6:23-cv-00246
Authentixx LLC v. Jefferson Bank
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Authentixx LLC (Delaware)
- Defendant: Jefferson Bank (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 6:23-cv-00246, W.D. Tex., 04/03/2023
- Venue Allegations: Venue is based on Defendant maintaining an established place of business in the Western District of Texas.
- Core Dispute: Plaintiff alleges that Defendant’s online banking services infringe patents related to methods for authenticating electronic content to verify its source and prevent fraud.
- Technical Context: The technology addresses online security, specifically the risk of phishing and spoofing, by providing a system to embed and verify a unique marker in web content, assuring a user that the content is from a legitimate source.
- Key Procedural History: U.S. Patent 7,631,191 was the subject of an Inter Partes Review (IPR2014-00475), which resulted in the cancellation of all of its claims (1-23 and 25-32) on February 23, 2018. The complaint was filed more than five years after this cancellation. Both patents-in-suit claim priority back to a 1999 provisional application.
Case Timeline
| Date | Event | 
|---|---|
| 1999-09-09 | Priority Date for '863 and '191 Patents | 
| 2006-06-09 | '191 Patent Application Filed | 
| 2009-12-08 | '191 Patent Issued | 
| 2014-03-04 | Inter Partes Review (IPR) Filed against '191 Patent | 
| 2017-12-08 | '863 Patent Application Filed | 
| 2018-02-23 | All Claims of '191 Patent Cancelled via IPR | 
| 2019-07-16 | '863 Patent Issued | 
| 2023-04-03 | Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,355,863 - "System and method for authenticating electronic content," issued July 16, 2019
The Invention Explained
- Problem Addressed: The patent describes the problem of online fraud, where malicious actors create counterfeit web pages or emails that mimic legitimate ones to steal personal information ("phishing"). Users lack a reliable way to verify that the content they are viewing is authentic, as logos and URLs can be easily copied or spoofed (’863 Patent, col. 1:24-61).
- The Patented Solution: The invention proposes a multi-component system to solve this problem. When a user requests a web page, a web server forwards the request to an authentication server. This server inserts an "authenticity key" into the page's data and may also embed a visible "authenticity stamp" (e.g., a personalized icon or fractal design). A special plug-in on the user's browser then detects this key, verifies it, and displays the pre-configured stamp, confirming to the user that the page is genuine (’863 Patent, Abstract; col. 2:12-22). The system architecture is depicted in Figure 4 of the patent (’863 Patent, Fig. 4).
- Technical Importance: This approach aimed to provide a more robust verification method than simply checking a URL or looking for a generic security icon, by introducing a personalized, user-defined trust indicator that would be difficult to forge (’863 Patent, col. 8:6-14).
Key Claims at a Glance
- The complaint refers to "Exemplary '863 Patent Claims" in an external exhibit not provided with the complaint (Compl. ¶14). Independent claim 1 is representative.
- Essential elements of Independent Claim 1 (Method):- storing at least one authenticity stamp in a preferences file located in a file location accessible by one or more designated servers;
- creating, by the servers, an authenticity key with information to locate the preferences file;
- receiving a request from a client computer for a web page;
- creating formatted data corresponding to the requested web page;
- receiving a request for the authenticity key;
- sending the formatted data to the client computer;
- providing the authenticity key for manipulation to determine the file location;
- manipulating the key to determine the file location;
- locating and retrieving the authenticity stamp from the preferences file; and
- enabling the authenticity stamp to be displayed.
 
