DCT
6:23-cv-00340
Monterey Research LLC v. Toshiba America Electronic Components Inc
Key Events
Complaint
Table of Contents
complaint
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Monterey Research, LLC (Delaware)
- Defendants: Toshiba America Electronic Components, Inc. (California) and Toshiba Electronics Devices And Storage Corporation (Japan)
- Plaintiff’s Counsel: Russ August & Kabat
- Case Identification: 6:23-cv-00340, W.D. Tex., 05/09/2023
- Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Defendants maintain a regular and established place of business in Austin, Texas, and have committed acts of infringement in the district.
- Core Dispute: Plaintiff alleges that Defendant’s self-encrypting hard disk drives (HDDs) and certain system-on-chip (SoC) products infringe six U.S. patents related to secure memory management, sense amplifiers, and impedance matching circuits.
- Technical Context: The technologies at issue relate to hardware-level data security for storage devices and fundamental circuit designs for high-performance semiconductors, both critical areas in the electronics industry.
- Key Procedural History: The complaint alleges an extensive pre-suit notification history spanning over four years, including multiple letters and in-person meetings where Plaintiff presented detailed infringement claim charts to Defendant for all asserted patents.
Case Timeline
| Date | Event |
|---|---|
| 2004-07-07 | ’962 Patent Priority Date |
| 2005-02-04 | ’987, ’776, & ’303 Patents Priority Date |
| 2005-12-29 | ’269 Patent Priority Date |
| 2007-03-25 | ’658 Patent Priority Date |
| 2008-07-29 | ’987 Patent Issue Date |
| 2010-11-16 | ’269 Patent Issue Date |
| 2011-02-15 | ’962 Patent Issue Date |
| 2011-07-12 | ’658 Patent Issue Date |
| 2014-04-08 | ’776 Patent Issue Date |
| 2017-04-27 | Plaintiff allegedly sent letter to Toshiba identifying infringement of ’269 Patent |
| 2017-09-19 | ’303 Patent Issue Date |
| 2019-01-10 | Plaintiff allegedly sent letter to Toshiba identifying infringement of ’962 Patent |
| 2019-09-19 | Plaintiff allegedly presented infringement charts for ’269, ’987, ’962 Patents to Toshiba |
| 2020-12-01 | Plaintiff allegedly presented infringement charts for ’658, ’776, ’303 Patents to Toshiba |
| 2023-05-09 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,836,269 - "Systems and Methods for Access Violation Management of Secured Memory"
- Patent Identification: U.S. Patent No. 7,836,269, "Systems and Methods for Access Violation Management of Secured Memory," issued November 16, 2010.
The Invention Explained
- Problem Addressed: The patent's background describes the risk that illegal, invalid, or unauthorized commands sent to a memory could corrupt secured data or result in the viewing of sensitive information by an unauthorized entity (’269 Patent, col. 1:24-34; Compl. ¶33).
- The Patented Solution: The invention proposes a "host memory interface," situated between a host processor and a memory, that acts as a gatekeeper. This interface monitors commands, analyzes their validity, and checks whether the command has access rights to a specific memory partition. If a violation is detected, the interface can abort the command or cause a different, safe operation to occur, thereby preventing the memory from executing an improper command (’269 Patent, Abstract).
- Technical Importance: This approach creates a hardware-level barrier for memory access that is independent of the host processor's software, which could be compromised, providing a more robust security architecture (Compl. ¶33).
Key Claims at a Glance
- The complaint asserts independent claim 1 (Compl. ¶35).
- Essential elements of claim 1 include:
- A host processor that generates at least one command (e.g., read, write, program, or erase).
- At least one other processor associated with the host processor that receives and analyzes the command.
- The other processor determines if the command is valid and if it has access rights to a partition in the memory.
- The other processor comprises an authentication component that solicits authentication data from an entity and determines access rights based on that data.
- The other processor controls access to the memory based in part on a level of authentication associated with the authentication data.
- The complaint does not explicitly reserve the right to assert dependent claims for this patent.
U.S. Patent No. 7,979,658 - "Secure Management of Memory Regions in a Memory"
- Patent Identification: U.S. Patent No. 7,979,658, "Secure Management of Memory Regions in a Memory," issued July 12, 2011.
The Invention Explained
- Problem Addressed: The patent describes a need for secure, granular control over distinct regions within a memory, including the ability to securely erase data and prevent unauthorized access after repeated failed attempts (’658 Patent, Abstract).
