6:23-cv-00740
Texas Secure Authentication LLC v. Eagle Eye Network Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Texas Secure Authentication, LLC (Texas)
- Defendant: Eagle Eye Networks, Inc. (Texas)
- Plaintiff’s Counsel: The Mort Law Firm, PLLC; Banie & Ishimoto LLP
- Case Identification: 6:23-cv-00740, W.D. Tex., 10/31/2023
- Venue Allegations: Venue is alleged to be proper in the Western District of Texas because the Defendant is registered with the Texas Secretary of State, maintains regular and established places of business in the district, and has allegedly committed acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant’s website authentication services infringe a patent related to methods for managing and interacting with dynamic information "containers" on a computer network.
- Technical Context: The technology concerns systems for creating data objects with evolving attributes that govern their interaction and behavior on a network, representing an early approach to dynamic data management.
- Key Procedural History: The patent-in-suit expired in February 2019. Consequently, any potential monetary damages are limited to infringing acts that occurred prior to this expiration date.
Case Timeline
| Date | Event |
|---|---|
| 1998-01-30 | U.S. Patent No. 7,873,682 Priority Date |
| 2011-01-18 | U.S. Patent No. 7873682 Issue Date |
| 2019-02-25 | U.S. Patent No. 7,873,682 Expiration Date |
| 2023-10-31 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,873,682 - System and method for creating and manipulating information containers with dynamic registers
The Invention Explained
- Problem Addressed: The patent’s background section describes a problem from the late 1990s where information on computer networks was largely static and "inert" ('682 Patent, col. 2:1-5). Content did not evolve based on user interaction or network history, and search methods were limited without historical context to guide them ('682 Patent, col. 2:30-43).
- The Patented Solution: The invention proposes a system of "information containers" which are logical data enclosures that hold content ('682 Patent, col. 9:3-7). Each container has associated "dynamic registers" which are attributes that govern how the container interacts with other containers and system components ('682 Patent, col. 3:42-47). These interactions are mediated by "gateways," which record the history of these interactions, allowing a container to "evolve its own identity on the system" and enabling "dynamic governance of information" ('682 Patent, col. 12:49-54).
- Technical Importance: The technology represents an approach to making data on a network more intelligent and responsive, moving beyond a model of static content to one where data objects can change their behavior based on their usage and interaction history (Compl. ¶14, ¶16).
Key Claims at a Glance
- The complaint asserts independent claim 1 and dependent claims 6 and 7 ('682 Patent, col. 29:51-30:34).
- Independent Claim 1 recites a method with the following essential elements:
- Determining identification information for a first container using a first gateway;
- Determining identification information for a second container using a second gateway;
- Determining if an interaction can occur between the first and second containers using the first gateway and a first register of the first container;
- Determining if an interaction can occur between the first and second containers using the second gateway and a second register of the second container;
- Performing the prescribed interaction if it can occur, wherein the gateways collect and store register information, including container interaction information.
- The complaint reserves the right to assert additional claims (Compl. ¶30).
III. The Accused Instrumentality
Product Identification
The accused instrumentality is the "Eagle Eye Website," located at "https://login.eagleeyenetworks.com", and specifically its "multi-factor authentication methods" and related systems (Compl. ¶27).
Functionality and Market Context
The complaint alleges that the accused website provides services for "securely authenticating its users" (Compl. ¶24). It further alleges that the website functionality employs "unconventional software structures" that practice the claimed methods, such as the use of "cookies" placed on a user's computer (Compl. ¶14, ¶31). The complaint asserts that Eagle Eye has derived significant revenue from customers utilizing these services (Compl. ¶3).
IV. Analysis of Infringement Allegations
The complaint references a claim chart in an "Exhibit B" that was not attached to the filed document; therefore, a detailed claim chart analysis is not possible (Compl. ¶30). The infringement theory articulated in the complaint is that Eagle Eye's multi-factor authentication system practices the patented method. This theory appears to map the elements of an authentication session to the claimed architecture. For instance, a user's login attempt may be characterized as a "first container" interacting with the system's authentication credentials, a "second container." This interaction is allegedly governed by rules ("registers") and mediated by system checkpoints ("gateways") (Compl. ¶19). The complaint suggests that system actions, such as updating a database to prevent the re-use of a one-time passcode or adding a register to a container, correspond to the claimed steps of modifying a gateway or adding a new register (Compl. ¶21-22).
The complaint includes a flowchart from the patent, Figure 5, to illustrate how a register may be added and modified to a container to achieve dynamic modification of information (Compl. ¶21, p. 7).
