1:26-cv-01488
PacSec3 LLC v. Fastly Inc
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: PacSec3, LLC (Texas)
- Defendant: Fastly, Inc. (Delaware)
- Plaintiff's Counsel: Ramey LLP
- Case Identification: 4:25-cv-03969, S.D. Tex., 08/21/2025
- Venue Allegations: Plaintiff alleges venue is proper in the Southern District of Texas because Defendant has a regular and established place of business in the district, and has committed or induced acts of infringement there.
- Core Dispute: Plaintiff alleges that Defendant's firewall systems and network services infringe a patent related to a distributed defense system against data packet flood attacks, commonly known as Denial-of-Service (DoS) attacks.
- Technical Context: The patent addresses methods for mitigating network-based attacks that aim to overwhelm a target's bandwidth, a foundational technology in the field of cybersecurity and content delivery networks.
- Key Procedural History: The complaint notes that Plaintiff and its predecessors have entered into settlement licenses related to its patents with other entities. The asserted patent, U.S. 7,523,497, is a continuation of an earlier application and was subject to an ex parte reexamination proceeding that concluded in 2023, resulting in the cancellation of claims 1, 4, 13, and 16, and the confirmation of asserted claim 10.
Case Timeline
| Date | Event |
|---|---|
| 2000-11-16 | '497 Patent Priority Date |
| 2009-04-21 | '497 Patent Issue Date |
| 2023-05-22 | '497 Patent Reexamination Certificate Issued |
| 2025-08-21 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 7,523,497 - "PACKET FLOODING DEFENSE SYSTEM"
- Patent Identification: U.S. Patent No. 7,523,497, "PACKET FLOODING DEFENSE SYSTEM," issued April 21, 2009 (the '497 Patent).
The Invention Explained
- Problem Addressed: The patent seeks to solve the problem of "packet flooding attacks," where an attacker overwhelms a victim's network bandwidth with useless data, rendering services slow or unavailable '497 Patent, col. 2:7-11 The background notes that prior art defenses were often ineffective because they relied on information controlled by the attacker, such as a falsified source address, which could be used to "confound the defense" '497 Patent, col. 2:2-6
- The Patented Solution: The invention proposes a distributed defense system where routers and the target site (host computer) cooperate '497 Patent, abstract Instead of relying on sender-provided information, the system uses "attacker-independent information" about the path a data packet takes through the network to identify the source of an attack '497 Patent, col. 4:1-5 Once the path of unwanted data is identified, the target site can request that upstream routers limit the rate at which data from that path is forwarded, thereby mitigating the attack '497 Patent, col. 3:5-10 '497 Patent, abstract
- Technical Importance: This approach represented a shift toward cooperative, path-based network defense, aiming to provide a more robust method for identifying and throttling malicious traffic without relying on easily spoofed packet headers.
Key Claims at a Glance
- The complaint asserts independent claim 10 '497 Patent, col. 10:26-44 Compl. ¶15
- The essential elements of claim 10, a method claim, are:
- determining a path by which data packets arrive at a router via packet marks provided by routers leading to a host computer;
- classifying data packets received at the router by path;
- associating a maximum acceptable transmission rate with each class of data packet received at the router; and
- allocating a transmission rate equal to or less than the maximum acceptable transmission rate for unwanted data packets.
- The complaint does not explicitly reserve the right to assert other claims but states infringement of "one or more claims... including claim 10" Compl. ¶15
III. The Accused Instrumentality
Product Identification
The complaint does not identify specific products by name. It accuses "one or more firewall systems" sold and manufactured by Defendant Compl. ¶15 and refers generally to "Defendant's Accused Instrumentality" and "Defendant's products and services" Compl. ¶19 Compl. ¶15
Functionality and Market Context
The complaint provides no specific details on the functionality of the accused products. It alleges in general terms that Defendant sells and offers to sell these products throughout the United States Compl. ¶3 Compl. ¶19 No probative visual evidence provided in complaint.
IV. Analysis of Infringement Allegations
The complaint references a claim chart in "Exhibit B" that purportedly describes how the Accused Instrumentality infringes claim 10 Compl. ¶16 Compl. ¶21 However, this exhibit was not attached to the filed complaint. The complaint's narrative infringement theory is limited to the assertion that Defendant's firewall systems practice the claimed method Compl. ¶15 Without a claim chart or more detailed allegations, a direct comparison of product features to claim elements cannot be performed based on the provided documents.
