6:22-cv-01116
AttestWave LLC v. Samsung Electronics America Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: AttestWave LLC (Delaware)
- Defendant: Samsung Electronics America, Inc. (New York)
- Plaintiff’s Counsel: Ramey LLP
- Case Identification: 6:22-cv-01116, W.D. Tex., 10/26/2022
- Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains an established place of business in the district and has committed acts of patent infringement within the district.
- Core Dispute: Plaintiff alleges that Defendant’s products infringe a patent related to the management and validation of trusted data flows in a computer network.
- Technical Context: The technology concerns methods for ensuring that software applications on a network adhere to predefined transmission rules, aiming to enhance security and prevent malicious behavior like denial-of-service attacks.
- Key Procedural History: The complaint states that Plaintiff is the assignee of the patent-in-suit. No other significant procedural history, such as prior litigation or post-grant proceedings, is mentioned in the complaint.
Case Timeline
| Date | Event |
|---|---|
| 2002-03-16 | U.S. Patent No. 7,305,704 Priority Date |
| 2002-08-14 | U.S. Patent No. 7,305,704 Application Filing Date |
| 2007-12-04 | U.S. Patent No. 7,305,704 Issue Date |
| 2022-10-26 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,305,704 - Management of trusted flow system
Issued December 4, 2007
The Invention Explained
- Problem Addressed: The patent identifies the vulnerability of computer networks where users have access to the software that regulates their own communication, creating risks of misbehavior such as denial-of-service attacks and unstable throughput, problems not typically found in traditional, centrally-controlled telephone networks (’704 Patent, col. 1:16-24, col. 2:34-41).
- The Patented Solution: The invention proposes a system to validate that a program generating network traffic is "trusted" and behaving correctly. This is achieved by "interlocking" the program's primary function (e.g., sending data) with a secondary function that generates an unpredictable signal, such as a cryptographic tag (’704 Patent, col. 2:10-22). A network element, like a firewall or "Trusted Tag Checker" (TTC), verifies this signal. If the signal is valid, the network element concludes the originating program is authentic and compliant, allowing it to treat the data flow as "trusted" (’704 Patent, Fig. 1; col. 9:6-16).
- Technical Importance: The technology aims to create a mechanism for proactively verifying the integrity of a remote software's operation, enabling network elements to differentiate and prioritize "trusted flows" from potentially malicious or non-compliant traffic (’704 Patent, col. 3:1-6).
Key Claims at a Glance
The complaint does not identify any specific asserted claims in its body. It states that infringement allegations are directed at the "Exemplary '704 Patent Claims" identified in an Exhibit B, which is incorporated by reference but was not filed with the complaint (Compl. ¶12).
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific accused products or services by name. It refers to the "Exemplary Defendant Products" identified in the unattached Exhibit B (Compl. ¶12).
Functionality and Market Context
- The complaint does not provide sufficient detail for analysis of the functionality or market context of any accused instrumentality.
IV. Analysis of Infringement Allegations
The complaint does not contain a narrative infringement theory or a claim chart. Instead, it states that "Exhibit B includes charts comparing the Exemplary '704 Patent Claims to the Exemplary Defendant Products" and that these charts demonstrate how the products satisfy the claim elements (Compl. ¶17). As Exhibit B was not provided, a substantive analysis of the infringement allegations is not possible based on the filed document.
No probative visual evidence provided in complaint.
V. Key Claim Terms for Construction
The complaint does not identify specific asserted claims, which precludes an analysis of key claim terms that may be central to the dispute.
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials inducing end users and others to use its products in the customary and intended manner that infringes the '704 Patent" (Compl. ¶15). It further alleges that Defendant sells its products to customers for use in a manner that infringes (Compl. ¶16).
- Willful Infringement: The willfulness allegation is based on knowledge obtained from the service of the complaint itself. Plaintiff alleges that "Despite such actual knowledge, Defendant continues to make, use, test, sell, offer for sale, market, and/or import into the United States, products that infringe the '704 Patent" (Compl. ¶15). The allegation of inducement is also framed as occurring "[a]t least since being served by this Complaint" (Compl. ¶16).
VII. Analyst’s Conclusion: Key Questions for the Case
The complaint's reliance on an unattached exhibit for all substantive allegations raises fundamental procedural and evidentiary questions that will likely precede any technical dispute.
- A primary threshold issue will be one of sufficiency of pleading: does a complaint that fails to identify any specific accused product or asserted claim in its body, instead deferring all substantive allegations to an unfiled exhibit, provide the defendant with fair notice and meet the plausibility standards required by federal pleading rules?
- A key evidentiary question will be one of factual basis: without the referenced exhibit or an amended complaint, the core facts of the dispute—which products are accused and which patent claims are asserted—remain undefined, precluding any meaningful analysis of the substantive infringement allegations.