6:22-cv-00126
PacSec3 LLC v. Darktrace PLC
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: PacSec3, LLC (Texas)
- Defendant: Darktrace, plc (England and Wales)
- Plaintiff’s Counsel: Ramey & Schwaller, LLP
- Case Identification: 6:22-cv-00126, W.D. Tex., 02/04/2022
- Venue Allegations: Venue is alleged based on Defendant maintaining a regular and established place of business in Austin, Texas, within the Western District of Texas.
- Core Dispute: Plaintiff alleges that Defendant’s autonomous cybersecurity products infringe a patent related to methods for defending against network packet flooding attacks.
- Technical Context: The technology concerns systems designed to mitigate distributed denial-of-service (DDoS) attacks by identifying the path of malicious data packets and selectively throttling traffic from that path.
- Key Procedural History: While not mentioned in the complaint, a May 2023 ex parte reexamination of the patent-in-suit, U.S. Patent No. 7,523,497, confirmed the patentability of asserted method claim 7. The proceeding cancelled other claims, including independent claims 1 and 13. This post-filing development may strengthen the assertion of claim 7 for the remainder of the litigation.
Case Timeline
| Date | Event |
|---|---|
| 2000-11-16 | '497 Patent Priority Date |
| 2009-04-21 | '497 Patent Issue Date |
| 2022-02-04 | Complaint Filing Date |
| 2023-05-22 | '497 Patent Reexamination Certificate Issued |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,523,497 - "PACKET FLOODING DEFENSE SYSTEM"
- Patent Identification: U.S. Patent No. 7,523,497, "PACKET FLOODING DEFENSE SYSTEM", issued April 21, 2009.
The Invention Explained
- Problem Addressed: The patent addresses "packet flooding attacks," where an attacker overwhelms a victim’s network bandwidth with useless data, rendering the network slow or unusable for legitimate traffic. The background notes that prior art defenses were often ineffective because they relied on information that an attacker could easily falsify, such as the source address of data packets (’497 Patent, col. 2:1-6).
- The Patented Solution: The invention proposes a distributed defense system where routers and host computers cooperate to trace and mitigate attacks. The system relies on "attacker-independent information" by determining the physical path a packet travels through the network, using "packet marks" provided by participating routers to do so (’497 Patent, col. 3:61-65). Once a host identifies a path delivering unwanted packets, it can request the upstream routers on that path to limit the rate at which they forward such data, thereby throttling the attack at its source without affecting legitimate traffic from other paths (’497 Patent, Abstract; col. 3:4-14).
- Technical Importance: This approach represented a method to combat denial-of-service attacks that was resilient to source IP address spoofing, a common technique used by attackers to evade simpler blocking mechanisms.
Key Claims at a Glance
- The complaint’s preliminary infringement chart focuses on independent method Claim 7.
- The essential elements of Claim 7 are:
- Determining a path by which data packets arrive at a host computer via packet marks provided by routers leading to said host computer.
- Classifying data packets received at the host computer into "wanted" and "unwanted" data packets by path.
- Associating a maximum acceptable processing rate with each class of data packet.
- Allocating a processing rate less than or equal to the maximum acceptable rate for unwanted data packets.
- The complaint reserves the right to assert infringement of claims 1-18 of the ’497 patent (Compl. ¶8).
III. The Accused Instrumentality
Product Identification
- The complaint accuses "one or more firewall systems" sold by Darktrace, including its "Darktrace Immune System," "Autonomous Cyber AI," and "Antigena" platforms (Compl. ¶8, ¶9).
Functionality and Market Context
- The complaint alleges the accused products use "self-learning AI" to detect and respond to cyber-threats within a network (Compl. ¶9, p. 6). The system is described as observing "packet traffic and host activity within an enterprise LAN or WAN" to model network behavior and identify anomalies (Compl. ¶9, p. 4). The "Antigena" product is identified as an "Autonomous Response technology that can interrupt attacks" (Compl. ¶9, p. 7). A screenshot from Defendant's marketing materials describes the "Darktrace AI" as interrupting "in-progress cyber-attacks in seconds" (Compl. ¶9, p. 3).
- The complaint positions the products as being used by over 6,500 organizations worldwide to provide a "digital immune system" against cyber disruptions (Compl. ¶9, p. 3).
