CTD Networks, LLC v. Google, LLC

CourtDistrict Court, W.D. Texas
DecidedAugust 22, 2023
Docket6:22-cv-01042
StatusUnknown

This text of CTD Networks, LLC v. Google, LLC (CTD Networks, LLC v. Google, LLC) is published on Counsel Stack Legal Research, covering District Court, W.D. Texas primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
CTD Networks, LLC v. Google, LLC, (W.D. Tex. 2023).

Opinion

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS WACO DIVISION

CTD NETWORKS, LLC, § Plaintiff § § WA-22-CV-01042-XR -vs- § § GOOGLE, LLC, § Defendant § §

ORDER On this date, the Court considered Defendant Google, LLC’s motion to dismiss (ECF No. 44), Plaintiff CTD Networks LLC’s response (ECF No. 45), Defendant’s reply (ECF No. 46), and the parties’ arguments at the hearing held on June 29, 2023. After careful consideration, the Court issues the following order. BACKGROUND I. Factual Background Plaintiff CTD Networks LLC (“CTD”) alleges causes of action against Defendant Google, LLC (“Google”) for direct and willful infringement of four patents owned by CTD (collectively, the (Patents-in-Suit”) relating to computer security: U.S. Patent Nos. 8,327,442 (the “’442 patent”), 9,438,614 (the “’614 patent”), 9,503,470 (the “’470 patent”), and 11,171,974 (the “’974 patent”). See ECF No. 43 at 6–10.1,2 All four asserted patents relate to distributed agent-based models for security monitoring (“SDI-SCAM”). This is one of six lawsuits CTD filed in the Western District of Texas in October 2022 alleging infringement of the Patents-in-Suit.3 CTD alleges that Defendant directly infringes on at

least one claim of each asserted patent: claim 1 of the ’442 patent, claim 10 of the ’614 patent, claim 1 of the ’470 patent, and claim 1 of the ’974 patent.4 At a high level, the asserted claims cover systems with a network of “agents” on computers that perform specific security functions, including gathering and analyzing information, determining the likelihood of a threat, and generating counteroffensive measures.

1 The ’442 patent, entitled “System and method for a distributed application and network security system”, was issued by the United States Patent and Trademark Office (“USPTO”) on December 4, 2012. See ECF No. 43-1 at 2–14. The ’614 patent, entitled “Sdi-scam”, was issued on September 6, 2016. See id. at 16–29. The ’470 patent, entitled “Distributed agent based model for security and response”, was issued on November 22, 2016. See id. at 31– 48. The ’974 patent, entitled “Distributed agent based model for security monitoring and response”, was issued on November 9, 2021. See id. at 50–67.

2 Page numbers in citations to the record refer to PDF page numbers as the document was filed on CM/ECF, which are not necessarily the same as the page numbers in the underlying documents.

3 See (1) CTD Networks LLC v. Amazon.com, Inc., No. 6:22-cv-1034-XR (the “Amazon Action”); (2) CTD Networks LLC v. AT&T Inc., No. 6:22-cv-1038-XR (voluntarily dismissed on February 3, 2023); (3) CTD Networks, LLC v. Cisco Systems, Inc., No. 6:22-cv-1039-XR (the “Cisco Action”); (4) CTD Networks, LLC v. Google, LLC, No. 6:22-cv-1042-XR (the “Google Action”); (5) CTD Networks, LLC v. International Business Machines Corporation, No. 6:22-cv-1044-XR (voluntarily dismissed on April 20, 2023); and (6) CTD Networks LLC v. Microsoft Corporation, No. 6:22-cv-1049-XR (the “Microsoft Action”).

Plaintiff filed four additional lawsuits in December 2022 premised on violations of the Patents-in-Suit. See (1) CTD Networks LLC v. Akamai Technologies, Inc., No. 6:22-cv-1302-XR (voluntarily dismissed on April 14, 2023); (2) CTD Networks LLC v. Musarubra US LLC, No. 6:22-cv-1303-XR (voluntarily dismissed on June 12, 2023); (3) CTD Networks LLC v. Palo Alto Networks, Inc., No. 6:22-cv-1303-XR (voluntarily dismissed on March 24, 2023); (4) CTD Networks LLC v. Verizon Communications, Inc., No. 6:22-cv-1303-XR.

