6:23-cv-00235
Authentixx LLC v. Extraco Banks National Association
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Authentixx LLC (Delaware)
- Defendant: Extraco Banks, National Association (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 6:23-cv-00235, W.D. Tex., 04/03/2023
- Venue Allegations: Venue is alleged to be proper in the Western District of Texas because Defendant has an established place of business in the District and has allegedly committed acts of patent infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s products and services infringe patents related to systems and methods for authenticating electronic content to prevent online fraud.
- Technical Context: The technology addresses the problem of "phishing" and website spoofing, where malicious actors impersonate legitimate websites to steal user information.
- Key Procedural History: The file history of U.S. Patent No. 7,631,191 includes an Inter Partes Review (IPR) Certificate (US 7,631,191 K1), issued on February 23, 2018, which resulted from IPR2014-00475. The certificate states that all claims of the '191 Patent (claims 1-23 and 25-32) have been cancelled. This proceeding raises a threshold question regarding the viability of any infringement claim based on the '191 Patent.
I.A. Case Timeline
| Date | Event | 
|---|---|
| 1999-09-09 | Earliest Priority Date for '863 and '191 Patents | 
| 2009-12-08 | U.S. Patent No. 7,631,191 Issued | 
| 2018-02-23 | IPR Certificate Cancelling All Claims of '191 Patent Issued | 
| 2019-07-16 | U.S. Patent No. 10,355,863 Issued | 
| 2023-04-03 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
II.A. U.S. Patent No. 10,355,863 - "System and method for authenticating electronic content"
- Patent Identification: U.S. Patent No. 10,355,863, "System and method for authenticating electronic content," issued July 16, 2019.
II.A.1. The Invention Explained
- Problem Addressed: The patent describes the risk of consumers being defrauded by malicious actors who copy the look and feel of legitimate websites or emails to steal personal information (’863) Patent, col. 1:25-61). Consumers may be tricked by similar URLs (e.g., "blgbank.com" vs. "bigbank.com") or copied logos, making it difficult to be confident in the authenticity of the content they are viewing (’863 Patent, col. 1:31-40).
- The Patented Solution: The invention proposes a multi-component system to solve this problem. When a user requests a web page, the request is routed from a web server to an authentication server (’863 Patent, Fig. 4). This authentication server inserts a unique "authenticity key" into the web page content before it is sent to the user (’863 Patent, col. 2:15-19). The user's computer has logic (e.g., a browser plug-in) that can verify this key, and upon successful verification, displays a pre-configured "authenticity stamp" (e.g., a custom icon or text) to assure the user the page is genuine (’863 Patent, col. 2:21-30; Fig. 2).
- Technical Importance: This approach aimed to provide a method of authentication that was independent of the communication protocol (like HTTPS) and gave users a configurable, easy-to-recognize visual cue of a website's legitimacy (’863 Patent, col. 3:45-53).
II.A.2. Key Claims at a Glance
- The complaint asserts "one or more claims" without specifying them (Compl. ¶12). Independent claims 1, 9, and 18 are method claims.
- Independent Claim 1 recites a method with the essential elements of:- Storing at least one authenticity stamp in a preferences file in a file location accessible by one or more designated servers.
- Creating, by the designated servers, an authenticity key with information to locate the preferences file.
- Receiving a request from a client computer for a web page.
- Creating formatted data corresponding to the requested web page.
- Receiving a request for the authenticity key.
- Sending the formatted data to the client.
- Providing the authenticity key for manipulation to determine the file location of the preferences file.
- Manipulating the key to determine the file location.
- Locating and retrieving the authenticity stamp from the preferences file.
- Enabling the authenticity stamp to be displayed with the formatted data.
 
- The complaint does not explicitly reserve the right to assert dependent claims.
II.B. U.S. Patent No. 7,631,191 - "System and method for authenticating a web page"
- Patent Identification: U.S. Patent No. 7,631,191, "System and method for authenticating a web page," issued December 8, 2009.
II.B.1. The Invention Explained
- Problem Addressed: The '191 Patent, a parent to the '863 Patent, addresses the same core problem of fraudulent websites and a user's lack of confidence in the authenticity of a viewed web page (’191) Patent, col. 1:20-37).
- The Patented Solution: The solution is substantively identical to that described in the '863 Patent. It involves a web server forwarding a page request to an authentication server, which inserts an "authenticity key" into the page (’191 Patent, Abstract). Logic on the user's computer, such as a browser plug-in, verifies the key and displays a user-defined "authenticity stamp" to confirm authenticity for the user (’191 Patent, col. 2:58-65). As noted in the procedural history, all claims of this patent were cancelled via IPR proceedings (’191 Patent, K1 Certificate).
- Technical Importance: This patent was an earlier effort in the same line of invention, aiming to provide a reliable, user-friendly indicator of website authenticity to combat online fraud.
II.B.2. Key Claims at a Glance
- The complaint asserts "one or more claims" without specifying them (Compl. ¶18). Independent claims include 1 (method), 17 (system), 29 (system), and 31 (computer-readable medium).
- Independent Claim 1 (Cancelled) recited a method with the essential elements of:- Transforming, at an authentication host computer, received data by inserting an authenticity key to create formatted data.
- Returning the formatted data from the host computer to enable the key to be retrieved and to locate a preferences file.
- Wherein an authenticity stamp is retrieved from the preferences file.
 
