DCT
6:21-cv-01164
Auth Token LLC v. Regions Bank
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Auth Token LLC (Delaware)
- Defendant: Regions Bank (Delaware)
- Plaintiff’s Counsel: SAND, SEBOLT & WERNOW CO., LPA
 
- Case Identification: 6:21-cv-01164, W.D. Tex., 11/11/2021
- Venue Allegations: Venue is based on Defendant maintaining an established place of business in the district and allegedly committing acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s systems and methods for user authentication infringe two patents related to the secure personalization of authentication tokens, such as smart cards.
- Technical Context: The technology concerns methods for securely loading cryptographic keys onto a smart card after its manufacture, enabling it to generate one-time passwords for dual-factor authentication in systems like online banking.
- Key Procedural History: The two patents-in-suit share a common specification and priority claim. U.S. Patent No. 8,688,990 is a continuation of the application that led to U.S. Patent No. 8,375,212 and is subject to a terminal disclaimer, tying its patent term to that of the '212 patent. The complaint does not mention any prior litigation or administrative proceedings involving these patents.
Case Timeline
| Date | Event | 
|---|---|
| 2002-05-10 | Priority Date for '212 and '990 Patents | 
| 2013-02-12 | '212 Patent Issued | 
| 2014-04-01 | '990 Patent Issued | 
| 2021-11-11 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,375,212 - "Method for personalizing an authentication token," issued Feb. 12, 2013
The Invention Explained
- Problem Addressed: The patent describes a need for flexible and secure dual-factor authentication to protect remote access to computer systems. A key challenge identified is how to securely provision or "personalize" a stand-alone authentication token (like a smart card) with the secret cryptographic keys it needs to function, after it has been manufactured (’212 Patent, col. 1:21-34, col. 5:46-57).
- The Patented Solution: The invention discloses a method for a "personalisation device" and an "authentication token" to securely communicate. They first validate each other using a pre-defined "personalisation key." Then, they establish a temporary, unique "transport key" through a key exchange protocol. This secure channel is used to transfer an initial secret key and a seed value to the token. A critical feature is that once the token is personalized, it enters a "Normal mode" and is designed to be unable to return to the initial "Personalisation mode" (’212 Patent, Abstract; Fig. 2; col. 6:1-17, col. 7:8-17).
- Technical Importance: This method allows for the secure provisioning of authentication tokens outside of a factory setting, enabling organizations to personalize and deploy smart cards to users with greater flexibility (’212 Patent, col. 5:40-48).
Key Claims at a Glance
- The complaint asserts exemplary claims from an exhibit not provided with the complaint (Compl. ¶17-18). The patent's sole independent claim is Claim 1, a method claim.
- Essential elements of independent claim 1 include:- An authentication token entering a "personalization mode."
- A personalization device requesting and receiving the token's serial number.
- The personalization device encrypting the serial number with a "personalization key" and sending it back to the token for validation.
- Establishing an encrypted session between the two devices using a "transport key."
- Using the transport key to securely send an "initial seed value" and an "initial secret key" to the token.
- The token storing these values, after which it "can no longer enter the personalization mode."
 
- The complaint reserves the right to assert additional claims (Compl. ¶12).
U.S. Patent No. 8,688,990 - "Method for personalizing an authentication token," issued Apr. 1, 2014
The Invention Explained
- Problem Addressed: The '990 Patent shares its specification with the '212 Patent and thus addresses the same technical problem: the secure, post-manufacture personalization of authentication tokens (’990 Patent, col. 1:15-18).
- The Patented Solution: Rather than claiming the method, this patent claims a system comprising the components that execute the personalization process. The claimed system includes an "authentication token," a "personalization device," and an "interface device." The token and personalization device are configured to perform the secure handshake, establish a transport key, and transfer the initial secret and seed values, with the token being rendered unable to re-enter the personalization mode afterward (’990 Patent, Abstract; col. 11:5-col. 12:12).
- Technical Importance: By claiming the system as a whole, the patent protects the combination of hardware and software elements required to perform the secure provisioning method described in the parent patent family (’990 Patent, col. 4:11-16).
Key Claims at a Glance
- The complaint asserts exemplary claims from an exhibit not provided with the complaint (Compl. ¶26-27). The patent's sole independent claim is Claim 1, a system claim.
- Essential elements of independent claim 1 include:- A system with an interface device, an authentication token, and a personalization device.
- The authentication token has a "personalization mode" and a serial number.
- The personalization device is configured to encrypt the serial number with a personalization key.
- The authentication token is configured to validate the personalization key, receive an initial seed value and secret key via an encrypted session, and store them.
- The token is configured to be "unable to again enter to the personalization mode" once personalized.
 
