throbber
Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 1 of 30 Page ID #:1
`
`RUSS, AUGUST & KABAT
`Marc A. Fenster, SBN 181067
`mfenster@raklaw.com
`Ben Wang, SBN 228712
`bwang@raklaw.com
`12424 Wilshire Boulevard
`Twelfth Floor
`Los Angeles, California 90025
`Telephone: (310) 826-7474
`Facsimile: (310) 826-6991
`
`Attorneys for Plaintiff
`SPEX TECHNOLOGIES, INC.
`
`UNITED STATES DISTRICT COURT
`
`CENTRAL DISTRICT OF CALIFORNIA
`
`SOUTHERN DIVISION
`
`
`
`
`
`SPEX TECHNOLOGIES, INC.,
`
`Case No. 8:16-cv-01790
`
`
`
`Plaintiff,
`COMPLAINT FOR PATENT
`INFRINGEMENT
`
`v.
`
`
`KINGSTON TECHNOLOGY
`CORPORATION, KINGSTON
`DIGITAL, INC., KINGSTON
`TECHNOLOGY COMPANY, INC.,
`IMATION CORPORATION,
`DATALOCKER INC., DATA
`LOCKER INTERNATIONAL, LLC
`
`
`
`JURY TRIAL DEMANDED
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`RUSS, AUGUST & KABAT
`
`
`
`
`
`
`
`Defendants.
`
`
`
`
`
`
`
`
`
`
`
`
`COMPLAINT
`
`IPR2017-00430
`UNIFIED EX1028
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 2 of 30 Page ID #:2
`
`
`1.
`Plaintiff SPEX Technologies, Inc. ("SPEX" or "Plaintiff"), for its
`Complaint against Defendants Kingston Technology Corporation, Kingston Digital,
`Inc., Kingston Technology Company, Inc., Imation Corporation, DataLocker Inc.
`and Data Locker International, LLC (collectively, "Defendants"), hereby alleges as
`follows:
`
`PARTIES
`2.
`SPEX is a California corporation with its headquarters at 1860 Hartog
`Dr., San Jose, CA 95131.
`3.
`On information and belief, Kingston Technology Corporation is a
`California corporation with its headquarters at 17600 Newhope St., Fountain Valley,
`California 92708.
`4.
`On information and belief, Kingston Digital, Inc. ("Kingston Digital")
`is a Delaware corporation with its headquarters at 17600 Newhope St., Fountain
`Valley, California 92708.
`5.
`On information and belief, Kingston Technology Company, Inc. is a
`Delaware corporation with its headquarters at 17600 Newhope St., Fountain Valley,
`California 92708.
`6.
`Kingston Technology Corporation, Kingston Digital, Inc. and Kingston
`Technology Company, Inc. are referred to together as "Kingston."
`7.
`On information and belief, Imation Corporation ("Imation") is a
`Delaware corporation with its headquarters at 1 Imation way, Oakdale, Minnesota
`55128.
`8.
`On information and belief, DataLocker Inc. is a Kansas corporation
`with its headquarters at 7007 College Blvd., Suite 240, Overland Park, Kansas
`66211.
`9.
`On information and belief, Data Locker International, LLC is a
`Delaware corporation with its headquarters at 7007 College Blvd., Suite 240,
`Overland Park, Kansas 66211.
`
`
`
`1
`
`
`
`COMPLAINT
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 3 of 30 Page ID #:3
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`10. DataLocker Inc. and Data Locker International, LLC are referred to
`together as "DataLocker."
`NATURE OF THE ACTION
`11. This is a civil action for the infringement of United States Patent No.
`6,088,802 (the "'802 patent") (attached as Exhibit A) and United States Patent No.
`6,003,135 (the "'135 patent") (attached as Exhibit B) (collectively, the "Patents-in-
`Suit") under the patent laws of the United States, 35 U.S.C. § 1, et seq.
`12. This action involves Defendants' manufacture, use, sale, offer for sale,
`and/or importation into the United States of infringing products, methods, processes,
`services and systems that are hardware encrypting memory products that infringe
`one or more of the claims of the Patents-in-Suit.
`JURISDICTION AND VENUE
`13. This Court has original jurisdiction over the subject matter of this
`Complaint under 28 U.S.C. §§ 1331 and 1338(a) because this action arises under the
`patent laws of the United States, including 35 U.S.C. §§ 271, et seq.
