2:25-cv-00877
Data Fence LLC v. Telus Corp
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Data Fence LLC (New Mexico)
- Defendant: Telus Corporation (Canada)
- Plaintiff's Counsel: Rabicoff Law LLC
- Case Identification: 2:25-cv-00877, E.D. Tex., 03/10/2026
- Venue Allegations: Venue is asserted as proper on the basis that the Defendant is a foreign corporation.
- Core Dispute: Plaintiff alleges that Defendant's call management products and services infringe three patents related to systems and methods for identifying, evaluating, and controlling inbound telephone calls.
- Technical Context: The technology at issue addresses the management of unsolicited telephone calls (i.e., "spam" or "robocalls") through a device-level or network-integrated system that queries a remote database for caller intelligence before connecting a call.
- Key Procedural History: The operative pleading is a First Amended Complaint for Patent Infringement. The complaint does not mention any prior litigation, licensing history, or post-grant proceedings involving the patents-in-suit.
Case Timeline
| Date | Event |
|---|---|
| 2012-10-17 | Priority Date for '843, '286, and '797 Patents |
| 2014-11-24 | Application Date for '286 Patent |
| 2014-12-23 | Issue Date for U.S. Patent No. 8,917,843 |
| 2016-10-28 | Application Date for '797 Patent |
| 2016-11-08 | Issue Date for U.S. Patent No. 9,491,286 |
| 2017-11-14 | Issue Date for U.S. Patent No. 9,819,797 |
| 2026-03-10 | Complaint Filing Date |
II. Technology and Patent(s)-in-Suit Analysis
U.S. Patent No. 8,917,843 - "Methods and systems for inbound call control"
Issued December 23, 2014
The Invention Explained
- Problem Addressed: The patent's background section describes the proliferation of unsolicited "telemarketing" or "spam calls," including computer-dialed "robocalls," and notes the technological deficiency of prior art systems, such as the passive "Do Not Call" registry, to provide real-time, integrated call filtering '843 Patent, col. 1:19-35 Compl. ¶¶10-11
- The Patented Solution: The invention proposes a system architecture centered on a "call control unit" positioned between the telephone network and the user's telephone '843 Patent, Fig. 1A Upon receiving an incoming call, this unit queries an external server that maintains a database of caller intelligence, such as community-sourced blacklists and whitelists, to determine how to handle the call '843 Patent, abstract '843 Patent, col. 2:40-57 The system also includes a feedback loop where a user can identify a call as "undesired," and the system will automatically add that caller's information to a user-configurable list '843 Patent, Claim 1
- Technical Importance: The claimed architecture represents a shift from passive, static call-blocking registries to an active, distributed system that enables intelligent, device-level call interception based on real-time, dynamic data Compl. ¶13
Key Claims at a Glance
The complaint asserts infringement of at least Claim 1 of the '843 Patent Compl. ¶19 Compl. ¶29
- Independent Claim 1 recites a method comprising the key elements of:
- Receiving an indication of an incoming call at a call control unit that is located at the user's premise and positioned between the telecommunication service provider and the telephone.
- Querying an external server to determine if additional information regarding the caller exists in a database, where the database stores a user-configurable list of desired/undesired callers associated with a preferred operation.
- Performing a first operation (corresponding to the preferred operation) if such information exists, or a second operation if it does not.
- Receiving an indication at the call control unit that an incoming call is undesired.
- Automatically adding the identification information for the undesired call to the user-configurable list of undesired callers.
U.S. Patent No. 9,491,286 - "Methods and systems for inbound call control"
Issued November 8, 2016
The Invention Explained
- Problem Addressed: The '286 Patent, which is a continuation of the application leading to the '843 Patent, addresses the same technical problem of managing unwanted telephone calls '286 Patent, Related Application
- The Patented Solution: The solution is architecturally similar to that of the '843 Patent, involving a call control unit querying an external server '286 Patent, abstract However, the claimed method introduces a specific analytical step: after querying the server, the call control unit must determine whether the retrieved information "indicates that a negative characteristic is associated with" the caller or their telephone number before performing a corresponding operation '286 Patent, Claim 1 Compl. ¶24 The specification explains that such characteristics can be derived from data like spam scores, which represent a level of unwanted activity '286 Patent, col. 3:43-47
- Technical Importance: This patent refines the call-handling logic by requiring an explicit evaluation of caller data for a "negative characteristic," adding a layer of intelligence beyond simply checking for presence on a pre-defined list Compl. ¶24
Key Claims at a Glance
The complaint asserts infringement of at least Claim 1 of the '286 Patent Compl. ¶23 Compl. ¶35
- Independent Claim 1 recites a method comprising the key elements of:
- Receiving an incoming call at a call control unit positioned between the telecommunication service provider and the telephone.
