DCT

1:24-cv-00601

Gatekeeper Solutions Inc v. Forcepoint LLC

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:24-cv-00601, W.D. Tex., 05/31/2024
  • Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Defendant maintains a regular and established place of business in the District and has committed alleged acts of infringement there, including development, use, and sale of the accused products.
  • Core Dispute: Plaintiff alleges that Defendant’s Forcepoint Data Loss Prevention (DLP) product infringes a patent related to a system for controlling electronic communications to prevent them from being sent to conflicting recipients.
  • Technical Context: The technology resides in the field of electronic communication security, specifically systems that apply rules to outgoing messages to prevent inadvertent or improper distribution of information.
  • Key Procedural History: The complaint does not mention any prior litigation, Inter Partes Review (IPR) proceedings, or licensing history related to the patent-in-suit.

Case Timeline

Date Event
2013-09-13 U.S. Patent No. 9,032,038 Priority Date
2015-05-12 U.S. Patent No. 9,032,038 Issued
2024-05-31 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 9,032,038 - Recipient control system for ensuring non-conflicting and comprehensive distribution of digital information and method thereof

Issued May 12, 2015

The Invention Explained

  • Problem Addressed: The patent addresses the risk of sending electronic communications, such as emails, to unintended recipients due to user error (e.g., auto-complete mistakes) or a lack of awareness of conflicts of interest among recipients (’038 Patent, col. 1:23-31). The patent notes this can have “dire consequence” when sensitive information is involved, particularly in contexts like litigation or competing business activities (’038 Patent, col. 1:43-53).
  • The Patented Solution: The invention describes a system that intercepts an electronic communication before it is sent and inspects the list of recipients against a set of pre-configured parameters or rules (’038 Patent, Abstract). If the system detects a “conflicting recipient” based on these rules (e.g., two recipients from competing companies are on the same email), it stops the communication and notifies the user, who may have an option to override the block (’038 Patent, Abstract; Fig. 1). The system thereby acts as a gatekeeper to prevent improper message distribution.
  • Technical Importance: The described system aims to provide a more sophisticated control mechanism than simple blocklists, by analyzing relationships between recipients within a single communication to prevent specific, context-dependent distribution errors (’038 Patent, col. 2:32-48).

Key Claims at a Glance

  • The complaint asserts claims 1-45, with a detailed analysis provided for independent claim 1 (Compl. ¶11, ¶21).
  • Independent Claim 1, drafted in means-plus-function format, recites a system comprising:
    • means for receiving one or more parameters identifying conditions for a conflicting recipient;
    • means for storing said parameters;
    • means for comparing the parameters of each recipient with the parameters of other recipients to determine if a conflict exists;
    • means for stopping the sending of the communication if a conflict is found;
    • means for notifying the user of the conflict; and
    • means for sending the communication if no conflict is found.
  • The complaint reserves the right to pursue infringement of all 45 claims of the patent (’038 Patent, Compl. ¶11).

III. The Accused Instrumentality

Product Identification

  • The accused instrumentality is the Forcepoint Data Loss Prevention (DLP) product (Compl. ¶4).

Functionality and Market Context

  • The complaint alleges that the Forcepoint DLP product includes functionality to prevent the sending of emails to what it terms "conflicting recipients" (Compl. ¶15).
  • This is achieved through a "Policy Rule wizard" that allows an administrator to define rules for monitoring data and activities (Compl. ¶21.a). A screenshot in the complaint shows a user interface for defining such rules (Compl. ¶21.a).
  • A "policy engine" is alleged to parse data and compare it against these rules (Compl. ¶21.c). When a rule is violated, the system can be configured to take actions such as "Block or deny the message or post" and to send notifications to designated individuals (Compl. ¶21.d, ¶21.e).

IV. Analysis of Infringement Allegations

U.S. Patent No. 9,032,038 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
a. means for receiving one or more parameters identifying conditions for a conflicting recipient for each recipient The Forcepoint DLP product provides a "Policy Rule wizard" that allows users to "define the rule" by selecting conditions, such as monitoring for "Specific data," that trigger incidents. A provided screenshot illustrates this rule definition interface (Compl. ¶21.a). ¶21.a col. 7:50-52
b. means for storing said parameters The complaint alleges that rules defining the logic of a policy can be added, edited, or deleted, and are stored as "content classifiers" when a policy is created (Compl. ¶21.b). ¶21.b col. 7:51-54
c. means for comparing the parameters of each recipient of said electronic communication with said parameters of other recipients... A "policy engine" that resides on Forcepoint servers and endpoints is alleged to be "responsible for parsing data and using analytics to compare it to the rules in policies" (Compl. ¶21.c). ¶21.c col. 2:40-45
d. means for stopping the sending of the electronic communication when said comparing means determines at least one conflicting recipient The product allegedly allows a user to configure an "action to take when a breach is discovered," including the option to "Block or deny the message or post." A screenshot shows this configuration menu (Compl. ¶21.d). ¶21.d col. 2:45-48
e. means for notifying the user of each conflicting recipient... and the parameters that identify each conflicting recipient The product allegedly provides a "Send the following notification check box" and allows configuration of who receives notifications, such as "policy owners and message senders." A screenshot shows this setting (Compl. ¶21.e). ¶21.e col. 2:46-48
f. means for sending the electronic communication when said comparing means does not determine at least one conflicting recipient The system provides for the creation of DLP policies that can "permit" a message to be sent if it complies with the defined rules (Compl. ¶21.f). ¶21.f col. 2:45-48