`14. Defendants are subject to personal jurisdiction in this judicial district
`because Defendants regularly transact business in this judicial district by, among
`other things, offering Defendants' products and services to customers, business
`affiliates and partners located in this judicial district. In addition, Defendants have
`committed acts of direct infringement of one or more of the claims of one or more
`of the Patents-in-Suit in this judicial district.
`15. Venue in this district is proper under 28 U.S.C. §§ 1400(b) and 1391(b)
`and (c), because Defendants are subject to personal jurisdiction in this district and
`have committed acts of infringement in this district.
`16. On information and belief, joinder is appropriate because a portion of
`Plaintiff's right to relief is based on the making, using, importing, offering for sale
`and selling of IronKey-branded products. The IronKey brand was owned by Imation
`until February 2016, when it was acquired by Kingston and DataLocker. See, e.g.,
`
`
`
`2
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 4 of 30 Page ID #:4
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`https://www.kingston.com/us/company/press/article/40465 (Imation sold the USB
`IronKey assets to Kingston Digital and the IronKey hard drive assets to DataLocker).
`The parties were therefore involved in the same transaction upon which at least a
`portion of Plaintiff's claims are based.
`FACTUAL BACKGROUND
`17. The Patents-in-Suit were originally assigned to Spyrus, Inc. ("Spyrus").
`SPEX acquired full rights to the Patents-in-Suit from Spyrus.
`SPYRUS IS A PIONEERING ENCRYPTION COMPANY THAT HAS
`DEVELOPED CRYPTOGRAPHIC PRODUCTS RELIED ON TO SECURE
`ALL TYPES OF SENSITIVE INFORMATION
`18. Spyrus was founded around October 1992 by two pioneering women.
`The founding concept of Spyrus was to make cryptography more affordable and
`usable for distributing and accessing electronic content.
`19.
`Instead of building up the company with venture capital money, Spyrus
`initially built itself up using small capital investments from friends and family.
`Spyrus' first major achievement was to propose and win a contract with the
`Department of Defense ("DoD") to design a specification for a hardware security
`module ("HSM") to be used for encrypting sensitive communications. In 1993,
`Spyrus released the LYNKS HSM based on an ARM processor.
`20.
`In approximately 1993 or 1994, in partnership with Mykotronx, Spyrus
`released the successor to the LYNKS HSM, the Fortezza Crypto Card, originally
`named the Tessera Crypto Card. See, e.g., https://en.wikipedia.org/wiki/Fortezza.
`The Fortezza Crypto Card and its successor versions were capable of protecting
`sensitive data, including classified data. The Fortezza Crypto Card was used in a
`number of government and military and applications.
`21. Around 1996 or 1997, Spyrus began expanding on the cryptographic
`technology embodied in the LYNKS HSM and Fortezza Crypto Card technologies.
`In particular, Spyrus developed its Hydra series of products, which added
`
`
`
`3
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 5 of 30 Page ID #:5
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`rating
`
`capabilities such as flash memory or modem functionalities to the family of LYNKS
`HSM and Fortezza Crypto Card technologies. Spyrus' initial Hydra products were
`released around 1997. Spyrus' Hydra-based products are still sold today. Spyrus'
`current Hydra-based products include the PocketVault P-3X, PocketVault P-384,
`PocketVault P-384E, Worksafe, Worksafe Pro and Secure Portable Workplace.
`22. Spyrus' Hydra-based products have won awards and have been
`See,
`e.g.,
`consistently
`praised.
