Surety Technologies, Inc. v. Entrust Technologies, Inc.

71 F. Supp. 2d 520, 1999 U.S. Dist. LEXIS 17274, 1999 WL 1005021
CourtDistrict Court, E.D. Virginia
DecidedNovember 4, 1999
DocketCiv.A. 99-203-A
StatusPublished
Cited by1 cases

This text of 71 F. Supp. 2d 520 (Surety Technologies, Inc. v. Entrust Technologies, Inc.) is published on Counsel Stack Legal Research, covering District Court, E.D. Virginia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Surety Technologies, Inc. v. Entrust Technologies, Inc., 71 F. Supp. 2d 520, 1999 U.S. Dist. LEXIS 17274, 1999 WL 1005021 (E.D. Va. 1999).

Opinion

MEMORANDUM OPINION

ELLIS, District Judge.

The parties in this patent infringement suit dispute the meaning of three terms or phrases in the patent claims in issue, thereby necessitating the claim construction determinations recorded here.

I. The ’954 Patent

Plaintiffs Telcordia Technologies (“Tel-cordia”) and Surety Technologies (“Surety”) are, respectively, the owner of and the exclusive licensee under U.S.Patent Reissue No. 34,954 (“the ’954 patent”). They sue defendant Entrust Technologies (“Entrust”), alleging Entrust’s sale of its “Entrust/Timestamp” product directly and eontributorily infringes and induces the infringement of the ’954 patent. Entrust denies any infringement and, as is typical in patent infringement cases, asserts a laundry list of affirmative defenses, including laches, inequitable conduct, estoppel, and various challenges to the patent’s validity. As is also typical of patent infringement suits, the parties disagree as to the patent’s scope; specifically, they dispute the meaning of three terms or phrases in the claims in issue. And where, as here, these terminological disputes are material to the infringement and validity issues presented, it is necessary for the Court to construe the claims. 1 Central to the claim construction task is an understanding of the patent, which, in turn, requires a brief discussion of the underlying technology.

The ’954 patent claims an invention in the field of secure data communications. The purpose of devices in this field is to make electronic communications, such as e-mail, at least as secure, if not more so, than conventional communications. The ’954 patent contributes to this field by providing a method for the secure time- *523 stamping of digital documents. In doing so, the ’954 patent draws upon science of cryptography, 2 to create an electronic time-stamp that provides credible evidence that a particular electronic document existed in a particular form at a particular time, but without disclosing the contents of the document.

This technology is useful in many contexts, including disputes over the priority of new inventions, where it is necessary to verify or prove a document’s contents and the date on which it was created. Before the advent of electronic documents, inventors maintained indelibly dated and signed notes of their work in laboratory notebooks with sequentially numbered pages that were sewn together so that later efforts to tamper with or alter the notes might be discovered. As a further check, this notebook was reviewed regularly and signed by third parties to substantiate that the concepts disclosed in the notebook existed at least as early as the witnessed date. Electronic documents present a challenge to established methods of verification because, unlike laboratory notebooks, they can be easily revised without leaving any telltale signs, thereby raising doubt as to whether a given electronic document accurately states the date of its creation or reflects its original content.

The ’954 patent seeks to address this general problem by providing a reliable system of verification whereby a digital document can be fixed in time and content by incorporating into the electronic context the essential characteristics of accepted physical document verification, namely affixing to the document an indelible date and a witnessing signature. The ’954 patent accomplishes this by indelibly incorporating into the digital data of the document a representation of the contents of a document and an electronic stamp stating the time, so that it is not possible to change any bit of the resulting time-stamp without it being apparent. Next, the time at which the digital document is stamped is verified by a witnessing digital signature procedure that deters incorporation of a false time-stamp by transferring control of the time-stamping from the originator of the document to an outside agency.

The ’954 patent’s twenty-five claims cover three distinct methods of time-stamping digital documents. Claims 2, 3, and 4, the claims in issue, cover the “hash-and-sign” method, while the remaining claims variously cover the “receipt-linking” (claims 5-7) and the “pseudorandom witnessing” methods (claims 8-13). Accordingly, the principal focus here is on the hash-and-sign method. And, because the disputed claim terms all appear in claim 1, on which claims 2, 3 and 4 ultimately depend, 3 a description of the “hash-and-sign” method necessarily begins with claim 1. Claim 1, which is quite broad, sets forth the following three-step method for time-stamping a digital document:

a) transmitting a digital representation of said document from an originator to an outside agency;
b) creating at said outside agency a receipt comprising a digital representation of then current time and at least a portion of a digital representation of said digital document; and
c) certifying said receipt at said outside agency by means of a verifiable digital cryptographic signature.

The disputed terms are underscored. Sig-mificantly, in claim 1 the contents of the digital document to be time-stamped are not altered.

Claim 2 adds an important element to claim 1. In this claim, a deterministic function algorithm is applied to the document *524 to generate a number. 4 In general, a deterministic function algorithm is a system or series of steps such that for a given input there is always the same output. In the context of claim 2, this function is known, in common parlance, as a “hash” function, and the steps of applying such a function to a digital document is commonly referred to as “hashing.” “Hashing” a document yields a “hash value,” a number that is shorter than the original unhashed document and, at the same time, unique to that document, i.e., a fingerprint of the document. In the words of the patent specification, hashing serves to “convert the digital document string to a unique number having vastly reduced digital size....” 5 In short, claim 2 adds to claim 1 the step of hashing whereby the digital document is condensed and thereby encrypted. 6 Claim 2 also includes sending at least part of the resulting “hash value” or number, in digital form, to the outside agency for a receipt to be certified by a digital cryptographic signature, 7 as required by claim 1.

Claim 3 also adds elements to claim 1, on which it depends. 8 Specifically, claim 3 requires that the outside agency’s receipt include at least a portion of the number generated by the application of the deterministic function algorithm to the digital document. Put another way, claim 3 requires that at least a portion of the hash value of the digital document be included in the receipt created by the outside agency.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Surety Technologies, Inc. v. Entrust Technologies, Inc.
74 F. Supp. 2d 632 (E.D. Virginia, 1999)

Cite This Page — Counsel Stack

Bluebook (online)
71 F. Supp. 2d 520, 1999 U.S. Dist. LEXIS 17274, 1999 WL 1005021, Counsel Stack Legal Research, https://law.counselstack.com/opinion/surety-technologies-inc-v-entrust-technologies-inc-vaed-1999.