1:23-cv-00208
QuickVault Inc v. SailPoint Tech Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: QuickVault, Inc. (Georgia)
- Defendant: SailPoint Technologies, Inc. (Delaware)
- Plaintiff’s Counsel: OhanianIP; Hill, Kertscher & Wharton, LLP
 
- Case Identification: 1:23-cv-00208, W.D. Tex., 05/04/2023
- Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Defendant resides in the district, maintains a regular and established place of business in Austin, and has committed the alleged acts of infringement within the district.
- Core Dispute: Plaintiff alleges that Defendant’s identity security software platform infringes four patents related to forensic data tracking, classification, and remediation on computer networks.
- Technical Context: The technology addresses enterprise data security by monitoring endpoints for sensitive information, tracking its movement, and enabling automated responses to policy violations, a field of significant importance for regulatory compliance.
- Key Procedural History: The operative pleading is an Amended Complaint, which alleges Defendant had knowledge of the first three patents-in-suit at least as of the filing of the original complaint and knowledge of the fourth patent-in-suit as of the filing of the amended complaint. The four asserted patents are part of a single family, claiming a shared priority date.
Case Timeline
| Date | Event | 
|---|---|
| 2014-09-12 | Earliest Priority Date for Asserted Patents | 
| 2017-02-07 | U.S. Patent No. 9,565,200 Issues | 
| 2018-05-01 | U.S. Patent No. 9,961,092 Issues | 
| 2021-05-04 | U.S. Patent No. 10,999,300 Issues | 
| 2023-04-25 | U.S. Patent No. 11,637,840 Issues | 
| 2023-05-04 | Amended Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 9,565,200 - Method and System for Forensic Data Tracking
- Patent Identification: U.S. Patent No. 9,565,200, "Method and System for Forensic Data Tracking," issued February 7, 2017. (Compl. ¶19).
The Invention Explained
- Problem Addressed: The patent’s background section describes the failure of existing security measures like firewalls and encryption to prevent breaches of sensitive data, noting that data can "leak outside of the boundaries of the authorized (e.g. protected) environment" and that Data Loss Prevention (DLP) tools are not always effective. (’200 Patent, col. 2:28-51).
- The Patented Solution: The invention provides a "Forensic Computing Platform" that uses software agents on endpoint devices to scan files, classify them according to policy, and generate a "meta log" of information. (’200 Patent, col. 3:4-24). This meta log is sent to a central cloud control server, which analyzes the data to identify policy violations (e.g., a file with an inappropriate data classification) and can then alert an administrator. (’200 Patent, Fig. 1; col. 3:4-24).
- Technical Importance: This approach sought to provide "Data Provenance"—a comprehensive understanding of data's origin and movement—to help enterprises comply with regulations like HIPAA. (’200 Patent, col. 2:1-7).
Key Claims at a Glance
- The complaint asserts infringement of at least independent claim 1. (Compl. ¶28-29).
- Claim 1 of the ’200 Patent requires:- A forensic computing platform comprising a cloud control server and at least one endpoint.
- Receiving, from a first endpoint, a meta log associated with a file, the meta log containing elements like file name, data element tags, date, user name, and endpoint ID.
- Storing the meta log in the cloud control server.
- Analyzing the data element tags based on a configured setting.
- Determining that a data classification associated with the data is inappropriate for the file.
- Reporting the result to an authorized system administrator.
 
U.S. Patent No. 9,961,092 - Method and System for Forensic Data Tracking
- Patent Identification: U.S. Patent No. 9,961,092, "Method and System for Forensic Data Tracking," issued May 1, 2018. (Compl. ¶21).
The Invention Explained
- Problem Addressed: The ’092 Patent addresses the same problem as its parent ’200 Patent: the leakage of sensitive data from protected corporate environments and the shortcomings of existing security tools. (’092 Patent, col. 2:35-51).
- The Patented Solution: The invention builds on the monitoring and reporting system of the ’200 Patent by adding an active remediation capability. The system not only detects and classifies inappropriate data on an endpoint but is also configured to "remediate" the file by encrypting, deleting, or redacting information within it. (’092 Patent, Abstract; Claim 1). This is described as a function of a "Sniper" module that can remove unauthorized information from endpoints. (’092 Patent, col. 13:10-14).
- Technical Importance: The technology represents a shift from passive data monitoring and alerting to an active, automated data governance and remediation system on endpoints. (’092 Patent, col. 2:52-57).
Key Claims at a Glance
- The complaint asserts infringement of at least independent claim 1. (Compl. ¶35-36).
- Claim 1 of the ’092 Patent requires:- A forensic computing platform with a deployed software agent on at least one endpoint.
- Detecting a new or changed file on the endpoint.
- Evaluating the contents of the file.
- Determining a data classification for the file.
- Remediating the file when the data classification is determined to be inappropriate, where remediation is one of encrypting, deleting, or redacting information.
 
