a conventional and sufficient form of authentication in this context.
- Intrinsic Evidence for a Narrower Interpretation: The patent includes a flowchart (Fig. 4f) depicting a more detailed authentication process that "authenticates system user" (578) by accessing an "organization, application, and user key registry" (580). A party could argue this detailed embodiment informs a narrower construction that requires more than a simple API key exchange.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement, stating that Defendants provide "specifications and promotional literature encouraging customers to implement and incorporate the Infringing Methods" (Compl. ¶42). The complaint also alleges Defendants "create and/or distribute user manuals" and offer technical support that provide instructions for infringing use (Compl. ¶42). Named customers are alleged to be direct infringers (Compl. ¶44).
- Willful Infringement: The willfulness allegation is based on knowledge of the patent as of the filing of the complaint (Compl. ¶38). The complaint also pleads willful blindness in the alternative (Compl. ¶41).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of architectural mapping: can the '621 Patent's claimed distinction between a "merchant server" and a "secure server" be read to cover the accused architecture, where functionality from Paysafe's servers is delivered via an iframe embedded within the merchant's own webpage? The outcome may depend on whether the court finds that this arrangement achieves the functional separation central to the invention.
- A key evidentiary question will be one of functional proof: does the evidence cited from Defendants' high-level documentation and marketing materials demonstrate that the accused "Paysafe JS" and "Payment API" products perform every discrete functional step recited in Claim 1, such as "authenticates the payee," in the specific manner required by the patent's intrinsic evidence?