4 Discussing a “claim” in the patent context can be confusing given the term’s dual meaning. “Claim” might refer to a “cause of action,” or it might refer to the portion of a patent that follows the patent’s specification and defines the scope of the patentee’s monopoly. Senju Pharm. Co. v. Apotex Inc., 746 F.3d 1344, 1349 (Fed. Cir. 2014). To avoid confusion, the Court uses “cause of action” when referring to Plaintiff’s allegations and uses “claim” in the patent sense. 1. The ’442 and ’614 Patents The ’442 and ’614 patents both describe a “distributed multi-agent system” that uses “agents” on end-user computer hardware to monitor the user’s network for security threats. ’614 patent, Abstract; see also ’442 patent, Abstract (describing “[u]sing a combination of intelligent

client-side and server-side agents . . . to detect, prevent, and repair a wide variety of network intrusions.”). The “basic architectural approach” of the invention claimed in these patents “is that each node of a computer network is loaded with an agent capable both of ensuring security at the locality of the machine on which it is installed, and of communicating with other [] agents across the network.” ’442 patent 2:17–21. The ’442 and ’614 patents both require the agents to be installed on computer hardware. See ’442 patent 2:31–35 (“The preexisting elements of this network security system are the machines themselves.”). For example, claim 1 of the ’442 patent recites “[a] distributed security system . . . , said system comprising individual computers having agents associated therewith.” And claim 10 of the ’614 patent recites “[a] system . . . having a plurality of nodes.” As the

specifications make clear, a “node” includes computer hardware components. ’614 patent 11:50– 52 (“Those nodes which are part of or associated with in some way the same internal network, e.g., sharing physical hardware components . . . .”); ’442 patent 2:32–35 (“It is assumed that these systems, which act as the nodes of a network, consist of heterogeneous pieces of hardware. . . .”). Once installed on the computer network, the claimed “agents” must (1) create statistical models of computer usage, (2) determine a pattern of usage that represents a threat to the computer or the computer network, (3) determine a probability of threat based on pattern analysis, and (4) warn other agents of any intrusion or attack. ’442 patent 15:51–16:9; ’614 patent 19:33–46. In addition to these common requirements, claim 1 of the ’442 patent further requires that each agent must schedule “different anti-viral software updates” for the respective end-user machine on which it is installed. ’442 patent 16:14–20. Each agent must regularly schedule its computer for custom antivirus software updates based on the unique probability of an intrusion or

attack against that particular computer. Id. And each agent must, whenever any computer in the network is attacked, forsake the schedule and “immediately” provide the antivirus software update to its end-user computer. Id. at 16:21–27. 2. The ’470 and ’974 Patents The ’470 and ’974 patents are both directed to “a widely distributed security system . . . that protects computers at individual client locations” by implementing a two-prong approach: (1) security monitoring and (2) a counteroffensive response. ’470 patent, Abstract; see also id. at 21:64–22:2. Notably, the ’470 and ’974 patents call for security monitoring in the same manner already discussed—with agents installed on hardware components in a computer network (i.e., end-user

devices). These ’470 and ’974 patents build on the ideas disclosed in the other two patents by adding a “response”—i.e., a counteroffensive measure taken when a threat is detected. For example, claim 1 of the ’470 patent requires the agent to “generate counter-offensive measures” capable of disabling the operating system of an attacker’s computer. ’470 patent 28:23; see also id. at 23:14–50. Similarly, claim 1 of the ’974 patent requires each agent to be capable of generating counteroffensive measures in response to a perceived security threat (meaning, as discussed in the specification, disabling an attacker’s operating system and holding their machine hostage). Id. at 28:27–34. I.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

R2 Investments LDC v. Phillips
401 F.3d 638 (Fifth Circuit, 2005)
Bell Atlantic Corp. v. Twombly
550 U.S. 544 (Supreme Court, 2007)
Ashcroft v. Iqbal
556 U.S. 662 (Supreme Court, 2009)
Karen L. Edwards v. Occidental Chemical Corporation
892 F.2d 1442 (Ninth Circuit, 1990)
Woods v. Deangelo Marine Exhaust, Inc.
692 F.3d 1272 (Federal Circuit, 2012)
Senju Pharmaceutical Co. v. Apotex Inc.
746 F.3d 1344 (Federal Circuit, 2014)
Limelight Networks, Inc. v. Akamai Technologies, Inc.
134 S. Ct. 2111 (Supreme Court, 2014)
Halo Electronics, Inc. v. Pulse Electronics, Inc.
579 U.S. 93 (Supreme Court, 2016)
Lifenet Health v. Lifecell Corporation
837 F.3d 1316 (Federal Circuit, 2016)
Ottah v. Fiat Chrysler
884 F.3d 1135 (Federal Circuit, 2018)
Disc Disease Solutions Inc. v. Vgh Solutions, Inc.
888 F.3d 1256 (Federal Circuit, 2018)
Bot M8 LLC v. Sony Corporation of America
4 F.4th 1342 (Federal Circuit, 2021)

Cite This Page — Counsel Stack

Bluebook (online)
CTD Networks, LLC v. Google, LLC, Counsel Stack Legal Research, https://law.counselstack.com/opinion/ctd-networks-llc-v-google-llc-txwd-2023.