U.S. Patent No. 10,999,300 - Method and System for Forensic Data Tracking
- Patent Identification: U.S. Patent No. 10,999,300, "Method and System for Forensic Data Tracking," issued May 4, 2021. (Compl. ¶23).
- Technology Synopsis: This patent describes a forensic computing platform that monitors data on endpoints. The claimed system involves receiving a "meta log" from an endpoint, storing it on a central server, analyzing "data element tags" within the log to determine a file's data classification is inappropriate, and reporting this finding to an administrator. (’300 Patent, Abstract; Claim 1).
- Asserted Claims: Independent claim 1 is asserted. (Compl. ¶42-43).
- Accused Features: The complaint alleges that Defendant’s platform functionality for detecting, classifying, tracking, and reporting on sensitive data infringes this patent. (Compl. ¶6).
U.S. Patent No. 11,637,840 - Method and System for Forensic Data Tracking
- Patent Identification: U.S. Patent No. 11,637,840, "Method and System for Forensic Data Tracking," issued April 25, 2023. (Compl. ¶25).
- Technology Synopsis: This patent claims a method for data tracking that focuses on behavioral analytics. The method involves receiving metadata from an endpoint and determining that a "pattern of data use" constitutes a "deviation from normal behavior" because the endpoint has "increased or decreased a total number of files... by a percentage that exceeds an average." (’840 Patent, Claim 1). Upon detecting this deviation, the system performs a responsive action. (’840 Patent, Abstract; Claim 1).
- Asserted Claims: Independent claim 1 is asserted. (Compl. ¶49-50).
- Accused Features: The complaint accuses Defendant’s products of practicing the claimed method by "track[ing] and analyz[ing] user activity to assess risks associated with individual users." (Compl. ¶6).
III. The Accused Instrumentality
- Product Identification: The "Accused Products" are identified as Defendant's "Identity Security Platform," a suite that includes "IdentityNow," "AI-Driven Identity Security," "IdentityIQ," "SaaS Management," "Cloud Access Management," "Access Risk Management," "File Access Manager," and "Password Management." (Compl. ¶5).
- Functionality and Market Context: The complaint alleges that a "central aspect" of the Accused Products is the deployment of "endpoint software agents on user devices that detect, classify, and track data." (Compl. ¶6). These agents allegedly enable administrators to monitor and remediate policy violations, track and analyze user activity to assess risk, and place access restrictions on users. (Compl. ¶6). A diagram included in the complaint depicts the "SailPoint Identity Security Cloud" as a platform providing services such as "Access Risk Management" and "File Access Management" coordinated around a "Core of Identity Security." (Compl. p. 3).
IV. Analysis of Infringement Allegations
The complaint references external exhibits for its detailed infringement analysis, which were not filed with the Amended Complaint. The infringement theory is therefore summarized below in prose based on the narrative allegations.
- ’200 and ’300 Patent Infringement Allegations: The infringement theory for these patents appears to rely on the allegation that the Accused Products use endpoint agents to collect file metadata, which is then sent to a central cloud platform. (Compl. ¶6). The complaint alleges this platform analyzes the metadata against security policies to classify the data and determines when a file violates policy (is "inappropriate"). (Compl. ¶6). The system then allegedly alerts administrators to these violations, which is argued to meet the "reporting" limitation of the claims. (Compl. ¶6).
- ’092 Patent Infringement Allegations: The theory for the ’092 Patent relies on the same detection and classification allegations as for the ’200 and ’300 patents but adds an assertion regarding remediation. The complaint alleges the Accused Products "enable remote administrators to monitor and remediate policy violations as they occur," including by "deleting or encrypting unauthorized documents on endpoint computers." (Compl. ¶4, ¶6). This functionality is alleged to meet the "remediate" limitation of claim 1 of the ’092 Patent.
- ’840 Patent Infringement Allegations: The infringement theory for this patent appears to focus on the behavioral analysis features of the Accused Products. The complaint alleges the products "track and analyze user activity to assess risks associated with individual users, allowing administrators to, e.g., place access or sharing restrictions on individuals who have engaged in suspicious activity." (Compl. ¶6). This risk assessment based on user activity is alleged to meet the claim limitation of determining a "deviation from normal behavior."
- Identified Points of Contention:- Technical Questions: A primary question may be whether the Accused Products perform the specific content-aware "data classification" described in the patents, or if their functionality is limited to identity and access management based on user roles and permissions. The complaint alleges the products "detect, classify, and track data," but a point of contention may be the technical mechanism and depth of this classification. (Compl. ¶6).
- Scope Questions: For the ’092 Patent, a potential dispute may arise over the scope of the term "remediate." The claim requires the platform to "remediate" the file when a classification is determined to be inappropriate. A question for the court may be whether this requires automated action by the system itself or if it is met by providing tools that an administrator can use to manually perform those functions.
 
