DCT

3:23-cv-00108

Authentixx LLC v. Blackhawk Bancorp Inc

Key Events
Amended Complaint
amended complaint

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 3:23-cv-00108, W.D. Wis., 05/23/2023
  • Venue Allegations: Venue is based on Defendant maintaining an established place of business within the Western District of Wisconsin.
  • Core Dispute: Plaintiff alleges that Defendant’s online systems infringe two patents related to methods for authenticating electronic content, such as web pages, to verify their legitimacy to an end-user.
  • Technical Context: The technology addresses the field of online security, specifically providing users with a reliable method to confirm a website's authenticity beyond visual cues, thereby combating phishing and spoofing attacks.
  • Key Procedural History: U.S. Patent No. 7,631,191 was the subject of an Inter Partes Review (IPR) proceeding (IPR2014-00475), which resulted in the cancellation of claims 1-23 and 25-32. Claim 24, which is asserted in this complaint, was not cancelled and remains in force. The current complaint is an amended version, and the Plaintiff alleges the service of the original complaint established Defendant's knowledge of the '191 patent.

Case Timeline

Date Event
1999-09-09 '863 and '191 Patent Priority Date
2006-06-09 '191 Patent Application Filing Date
2009-12-08 '191 Patent Issue Date
2014-03-04 IPR Filed Against '191 Patent (IPR2014-00475)
2017-12-08 '863 Patent Application Filing Date
2019-07-16 '863 Patent Issue Date
2023-05-23 Amended Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 10,355,863 - "System and method for authenticating electronic content," issued July 16, 2019

The Invention Explained

  • Problem Addressed: The patent describes the problem of online fraud where malicious actors create counterfeit web pages or emails that mimic legitimate ones to deceive consumers and steal personal information. It notes that visual indicators like corporate logos and even URLs are easily copied or spoofed. (’863 Patent, col. 1:25-50).
  • The Patented Solution: The invention proposes a system where, upon a user request for content, a server architecture intervenes to embed an "authenticity key" into the web page or email before it is delivered. Logic on the user's computer, such as a browser plug-in, then verifies this key to confirm the content's origin and can display a pre-configured, personalized "authenticity stamp" to the user as a sign of trust. (’863 Patent, Abstract; col. 2:12-22; Fig. 4).
  • Technical Importance: The technology aimed to provide a more robust, content-level authentication method that is independent of easily forged surface-level elements like web page design or domain names. (’863 Patent, col. 1:59-63).

Key Claims at a Glance

  • The complaint asserts "one or more claims" of the '863 Patent without specifying them, instead referring to an unattached exhibit. (Compl. ¶12). The first independent claim is Claim 1.
  • Independent Claim 1 recites a method for authenticating a web page comprising the steps of:
    • storing an authenticity stamp in a preferences file accessible by designated servers;
    • creating an authenticity key with information to locate the preferences file;
    • receiving a web page request from a client computer;
    • creating formatted data corresponding to the requested page;
    • receiving a request for the authenticity key;
    • sending the formatted data to the client;
    • providing the authenticity key for manipulation by the client to determine the file location;
    • manipulating the key to determine the file location;
    • locating and retrieving the authenticity stamp from the preferences file; and
    • enabling the display of the authenticity stamp.

U.S. Patent No. 7,631,191 - "System and method for authenticating a web page," issued December 8, 2009

The Invention Explained

  • Problem Addressed: The patent identifies the risk that internet users face from fraudulent web pages that appear authentic, noting that consumers often rely on insecure indicators like URLs and logos, which can be easily faked by "fraudsters." (’191 Patent, col. 1:20-37).
  • The Patented Solution: The invention describes an authentication system built around an "authentication processor" that inserts an "authenticity key" into web page data. This key enables a client-side component (e.g., a browser plug-in) to both verify the source of the data and retrieve a corresponding "authenticity stamp" from a local preferences file for display to the user, confirming the page's legitimacy. (’191 Patent, Abstract; col. 4:21-49; Fig. 5).
  • Technical Importance: This system provides a back-end verification mechanism that allows a user's browser to programmatically confirm a website's identity, shifting the basis of trust from fallible human observation to a cryptographic-like process. (’191 Patent, col. 1:45-53).

Key Claims at a Glance

  • The complaint asserts infringement of Claim 24. (Compl. ¶18).
  • Claim 24 depends on independent system claim 17. The essential elements are:
    • An authentication system comprising an authentication processor configured to insert an authenticity key into formatted data. (’191 Patent, Claim 17).
    • The key enables verification of the data's source and retrieval of an authenticity stamp from a preferences file. (’191 Patent, Claim 17).
    • The authentication processor is further configured to receive a preferences key from a third party. (’191 Patent, Claim 24).

III. The Accused Instrumentality

Product Identification

  • The complaint does not identify any specific products, services, or methods by name. It refers generally to "Exemplary Defendant Products." (Compl. ¶12, ¶18).

