4:25-cv-01971
Torus Ventures LLC v. PropertyInfo Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Torus Ventures LLC (Delaware)
- Defendant: PropertyInfo Corp (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 2:25-cv-00131, E.D. Tex., 02/04/2025
- Venue Allegations: Plaintiff alleges venue is proper because Defendant has an established place of business in the Eastern District of Texas and has committed acts of patent infringement in the district.
- Core Dispute: Plaintiff alleges that Defendant’s unidentified products infringe a patent related to a recursive security protocol for digital copyright control.
- Technical Context: The technology concerns cryptographic methods for protecting digital content, such as software or media, by applying multiple layers of encryption in a way that allows the security system itself to be securely updated.
- Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event | 
|---|---|
| 2002-06-20 | ’844 Patent Priority Date (Provisional App. 60/390,180) | 
| 2007-04-10 | ’844 Patent Issued | 
| 2025-02-04 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,203,844 - Method and system for a recursive security protocol for digital copyright control
The Invention Explained
- Problem Addressed: The patent identifies the challenge of protecting digital works in an era where perfect, cost-free duplication is trivial ('844 Patent, col. 1:25-44). It notes that prior art security protocols often rely on "artificial" distinctions between different types of data (e.g., media stream vs. executable code), limiting their flexibility and security ('844 Patent, col. 2:30-41).
- The Patented Solution: The invention proposes a "recursive security protocol" that treats all digital data, including the security protocol itself, as a simple "bitstream" ('844 Patent, col. 2:41-44). The core method involves encrypting a bitstream and associating it with a decryption algorithm; this combination is then encrypted again with a second algorithm, creating a layered and self-referential security wrapper ('844 Patent, Abstract; col. 2:61-68). This architecture allows the security system to be updated or have its keys managed through the very same secure protocol it establishes, as illustrated in the key management diagrams (e.g., '844 Patent, FIG. 5).
- Technical Importance: This recursive approach was intended to create a more flexible and robust Digital Rights Management (DRM) system that could protect not only content but also the software and keys used for decryption, and could be updated to fix security holes without requiring hardware changes ('844 Patent, col. 4:11-31).
Key Claims at a Glance
The complaint alleges infringement of "one or more claims" and "exemplary claims" identified in a non-proffered exhibit (Compl. ¶11, ¶16). Independent claim 1 is representative of the core method:
- Claim 1 (Method):- encrypting a bitstream with a first encryption algorithm;
- associating a first decryption algorithm with the encrypted bit stream;
- encrypting both the encrypted bit stream and the first decryption algorithm with a second encryption algorithm to yield a second bit stream; and
- associating a second decryption algorithm with the second bit stream.
 
III. The Accused Instrumentality
Product Identification
The complaint does not name any specific accused products, methods, or services. It refers only to "Exemplary Defendant Products" that are purportedly identified in an attached Exhibit 2, which was not included with the complaint (Compl. ¶11, ¶16).
Functionality and Market Context
The complaint does not provide sufficient detail for analysis of the functionality or market context of any accused instrumentality.
IV. Analysis of Infringement Allegations
The complaint alleges that infringement is detailed in claim charts provided as Exhibit 2, which is not available for analysis (Compl. ¶16-17). The narrative alleges that Defendant's unspecified products directly infringe by making, using, and selling products that "practice the technology claimed by the '844 Patent" and "satisfy all elements of the Exemplary '844 Patent Claims" (Compl. ¶11, ¶16). The complaint also alleges that Defendant's internal testing and use of the products constitute direct infringement (Compl. ¶12). No probative visual evidence provided in complaint.
Identified Points of Contention
Given the lack of information about the accused products, analysis is limited to the claim language itself.
- Technical Questions: A central factual question will be whether any accused product actually performs the recursive encryption recited in claim 1. Specifically, evidence would be needed to show that a product encrypts an already-encrypted bitstream together with its associated decryption algorithm, as a single unit, to create a second, layered bitstream.
- Scope Questions: The term "bitstream" is broad and defined in the patent as reducible to a stream of 1s and 0s, independent of its purpose ('844 Patent, col. 2:32-38). A dispute may arise over whether this term, in the context of the claims, can read on the specific data types and structures used by the accused products.
V. Key Claim Terms for Construction
The Term
"associating a... decryption algorithm with the encrypted bit stream"
Context and Importance
This phrase appears twice in independent claim 1 and is central to the claimed method. The nature of this "association" is critical, as the claim requires that the associated algorithm is subsequently encrypted along with the encrypted bitstream. The definition will determine what kind of technical link between data and decryption code falls within the claim's scope.
Intrinsic Evidence for Interpretation
- Evidence for a Broader Interpretation: The patent does not explicitly define "associating." A party might argue that any logical link that allows a target unit to find and use the correct decryption algorithm for a given bitstream meets this limitation, even if they are not stored contiguously.
- Evidence for a Narrower Interpretation: The claim structure itself suggests a narrow interpretation. The step "encrypting both the encrypted bit stream and the first decryption algorithm" implies that the two components are bundled together in a way that they can be operated on by the "second encryption algorithm" as a single object ('844 Patent, claim 1). This suggests a structural or data-packet-level association rather than a purely logical one.
VI. Other Allegations
Indirect Infringement
The complaint alleges induced infringement occurring "at least since being served by this Complaint" (Compl. ¶15). The basis for inducement is Defendant's alleged distribution of "product literature and website materials" that instruct end users on how to use the accused products in an infringing manner (Compl. ¶14).
Willful Infringement
The complaint alleges that Defendant has actual knowledge of the '844 Patent and its infringement from the date of service of the complaint and its attached (but un-provided) claim charts (Compl. ¶13). It further alleges that any continued infringement after this date is willful (Compl. ¶14). No allegations of pre-suit knowledge are made.
VII. Analyst’s Conclusion: Key Questions for the Case
- Pleading Sufficiency: A threshold issue is whether the complaint, which fails to identify any accused products and relies entirely on a non-proffered exhibit for its infringement allegations, meets the plausibility standards required by federal pleading rules.
- The "Recursive" Encryption Step: A core technical question will be whether the accused technology performs the specific, two-stage encryption process of Claim 1—in particular, whether it encrypts a decryption algorithm along with an already-encrypted bitstream to form a new, second-level encrypted object.
- The Nature of "Association": A key claim construction dispute will likely focus on the meaning of "associating" a decryption algorithm with an encrypted bitstream. The outcome will turn on whether this requires a specific data structure that bundles the two elements together, or if a more diffuse, logical link is sufficient to meet the claim limitation.