V. Key Claim Terms for Construction
- The Term: "meta log" (’200 Patent, Claim 1; ’300 Patent, Claim 1) 
- Context and Importance: This term is foundational to the infringement theories of the ’200 and ’300 patents, as it defines the information that must be collected from an endpoint and sent to the server. Its construction will determine whether the data packets transmitted by Defendant’s endpoint agents fall within the claim scope. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The claim language recites that the meta log comprises "one or more of a file name, data classification, data element tags, date created or modified, user name, and endpoint ID." (’300 Patent, col. 36:20-24). Parties advocating for a broader scope may argue that any data packet containing at least one of these enumerated items meets the limitation.
- Evidence for a Narrower Interpretation: The specification provides detailed descriptions of the meta log's contents and purpose in the context of a forensic tracking system. (’300 Patent, col. 8:35-44). Parties advocating for a narrower scope may argue that the term should be limited to data structures that contain the specific combination of forensic data described in the patent's embodiments.
 
- The Term: "remediate the... file" (’092 Patent, Claim 1) 
- Context and Importance: This term is the central, action-oriented limitation of the asserted claim of the ’092 Patent. The dispute may turn on whether "remediate" requires the platform to act automatically upon its determination or if it is satisfied by enabling an administrator to take action. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The specification describes remediation as a "function" that includes enabling administrators to take action. The complaint alleges this functionality exists. (Compl. ¶4, ¶6).
- Evidence for a Narrower Interpretation: The claim links the remediation directly to the system's determination ("remediate... when the determined data classification is inappropriate"). The patent describes a specific "Sniper" module that "removes unauthorized information from endpoints." (’092 Patent, col. 13:10-12). This may suggest the claimed "remediation" is an automated function of the system itself, not merely a user-initiated tool.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Defendant induces infringement by providing the Accused Products to its customers. The alleged acts of inducement include providing a "website and documentation" that "intentionally instructs and encourages customers to use the full suite of SailPoint's Accused Products." (Compl. ¶32, ¶39, ¶46, ¶53).
- Willful Infringement: The complaint does not use the term "willful," but it alleges that Defendant has had knowledge of the ’200, ’092, and ’300 patents "at least as of the service and filing of the original Complaint in this case." (Compl. ¶31, ¶38, ¶45). For the ’840 Patent, knowledge is alleged "at least as of the service and filing of this Amended Complaint." (Compl. ¶52). These allegations of knowledge could form the basis for a later claim of willful infringement for post-filing conduct. The prayer for relief requests a finding that the case is "exceptional" under 35 U.S.C. § 285. (Compl. p. 14).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of technical operation: Do Defendant’s Accused Products, which are marketed as an identity security platform, actually perform the specific content-based forensic data classification and behavioral analysis claimed in the patents, or is there a fundamental mismatch between the asserted claims and the accused functionality?
- A central claim construction question will be one of definitional scope: Can the term "remediate" in the ’092 patent be construed to cover a system that provides administrators with tools to manually delete or encrypt files, or does the claim require the platform to perform such actions automatically upon determining a file is inappropriate?
- For the ’840 patent, a key evidentiary question will be whether the accused platform’s risk assessment features perform the specific claimed method of detecting a "deviation from normal behavior" based on a quantitative analysis of the increase or decrease in the "total number of files" on an endpoint.