DCT

1:25-cv-08871

Trustybell GmbH v. Bluenotary LLC

Key Events
Amended Complaint
complaint Intelligence

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:25-cv-08871, N.D. Ill., 04/02/2026
  • Venue Allegations: Venue is alleged to be proper in the Northern District of Illinois because the Defendant is incorporated in Illinois and maintains its principal place of business in the district.
  • Core Dispute: Plaintiffs allege that Defendant's remote online notarization (RON) services infringe a patent related to methods for verifying a participant's identity immediately prior to establishing a secure videoconference.
  • Technical Context: The technology addresses the need for high-certainty identity verification in remote communications, a market that expanded significantly for transactions traditionally requiring in-person authorization, such as notarizations.
  • Key Procedural History: The complaint alleges that Plaintiff Trustybell sent two pre-suit notice letters to Defendant BlueNotary regarding the patent-in-suit on April 22, 2025, and May 22, 2025, to which BlueNotary allegedly did not respond. Ownership of the patent was subsequently transferred from Trustybell to co-plaintiff Schean on September 26, 2025.

Case Timeline

Date Event
2020-11-10 '274 Patent Priority Date
2022-01-01 Accused BlueNotary RON Services Allegedly Began (approx. date)
2023-02-14 '274 Patent Issue Date
2025-04-22 First Pre-Suit Notice Letter Sent to BlueNotary
2025-05-22 Second Pre-Suit Notice Letter Sent to BlueNotary
2025-09-26 '274 Patent Ownership Transferred to Schean
2026-04-02 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 11,582,274 - "Videoconferencing System"

  • Patent Identification: U.S. Patent No. 11,582,274 ("Videoconferencing System"), issued February 14, 2023 (the "'274 Patent").

The Invention Explained

  • Problem Addressed: The patent's background section identifies a shortcoming in conventional videoconferencing systems: they "do not allow verifying the true identity of a conversation partner... in a trustworthy manner" '274 Patent, col. 1:36-41 This prevents conducting remote appointments that require the "same legal security as if they were in the same room" '274 Patent, col. 1:43-45
  • The Patented Solution: The invention integrates a "certified identification" process directly into the call-setup workflow '274 Patent, col. 1:49-52 Before a call is established, the system captures a real-time face image of a participant and an image of their official photo ID '274 Patent, col. 2:1-3 It then uses "technical image analysis" to compare the two facial images '274 Patent, col. 2:4-6 If the identity is verified, a signal containing verified data is transmitted to the other participant, allowing the call to proceed with enhanced security '274 Patent, abstract '274 Patent, col. 2:7-14
  • Technical Importance: The claimed method provides a technical architecture for conducting high-assurance remote transactions by programmatically conditioning the establishment of a communication session on successful, real-time identity verification '274 Patent, col. 6:19-24

Key Claims at a Glance

  • The complaint asserts independent claim 1 and dependent claims 2, 4, 6-9, and 11 Compl. ¶46
  • Independent Claim 1 of the '274 Patent recites the essential elements of a method comprising:
    • Verifying a first participant's identity before or during a video/telephone call.
    • Providing verified identity information to a second participant.
    • The verification step includes capturing a face image of the first participant ("first image") and an image of an official document containing a face image ("second image").
    • Crucially, these two images are captured "immediately before the setup of the video or telephone call."
    • Verification occurs by "comparing the first image with the face image included in the second image, by means of technical image analysis."
    • The providing step includes generating a signal with verified data extracted from the document, transmitting it to the second participant, and displaying it on their terminal.
  • The complaint notes that the asserted dependent claims recite further specific improvements, such as multi-image liveness capture and conditional call rejection Compl. ¶28

III. The Accused Instrumentality

Product Identification

  • Defendant BlueNotary's Remote Online Notarization ("RON") platform and associated services Compl. ¶40

Functionality and Market Context

  • The complaint alleges that BlueNotary's RON service is a "structured, secure, and legally defined process that relies on a specific technology stack to ensure identity verification" Compl. ¶41 The system is described as using "biometrics scanning with live credential evaluation" and performing "facial scans in tandem with ID scanning" Compl. ¶41 BlueNotary is alleged to market its technology as a superior alternative to "outdated 'show your ID to a webcam' solutions" by employing "live facial recognition, liveness checks, and government ID matching powered by AI" Compl. ¶42

