2:25-cv-00516
Valtrus Innovations Ltd v. FedEx Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Valtrus Innovations Ltd. and Key Patent Innovations Ltd. (Ireland)
- Defendant: FedEx Corporation and FedEx Office and Print Services, Inc. (Delaware / Texas)
- Plaintiff’s Counsel: Fabricant LLP
- Case Identification: 2:25-cv-00516, E.D. Tex., 02/11/2026
- Venue Allegations: Venue is alleged to be proper in the Eastern District of Texas because Defendant is registered to do business in the state, maintains physical offices within the district, and has allegedly committed acts of patent infringement in the district.
- Core Dispute: Plaintiff alleges that Defendant’s backend information technology infrastructure, which utilizes open-source software such as Kubernetes, Hadoop, and Kafka, infringes four patents related to clustered computing systems, file system data security, application deployment in grid environments, and storage device performance monitoring.
- Technical Context: The technologies at issue are foundational components of modern, large-scale distributed computing and "Platform as a Service" (PaaS) systems, which are critical for managing the complex data processing and logistical operations of global enterprises.
- Key Procedural History: The complaint alleges that Plaintiff provided Defendant with notice of infringement for U.S. Patent Nos. 7,904,686, 8,370,416, and 7,640,332 via correspondence in October 2024, which may form a basis for allegations of willful infringement.
Case Timeline
| Date | Event |
|---|---|
| 2001-09-27 | U.S. Patent No. 7,120,832 Priority Date |
| 2006-04-26 | U.S. Patent No. 8,370,416 Priority Date |
| 2006-10-10 | U.S. Patent No. 7,120,832 Issued |
| 2006-12-27 | U.S. Patent No. 7,640,332 Priority Date |
| 2007-07-31 | U.S. Patent No. 7,904,686 Priority Date |
| 2009-12-29 | U.S. Patent No. 7,640,332 Issued |
| 2011-03-08 | U.S. Patent No. 7,904,686 Issued |
| 2013-02-05 | U.S. Patent No. 8,370,416 Issued |
| 2019-01-01 | Alleged first use of Kubernetes by Defendant |
| 2019-01-01 | Alleged first use of Apache Hadoop by Defendant |
| 2020-01-01 | Alleged first use of Apache Kafka Streams by Defendant |
| 2020-12-28 | Defendant completes acquisition of ShopRunner |
| 2021-01-01 | Alleged first use of Apache HBase by Defendant |
| 2024-10-08 | Plaintiff allegedly sent notice of infringement of the '686 Patent |
| 2024-10-16 | Plaintiff allegedly sent notice of infringement of the '416 Patent |
| 2024-10-16 | Plaintiff allegedly sent notice of infringement of the '332 Patent |
| 2026-02-11 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,370,416 - "Compatibility Enforcement in Clustered Computing Systems"
The Invention Explained
- Problem Addressed: The patent describes the technical challenge of ensuring hardware/software compatibility and compliance with licensing terms in "clustered computing systems," where groups of computing devices cooperate as a single system and components may be changed during maintenance or upgrades ʼ416 Patent, col. 1:11-24
- The Patented Solution: The invention proposes a method for creating a clustered system where "license information" is stored within a computing node ʼ416 Patent, abstract This information includes a "bundle-type parameter" that defines characteristics of the cluster, such as its size or the type of nodes allowed ʼ416 Patent, col. 9:36-40 The system initializes a cluster with a first node, and as more nodes are added, it checks them for compliance with this bundle-type parameter before "activating" the expanded cluster, thereby creating a self-enforcing compatibility and licensing framework ʼ416 Patent, col. 9:40-44
- Technical Importance: This approach allows for the scalable construction of complex, multi-node computing clusters while automatically enforcing pre-defined commercial and technical rules, which can prevent system misconfigurations or license violations.