`
`http://www.pcmag.com/article2/0,2817,2478715,00.asp
`(editor
`of
`"Excellent"
`for
`the
`Worksafe
`Pro);
`http://www.pcmag.com/article2/0,2817,2478716,00.asp (editor rating of "excellent"
`for the Worksafe); http://www.thessdreview.com/our-reviews/spyrus-worksafe-pro-
`wtg-secure-flash-drive-review-worlds-secure-flash-drive/3/ (Worksafe Pro was
`given an "Editor's Choice" award; called the "worlds most secure flash drive");
`http://www.spyrus.com/spyrus-named-winner-in-2011-golden-bridge-awards-for-
`virtual-office-technology/ (Secure Pocket Drive named the winner in the Virtual
`Office Technology category of the 3rd Annual 2011 Golden Bridge Awards as well
`as the Security Products Guide's Tomorrow's Technology Today award and the GSN
`Homeland Security award); http://www.darkreading.com/risk/nsa-approves-spyrus-
`hyrda-pc-for-protection-of-classified-government-data/d/d-id/1132286?print=yes
`(Hydra Privacy Card Series II was first commercial-off-the-shelf device approved
`by the DoD to protect confidential information at SECRET level and below);
`http://www.businesswire.com/news/home/20060612005367/en/Info-Security-
`Products-Guide-Names-SPYRUS-Hydra (Hydra Privacy Card Series II won 2006
`Global Excellence in Secure and Removable Mass Storage Device Award from Info
`Security Products Guide); http://www.scmagazine.com/spyrus-hydra-privacy-card-
`series-ii/review/1087/ (very positive review of Hydra Privacy Card Series II; "If you
`deal with sensitive data, especially on laptops, you need the Hydra").
`
`
`
`4
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 6 of 30 Page ID #:6
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`23. SPEX was formed to facilitate licensing of the technology developed
`and practiced by Spyrus in both domestic and foreign markets.
`IMATION DISCUSSED A RELATIONSHIP WITH SPYRUS PRIOR TO
`ACQUIRING IRONKEY
`24.
`In approximately September 2011, Imation purchased the hardware
`of
`IronKey,
`Inc.
`("IronKey").
`assets
`http://www.computerworld.com/article/2511295/data-center/imation-buys-
`ironkey-s-hardware-assets.html.
`25. Prior to acquiring the assets from IronKey, Imation was in discussions
`with Spyrus regarding Spyrus and its technology.
`26. On March 9, 2010, Spyrus and Imation entered into a Confidential
`Disclosure Agreement.
`27. Spyrus and Imation had multiple meetings during 2010 and 2011 to
`discuss a potential business relationship between Spyrus and Imation. Topics
`discussed included synergies between Spyrus' technology and patents, and Imation's
`products.
`28.
`In April 2010, high-level executives of Spyrus and Imation met for an
`in-person meeting at Imation's headquarters in Minneapolis, Minnesota to discuss
`Imation's possible acquisition of Spyrus. The executives from Imation that attended
`the meeting included Dr. Subodh Kukarni (Chief Technology Officer and Vice
`President Global Commercial Business), Mark LeClair (Executive Directory
`Manufacturing Operations, Research, Development & Engineering) and Stephen
`Bradley (Director Strategic Growth Programs). During this meeting, among other
`things, Spyrus discussed its intellectual property, including the Patents-in-Suit, its
`other patents and its core technologies.
`29. On August 30th, 2010, Spyrus met again with Imation to continue the
`discussion of Imation's possible acquisition of Spyrus. Attendees included Mr.
`
`
`
`5
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 7 of 30 Page ID #:7
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`Bradley and Jim Ellis (Vice President M&A and Strategy). The topics discussed
`were similar to those discussed in the April 2010 meeting.
`30. The discussions came to a permanent halt after Imation acquired
`IronKey
`and
`MXI
`Security
`(http://www.storagenewsletter.com/rubriques/security/imation-acquires-assets-
`mxi-security/).
`KINGSTON ENTERED INTO A PARTNERSHIP WITH SPYRUS AND
`THEN IMPROPERLY USED SPYRUS' CONFIDENTIAL INFORMATION
`BY DISCLOSING IT TO A THIRD PARTY IN ORDER TO COMPETE
`WITH SPYRUS
`DataTraveler 5000 and DataTraveler 6000
`31. On March 14, 2008, Spyrus and Kingston entered into a mutual Non-
`Disclosure Agreement ("NDA"). A copy of the NDA is attached as Exhibit C to this
`complaint. The NDA prohibited unauthorized disclosure of confidential information
`and limited the use of confidential information to "discuss opportunities for joint
`business partnerships including integration of SPYRUS components and Kingston
`components into products…and joint development of products and strategies." Ex.
`C at ¶¶ 1, 2.
