DCT
6:23-cv-00274
Authentixx LLC v. Central National Bank
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Authentixx LLC (Delaware)
- Defendant: Central National Bank (Texas)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 6:23-cv-00274, W.D. Tex., 04/13/2023
- Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains an established place of business in the district and has allegedly committed acts of patent infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s online banking services infringe patents related to methods for authenticating electronic content to a user.
- Technical Context: The technology aims to combat online fraud, such as phishing, by providing a system for a user to verify that a web page or email originates from its purported source.
- Key Procedural History: The asserted patents belong to a family with a lengthy prosecution history. Notably, U.S. Patent No. 7,631,191 was the subject of an Inter Partes Review (IPR) proceeding (IPR2014-00475), which concluded with a certificate issued on February 23, 2018, canceling claims 1-23 and 25-32. This action post-dates that cancellation. U.S. Patent No. 10,355,863 was issued subject to a terminal disclaimer.
Case Timeline
| Date | Event | 
|---|---|
| 1999-09-09 | Priority Date for ’191 and ’863 Patents | 
| 2009-12-08 | ’191 Patent Issue Date | 
| 2014-03-04 | Inter Partes Review (IPR2014-00475) filed against ’191 Patent | 
| 2018-02-23 | IPR Certificate issues canceling claims of the ’191 Patent | 
| 2019-07-16 | ’863 Patent Issue Date | 
| 2023-04-13 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,355,863 - "System and method for authenticating electronic content," issued July 16, 2019
The Invention Explained
- Problem Addressed: The patent describes the problem of online fraud where malicious actors create counterfeit web pages that mimic legitimate sites to steal personal information ('863 Patent, col. 1:24-40). Consumers may be deceived by visually similar but fake URLs and copied logos, leading to identity theft ('863 Patent, col. 1:41-57).
- The Patented Solution: The invention proposes a system where an "authenticity marker" is embedded into electronic content like a web page by an authentication server ('863 Patent, Abstract). A client-side component, such as a browser plug-in, verifies this marker and displays a pre-configured "authenticity stamp" to the user, confirming the content's legitimacy ('863 Patent, col. 2:12-22). This stamp can be a unique visual icon, text, or dynamic data known only to the user and the authentic source, thereby providing a trusted signal of authenticity ('863 Patent, col. 4:11-26; col. 5:1-6).
- Technical Importance: The described method provides a client-side verification mechanism intended to give users a reliable way to distinguish authentic websites from fraudulent ones, addressing a key security challenge in e-commerce and online banking ('863 Patent, col. 1:41-57).
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" of the ’863 patent, referencing an un-filed exhibit for specifics (Compl. ¶12, ¶14). Independent claim 1 is representative.
- Essential elements of independent claim 1 include:- storing an "authenticity stamp" in a "preferences file" accessible by designated servers;
- creating an "authenticity key" with information to locate the preferences file;
- receiving a page request from a client, creating formatted data, and sending it to the client;
- providing the authenticity key for "manipulation" to determine the file location;
- manipulating the key, locating the file, retrieving the stamp, and enabling its display on the client computer.
 
U.S. Patent No. 7,631,191 - "System and method for authenticating a web page," issued December 8, 2009
The Invention Explained
- Problem Addressed: The patent identifies the risk of users being tricked by fraudulent websites that appear authentic, leading to uncertainty about the legitimacy of a web page and the security of submitting personal information like user IDs and passwords ('191 Patent, col. 1:22-44).
- The Patented Solution: The invention describes a method where a web server passes a page request to an authentication server, which inserts an "authenticity key" into the page ('191 Patent, Abstract). Logic on the user's computer (e.g., a browser plug-in) verifies this key and, if authentic, displays a user-defined "authenticity stamp" to signal that the page is from the true source ('191 Patent, col. 2:51-65).
- Technical Importance: This system aims to provide users with a configurable and trustworthy visual cue to combat phishing and other forms of online spoofing, thereby enhancing security for online interactions ('191 Patent, col. 1:45-53).
Key Claims at a Glance
- The complaint asserts infringement of "one or more claims" of the ’191 patent, again referencing a non-proffered exhibit (Compl. ¶18, ¶23). Independent claim 1 is representative.
- Essential elements of independent claim 1 include:- transforming data at an authentication host computer by inserting an authenticity key to create formatted data; and
- returning the formatted data to enable retrieval of the authenticity key and location of a preferences file, from which an authenticity stamp is retrieved.
 
