TocMail Inc. v. Microsoft Corporation

67 F.4th 1255
CourtCourt of Appeals for the Eleventh Circuit
DecidedApril 25, 2023
Docket22-10223
StatusPublished
Cited by5 cases

This text of 67 F.4th 1255 (TocMail Inc. v. Microsoft Corporation) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eleventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
TocMail Inc. v. Microsoft Corporation, 67 F.4th 1255 (11th Cir. 2023).

Opinion

USCA11 Case: 22-10223 Document: 36-1 Date Filed: 04/25/2023 Page: 1 of 24

[PUBLISH] In the United States Court of Appeals For the Eleventh Circuit

____________________

No. 22-10223 ____________________

TOCMAIL, INC., Plaintiff-Appellant, versus MICROSOFT CORP., a Washington corporation, Defendant-Appellee.

Appeal from the United States District Court for the Southern District of Florida D.C. Docket No. 0:20-cv-60416-AMC ____________________ USCA11 Case: 22-10223 Document: 36-1 Date Filed: 04/25/2023 Page: 2 of 24

2 Opinion of the Court 22-10223

Before NEWSOM, LUCK, and TJOFLAT, Circuit Judges. PER CURIAM: Microsoft Corporation offers email security software to shield users from cyberthreats. TocMail, Inc. is a relative new- comer to the cybersecurity scene and offers a product geared to- wards a specific type of threat called Internet Protocol (IP) evasion. TocMail launched its IP-evasion product, got a patent, and then sued Microsoft for false advertising—all within two months. In its complaint, TocMail alleged that Microsoft misled the public into believing that Microsoft’s product offered protection from IP eva- sion. And TocMail—who had been selling its product for two months, spent almost nothing on advertising, and had not made a single sale—alleged billions of dollars in lost profits. Maybe that was enough to survive a motion to dismiss. The problem is that, at summary judgment, TocMail failed to back this allegation up with actual evidence. There’s no evidence that TocMail suffered any injury at all. And so it lacks standing to sue. This means that we don’t have jurisdiction to entertain this appeal. FACTUAL BACKGROUND AND PROCEDURAL HISTORY Microsoft Microsoft, one of the world’s largest technology companies, sells computer software. Microsoft’s Office 365 software includes programs like Skype, SharePoint, Teams, Outlook, Word, Power- Point, and Excel. Microsoft also offers an email security service. The company’s default email security service is responsible for USCA11 Case: 22-10223 Document: 36-1 Date Filed: 04/25/2023 Page: 3 of 24

22-10223 Opinion of the Court 3

discarding bad emails before they are delivered to Microsoft’s us- ers. The default service “scans each message in transit in Office 365 and provides time of delivery protection, blocking malicious hyper- links in a message.” In 2015, Microsoft introduced a new and improved email protection service called Advanced Threat Protection. 1 Advanced Threat Protection had two main features: Safe Attachments and Safe Links. Safe Attachments looked for malicious attachments, and Safe Links looked for malicious links. Safe Links was not a standalone product and couldn’t be purchased on its own. Instead, customers could gain access to Safe Links by either buying Ad- vanced Threat Protection as an add-on to Office 365 or by purchas- ing an Office 365 suite that came with Advanced Threat Protection. This case is about Safe Links. While Microsoft’s default se- curity system protected users at the “time of delivery,” Safe Links offered “time-of-click” protection. In other words, “attackers sometimes try to hide malicious URLs with seemingly safe links that are redirected to unsafe sites by a forwarding service after the message has been received.” Safe Links helped address that post- delivery threat. It offered that protection by “evaluat[ing] whether [a] link [was] good or bad” every time a user clicked on a link. Safe Links evaluated links in two ways. First, Safe Links had a reputation service that checked links against a constantly updated

1 Advanced Threat Protection was later renamed Microsoft Defender for Of- fice 365. Because the parties use the old name, so will we. USCA11 Case: 22-10223 Document: 36-1 Date Filed: 04/25/2023 Page: 4 of 24

4 Opinion of the Court 22-10223

list of known malicious links. Second, Safe Links had a detonation service. The detonation service followed links to the web content to assess the content and determine if the website was malicious. Hackers use various forms of “evasion” to circumvent cy- bersecurity software. For example, hackers use geo evasion, sand- box evasion, app-level evasion, human-validation evasion, time- based evasion, and IP evasion. This case revolves around time- based evasion and IP evasion. Time-based evasion involves a “[d]elayed launch of phish content.” IP evasion occurs when a link sends visitors to different websites depending on the visitor’s IP ad- dress. The point of IP evasion is to send a security program to one (safe) website and the real user to another (malicious) website. While there’s no genuine dispute that Safe Links guarded against at least some forms of time-based evasion, the parties do dispute whether Safe Links protected users from IP evasion. Microsoft advertised its Advanced Threat Protection service through brochures, guides, and other materials. In those materials, Microsoft touted its service. In one advertisement, for example, Microsoft said: Sophisticated attackers will plan to ensure links pass through the first round of security filters. They do this by making the links benign, only to weaponize them after the message is delivered, altering the des- tination of the links to a malicious site. With Safe Links, we are able to protect users right at the point of click by checking the link for reputation and trig- gering detonation if necessary. USCA11 Case: 22-10223 Document: 36-1 Date Filed: 04/25/2023 Page: 5 of 24

22-10223 Opinion of the Court 5

In other words, the advertisement explained that Safe Links— through time-of-click protection—would shield users from links that are weaponized after they are delivered. The advertisement also explained that Microsoft’s “machine learning models” would “meticulously analyze[]” content to “check for malicious signals and apply deep link inspection.” And it noted that the “average malware catch rate for Office 365 email [was] the highest in the industry at 99.9%.” Microsoft’s other advertisements were similar. TocMail TocMail is a relative newcomer to the cybersecurity scene. On December 12, 2019, four or so years after Microsoft came out with Safe Links, TocMail made its product available. And months later, on February 25, 2020, TocMail obtained a patent for its prod- uct. TocMail describes its product as “a cloud-based, time-of-click service that provides patented protection against redirects that use IP evasion to change to a malicious destination after delivery.” While TocMail and Safe Links both offered time-of-click protec- tion, the products weren’t the same. The products worked differ- ently, and Safe Links performed a broader array of tasks. TocMail hasn’t done much to market its product. In bring- ing its product to market, TocMail has issued two press releases, sent some emails to potential investors, and spent a few thousand dollars on digital advertising. That’s essentially it. TocMail hasn’t made any sales. TocMail admits that, although over 33,000 people have visited its website, it has not made a single sale and has zero USCA11 Case: 22-10223 Document: 36-1 Date Filed: 04/25/2023 Page: 6 of 24

6 Opinion of the Court 22-10223

revenue. There’s no evidence that TocMail has achieved any rep- utation in the marketplace. The Original Complaint We’ll now walk through the procedural history, focusing on those parts that speak to TocMail’s standing to sue. TocMail sued Microsoft on February 26, 2020—the day after TocMail got its pa- tent. At that point, TocMail’s product had been on the market for two months. In its complaint, TocMail alleged that Microsoft mis- led consumers into believing that Safe Links prevented IP evasion.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
67 F.4th 1255, Counsel Stack Legal Research, https://law.counselstack.com/opinion/tocmail-inc-v-microsoft-corporation-ca11-2023.