- The complaint reserves the right to assert additional claims (Compl. ¶21).
III. The Accused Instrumentality
Product Identification
- The complaint identifies the accused instrumentalities as "Exemplary Defendant Products" which are detailed in claim chart exhibits attached to the complaint (Compl. ¶12, ¶21). As these exhibits were not provided for this analysis, the specific accused products, methods, or services of Regions Bank cannot be identified.
Functionality and Market Context
- The complaint does not provide a technical description of how any Regions Bank product or service operates. It makes only conclusory statements that the accused products "practice the technology claimed" by the patents-in-suit (Compl. ¶17, ¶26). Given the defendant, it can be inferred the allegations relate to systems for authenticating customers or employees for access to online banking or other secure financial systems.
IV. Analysis of Infringement Allegations
The complaint incorporates its infringement allegations by reference to claim chart Exhibits 3 and 4, which were not available for this analysis (Compl. ¶18, ¶27). The complaint body itself contains no narrative infringement theory or mapping of claim elements to accused product features. Therefore, a claim chart summary cannot be constructed.
No probative visual evidence provided in complaint.
- Identified Points of Contention: Based on the claim language, the infringement analysis may raise several technical and legal questions for the court:- Architectural Questions: Do the accused Regions Bank systems map onto the three-part architecture recited in the '990 Patent, which requires a distinct "interface device," "authentication token," and "personalization device"? A key question will be what components of the accused system are alleged to perform the role of the "personalization device."
- Protocol Questions: Does the accused personalization process perform the specific, sequential cryptographic handshake required by claim 1 of the '212 Patent? This includes the validation step using a "personalization key" followed by the establishment and use of a separate "transport key" to transfer the secret data.
- Functional Questions: What evidence does the complaint provide that the accused tokens have a "personalization mode" that, once exited, "can no longer" be re-entered as required by the claims of both patents? The functionality of any re-provisioning or reset feature in the accused system will likely be a central point of dispute.
 
V. Key Claim Terms for Construction
The Term: "personalization device"
- Context and Importance: The claims of both patents assign critical functions (e.g., encrypting the serial number, sending the initial keys) to this entity. Its definition is vital for determining which component of the Defendant's infrastructure must perform these steps to infringe. Practitioners may focus on this term because the patent appears to distinguish it from both the end-user "interface device" and the back-end "authentication server," creating potential for a dispute over architectural mapping.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification suggests this could be a remote software component, stating that the personalization device "could be at (or incorporated into) the authentication server" (’212 Patent, col. 6:45-48).
- Evidence for a Narrower Interpretation: Figure 2 depicts the "Personalisation Device" as a distinct entity in direct communication with the "Card." The step-by-step description of their interaction could support an interpretation requiring a specific apparatus dedicated to the personalization function, separate from a general-purpose server (’212 Patent, Fig. 2; col. 6:52-col. 7:33).
 
The Term: "authentication token"
- Context and Importance: The scope of this term defines the type of device to which the claimed method and system apply. The dispute will likely center on whether the term is limited to the physical smart cards described in the patent or if it can read on other technologies like software-based tokens or mobile applications.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The term "token" is used in the claims without being explicitly limited to a "smart card," and the patent's field of invention is described broadly as relating to an "authentication token" (’212 Patent, col. 1:11-13).
- Evidence for a Narrower Interpretation: The entire detailed description is framed around "smart cards." It discusses their specific components (ROM, EEPROM), standards (ISO 7816), and interaction protocols like "Attention to Reset (ATR)," which are specific to smart card technology (’212 Patent, Fig. 1; col. 3:10-20; col. 4:36-41). This could support an argument that the invention is limited to the specific smart card embodiments described.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement for both patents. The factual basis alleged is that Defendant distributes "product literature and website materials" that instruct users on how to use the accused products in an infringing manner. The requisite knowledge and intent are alleged to exist "at least since being served by this Complaint and corresponding claim charts" (Compl. ¶15-16, ¶24-25).
- Willful Infringement: The willfulness allegation is based on alleged post-suit knowledge. The complaint asserts that service of the complaint and its attached claim charts provided Defendant with "actual knowledge of infringement" and that any continued infringement thereafter is willful (Compl. ¶14-15, ¶23-24). No allegations of pre-suit knowledge are made.
VII. Analyst’s Conclusion: Key Questions for the Case
- A primary issue will be one of evidentiary mapping: As the complaint's factual allegations are contained entirely within external exhibits, a threshold question will be whether discovery shows that the accused Regions Bank systems actually perform the specific, multi-step cryptographic protocol for personalization as recited in the claims. Does the accused system's process for provisioning a token align with the patent's two-key ("personalization" and "transport") model?
- The case will also present a core question of definitional scope: Can the term "authentication token", which is described in the specification almost exclusively as a physical smart card, be construed to cover the specific technology used in the accused system, particularly if it is a software-based or mobile application token?
- Finally, a key functional question will be whether the accused tokens meet the limitation of being "unable to again enter" the personalization mode. The analysis will require a detailed technical comparison between the patent's described one-way process and any reset or re-provisioning capabilities that may exist in the accused Regions Bank systems.