6:23-cv-00236
Authentixx LLC v. First National Bank Of Huntsville
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Authentixx LLC (Delaware)
- Defendant: First National Bank of Huntsville (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 6:23-cv-00236, W.D. Tex., 04/03/2023
- Venue Allegations: Venue is based on Defendant having an established place of business within the Western District of Texas.
- Core Dispute: Plaintiff alleges that Defendant’s unspecified products and services infringe two patents related to methods for authenticating electronic content, such as web pages.
- Technical Context: The technology addresses the risk of online fraud, such as phishing, by providing systems to visually verify for a user that a web page or email originates from a legitimate source.
- Key Procedural History: The complaint does not allege any pre-suit litigation or licensing history. U.S. Patent No. 10,355,863 was issued subject to a terminal disclaimer over a parent patent. Notably, public records attached to U.S. Patent No. 7,631,191 include an Inter Partes Review (IPR) Certificate (IPR2014-00475), issued on February 23, 2018, which indicates that all claims of the patent were cancelled. The complaint was filed more than five years after this cancellation.
Case Timeline
| Date | Event | 
|---|---|
| 1999-09-09 | Priority Date for '863 Patent and '191 Patent | 
| 2009-12-08 | U.S. Patent No. 7,631,191 Issued | 
| 2018-02-23 | IPR Certificate Cancelling All Claims of '191 Patent Issued | 
| 2019-07-16 | U.S. Patent No. 10,355,863 Issued | 
| 2023-04-03 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,355,863 - "System and method for authenticating electronic content," issued July 16, 2019
The Invention Explained
- Problem Addressed: The patent describes the problem of consumers’ lack of confidence in the authenticity of web pages and emails, which can be easily copied or spoofed by "fraudsters" for malicious purposes like identity theft (col. 1:25-61). Consumers may be misled by fraudulent URLs or copied logos, making it difficult to verify the true source of electronic content (col. 1:31-40).
- The Patented Solution: The invention proposes a system where a user requests content (e.g., a web page) from a web server. The web server forwards the content to a dedicated "authentication server," which inserts an "authenticity key" into the page. When the user's computer receives the page, client-side logic (such as a browser plug-in) verifies the key and, if valid, displays a pre-configured, user-defined "authenticity stamp" to confirm the page's legitimacy (’863 Patent, Abstract; col. 2:11-23).
- Technical Importance: This method aimed to provide a reliable, user-configurable visual security indicator that was independent of the underlying communication protocol (e.g., HTTPS), thereby offering an additional layer of defense against phishing and spoofing attacks (’863 Patent, col. 2:1-9).
Key Claims at a Glance
- The complaint asserts infringement of one or more "Exemplary '863 Patent Claims" without specifying them (Compl. ¶12). Independent claims 1 and 9 are representative of the patented method.
- Claim 1 (method):- Storing an "authenticity stamp" in a preferences file at a location accessible by designated servers.
- Creating, by the servers, an "authenticity key" with information to locate the preferences file.
- Receiving a client request for a web page.
- Creating formatted data for the web page and sending it to the client.
- Providing the authenticity key for manipulation to determine the file location.
- Retrieving the stamp from the file and enabling its display.
 
- Claim 9 (method): This claim is substantively similar to claim 1 but recites "processing" the authenticity key rather than "manipulating" it.
- The complaint reserves the right to assert other claims, including dependent claims (Compl. ¶12).
U.S. Patent No. 7,631,191 - "System and method for authenticating a web page," issued December 8, 2009
The Invention Explained
- Problem Addressed: Similar to the ’863 patent, this patent addresses the ease with which "fraudsters" can create imitation web pages to deceive users and the corresponding need for a system to allow a user to "feel secure in the authenticity of pages" (’191 Patent, col. 1:20-49).
- The Patented Solution: The invention is a method and system where an "authentication host computer" receives data, transforms it by "inserting an authenticity key to create formatted data," and returns it. The authenticity key enables the client computer to locate a preferences file and retrieve an "authenticity stamp" for display, thereby verifying the source of the formatted data (’191 Patent, Abstract; col. 12:7-19). The system architecture involves a user, a web server, an authentication server, and a security engine, with a browser plug-in on the user's machine to handle verification logic (’191 Patent, Fig. 4).
- Technical Importance: This technology represents an early approach to client-side visual verification of web content authenticity, tying a server-side process to a user-configured display element.
Key Claims at a Glance
- The complaint asserts one or more "Exemplary '191 Patent Claims" without specification (Compl. ¶18). Independent claim 1 is representative.
- Claim 1 (method):- Transforming, at an authentication host computer, received data by inserting an authenticity key to create formatted data.
- Returning the formatted data to enable the authenticity key to be retrieved and to locate a preferences file.
- Wherein an authenticity stamp is retrieved from the preferences file.
 
