6:23-cv-00376
Speech Transcription LLC v. Cisco Systems Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Speech Transcription, LLC (Wyoming)
- Defendant: Cisco Systems, Inc. (Delaware)
- Plaintiff’s Counsel: Garteiser Honea, PLLC
- Case Identification: 6:23-cv-00376, W.D. Tex., 05/16/2023
- Venue Allegations: Venue is based on Defendant maintaining a regular and established business presence, including a physical office, within the Western District of Texas.
- Core Dispute: Plaintiff alleges that Defendant’s Cisco SAFE security architecture infringes a patent related to unified management systems for endpoint computer security.
- Technical Context: The technology addresses the complexity and performance issues of managing multiple, distinct security products on endpoint devices by proposing a centralized, hardware-isolated subsystem.
- Key Procedural History: The complaint notes that during the patent's prosecution, the U.S. Patent and Trademark Office considered U.S. Patent 7,058,796 as the most relevant prior art reference.
Case Timeline
| Date | Event |
|---|---|
| 2004-09-14 | ’799 Patent Priority Date |
| 2015-01-20 | '799 Patent Issue Date |
| 2023-05-16 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,938,799 - "Security protection apparatus and method for endpoint computing systems"
- Patent Identification: U.S. Patent No. 8,938,799, "Security protection apparatus and method for endpoint computing systems", issued January 20, 2015.
The Invention Explained
- Problem Addressed: The patent describes the state of enterprise network security as overly complex and costly. Deploying multiple security software modules from different vendors directly onto a host computer can lead to software conflicts, performance degradation, security vulnerabilities, and high total-cost-of-ownership (Compl. ¶15; ’799 Patent, col. 3:49-67).
- The Patented Solution: The invention proposes a "unified security management system" centered on a "Security Utility Blade" (SUB), a dedicated hardware and software subsystem that resides between the network and the host computer (’799 Patent, Abstract; ’799 Patent, col. 5:21-26). This SUB is designed to function as an "open platform" that can host and execute security software modules from various vendors, thereby isolating security functions from the host’s primary operating system and simplifying management (’799 Patent, col. 6:51-54; ’799 Patent, Fig. 1B).
- Technical Importance: This architectural approach sought to decouple security operations from the host environment, aiming to create a more stable, secure, and easily managed endpoint by centralizing multi-vendor security functions in a single, hardened subsystem (’799 Patent, col. 4:1-3).
Key Claims at a Glance
- The complaint asserts independent Claim 14 and reserves the right to assert other claims (Compl. ¶31).
- The essential elements of Claim 14 are:
- A security subsystem configurable between a network and a host of an endpoint,
- the security subsystem comprising computing resources for providing:
- an open platform for receiving and executing security function software modules
- from multiple vendors
- for providing defense functions for protection of the host.
III. The Accused Instrumentality
Product Identification
- The "Cisco SAFE architecture" (Compl. ¶27).
Functionality and Market Context
- The complaint alleges that the Cisco SAFE architecture is used for "threat detection and mitigation" on a variety of network endpoints, including servers, computers, and IP phones (Compl. ¶27). Its function is described as having an "agent" that "checks the operation against the security policy for threats" whenever data is processed between the network and a host endpoint (Compl. ¶27). To support its venue allegations, the plaintiff provides a visual of the defendant's alleged physical presence in the district. Figure 1 from the complaint is a screenshot from Google Maps showing the location and address of a Cisco Systems office in Austin, Texas (Compl. p. 3, Fig. 1). The complaint does not provide further detail for analysis of the product's market context.
IV. Analysis of Infringement Allegations
The complaint references a claim chart in an "Exhibit B" that was not attached to the publicly filed document. The infringement theory must therefore be inferred from the complaint's narrative allegations.
