DCT

6:22-cv-00770

Kioba Processing LLC v. Prosperity Bancshares Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 6:22-cv-00770, W.D. Tex., 07/12/2022
  • Venue Allegations: Venue is alleged to be proper in the Western District of Texas because Defendant operates full-service banking locations within the district, constituting regular and established places of business, and has allegedly committed acts of patent infringement in the district.
  • Core Dispute: Plaintiff alleges that Defendant’s online and mobile banking platforms, including its "Lock Card" feature, infringe three patents related to biometric data processing for authentication, user-controlled payment instrument authorization, and mobile payment interfaces.
  • Technical Context: The technologies at issue address methods for securing digital financial transactions, authenticating users, and preventing fraud in online, mobile, and other "card-not-present" environments.
  • Key Procedural History: The complaint alleges that Plaintiff sent a letter to Defendant on October 25, 2021, providing notice of the patents-in-suit and offering a license. This pre-suit notification serves as the basis for the allegations of willful infringement.

Case Timeline

Date Event
1999-01-13 ’078 Patent Priority Date
2001-01-24 ’382 Patent Priority Date
2002-03-01 ’902 Patent Priority Date
2005-07-12 ’902 Patent Issue Date
2005-08-16 ’382 Patent Issue Date
2006-09-12 ’078 Patent Issue Date
2021-10-25 Pre-suit notice letter sent to Defendant
2022-07-12 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 6,917,902 - System and Method for Processing Monitoring Data Using Data Profiles

  • Issued: July 12, 2005

The Invention Explained

  • Problem Addressed: The patent describes that prior art monitoring systems, particularly those incorporating biometrics, were limited in their ability to integrate data from various sources (e.g., fingerprint, retinal, facial recognition) into a single, cohesive process, often due to incompatible data formats or an inability to utilize external data template sources (’902 Patent, col. 1:42-58, col. 2:3-9; Compl. ¶20).
  • The Patented Solution: The invention proposes a system architecture centered on a server that evaluates data from monitoring devices using "data profiles." A data profile is a defined construct that specifies data templates, processing rules, and potential outputs (action assessments), allowing the system to flexibly process diverse data types against a common, rule-based framework (’902 Patent, Abstract; col. 2:21-32). This approach is designed to overcome the integration and compatibility challenges of prior systems.
  • Technical Importance: This system offered a standardized method for integrating disparate authentication and security inputs, a significant challenge as the use of varied biometric technologies became more widespread (’902 Patent, col. 2:11-17).

Key Claims at a Glance

  • The complaint asserts independent claim 1 (Compl. ¶37).
  • The essential elements of claim 1 include:
    • Obtaining monitoring device data characteristic of an individual.
    • Associating a "data profile" with the data, where the profile includes a data processing template, a processing rule, and an action assessment.
    • Processing the data according to the data profile.
    • Generating an action assessment corresponding to the data processing.

U.S. Patent No. 6,931,382 - Payment Instrument Authorization Technique

  • Issued: August 16, 2005

The Invention Explained

  • Problem Addressed: The patent identifies the security risks inherent in online commerce for both consumers and merchants, including fraudulent use of payment instruments in "card not present" transactions and the difficulty for merchants to prove a transaction was authorized (’382 Patent, col. 2:7-63; Compl. ¶27).
  • The Patented Solution: The invention discloses a "default-off" security method where a payment instrument is blocked by default for non-face-to-face transactions. To enable a purchase, the authorized user must first interact with an authentication function to explicitly request that the instrument be unblocked for future authorizations. This provides the user with direct control over the instrument's usability for online transactions (’382 Patent, Abstract; col. 3:8-16).
  • Technical Importance: This user-centric, "default-off" security model represented a more proactive approach to fraud prevention compared to passive security measures common at the time (’382 Patent, col. 2:64-3:5).

Key Claims at a Glance

  • The complaint asserts independent claim 6 (Compl. ¶50).
  • The essential elements of claim 6 include:
    • Blocking authorization for a payment instrument on a default basis by the issuing entity.
    • The authorized holder communicating with an authentication function to undergo authentication and request the instrument be unblocked.
    • The authentication function authenticating the holder and, if successful, causing the issuing entity to store the unblock request.

U.S. Patent No. 7,107,078 - Method and System for the Effecting Payments by Means of a Mobile Station

  • Issued: September 12, 2006

Technology Synopsis

The patent addresses the inconvenience of selecting payment methods in early mobile payment systems by disclosing a network-based solution (’078 Patent, col. 1:36-47; Compl. ¶34). A network application creates a user profile of available payment modes and, in a payment situation, generates and sends a message to the user's mobile device presenting relevant payment alternatives for selection, thereby centralizing the management of payment information rather than storing it on the device itself (’078 Patent, col. 3:12-25; Compl. ¶34).

Asserted Claims

The complaint asserts independent claim 6 (Compl. ¶64).

Accused Features

The complaint accuses Defendant’s systems that "support payment functionality for Defendant's mobile app, including the Prosperity Mobile Banking app" (Compl. ¶64).

III. The Accused Instrumentality

Product Identification

The accused instrumentalities are Defendant's customer-facing digital platforms, including its website (prosperitybankusa.com), its mobile application ("Prosperity Mobile Banking app"), and a specific feature identified as the "Lock Card" service (Compl. ¶¶37, 50, 64).