IV. Analysis of Infringement Allegations
'497 Patent Infringement Allegations
| Claim Element (from Independent Claim 7) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| determining a path by which data packets arrive at a host computer via packet marks provided by routers leading to said host computer... | The accused system observes "packet traffic and host activity" including "protocols, source and destination machines," which the complaint alleges constitutes determining a path. The complaint provides a screenshot from a Darktrace whitepaper describing this functionality. (Compl. ¶9, p. 4). | ¶9 | col. 9:49-53 |
| classifying data packets received at said host computer into wanted data packets and unwanted data packets by path; | The accused system uses "supervised learning... using previously-classified data, from which the machine learns the classification system," which is alleged to meet this limitation. The complaint references a Darktrace whitepaper describing its use of machine learning for classification. (Compl. ¶9, p. 5). | ¶9 | col. 9:54-56 |
| associating a maximum acceptable processing rate with each class of data packet received at said host computer; | The complaint alleges the accused system's ability to "detect the sophisticated and novel threats that policy-based controls simply can't" meets this limitation. | ¶9 | col. 9:57-59 |
| and allocating a processing rate less than or equal to said maximum acceptable processing rate for unwanted data packets. | The accused system features "Autonomous Response technology that can interrupt attacks," which the complaint alleges constitutes allocating a processing rate to unwanted packets. A screenshot describes this as the "Respond" capability of the accused system. (Compl. ¶9, p. 7). | ¶9 | col. 9:60-63 |
- Identified Points of Contention:
- Technical Questions: A primary technical question is whether the accused system’s general observation of "packet traffic and host activity" performs the specific function of "determining a path... via packet marks provided by routers" as required by the claim. The complaint does not specify what evidence supports the existence of "packet marks" in the accused system's operation.
- Scope Questions: The dispute may turn on whether the accused system's function to "interrupt attacks" can be construed as "allocating a processing rate." Plaintiff may argue that stopping an attack is equivalent to allocating a zero processing rate, while Defendant may argue that this is a binary blocking action, distinct from the rate-based throttling described in the patent. A similar question arises as to whether detecting threats constitutes "associating a maximum acceptable processing rate."
V. Key Claim Terms for Construction
The Term: "packet marks provided by routers"
Context and Importance: This term appears central to the infringement analysis. The patent’s inventive concept relies on a specific, cooperative mechanism where routers actively mark packets to create an attacker-independent path trace (’497 Patent, col. 3:61-65). Practitioners may focus on this term because the complaint’s evidence cites general "observation of packet traffic and host activity" (Compl. ¶9, p. 4), and the case may depend on whether this general monitoring is equivalent to the specific "packet marks" mechanism.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The complaint does not provide sufficient detail for analysis of evidence supporting a broader interpretation.
- Evidence for a Narrower Interpretation: The specification repeatedly describes a distributed system where "cooperating sites and routers" are essential (’497 Patent, col. 2:30-32). The description of the invention as using "attacker-independent information about the path a packet takes" suggests a mechanism beyond analyzing headers that an attacker could control, pointing to a more specific meaning for "packet marks" tied to router cooperation (’497 Patent, col. 4:1-5).
The Term: "classifying... by path"
Context and Importance: The claim requires that packets be classified into "wanted" and "unwanted" categories specifically "by path." The complaint’s evidence points to a "classification system" learned from "previously-classified data" (Compl. ¶9, p. 5), but does not explicitly state that the path is the basis for this classification. The linkage between the "path" from the first step and the "classification" in the second is a potential point of dispute.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The complaint does not provide sufficient detail for analysis of evidence supporting a broader interpretation.
- Evidence for a Narrower Interpretation: The patent describes associating packets with "places" in the network from which they were forwarded, and then allocating service based on those places to mitigate an attack (’497 Patent, col. 2:38-46). This suggests that the path is the primary attribute for classification, not merely one of several factors in a general machine learning model.
VI. Other Allegations
- Indirect Infringement: The complaint alleges both induced and contributory infringement. It asserts that Darktrace encourages infringement by instructing customers on how to use its products as "DDOS protection systems" and that there are "no substantial noninfringing uses" for the products and services (Compl. ¶15-16).
- Willful Infringement: Willfulness is alleged based on Defendant’s knowledge of the ’497 patent from "at least the filing date of the lawsuit" (Compl. ¶15-16). The complaint reserves the right to amend this allegation if pre-suit knowledge is discovered (Compl. p. 8, n. 1).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of technical mechanism: can the accused system's use of AI to observe general "packet traffic and host activity" be proven to meet the specific claim requirement of "determining a path... via packet marks provided by routers"? The case may hinge on whether Plaintiff can show the accused system implements this specific, cooperative, router-based marking mechanism or its equivalent.
- A second central question will be one of claim element linkage: does the evidence show that the accused system performs classification and response by path, as required by the claim's sequential logic? The court may need to determine if Darktrace's classification is based on the determined path, or if it relies on other behavioral heuristics that are untethered from the pathing element recited in the claim.