Key Claims at a Glance
- The complaint asserts at least independent claim 1 Compl. ¶25
- Claim 1 requires:
- storing license information for a computing cluster in a memory module associated with a computing node;
- wherein the licensing information includes a bundle-type parameter that identifies a size of the cluster and at least one additional bundle-type characteristic, and one or more node license parameters that identify a characteristic of a computing node;
- initializing the computing cluster in a first computing node;
- adding one or more available computing nodes to the computing cluster; and
- activating the computing cluster when the computing cluster includes a number of nodes that complies with the bundle-type parameter.
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 7,904,686 - "Data Security for Use with a File System"
The Invention Explained
- Problem Addressed: The patent background explains that conventional file systems store information about a file's location in an "index node" (inode), which can allow an individual to bypass application-level security and reconstruct a file by directly accessing its constituent data blocks on a storage device ʼ686 Patent, col. 1:26-34
- The Patented Solution: The invention introduces a "block distribution engine" that applies a "mapping function" to the data block numbers stored in a file's inode ʼ686 Patent, abstract Instead of pointing directly to the physical storage addresses, the inode contains logical block numbers that the engine translates into the actual physical addresses ʼ686 Patent, col. 2:56-62; ʼ686 Patent, Fig. 1 An unauthorized user who accesses the inode directly would only retrieve these logical numbers, which are insufficient to locate and reconstruct the file without the corresponding mapping function ʼ686 Patent, col. 4:26-32
- Technical Importance: This method provides security at the file system level by obfuscating the physical location of data, thereby aiming to prevent unauthorized copying or reconstruction of files even when an adversary has low-level access to the storage medium.
Key Claims at a Glance
- The complaint asserts at least independent claim 1 Compl. ¶42
- Claim 1 requires:
- applying a mapping function to data block numbers that are associated with a file, wherein the data block numbers are contained in an index node associated with said file;
- obtaining mapped data block numbers after applying the mapping function;
- wherein the mapped data block numbers are addresses of data of the file in a storage device.
- The complaint does not explicitly reserve the right to assert dependent claims.
U.S. Patent No. 7,640,332 - "System and Method for Hot Deployment/Redeployment in Grid Computing Environment"
- Technology Synopsis: The patent addresses the challenge of updating applications in a grid computing environment, which may consist of many different servers, without requiring significant downtime ʼ332 Patent, col. 1:47-54 The patented solution describes a system where a new application version is added to a repository server; a discovery service determines which nodes are running the application; a manager on each affected node is notified; and the new version is then automatically "hot deployed" to the running application servers on those nodes using an appropriate protocol ʼ332 Patent, abstract; ʼ332 Patent, col. 2:34-45
- Asserted Claims: At least independent claim 1 Compl. ¶56
- Accused Features: Defendant's alleged use of Kubernetes to perform "rolling updates" for applications Compl. ¶¶18, 58
U.S. Patent No. 7,120,832 - "Storage Device Performance Monitor"
- Technology Synopsis: The patent addresses the problem of "recoverable" or "masked" failures in storage devices, where performance degrades or temporary errors occur before a complete failure, but these warning signs are not reported to the user (ʼ832 Patent, col. 1:27-34; ʼ832 Patent, col. 2:1-7). The invention proposes a system to monitor storage device performance by intercepting communications between the computer and the storage device, analyzing metrics such as access time or failure reports, comparing them to a threshold, and responding to a detected performance decline (e.g., by reallocating data) prior to a predicted catastrophic failure ʼ832 Patent, abstract
- Asserted Claims: At least independent claim 25 Compl. ¶73
- Accused Features: Defendant's alleged use of Apache Kafka Streams with RocksDB Universal Compaction, Apache Cassandra, and Apache HBase, which are claimed to perform methods of monitoring performance and reallocating data Compl. ¶¶19, 72
III. The Accused Instrumentality
Product Identification
