DCT
2:25-cv-01177
Knossos Global Systems LLC v. BlackBerry Ltd
Key Events
Amended Complaint
Table of Contents
complaint Intelligence
I. Executive Summary and Procedural Information
- Parties & Counsel:
- Plaintiff: Knossos Global Systems LLC (Texas)
- Defendant: BlackBerry Limited (Canada)
- Plaintiff's Counsel: Rozier Hardt McDonough PLLC
- Case Identification: 2:25-cv-01177, E.D. Tex., 03/03/2026
- Venue Allegations: Plaintiff alleges venue is proper because the Defendant is a foreign corporation that does not reside in any U.S. judicial district.
- Core Dispute: Plaintiff alleges that Defendant's secure messaging services, including BlackBerry BBM Enterprise and BlackBerry Work, infringe a patent related to a private electronic information exchange architecture.
- Technical Context: The dispute centers on secure electronic messaging systems, specifically architectures designed to protect not only the content of a message but also the routing information and metadata from public exposure.
- Key Procedural History: The complaint notes that Defendant has been a party in prior litigation within the Eastern District of Texas, which Plaintiff presents as evidence that the court is a foreseeable and convenient forum for disputes.
Case Timeline
| Date | Event |
|---|---|
| 2004-04-22 | U.S. Patent No. 8,819,410 Priority Date |
| 2014-08-26 | U.S. Patent No. 8,819,410 Issues |
| 2026-03-03 | Complaint Filed |
II. Technology and Patent(s)-in-suit Analysis
U.S. Patent No. 8,819,410 - "Private Electronic Information Exchange"
- Patent Identification: U.S. Patent No. 8,819,410, "Private Electronic Information Exchange," issued August 26, 2014 (the "'410 Patent").
The Invention Explained
- Problem Addressed: The patent addresses the security vulnerabilities of conventional email systems from the early 2000s Compl. ¶25 Even when message content was encrypted, metadata such as sender and recipient email addresses remained publicly exposed, making them susceptible to harvesting for spam, viruses, and fraud Compl. ¶26 The patent describes these systems as being "the equivalent of postcards readable by anyone watching them go by" '410 Patent, col. 1:33-34
- The Patented Solution: The invention proposes a "private domain" architecture for electronic messaging that obscures routing information from the public internet Compl. ¶29 This is achieved through a server-mediated system where users must be registered members Compl. ¶¶33, 41 Messages use privately routable addresses, which may incorporate a "Private Top Level Domain" (PTLD) that public internet routers will not recognize Compl. ¶38 The system employs a specific two-layer encryption scheme: the message content is encrypted with a symmetric key unique to that transmission, and that symmetric key is then separately encrypted using the recipient's public key to create a "security package" Compl. ¶34 '410 Patent, col. 7:29-45 This ensures that only the intended recipient can access the symmetric key needed to decrypt the message content. A diagram in the complaint illustrates the distinction between a conventional public email address and a private routing address containing a PTLD Compl. ¶37, Figs. 4A & 4B
- Technical Importance: The claimed approach represents a architectural shift from content-only encryption to a holistic system that controls access, routing, and key management within a closed, server-governed ecosystem to protect both message content and metadata Compl. ¶¶58-60
Key Claims at a Glance
The complaint asserts at least claim 1 of the '410 Patent Compl. ¶63 Independent claim 1 is a method claim with the following essential elements:
- Registering a sender to access a private domain.
- Receiving data from the sender at a server associated with the private domain.
- Determining at the server if the recipient is a member of the private domain.
- Providing the sender with the recipient's public cryptographic key if the recipient is a member.
- Receiving at the server the electronic information, which comprises two parts: (1) content encrypted by a unique symmetric key, and (2) a "security package" containing the symmetric key itself encrypted by the recipient's public key.
- Transmitting the electronic information and the security package to the recipient.