- Identified Points of Contention: The conclusory nature of the allegations suggests that initial disputes may center on the sufficiency of the complaint. Assuming the case proceeds, the following technical and legal questions are likely to arise:
- Technical Question: What feature in the accused Fastly systems constitutes "packet marks provided by routers" that are used to "determine a path" as required by claim 10? The analysis will require evidence of how Fastly's systems trace the path of incoming traffic and whether that mechanism aligns with the patent's description.
- Scope Question: Does the accused system's method for traffic shaping or rate-limiting constitute "allocating a transmission rate... for unwanted data packets" as defined by the claim? The definition of "unwanted" and the specific mechanism of "allocating" will be central to this inquiry.
- Evidentiary Question: What evidence does the Plaintiff possess to demonstrate that Defendant's systems perform each step of the method of claim 10, particularly the cooperative path-determination and rate-limiting functions?
V. Key Claim Terms for Construction
"packet marks provided by routers"
- Context and Importance: This term is the central mechanism for the claimed invention's "path" determination, which the patent distinguishes from unreliable, attacker-controlled information '497 Patent, col. 4:1-5 The viability of the infringement case may depend on whether modern network telemetry or packet-tracing techniques used by Fastly can be considered "packet marks" within the meaning of the claim.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification does not appear to define "packet marks" with specificity, instead describing the function of using the path for allocation '497 Patent, col. 4:60-64 A party could argue the term should be read broadly to encompass any data added to or associated with a packet by a router that helps identify its path.
- Evidence for a Narrower Interpretation: A party could argue that the term should be limited to the specific concepts of path-based identification disclosed in the patent, potentially distinguishing it from modern, more complex traffic analysis methods. The patent's filing date (priority from 2000) may support an argument that the term's meaning is tied to the state of router technology at that time.
"unwanted data packets"
- Context and Importance: The claim requires allocating a transmission rate specifically for "unwanted" packets. How this classification occurs is critical. Practitioners may focus on this term because modern DDoS mitigation systems use sophisticated, multi-factor analysis (e.g., behavioral analysis, signature matching, IP reputation) to classify traffic, which may differ from the simpler classification scheme contemplated by the patent.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent states that "the distinction between 'wanted' and 'unwanted' packets plays an important role" but provides flexibility, noting that "All other packets are not exactly unwanted, but the site is willing to process them at only a limited rate" '497 Patent, col. 3:13-19 This may support a broad definition covering any packet that a system deprioritizes or throttles.
- Evidence for a Narrower Interpretation: The claim requires classifying packets into "wanted" and "unwanted" categories at a host computer '497 Patent, col. 8:13-15, claim 1 A party might argue that this term requires a binary classification made by the end-target, as opposed to a more nuanced, network-level threat scoring performed by an intermediary service like Fastly.
VI. Other Allegations
- Indirect Infringement: The complaint alleges inducement in its prayer for relief, based on Defendant "instructing to use Defendant's products" Compl., Prayer for Relief ¶a The body of the complaint does not provide further factual support for this allegation.
- Willful Infringement: Willfulness is pleaded conditionally. Plaintiff asks the court to declare infringement willful "provided discovery reveals that Defendant (1) knew of the patent-in-suit prior to the filing date" and subsequently infringed Compl., Prayer for Relief ¶e The complaint also makes a conclusory allegation that Defendant "did not have a reasonable basis for believing that the claims of the '497 Patent were invalid" Compl. ¶18
VII. Analyst's Conclusion: Key Questions for the Case
The dispute as framed by the complaint is at a very early stage, with minimal factual detail. Based on the patent and the nature of the allegations, the case will likely center on the following questions:
An Evidentiary Question of Technical Operation: Can the Plaintiff produce evidence demonstrating that Fastly's modern, sophisticated DDoS mitigation and traffic management systems practice the specific, sequential method steps of claim 10? The core of the case will be mapping Fastly's technology to claim limitations such as "packet marks" and path-based classification, which were drafted in the context of early 2000s networking technology.
A Definitional Question of Claim Scope: How will the court construe key terms like "packet marks provided by routers" in light of the patent's reexamination history and advancements in network security? The survival of claim 10 through reexamination confirms its patentability but also invites close scrutiny of its boundaries, which will be critical in determining whether it reads on the accused 2020s-era network services.