DCT
1:26-cv-01353
DataCloud Tech LLC v. Advance Local Media LLC
Key Events
Complaint
Table of Contents
complaint Intelligence
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Case: DataCloud Technologies, LLC (Georgia) v. Advance Local Media LLC (New York)
- Plaintiff’s Counsel: Stamoulis & Weinblatt LLC; Kent & Risley LLC
- Case Identification: 3:26-cv-01353, D.N.J., 02/10/2026
- Venue Allegations: Plaintiff alleges venue is proper because Defendant has a regular and established place of business in the District of New Jersey and has committed acts of infringement within the district.
- Core Dispute: Plaintiff alleges that Defendant’s website infrastructure infringes three patents related to anonymous network communication, distributed software application deployment, and metadata-based content management.
- Technical Context: The asserted patents cover technologies for enhancing user privacy online, efficiently delivering rich applications over the internet, and systematizing the creation of web content.
- Key Procedural History: The complaint notes that Certificates of Correction were issued for U.S. Patent Nos. 7,246,351 and 8,607,139 after their initial issuance.
Case Timeline
| Date | Event |
|---|---|
| 2000-02-15 | ’139 Patent Priority Date |
| 2000-04-04 | ’959 Patent Priority Date |
| 2001-02-20 | ’351 Patent Priority Date |
| 2007-04-24 | ’959 Patent Issued |
| 2007-07-17 | ’351 Patent Issued |
| 2007-11-20 | ’351 Patent Certificate of Correction Issued |
| 2013-12-10 | ’139 Patent Issued |
| 2014-06-24 | ’139 Patent Certificate of Correction Issued |
| 2026-02-10 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,209,959 - "Apparatus, System, and Method for Communicating to a Network Through a Virtual Domain Providing Anonymity to a Client Communicating on the Network"
The Invention Explained
- Problem Addressed: The patent’s background section describes the problem of user privacy on the internet, where protocols like HTTP allow servers to record and trace a client's information, leading to privacy threats such as unwanted solicitations and tracking via "cookies" ’959 Patent, col. 1:57-2:6 Existing proxy servers were seen as insufficient, merely providing an alternate, persistent identity rather than true, session-based anonymity ’959 Patent, col. 2:7-19
- The Patented Solution: The invention proposes a system architecture involving three distinct components: a "deceiver," a "controller," and a "forwarder" ’959 Patent, abstract When a user (client) attempts to connect to a website, the deceiver intercepts the request and passes it to the controller. The controller resolves the website's true IP address but provides the IP address of an intermediary "forwarder" back to the client. The client then communicates with the forwarder, which relays the communication to the destination website, thereby masking the client's IP address from the destination and vice versa ’959 Patent, col. 3:46-4:49 ’959 Patent, Fig. 1
- Technical Importance: This system was designed to create temporary, ad hoc "virtual namespaces" that provide a higher degree of anonymity for each browsing session than was available through conventional proxy services ’959 Patent, col. 2:49-54
Key Claims at a Glance
- The complaint asserts at least claim 1 of the ’959 Patent Compl. ¶17
- Independent claim 1 is a method claim with the following essential elements:
- In response to a client request to communicate with a destination website, setting up a forwarding session.
- The session employs a "forwarder" between the client and destination server to forward packets in both directions.
- The session is implemented such that neither the client nor the destination server is aware of the forwarder's employment.
- The session employs a "controller" that communicates with the forwarder and a domain name server (DNS) to resolve the destination website's name.
- The session employs a "deceiver" that receives the initial client request and initiates the controller to query the DNS.
- The forwarding session is initiated in response to the controller receiving the answer from the DNS.
- The complaint states infringement of "one or more claims," preserving the right to assert others Compl. ¶16
U.S. Patent No. 7,246,351 - "System And Method For Deploying And Implementing Software Applications Over A Distributed Network"
The Invention Explained
- Problem Addressed: The patent addresses the challenge of deploying robust software applications over networks, particularly to devices with slow or wireless connections ’351 Patent, col. 1:25-33 It notes that browser-based applications often lack functionality and require constant connectivity, while fully compiled, locally installed applications are large, platform-dependent, and difficult to update ’351 Patent, col. 2:25-61
- The Patented Solution: The patent describes a client-side "assembler program," referred to as an "Application Virtual Machine" (AVM), that is small and installed once on a user's device ’351 Patent, col. 3:11-15 This AVM downloads "text files" (e.g., XML) from a server that contain "embedded application logic." The AVM then locally "assembles the retrieved program logic into a functioning, graphical application in temporary memory," creating a rich user experience without a large, permanent installation ’351 Patent, abstract ’351 Patent, col. 4:11-19
- Technical Importance: This approach sought to combine the benefits of thin-client, web-based deployment (small footprint, easy updates) with the performance and rich graphical interface of a traditional, locally executed application ’351 Patent, col. 3:1-10
Key Claims at a Glance
- The complaint asserts at least claim 14 of the ’351 Patent Compl. ¶28
- Independent claim 14 is a method claim with the following essential elements:
- Storing and running a software module on a user's client device.