- The Patented Solution: The invention discloses an "access management component" located within the memory component itself. This component manages security records, compares received authentication data to stored credentials, facilitates a "wipe erase" of a memory region upon successful authentication, and can lock a memory region if a maximum number of failed access attempts is reached (’658 Patent, col. 4:5-23).
- Technical Importance: By embedding the access control logic directly into the memory device, the security of memory regions becomes independent of the host system's security status, making it more resilient to both software attacks and physical tampering (Compl. ¶42).
Key Claims at a Glance
- The complaint asserts independent claim 1 (Compl. ¶44).
- Essential elements of claim 1 include:
- At least one memory that contains a plurality of memory regions to facilitate storage of data.
- An access management component that facilitates control of access to the plurality of memory regions based on a predetermined access criteria.
- The access management component compares received authentication data to stored authentication data associated with a memory region.
- The access management component facilitates a wipe erase of a memory region when the received data matches the stored data.
- The access management component facilitates creation of a new security record that contains a default authentication credential.
- The complaint does not explicitly reserve the right to assert dependent claims for this patent.
U.S. Patent No. 8,694,776 - "Authenticated Memory and Controller Slave"
- Patent Identification: U.S. Patent No. 8,694,776, “Authenticated Memory and Controller Slave,” issued April 8, 2014 (Compl. ¶18).
- Technology Synopsis: The patent describes a memory component that acts as a secure "slave" to a host processor. It is designed to offload tasks from the host, perform operations on sensitive data stored internally, and return only the result of the operation, thereby preventing the host from accessing the underlying sensitive data itself (Compl. ¶¶54-55).
- Asserted Claims: Claim 1 is asserted (Compl. ¶57).
- Accused Features: The accused features are the embedded CPU and supporting hardware within Toshiba's SEDs. This internal system is alleged to function as an "optimized controller component" that receives tasks from a host computer, performs them (e.g., data decryption) using keys and data stored securely on the drive, and returns only the decrypted data to the host without exposing the encryption keys (Compl. ¶¶57a-f).
U.S. Patent No. 9,767,303 - "Authenticated Memory and Controller Slave"
- Patent Identification: U.S. Patent No. 9,767,303, “Authenticated Memory and Controller Slave,” issued September 19, 2017 (Compl. ¶19).
- Technology Synopsis: Continuing the technology of the ’776 patent, this patent discloses a memory system that can authenticate a host device, determine the availability of a requested task, and then execute that task on secure internal data. The system is designed to provide only the result to the host, keeping the secure data and any associated cryptographic material inaccessible to the host system (Compl. ¶¶67-68).
- Asserted Claims: Claim 1 is asserted (Compl. ¶70).
- Accused Features: The accused features are the processor and executable components within Toshiba's SEDs. This internal system is alleged to authenticate a host, determine task availability based on that authentication, and perform the task on secure data (e.g., decryption) before transmitting the result (Compl. ¶¶70a-b).
U.S. Patent No. 7,405,987 - "Low Voltage, High Gain Current/Voltage Sense Amplifier With Improved Read Access Time"
- Patent Identification: U.S. Patent No. 7,405,987, “Low Voltage, High Gain Current/Voltage Sense Amplifier With Improved Read Access Time,” issued July 29, 2008 (Compl. ¶20).
- Technology Synopsis: The patent addresses the challenge of creating fast and accurate sense amplifiers for memory devices, particularly as operating voltages decrease and circuit geometries shrink. The invention is a sense amplifier circuit with distinct sensing and amplifying stages using a specific configuration of transistors to improve amplification, speed, and accuracy (Compl. ¶¶80-81).
- Asserted Claims: Claim 1 is asserted (Compl. ¶83).
- Accused Features: The accused feature is a specific sense amplifier circuit, identified as "COMPARATOR 21," found within Sony Bionz Image Processors that are alleged to be manufactured by Toshiba (Compl. ¶¶82-83).
U.S. Patent No. 7,888,962 - "Impedance Matching Circuit"
- Patent Identification: U.S. Patent No. 7,888,962, “Impedance Matching Circuit,” issued February 15, 2011 (Compl. ¶21).
- Technology Synopsis: The patent is directed to impedance matching circuits, which are critical for maintaining signal integrity in high-speed electronics. The invention uses a reference impedance, a comparator, and pull-up/pull-down arrays with a counter to automatically calibrate and match the circuit's impedance (Compl. ¶91).
