DCT

3:26-cv-00805

Secure Matrix LLC v. Grill Group 2017 LLC

Key Events
Complaint
complaint Intelligence

I. Executive Summary and Procedural Information

  • Parties & Counsel:
  • Case Identification: 3:26-cv-00805, N.D. Tex., 03/12/2026
  • Venue Allegations: Venue is asserted in the Northern District of Texas on the basis that the Defendant maintains an established place of business within the district.
  • Core Dispute: Plaintiff alleges that Defendant infringes a patent related to multi-factor authentication systems that use a mobile device to verify a user's identity for secure online transactions or access.
  • Technical Context: The technology addresses methods for securely authenticating users for web-based services, such as logins or e-commerce payments, by coordinating signals between a service provider, a user's mobile device, and a verification server.
  • Key Procedural History: The complaint does not reference any prior litigation, inter partes review (IPR) proceedings, or licensing history related to the patent-in-suit.

Case Timeline

Date Event
2012-11-21 U.S. Patent 8,677,116 Priority Date
2013-08-09 U.S. Patent 8,677,116 Application Filing Date
2014-03-18 U.S. Patent 8,677,116 Issues
2026-03-12 Complaint Filed

II. Technology and Patent(s)-in-Suit Analysis

  • Patent Identification: U.S. Patent No. 8,677,116, "Systems and methods for authentication and verification," issued March 18, 2014.

U.S. Patent No. 8,677,116 - "Systems and methods for authentication and verification"

The Invention Explained

  • Problem Addressed: The patent describes a "growing need to authenticate users" for secure internet portals, such as websites or online payment systems, as well as for real-world secured devices like electronic locks '116 Patent, col. 1:20-25
  • The Patented Solution: The invention proposes a three-part authentication method coordinated by a verification server '116 Patent, Fig. 2 First, a computer providing a secure service (e.g., a website) sends a "reusable identifier" to the verification server '116 Patent, abstract Second, a user's electronic device (e.g., a smartphone) sends a copy of that same reusable identifier along with separate "user verification information" to the server '116 Patent, abstract The verification server then evaluates both signals to determine if the user is authorized and, if so, transmits an authorization signal to complete the login or transaction '116 Patent, col. 2:36-44
  • Technical Importance: The patent asserts that using a "reusable identifier" which does not contain user-specific or transaction-specific information (e.g., a simple QR code) makes the process faster, more reliable for mobile device cameras, and more secure compared to systems that encode sensitive data in the initial token '116 Patent, col. 6:35-62

Key Claims at a Glance

The complaint asserts infringement of "one or more claims" of the '116 Patent without specifying which claims are asserted '116 Patent, ¶11 The independent claims, 1 and 11, define the core method and system.

  • Independent Claim 1 (Method):

    • Using a computer system to receive a first signal from a computer providing a secured capability, where the signal contains a "reusable identifier" assigned for a "finite period of time."
    • Receiving a second signal from a user's electronic device, which contains a "copy of the reusable identifier" and "user verification information."
    • Using a processor to evaluate the first and second signals to determine if the user is authorized.
    • Transmitting a third signal with "authorization information" to the user's device or the computer in response to a successful evaluation.
  • Independent Claim 11 (System):

    • A "first input" to receive first signals with reusable identifiers from multiple computers.
    • A "second input" to receive second signals with copies of the reusable identifiers and user verification information from multiple user devices.
    • A "storage device" that maintains a first association between secured capabilities and their reusable identifiers, and a second association between user verification information and verified users.
    • A "processor" to evaluate the signals to determine if a user is authorized.
    • An "output" to transmit an authorization signal if the user is authorized.

III. The Accused Instrumentality

Product Identification

The complaint identifies the accused instrumentalities as "Exemplary Defendant Products" detailed in charts that are referenced by but not contained within the complaint document itself '116 Patent, ¶11

Functionality and Market Context

The complaint does not provide sufficient detail for analysis of the accused products' functionality. It alleges that claim charts in an external exhibit demonstrate that the products "practice the technology claimed by the '116 Patent" '116 Patent, ¶16 No probative visual evidence provided in complaint.

