6:24-cv-00302
Proxense LLC v. LG Electronics Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Proxense, LLC (Delaware)
- Defendant: LG Electronics, Inc. (Republic of Korea) and LG Electronics U.S.A., Inc. (Delaware)
- Plaintiff’s Counsel: Hecht Partners LLP
- Case Identification: 6:24-cv-00302, W.D. Tex., 05/31/2024
- Venue Allegations: Plaintiff alleges venue is proper because Defendant LG Electronics, Inc. is not a U.S. resident and may be sued in any judicial district, and that both defendants have committed acts of infringement and conduct business in the Western District of Texas.
- Core Dispute: Plaintiff alleges that Defendant’s mobile payment services, automotive digital key systems, and Wi-Fi enabled consumer electronics infringe seven patents related to biometric authentication, secure access control, and wireless power management.
- Technical Context: The technologies at issue relate to methods for securing access to data and services by using a portable device, such as a smartphone, to biometrically verify a user before wirelessly transmitting a secure token to authorize a transaction or grant access.
- Key Procedural History: The complaint alleges that Plaintiff provided Defendant with actual notice of its patent portfolio, including the ’905 Patent, via a letter dated August 10, 2016. Notably, post-issuance proceedings have affected at least two of the patents-in-suit. U.S. Patent No. 9,298,905 was subject to an inter partes review (IPR2024-00234) resulting in the disclaimer of all asserted claims. U.S. Patent No. 10,698,989 was subject to an ex parte reexamination (No. 90/015,054) resulting in the cancellation of all asserted claims. The enforceability of the claims asserted from these two patents may therefore be a central issue.
Case Timeline
| Date | Event |
|---|---|
| 2004-12-20 | Priority Date (’730, ’905, ’989 Patents) |
| 2006-01-06 | Priority Date (’152 Patent) |
| 2007-12-19 | Priority Date (’332, ’456, ’979 Patents) |
| 2011-10-11 | U.S. Patent No. 8,036,152 Issues |
| 2013-01-08 | U.S. Patent No. 8,352,730 Issues |
| 2015-01-01 | LG's V10 Smartphone with fingerprint scanner introduced |
| 2016-02-02 | U.S. Patent No. 9,251,332 Issues |
| 2016-03-29 | U.S. Patent No. 9,298,905 Issues |
| 2016-08-10 | Plaintiff sends notice letter to Defendant regarding patent portfolio |
| 2017-01-01 | LG Pay service launched |
| 2017-07-01 | Start date for release of certain Accused Products |
| 2019-11-05 | U.S. Patent No. 10,469,456 Issues |
| 2020-06-30 | U.S. Patent No. 10,698,989 Issues |
| 2021-08-10 | U.S. Patent No. 11,086,979 Issues |
| 2024-05-31 | Complaint Filed |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,352,730 - “Biometric Personal Data Key (PDK) Authentication,” Issued January 8, 2013
The Invention Explained
- Problem Addressed: The patent family addresses the shortcomings of conventional user authentication, which relies on either credentials that must be memorized (e.g., passwords, PINs) or physical access objects (e.g., keys), both of which can be forgotten, lost, or stolen (’989 Patent, col. 1:40-52).
- The Patented Solution: The invention proposes a method and an "integrated device" that securely stores a user's biometric data (e.g., a fingerprint) in a "tamper proof format." To authenticate, the user provides a fresh biometric scan, which the device compares to the stored data. If they match, the device wirelessly transmits a unique device ID code to an "agent" (a trusted third party) for authentication, which can then grant access to an application or complete a transaction (Compl. ¶¶ 24, 108, 112-114; ’905 Patent, col. 2:1-12).
- Technical Importance: This approach integrates biometric security directly into a portable, wireless token, aiming to provide a more secure and convenient alternative to passwords for mobile payments and other secure transactions (Compl. ¶¶ 33-34, 38).
Key Claims at a Glance
- The complaint asserts independent method claim 1 and independent device claim 8 (Compl. ¶107).
- Essential elements of independent claim 1 include:
- Persistently storing biometric user data and a plurality of codes (including a device ID and a secret decryption value) in a tamper-proof format on an integrated device.
- Receiving scan data from a biometric scan.
- Comparing the scan data to the stored biometric data.
- If there is a match, wirelessly sending one or more codes to an agent for authentication.
- Receiving an access message from the agent to allow access to an application.
- The complaint reserves the right to assert other claims, including dependent claims (Compl. ¶106).