- Asserted Claims: Claim 1 is asserted (Compl. ¶93).
- Accused Features: The accused feature is the "ZQ CALIBRATION UNIT" within Sony X-Reality HDTV SoCs, which are alleged to be manufactured by Toshiba (Compl. ¶¶92-93).
III. The Accused Instrumentality
Product Identification
- The complaint identifies two categories of accused products:
- Self-Encrypting Drives: Toshiba Hard Disk Drives (HDDs) with "Wipe Technology" and those supporting TCG Opal / Enterprise Self-Encrypting Drive (SED) standards, including but not limited to the MQ01ABU-BW and MQ01ABU-W series (Compl. ¶¶34, 43).
- System-on-Chip (SoC) Products: Sony Bionz Image Processors (e.g., CXD4132) and Sony X-Reality HDTV SoCs (e.g., CXD4733GB), which are alleged to be manufactured by Toshiba (Compl. ¶¶82, 92).
Functionality and Market Context
- The accused HDDs are self-encrypting drives that provide hardware-based data encryption, cryptographic erase, and secure access control based on industry standards like TCG Opal (Compl. ¶¶35.b, 44.a). These features are marketed for data security. The complaint provides a photograph of an accused Toshiba HDD (Compl. p. 37).
- The accused SoCs are complex integrated circuits used in imaging and video processing applications. The complaint alleges these chips contain specific, low-level circuits for sense amplification and impedance matching that are fundamental to their performance (Compl. ¶¶83, 93).
IV. Analysis of Infringement Allegations
’269 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| a host processor that generates at least one command, the at least one command is at least one of a read, a write, a program, or an erase command | A host system connects to the accused drive via a SATA interface and sends commands compliant with the TCG Storage Architecture Core Specification. | ¶35a | col. 4:1-4 |
| at least one other processor associated with the host processor that receives and analyzes the at least one command, and determines if the at least one command is valid and if the at least one command has access rights to a partition in the memory | The internal processor (Cryptographic Module) of the accused HDD receives and analyzes commands from the host to determine validity and access rights to protected LBA ranges. | ¶35b | col. 4:54-67 |
| the at least one other processor comprises an authentication component that solicits authentication data from an entity and determines access rights to the memory based in part on the authentication data received from the entity | The internal processor performs PIN authentication and implements Toshiba's Wipe2 challenge-response protocol to solicit and verify authentication data to determine access rights. The complaint includes a diagram illustrating this Wipe2 protocol (Compl. p. 15). | ¶35c | col. 4:26-32 |
| the at least one other processor controls access to the memory based in part on a level of authentication associated with the authentication data | The accused HDD controls access based on different roles (e.g., Master, User) defined in its security policy, which correspond to different levels of authentication. | ¶35d | col. 2:8-11 |
Identified Points of Contention
- Scope Questions: A central question may be whether the internal controller of a peripheral HDD qualifies as "at least one other processor associated with the host processor" under the patent's claim language. The analysis could turn on whether "associated with" requires a closer architectural integration than a standard peripheral interface like SATA.
- Technical Questions: The complaint alleges the drive's internal processor determines command validity. A technical question may be what level of "validity" analysis is required by the claim and what level is actually performed by the accused drive beyond simply checking for protocol compliance.
’658 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| the at least one memory that contains a plurality of memory regions to facilitate storage of data | The accused HDDs support TCG Opal specifications, which define and manage multiple Logical Block Address (LBA) ranges that function as the claimed "plurality of memory regions." | ¶44a | col. 4:33-35 |
| an access management component that facilitates control of access to the plurality memory regions ... based in part on a predetermined access criteria | The component on the HDD that implements TCG Opal password-based authentication serves as the access management component, controlling access based on criteria like password authentication. | ¶44b | col. 4:5-23 |
| compares received authentication data and compares the received authentication data to authentication data associated with a memory region... | The "Authenticate" method, as defined in the TCG Storage Architecture Core Specification and implemented by the accused drives, compares a received password ("Proof") with the stored credential for a given authority. | ¶44c.i | col. 4:12-16 |
| facilitates a wipe erase of a memory region when the received authentication data matches the authentication data associated with the memory region | The TCG Opal "Revert" method, when invoked, eradicates the media encryption keys for the user data portion of the drive, which the complaint alleges constitutes a "wipe erase" by rendering the data permanently inaccessible. | ¶44c.ii | col. 2:6-9 |
| facilitates creation of a new security record that contains a default authentication credential | The "Revert" method resets the PIN value for the SID authority to a default vendor-unique value, which the complaint alleges facilitates the creation of a new security record. | ¶44c.iii | col. 4:17-20 |
Identified Points of Contention
- Scope Questions: The primary point of contention may be the definition of "wipe erase." The infringement theory equates cryptographic erasure (destroying an encryption key) with a wipe erase. A court may need to determine if this functional equivalent meets the claim limitation, especially if the patent specification suggests a more direct data-overwriting process.