'799 Patent Infringement Allegations
| Claim Element (from Independent Claim 14) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| A security subsystem configurable between a network and a host of an endpoint | The complaint alleges that an "agent of Cisco SAFE" operates when information is processed "between the network and host of an endpoint." | ¶27 | col. 20:47-48 |
| an open platform for receiving and executing security function software modules | The complaint alleges that the accused instrumentalities "practice the technology claimed by the '799 Patent" and "satisfy all elements of at least claim 14," but does not provide specific facts describing how the Cisco SAFE architecture functions as an "open platform." | ¶36 | col. 20:49-51 |
| from multiple vendors | The complaint makes a conclusory allegation that this element is satisfied but does not provide specific facts identifying any third-party vendor modules that are received or executed by the Cisco SAFE architecture. | ¶36 | col. 20:52 |
| for providing defense functions for protection of the host. | The Cisco SAFE architecture is alleged to be "used for threat detection and mitigation" and "checks the operation against the security policy for threats," which corresponds to the claimed "defense functions." | ¶27 | col. 20:52-53 |
- Identified Points of Contention:
- Scope Questions: A central dispute may arise over the meaning of "open platform." The infringement analysis will question whether a proprietary system like the Cisco SAFE architecture can be considered "open" within the meaning of the patent.
- Technical Questions: The complaint alleges the Cisco SAFE architecture receives and executes modules "from multiple vendors" but provides no supporting factual detail. A key question will be what evidence, if any, demonstrates that the accused architecture integrates and runs third-party security modules as required by the claim.
V. Key Claim Terms for Construction
The Term: "open platform"
Context and Importance: This term is critical to the infringement analysis. Defendant will likely argue that its proprietary Cisco SAFE architecture is, by definition, not an "open platform." The viability of the plaintiff's case may depend on securing a construction of this term that is broad enough to read on a closed, vendor-specific ecosystem.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification describes the platform as enabling the use of modules "from any participating vendors" (’799 Patent, col. 6:52-54), which a plaintiff might argue does not require adherence to public standards, but merely the technical capability to incorporate software from more than one source.
- Evidence for a Narrower Interpretation: The patent’s objective is to solve the problem of vendor lock-in and heterogeneous management systems (’799 Patent, col. 3:62-67). A defendant could argue this context implies "open" means non-proprietary and standardized, in contrast to the siloed systems the patent seeks to improve.
The Term: "security subsystem"
Context and Importance: Practitioners may focus on this term because the patent specification repeatedly describes the invention as a distinct hardware component (a "Security Utility Blade" or "SUB") that is isolated from the host and runs its own operating system (’799 Patent, col. 7:7-10; Fig. 2A). The infringement case may turn on whether the accused "agent of Cisco SAFE" (Compl. ¶27) is architecturally equivalent to this described hardware-based subsystem or is merely a software program running on the host's OS.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The claim language itself requires "computing resources" (’799 Patent, col. 20:49), which could be argued to encompass a purely software-based agent without a specific hardware component.
- Evidence for a Narrower Interpretation: The specification provides numerous embodiments that are hardware-based, such as a "chip or chipset form" or a plug-in card (’799 Patent, Fig. 2B-2D; col. 9:15-18). A defendant would likely argue that the term "security subsystem" should be limited by these detailed descriptions of a physically distinct and isolated unit.
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement of infringement based on Defendant's distribution of "product literature and website materials" that allegedly instruct end users to use the accused products in a manner that infringes the ’799 Patent (Compl. ¶34).
- Willful Infringement: The complaint bases its willfulness allegation on post-suit knowledge, asserting that Defendant has "actively, knowingly, and intentionally continued to induce infringement" at least since being served with the complaint and its associated claim chart (Compl. ¶35).
VII. Analyst’s Conclusion: Key Questions for the Case
- Definitional Scope: A core issue will be whether the term "open platform," described in the patent as a solution to proprietary vendor silos, can be construed to cover the accused Cisco SAFE architecture, which itself appears to be a proprietary, vendor-controlled system.
- Architectural Equivalence: A key evidentiary question will be one of architectural equivalence: does the accused "agent of Cisco SAFE" constitute a "security subsystem" as heavily detailed in the patent—an isolated hardware/software unit running a separate OS—or is it a conventional software agent that lacks the fundamental structural separation from the host that appears central to the patented invention?
- Factual Support: The infringement claim hinges on the allegation that the accused platform executes security modules "from multiple vendors." The success of the case will likely depend on whether the plaintiff can produce evidence to substantiate this claim element, for which the complaint currently provides no specific factual support.