U.S. Patent No. 9,298,905 - “Biometric Personal Data Key (PDK) Authentication,” Issued March 29, 2016
The Invention Explained
- Problem Addressed: As a continuation of the application leading to the ’730 Patent, the ’905 Patent addresses the same problems of traditional authentication methods (’905 Patent, col. 1:40-52).
- The Patented Solution: The ’905 Patent describes a similar system where an integrated device persistently stores biometric data and a device-specific ID code. Upon successful biometric verification (matching scan data to stored data), the device wirelessly transmits the ID code to a third-party trusted authority, which authenticates the code and, in response, allows the user to complete a financial transaction (Compl. ¶¶ 24, 124, 129-131).
- Technical Importance: The technology continues the integration of biometric verification with wireless token-based authentication for secure transactions (Compl. ¶¶ 33-34, 38).
Key Claims at a Glance
- The complaint asserts independent method claim 1 and independent system claim 9 (Compl. ¶123).
- Essential elements of independent claim 1 include:
- Persistently storing biometric user data and a device-specific ID code on an integrated device.
- Receiving a request for biometric verification.
- Receiving scan data from a biometric sensor in response to the request.
- Comparing the scan data to the biometric data.
- If there is a match, wirelessly transmitting the ID code to a third-party trusted authority.
- Receiving an access message from the authority confirming authentication and allowing completion of a financial transaction.
- The complaint reserves the right to assert other claims, including dependent claims (Compl. ¶122).
U.S. Patent No. 10,698,989 - “Biometric personal data key (PDK) authentication,” Issued June 30, 2020
Technology Synopsis
As part of the same family as the ’730 and ’905 patents, this patent covers systems and methods for verifying a user during the authentication of an integrated device that stores biometric data and a unique ID code (’989 Patent, Abstract; Compl. ¶25). After biometric verification, the device wirelessly sends the ID code to a third-party authority to complete a transaction.
Asserted Claims
Claims 1-6 are asserted (Compl. ¶139).
Accused Features
The complaint accuses LG Pay and devices running LG Pay (Compl. ¶139).
U.S. Patent No. 9,251,332 - “Security System and Method for Controlling Access to Computing Resources,” Issued February 2, 2016
Technology Synopsis
This patent describes a security system that controls access to computing resources (e.g., a vehicle's functions) by requiring the presence of a personal digital key (PDK), such as a smartphone (’456 Patent, col. 2:13-18; Compl. ¶26). The system detects the PDK wirelessly and grants access based on security data stored on the key.
Asserted Claims
Claim 12 is asserted (Compl. ¶157).
Accused Features
The complaint accuses LG's "Accused Digital Key System" used for vehicle access (Compl. ¶157). The complaint includes a table from LG illustrating advances in this technology (Compl. p. 25).
U.S. Patent No. 10,469,456 - “Security System and Method for Controlling Access to Computing Resources,” Issued November 5, 2019
Technology Synopsis
A continuation in the ’332 patent family, this patent also relates to a security system that grants access to computing resources only when a corresponding personal digital key (PDK) is detected in proximity (’456 Patent, Abstract; Compl. ¶26).
Asserted Claims
Claim 11 is asserted (Compl. ¶169).
Accused Features
The complaint accuses LG's "Accused Digital Key System" (Compl. ¶169). A diagram in the complaint shows how the Digital Key system works across different specification releases (Compl. p. 26).
U.S. Patent No. 11,086,979 - “Security System and Method for Controlling Access to Computing Resources,” Issued August 10, 2021
Technology Synopsis
Continuing the same patent family, this patent also describes a system for controlling access to a "protected item" by detecting a digital key, retrieving corresponding security data, and automatically performing actions based on that data (’979 Patent, Abstract; Compl. ¶26).
Asserted Claims
Claim 12 is asserted (Compl. ¶180).
Accused Features
The complaint accuses LG's "Accused Digital Key System" (Compl. ¶180).
U.S. Patent No. 8,036,152 - “Integrated Power Management of a Client Device Via System Time Slot Assignment,” Issued October 11, 2011
Technology Synopsis
This patent describes methods for power management in a wireless client device by assigning specific time slots for communication (’152 Patent, Abstract). The device enters a low-power sleep mode and wakes only during its assigned time slot to transmit or receive data, conserving battery life. The complaint includes a timing diagram illustrating the operation of Target Wake Time (TWT), the accused feature (Compl. p. 30).
Asserted Claims
Claims 1 and 7 are asserted (Compl. ¶190).
Accused Features
The complaint accuses LG's WiFi products (televisions, laptops) that are compatible with Wi-Fi 6 and later standards incorporating TWT functionality (Compl. ¶¶ 97, 102, 191).
