7:25-cv-00293
Authentixx LLC v. Maven Learning Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Authentixx LLC (Delaware)
- Defendant: Maven Learning, Inc. (Delaware)
- Plaintiff’s Counsel: Rabicoff Law LLC
- Case Identification: 7:25-cv-00293, W.D. Tex., 06/23/2025
- Venue Allegations: Plaintiff alleges venue is proper because Defendant maintains an established place of business in the district and has committed alleged acts of infringement there.
- Core Dispute: Plaintiff alleges that certain of Defendant's products infringe a patent related to methods for authenticating electronic content, such as web pages, to verify their origin.
- Technical Context: The technology addresses the problem of online fraud and phishing by embedding verifiable "authenticity markers" into electronic content to assure users of the content's legitimacy.
- Key Procedural History: The patent-in-suit is subject to a terminal disclaimer. The complaint does not mention any other prior litigation, licensing history, or administrative proceedings involving the patent.
Case Timeline
| Date | Event |
|---|---|
| 1999-09-09 | '863 Patent Earliest Priority Date (Provisional 60/153,004) |
| 2017-12-08 | '863 Patent Application Filing Date |
| 2019-07-16 | '863 Patent Issue Date |
| 2025-06-23 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 10,355,863 - System and method for authenticating electronic content
- Issued: July 16, 2019
The Invention Explained
- Problem Addressed: The patent's background section describes the risk of internet users being defrauded by deceptive web pages or emails that misuse corporate logos or employ slightly incorrect URLs to appear authentic, a practice commonly used for identity theft ('863 Patent, col. 1:25-50). The patent notes that even secure transport protocols like HTTPS do not solve the problem of verifying the authenticity of the content itself ('863 Patent, col. 1:63-col. 2:2).
- The Patented Solution: The invention proposes a system where a user's request for content is routed through an authentication server. This server retrieves the requested content and inserts a unique "authenticity marker" before sending it to the user ('863 Patent, Abstract). The user's computer, equipped with special software (e.g., a browser plug-in), recognizes and verifies this marker, thereby confirming the content's source and displaying it with an "authenticity stamp" ('863 Patent, col. 2:11-23; FIG. 4).
- Technical Importance: The described technology aimed to provide content-level, rather than just transport-level, security, giving end-users a configurable and recognizable visual cue to trust the source of a web page or email ('863 Patent, col. 2:4-9).
Key Claims at a Glance
- While the complaint does not specify which claims are asserted, referring only to "Exemplary '863 Patent Claims" in an un-provided exhibit (Compl. ¶13), this analysis will focus on independent claim 1 as representative of the patented method.
- Essential elements of independent claim 1 include:
- Storing an "authenticity stamp" in a "preferences file" located on a server.
- Creating an "authenticity key" with information to locate that preferences file.
- Receiving a content request from a client computer.
- Receiving a separate request for the authenticity key.
- Sending the content and providing the authenticity key to the client.
- On the client side, "manipulating" the key to find the preferences file, retrieving the stamp, and displaying it with the content.
- The complaint does not explicitly reserve the right to assert dependent claims, but refers generally to "one or more claims" (Compl. ¶11).
III. The Accused Instrumentality
Product Identification
The complaint does not identify specific accused products or services by name. It refers only to "Exemplary Defendant Products" that are purportedly detailed in an un-provided "Exhibit 2" (Compl. ¶¶11, 13).
Functionality and Market Context
The complaint provides no description of the functionality, operation, or market context of the accused instrumentalities. No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint alleges direct infringement by Defendant’s unnamed "Exemplary Defendant Products" (Compl. ¶11). It makes the conclusory assertion that these products "practice the technology claimed by the '863 Patent" and that they "satisfy all elements of the Exemplary '863 Patent Claims" (Compl. ¶13). All detailed allegations are incorporated by reference from claim charts in an un-provided "Exhibit 2" (Compl. ¶14). Without access to the specific product descriptions or the claim charts, a detailed analysis of the infringement allegations is not possible.
