4:23-cv-01275
Authentixx LLC v. Lone Star Bank
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Authentixx LLC (Delaware)
- Defendant: Lone Star Bank (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 4:23-cv-01275, S.D. Tex., 04/05/2023
- Venue Allegations: Venue is alleged to be proper because Defendant has an established place of business in the Southern District of Texas and has committed the alleged acts of patent infringement in the district.
- Core Dispute: Plaintiff alleges that Defendant’s online systems infringe patents related to methods for authenticating electronic content to assure users of its legitimacy.
- Technical Context: The technology addresses the problem of online fraud, such as phishing, by providing systems to verify that a web page or email originates from its purported source.
- Key Procedural History: The complaint does not mention any prior procedural history. However, public records associated with U.S. Patent No. 7,631,191 indicate that all of its claims were cancelled as a result of an Inter Partes Review (IPR) proceeding (IPR2014-00475), with a certificate issued on February 23, 2018. The asserted U.S. Patent No. 10,355,863 was filed with a terminal disclaimer, potentially limiting its term to that of an earlier-expiring parent patent.
Case Timeline
| Date | Event | 
|---|---|
| 1999-09-09 | Earliest Priority Date for '191 and '863 Patents | 
| 2009-12-08 | U.S. Patent No. 7,631,191 Issued | 
| 2018-02-23 | IPR Certificate Cancelling All Claims of '191 Patent Issued | 
| 2019-07-16 | U.S. Patent No. 10,355,863 Issued | 
| 2023-04-05 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,355,863 - System and method for authenticating electronic content
- Patent Identification: U.S. Patent No. 10,355,863, “System and method for authenticating electronic content,” issued July 16, 2019 (Compl. ¶9).
The Invention Explained
- Problem Addressed: The patent’s background section describes the problem of online fraud, where "fraudsters" can easily copy corporate logos or register deceptive URLs to create counterfeit web pages or emails for purposes of identity theft ('863 Patent, col. 1:31-52). This creates a lack of consumer confidence in the authenticity of electronic content ('863 Patent, col. 1:39-44).
- The Patented Solution: The invention proposes a system where an authentication server inserts an "authenticity key" into a web page before it is sent to a user. Logic on the user's computer, such as a browser plug-in, verifies this key and, if authentic, displays a pre-configured, user-defined "authenticity stamp" (e.g., a custom icon or text) on the page. This provides the user with a visual confirmation that the content is from a trusted source ('863 Patent, Abstract; Fig. 4).
- Technical Importance: The technology aimed to provide a user-configurable, visual method of authentication that is independent of the underlying security of the communication channel (e.g., HTTPS), thereby addressing the human-factor vulnerabilities in online security ('863 Patent, col. 3:44-53).
Key Claims at a Glance
- The complaint asserts infringement of one or more "Exemplary '863 Patent Claims" by reference to an external exhibit, but does not identify any specific claims in the body of the complaint (Compl. ¶12, ¶14). Independent claim 1 is a representative method claim.
- Essential elements of independent claim 1 include:- Storing an "authenticity stamp" in a "preferences file" accessible by designated servers.
- Creating an "authenticity key" with information to locate the preferences file.
- Receiving a web page request from a client computer.
- Creating formatted data corresponding to the requested web page.
- Receiving a request for the authenticity key.
- Sending the formatted data to the client computer.
- Providing the authenticity key for manipulation to determine the location of the preferences file.
- Manipulating the key to locate the preferences file and retrieve the stamp.
- Enabling the authenticity stamp to be displayed on the client computer.
 
- The complaint alleges infringement of "one or more claims," reserving the right to assert other claims, including dependent claims (Compl. ¶12).
U.S. Patent No. 7,631,191 - System and method for authenticating a web page
- Patent Identification: U.S. Patent No. 7,631,191, “System and method for authenticating a web page,” issued December 8, 2009 (Compl. ¶10).
The Invention Explained
- Problem Addressed: The patent addresses the risk of users being deceived by fraudulent web pages that appear authentic, noting that consumers often lack confidence in a web page's true origin ('191 Patent, col. 1:37-40).
- The Patented Solution: The invention describes a method where an authentication host computer intercepts a request for data, inserts an "authenticity key" into that data to create "formatted data," and returns it. The authenticity key enables a client computer to locate a "preferences file" from which an "authenticity stamp" is retrieved and displayed, thereby verifying the data's source to the user ('191 Patent, Abstract; col. 2:50-65). The system architecture relies on client-side software, such as a browser plug-in, to perform the verification and display ('191 Patent, Fig. 5).
- Technical Importance: This system proposed a way to validate the source of a web page at the application layer, providing a user-configurable visual cue that is distinct from transport-layer security protocols like SSL ('191 Patent, col. 2:45-53).
Key Claims at a Glance
- The complaint asserts infringement of "Exemplary '191 Patent Claims" by reference to an external exhibit and does not identify specific claims in the complaint text (Compl. ¶18, ¶23). As noted in Section I, public records indicate all claims of the '191 Patent have been cancelled. Independent claim 1 is representative of the cancelled claims.
- Essential elements of former independent claim 1 include:- Transforming, at an authentication host computer, received data by inserting an authenticity key to create formatted data.
- Returning the formatted data to enable retrieval of the authenticity key and location of a preferences file, from which an authenticity stamp is retrieved.
 