IV. Analysis of Infringement Allegations

'274 Patent Infringement Allegations

Claim Element (from Independent Claim 1) Alleged Infringing Functionality Complaint Citation Patent Citation
capturing a face image of the first participant, as a first image The BlueNotary system uses "biometric scanning" which includes checking for "liveness by taking various 'selfie' angles via video." ¶57 col. 13:59-62
capturing an image of an official document identifying the first participant, as a second image, the official document including a face image of the first participant The system prompts users to submit a government-issued ID and partners with a third party (Persona) to "take a picture of the participant's photo ID." ¶58 col. 13:62-65
wherein the two images are captured immediately before the setup of the video or telephone call The service is structured as a multi-step process where "Identity Check" is Step 2, occurring before "Meet The Notary," which is the final step. ¶59 col. 14:11-13
verifying the identity at least by comparing the first image with the face image included in the second image, by means of technical image analysis BlueNotary's system "[a]utomatically compares the ID portrait to a previously captured selfie" using its verification technology. ¶60 col. 14:64-66
generating a signal including verified data identifying the first participant on the basis of data extracted from the second image The system, through its partner Persona, "automatically extract[s] data off government IDs, then verif[ies] the data." ¶61 col. 14:1-4
transmitting said signal to the site of the second participant After verification, BlueNotary "transmits the participant's verified identity data to the notary." ¶62 col. 14:4-5
displaying said verified data identifying the first participant on a terminal device of the second participant The "verification data is shown to the notary during the live session," including the participant's name, address, and verification status. A screenshot in the complaint shows the notary's dashboard displaying the signer's information and a "Processing Outcome: Pass" status. ¶63; ¶64 col. 14:6-10
  • Identified Points of Contention:
    • Scope Questions: A central point of contention may be the construction of "immediately before the setup of the video or telephone call." A defendant could argue that "setup" refers to a specific network-level event (e.g., a SIP handshake) that occurs prior to the user-facing verification steps. The plaintiff's position appears to be that the term refers to the sequence of events in the user workflow, where verification is a required gate before the live meeting can begin Compl. ¶26 Compl. ¶29 The complaint provides visual evidence showing the user flow is "Verify Your Identity" before "Meet The Notary" Compl. p. 27
    • Technical Questions: The complaint alleges BlueNotary uses "AI" and "biometric scanning" Compl. ¶41 Compl. ¶42, but does not detail the specific algorithms. An issue for discovery may be whether the accused system's comparison method falls within the scope of "technical image analysis" as described in the patent, which provides an example of comparing "biometric data such as shape of and distances between predetermined features of the human face" '274 Patent, col. 9:14-21

V. Key Claim Terms for Construction

  • The Term: "immediately before the setup of the video or telephone call"

  • Context and Importance: This temporal limitation is critical to the patent's purported novelty over prior art systems that may have verified identity at other times (e.g., after a session starts or using a pre-verified profile). The complaint frames this timing as a technical anti-spoofing mechanism designed to prevent replay or man-in-the-middle attacks Compl. ¶26 Its construction will likely determine whether the accused sequential workflow infringes.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The patent repeatedly frames the verification as happening "in advance of the setup" '274 Patent, col. 2:49 and "before setup of the video or telephone call is completed" '274 Patent, col. 4:40-42 This language may support a functional interpretation where the verification simply needs to be a prerequisite for completing the call setup process, as opposed to occurring before any technical setup signal is sent.
    • Evidence for a Narrower Interpretation: A defendant may argue that the term "setup" has a specific meaning in the art related to network session initiation protocols. The patent does not explicitly define "setup," leaving this term open to construction arguments based on extrinsic evidence of its meaning to a person of ordinary skill.
  • The Term: "technical image analysis"

  • Context and Importance: This term defines the core comparison step. Practitioners may focus on this term because the accused product uses modern "AI" and "biometric" systems Compl. ¶42, and the dispute will be whether these methods are encompassed by the patent's disclosure.

  • Intrinsic Evidence for Interpretation:

    • Evidence for a Broader Interpretation: The term itself is broad. The specification provides an example of comparing "biometric data such as shape of and distances between predetermined features of the human face" '274 Patent, col. 9:14-21 but does not state this is the only method. A plaintiff would likely argue this is an illustrative, not exhaustive, example.
    • Evidence for a Narrower Interpretation: The patent does not describe more modern machine learning or neural network-based approaches to facial recognition. A defendant could argue that "technical image analysis" should be limited to the types of feature-extraction-and-comparison methods disclosed, potentially excluding the accused system's specific AI implementation.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges induced infringement, stating BlueNotary publishes user manuals, website descriptions, and software interfaces that instruct its users to perform the claimed method steps Compl. ¶72 It also pleads contributory infringement, alleging the RON services are "especially made or adapted for use in practicing the patented methods" and are not staple articles of commerce Compl. ¶76
  • Willful Infringement: Willfulness is alleged based on BlueNotary's purported knowledge of the '274 Patent from two pre-suit letters sent on April 22, 2025, and May 22, 2025. The complaint alleges BlueNotary failed to respond and continued its infringing conduct, constituting an objectively high and known risk of infringement Compl. ¶¶82-86

VII. Analyst's Conclusion: Key Questions for the Case

  • A core issue will be one of temporal scope: Will the claim phrase "immediately before the setup of the video or telephone call" be construed to cover a user-facing workflow where identity verification is a prerequisite step to entering the live meeting, or will it be limited to a stricter, network-protocol-based definition of "setup"? The complaint's screenshots showing the sequential process from "Verify ID" to "Meet The Notary" will be central to this factual inquiry Compl. p. 27
  • A second key question will be one of evidentiary mapping: Can Plaintiffs demonstrate through technical evidence that the specific functions performed by BlueNotary's platform-including its "liveness detection" and the "AI"-powered comparison performed by its partner, Persona-satisfy each limitation of the asserted claims as construed by the court? This will require discovery into the precise architecture and operation of the accused services.