DCT
2:23-cv-00872
Virtru Corp v. Microsoft Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:- Plaintiff: Virtru Corporation (Delaware)
- Defendant: Microsoft Corporation (Washington)
- Plaintiff’s Counsel: Morrison & Foerster LLP; McGinnis Lochridge LLP
 
- Case Identification: 6:22-cv-00242, W.D. Tex., 05/03/2022
- Venue Allegations: Plaintiff alleges venue is proper in the Western District of Texas because Defendant maintains a principal place of business, regular and established places of business including corporate offices and data centers, and conducts substantial business within the district.
- Core Dispute: Plaintiff alleges that Defendant’s message encryption and rights management technologies within its Office 365 and Azure product suites infringe three patents related to distributing cryptographic data to recipients authenticated through third-party identity providers.
- Technical Context: The technology addresses secure data sharing, enabling users to send encrypted information to external recipients without requiring those recipients to create new accounts, instead leveraging their existing credentials from other identity providers.
- Key Procedural History: The complaint details an extensive pre-suit history between the parties, beginning in 2014, which included partnership discussions and accelerator program participation. Plaintiff alleges that in December 2016, it disclosed its issued patents and a pending application to senior Microsoft executives, and that Microsoft launched the accused features months after subsequent technical presentations in 2017.
Case Timeline
| Date | Event | 
|---|---|
| 2011-01-12 | Earliest Priority Date for ’673, ’902, and ’021 Patents | 
| 2013-11-19 | U.S. Patent No. 8,589,673 Issues | 
| 2014-10-01 | Virtru is introduced to Microsoft for potential partnership | 
| 2014-10-28 | U.S. Patent No. 8,874,902 Issues | 
| 2016-12-06 | Virtru discloses ’673 and ’902 Patents and pending ’021 application to Microsoft | 
| 2017-02-21 | U.S. Patent No. 9,578,021 Issues | 
| 2017-08-30 | Virtru presents its product architecture to Microsoft | 
| 2017-09-26 | Microsoft announces "new capabilities" in Office 365 Message Encryption | 
| 2022-05-03 | First Amended Complaint Filed | 
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,589,673 - "Methods and Systems for Distributing Cryptographic Data to Authenticated Recipients" (Nov. 19, 2013)
The Invention Explained
- Problem Addressed: The patent describes the difficulty of securely sharing data objects with individuals outside of a proprietary digital rights management system. It notes that standard cryptographic techniques are often too complex for average users or rely on shareable passwords, while public key cryptography is not a "mainstream activity" and thus limits the pool of potential recipients (Compl. ¶36; ’673 Patent, col. 1:19-50).
- The Patented Solution: The invention proposes a method where an "access control management system" acts as an intermediary to decouple authentication from data storage. A sender transmits an encrypted data object directly to a recipient, while information needed to decrypt it (such as a key) is sent to the access control system. The recipient requests this information, and the system verifies their identity by automatically selecting and leveraging a third-party "identity provider" (e.g., the recipient's existing Google or Yahoo account) before sending the decryption information. This process avoids requiring the recipient to create a new account with the sender's system (’673 Patent, Abstract; col. 7:3-17).
- Technical Importance: The technology aimed to remove a significant point of friction in secure digital collaboration by allowing users to access encrypted data using identity credentials they already possess and trust (Compl. ¶7).
Key Claims at a Glance
- Independent Claim Asserted: Claim 1.
- Essential Elements of Claim 1:- An access control management system receives, from a first client device, information associated with a first encrypted data object.
- The system receives, from a second client device, a request for that information.
- The system verifies that a user of the second client device is identified in the received information.
- The system automatically selects an identity provider from a plurality of providers based on a user identifier.
- The system automatically requests authentication of the user from the selected identity provider.
- The system sends the information to the second client device responsive to the authentication.
- The method repeats these steps for information associated with a second encrypted data object and a third client device, using a second identity provider.
 
- The complaint reserves the right to assert additional claims (Compl. ¶51).
U.S. Patent No. 8,874,902 - "Methods and Systems for Distributing Cryptographic Data to Authenticated Recipients" (Oct. 28, 2014)
The Invention Explained
- Problem Addressed: The patent addresses the same fundamental problem as the ’673 Patent: the need for a user-friendly method to distribute cryptographic data to authenticated recipients without requiring new account creation (’902 Patent, col. 1:21-52).
- The Patented Solution: The ’902 Patent builds upon the same core architecture of using an access control system and third-party identity providers. However, its claims introduce more granular access controls. For example, the information sent to the access control system can include an "identification of a role assigned to a user" or a specification that access is limited to a certain "time period." The system must then verify that the user is assigned the correct role or is accessing the data within the valid time frame before providing the decryption information (’902 Patent, claim 1; claim 3).
- Technical Importance: This patent adds layers of policy enforcement, such as role-based and time-based restrictions, to the federated authentication model, increasing its utility for enterprise environments with more complex security requirements (Compl. ¶121, 131).
Key Claims at a Glance
- Independent Claims Asserted: Claims 1 and 3.
- Essential Elements of Claim 1:- An access control management system receives, from a first client device, information associated with an encrypted data object, where the information includes "an identification of a role assigned to a user authorized to access the encrypted data object."
- The system receives a request for the information from a second client device.
- The system verifies the user is identified in the information.
- The system verifies the user is "assigned the role identified in the received information."
- The system selects an identity provider based on a user identifier.
- The system requests authentication from the selected provider.
- The system sends the information to the second client device responsive to the authentication.
 