The complaint targets not a single product, but components of Defendant's internal, large-scale information technology infrastructure, which is described as a Platform as a Service (PaaS) system Compl. ¶26 Specifically accused are Defendant's systems that use the open-source software platforms Kubernetes, Apache Hadoop Distributed File System (HDFS), Apache Kafka Streams, RocksDB, Apache Cassandra, and Apache HBase Compl. ¶¶16-19
Functionality and Market Context
- The complaint alleges that Defendant uses Kubernetes for container orchestration, including creating computing clusters and performing "rolling updates" to deploy new application versions without downtime Compl. ¶¶27, 58 Defendant's use of Kubernetes is presented as part of its "Cloud Dojo" initiative to accelerate digital transformation Compl. ¶26, fn 5
- Apache Hadoop and its HDFS file system are allegedly used to store and manage large-scale data across distributed clusters Compl. ¶¶17, 43 The complaint presents a FedEx job posting for a "Data Scientist" that lists "Hadoop" as a required skill as evidence of its use Compl. p. 20
- The complaint alleges that Apache Kafka Streams, RocksDB, Cassandra, and HBase are used in Defendant's systems for data streaming, processing, and storage. Their functions related to data compaction and performance optimization are accused of infringing the '832 Patent Compl. ¶¶75-78, 80-83, 91-94 A diagram from a technical document illustrates the architecture of RocksDB, which is accused of performing infringing data reallocation Compl. p. 50, image 88 These technologies are alleged to be central to Defendant's real-time package tracking and logistics operations Compl. p. 48, image 82
IV. Analysis of Infringement Allegations
8,370,416 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| storing license information for a computing cluster... wherein the licensing information includes a bundle-type parameter that identifies a size of the cluster and at least one additional bundle-type characteristic... | Kubernetes, via its "kubeadm" tool, stores information defining the cluster, including the number of control-plane and worker nodes, which the complaint alleges constitutes a size parameter and bundle-type characteristic. | ¶28 | col. 9:36-40 |
| initializing the computing cluster in a first computing node | The Kubernetes "kubeadm init" command is used to initialize a cluster on a first "control-plane node." | ¶29 | col. 9:40-41 |
| adding one or more available computing nodes to the computing cluster | Additional nodes are added to the initialized Kubernetes cluster using the "kubeadm join" command. | ¶29 | col. 9:41-42 |
| activating the computing cluster when the computing cluster includes a number of nodes that complies with the bundle-type parameter | Once the specified nodes have joined and the control-plane is configured, the Kubernetes cluster is formed and becomes active, and is capable of passing "Node conformance tests." | ¶30 | col. 9:42-44 |
7,904,686 Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| applying a mapping function to data block numbers that are associated with a file, wherein the data block numbers are contained in an index node associated with said file | The Apache HDFS NameNode determines the locations of a file's data blocks, which are stored across various DataNodes. This process of determining block locations is alleged to be the "mapping function," and the NameNode's memory storing the file-to-block mapping is the alleged "index node." | ¶44 | col. 2:56-62 |
| obtaining mapped data block numbers after applying the mapping function | A client reading a file from HDFS calls the NameNode, which returns the addresses of the DataNodes that store the relevant blocks. | ¶45 | col. 4:1-5 |
| wherein the mapped data block numbers are addresses of data of the file in a storage device | The addresses returned by the NameNode correspond to the DataNodes, which are the storage devices that physically store the data blocks of the file. A diagram from a book illustrates this client-NameNode-DataNode interaction (Compl. p. 26, image 45). | ¶45 | col. 1:31-34 |
- Identified Points of Contention:
- Scope Questions: A central point of contention for the '416 Patent may be whether the technical configuration parameters in an open-source tool like Kubernetes (e.g., number of nodes in a cluster) can be construed as the claimed "license information" and "bundle-type parameter." The defense may argue these terms, as described in the patent, imply a commercial or contractual licensing scheme, not merely a technical configuration. For the '686 Patent, a question is whether the standard function of a distributed file system's name node—looking up the locations of data blocks—is equivalent to the patent's specific "mapping function," which is described as a security feature to obfuscate data locations.