Functionality and Market Context

  • The complaint does not describe the technical functionality or market context of the accused products. It alleges that the products practice the claimed technology by incorporating by reference claim charts in "Exhibit 3" and "Exhibit 4," which were not filed with the public version of the complaint. (Compl. ¶14-15, ¶23-24).
  • No probative visual evidence provided in complaint.

IV. Analysis of Infringement Allegations

The complaint alleges direct infringement of both patents by stating that the "Exemplary Defendant Products" practice the technology claimed and satisfy all elements of the asserted claims. (Compl. ¶14, ¶23). However, all specific factual allegations mapping product features to claim elements are contained within Exhibits 3 and 4, which were not provided with the complaint. (Compl. ¶15, ¶24). Without these exhibits, a detailed element-by-element analysis based on the complaint's allegations is not possible. The narrative theory is that the Defendant makes, uses, sells, and/or has its employees test products that perform the patented authentication methods. (Compl. ¶12-13, ¶18-19).

  • Identified Points of Contention:
    • Evidentiary Questions: A primary issue will be whether the Plaintiff can produce sufficient technical evidence to map the functionality of the unidentified "Exemplary Defendant Products" to each limitation of the asserted claims. The complaint's lack of specificity on this point suggests that discovery will be central to developing the infringement case.
    • Scope Questions (’863 Patent): For Claim 1 of the '863 Patent, a potential point of contention is whether the accused system performs the specific, multi-step client-server interaction recited. This includes not just inserting a key, but specifically creating a key "with information to locate the preferences file" and a subsequent client-side process of "manipulating" that key to find the file.
    • Technical Questions (’191 Patent): The infringement analysis for Claim 24 of the '191 Patent may hinge on the system's architecture. A key question is whether the accused system includes an "authentication processor" that "receive[s] a preferences key from a third party." The identity of this "third party" and the nature of the "preferences key" it allegedly provides will likely be a focus of dispute.

V. Key Claim Terms for Construction

'863 Patent (from Claim 1)

  • The Term: "authenticity key with information to locate the preferences file"
  • Context and Importance: This term is central as it defines the nature of the link between the server-generated key and the client-side preferences file. Its construction will determine whether a direct or indirect relationship satisfies the claim, which is critical to the scope of the method.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification describes the process as the client "manipulating" the key to determine the file location, which could suggest that the key need not directly contain the location but could be used in a calculation or lookup process to find it. (’863 Patent, col. 14:58-62).
    • Evidence for a Narrower Interpretation: The patent also describes embodiments where the "preferences key" is used to decrypt the preferences file. (’863 Patent, col. 6:35-44; col. 11:23-28). A party could argue this implies the "authenticity key" must itself be or directly contain a decryption key for a specific file, rather than merely containing "information" that leads to it.

'191 Patent (from Claim 24)

  • The Term: "third party"
  • Context and Importance: Claim 24 adds the limitation that the authentication processor receives a preferences key "from a third party." The definition of "third party" is critical to determining what system architectures can infringe. Practitioners may focus on this term because its interpretation will decide whether the key must come from a truly external entity or could come from another component within the defendant's overall system.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The term "third party" is not explicitly defined in the patent, potentially allowing it to cover any entity logically distinct from the authentication processor and the end-user's client.
    • Evidence for a Narrower Interpretation: The patent illustrates a system architecture comprising a user, web server, authentication server, and security engine. (’191 Patent, Fig. 4). A defendant may argue that "third party" must refer to an entity entirely outside this disclosed ecosystem, not merely another server or component controlled by the same operator of the authentication system.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges induced infringement of the '191 Patent. It asserts that Defendant distributes "product literature and website materials" that instruct and encourage end users to use the accused products in a manner that infringes claim 24. (Compl. ¶21-22).
  • Willful Infringement: Willfulness allegations are made for the '191 Patent based on alleged post-suit conduct. The complaint asserts that Defendant gained "actual knowledge" of its infringement upon service of the original complaint and has continued its infringing activities despite this knowledge. (Compl. ¶20-21). No pre-suit knowledge is alleged.

VII. Analyst’s Conclusion: Key Questions for the Case

  • A threshold issue will be one of evidentiary sufficiency: can the Plaintiff, through discovery, produce sufficient factual evidence to demonstrate that the Defendant's currently unidentified online systems perform the specific, multi-step authentication processes required by the asserted claims?
  • A central legal question will be one of claim construction: for the '191 patent, the case may turn on the definition of "third party" and whether the Defendant's system architecture includes such an entity providing a preferences key as claimed.
  • For the '863 patent, a key technical question will be one of functional scope: does the accused system's operation meet the detailed method of creating an "authenticity key with information to locate the preferences file" and the subsequent client-side manipulation of that key, or is there a fundamental mismatch in the technical process?