Identified Points of Contention
Based on the language of the '863 Patent, the infringement analysis may raise several technical and legal questions:
- Scope Questions: The dispute may turn on whether the architecture of the accused system maps to the specific client-server-authentication-server structure recited in the claims. A key question will be whether the accused system uses an "authenticity key" as a distinct element whose purpose is to "locate" a separate "preferences file," as the claims require ('863 Patent, cl. 1).
- Technical Questions: A factual dispute may arise over whether the accused system performs the specific, multi-step process claimed. For example, the claims recite a server receiving two separate requests from the client: one for the web page and another for the "authenticity key" ('863 Patent, cl. 1). Evidence will be needed to show that the accused system follows this particular communication protocol.
V. Key Claim Terms for Construction
The Term: "authenticity stamp"
Context and Importance
This term defines the core verification indicator that the end-user sees. Its construction is critical because it will determine what features of the accused product could be considered infringing. Practitioners may focus on this term to dispute whether any verification feature in the accused product meets this limitation.
Intrinsic Evidence for Interpretation
- Evidence for a Broader Interpretation: The specification suggests the "stamp" can be many things, including a user-configurable graphic and text combination, a "computer-generated fractal design," or even "personal information relating to the user's account" such as an account balance or last transaction date ('863 Patent, col. 4:10-24, 4:45-53, 4:66-5:5). This language may support a broad definition covering various types of visible verification data.
- Evidence for a Narrower Interpretation: The patent’s figures consistently depict the "stamp" as a discrete visual element added to the page, such as a diamond-shaped "SEAL OF APPROVAL" or embedded text ('863 Patent, FIG. 2, FIG. 3). An argument could be made that the term should be limited to such distinct, user-configured visual overlays, rather than any embedded data.
The Term: "preferences file"
Context and Importance
The claims require the "authenticity stamp" to be stored in a "preferences file." The existence of a distinct data structure corresponding to a "file" is a required element of the claimed method, and the infringement analysis will depend on finding such a structure in the accused system.
Intrinsic Evidence for Interpretation
- Evidence for a Broader Interpretation: The term could be argued to cover any server-side data store that holds user-specific configuration settings for authentication, such as a record or entry in a database.
- Evidence for a Narrower Interpretation: The patent repeatedly uses the word "file" and discusses its "file location" ('863 Patent, cl. 1). The specification further notes that this file is "placed in a random directory to help obscure the location" ('863 Patent, col. 11:65-col. 12:3). This may support a narrower construction limited to a literal file within a file system, potentially excluding modern cloud-based database architectures.
VI. Other Allegations
Indirect Infringement
The complaint contains a single count for direct infringement and does not allege indirect infringement (Compl. ¶¶11-12).
Willful Infringement
The complaint does not contain a specific allegation of willful infringement or a request for enhanced damages under 35 U.S.C. § 284. It does, however, request that the court declare the case "exceptional" for the purpose of awarding attorneys' fees under 35 U.S.C. § 285, but pleads no specific facts to support this request, such as pre-suit knowledge of the patent (Compl. ¶E.i).
VII. Analyst’s Conclusion: Key Questions for the Case
The resolution of this dispute will likely depend on the answers to several central questions:
- Evidentiary Specificity: A primary threshold issue concerns the complaint's lack of factual detail. Given its reliance on an un-provided exhibit to identify the accused products and substantiate infringement, a key focus will be on whether Plaintiff can produce evidence to support its conclusory allegations.
- Architectural Correspondence: A central technical question will be whether the architecture of Defendant's system maps onto the specific multi-component structure recited in the claims, particularly regarding the roles of and interaction between the claimed "preferences file" and the "authenticity key" used to locate it.
- Definitional Scope: A core claim construction issue will be the breadth of the term "authenticity stamp." The case may turn on whether the term is construed broadly to cover any form of embedded verification data or is limited to the discrete, user-configurable visual indicators depicted in the patent’s embodiments.