- Technical Questions: For the '832 Patent, a key technical question will be whether the routine data optimization and efficiency processes in the accused technologies (e.g., RocksDB or Cassandra "compaction") perform the specific function of monitoring for performance degradation indicative of a predicted failure and reallocating data in response to that prediction, as required by the claim. The complaint alleges these functions are equivalent, but the defense may argue that compaction is a standard maintenance task, not a pre-failure mitigation strategy based on analyzing intercepted communications.
V. Key Claim Terms for Construction
The Term: "license information" (from '416 Patent, claim 1)
Context and Importance: This term is critical because the infringement allegation hinges on construing technical configuration data within Kubernetes as "license information." The outcome may depend on whether the term is limited to a commercial context or can encompass any set of rules that constrain a cluster's configuration.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: Claim 1 itself does not explicitly require the "license information" to be commercial. It is defined by its function: including a "bundle-type parameter" that identifies characteristics of the cluster. Any stored data that performs this function could potentially fall within the claim's scope.
- Evidence for a Narrower Interpretation: The specification discusses concepts like a "Right to Use license," "Node License pool," and obtaining licenses from a "license server," which suggests a commercial framework for buying and managing software rights ʼ416 Patent, col. 11:15-18; ʼ416 Patent, col. 11:30-34 This context may support a narrower construction limited to commercial licensing data.
The Term: "mapping function" (from '686 Patent, claim 1)
Context and Importance: This term is the central inventive concept of the '686 Patent. The dispute may turn on whether HDFS's standard block location lookup is a "mapping function" as claimed, or if the term requires a specific transformative or obfuscating quality for security purposes.
Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: Claim 1 does not specify the mathematical properties of the "mapping function," only that it is "applied" to data block numbers to "obtain" mapped data block numbers that are addresses. This broad language could be argued to cover a simple lookup table that maps one set of numbers to another.
- Evidence for a Narrower Interpretation: The patent's background section explicitly frames the invention as a solution to a security problem, where individuals can "reconstruct a file" by accessing the inode '686 Patent, col. 1:26-34 The specification provides a mathematical example, "f(x)=5x", suggesting a transformation rather than a direct lookup '686 Patent, col. 3:63-65 This purpose-driven context may support a narrower construction requiring the function to provide a security benefit through obfuscation.
VI. Other Allegations
- Indirect Infringement: The complaint alleges that Defendant induced infringement of the '416, '686, and '332 patents by providing the accused technologies to customers and end-users and supplying instructions on how to operate them in an infringing manner through its website and product literature Compl. ¶¶32, 47, 64 For the '832 patent, inducement is alleged more generally Compl. ¶20
- Willful Infringement: Willfulness is alleged for the '416, '686, and '332 patents Compl. p. 70, prayer ¶b The basis for this allegation is Defendant's alleged pre-suit knowledge of the patents, stemming from notice letters Plaintiff claims to have sent in October 2024 Compl. ¶33, fn 30 Compl. ¶48, fn 51 Compl. ¶65, fn 72 The complaint also alleges that Defendant maintains a policy of not reviewing the patents of others, which it characterizes as willful blindness Compl. ¶33 Compl. ¶48 Compl. ¶65
VII. Analyst’s Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can terms rooted in a specific context described in the patents, such as "license information" ('416 Patent), be construed to cover the technically analogous but functionally different concepts in the accused open-source systems, such as Kubernetes' cluster configuration files?
- A second key question will be one of functional equivalence: do the standard, well-known operations of the accused technologies—such as HDFS's block location lookup ('686 Patent) or RocksDB's data compaction ('832 Patent)—perform the specific, purpose-driven functions required by the patent claims (e.g., data security through obfuscation, or pre-failure mitigation), or is there a fundamental mismatch in their technical operation and objective?
- Finally, the case may raise a question of intent in open-source use: does the implementation of widely adopted, standard open-source software, according to its intended and publicly documented purpose, support a finding of willful infringement, particularly when the infringement theory relies on reinterpreting those standard functions as patented methods?