`32. The purpose of the NDA was to allow Spyrus and Kingston to explore
`a potential partnership to develop a next generation version of Kingston's
`DataTraveler Black Box product. Among the topics discussed after the NDA was
`executed were synergies between Spyrus' technology and Kingston's business needs
`as well as Spyrus' patent portfolio, including the Patents-in-Suit.
`33. The discussions were successful and, on April 14, 2009, Spyrus and
`Kingston entered into a Technology License and executed the first Licensed Product
`Appendix. Paragraph 11 of the Technology License extended the terms of the NDA
`to cover the disclosure of the confidential information during the new joint
`development relationship: "The obligations regarding confidentiality shall be
`
`
`
`6
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 8 of 30 Page ID #:8
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`governed by the Mutual Confidentiality Agreement between the parties effective
`May 14, 2008."1
`34. Paragraph 20.1 of the Technology License included a choice of law and
`venue clause agreeing to "personal and exclusive jurisdiction of and venue in the
`federal and state courts located in Orange County, California."
`35. The first Licensed Product Appendix was for the development of the
`Kingston DataTraveler Black Box Gen. 2. The Licensed Product Appendix licensed
`certain Spyrus patents, including the '802 patent, for the manufacture and sale of the
`DataTraveler Black Box Gen. 2.
`36. The DataTraveler Black Box Gen. 2 was to be the same size and form
`factor of the DataTraveler Black Box. To accomplish this goal, Spyrus shrank its
`existing Hydra technology to fit inside the Black Box case. The new technology
`was awarded FIPS 140-2 Level 2 certification.
`37. The Black Box Gen. 2 was renamed the DataTraveler 5000 and was
`released by Kingston in January 2010. The DataTraveler 5000 was a Kingston case
`and memory card combined with Spyrus' new smaller Hydra cryptographic
`technology. The DataTraveler 5000 was awarded FIPS 140-2 Level 2 certification
`by reusing Spyrus' FIPS 140-2 certification for the Hydra technology. The
`DataTraveler 5000 became Kingston’s first FIPS 140-2-certified product offering in
`the market.
`38. Federal Information Process Standards ("FIPS") are standards and
`guidelines developed by the National Institute of Standards and Technology
`("NIST")
`for
`use
`in
`federal
`computer
`systems.
`http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf. FIPS 140-2 details the
`security requirements for cryptographic modules to be used in federal computer
`
`
`1 The Technology License is marked confidential information and therefore cannot
`be attached to the Complaint.
`
`
`7
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 9 of 30 Page ID #:9
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`systems. Id. There are four levels of FIPS 140-2, with level 4 including the most
`stringent security. Id.
`39. Spyrus also developed the DataTraveler 6000, which was released by
`Kingston in September 2011. Like the DataTraveler 5000, the DataTraveler 6000
`was a Kingston case and memory card combined with Spyrus' new smaller Hydra
`cryptographic technology that had been certified to FIPS 140-2 Level 3. The
`DataTraveler 6000 was awarded FIPS 140-2 Level 3 certification by reusing the
`Spyrus FIPS 140-2 certification and became Kingston’s first FIPS 140-2 Level 3-
`certified product offering.
`40. On January 21, 2015, Kingston simultaneously informed Spyrus of its
`intent to release the DataTraveler 4000 G2, which had recently achieved FIPS 140-
`2 Level 3 certification, as well as its intent to cease supporting the DataTraveler
`6000.
`
`41. As a result of Kingston ceasing its support of the DataTraveler 6000,
`Spyrus sent a letter terminating the Technology License on January 21, 2015. The
`Technology License with Kingston terminated on April 21, 2015.
`Kingston Used Its Partnership With Spyrus As A Pretext To Improperly Receive
`And Use Spyrus' Confidential Information
`42. While Spyrus was fully dedicated to the partnership, Kingston was not.
`On information and belief, Kingston used the partnership with Spyrus to learn
`Spyrus' confidential information in order to develop its own competing technology
`in partnership with a Taiwanese company, Phison Electronics Corp. ("Phison").
`43. Between about November 2008 and April 2010, at Kingston's request,
`Spyrus shared highly confidential and proprietary technical information with
`Kingston. While some of the less detailed confidential information was needed for
`marketing purposes, Kingston did not need the detailed information it requested to
`perform its obligations under the Technology License. Rather, Kingston claimed it
`
`
`
`8
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 10 of 30 Page ID #:10
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`needed Spyrus' highly confidential and proprietary technical information to confirm
`that Spyrus' cryptographic protections were as strong as Spyrus claimed.