- The complaint reserves the right to assert additional claims (Compl. ¶110).
Multi-Patent Capsule: U.S. Patent No. 9,578,021
- Patent Identification: U.S. Patent No. 9,578,021, "Methods and Systems for Distributing Cryptographic Data to Authenticated Recipients," issued February 21, 2017.
- Technology Synopsis: This patent extends the federated authentication system by adding an auditing capability. It claims a method where the access control management system, after processing a request, stores an identification of the recipient's device and the received request in a "transaction log," creating a record of access attempts (’021 Patent, claim 1).
- Asserted Claims: At least Claim 1 (Compl. ¶153).
- Accused Features: The complaint alleges that Microsoft's Office 365 Message Encryption ("OME"), Azure Portal with B2B ("AP"), and Azure Key Vault with B2B ("AKV") infringe this patent. Specifically, it alleges that Microsoft's "protection usage logs" and "Azure AD audit logs" constitute the claimed "transaction log" (Compl. ¶¶ 173, 183, 193).
III. The Accused Instrumentality
- Product Identification: The complaint identifies three accused technologies: Office 365 Message Encryption ("OME"), the Azure Portal feature used with the Azure Active Directory B2B feature ("AP"), and the Azure Key Vault feature used with the Azure Active Directory B2B feature ("AKV") (Compl. ¶43). These technologies are alleged to be part of numerous Microsoft products, including various Office 365, Microsoft 365, and Azure service plans (Compl. ¶¶ 44, 46, 48).
- Functionality and Market Context:- The accused technologies are features within Microsoft's flagship enterprise and consumer cloud platforms that provide secure data and resource sharing (Compl. ¶20).
- OME is alleged to be a service allowing users to send encrypted emails to anyone, with recipients authenticated by third-party identity providers like Google or Yahoo to access the message (Compl. ¶63).
- AP is alleged to be a service for securely sharing applications and services with "guest users" from other organizations, who are authenticated via federated identity providers (Compl. ¶78).
- AKV is alleged to be a service for securely sharing cryptographic keys and secrets with authorized guest users, who are likewise authenticated via third-party identity providers (Compl. ¶93).
 
IV. Analysis of Infringement Allegations
’673 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality (via OME) | Complaint Citation | Patent Citation | 
|---|---|---|---|
| receiving, by an access control management system, from a first client device, information associated with an encrypted data object | A Microsoft server (the access control system) receives metadata associated with an encrypted email from the sender's device. | ¶65 | col. 11:13-17 | 
| receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object | The Microsoft server receives a request from a recipient's device when the recipient clicks a "Read the message" button. | ¶66 | col. 11:18-22 | 
| verifying, by the access control management system, that a user of the second client device is identified in the received information | The Microsoft server verifies that the recipient's email address is included in the metadata associated with the encrypted email. | ¶67 | col. 11:23-27 | 
| automatically selecting, by the access control management system, an identity provider from a plurality of identity providers, based on a user identifier | The Microsoft server automatically selects an identity provider (e.g., Google, Yahoo) based on the recipient's email address. | ¶68 | col. 11:28-34 | 
| automatically requesting, by the access control management system, from the selected identity provider, authentication of the user | The Microsoft server automatically requests authentication from the selected provider when the recipient clicks "Sign in with Google." | ¶69 | col. 11:35-38 | 
| sending, by the access control management system, to the second client device, the received information...responsive to the authentication | After successful sign-in, the Microsoft server sends the metadata associated with the encrypted email to the recipient's device. | ¶70 | col. 11:39-44 | 
’902 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality (via AP) | Complaint Citation | Patent Citation | 
|---|---|---|---|
| receiving, by an access control management system...information associated with an encrypted data object, the information including an identification of a role assigned to a user | A Microsoft server receives a list of users and their access permissions for a particular application, including roles assigned via Azure Active Directory role-based access control (Azure RBAC). | ¶134 | col. 21:23-29 | 
| receiving, by the access control management system, from a second client device, a request for the information | A Microsoft server receives a request from a guest user's device when the user clicks a redemption link in an invitation email. | ¶135 | col. 21:30-32 | 
| verifying, by the access control management system, that a user of the second client device is identified in the received information | The Microsoft server verifies that the guest user was invited and is on the list of allowed users. | ¶136 | col. 21:33-36 | 
| verifying, by the access control management system, that the user of the second client device is assigned the role identified in the received information | The Microsoft server evaluates the guest user's role memberships based on their access token to verify they are assigned the identified role. | ¶137 | col. 21:37-40 | 
| selecting, by the access control management system, an identity provider...based on a user identifier | The Microsoft server selects an identity provider (e.g., Google) based on the guest user's email address. | ¶138 | col. 21:41-47 | 
| sending...the received information associated with the encrypted data object, responsive to the authentication | After the guest user successfully signs in, the user can access the application and associated permissions. | ¶140 | col. 21:52-57 | 
- Identified Points of Contention:- Scope Questions: A central question for the ’902 Patent will be whether the "collection of permissions" assigned through Microsoft's Azure RBAC system constitutes a "role assigned to a user" as that term is used in Claim 1. The definition of "access control management system" may also be contested, raising the question of whether Microsoft's distributed cloud infrastructure functions as the single, integrated system recited in the claims.
- Technical Questions: What evidence does the complaint provide that the selection of an identity provider is "automatically" performed based on the "user identifier," versus being a result of user choice or a pre-configured system-wide default? The analysis may turn on the specific workflow and logic executed by Microsoft's servers during the authentication process.
 