IV. Analysis of Infringement Allegations

The complaint references claim-chart exhibits that were not provided with the filed document '116 Patent, ¶16 '116 Patent, ¶17 The narrative infringement theory alleges that the "Exemplary Defendant Products" satisfy all elements of the asserted claims '116 Patent, ¶16 The complaint alleges direct infringement through Defendant's own actions, including making, using, and selling the products, as well as through internal testing by employees '116 Patent, ¶11 '116 Patent, ¶12 It further alleges induced infringement by distributing "product literature and website materials" that instruct users on how to use the products in an infringing manner '116 Patent, ¶14

Identified Points of Contention

  • Scope Questions: A potential dispute may arise over the definition of a "reusable identifier." The infringement analysis will question whether the identifier used by the accused system can be used more than once and whether it is assigned for a "finite period of time" as required by the claims '116 Patent, claim 1 Further, claim 2 requires that the identifier "not contain user-specific or interaction-specific information," which could become a central point of non-infringement or invalidity arguments.
  • Technical Questions: The patent claims a specific three-party communication architecture involving a verification server that receives separate signals from the service provider and the user's device. A key technical question will be whether the accused system operates on this same architecture. What evidence does the complaint provide that Defendant's system uses a central server to correlate a first signal from a service provider with a second, distinct signal from an end-user's device to perform authentication?

V. Key Claim Terms for Construction

The Term: "reusable identifier"

  • Context and Importance: This term is the central inventive concept. Its construction will be critical, as the dispute may turn on whether the token or identifier used in the accused system falls within the scope of this term, particularly concerning the constraints that it be "reusable" and assigned for a "finite period of time" '116 Patent, claim 1
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: Claim 1 does not limit the identifier to a specific format (e.g., a QR code), suggesting it could cover any form of data token that can be used more than once for authentication.
    • Evidence for a Narrower Interpretation: The specification repeatedly uses a QR code as the primary example '116 Patent, col. 6:15-16 and emphasizes the advantages derived from the identifier being simple and free of user-specific data '116 Patent, col. 6:35-50 A party could argue the term should be limited to identifiers sharing these disclosed characteristics.

The Term: "user verification information"

  • Context and Importance: This term defines the data sent from the user's device to prove their identity. Its scope is important for determining what type of user-provided data is needed to infringe.
  • Intrinsic Evidence for Interpretation:
    • Evidence for a Broader Interpretation: The specification states this information can comprise details about the user (e.g., name, email) or the device itself (e.g., hardware ID), or both, providing a wide range of potential infringing implementations '116 Patent, col. 12:6-14
    • Evidence for a Narrower Interpretation: The patent also describes this information as a "verifiable 'fingerprint' of the user and mobile device," which may suggest a requirement for a more robust or unique set of data than simple user credentials '116 Patent, col. 12:5-7

VI. Other Allegations

Indirect Infringement

The complaint alleges induced infringement, stating that Defendant distributes "product literature and website materials" that instruct end users on how to use the accused products in a manner that infringes the '116 Patent '116 Patent, ¶14

Willful Infringement

The complaint alleges that service of the complaint itself provides Defendant with "actual knowledge" of its infringement '116 Patent, ¶13 It further alleges that Defendant has continued its infringing activities despite this knowledge, which may form the basis for a claim of post-suit willful infringement '116 Patent, ¶14 The prayer for relief requests that the case be declared "exceptional" under 35 U.S.C. § 285 '116 Patent, p. 5, ¶E.i.

VII. Analyst's Conclusion: Key Questions for the Case

  • A core issue will be one of definitional scope: can the term "reusable identifier," described in the patent as a simple token assigned for a finite time, be construed to cover the specific authentication token used in the Defendant's system? The analysis will depend on evidence concerning that token's data content, persistence, and lifecycle.
  • A key evidentiary question will be one of architectural equivalence: does the accused authentication system operate using the three-party communication flow required by the patent's claims? The case may turn on evidence demonstrating whether Defendant's system relies on a verification server that receives and correlates two separate, distinct signals-one from the service provider and one from the user's device-to authorize a session.