`44. The highly confidential and proprietary information requested by
`Kingston comprised Spyrus' competitive advantage in the marketplace, such as
`Spyrus' proprietary method for encryption key unwrapping and asymmetric
`cryptography techniques. Spyrus did not share its information lightly. Spyrus,
`however, shared its information in an effort to solidify its partnership with Kingston.
`45.
`In or around September 15, 2009, for example, Spyrus engineers and
`Jason Chen of Kingston had technical discussions regarding Spyrus' proprietary
`password implementation. On the same day, Burt Tregub, Spyrus' Vice President
`Corporate Development, emailed and spoke with Jason Chen to confirm the
`confidentiality of the shared information. Jason Chen confirmed this understanding.
`46. At Kingston's request, confidential information in greater detail was
`discussed during a meeting on December 11, 2009 with Kingston's Technical
`Resource Group ("TRG"), including Jason Chen, at Kingston's headquarters in
`Fountain Valley, California. Kingston specifically requested, and received, the
`written materials used in the December 11 presentation. The written materials were
`marked with confidentiality designations.
`47. On January 11, 2010, Jason Chen called Spyrus' Duane Linsenbardt
`seeking further detailed, highly confidential information about Spyrus' technology.
`When Mr. Linsenbardt informed Jason Chen that he was in the car and asked Jason
`Chen to follow-up via email, Jason Chen responded that an email was not possible
`because Ben Chen (of Kingston) was in Taiwan and needed the information that
`night.
`48. Spyrus was not aware that Ben Chen, Director of Flash Engineering at
`Kingston, had a need to receive, let alone received, Spyrus' highly confidential and
`proprietary information while working in Taiwan. Until the January 11 call, Spyrus
`was only aware of Ben Chen's receipt of high-level information about Spyrus
`
`
`
`9
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 11 of 30 Page ID #:11
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`technology. Learning that Ben Chen had received Spyrus' confidential information
`was particularly concerning because Spyrus was aware that Ben Chen was working
`on a project with Phison, who was and continues to be one of Spyrus' competitors.
`Further, Spyrus did not have an export license for its Technical Data or the Spyrus
`manufacturing tools.
`49. The January 11, 2010 call was also the first time that Spyrus learned
`that its confidential information was being shared and discussed outside of the
`United States. As cryptographic information, the information is export controlled
`and Spyrus did not have a license to export the Technical Data outside of the United
`States, including to Taiwan.
`50. Until Jason Chen's call, Spyrus believed that Kingston was complying
`with Spyrus' requirement that its proprietary, confidential information only be shared
`with necessary engineers in Kingston's Fountain Valley, California headquarters.
`51. On the day after Jason Chen's call, on January 12, 2010, Burt Tregub
`wrote a letter to John Terpening, Manager of Flash Engineering at Kingston,
`expressing Spyrus' concerns. The letter set out the relevant facts, including those
`above, and asked for confirmation that Spyrus' proprietary and confidential
`information had not been shared with third parties or people outside of the United
`States.
`52. More than a month later, on February 18, 2010, Calvin Leong, Director
`Legal Department at Kingston, responded to the January 12, 2010 letter. Mr. Leong
`indicated that Spyrus' confidential information had not been shared with any third
`party, including Phison, without Spyrus' knowledge. Mr. Leong further indicated
`that, as Jason Chen's boss, Ben Chen had the authority to access information about
`projects under development, including the DataTraveler 5000.
`53. Spyrus believed Kingston's assurances and continued working with
`Kingston.
`
`
`
`10
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 12 of 30 Page ID #:12
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`54.
`In October 2010, Kingston and Phison announced the formation of a
`joint venture focusing on embedded memory system product development.
`http://www.phison.com/English/NewsView.asp?ID=199&SortID=35.
`55. On February 22, 2011, Kingston announced the release of the
`DataTraveler 4000, which was an encrypting flash drive, like the DataTraveler 5000.
`Kingston did not have permission to use Spyrus' patented technology in the
`DataTraveler 4000. On information and belief, the DataTraveler 4000 was
`developed as part of the joint venture between Kingston and Phison.