III. The Accused Instrumentality
Product Identification
The complaint identifies three categories of accused instrumentalities: (1) the LG Pay mobile payment service and devices running it; (2) LG's "Accused Digital Key System" for vehicles; and (3) LG's "Accused WiFi Products," including televisions and laptops supporting Wi-Fi 6 or later standards (Compl. ¶¶ 45, 89, 95).
Functionality and Market Context
- LG Pay: This service is alleged to be a digital wallet that stores credit and debit card information and uses NFC (Near Field Communication) or MST (Magnetic Secure Transmission) to make payments (Compl. ¶¶ 45-46). The service is alleged to require biometric verification, such as a fingerprint scan, to authorize a transaction (Compl. ¶61). The complaint alleges that biometric data is protected within a hardware-backed secure environment, such as a Trusted Execution Environment (TEE), on LG devices (Compl. ¶¶ 47-51). A diagram in the complaint illustrates the data flow for fingerprint authentication within the Android OS architecture allegedly used by LG (Compl. p. 13).
- Digital Key System: This is described as an "Ultra-Small 'Digital Key Module'" developed by LG Innotek that uses UWB (Ultra-Wideband) and BLE (Bluetooth Low Energy) to detect the proximity of a user's smartphone (Compl. ¶89). Based on the presence of the phone, the system allows access to vehicle functions like unlocking doors or starting the engine (Compl. ¶92).
- WiFi Products: These products, including LG gram laptops and OLED TVs, are alleged to incorporate Wi-Fi 6 (IEEE 802.11ax) or later standards (Compl. ¶95). A key feature of these standards is Target Wake Time (TWT), which allows a device's transceiver to enter a sleep mode and awaken only at specific, negotiated times to exchange data, thereby conserving power (Compl. ¶¶ 97, 101).
IV. Analysis of Infringement Allegations
’730 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| an integrated device persistently storing biometric user data...and a plurality of codes and other data values comprising a device ID code uniquely identifying the integrated device and a secret decryption value, in a tamper proof format written to a storage element on the integrated device that is unable to be subsequently altered | LG devices running LG Pay are alleged to store fingerprint templates and EMV payment tokens (the alleged device ID code and other data) in a secure, tamper-proof environment like a TEE or secure element, protected by the Android OS. The secret decryption value is alleged to be a private key managed by Android's Keymaster. | ¶108-110 | col. 1:15-20 |
| receiving scan data from a biometric scan of a user | When a user initiates a payment, LG Pay prompts for and receives fingerprint scan data from the device's biometric sensor. A screenshot shows an LG Pay screen with a "Pay with fingerprint" prompt. | ¶111, ¶63 | col. 2:20-25 |
| comparing the scan data with the biometric data on the integrated device to determine whether the scan data matches the biometric data | The device's vendor-specific library, operating within the TEE, allegedly compares the new fingerprint scan data against the stored templates to verify a match. | ¶111, ¶74 | col. 2:25-28 |
| after receiving the determination that the scan data matches the biometric data, wirelessly sending one or more codes from the plurality of codes and other data values including the device ID code to an agent | After a successful fingerprint match, the LG device wirelessly transmits an EMV payment token (the alleged device ID code) via NFC or MST to a payment terminal, which routes it to a Token Service Provider (the alleged agent). | ¶112, ¶75 | col. 2:28-32 |
| receiving an access message from the agent, wherein the access message indicates that the user has been allowed access to an application | After the Token Service Provider authenticates the token, the LG device allegedly receives a push notification confirming the transaction is authorized, which permits payment to occur (access to the application). | ¶114, ¶83 | col. 2:32-37 |
’905 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| an integrated device persistently storing biometric user data and a device specific ID code that uniquely identifies the integrated device | LG devices with LG Pay are alleged to persistently store fingerprint data and a unique EMV payment token (the alleged device-specific ID code) in a secure hardware environment (TEE). | ¶124-125 | col. 2:13-16 |
| responsive to receiving a request for biometric verification of a user, receiving scan data from a biometric scan carried out on a biometric sensor | In response to a payment prompt (e.g., a push notification or NFC tap), which constitutes the request, the LG device receives fingerprint scan data from its sensor. | ¶126-127 | col. 2:17-21 |
| comparing the scan data with the biometric data on the integrated device to determine whether there is a match | The device's internal software allegedly compares the new scan data to the stored fingerprint data to determine if there is a match. | ¶128 | col. 2:21-23 |
| after authenticating the user, wirelessly transmitting one or more codes comprising the device specific ID code to a third-party trusted authority | After a successful match, the device wirelessly transmits the EMV payment token (containing the alleged device-specific ID code) to a Token Service Provider (the alleged third-party authority). | ¶129 | col. 2:23-28 |
| receiving an access message from the third-party trusted authority after the device specific ID code has been authenticated by the third-party trusted authority...the access message allowing the user to complete a financial transaction | After the TSP authenticates the token, the LG device receives a push notification (the alleged access message) confirming the transaction, which allows payment to be completed. | ¶131 | col. 2:28-34 |
Identified Points of Contention
- Scope Questions: A central question may be whether a commercial payment "token" (e.g., an EMV token) supplied by a third-party card network constitutes a "device ID code" or "device specific ID code" as contemplated by the patents. The complaint alleges this mapping (Compl. ¶¶ 77, 125), but its technical and legal validity could be a point of dispute. Similarly, it raises the question of whether a Token Service Provider (TSP) like Visa performs the role of the claimed "agent" or "third-party trusted authority."