- Querying a server to determine if additional information associated with the caller or telephone number exists.
- If so, determining whether the additional information indicates a "negative characteristic" is associated with the caller or number.
- If a negative characteristic is indicated, performing a first operation on the call; otherwise, performing a second operation.
U.S. Patent No. 9,819,797 - "Methods and systems for inbound call control"
Issued November 14, 2017
The Invention Explained
- Technology Synopsis: This patent addresses the technical problem of over-blocking, where legitimate calls might be incorrectly filtered due to being associated with a negative characteristic (e.g., a reassigned or spoofed number) Compl. ¶27 The patented solution introduces an interactive challenge-response mechanism. If a call is flagged as having a negative characteristic, the system provides an "inquiry to the caller" and only routes the call upon receipt of a correct response; otherwise, the call is blocked '797 Patent, Claim 1 Compl. ¶27
Key Claims at a Glance
- Asserted Claims: The complaint asserts infringement of at least Claim 1 Compl. ¶26
- Accused Features: The complaint alleges infringement by Defendant's products that practice the claimed method of call control, including the challenge-response architecture Compl. ¶¶41-43
III. The Accused Instrumentality
Product Identification
The complaint does not name the specific accused products or services, referring to them generally as "Exemplary Defendant Products" Compl. ¶29 It incorporates by reference external exhibits containing claim charts, but these exhibits were not provided with the complaint Compl. ¶31 Compl. ¶37 Compl. ¶43
Functionality and Market Context
Based on the infringement allegations, the accused instrumentalities are call management products or services that perform a method of inbound call control Compl. ¶29 Their alleged functionality includes intercepting incoming calls, communicating with a remote server to retrieve intelligence about the caller, and performing responsive operations on the call, such as blocking or forwarding, based on that intelligence Compl. ¶19 Compl. ¶23 The complaint does not provide details regarding the market context or commercial importance of the accused instrumentalities.
IV. Analysis of Infringement Allegations
The complaint alleges that infringement is detailed in claim chart exhibits that were not provided Compl. ¶32 Compl. ¶38 Compl. ¶44 The analysis below summarizes the infringement theory as described in the body of the complaint.
8,917,843 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| receiving an indication of an incoming call at a call control unit...located at the user's premise and positioned between a telecommunication service provider...and the telephone... | The accused products allegedly practice the claimed method by intercepting incoming calls at a unit positioned to evaluate the call before it reaches the user's telephone. | ¶¶29-31 | col. 11:51-62 |
| querying, by the call control unit, a server external...to determine whether additional information regarding a caller...is stored within a database...the database storing...a user-configurable list of...undesired callers... | The accused products are alleged to query an external server to retrieve intelligence, including user-configurable lists, to evaluate the incoming caller. | ¶¶29-31 | col. 11:63-12:7 |
| performing a first operation...or a second operation on the incoming call responsively to the...information... | The accused products allegedly perform operations such as blocking or allowing calls based on the intelligence retrieved from the external server. | ¶¶29-31 | col. 12:7-12 |
| receiving an indication at the call control unit that the incoming call is undesired; and automatically adding the identification information for the undesired incoming call to the user-configurable list of undesired caller. | The accused products are alleged to include a feedback mechanism where users can report undesired calls, which then automatically updates a user-configurable block list. | ¶¶29-31 | col. 12:13-18 |
9,491,286 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| receiving an incoming call from a caller at a call control unit...positioned between a telecommunication service provider...and the telephone... | The accused products allegedly receive an incoming call at a control unit that operates between the service provider and the user's telephone. | ¶¶35-37 | col. 11:5-13 |
| querying, by the call control unit, a server to determine whether additional information...exists, and if so, determining whether the additional information indicates that a negative characteristic is associated with...the caller... | The accused products allegedly query a server and evaluate the returned data to determine if a "negative characteristic" such as a high spam score or blacklist status is present Compl. ¶24 | ¶¶35-37 | col. 11:14-22 |
| performing a first operation on the incoming call responsively to the additional information, otherwise, performing a second operation...responsively to an absence of the additional information. | The accused products are alleged to perform a first operation (e.g., blocking) when a negative characteristic is found, and a second operation (e.g., allowing the call) otherwise. | ¶¶35-37 | col. 11:22-29 |
Identified Points of Contention
No probative visual evidence provided in complaint.
