DCT

1:24-cv-00476

QuickVault Inc v. AutoNation Inc

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:23-cv-01364, W.D. Tex., 11/16/2023
  • Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Defendant provides its products to customers with offices in the district—including Aptive, AutoNation, BAE Systems, and Honeywell—and conducts business in the district, such as hosting an annual conference in Austin.
  • Core Dispute: Plaintiff alleges that Defendant’s Converged Endpoint Management (XEM) Platform infringes five U.S. patents related to forensic data tracking and remote data access.
  • Technical Context: The technology at issue involves systems for monitoring, classifying, and tracking the movement of sensitive data across computer network endpoints to prevent unauthorized data leakage and ensure regulatory compliance.
  • Key Procedural History: The filing is an Amended Complaint for Patent Infringement. The complaint does not mention any prior litigation, inter partes review proceedings, or licensing history concerning the asserted patents.

Case Timeline

Date Event
2008-05-16 ’029 Patent Priority Date
2014-09-12 ’200, ’092, ’300, ’840 Patents Priority Date
2017-02-07 U.S. Patent No. 9,565,200 Issued
2018-05-01 U.S. Patent No. 9,961,092 Issued
2021-05-04 U.S. Patent No. 10,999,300 Issued
2023-01-31 U.S. Patent No. 11,568,029 Issued
2023-04-25 U.S. Patent No. 11,637,840 Issued
2023-11-16 Amended Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 9,565,200 - "Method and System for Forensic Data Tracking", Issued February 7, 2017

The Invention Explained

  • Problem Addressed: The patent’s background describes the failure of existing network security measures like firewalls and encryption to prevent breaches of sensitive data, particularly when data "leaks" outside a protected environment, such as being copied to a USB drive or emailed to an unauthorized user (’300 Patent, col. 2:28-52). It notes that conventional Data Loss Prevention (DLP) tools cannot prevent all data leakage all the time, creating a need for a system to track data movement even in unprotected environments (’300 Patent, col. 2:40-52).
  • The Patented Solution: The invention proposes a "Forensic Computing Platform" comprising a central cloud control server and software agents on network endpoints (’300 Patent, Fig. 1). These agents scan files on the endpoints, classify them based on content, and transmit "meta logs" containing details about the files (e.g., name, classification, user) to the cloud server, which then analyzes these logs to track data movement, enforce policies, and generate alerts (’300 Patent, col. 3:15-29; Fig. 2).
  • Technical Importance: This approach addresses the growing regulatory demand for "Data Provenance"—the ability to understand the origin and movement of data—to comply with standards like HIPAA, even after sensitive information leaves the direct control of an organization (’300 Patent, col. 2:1-7).

Key Claims at a Glance

  • The complaint asserts infringement of at least Claim 1 of the ’200 Patent (Compl. ¶27).
  • Based on the patent specification, an independent system claim would likely include the core elements of:
    • A cloud control server and at least a first endpoint with a software agent.
    • The server configured to receive a "meta log" from the first endpoint, where the log contains specific data elements like a file name, data classification, user name, and endpoint ID.
    • The server configured to store the meta log in a database.
    • The server configured to receive a "header record" from a second endpoint containing data like a file name and IP address.
    • The server configured to analyze the collected data based on configured policies and generate alerts or reports.
  • The complaint does not explicitly reserve the right to assert dependent claims.

U.S. Patent No. 9,961,092 - "Method and System for Forensic Data Tracking", Issued May 1, 2018

The Invention Explained

  • Problem Addressed: As a continuation of the application leading to the ’200 Patent, the ’092 Patent addresses the same technical problem of tracking sensitive data that has moved outside of a protected network environment (’300 Patent, col. 2:28-52).
  • The Patented Solution: The invention is directed to the same "Forensic Computing Platform" architecture described for the ’200 Patent, involving endpoint agents, meta logs, and a central cloud server for analysis and reporting (’300 Patent, Fig. 1).
  • Technical Importance: The technology provides a system for maintaining visibility and control over sensitive data to meet regulatory requirements, as described for the ’200 Patent (’300 Patent, col. 2:1-7).

Key Claims at a Glance

  • The complaint asserts infringement of at least Claim 1 of the ’092 Patent (Compl. ¶34).
  • As this patent shares a specification with the ’200 Patent, its independent claims would be expected to cover a similar system comprising endpoints that generate meta logs and a cloud server that receives and analyzes them.
  • The complaint does not explicitly reserve the right to assert dependent claims.

U.S. Patent No. 10,999,300 - "Method and System for Forensic Data Tracking", Issued May 4, 2021

  • Technology Synopsis: This patent, from the same family as the ’200 and ’092 Patents, describes a system for tracking data elements as they are moved between authorized and unauthorized devices. It utilizes endpoint agents to scan and classify files and a central server to collect and analyze metadata logs to monitor for policy violations and potential data breaches (’300 Patent, Abstract).
  • Asserted Claims: At least Claim 1 (Compl. ¶41).
  • Accused Features: The complaint accuses the endpoint scanning, data detection, classification, and tracking functions of the Accused Product (Compl. ¶6).

U.S. Patent No. 11,637,840 - "Method and System for Forensic Data Tracking", Issued April 25, 2023

  • Technology Synopsis: As a member of the same patent family, this patent also discloses the "Forensic Computing Platform" for tracking sensitive data movement. The system is designed to provide visibility and control over data even after it leaves a secure network by using endpoint agents and a central analysis server (’840 Patent, Abstract).
  • Asserted Claims: At least Claim 1 (Compl. ¶48).
  • Accused Features: The complaint targets the endpoint data detection, classification, and tracking capabilities of the Accused Product (Compl. ¶6).