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
III.A. Product Identification
- The complaint identifies the accused instrumentalities as "at least the Defendant products identified in the charts" (Compl. ¶12, ¶18). Without the referenced exhibits, the accused products are broadly understood to be Extraco Banks' website and associated online banking services that are provided to its customers.
III.B. Functionality and Market Context
- The complaint alleges that the accused products "practice the technology claimed" by the patents-in-suit (Compl. ¶14, ¶23). This suggests the accused functionality involves systems for authenticating web content to users, presumably as part of the bank's online security features. The complaint does not provide specific technical details about how the accused products operate or allege their specific commercial importance. No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint references, but does not include, claim chart exhibits (Exhibits 3 and 4) that purportedly compare the asserted claims to the "Exemplary Defendant Products" (Compl. ¶14, ¶23). The complaint's narrative infringement theory is conclusory, stating that the accused products "practice the technology claimed" and "satisfy all elements" of the asserted claims (Compl. ¶14, ¶23). Without the exhibits, a detailed element-by-element analysis is not possible based on the provided documents.
- '863 Patent Infringement Allegations: The complaint alleges direct infringement by Defendant making, using, and offering for sale products that practice the claimed technology, as well as by having its employees internally test and use these products (Compl. ¶12-13).
- '191 Patent Infringement Allegations: The complaint makes similar allegations of direct infringement for the '191 Patent (Compl. ¶18-19). The primary point of contention for any claim of the '191 Patent is its enforceability, given that the IPR Certificate (US 7,631,191 K1) indicates all claims have been cancelled.
- Identified Points of Contention:- Viability of '191 Patent Claims: A threshold issue is whether Plaintiff can maintain an action for infringement of the '191 Patent when public records indicate its claims have been cancelled.
- Evidentiary Questions: For the '863 Patent, a central question will be what evidence demonstrates that Defendant's system performs the specific steps recited in the claims, such as a server-side creation of an "authenticity key" containing location information for a "preferences file" and a corresponding client-side process that "manipulates" this key to retrieve and display a stored "authenticity stamp."
 
V. Key Claim Terms for Construction
The complaint does not provide sufficient detail for analysis of specific disputed claim terms. However, based on the patent specifications and claims, the following terms may be central to the dispute.
- The Term: "authenticity stamp" 
- Context and Importance: This term is the ultimate output of the claimed invention and the primary feature visible to the end-user. Its definition is critical because it determines what form of indicator is covered by the claims. Practitioners may focus on this term because the scope of "stamp" could dictate whether it is limited to a specific visual icon or broadly covers any form of authentication signal. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The specification suggests the stamp can be configured in "an unlimited number of variations," including "graphics only, text only or a combination thereof," and can even be "audio instead of or in addition to visual" (’863 Patent, col. 4:18-26). This may support a broad construction beyond a simple image.
- Evidence for a Narrower Interpretation: The embodiments consistently illustrate the stamp as a distinct visual element, such as a diamond shape with text ("JOE'S SEAL OF APPROVAL") or text embedded in an image ("A-OKAY") (’863 Patent, Fig. 2, Fig. 3). This may support a narrower construction requiring a discrete, graphical user-facing indicator.
 
- The Term: "authenticity key" 
- Context and Importance: This is the core technical component transmitted from the server to the client to enable the authentication process. How this "key" is defined—whether it is a simple data object or must have specific cryptographic properties—will be central to the infringement analysis. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: Claim 1 of the '863 patent defines the key functionally as containing "information to locate the preferences file," suggesting any data structure that achieves this purpose could suffice (’863 Patent, col. 14:48-50).
- Evidence for a Narrower Interpretation: The detailed description describes the key being used in a cryptographic context, such as being part of a "hidden signature object" that includes a "web page hash" and a "digital signature" and is used with public/private key pairs (’863 Patent, col. 10:46-56, col. 11:21-27). This may support a narrower construction requiring specific cryptographic attributes.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement of the '191 Patent. The basis for this allegation is that Defendant distributes "product literature and website materials" that allegedly induce end-users to use the accused products in a manner that infringes (Compl. ¶21).
- Willful Infringement: Willfulness is alleged for the '191 Patent based on post-suit knowledge. The complaint alleges that "at least since being served by this Complaint," Defendant has had actual knowledge and has "actively, knowingly, and intentionally continued to induce infringement" (Compl. ¶20, ¶22).
VII. Analyst’s Conclusion: Key Questions for the Case
- Claim Viability: A dispositive, threshold question for the court will be one of legal standing: can Plaintiff's infringement claims for the '191 Patent proceed, given that an Inter Partes Review Certificate indicates all of its claims have been cancelled?
- Evidentiary Sufficiency: For the surviving '863 Patent, a key question will be one of technical proof: can the Plaintiff produce evidence to show that the accused Extraco Banks online services perform the specific, multi-step process of generating and transmitting a server-side "authenticity key" and using it on the client-side to retrieve and display a pre-configured "authenticity stamp," as required by the claims?
- Definitional Scope: Should the case proceed, the outcome may turn on claim construction: will the term "authenticity stamp" be construed broadly to cover modern, integrated security indicators, or will it be limited to the discrete, user-customized visual icons depicted in the patent's embodiments?