- The complaint broadly alleges infringement of "one or more claims" of the '191 Patent (Compl. ¶18).
III. The Accused Instrumentality
- Product Identification: The complaint identifies the accused instrumentalities as the "Exemplary Defendant Products," which are detailed in exhibits not attached to the publicly filed complaint (Compl. ¶12, ¶18). Given that the Defendant is a bank, the accused products are presumably the online banking website and/or related services provided by Lone Star Bank.
- Functionality and Market Context: The complaint does not provide any specific details regarding the technical functionality of the accused Lone Star Bank products. It makes only conclusory allegations that the products "practice the technology claimed" by the patents-in-suit (Compl. ¶14, ¶23). The complaint does not contain allegations regarding the products' commercial importance or market position.
IV. Analysis of Infringement Allegations
No probative visual evidence provided in complaint.
The complaint incorporates infringement allegations by reference to claim chart exhibits that were not filed with the complaint (Compl. ¶15, ¶24). The narrative theory of infringement, as inferred from the asserted patents and the nature of the defendant, is that Lone Star Bank’s online banking systems provide a security feature that functions as the claimed authentication method. Specifically, the plaintiff's theory appears to be that the bank's website infrastructure generates and transmits data that serves as an "authenticity key," which is then used by the end-user's device to display some form of "authenticity stamp" (such as a security image or phrase) to verify that the website is legitimate. The complaint alleges direct infringement of both the '863 and '191 Patents through the bank's use and testing of these systems (Compl. ¶13, ¶19).
- Identified Points of Contention:- Factual Dispute: The central dispute will likely be factual: does the architecture of Lone Star Bank’s online security system align with the specific architecture required by the patent claims? For instance, do the accused systems actually use a server-generated "authenticity key" for the express purpose of "locat[ing] the preferences file" on the client device, as required by claim 1 of the '863 Patent?
- Scope Questions: A primary legal question will concern the scope of key claim terms. For example, does a standard security image feature, common on banking websites, fall within the patent's definition of an "authenticity stamp"? Further, can modern browser-based data storage (e.g., cookies, local storage) be considered a "preferences file" as that term is used in the patent?
- Technical Questions: The asserted claims describe a specific client-server interaction involving a client-side plug-in or module that verifies authenticity (e.g., '863 Patent, Fig. 5). A key technical question is whether the accused Lone Star Bank systems, which may rely on standard browser functions, operate in the manner required by the claims.
 
V. Key Claim Terms for Construction
The complaint does not provide sufficient detail for a full analysis, but based on the representative claims of the '863 Patent, the following terms may be critical.
- The Term: "preferences file" 
- Context and Importance: This term is central to claim 1 of the '863 Patent, which requires that the "authenticity stamp" is stored in and retrieved from this file. The viability of the infringement allegation depends on whether the accused system contains a component that meets this definition. Practitioners may focus on this term because its construction could determine whether standard browser storage mechanisms fall within the claim scope. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The patent does not explicitly limit the file to a specific format, stating it is used to "store information, such as a user's secure word" ('863 Patent, col. 12:63-64). This language may support an argument that any client-side data store holding user preferences, including a browser cookie, qualifies.
- Evidence for a Narrower Interpretation: The specification suggests a dedicated file managed by a specific client-side application, stating that "the preferences file is placed in a random directory to help obscure the location" ('863 Patent, col. 12:65-66). This implies a file structure deliberately separated from standard browser data for security, potentially narrowing the term to exclude general-purpose cookies.
 
- The Term: "authenticity key with information to locate the preferences file" 
- Context and Importance: This limitation defines the primary function of the "authenticity key." The infringement analysis will turn on whether any data transmitted by the accused system performs this specific locating function, rather than simply triggering a display. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The patent describes the key as including multiple data fields like a "web page hash, action, date/time, key identifier and digital signature," suggesting a complex data object ('863 Patent, col. 10:52-54). A party could argue that any such complex token that ultimately results in the display of a user-specific element contains implicit "information to locate" it.
- Evidence for a Narrower Interpretation: The claim language is explicit: the key must contain "information to locate the preferences file." This suggests a direct functional link, such as a file path or a pointer, rather than an indirect trigger. The specification's focus on a "browser plug-in" that "verifies this page" using the key supports a narrower reading where the key is a specific input for a specific verification and location process ('863 Patent, col. 10:65-66).
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement of the '191 Patent. This allegation is based on the defendant allegedly distributing "product literature and website materials" that instruct end users on how to use the accused products in an infringing manner (Compl. ¶21). The knowledge element is pleaded as arising "at least since being served by this Complaint" (Compl. ¶22).
- Willful Infringement: Willfulness is not pleaded as a separate count, but the complaint alleges that Defendant's infringement of the '191 Patent continued despite having "actual knowledge" from the service of the complaint (Compl. ¶20-21). This establishes a basis for seeking enhanced damages for post-filing willful infringement.
VII. Analyst’s Conclusion: Key Questions for the Case
- Jurisdictional Viability: A threshold issue for the court will be whether any claims for infringement of the '191 Patent can be maintained, given that public records indicate all of its claims were cancelled in a prior Inter Partes Review. This raises a fundamental question of whether a valid cause of action exists for this patent.
- Technical Equivalence: A key evidentiary question will be one of functional equivalence: does a modern online banking security feature, such as a personalized security image, perform the same function in substantially the same way to achieve the same result as the specific multi-step method recited in the '863 Patent's claims? The case may turn on whether the accused system's operation is equivalent to the patent's disclosure of using a server-generated "key" to locate a client-side "file."
- Definitional Scope: The central legal question will be one of claim construction: can the term "preferences file", described in the patent in the context of a downloadable browser plug-in, be construed to cover modern, integrated browser data-storage mechanisms like cookies or local storage? The answer will likely define the scope of the patent and determine whether it can read on the accused systems.