7:25-cv-00281
Authentixx LLC v. Beatstars Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Authentixx LLC (Delaware)
- Defendant: Beatstars Inc. (Delaware)
- Plaintiff’s Counsel: Rabicoff Law LLC
 
- Case Identification: 7:25-cv-00281, W.D. Tex., 06/20/2025
- Venue Allegations: Venue is asserted based on Defendant having an established place of business in the Western District of Texas.
- Core Dispute: Plaintiff alleges that unspecified products from Defendant infringe a patent related to methods for authenticating electronic content to verify its source.
- Technical Context: The technology addresses the problem of online fraud, such as phishing, by providing a system to verify for a user that a webpage or email originates from its purported source.
- Key Procedural History: The patent-in-suit is subject to a terminal disclaimer. The complaint notes that the application leading to the patent was filed in 2017, while the patent itself traces its priority back to a provisional application filed in 1999.
Case Timeline
| Date | Event | 
|---|---|
| 1999-09-09 | Earliest Priority Date for U.S. Patent No. 10,355,863 | 
| 2017-12-08 | Application Filing Date for U.S. Patent No. 10,355,863 | 
| 2019-07-16 | Issue Date of U.S. Patent No. 10,355,863 | 
| 2025-06-20 | Complaint Filing Date | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,355,863 - “System and method for authenticating electronic content”
- Patent Identification: U.S. Patent No. 10,355,863, “System and method for authenticating electronic content,” issued July 16, 2019.
The Invention Explained
- Problem Addressed: The patent’s background section describes the risk of consumers being defrauded by counterfeit web pages or emails that mimic legitimate ones by copying logos or using deceptively similar URLs, creating uncertainty about the content's authenticity (’863 Patent, col. 1:24-40).
- The Patented Solution: The invention proposes a system where, upon a user's request for a web page, a server retrieves the content and forwards it to a separate authentication server, which inserts an "authenticity key" before returning it to the user (’863 Patent, Abstract). The user’s computer, via a browser plug-in, uses this key to verify authenticity and then displays a pre-configured "authenticity stamp" (e.g., a custom image or text), assuring the user the page is genuine (’863 Patent, col. 3:9-21; Fig. 2).
- Technical Importance: This technology aims to provide a reliable verification mechanism beyond simply checking a URL, addressing a foundational security challenge for e-commerce and online communications by creating a trusted visual or audio indicator of source authenticity (’863 Patent, col. 2:3-9).
Key Claims at a Glance
- The complaint alleges infringement of "one or more claims" and references "Exemplary '863 Patent Claims" but fails to identify any specific claims in the body of the complaint or in an available exhibit (Compl. ¶11-13). For illustrative purposes, the analysis below focuses on independent claim 1.
- Independent Claim 1 includes the following essential elements:- Storing an "authenticity stamp" in a "preferences file" accessible by designated servers.
- Creating an "authenticity key with information to locate the preferences file."
- Receiving a client request for a web page and creating the formatted data for that page.
- Receiving a request for the "authenticity key" from the client.
- Sending the formatted data to the client and providing the authenticity key.
- On the client side, "manipulating the authenticity key" to determine the location of the preferences file, locating that file, retrieving the stamp, and enabling its display.
 