No probative visual evidence provided in complaint.
V. Key Claim Terms for Construction
- The Term: "access control management system" (’673 Claim 1, ’902 Claim 1) - Context and Importance: This term defines the central component that performs nearly all steps of the claimed methods. Its construction is critical because the accused instrumentality is a distributed cloud service. The dispute will likely focus on whether Microsoft’s various servers and services collectively meet the definition of a single "system" as claimed.
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification describes the system functionally, stating it "implements authentication, access control, and establishment of the secure channel" and "enables access control using decentralized identity management" (’673 Patent, col. 7:12-14, col. 9:58-60). This may support an interpretation covering any architecture that performs these functions, regardless of its physical distribution.
- Evidence for a Narrower Interpretation: The patent figures depict the "Access Control Management System 202" as a discrete software block residing on a single "Machine 106a" (’673 Patent, Fig. 2A). This could support a narrower construction requiring a more co-located or monolithic system architecture.
 
 
- The Term: "role" (’902 Claim 1) - Context and Importance: This term is a key limitation differentiating the ’902 Patent from the earlier ’673 Patent. Infringement of claim 1 of the ’902 Patent hinges on whether the permissions assigned to users in the accused Azure B2B system qualify as a "role." Practitioners may focus on this term because the complaint equates "Azure RBAC" permissions with the claimed "role" (Compl. ¶134).
- Intrinsic Evidence for Interpretation:- Evidence for a Broader Interpretation: The specification explicitly references "Role-Based Access Control (RBAC)" and states the system "makes an access control decision based on whether a user has an authorized property or role" (’902 Patent, col. 10:2-12). This language suggests the term could be construed broadly to encompass any set of defined permissions or properties.
- Evidence for a Narrower Interpretation: A defendant could argue that the term, in the context of the patent, implies a formal, named designation (e.g., "Administrator," "Auditor") rather than any arbitrary collection of granular permissions that can be assigned to a user in the accused products. The specification's use of "roles a user has been assigned" could suggest a pre-defined status (’902 Patent, col. 10:7-8).
 
 
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement of infringement against Microsoft, stating that through "product manuals, sales and marketing activities, support activities, and other materials," Microsoft instructs and encourages its customers to use the Accused Products in a manner that directly infringes the patents-in-suit (Compl. ¶¶ 54-55, 113-114, 156-157).
- Willful Infringement: The complaint alleges willful infringement based on Microsoft's purported pre-suit knowledge of the patents. It alleges that Virtru specifically disclosed the ’673 and ’902 patents, as well as the application that became the ’021 patent, to Microsoft executives in a meeting on December 6, 2016, and that Microsoft subsequently launched the accused infringing features (Compl. ¶¶ 12, 19, 57, 116, 159).
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the term "role," which is central to the ’902 patent, be construed to cover the granular "collection of permissions" available in Microsoft's Azure role-based access control system, or does it require a more formal, pre-defined user status?
- A second key question will be one of system architecture: does Microsoft’s complex, distributed cloud infrastructure, which underpins services like OME and Azure, function as the integrated "access control management system" recited by the claims, or are the claimed steps performed by sufficiently distinct components to fall outside the literal scope of a single system?
- A third central issue, particularly relevant to damages, will be one of intent and history: what factual weight will be given to the extensive pre-suit relationship alleged in the complaint, in which Plaintiff asserts it disclosed its patented technology to Defendant during partnership negotiations shortly before Defendant independently launched the accused features?