`56. While Spyrus was not pleased by Kingston's release of the DataTraveler
`4000, in light of Kingston's February 2010 representation, the weaker security
`protections on the DataTraveler 4000 and Kingston's intent to focus on sales of the
`DataTraveler 6000 with FIPS 140-2 Level 3 certification for higher security
`requirements, Spyrus had no reason to believe at the time that the DataTraveler 4000
`was developed by Kingston and Phison using Spyrus' highly confidential and
`proprietary information.
`57.
`In January 2015, Spyrus' belief changed. On January 21, 2015, Andrew
`Ewing, Kingston's manager of encrypted drives, informed Burt Tregub of the
`impending release of the DataTraveler 4000 G2 and that Kingston would no longer
`support the DataTraveler 6000. Unlike the original DataTraveler 4000, the
`DataTraveler 4000 G2 contained significantly upgraded security features consistent
`with Spyrus' proprietary and confidential information shared with Kingston and had
`been certified to FIPS 140-2 Level 3. Like the DataTraveler 4000, the DataTraveler
`4000 G2 uses Phison technology.
`58. On
`information and belief, despite Kingston's February 2010
`representation to the contrary, Kingston disclosed Spyrus' highly confidential and
`proprietary information to Phison to assist in the development of the hardware
`encrypting chips by Phison. The cryptographic feature set of the DataTraveler 4000
`
`
`
`11
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 13 of 30 Page ID #:13
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`G2 makes it clear that the technology was developed using Spyrus' highly
`confidential and proprietary information.
`THE PATENTS-IN-SUIT
`59. SPEX is the owner by assignment of the Patents-in-Suit. SPEX owns
`all rights to the Patents-in-Suit, including the right to enforce the Patents-in-Suit.
`60. United States Patent No. 6,088,802, entitled "Peripheral Device With
`Integrated Security Functionality," issued on July 11, 2000 from United States Patent
`Application No. 08/869,305 filed on June 4, 1997. A true and correct copy of the
`'802 patent is attached as Exhibit A.
`61. United States Patent No. 6,003,135, entitled "Modular Security
`Device," issued on December 14, 1999 from United States Patent Application No.
`08/869,120 filed on June 4, 1997. A true and correct copy of the '135 patent is
`attached as Exhibit B.
`62. All maintenance fees for the Patents-in-Suit have been timely paid, and
`there are no fees currently due.
`
`COUNT I
`(KINGSTON'S INFRINGEMENT OF THE '802 PATENT)
`63. Paragraphs 1 through 62 are incorporated by reference as if fully
`restated herein.
`64. On information and belief, Kingston has made, used, offered for sale,
`sold and/or imported into the United States products that infringe various claims of
`the '802 patent, and continues to do so. By way of illustrative example, these
`infringing products include, without limitation, Kingston's hardware encrypting
`storage solutions, including but not limited to the DataTraveler 4000, DataTraveler
`4000 G2, DataTraveler Vault Privacy 3.0, DataTraveler 2000, IronKey D80,
`IronKey Enterprise S1000, IronKey Enterprise S250, IronKey Enterprise D250,
`IronKey F150, IronKey F100, IronKey Basic S1000, IronKey Basic S250, IronKey
`Basic D250, IronKey F200, IronKey Personal S250, IronKey D250, IronKey
`
`
`
`12
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 14 of 30 Page ID #:14
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`Workspace W700, IronKey Workspace W500, IronKey Workspace W300, IronKey
`Workspace W200, IronKey Workspace W700SC, MXI M200, MXI M500, MXI
`M500 and MXP Bio.
`65. Kingston has been and now is directly infringing one or more claims of
`the '802 patent under 35 U.S.C. §271(a), in this judicial District and elsewhere in the
`United States, by, among other things, making, using, selling, offering to sell and/or
`importing into the United States for subsequent sale or use hardware encrypting
`storage solutions that include, for example, (a) a cryptographic processor for
`performing security operations on data; (b) mass storage memory, such as flash or
`magnetic storage; (c) an interface between the cryptographic processor and the mass
`storage memory; (d) an interface with the host computer (e.g., a USB or SATA
`interface); and (e) a mediating interface that ensures that data communicated
`between the host computer and mass storage memory passes through the
`cryptographic processor. Exemplary charts showing how Kingston infringes the
`'802 patent are attached as Exhibits D and E.2 Exhibits D and E are based on the
`public information available to Plaintiff, and Plaintiff reserves the right to amend
`Exhibits D and E based on information obtained through discovery. Accordingly,
`the aforementioned products infringe the '802 patent literally and/or under the
`doctrine of equivalents.