Identified Points of Contention

  • Means-Plus-Function Interpretation: Because Claim 1 is drafted in means-plus-function format, the scope of each element is limited to the corresponding structures described in the patent's specification and their equivalents. A central issue will be whether the accused product's architecture (e.g., its "policy engine") is structurally equivalent to the algorithms and system configurations disclosed in the '038 patent.
  • Scope Questions: The complaint alleges the accused DLP product prevents sharing data with "unauthorized internal users" (Compl. ¶21). The '038 patent specification, however, primarily illustrates "conflicting recipients" with examples like business competitors or opposing parties in a lawsuit (’038 Patent, col. 1:45-51). This raises the question of whether the patent’s claims can be construed to cover general data leakage policies, or if they are limited to rules governing specific interpersonal or inter-organizational conflicts.
  • Technical Questions: Claim 1(c) requires "comparing the parameters of each recipient... with said parameters of other recipients." This language suggests a comparison among the recipients on a given communication. The complaint alleges the accused "policy engine" compares data "to the rules in policies" (Compl. ¶21.c). It is an open question whether the accused product actually performs the specific intra-recipient comparison required by the claim, or if it performs a simpler check of each recipient against a universal set of rules, which could constitute a functional difference.

V. Key Claim Terms for Construction

"conflicting recipient"

  • Context and Importance: This term is at the heart of the dispute. Its construction will determine whether the patent is limited to preventing communications between known adversaries (e.g., competitors) or if it more broadly covers any recipient deemed inappropriate under a security policy (e.g., any external user). Practitioners may focus on this term because the accused product is a general-purpose Data Loss Prevention tool, not necessarily one designed specifically for managing interpersonal conflicts.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The claim language itself does not define the nature of the "conflict," potentially leaving it open to any user-defined rule.
    • Evidence for a Narrower Interpretation: The specification provides a list of explicit examples of "conflicting parties," including "an insurer and the insured; competing businesses; management and staff;... and opposing parties in a lawsuit" (’038 Patent, col. 1:45-51). A defendant may argue this list limits the scope of the term to these types of adversarial relationships.

"means for comparing the parameters of each recipient of said electronic communication with said parameters of other recipients"

  • Context and Importance: As a means-plus-function limitation, the scope of this term is defined by the corresponding structure in the specification. The functional language "comparing... with... other recipients" implies an analysis of the relationships within the recipient group of a single message. The case may turn on whether the accused product's "policy engine" (Compl. ¶21.c) is structurally equivalent to the patent's disclosed algorithms and performs this specific function.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: A plaintiff might argue that any algorithm that evaluates a recipient list against rules to find a prohibited combination meets the claimed function.
    • Evidence for a Narrower Interpretation: The specification and figures illustrate specific rule structures, such as pairwise conflicts (e.g., "recipient A" cannot be on an email with "recipient B") (’038 Patent, Fig. 2). A court could find that the corresponding structure is an algorithm that specifically performs these N-to-N checks among recipients, and that a system which only checks each recipient against a static, universal policy (e.g., "is recipient X on the 'external_user' list?") does not meet the limitation.

VI. Other Allegations

Indirect Infringement

  • The complaint alleges induced infringement (35 U.S.C. § 271(b)) by asserting that Forcepoint provides its DLP software with instructions that lead customers to practice the patented methods (Compl. ¶17, ¶25). It also alleges contributory infringement (35 U.S.C. § 271(c)), claiming the accused product is a material part of the invention that is not a staple article of commerce and lacks substantial non-infringing uses (Compl. ¶17, ¶26).

Willful Infringement

  • The complaint alleges that Forcepoint has willfully infringed "since at least as early as they became aware of the ‘038 Patent" but does not specify when or how such awareness was obtained (Compl. ¶28). The allegation is repeated in each count (Compl. ¶34, ¶39, ¶45).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of claim construction under § 112(f): The case will likely depend heavily on the court's identification of the specific algorithms and structures disclosed in the '038 patent that perform the functions recited in the means-plus-function claims, and the subsequent comparison of those structures to the architecture of the Forcepoint DLP product.
  • A second central issue will be one of definitional scope: Can the term "conflicting recipient," which the patent illustrates with examples of adversarial business or legal relationships, be construed to cover the broader "unauthorized user" or "policy-violating recipient" categories that are the typical focus of modern Data Loss Prevention systems?
  • Finally, a key evidentiary question will be one of functional operation: Does the accused Forcepoint "policy engine" perform the specific function of comparing recipients against each other within a single communication as claimed, or does it merely compare each recipient individually against a set of static, pre-defined rules, potentially creating a mismatch with the claimed method?