- Providing text files containing embedded program logic to the client device for the software module to assemble into a computer program.
- The resulting computer program provides a graphical user interface for receiving and interpreting user inputs.
- Running the assembled computer program on the client device.
- Enabling user interaction with the running program.
- The complaint states infringement of "one or more claims," preserving the right to assert others Compl. ¶27
U.S. Patent No. 8,607,139 - "System and process for managing content organized in a tag-delimited template using metadata"
Technology Synopsis
- The patent describes a system for separating web content from its presentation structure. It discloses using a "metadata template" to define the structure, appearance, and data types for a web page. This template is used to automatically generate a data entry form, allowing a user to input content, which is then used to generate the final web page based on the template's rules ’139 Patent, abstract
Asserted Claims
- The complaint asserts at least claim 8 Compl. ¶39
Accused Features
- The complaint accuses Defendant's website infrastructure of performing a method of displaying a graphical interface based on a metadata template, generating a data entry form, and generating a web page from content entered into that form Compl. ¶39
III. The Accused Instrumentality
Product Identification
- The accused instrumentality is identified broadly as "Defendant's website infrastructure" Compl. ¶17 Compl. ¶28 Compl. ¶39
Functionality and Market Context
- The complaint alleges that this infrastructure performs the methods recited in the asserted claims. For the ’959 Patent, it is alleged to establish an anonymized forwarding session for client communications Compl. ¶17 For the ’351 Patent, it is alleged to provide a client-side software module that assembles a functional application from text files containing program logic Compl. ¶28 For the ’139 Patent, it is alleged to use metadata templates to generate data entry forms and web pages Compl. ¶39 The complaint does not provide further technical details about the architecture of the accused infrastructure or its specific market positioning. No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
’959 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| ...employing a forwarder disposed between the client and the destination server to forward packets... | Defendant has performed a method that involves setting up a forwarding session between a client and a destination server... | ¶17 | col. 6:50-58 |
| ...wherein the forwarding session is set up and implemented such that neither the client or the destination server is aware of the employment of the forwarder... | The accused infrastructure allegedly sets up and implements the forwarding session such that neither the client nor the destination server is aware of the forwarder. | ¶17 | col. 6:58-62 |
| ...employing a controller configured to communicate with the forwarder and a domain name server, wherein the controller queries the domain name server to resolve the name of the destination website associated with the destination server... | The accused method is alleged to employ a controller that communicates with the forwarder and a domain name server to resolve the destination website's name. | ¶17 | col. 6:62-65 |
| ...employing a deceiver configured to communicate with the controller and the client, wherein the deceiver receives the request by the client to initiate communication with the destination website... | The accused method is alleged to employ a "deceiver" that receives the client's request and communicates with the controller. | ¶17 | col. 7:4-9 |
Identified Points of Contention
- Architectural Mapping: The patent claims a specific three-part architecture ("deceiver," "controller," "forwarder"). A primary point of contention may be whether Defendant's "website infrastructure" contains components that map directly onto these claimed elements, or if it employs a different, more integrated architecture for managing network traffic that does not meet these limitations.
- Awareness: The claim requires that "neither the client or the destination server is aware of the employment of the forwarder." A factual question for the court will be what evidence the complaint or discovery provides to demonstrate this specific lack of awareness, which is a negative limitation that may require technical proof of how the accused system operates from both the client and server perspectives.
’351 Patent Infringement Allegations
| Claim Element (from Independent Claim 14) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| ...storing and running a software module on a user's client device... | Defendant is alleged to perform a method for storing and running a software module on a user's client device. | ¶28 | col. 23:56-59 |
| ...providing to the client device text files containing embedded program logic for the software module to assemble into the computer program... | Defendant is alleged to provide text files with embedded program logic that are used by the software module to assemble a functioning application. | ¶28 | col. 24:15-20 |
| ...wherein the computer program provides a graphical user interface for receiving and interpreting user inputs to the client device that enables user interaction with the computer program running on the client device. | The resulting application allegedly provides a graphical user interface (GUI) and enables user interaction on the client device. | ¶28 | col. 24:18-23 |
Identified Points of Contention
- Definitional Scope: The claim recites a "software module" that "assemble[s]" a program. A central dispute may arise over whether standard web browser functions—such as rendering HTML and executing JavaScript received from a server—fall within the scope of these terms. The construction of "assemble" will be critical in determining if the patent covers modern, dynamic web application frameworks.
- Technical Operation: The patent describes its "Application Virtual Machine" (AVM) as a specific component that downloads and interprets XML files to create an application. A key factual question will be whether Defendant's infrastructure relies on a distinct, infringing "software module" on the client device, or if its functionality is performed by the general-purpose rendering and script engines inherent to modern web browsers.
V. Key Claim Terms for Construction
’959 Patent: "deceiver"
- Context and Importance: This term is a neologism central to the claimed architecture. The complaint alleges the accused infrastructure employs a "deceiver." The case may turn on whether any component of a modern web infrastructure can be characterized as a "deceiver" as defined and described in the patent.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification states that the deceiver "provides name resolution for clients" and "works the same as a standard name server, except when a query is received from a client, the deceiver allows the controller to supply the information" ’959 Patent, col. 2:36-41 This functional description could support a construction covering any component that intercepts and redirects DNS-type queries.
- Evidence for a Narrower Interpretation: The detailed description and Figure 1 show the "deceiver (104)" as a discrete architectural block through which an "unresolved packet is sent from client (101)" ’959 Patent, col. 3:46-49 This could support a narrower construction requiring a distinct, standalone network element that transparently processes packets.
’351 Patent: "assemble into the computer program"
- Context and Importance: This phrase describes the core function of the invention. The complaint alleges that a software module uses program logic "to assemble into a functioning application" Compl. ¶28 The interpretation of "assemble" will be determinative of whether the patent's scope extends from its 2001-era context to cover modern web technologies.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The abstract broadly describes a process where an "assembler program... assembles the retrieved program logic into a functioning, graphical application" ’351 Patent, abstract This functional language may be argued to encompass any process where code and data are combined on a client to create an interactive application.
- Evidence for a Narrower Interpretation: The specification repeatedly describes the "AVM" as interpreting "XML" and using it to "dynamically build the user interface locally" ’351 Patent, col. 7:34-37 Specific embodiments detail parsing XML files and building a "Document Tree" to render components ’351 Patent, col. 11:4-12 This may support a narrower construction requiring a specific XML-based assembly process, potentially distinguishing it from other methods like hydrating JavaScript components with JSON data.
VI. Other Allegations
Indirect Infringement
- For each asserted patent, the complaint alleges that to the extent any claimed step is performed by a third party (e.g., an end user), Defendant "conditioned the third party's use of the functionality... on the performance of that step" and "controlled the manner and/or timing of the functionality" Compl. ¶18 Compl. ¶29 Compl. ¶40 These allegations appear to address potential divided infringement scenarios but do not plead specific facts to support inducement, such as knowledge of the patents or intent to cause infringing acts.
VII. Analyst’s Conclusion: Key Questions for the Case
- Architectural Equivalence: A core issue will be one of definitional scope: Can the specific architectural components of the ’959 Patent—coined as a "deceiver," "controller," and "forwarder"—be construed to read on the potentially more integrated and functionally distinct elements of a modern, large-scale website infrastructure?
- Technological Evolution: The case raises a key question of technical applicability: Does the ’351 Patent’s claim language, which describes a client-side "software module" that "assembles" a program from "text files," cover the operations of a standard web browser rendering a dynamic webpage using technologies like JavaScript frameworks, or is there a fundamental mismatch between the patented method and the architecture of the modern web?
- Evidentiary Specificity: The complaint makes high-level allegations against a generally described "website infrastructure." A central challenge for the litigation will be an evidentiary one: Can Plaintiff provide sufficient technical evidence to show that Defendant’s systems actually perform the specific, multi-step processes required by the claims, from the anonymization steps of the '959 patent to the metadata-driven content generation of the '139 patent?
Analysis metadata