`66. Kingston actively, knowingly, and intentionally induces, and continues
`to actively, knowingly, and intentionally induce, infringement of the '802 patent
`under 35 U.S.C. §271(b) by its customers and end users.
`67. Kingston has had knowledge of and notice of the '802 patent and its
`infringement. For example, Kingston licensed the '802 patent from 2009 to 2015 to
`
`
`2 Plaintiff reserves the right to assert additional claims of the '802 patent against
`Kingston as the litigation proceeds. For example, Plaintiff expressly reserves the
`right to assert additional claims in its infringement contentions to be served during
`the discovery process.
`
`
`13
`
`COMPLAINT
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 15 of 30 Page ID #:15
`
`
`produce and sell the DataTraveler 5000 and 6000. Kingston is aware of the scope
`of the '802 patent and its application to Kingston's products.
`68. Kingston has induced its customers and end users to infringe the '802
`patent by using hardware encrypting storage solutions to (a) communicate with a
`host computer to exchange data with the hardware encrypting storage solution; (b)
`perform security operations on the data; (c) store or retrieve the data; and (d) mediate
`communications so that data must first pass through the hardware encrypting
`processor. See, e.g., Exs. D, E. For example, Kingston encourages its customers
`and end users to perform infringing methods by the very nature of the products.
`When using the infringing products, security operations are performed on all data
`passed between Kingston's infringing products and the customer's or end user's
`computer.
`69. Kingston specifically intends its customers and/or end users infringe
`the '802 patent, either literally or by the doctrine of equivalents, because Kingston
`has known about the '802 patent and how Kingston's products infringe the claims of
`the '802 patent but Kingston has not taken steps to prevent infringement by its
`customers and/or end users. Accordingly, Kingston has acted with the specific intent
`to induce infringement of the '802 patent.
`70. Accordingly, Kingston has
`induced, and continues
`infringement of the '802 patent under 35 U.S.C. §271(b).
`71. As discussed above, Kingston has had knowledge of and notice of the
`'802 patent since at least April 2009, when it entered into the Technology License
`with Spyrus. Kingston was well aware of the scope of the '802 patent and agreed to
`mark the DataTraveler 5000 and 6000 with the '802 patent. Kingston is aware of the
`scope of the '802 patent and its application to Kingston's products. Furthermore, on
`information and belief, Kingston knowingly and intentionally used Spyrus' highly
`confidential and proprietary information to develop at least the DataTraveler 4000
`and 4000 G2. Kingston, at the very least, should be aware of its infringing actions.
`
`induce,
`
`to
`
`
`
`14
`
`COMPLAINT
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`RUSS, AUGUST & KABAT
`
`

`
`Case 8:16-cv-01790-JVS-AGR Document 1 Filed 09/27/16 Page 16 of 30 Page ID #:16
`
`
`1
`2
`3
`4
`5
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`
`Despite this knowledge, Kingston continues to commit tortious conduct by way of
`patent infringement.
`72. Kingston has been and continues to infringe one or more of the claims
`of the '802 patent through the aforesaid acts.
`73. Kingston has committed these acts of infringement without license or
`authorization.
`74. Plaintiff is entitled to recover damages adequate to compensate for the
`infringement.
`75. Kingston has and continues to infringe the '802 patent, acting with an
`objectively high likelihood that its actions constitute infringement of the '802 patent.
`Kingston has known or should have known of this risk at least as early as 2009.
`Accordingly, Kingston's infringement of the '802 patent has been and continues to
`be willful.
`
`COUNT II
`(KINGSTON'S INFRINGEMENT OF THE '135 PATENT)
`76. Paragraphs 1 through 62 are incorporated by reference as if fully
`restated herein.
`77. On information and belief, Kingston has made, used, offered for sale,
`sold and/or imported into the United States products that infringe various claims of
`the '135 patent, and continues to do so. By way

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket