DCT

1:26-cv-02288

DatRec LLC v. Namely Inc

Key Events
Complaint
complaint Intelligence

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 1:26-cv-02288, S.D.N.Y., 03/19/2026
  • Venue Allegations: Plaintiff alleges venue is proper because Defendant has a regular and established place of business in the district, has committed alleged acts of infringement there, and conducts substantial business in the forum.
  • Core Dispute: Plaintiff alleges that Defendant's platform and server systems for communication over a public network infringe a patent related to verifying user identity and defining communication levels based on that verification.
  • Technical Context: The technology at issue addresses the problem of trust and identity verification in online communications by creating a system to assess the reliability of user-provided data.
  • Key Procedural History: The complaint notes that Plaintiff and its predecessors-in-interest have entered into settlement licenses with other entities, but asserts these licenses did not involve producing a patented article and thus did not trigger patent marking requirements.

Case Timeline

Date Event
2006-12-07 '309 Patent - Earliest Priority Date
2013-02-19 '309 Patent - Issue Date
2026-03-19 Complaint Filing Date

II. Technology and Patent(s)-in-Suit Analysis

U.S. Patent No. 8,381,309 - "Methods and Systems for Secure Communication Over a Public Network"

  • Issued: Feb. 19, 2013

The Invention Explained

  • Problem Addressed: The patent addresses the challenge of modern internet communication where individuals are often exposed to "non-secure connections and to communications from unreliable or falsely-identified senders" '309 Patent, col. 1:21-25 The background section highlights a general "need in the art for communication channels over public networks with a high level of security" '309 Patent, col. 1:43-45
  • The Patented Solution: The invention proposes a method for creating a trusted communication network by building a database of verified user identities '309 Patent, abstract The system permits users to enter data about themselves and their relationships to others (e.g., family, colleagues) '309 Patent, col. 19:18-22 This user-submitted data is then cross-referenced and compared with data submitted by other users to determine a "level of reliability" for each piece of information '309 Patent, col. 19:26-29 Based on this verification, the system can define different "levels of permitted communications" between users, thereby improving confidence in the identity of the parties '309 Patent, col. 1:63-65 '309 Patent, col. 19:30-34 Figure 3A illustrates a flowchart where data from a first and second user are compared to determine if a "match" is "reliable" '309 Patent, FIG. 3A
  • Technical Importance: The technology aims to provide a systematic method for authenticating user identities online, not through biometrics or traditional credentials, but by leveraging social or relational data to establish a "confidence" level '309 Patent, col. 2:37-40

Key Claims at a Glance

  • The complaint asserts claims 1-17 Compl. ¶8 Independent claim 1 is a method claim.
  • Independent Claim 1 Elements:
    • Providing a database with verified data relating to an individual's identity, where the database is constructed by:
      • Permitting a plurality of related individuals to enter "individual-associated data bits (IDB)" which include a "personal identifier and relationship data indicative of a family tree."
      • Generating an "individual-associated data set (IDS)" from the IDB.
      • "Verifying the IDS" by determining a "level of reliability based on a degree of similarity between data on the individual entered by different individuals."
    • Compiling the individual data sets to construct the database.
    • Defining "one or more levels of permitted communication between individuals in the database and the verified individual on the basis of the verification."

III. The Accused Instrumentality

Product Identification

The complaint identifies the accused instrumentality as a "system and methods for secure communication over a public network" operated by the Defendant Compl. ¶8 It specifically refers to "Namely's server system" and the "Namely Platform" Compl. ¶10 Compl. ¶11

Functionality and Market Context

The complaint provides very little detail about the specific functionality of the accused products. It alleges that Defendant's website offers products and services with "instruction or advertisement that suggests an infringing use" Compl. ¶11 The complaint does not describe how the Namely Platform operates, but alleges that it is used for "secure communication over a public network" in a manner that infringes the '309 Patent Compl. ¶10

No probative visual evidence provided in complaint.

IV. Analysis of Infringement Allegations

The complaint references a "preliminary exemplary table attached as Exhibit B" to support its infringement allegations Compl. ¶9 However, this exhibit was not included with the filed complaint. Therefore, the infringement theory is based on the general narrative allegations in the complaint.

Plaintiff alleges that Defendant "maintains, operates, and administers a system and methods for secure communication over a public network that infringes one or more of claims of the '309 patent" Compl. ¶8 The complaint does not, however, provide specific factual allegations mapping the features of the Namely Platform to the limitations of the asserted claims.

  • Identified Points of Contention:
    • Factual Question: The central issue will be evidentiary. The complaint lacks any specific allegations explaining how the accused Namely Platform performs the core steps of the asserted claims. A primary question will be whether the accused system actually constructs a database by (1) collecting personal and relationship data from multiple users about a single individual, (2) comparing that data to assess similarity, and (3) generating a "level of reliability" used to control communication permissions, as required by claim 1.
    • Scope Question: The dispute may turn on the definition of "verifying." The patent describes a specific cross-referencing process to establish data reliability. The analysis will question whether any identity authentication performed by the accused platform meets the specific functional requirements of this claim term as defined by the patent's specification.

V. Key Claim Terms for Construction

  • The Term: "verifying the IDS for the individual by determining the level of reliability based on a degree of similarity between data on the individual entered by different individuals"

    • Context and Importance: This phrase recites the core technical mechanism of the invention. The outcome of the case may depend on whether the Defendant's system performs this specific multi-step verification process. Practitioners may focus on this term because it is a functional limitation that appears to require a specific method of cross-referencing and scoring data from multiple sources.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The patent states that "a level of reliability (confidence) in the authenticity is determined based on correspondence between data on the individual entered by different users" '309 Patent, col. 4:3-6 This more general language could support a construction that covers various forms of data correspondence analysis.
      • Evidence for a Narrower Interpretation: The detailed description and figures provide a specific embodiment of this process. The system calculates a "relative reliability" and requires a match to be "reliable according to a predetermined criterion" before ascribing high reliability '309 Patent, col. 10:51-56 Figure 3A shows a distinct decision point: "MATCH BETWEEN D1 AND D2 RELIABLE?" '309 Patent, FIG. 3A This may support a narrower construction requiring a quantitative or rule-based reliability determination.
  • The Term: "relationship data indicative of a family tree"

    • Context and Importance: This term defines the type of input data used to build the verified database. Whether the accused system collects this specific type of data will be a key infringement question.
    • Intrinsic Evidence for Interpretation:
      • Evidence for a Broader Interpretation: The specification defines "relationship data" broadly to include not only "family ties" but also "friends, acquaintances, neighbors, business colleagues or associates" '309 Patent, col. 5:46-52 This language could support an interpretation where any form of social connection data satisfies the limitation.
      • Evidence for a Narrower Interpretation: The claim itself uses the specific phrase "family tree," and the patent repeatedly uses "family" as the primary example of relationship data '309 Patent, col. 5:40-46 An argument could be made that the term requires actual genealogical or familial relationship information, not just general social connections.

VI. Other Allegations

  • Indirect Infringement: The complaint alleges inducement by claiming Defendant instructs customers on how to use "Namely's server system" for secure communication Compl. ¶10 It alleges contributory infringement by asserting that the "only reasonable use" of the product is an infringing one and that it is not a staple commercial product Compl. ¶11
  • Willful Infringement: The complaint alleges Defendant has known of the '309 Patent "from at least the filing date of the lawsuit" Compl. ¶10 Compl. ¶11 It reserves the right to amend if pre-suit knowledge is discovered Compl. ¶10, n.1 Willfulness allegations are therefore predicated on post-filing conduct.

VII. Analyst's Conclusion: Key Questions for the Case

The complaint as filed presents a high-level infringement theory with minimal factual support. The litigation will likely focus on the following fundamental questions:

  1. A core issue will be one of evidentiary demonstration: What facts and evidence can Plaintiff produce to show that the accused Namely Platform performs the specific, multi-step method of claim 1? The complaint's lack of detail on the accused product's operation makes this the primary and most immediate hurdle.
  2. A key legal question will be one of functional scope: How will the court construe the central limitation of "verifying... by determining the level of reliability"? The case may depend on whether this term is interpreted broadly to cover any form of identity check or narrowly to require the specific cross-user data comparison and scoring method detailed in the patent's specification.