DCT

6:23-cv-00704

Alto Dynamics LLC v. Weee Inc

Key Events
Complaint
complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 6:23-cv-00704, W.D. Tex., 10/10/2023
  • Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains established and regular places of business in the district, including in Austin and San Antonio, and has committed acts of infringement there.
  • Core Dispute: Plaintiff alleges that Defendant’s e-commerce website and mobile applications infringe five patents related to methods for monitoring user usage patterns and providing state-less user authentication in client-server systems.
  • Technical Context: The technologies at issue concern foundational methods for tracking user behavior and managing user sessions on websites, which are central to personalizing user experiences and securing access in modern e-commerce.
  • Key Procedural History: Plaintiff alleges it provided Defendant with notice of the asserted patents and its infringement on August 22, 2022, a fact that forms the basis for its willfulness allegations. One of the asserted patents, RE 46,513, is a reissue of U.S. Patent No. 7,020,645. The complaint anticipates a subject matter eligibility challenge under 35 U.S.C. § 101 by repeatedly asserting the claims are not directed to abstract ideas but to specific technical solutions.

Case Timeline

Date Event
2001-04-19 Priority Date for RE 46,513 Patent
2002-12-18 Priority Date for '018 Patent and '160 Patent
2006-01-05 Priority Date for '531 Patent
2006-12-19 Issue Date for U.S. Patent No. 7,152,018
2008-06-24 Issue Date for U.S. Patent No. 7,392,160
2010-01-21 Priority Date for '098 Patent
2010-02-02 Issue Date for U.S. Patent No. 7,657,531
2011-11-01 Issue Date for U.S. Patent No. 8,051,098
2017-08-15 Issue Date for U.S. Patent No. RE 46,513
2022-08-22 Plaintiff allegedly sent notice letter to Defendant
2023-10-10 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 7,392,160 - System And Method For Monitoring Usage Patterns

Issued June 24, 2008.

The Invention Explained

  • Problem Addressed: The complaint alleges that preexisting systems for monitoring user activity were computationally inefficient because they relied on server-side database storage and lookups for user profiles (Compl. ¶23-24).
  • The Patented Solution: The invention describes a method where a "state object" containing a user profile is stored at the "client location." This object is passed to the central server with each user interaction, where it can be audited, and then returned to the client. The profile within the state object is modified at the client location to reflect the interaction, offloading the processing burden from the server ('160 Patent, Abstract; col. 4:3-10).
  • Technical Importance: This client-side approach to profile management was designed to improve computational efficiency and system scalability for high-traffic websites by reducing the need for constant server-side database operations (Compl. ¶23).

Key Claims at a Glance

  • The complaint asserts infringement of at least independent claim 1 (Compl. ¶27).
  • Essential elements of claim 1 include:
    • providing at least one state object, the object including a profile representative of user usage;
    • storing the state object at a client location;
    • passing, to a central server, the state object with each subsequent interaction initiation;
    • receiving, from the central server, the state object along with the response of the central server;
    • wherein the profile is modified to reflect the interaction between the client location and the central server; and
    • wherein the central server audits the state object/profile passed to it, and performs analysis on the audited profile.
  • The complaint alleges infringement of one or more claims, reserving the right to assert others, including dependent claims (Compl. ¶26).

U.S. Patent No. 8,051,098 - Systems And Methods For State-Less Authentication

Issued November 1, 2011.

The Invention Explained

  • Problem Addressed: The patent describes problems with conventional "state-full" authentication systems that require complex, resource-intensive sessions and often cannot support flexible business rules, such as enabling user roles only at specific points in a transaction (Compl. ¶41; '098 Patent, col. 4:60-65). Such systems also increase processing time by relying on unencrypted or unhashed records for online inquiry (Compl. ¶42).
  • The Patented Solution: The invention proposes a "state-less" authentication method centered on creating an "encrypted data element called a security context" ('098 Patent, col. 5:22-26). After an initial logon, this portable security context is generated and employed by the user's device to access multiple, potentially disparate resources without requiring "follow-on authorization communications between the accessed resource and the logon component" (Compl. ¶44).
  • Technical Importance: This architecture provides a more efficient and secure single-sign-on (SSO) framework for distributed computing environments, reducing the authentication burden on both the user and the system's central resources (Compl. ¶43).

Key Claims at a Glance

  • The complaint asserts infringement of at least independent claim 1 (Compl. ¶48).
  • Essential elements of claim 1 include:
    • establishing a secure communication session between a user computing device and a logon component, wherein the session is temporary and is set up and then torn down;
    • verifying logon information provided by the user; and
    • responsively generating a security context that is unique to the user and necessary to access a plurality of resources without requiring follow-on authorization communications.
  • The complaint reserves the right to assert other claims (Compl. ¶47).

U.S. Patent No. RE 46,513 - Systems And Methods For State-Less Authentication

Issued August 15, 2017.