The complaint also discusses dependent claims 5-7 and 15, as well as independent claim 20, which covers a non-transitory computer-readable storage medium for performing the method of claim 1 Compl. ¶¶47-49
III. The Accused Instrumentality
Product Identification
- Product Identification: BlackBerry BBM Enterprise and BlackBerry Work (the "Accused Products") Compl. ¶18
Functionality and Market Context
- The complaint describes the Accused Products as "private electronic information exchange services" that BlackBerry provides, offers for sale, and distributes Compl. ¶18 One screenshot from the complaint shows BlackBerry marketing its "Secure Digital Workplace" solutions, which include BlackBerry UEM (Unified Endpoint Management) and BBMe (BlackBerry Messenger Enterprise) Compl. ¶12, Exhibit 3 The complaint alleges that these services perform the steps of the patented method but does not provide specific technical details on their underlying architecture or operation, instead referencing non-included exhibits Compl. ¶¶18, 63
IV. Analysis of Infringement Allegations
The complaint alleges that the Accused Products infringe at least claim 1 of the '410 Patent Compl. ¶63 The core of the infringement theory is presented in a narrative format that directly tracks the language of claim 1 Compl. ¶64
Claim Chart Summary
'410 Patent Infringement Allegations
| Claim Element (from Independent Claim 1) | Alleged Infringing Functionality | Complaint Citation | Patent Citation |
|---|---|---|---|
| registering a sender to enable the sender to access services of a private domain... | The Accused Products allegedly perform a method that includes registering a sender to access a private domain for electronic information transmissions. | ¶64 | col. 13:35-51 |
| receiving, at a server associated with the private domain, data from the sender indicating that the sender is initiating the transmission of electronic information... | The Accused Products' servers allegedly receive data from a sender indicating the initiation of a transmission within the private domain. | ¶64 | col. 11:18-23 |
| determining, at the server associated with the private domain, whether the recipient is a member of the private domain... | The Accused Products' servers allegedly determine if a recipient is a member by examining a record of members. | ¶64 | col. 11:62-67 |
| providing to the sender, from the server associated with the private domain, a public cryptographic key associated with the recipient... | The Accused Products' servers allegedly provide the sender with the recipient's public key when the recipient is determined to be a member. | ¶64 | col. 12:10-14 |
| receiving, at the server... electronic information... encrypted by a symmetric cryptographic key that is unique for the transmission... and... a security package that contains an encrypted version of the symmetric cryptographic key... | The Accused Products' servers allegedly receive electronic information comprising content encrypted with a unique symmetric key and a security package containing that key encrypted with the recipient's public key. The complaint includes a diagram from the patent illustrating this two-part message structure Compl. ¶35, Fig. 2 | ¶64 | col. 8:26-53 |
| transmitting the electronic information, with the security package, over an electronic network to the recipient. | The Accused Products allegedly transmit the encrypted information and the security package over a network to the recipient. | ¶64 | col. 12:45-53 |
Identified Points of Contention
- Architectural Equivalence: A primary question will be whether BlackBerry's secure messaging architecture, as implemented in the Accused Products, maps onto the specific "private domain" architecture required by the claims. The analysis may focus on whether BlackBerry's system uses addresses that are intentionally non-routable on the public internet and whether its servers perform the claimed sequence of membership verification and key distribution.
- Evidentiary Questions: The complaint's infringement allegations are conclusory and track the claim language without providing specific technical evidence of how the Accused Products operate Compl. ¶64 A key point of contention will be whether discovery reveals that the Accused Products actually perform the specific cryptographic process claimed, including the client-side generation of a unique symmetric key for each transmission and the server-side provision of a recipient's public key to the sender for the creation of the "security package."
V. Key Claim Terms for Construction
The Term: "private domain"
- Context and Importance: This term is foundational to the patent's architecture. Its construction will determine whether BlackBerry's secure messaging ecosystem falls within the scope of the claims. The dispute may center on whether a "private domain" simply means any closed messaging system or if it requires the specific technical features described in the patent, such as the use of non-publicly routable addresses.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The specification describes the effect of the invention as creating a "private domain among users within the electronic network, similar to how a gated community creates privacy in a physical world" '410 Patent, col. 4:40-44, which may support a more functional definition.
- Evidence for a Narrower Interpretation: The specification repeatedly links the "private domain" to specific address structures, such as a "Private Top Level Domain (PTLD)," which "routing equipment and software of the open Internet... will not recognize" '410 Patent, col. 10:8-15 This suggests the term requires a specific, technically-defined implementation.
The Term: "security package"
- Context and Importance: The specific structure of the "security package" is a core limitation of the encryption method. Practitioners may focus on this term because the claim explicitly defines its contents and the method of its creation, raising a question of whether BlackBerry's products use an identical or equivalent structure.
- Intrinsic Evidence for Interpretation:
- Evidence for a Broader Interpretation: The complaint does not offer a basis for a broad interpretation, as the claim language itself is highly specific.
- Evidence for a Narrower Interpretation: Claim 1 requires the package to contain "an encrypted version of the symmetric cryptographic key," where that key was "encrypted by the sender using the public cryptographic key of the recipient" '410 Patent, col. 16:55-65 The patent specification provides a detailed diagram illustrating this precise structure, showing a symmetrical key encrypted by a recipient's public key, distinct from the document package '410 Patent, Fig. 2
VI. Other Allegations
- Indirect Infringement: The complaint does not include a formal count for indirect infringement. However, it alleges that BlackBerry "caused to be used" the Accused Products and distributed "materials instructing its customers... for installation, operation, and service" Compl. ¶14 Compl. ¶17 These allegations may form the basis for a future claim of induced infringement.
- Willful Infringement: The complaint does not contain allegations of willful infringement or pre-suit knowledge of the '410 Patent.
VII. Analyst's Conclusion: Key Questions for the Case
- A core issue will be one of definitional scope: can the term "private domain," which is described in the patent in the context of intentionally non-routable addresses like PTLDs, be construed to cover the architecture of BlackBerry's established secure messaging services?
- A key evidentiary question will be one of technical implementation: does discovery show that the Accused Products perform the specific, multi-step cryptographic method recited in Claim 1? The analysis will likely focus on whether BlackBerry's system generates a unique symmetric key for each transmission and creates a "security package" by encrypting that key with a recipient's public key, as explicitly required by the claim.
Analysis metadata