- Technical Questions: What specific actions constitute the "creation of a new security record"? The complaint alleges that resetting a PIN value to a default fulfills this step, which may raise questions about whether modifying an existing data structure is equivalent to "creation" as required by the claim.
V. Key Claim Terms for Construction
’269 Patent
- The Term: "at least one other processor associated with the host processor"
- Context and Importance: This term defines the core architecture of the invention. The dispute may center on whether a peripheral device's controller, connected via a standard I/O bus like SATA, is "associated with" the host processor in the manner claimed, or if the claim requires a more tightly coupled co-processor architecture.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The abstract states the interface "monitors all bus traffic between a host processor and memory," suggesting any processor that sits on that communication path and performs the claimed functions could be covered ('269 Patent, Abstract).
- Evidence for a Narrower Interpretation: Figure 1 depicts the "security processor" as part of a "memory module," distinct from a generic external peripheral, which could suggest a requirement for closer physical or logical integration than a standard hard drive connection (’269 Patent, Fig. 1).
’658 Patent
- The Term: "wipe erase"
- Context and Importance: Infringement hinges on whether the TCG Opal "Revert" function, which performs cryptographic erasure by destroying encryption keys, constitutes a "wipe erase." Practitioners may focus on this term because cryptographic erasure is functionally equivalent to data destruction but mechanistically different from overwriting data.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The abstract states the invention facilitates "secure removal of information," a functional description that could encompass cryptographic erasure (’658 Patent, Abstract).
- Evidence for a Narrower Interpretation: The detailed description states that a wipe erase can be performed "so that the bits of each memory location are all set to 1s," which describes a specific data overwriting method, not cryptographic erasure (’658 Patent, col. 8:19-22). This provides potential grounds to argue for a narrower definition.
VI. Other Allegations
- Indirect Infringement: For all asserted patents, the complaint alleges induced infringement based on Toshiba providing customers, OEMs, and distributors with user manuals, data sheets, white papers, and other documentation that allegedly instruct on the use of the accused products in an infringing manner (Compl. ¶¶ 36, 47, 60, 73, 85, 95). The complaint also alleges contributory infringement, asserting the accused products are a material part of the inventions and are not staple articles of commerce with substantial noninfringing uses (Compl. ¶¶ 37, 48, 61, 74, 86, 96).
- Willful Infringement: Willfulness is alleged for all six patents. The claims are based on extensive pre-suit knowledge, citing specific dates of letters and in-person meetings where infringement was allegedly detailed to Toshiba. The earliest date of alleged knowledge for the ’269 Patent is April 27, 2017; for the ’658, ’776, and ’303 Patents, December 1, 2020; and for the ’987 and ’962 Patents, September 19, 2019 (Compl. ¶¶ 40, 51, 64, 77, 89, 99).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue for the SED patents will be one of definitional scope and standards mapping: can claim terms such as "wipe erase" and "processor associated with the host processor" be construed to read on the functionality described in public technical standards like TCG Opal, which the accused drives are alleged to implement? The outcome will likely depend on whether the court adopts a functional or a more literal, structural interpretation of the claims.
- A key evidentiary question for the chip patents will be one of technical implementation and supply chain attribution: what is the factual basis for the allegation that Toshiba manufactures the accused Sony-branded SoCs, and does reverse-engineering analysis of those chips confirm that their internal circuitry for sense amplification and impedance matching operates in a manner that practices the specific elements of the asserted claims?
- Across all patents, a central question will be the impact of the alleged pre-suit knowledge on willfulness and potential damages. The complaint details a multi-year history of specific notifications, which, if proven, may significantly influence the characterization of Defendant's conduct and the ultimate financial exposure if infringement is found.
Analysis metadata