U.S. Patent No. 7,631,191 - "System and method for authenticating a web page," issued December 8, 2009
The Invention Explained
- Problem Addressed: The patent identifies the risk that web page icons, logos, and URLs can be easily copied by "fraudsters" to deceive users into believing a counterfeit page is authentic, leading to a lack of consumer confidence (’191 Patent, col. 1:20-44).
- The Patented Solution: The invention describes a system where a web server, upon receiving a page request, forwards it to an authentication server. The authentication server inserts an "authenticity key" into the web page data. This modified page is sent to the user, whose computer has logic (e.g., a browser plug-in) to verify the key and display a user-defined "authenticity stamp" to confirm the page's legitimacy (’191 Patent, Abstract).
- Technical Importance: The patent describes a procedural framework for adding a layer of verifiable trust to web content, intended to combat online fraud schemes prevalent at the time.
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" of the '191 Patent (Compl. ¶18).
- However, an Inter Partes Review Certificate (IPR2014-00475) issued on February 23, 2018, documents that all claims of the '191 Patent (claims 1-23 and 25-32) were cancelled ('191 Patent, IPR Certificate, p. 2). Since a patent without valid claims cannot be infringed, the basis for this count is unclear.
III. The Accused Instrumentality
Product Identification
- The complaint does not identify any specific products, methods, or services by name. It refers generally to "Exemplary Defendant Products" detailed in external exhibits that were not provided with the filed complaint (Compl. ¶¶12, 14, 18).
Functionality and Market Context
- The complaint alleges that Defendant Jefferson Bank, a financial institution, makes, uses, sells, or imports infringing products and has its employees internally test and use them (Compl. ¶¶12-13, 18-19). Given the nature of the patents and the defendant, the accused instrumentalities are presumably Jefferson Bank's public website and its online banking platform for customers. The complaint does not provide specific details about the functionality or market context of these services.
IV. Analysis of Infringement Allegations
The complaint references claim chart exhibits for its infringement allegations but does not include them in the document, instead incorporating them by reference (Compl. ¶¶15, 24). The following analysis is based on the narrative allegations and a representative claim.
No probative visual evidence provided in complaint.
'863 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation | 
|---|---|---|---|
| storing at least one authenticity stamp in a preferences file located in a file location accessible by one or more designated servers | The complaint does not provide sufficient detail for analysis of this element. | ¶¶12-14 | col. 12:46-50 | 
| creating, by the one or more designated servers, an authenticity key with information to locate the preferences file | The complaint does not provide sufficient detail for analysis of this element. | ¶¶12-14 | col. 12:51-53 | 
| receiving a request from a client computer for the at least one web page | The complaint alleges Defendant's systems receive requests for web pages from users, presumably for its online banking services. | ¶¶12-14 | col. 12:54-56 | 
| creating, by the one or more designated servers, formatted data corresponding to the requested at least one web page | The complaint alleges Defendant's systems create and provide web page data to users. | ¶¶12-14 | col. 12:57-59 | 
| providing the authenticity key for manipulation to determine the file location of the preferences file | The complaint does not provide sufficient detail for analysis of this element. | ¶¶12-14 | col. 13:1-4 | 
| enabling the at least one authenticity stamp to be displayed with a representation of the formatted data on a display of the client computer | The complaint does not provide sufficient detail for analysis of this element, but this would correspond to the display of a security indicator on the user's screen. | ¶¶12-14 | col. 15:2-6 | 
- Identified Points of Contention:- Architectural Questions: A central question will be whether Jefferson Bank's web architecture maps onto the claimed structure, which requires specific interactions like creating and providing a distinct "authenticity key" and using it to locate a "preferences file" to retrieve an "authenticity stamp." It raises the question of whether standard security protocols (e.g., TLS/SSL certificates, session tokens) perform the functions of the claimed "authenticity key."
- Evidentiary Questions: The complaint lacks factual allegations showing how the accused system uses a "preferences file" to store a user-selected "authenticity stamp." Evidence of this specific client-side customization, which is a core feature described in the patent, will be critical.
 
V. Key Claim Terms for Construction
- The Term: "authenticity stamp" 
- Context and Importance: This term is the user-facing proof of authenticity. Its construction is critical because if defined narrowly, it may not read on the generic security indicators used in modern web applications. Practitioners may focus on whether the term is limited to the user-configurable, personalized icons described in the specification or if it can encompass any symbol indicating security. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: The claim language itself does not explicitly require user-configuration, only that a stamp is stored in a "preferences file" and later displayed (e.g., ’863 Patent, col. 14:46-47).
- Evidence for a Narrower Interpretation: The specification repeatedly describes the stamp as being defined and configured by the user to create a personalized, and therefore more trustworthy, indicator. Examples include a "diamond shape, which includes text... '~OE'S SEAL OF APPROVAL'" or other user-specified graphics, colors, and locations (’863 Patent, col. 4:11-24; col. 8:6-14).
 
- The Term: "authenticity key" 
- Context and Importance: This is the underlying data structure that enables the authentication. The dispute will likely concern whether this term covers any form of security token or is limited to the specific structure disclosed in the patent. 
- Intrinsic Evidence for Interpretation: - Evidence for a Broader Interpretation: Claim 1 broadly defines the key as having "information to locate the preferences file" (’863 Patent, col. 12:52-53), suggesting a functional rather than structural definition.
- Evidence for a Narrower Interpretation: The detailed description discloses a very specific, multi-part structure for the key, comprising a "web page hash, action, date/time, key identifier and digital signature" (’863 Patent, col. 10:50-58). An argument could be made that this detailed disclosure limits the scope of the term.
 
VI. Other Allegations
- Indirect Infringement: For the ’191 Patent, the complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials" that instruct end users to use the products in an infringing manner (Compl. ¶21).
- Willful Infringement: The complaint does not explicitly allege willfulness. However, for the ’191 Patent, it alleges "Actual Knowledge of Infringement" arising from the service of the complaint (Compl. ¶20), which could form a basis for seeking enhanced damages for any post-filing infringement. No allegations of pre-suit knowledge are made for either patent.
VII. Analyst’s Conclusion: Key Questions for the Case
- Viability of the '191 Patent Claim: The most significant threshold issue is whether the assertion of U.S. Patent 7,631,191 is viable, given that an Inter Partes Review in 2018 resulted in the cancellation of all of its claims. Without any valid and subsisting claims, a finding of infringement is legally impossible. 
- Technical Scope and Equivalence: For the '863 Patent, a core issue will be one of technical mapping: does Jefferson Bank's potentially standard online security infrastructure practice the specific, multi-step method claimed, which involves a client-side "preferences file," a server-side "authenticity key" used to locate that file, and a retrieved "authenticity stamp"? The case may turn on whether generic security features can be equated to these highly specific claim elements. 
- Claim Construction: The dispute over the '863 Patent will likely depend heavily on definitional scope: can the term "authenticity stamp," described in the specification as a unique, user-configured image, be construed broadly enough to cover a generic security indicator provided by a website or browser? The outcome of this construction could be dispositive for infringement.