- The complaint reserves the right to assert additional claims (Compl. ¶18).
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific accused product, method, or service by name (Compl. ¶¶ 12, 18). It refers only to "the Defendant products" and "Exemplary Defendant Products" (Compl. ¶¶ 12, 18).
Functionality and Market Context
- The complaint does not provide sufficient detail for analysis of the functionality or market context of any accused instrumentality. It alleges generally that Defendant makes, uses, sells, and/or imports infringing products (Compl. ¶¶ 12, 18).
IV. Analysis of Infringement Allegations
The complaint's infringement allegations for both asserted patents rely entirely on claim charts provided in external exhibits that were not attached to the publicly filed document. The complaint states that "Exhibit 3 includes charts comparing the Exemplary '863 Patent Claims to the Exemplary Defendant Products" (Compl. ¶14) and "Exhibit 4 includes charts comparing the Exemplary '191 Patent Claims to the Exemplary Defendant Products" (Compl. ¶23).
Because these exhibits are not available, a detailed claim-element-by-claim-element analysis is not possible. The complaint's infringement theory is presented in conclusory terms, alleging that the unspecified "Exemplary Defendant Products" practice the claimed technology and "satisfy all elements of the Exemplary [...] Patent Claims" (Compl. ¶¶ 14, 23).
- Identified Points of Contention:- Scope Questions: Without identification of the accused products, a primary question will concern the nature of the accused system. For example, a court would need to determine if the defendant's standard online banking security architecture can be mapped onto the patents' specific "authentication server" and "authenticity key" architecture, or if there is a fundamental mismatch.
- Technical Questions: A key technical question will be evidentiary: what specific features of the defendant's systems allegedly perform the functions of "inserting an authenticity key" into web content and using that key to retrieve and display a user-defined "authenticity stamp" from a local "preferences file" as required by the claims of both the ’863 and ’191 patents.
 
No probative visual evidence provided in complaint.
V. Key Claim Terms for Construction
’863 Patent
- The Term: "authenticity stamp" (Claim 1)
- Context and Importance: This term is the ultimate user-facing output of the patented method and is central to how authenticity is conveyed. The scope of this term will be critical to infringement, as it defines what kind of indicator the accused system must be capable of producing.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification states a user can configure the stamp to be "graphics only, text only or a combination thereof" and that it can be "audio instead of or in addition to visual" (’863 Patent, col. 4:18-26). This supports a broad definition covering various forms of indicators.
- Evidence for a Narrower Interpretation: The exemplary embodiment shown in Figure 2 is a specific visual mark: a diamond shape with the text "JOE'S SEAL OF APPROVAL" (’863 Patent, Fig. 2; col. 4:11-18). A defendant may argue this example limits the term to a distinct, user-customized graphical element rather than a generic browser security icon.
 
’191 Patent
- The Term: "transforming... received data by inserting an authenticity key" (Claim 1)
- Context and Importance: This phrase describes the core action performed by the claimed "authentication host computer." The entire infringement case hinges on whether the accused system performs this specific transformation. Practitioners may focus on this term because it defines the central mechanism of the invention.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The claim language itself is high-level and does not specify the mechanism of insertion, which could support an argument that it covers any method of adding a security key to web page data before transmission.
- Evidence for a Narrower Interpretation: The detailed description and figures illustrate a specific multi-step process where a web server forwards a page to a separate "authentication server" for modification (’191 Patent, Fig. 4; col. 4:4-8, 45-51). This could support a narrower construction requiring a distinct server-side transformation step, rather than embedding a key at the point of original content creation.
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement of the ’191 patent, stating that Defendant distributes "product literature and website materials" that direct end users to use its products in an infringing manner (Compl. ¶21). The complaint alleges this inducement is active, knowing, and intentional (Compl. ¶22).
- Willful Infringement: The complaint does not use the term "willful," but for the ’191 patent, it alleges that infringement has continued despite "actual knowledge" provided by the service of the complaint (Compl. ¶¶ 20-21). The prayer for relief requests that the case be declared "exceptional" under 35 U.S.C. § 285, which can be a predicate for enhanced damages or attorney's fees (Compl. ¶27.H.i).
VII. Analyst’s Conclusion: Key Questions for the Case
- Viability of the ’191 Patent Assertions: The most significant threshold issue appears to be procedural and jurisdictional. Given that an IPR certificate issued in 2018 indicates all claims of the ’191 patent were cancelled, a central question is whether a cause of action based on this patent can be maintained. The court will likely need to resolve the legal status of these claims before considering the merits of the infringement allegations. 
- Pleading Sufficiency: A key question will be one of pleading sufficiency. Does the complaint, which fails to identify the accused products or the specific claims asserted and instead relies on external exhibits that were not filed with the court, provide the Defendant with fair notice of the claims against it under the pleading standards established by Twombly and Iqbal? 
- Technical and Structural Equivalence: For the ’863 patent, should the case proceed, a core technical question will be one of structural correspondence. Does the Defendant’s online banking platform, which likely employs industry-standard security protocols, contain the specific architecture recited in the claims—namely, a system that "inserts an authenticity key" into web data and uses that key to trigger the display of a user-defined "authenticity stamp" from a local file?