- Technical Questions: For the biometric authentication patents, a key technical question will be how the accused LG Pay system actually implements the comparison of scan data to stored biometric data. The complaint provides a high-level data flow diagram (Compl. p. 13) but does not detail the specific algorithms or processes, which may or may not align with the functions required by the claims.
V. Key Claim Terms for Construction
The Term: "tamper proof format" (’730 Patent, cl. 1) / "tamper-resistant format" (’905 Patent, cl. 1)
- Context and Importance: This term is critical to the claimed invention's security promise. Its construction will determine what level of security is required for the stored biometric data. Practitioners may focus on this term because the infringement argument rests on mapping it to modern smartphone security architectures like the TEE.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification of the parent ’730 patent does not appear to explicitly define the term, which may support an argument for giving it its plain and ordinary meaning: a format that is resistant to unauthorized alteration.
- Evidence for a Narrower Interpretation: The emphasis on security and preventing unauthorized access throughout the patent descriptions may suggest a more stringent requirement, such as a write-once hardware format or a format protected by specific cryptographic means beyond standard OS-level permissions.
The Term: "agent" (’730 Patent, cl. 1) / "third-party trusted authority" (’905 Patent, cl. 1)
- Context and Importance: The definition of this entity is central to the claimed system architecture. The dispute may turn on whether a commercial entity like a payment card TSP, whose primary role is payment processing, fits the claimed role of an entity whose purpose is to authenticate a device ID code.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patents describe this entity as being a third party that receives and authenticates a code. An argument could be made that any entity separate from the user and the merchant that performs this function meets the definition.
- Evidence for a Narrower Interpretation: The ’905 patent describes the authority as "possessing a list of device ID codes uniquely identifying legitimate integrated devices" (’905 Patent, cl. 1). This could be interpreted to require a specific database maintained for the primary purpose of device authentication, which may or may not describe the function of a TSP's token vault. The complaint alleges this vault is such a list (Compl. ¶79).
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement by providing the LG Pay application and the Accused Digital Key System, along with instructions and advertisements that allegedly encourage end-users to perform the steps of the asserted method claims (Compl. ¶¶ 115, 132, 201, 213). Contributory infringement is alleged on the basis that LG Pay has no substantial non-infringing use (Compl. ¶224).
- Willful Infringement: Willfulness is alleged based on Defendant's purported actual knowledge of the patents-in-suit since at least August 10, 2016, the date of a notice letter from Plaintiff (Compl. ¶¶ 41-44). The complaint alleges that Defendant continued to infringe despite this knowledge.
VII. Analyst’s Conclusion: Key Questions for the Case
- A threshold issue for the ’905 and ’989 patents will be one of enforceability: given that the specific claims asserted in the complaint appear to have been cancelled or disclaimed in post-issuance ex parte reexamination and inter partes review proceedings, the court will first need to determine if an actionable claim remains for these two patents.
- A core infringement question will be one of technical and definitional mapping: can the commercial "tokenization" infrastructure used by LG Pay, which involves Token Service Providers (TSPs) and EMV payment tokens, be construed to meet the elements of the claimed system, which requires a "third-party trusted authority" authenticating a "device ID code"?
- The question of willful infringement will likely depend on the court's assessment of the 2016 notice letter: did this letter provide LG with sufficient knowledge of infringement to render its subsequent conduct objectively reckless, particularly for patents that issued years after the letter was sent, and how does the subsequent invalidation of asserted claims impact this analysis?