6:24-cv-00547
Gamehancement LLC v. CodeLathe Tech Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Gamehancement LLC (Delaware)
- Defendant: CodeLathe Technologies Inc. (Delaware)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 6:24-cv-00547, W.D. Tex., 10/14/2024
- Venue Allegations: Venue is alleged to be proper in the Western District of Texas because Defendant maintains an established place of business in the district.
- Core Dispute: Plaintiff alleges that Defendant’s unspecified software products infringe a patent related to methods for graphically indicating the security status of digital files in a computer’s operating system.
- Technical Context: The technology concerns graphical user interfaces (GUIs) and aims to provide users with a clear, intuitive visual cue that a file is secured without obscuring the file's original type-identifying icon.
- Key Procedural History: The complaint does not mention any prior litigation, inter partes review (IPR) proceedings, or licensing history related to the patent-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2002-04-17 | ’597 Patent Priority Date |
| 2005-08-16 | ’597 Patent Issue Date |
| 2024-10-14 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 6,931,597 - "Indications of secured digital assets," issued August 16, 2005
The Invention Explained
- Problem Addressed: The patent’s background section describes the problem that when files are encrypted using schemes like PGP, their file-type-specific icons (e.g., a Microsoft Word icon) are often replaced with a generic "encrypted file" icon, making it impossible for a user to know the original file type without decrypting it or closely examining the file name (ʼ597 Patent, col. 2:60-65). The patent also notes that simply altering the color of a file's name, as done in some systems, is insufficient for conveying different levels of security (ʼ597 Patent, col. 2:9-14).
- The Patented Solution: The invention proposes a method where the operating system intercepts files to be displayed in a file explorer, determines if a file is secured, and then superimposes a secondary, security-indicating icon (e.g., a "Secret" emblem) over the file's original "default" icon. This is done in a way that preserves the user's ability to recognize the original icon, thus indicating both the file type and its security status simultaneously (ʼ597 Patent, Abstract; col. 2:24-33). Figures 4A-4E illustrate this concept, showing a security emblem (402) being superimposed on a default icon (400) to create a new composite icon (414) that visually communicates both characteristics (ʼ597 Patent, Fig. 4A-4E).
- Technical Importance: This approach enhances user interface design by providing an intuitive, integrated visual indicator of file security status directly within a standard file explorer, improving security awareness without disrupting user workflow or obscuring essential file information (ʼ597 Patent, col. 10:5-12).
Key Claims at a Glance
- The complaint alleges infringement of "exemplary method claims" without specifying claim numbers (Compl. ¶11). Independent claim 1 is representative of the patented method.
- Independent Claim 1:
- A method for graphically indicating secured items in a program for displaying contents in a selected place, the method comprising:
- determining a security level of each of the secured items, wherein each of the secured items has a default icon associated with if the each of the secured items is otherwise not secured; and
- superimposing an appropriate icon corresponding to the security level over the default icon without losing original indications of the default icon.
- The complaint does not explicitly reserve the right to assert dependent claims.
III. The Accused Instrumentality
Product Identification
The complaint refers to the accused instrumentalities as the "Exemplary Defendant Products" (Compl. ¶11). No specific product names or versions are identified in the provided document.
Functionality and Market Context
The complaint does not provide any description of the accused products' features or functions. It alleges in a conclusory manner that the "Exemplary Defendant Products practice the technology claimed by the '597 Patent" (Compl. ¶13). No allegations regarding the products' commercial importance are made.
IV. Analysis of Infringement Allegations
The complaint alleges direct infringement but incorporates its detailed infringement theories by reference to claim charts in "Exhibit 2" (Compl. ¶13-14), which was not provided with the complaint document. The complaint states that these charts compare the "Exemplary ’597 Patent Claims to the Exemplary Defendant Products" and show that the products "satisfy all elements of the Exemplary '597 Patent Claims" (Compl. ¶13).
No probative visual evidence provided in complaint.
Identified Points of Contention
- Scope Questions: A central issue may be the construction of the phrase "superimposing an appropriate icon ... without losing original indications of the default icon" (ʼ597 Patent, col. 12:19-21). The dispute could turn on whether the accused product's method of indicating security—which is currently unspecified—constitutes a "superimposing" as depicted in the patent's figures (e.g., an overlay emblem) or is merely an alteration (e.g., a color change) that falls outside the claim's scope.
- Technical Questions: The complaint does not provide evidence that the accused products perform the specific function of "determining a security level" as required by claim 1 (ʼ597 Patent, col. 12:14-15). This raises the question of whether the accused products distinguish between multiple tiers of security (e.g., "confidential," "secret") as contemplated by the patent (ʼ597 Patent, col. 8:5-9), or if they use a simple binary indicator (e.g., locked/unlocked) that may not meet this limitation.
V. Key Claim Terms for Construction
The Term: "superimposing an appropriate icon... without losing original indications of the default icon" (from Claim 1)
- Context and Importance: This phrase captures the core of the invention. The outcome of the infringement analysis will depend heavily on whether the visual security indicator in the accused products is found to be "superimposed" in a way that does not "lose" the "original indications" of the underlying file-type icon.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification refers generally to overlaying a "visual object" upon a default icon, which could be argued to encompass a wide variety of graphical indicators (ʼ597 Patent, col. 2:31-33).
- Evidence for a Narrower Interpretation: The patent’s figures consistently depict this as a smaller, distinct emblem placed over a portion of the original icon, leaving the majority of the original icon visible and recognizable (ʼ597 Patent, Figs. 4D, 4E). This could support a narrower construction that requires a distinct graphical overlay rather than a modification of the entire default icon's properties (e.g., changing its color or transparency).
The Term: "security level" (from Claim 1)
- Context and Importance: Practitioners may focus on this term because the claim requires "determining a security level," which suggests a capacity beyond a simple binary secured/unsecured status. If the accused products only indicate that a file is secured without distinguishing between different classifications of security, they may not infringe.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: A party could argue that a binary system still involves determining a "level" (e.g., Level 0 for unsecured, Level 1 for secured). The patent does not explicitly require more than two levels.
- Evidence for a Narrower Interpretation: The specification provides concrete examples of multiple tiers, stating a file can be classified as "normal, confidential, secret or a top-secret document, requiring different level of access" (ʼ597 Patent, col. 8:5-9). This language suggests that the claimed "security level" refers to a system capable of managing a graduated scale of security classifications.
VI. Other Allegations
- Indirect Infringement: The complaint does not contain allegations of indirect infringement. The single count is for "Direct Infringement" (Compl. ¶11).
- Willful Infringement: The complaint does not explicitly plead willful infringement. However, in its prayer for relief, it requests a judgment that the case be declared "exceptional within the meaning of 35 U.S.C. § 285" and an award of attorneys' fees (Compl. p. 4, ¶E(i)).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: How will the court construe the central limitation "superimposing an appropriate icon ... without losing original indications of the default icon"? The case may turn on whether this requires a distinct graphical overlay, as shown in the patent's figures, or if it can be read more broadly to cover other forms of visual modification.
- A key evidentiary question will be one of factual proof: As the complaint lacks specific factual allegations about the accused products, a central issue will be whether Plaintiff can produce evidence that the "Exemplary Defendant Products" actually perform the functions required by the claims, particularly the step of "determining a security level" that implies a system for handling multiple, distinct security tiers.