Technology Synopsis

As a related patent to the '098 patent, this reissue patent also targets the problems of state-full authentication (Compl. ¶58-59). It describes a method of enabling access to resources by generating a "security context" from logon and authorization information. This context, comprising a plaintext header and an encrypted body, is provided to the user and sent back with access requests, eliminating the need for constant re-authentication (Compl. ¶60-61).

Asserted Claims

At least independent claim 16 is asserted (Compl. ¶65).

Accused Features

The complaint alleges that the Accused Products' use of "secure communication sessions" infringes, specifically pointing to the system architecture comprising a communication device, an information database, and a logon component that generates and provides a security context to the user (Compl. ¶64, ¶66).

U.S. Patent No. 7,657,531 - Systems And Methods For State-Less Authentication

Issued February 2, 2010.

Technology Synopsis

This patent addresses state-less authentication with a focus on renewing or updating access credentials. It describes a method where a user possessing a "valid security-context" provides it to a server, which then verifies the context (e.g., against an expiration time) and, if valid, generates and provides an "updated security-context" to the user for subsequent access requests (Compl. ¶82).

Asserted Claims

At least independent claim 1 is asserted (Compl. ¶86).

Accused Features

The complaint alleges that the "renewal of cookies after their expiration by the Accused Products" infringes the patent (Compl. ¶85). The infringement theory relies on the process of receiving an existing security context (cookie), verifying its validity, and generating an updated one for the user (Compl. ¶87).

U.S. Patent No. 7,152,018 - System And Method For Monitoring Usage Patterns

Issued December 19, 2006.

Technology Synopsis

As the parent of the '160 patent, this invention also addresses the inefficiency of server-side user tracking (Compl. ¶98). A key aspect highlighted in the complaint is that the user profile, stored in a state object on the client machine, is modified by "one or more scripts" provided by the server but executed at the client location, thereby "precluding manipulation of the profile by the server" (Compl. ¶96).

Asserted Claims

At least independent claim 1 is asserted (Compl. ¶102).

Accused Features

The complaint alleges infringement through the "use of cookies, e.g., through the 'Secure Flag' functionality" (Compl. ¶101). The infringement theory mirrors that of the '160 patent, focusing on a client-stored state object whose profile is modified by client-executed scripts based on user interactions (Compl. ¶103).

III. The Accused Instrumentality

Product Identification

  • Defendant’s website, www.sayweee.com, and its associated mobile applications, hardware, and software (collectively, the "Accused Products") (Compl. ¶14-15).

Functionality and Market Context

  • The Accused Products constitute an online shopping platform that allows users to browse and purchase goods (Compl. ¶14). The complaint alleges several technical functionalities are relevant to the infringement claims: tracking user activities and preferences using cookies; providing user authentication via login processes and secured sessions; employing a single login to access multiple domains; and renewing cookies after their expiration (Compl. ¶14, ¶47, ¶85). The complaint alleges that Defendant derives substantial revenue from goods and services provided to individuals in Texas via this platform (Compl. ¶9).

No probative visual evidence provided in complaint.

IV. Analysis of Infringement Allegations

U.S. Patent No. 7,392,160 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
[a] method of monitoring user usage patterns of a system, comprising the steps providing at least one state object, the object including a profile representative of user usage The Accused Products deploy cookies, which allegedly function as the claimed "state object" containing a user profile. ¶28 col. 2:30-33
storing the state object at a client location The user's browser stores the cookie on the user's client device. ¶28 col. 2:34
passing, to a central server, the state object with each subsequent interaction initiation The user's browser sends the cookie to Defendant's server with each new page request or interaction. ¶28 col. 2:34-36
receiving, from the central server, the state object along with the response of the central server The browser receives the cookie back from the server along with the requested web content. ¶28 col. 2:37-39
wherein the profile is modified to reflect the interaction between the client location and the central server The profile within the cookie is allegedly modified to reflect the user's browsing activity. ¶28 col. 2:39-42
and wherein the central server audits the state object/profile passed to it, and performs analysis on the audited profile in order to direct services and/or information suited to the profile to the client location Defendant's server allegedly analyzes the cookie data to personalize the user's experience. ¶28 col. 4:3-6
  • Identified Points of Contention:
    • Scope Questions: A central question will be whether a standard web "cookie" and its typical lifecycle meet the specific definition of a "state object" that is "modified to reflect the interaction" and subsequently "audited" by the server as recited in the claim.
    • Technical Questions: The complaint's allegations are conclusory regarding the "audit" and "analysis" steps (Compl. ¶28). A key factual dispute may be whether the Accused Products' use of analytics or personalization cookies performs the specific auditing and analysis functions required by the claim, or if it constitutes a more generic form of data collection that falls outside the claim's scope.