U.S. Patent No. 11,568,029 - "Method and System for Remote Data Access", Issued January 31, 2023

  • Technology Synopsis: This patent relates to securely storing, retrieving, and sharing data using PCs and mobile devices, as well as controlling and tracking the movement of that data. The invention provides an architecture for managing data across a variety of computing and storage devices, including a remote computing device that stores meta-data logs (’029 Patent, Abstract; Fig. 1).
  • Asserted Claims: At least Claim 1 (Compl. ¶55).
  • Accused Features: The complaint targets the functions of the Accused Product that enable remote administrators to monitor endpoints, remediate policy violations, and receive alerts (Compl. ¶6).

III. The Accused Instrumentality

Product Identification

The accused instrumentality is Tanium's Converged Endpoint Management (“XEM”) Platform, also identified as including “Tanium Core,” “Tanium XEM Core,” and “Tanium Cloud” (Compl. ¶5).

Functionality and Market Context

The complaint alleges the Accused Product is a platform that allows network administrators to “see, control, and remediate every endpoint” on a network (Compl. ¶5). A central function is the deployment of software onto endpoints to "detect, classify, and track data" and to enable remote administrators to "monitor and remediate policy violations as they occur" (Compl. ¶6). The system allegedly alerts administrators to violations and provides multiple remediation options (Compl. ¶6). No probative visual evidence provided in complaint.

IV. Analysis of Infringement Allegations

The complaint references, but does not include, claim chart exhibits detailing its infringement theories (Compl. ¶27, ¶34, ¶41, ¶48, ¶55). The following summarizes the narrative infringement allegations for the lead patents.

’200 and ’092 Patent Infringement Allegations

The complaint alleges that the Tanium XEM platform directly infringes the asserted claims by performing the patented method of forensic data tracking (Compl. ¶26, ¶33). The narrative suggests that Tanium's deployment of software on network endpoints to "detect, classify, and track data" corresponds to the claimed system's use of an agent on a "first endpoint" to generate a "meta log" (Compl. ¶6; ’300 Patent, Fig. 2). Further, the platform's functionality allowing remote administrators to "monitor and remediate policy violations" and receive alerts is alleged to meet the limitations requiring a cloud control server that analyzes the collected data according to configured policies (Compl. ¶6; ’300 Patent, Fig. 2). The complaint asserts that these and other functions of the Accused Product practice each limitation of the asserted claims (Compl. ¶27, ¶34).

Identified Points of Contention

  • Scope Questions: The patents describe a "Forensic Computing Platform" focused on tracking data provenance. A potential issue for the court may be whether Tanium’s product, marketed as a "Converged Endpoint Management" platform for broad IT security and operations, performs the specific forensic tracking functions required by the claims, or whether its functions are technically distinct.
  • Technical Questions: The patent claims require the generation and transmission of a "meta log" containing a specific set of information (e.g., file name, data classification, user name, endpoint ID). A key factual question will be what specific data Tanium's endpoint agents actually collect and transmit to its server, and whether that data constitutes a "meta log" as defined by the claims.

V. Key Claim Terms for Construction

The Term: "meta log"

  • Context and Importance: This term appears to define the specific data packet transmitted from an endpoint to the central server. The infringement analysis may turn on whether the data transmitted by Tanium’s product meets the technical requirements of a "meta log."
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification describes a meta log in general terms as containing "details about the file" (’300 Patent, col. 3:20-22). This language may support a construction covering a wide range of file-related metadata packets.
    • Evidence for a Narrower Interpretation: Figure 2 of the related patents provides a specific list of contents for a "meta log," including "one or more of a file name, data classification, data element tags, date created or modified, user name, and endpoint ID" (’300 Patent, Fig. 2). A party could argue this defines the required components of the claimed "meta log."

The Term: "endpoint"

  • Context and Importance: The claims recite interactions between a server and at least a "first endpoint" and a "second endpoint." The scope of what constitutes an "endpoint" will be critical to determining the boundaries of the claimed system.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification provides a broad, non-limiting list of what can be an endpoint, including "PCs, MACs, mobile phones, smart phones, tablet computing devices, servers, computing appliances, medical devices, cameras, programmed logic controllers and any other end point" (’300 Patent, col. 4:60-65).
    • Evidence for a Narrower Interpretation: A party might argue that, in the context of the invention, the term "endpoint" should be construed as a device where data is created, modified, or stored by a user, potentially distinguishing it from network infrastructure or server components of the accused system itself.

VI. Other Allegations

Indirect Infringement

The complaint alleges active inducement of infringement against Tanium. It asserts that Tanium's publication of its product website, YouTube tutorials, and other platform documentation intentionally instructs and encourages customers to use the Accused Product in an infringing manner (Compl. ¶30, ¶37).

Willful Infringement

The complaint does not use the term "willful infringement" in its counts for relief. However, it does request a finding that the case is "exceptional" under 35 U.S.C. § 285 (Compl. p. 15, ¶E). The complaint alleges Tanium had knowledge of the asserted patents and its infringement "at least as of the service and filing of this Amended Complaint," which may support an allegation of ongoing infringement being willful post-filing (Compl. ¶29, ¶36).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: can the term "meta log," which the patent specification details with a specific list of data elements, be construed to read on the data packets transmitted between the endpoints and servers of the Tanium XEM platform? The outcome may depend on evidence detailing the precise structure and content of the data Tanium's system collects.
  • A key evidentiary question will be one of functional matching: does the accused platform’s general-purpose endpoint security and management architecture perform the specific, multi-step forensic process required by the claims, which includes receiving and analyzing data from distinct endpoints to track data movement according to a policy? The analysis will likely focus on the operational details of how Tanium’s system detects and responds to data policy violations.