Identified Points of Contention
- Scope Questions: A central dispute may be whether the abstract architectural terms from the patent—drafted in the late 1990s—can be construed to read on the components of a modern web authentication system. For example, does a user's browser session qualify as a "container," does a session "cookie" function as a "dynamic register," and does a server-side API endpoint meet the definition of a "gateway" as described in the '682 Patent?
- Technical Questions: The complaint alleges that the accused system's functions correspond to the claimed steps, but it will be a matter of proof whether the technical operation is the same. For example, what evidence demonstrates that a standard web "cookie" performs the evolving, interactive function of a "dynamic register" as required by the patent, which is described as having its internal values "evolve through interaction with other containers" ('682 Patent, col. 13:12-14)?
V. Key Claim Terms for Construction
"container"
- Context and Importance: This term is foundational to all asserted claims. Its scope will determine whether an abstract entity like a user authentication session or a user account can be considered an infringing structure.
- Intrinsic Evidence for a Broader Interpretation: The specification defines a container broadly as a "logically defined data enclosure" that can encapsulate any "digital segment" or "system component or process" ('682 Patent, col. 9:4-8).
- Intrinsic Evidence for a Narrower Interpretation: The patent’s specific examples often tie containers to more concrete data hierarchies, such as "element, document, database, warehouse, domain," which could suggest a more structured data object than a transient web session ('682 Patent, col. 11:20-26; Fig. 3A).
"register"
- Context and Importance: The patent's alleged novelty rests on "dynamic registers." The definition of this term is critical to distinguishing the invention from conventional data attributes, such as those in a cookie. Practitioners may focus on this term because the complaint contrasts these "unconventional software structures" with prior art hardware (Compl. ¶14).
- Intrinsic Evidence for a Broader Interpretation: The patent describes registers as "interactive dynamic values appended to the logical enclosure of an information container" that "govern the interaction of that container" ('682 Patent, col. 9:20-24).
- Intrinsic Evidence for a Narrower Interpretation: The specification details numerous specific and complex register types (e.g., "triple time register," "domain of influence register," "proportionate ownership register"), suggesting a structure with more defined functionality and evolutionary behavior than a simple key-value pair ('682 Patent, col. 13:56-14:49).
"gateway"
- Context and Importance: Gateways are the mechanisms that allegedly enable the "dynamic governance" at the heart of the invention. Whether a server API or other system checkpoint meets the functional requirements of a "gateway" will be a key point of dispute.
- Intrinsic Evidence for a Broader Interpretation: A gateway is described as a "logically defined gateway" that can reside on a container or independently in the system ('682 Patent, col. 9:29-31).
- Intrinsic Evidence for a Narrower Interpretation: The patent assigns specific and active roles to gateways, such as gathering and storing register information, recording the history of nested containers, and "act[ing] as an agent of an analysis engine and execution engine," which may imply more complex functionality than a passive data-transfer point ('682 Patent, col. 5:1-17).
VI. Other Allegations
Indirect Infringement
The complaint does not plead separate counts for indirect infringement or allege specific facts supporting inducement or contributory infringement, such as instructing third parties to perform infringing acts. The allegations are centered on Defendant’s own direct infringement (Compl. ¶27).
Willful Infringement
The complaint does not explicitly use the word "willful," but it requests "enhanced and/or exemplary damages" in the prayer for relief (Compl. p. 10, ¶B). No facts are alleged to support pre-suit knowledge of the patent. Any claim for enhanced damages may therefore rely on alleged infringement continuing after the Defendant gained knowledge of the patent from the filing of this lawsuit.
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of technical mapping and definitional scope: Can the patent’s 1998-vintage vocabulary of "container", "dynamic register", and "gateway" be construed to cover the architecture and components of a modern, web-based multi-factor authentication system? The outcome may depend on whether these terms are interpreted as broad, functional placeholders or as requiring the more specific, complex structures detailed in the patent’s specification.
- Another key question will be one of evidentiary proof: Assuming a favorable claim construction, what specific evidence will Plaintiff present to demonstrate that the accused authentication system performs the precise, multi-step "determining" and "performing" methods recited in claim 1, and the "adding" and "modifying" steps of the asserted dependent claims?
- A foundational question for the court may concern patent eligibility: Given the abstract nature of the asserted claims—which recite methods for determining, managing, and interacting with information—the case may raise the question of whether the claims are directed to an abstract idea, and if so, whether they contain a sufficient inventive concept to be patent-eligible under 35 U.S.C. § 101.