III. The Accused Instrumentality
Product Identification
The complaint does not identify any specific accused products, methods, or services by name. It refers generally to "Exemplary Defendant Products" that are purportedly detailed in an external chart (Exhibit 2) which was not filed with the complaint (Compl. ¶11, ¶13).
Functionality and Market Context
The complaint provides no factual allegations describing the technical functionality, operation, or market context of any accused product or service.
IV. Analysis of Infringement Allegations
The complaint alleges that the "Exemplary Defendant Products practice the technology claimed by the '863 Patent" and that they "satisfy all elements of the Exemplary '863 Patent Claims" (Compl. ¶13). These allegations are wholly conclusory and refer to claim charts in an unprovided exhibit (Compl. ¶14). The complaint itself contains no specific factual assertions mapping any feature of an accused product to any element of a patent claim. No probative visual evidence provided in complaint.
Identified Points of Contention
Based on the language of the patent and the minimal allegations, the infringement analysis may raise several technical and legal questions:
- Architectural Questions: A central question will be whether the accused system's architecture matches the specific, multi-server, multi-step process recited in the claims. The patent describes a system where a web server communicates with a distinct authentication server, and a client-side plug-in communicates back to the server to obtain a key to locate a preferences file (’863 Patent, Fig. 4; Fig. 5). The analysis will question whether the accused system segregates functionality in this manner or uses a more integrated approach.
- Functional Questions: The analysis will raise the question of whether any token or identifier used in the accused system performs the specific dual function of the claimed "authenticity key," which must both authenticate and contain "information to locate the preferences file" (’863 Patent, col. 14:48-51). What evidence does the complaint provide that the accused product uses a key for file location, rather than simply as a verification token?
V. Key Claim Terms for Construction
Term for Construction: "authenticity stamp"
- Context and Importance: This term defines the user-facing indicator of authenticity. Its construction is critical because a narrow definition could exclude common, standardized verification symbols, while a broad one could cover a wide range of indicators. Practitioners may focus on this term to determine if the accused product's verification method, whatever it may be, falls within the claimed invention.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification suggests the stamp can be highly variable, including "graphics only, text only or a combination thereof," and can even be audio instead of visual (’863 Patent, col. 3:19-26).
- Evidence for a Narrower Interpretation: The patent’s figures and preferred embodiments repeatedly emphasize a user-configured, personalized stamp, such as "JOE'S SEAL OF APPROVAL," which the user defines and comes to trust through familiarity (’863 Patent, col. 3:13-21; Fig. 2). This could support an argument that the term requires a user-customized element.
 
Term for Construction: "authenticity key with information to locate the preferences file"
- Context and Importance: This term describes the core mechanism of the claimed method. Infringement may depend on whether the accused system uses a key that specifically serves as a locator for a separate file, as opposed to a simple authentication token. The "information to locate" language suggests a specific technical requirement that may not be present in all authentication systems.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The patent does not strictly limit how the "information" is encoded, which could potentially cover a direct file path, an encrypted pointer, or an index value.
- Evidence for a Narrower Interpretation: The process described involves a client-side plug-in receiving the key, decrypting it, and then using the revealed information to find a preferences file that is stored in an intentionally obscured location on the user's own computer (’863 Patent, col. 6:25-44, col. 11:63-65). This may support a narrower construction requiring a key that enables a client-side search for a hidden local file.
 
VI. Other Allegations
Indirect Infringement
The complaint does not plead any counts of indirect infringement (inducement or contributory infringement) or allege facts that would support them, such as providing instructions to third parties to perform infringing acts (Compl. ¶11-12).
Willful Infringement
The complaint does not allege willful infringement. It requests that the case be declared "exceptional" under 35 U.S.C. § 285 to recover attorneys' fees but does not plead any specific facts regarding pre- or post-suit knowledge by the Defendant that would typically support a willfulness claim (Compl. ¶E.i).
VII. Analyst’s Conclusion: Key Questions for the Case
This case, as currently pleaded, presents several fundamental questions for the court:
- A primary issue will be one of evidentiary sufficiency: Can Plaintiff produce evidence to substantiate its conclusory allegations, demonstrating that Defendant’s systems actually practice the specific, multi-step, and arguably complex authentication architecture required by the patent claims, especially given the complete absence of such facts in the complaint? 
- The case will likely turn on a question of architectural and functional scope: Can the claims, which recite a specific sequence involving an "authenticity key" used to "locate" a separate "preferences file" to retrieve an "authenticity stamp," be construed to cover the accused system? Or will discovery reveal a fundamental mismatch in technical operation, where the accused system employs a more streamlined method for generating a verification indicator that does not map onto the claimed process?