- An IPR certificate issued on February 23, 2018, canceled claims 1-23 and 25-32 of the ’191 Patent, which includes all independent claims ('191 Patent, IPR Certificate, p. 2).
III. The Accused Instrumentality
- Product Identification: The complaint refers to "Exemplary Defendant Products" but does not name them or describe them in the body of the complaint (Compl. ¶12, ¶18). The named Defendant is Central National Bank, which suggests the accused instrumentalities are likely the bank's public website and/or its online banking platform.
- Functionality and Market Context: The complaint does not provide any specific details about the functionality or operation of the accused products. It makes only the conclusory allegation that the products "practice the technology claimed" and "satisfy all elements of the Exemplary...Patent Claims" by referencing claim charts in Exhibits 3 and 4, which were not filed with the complaint (Compl. ¶14, ¶23).
No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint does not contain claim charts or detailed infringement allegations, instead incorporating by reference Exhibits 3 and 4, which were not provided. The narrative infringement theory is therefore summarized below in prose.
- ’863 and ’191 Patent Infringement Allegations - The complaint alleges that Defendant’s unidentified products directly infringe the asserted patents (Compl. ¶12, ¶18). The infringement theory appears to be that the Defendant's website and/or online banking platform implements a security or authentication feature that corresponds to the patents' claimed method. This method generally involves generating and embedding an authenticity marker into the web content, which is then processed on the user's end to confirm the website's legitimacy. The allegations are entirely conclusory and lack any supporting factual detail regarding how the accused products operate.
 
- Identified Points of Contention: - Validity: A threshold issue for the ’191 Patent is its enforceability. The complaint was filed after an IPR certificate canceled all independent claims of the patent, which may render the infringement cause of action on this patent untenable.
- Evidentiary Questions: The complaint's infringement allegations are unsupported by factual detail, resting entirely on un-filed exhibits. A primary point of contention will be whether Plaintiff can produce evidence showing that Defendant’s systems actually perform the specific steps recited in the asserted claims, such as using a client-side "preferences file" or "manipulating" an "authenticity key" in the manner claimed.
- Scope Questions: The dispute may turn on the scope of key claim terms. A central question will be whether generic security features common to banking websites can be read onto the patents' specific descriptions of a user-configurable "authenticity stamp" that is verified by a client-side plug-in.
 
V. Key Claim Terms for Construction
- The Term: "authenticity stamp" (present in independent claims of both patents) - Context and Importance: This term defines the user-facing output of the invention and is central to the authentication process. Its construction will determine whether a wide range of security indicators can infringe or only a narrow, specific type. Practitioners may focus on this term because the patent's emphasis on user-configuration could be a key point of distinction from generic, server-provided security indicators.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification suggests the stamp can take many forms, including "graphics only, text only or a combination thereof," a "blinking stamp," or a "pop-up dialog box," suggesting flexibility in its form ('863 Patent, col. 4:18-24).
- Evidence for a Narrower Interpretation: The specification repeatedly links the stamp's security value to it being defined by the user. For instance, "the user defines an authenticity stamp, which determines the format of an authenticated page" and "By requiring the user to configure the visual qualities of the stamp, the possibility of a counterfeit stamp being displayed is reduced" ('863 Patent, col. 2:25-28; col. 8:15-18). This could support an argument that a generic, non-user-configurable indicator does not meet the claim limitation.
 
 
- The Term: "preferences file" (present in independent claims of both patents) - Context and Importance: This term describes where the "authenticity stamp" is stored. The nature and location of this "file" are critical to several claim limitations related to its creation, access, and use.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The term itself might be argued to broadly cover any data structure that stores user preferences for the authentication system.
- Evidence for a Narrower Interpretation: The specification states the file is "stored on the user's 110 file system" and that its location is obscured, for example, by being "placed in a random directory" ('863 Patent, col. 6:37-40; col. 12:63-65). This could support a narrow construction requiring a distinct file on the client machine's local file system, potentially excluding modern browser storage mechanisms like cookies, session storage, or database APIs that are not stored in "random" directories.
 
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges induced infringement of the ’191 Patent, stating that Defendant distributes "product literature and website materials" that direct end users to infringe (Compl. ¶21). Knowledge is based on the service of the complaint itself (Compl. ¶22).
- Willful Infringement: While the term "willful" is not used, the complaint alleges that Defendant has "actual knowledge" of the ’191 Patent from the date of service of the complaint and continues to infringe (Compl. ¶20-¶21). These allegations could form the basis for a claim of post-suit willfulness. No pre-suit knowledge is alleged for either patent.
VII. Analyst’s Conclusion: Key Questions for the Case
- Viability of Claims: A threshold legal question is whether Plaintiff can maintain its action for infringement of the ’191 Patent, given that an IPR certificate canceled all of its independent claims years before this lawsuit was filed.
- Evidentiary Sufficiency: A central factual question is whether the Plaintiff’s conclusory allegations, which rely entirely on un-filed exhibits, can be substantiated with evidence demonstrating that the Defendant's online banking system performs the specific, multi-step authentication process required by the claims of the ’863 Patent.
- Definitional Scope: The case will likely involve a dispute over claim construction, specifically whether the term "authenticity stamp," described in the patents as a user-configured element, can be interpreted to cover a generic, bank-provided security indicator, and whether modern browser storage technologies meet the specific limitations of a "preferences file" stored on the client's file system.