- Scope Questions: A central issue may be the construction of a "call control unit...located at the user's premise and positioned between a telecommunication service provider...and the telephone" '843 Patent, Claim 1 The patents' specification and figures describe physical hardware embodiments that sit in a user's home '843 Patent, Fig. 3 '843 Patent, Fig. 5 This raises the question of whether this claim language can be construed to read on potentially software-based or network-level services that are not physically located on the user's premise in the same manner as the depicted hardware.
- Technical Questions: For the '286 Patent, a key technical question will be what constitutes a "negative characteristic." The complaint alleges this includes spam activity and blacklist membership Compl. ¶24 The litigation may focus on whether the accused system's methodology for identifying unwanted calls performs the specific function of "determining" a "negative characteristic" as required by the claim, or if it operates on a different technical basis.
V. Key Claim Terms for Construction
"call control unit...located at the user's premise and positioned between a telecommunication service provider providing the incoming call and the telephone" (['843 Patent, Claim 1](https://ex:cit:6))
- Context and Importance: The definition of this architectural arrangement is critical. A narrow construction limited to a physical, on-premise hardware device could significantly limit the scope of the claims, potentially placing modern software-based or network-integrated call-blocking services outside their reach. Practitioners may focus on this term because the patents' specification contains support for both a hardware-centric and a broader network-level implementation.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification discloses an embodiment where "calls are intercepted at the network level thereby eliminating the requirement for any device or software to be implemented or installed by the user" '843 Patent, col. 6:8-12 This language may support an argument that the "call control unit" is a functional concept not limited to a physical box at the user's location.
- Evidence for a Narrower Interpretation: The plain language of Claim 1 recites "located at the user's premise." The specification repeatedly describes and depicts a "stand-alone hardware device" as the call control unit '843 Patent, col. 4:30-31, including detailed figures showing a physical box with ports for a phone line and a telephone '843 Patent, Fig. 3 '843 Patent, Fig. 5
"negative characteristic" (['286 Patent, Claim 1](https://ex:cit:12))
- Context and Importance: Infringement of the '286 Patent hinges on whether the accused system performs the specific step of identifying this "characteristic." Its definition will determine whether a simple blacklist check is sufficient to meet the limitation, or if a more complex, qualitative evaluation is required.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The patent specification provides examples of data points that contribute to a "spam score," including report velocity, user credibility, and number of reports from law enforcement, suggesting "negative characteristic" could encompass a wide range of indicators of unwantedness '286 Patent, col. 3:51-col. 4:8 The complaint alleges it includes "spam activity, blacklist membership, or association with unwanted call patterns" Compl. ¶24
- Evidence for a Narrower Interpretation: The specification describes the "spam score" as a specific, scaled value, for example, "on a scale of 0-100 with 100 being the maximum level of spam activity" '286 Patent, col. 3:45-47 This could support an argument that "determining...a negative characteristic" requires a specific algorithmic computation and thresholding, not merely finding a number on a list.
VI. Analyst's Conclusion: Key Questions for the Case
A core issue will be one of definitional scope: can the claim term "call control unit...located at the user's premise," which is described in the patents with physical hardware embodiments, be construed to cover modern, potentially software-based or network-level call management systems?
A second central question will be one of technical function: does the accused system's logic for identifying and acting on unwanted calls perform the specific, claimed functions of "determining whether...a negative characteristic is associated with" a caller '286 patent and providing an "inquiry to the caller" upon such a determination '797 patent, or is there a fundamental operational difference?
An evidentiary question will be one of proof: since the complaint relies on incorporating external, unprovided exhibits to detail infringement, the case will depend on the specific evidence Plaintiff adduces to map the features of the "Exemplary Defendant Products" to the limitations of the asserted claims.