Functionality and Market Context

The accused website and mobile app provide customers with access to their account information and allow them to perform financial services (Compl. ¶37). The "Lock Card" service is alleged to provide users with the ability to prevent unauthorized use of their credit or debit cards (Compl. ¶52). The complaint notes that as of December 31, 2021, Defendant operated 273 full-service banking locations, suggesting a significant commercial presence (Compl. ¶10).

IV. Analysis of Infringement Allegations

The complaint references claim chart exhibits (Exhibits A, C, and D) that detail its infringement theories; however, these exhibits were not filed with the complaint. No probative visual evidence provided in complaint. The narrative infringement theories are summarized below.

’902 Patent Infringement Allegations

The complaint alleges infringement of at least claim 1 of the ’902 Patent (Compl. ¶37). The infringement theory posits that Defendant's systems practice the claimed method when a user attempts to access an account through the website or mobile app. The act of "assessing data received from a device" to "determine whether access should be granted" is alleged to meet the claim limitations of obtaining and processing monitoring data according to a data profile to generate an action assessment (Compl. ¶37).

’382 Patent Infringement Allegations

The complaint alleges that Defendant's "Lock Card" service infringes at least claim 6 of the ’382 Patent (Compl. ¶50). The theory is that this service implements the claimed method by blocking a payment instrument by default, and then requiring the cardholder to perform a series of steps (e.g., logging into the website or app) to authenticate themselves and unblock the card for use (Compl. ¶¶50, 52). The complaint preemptively addresses a potential divided infringement defense by arguing Defendant directs and controls the user's actions, making it responsible for the performance of the full claim (Compl. ¶52).

V. Key Claim Terms for Construction

"data profile" (Claim 1, ’902 Patent)

  • Context and Importance: This term is foundational to the claimed invention. Its construction will determine whether Defendant’s authentication system, which may use a set of rules and data without calling it a "profile," falls within the claim's scope. Practitioners may focus on this term because the dispute will likely center on whether any logical set of rules for processing authentication data constitutes a "data profile".
  • Intrinsic Evidence for a Broader Interpretation: The specification defines a data profile as including "an identification of a data processing template, at least one processing rule and at least one action assessment" (’902 Patent, col. 2:38-42). This could be interpreted to encompass any system where these elements are logically associated, regardless of their specific implementation as a single data object.
  • Intrinsic Evidence for a Narrower Interpretation: The patent repeatedly illustrates a "data profiles database (210)" as a distinct architectural component, and the summary of the invention describes a "data profile repository" (’902 Patent, Fig. 2; col. 2:53-54). This could support a narrower construction requiring a more formally structured, stored, and identifiable profile entity.

"authentication function" (Claim 6, ’382 Patent)

  • Context and Importance: The claim requires communication with an "authentication function" to unblock the payment instrument. Whether Defendant's own integrated online banking login system meets this definition is critical, as the patent specification discusses authentication in the context of a "trusted third party."
  • Intrinsic Evidence for a Broader Interpretation: The claim language itself does not explicitly require the "authentication function" to be a third party. Plaintiff may argue that any system component that performs the role of authenticating the user for the purpose of unblocking the card satisfies the limitation, which is what the complaint alleges (Compl. ¶52).
  • Intrinsic Evidence for a Narrower Interpretation: The detailed description explains the process in the context of a "central server operated by a trusted third party" that performs authentication (’382 Patent, col. 4:17-19). Defendant, as the issuing bank, is a direct party, not a third party. This distinction may support an argument that the claimed "authentication function" must be architecturally distinct from the issuing entity.

VI. Other Allegations

Indirect Infringement

  • For the ’078 patent, Plaintiff alleges Defendant induced infringement by instructing and encouraging end users, through its website and advertising, to use the Prosperity Mobile Banking app in a manner that allegedly infringes (Compl. ¶¶66, 75).
  • For the ’382 patent, the complaint asserts that Defendant is liable for the user-performed steps of the claimed method because it "directs and controls such performance" by conditioning the security benefit on users following a specific, unalterable process (Compl. ¶52).

Willful Infringement

Willfulness is alleged for all three patents based on Defendant’s alleged knowledge of the patents since at least October 25, 2021, the date of a notice letter sent by Plaintiff (Compl. ¶¶43, 57, 71). The complaint alleges that Defendant continued its infringing conduct despite this notice (Compl. ¶¶46, 60, 74).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A central issue will be one of claim scope: For the ’902 patent, can a standard login authentication system be construed as the structured "data profile" system required by the claims? For the ’382 patent, does the term "authentication function", described in the patent in the context of a "trusted third party," read on the Defendant’s own integrated banking portal, where it is a direct party to the transaction?
  • A key liability question will be one of divided infringement: For the methods of the ’382 and ’078 patents, where the end-user performs essential steps, can Plaintiff meet the high bar of showing that Defendant "directs or controls" its customers' actions to the extent necessary to be held liable for infringement of the entire method claim?
  • An evidentiary question will be one of technical operation: The allegations depend on specific functionalities, such as the "default-off" nature of the "Lock Card" service as required by claim 6 of the ’382 patent. A factual dispute may arise over whether the accused systems operate technically in the manner required by the claims, an issue that will turn on evidence produced during discovery.