U.S. Patent No. 8,051,098 Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
establishing a secure communication session between a user computing device and a logon component, wherein the secure communication session comprises a temporary, interactive information exchange that is set up and then torn down The Accused Products establish a temporary and interactive secure login session (e.g., HTTPS) with the user's device. ¶49 col. 1:40-45
verifying logon information provided by the user computing device to the logon component using the secure communication session The Accused Products verify the user's login credentials during this session. ¶49 col. 1:45-50
and responsively generating a security context to be employed by the user computing device that is: unique to a user...; necessary to access any of the plurality of resources without requiring any follow-on authorization communications between the accessed resource and the logon component After a successful login, the Accused Products allegedly generate a unique session token or cookie that functions as the "security context," allowing the user to access different parts of the website without re-authenticating with the central logon component. ¶49 col. 10:4-13
  • Identified Points of Contention:
    • Scope Questions: A primary issue for the court will be whether the phrase "plurailty of resources wherein at least some of the resources do not share a common processing platform" can be construed to cover different pages or sections of a single, integrated e-commerce website. The infringement case may depend on the specific back-end architecture of Defendant's systems.
    • Technical Questions: Does the session token or cookie used by the Accused Products function as the claimed "security context" by making access possible "without requiring any follow-on authorization communications between the accessed resource and the logon component"? The analysis will require determining if the system is truly "state-less" from the perspective of the accessed resources, or if it relies on a more conventional state-full session management architecture.

V. Key Claim Terms for Construction

  • Patent: U.S. Patent No. 7,392,160

    • The Term: "profile is modified to reflect the interaction"
    • Context and Importance: This term is critical because it defines the active, dynamic nature of the client-side "state object." Practitioners may focus on this term to distinguish the claimed invention from the passive storage of static identifiers in a conventional cookie. The dispute will center on whether standard tracking cookies used for web analytics perform this specific modification function.
    • Intrinsic Evidence for a Broader Interpretation: The patent abstract states the profile is modified "to reflect the interaction between client location and central server," language which could be argued to broadly cover any change in cookie data based on a user's clickstream ('160 Patent, Abstract).
    • Intrinsic Evidence for a Narrower Interpretation: The specification of the related '018 Patent explains that through client-side scripts, "it is possible to update and manipulate the contents of the cookie profile without requiring any server side manipulation" ('018 Patent, col. 6:18-21). This could support an interpretation requiring active, client-executed logic for the modification, not just a server setting a new cookie value.
  • Patent: U.S. Patent No. 8,051,098

    • The Term: "security context"
    • Context and Importance: This term is the central element of the asserted state-less authentication method. The viability of the infringement claim depends on whether the session token used by Defendant qualifies as this specific claimed entity.
    • Intrinsic Evidence for a Broader Interpretation: A plaintiff could argue the term broadly encompasses any unique, user-specific data object generated after logon that enables continued access to system resources.
    • Intrinsic Evidence for a Narrower Interpretation: The specification describes the "security context" as a specific "encrypted data element" that is "securely built and accessible only by a trusted computing environment, thereby eliminating the risk of interception, modification, or unauthorized use" ('098 Patent, col. 5:22-26). This language may support a narrower construction that requires a specific structure and security level beyond that of a standard session cookie.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges both induced and contributory infringement for all asserted patents. Inducement is based on allegations that Defendant provides instructions and encourages its customers and employees to use the Accused Products in an infringing manner (e.g., Compl. ¶29, ¶67). Contributory infringement is based on allegations that the Accused Products have special features with no substantial non-infringing uses (e.g., Compl. ¶30, ¶68).
  • Willful Infringement: The complaint alleges willful infringement based on Defendant's alleged knowledge of the patents since at least August 22, 2022, the date of a purported notice letter (Compl. ¶31). The allegations are further supported by a claim that Defendant maintains a policy of "willfully blind[ing]" itself to the patent rights of others (Compl. ¶32). While willfulness is alleged for all five patents, the prayer for relief specifically requests enhanced damages only for the '160, '513, and '018 patents (Compl. ¶112.c).

VII. Analyst’s Conclusion: Key Questions for the Case

  • A core issue will be one of technical implementation: Do the functionalities of the standard e-commerce cookies and session management tokens used by the Accused Products perform the specific, multi-step processes recited in the asserted claims—such as client-side profile modification ('160 patent) and the generation of a portable, state-less "security context" for accessing disparate resources ('098 patent)—or is there a material operational mismatch?
  • A second key question will concern claim scope and subject matter eligibility: Can the term "plurality of resources" that do not share a "common processing platform" be construed to read on a user navigating different sections of a single e-commerce website? Furthermore, the litigation will likely involve a significant dispute over whether the claims are directed to patent-eligible technical solutions that improve computer functionality, as Plaintiff argues, or are merely abstract ideas of tracking and authenticating users implemented on generic computer components.
  • A final dispositive question will be evidentiary: What evidence can Plaintiff provide to show that the Accused Products' backend systems function in the specific manner required by the claims, particularly regarding the "state-less" nature of the authentication system and the server-side "auditing" of client-side profiles, allegations for which the complaint offers only conclusory support?