throbber
UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`
`Civil Action No. 6:23-cv-00319
`
`PROXENSE, LLC,
`
`Plaintiffs,
`
`v.
`
`MICROSOFT CORPORATION,
`
`JURY TRIAL REQUESTED
`
`Defendants.
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`Plaintiff Proxense, LLC (“Proxense” or “Plaintiff”) hereby sets forth its Complaint for
`
`patent infringement against Defendant Microsoft Corporation (“Microsoft” or “Defendant”), and
`
`states as follows:
`
`NATURE OF THE CASE
`
`1.
`
`This action is for patent infringement arising under the patent laws of the United
`
`States, 35 U.S.C. §§ 1, et seq. As further stated herein, Proxense alleges that Microsoft infringes
`
`one or more claims of patents owned by Proxense. Accordingly, Proxense seeks monetary
`
`damages and injunctive relief in this action.
`
`THE PARTIES
`
`2.
`
`Plaintiff Proxense, LLC is a Delaware company with its principal place of business
`
`at 689 NW Stonepine Drive, Bend, Oregon 97703.
`
`3.
`
`On information and belief, Microsoft is a corporation organized and existing
`
`under the laws of the State of Washington, with a principal place of business in this district
`
`located at 10900 Stonelake Boulevard, Suite 225, Austin, Texas 78759.
`
`1
`
`MICROSOFT 1004
`
`

`

`JURISDICTION AND VENUE
`
`4.
`
`This Court has exclusive subject matter jurisdiction over this case pursuant to 28
`
`U.S.C. §§ 1331 and 1338(a) on the grounds that this action arises under the Patent Laws of the
`
`United States, 35 U.S.C. § 1 et seq., including, without limitation, 35 U.S.C. §§ 271, 281, 284, and
`
`285.
`
`5.
`
`This Court has personal jurisdiction over Microsoft because it has conducted and
`
`continues to regularly conduct business within the State of Texas and this District. Microsoft has
`
`purposefully and voluntarily availed itself of the privileges of conducting business in the United
`
`States, the State of Texas, and this District by continuously and systematically placing goods into
`
`the stream of commerce through an established distribution channel with the expectation that they
`
`will be purchased by consumers in this District. Microsoft directly and/or through intermediaries
`
`(including distributors, sales agents, and others), ships, distributes, sells, offers to sell, imports,
`
`advertises, makes, and/or uses its products (including but not limited to the products accused of
`
`infringement herein) in the United States, the State of Texas, and this District.
`
`6.
`
`Upon information and belief, Microsoft conducts business within the State of Texas
`
`and in this district, and has designated Corporation Service Company d/b/a CSC − Lawyers
`
`Incorporating Service Company, 211 E. 7th Street, STE 620, Austin, Texas 78701-3218, as its
`
`agent for service of process in this district.
`
`7.
`
`On information and belief, Microsoft has been registered to do business within the
`
`State of Texas under Texas Secretary of State File Number 0010404606 since about March 1987.
`
`8.
`
`On information and belief, Microsoft employs one or more of its data centers in
`
`this district in furtherance of infringing acts in this district since at least 2008. For example,
`
`Microsoft maintains data centers in this district, located at: 5150 Rogers Road, San Antonio,
`
`
`
`2
`
`

`

`Texas 78251, 5200 Rogers Road, San Antonio, Texas 78251,1 and 3823 Wiseman Boulevard,
`
`San Antonio, Texas 78251.2
`
`9.
`
`On information and belief, Microsoft has operated data centers supporting
`
`Microsoft products and services within the State of Texas, and within this district, since at least
`
`2008. Microsoft is building at least three additional data centers in this district, including two
`
`data centers located at: 3545 Wiseman Boulevard, San Antonio, Texas 78251, and another data
`
`center located at 15000 Block Lambda Drive, San Antonio, Texas 78245. Upon information and
`
`belief, Microsoft’s data centers, including those in this district, include computer hardware (e.g.,
`
`memory and processors) that store and execute software that performs some of the actions that
`
`infringe on the patents in the lawsuit. On information and belief, Microsoft has employed, is
`
`employing, and is offering to employ individuals in this district in furtherance of infringing acts
`
`in this district. On information and belief, these employees have direct personal knowledge
`
`about the accused products and Microsoft’s infringing activities. For example, Justin Santos,
`
`Senior Cloud Security Architect, purporting according to his LinkedIn profile to be working at
`
`Microsoft in Austin, Texas, describes that he “[d]rive[s] the use and consumption of Microsoft’s
`
`… Identity products and services in highly regulated industries – Financial, Healthcare, Federal,
`
`and State and Local Government across the US as a part of Microsoft’s new Security Solution
`
`Area within Customer Success United (CSU).” These data centers which Microsoft operates
`
`constitute a regular and established physical presence in the district, including, but not limited to,
`
`ownership of or control over property, inventory, or infrastructure.
`
`
`1 See https://www.datacenterhawk.com/providers/microsoft-azure (last accessed April 28, 2023).
`2 See https://www.virtualbx.com/industry-news/san-antonio-microsoft-reaches-mid-point-on-
`86m-expansion-in-westover-hills/ (last accessed April 28, 2023).
`3
`
`
`
`

`

`10.
`
`On information and belief, Microsoft has operated permanent office facilities
`
`within the State of Texas, and within this district, since at least 2000. The offices Microsoft
`
`maintains in this district include locations at 10900 Stonelake Boulevard, Suite 225, Austin,
`
`Texas 787593 and Concord Park II, 401 East Sonterra Boulevard, Suite 300, San Antonio, Texas
`
`78258.
`
`11. Microsoft operates offices in Austin, Texas for the purpose of selling, promoting,
`
`maintaining, and providing support for a suite of products, including the accused products.
`
`12.
`
`On information and belief, Microsoft maintains a “Corporate Sales Offices” in
`
`Austin, Texas at the following address: 10900 Stonelake Boulevard, Suite 225 Austin, TX,
`
`78759; and Microsoft maintains a “Corporate Sales Office” in San Antonio, Texas at the
`
`following address: Concord Park II 401 East Sonterra Boulevard, Suite 300, San Antonio, TX,
`
`78258.
`
`13.
`
`On information and belief, one or more of the Accused Products are used, offered
`
`for sale, and sold in this district, including by Microsoft and by “Microsoft-certified resellers”
`
`(e.g., Heart of Texas Network Consultants, located at 703 Willow Grove Rd., Waco, Texas
`
`76712).
`
`14.
`
`On information and belief, Microsoft operated at least ten physical stores
`
`throughout Texas, some of which were in this district, from 2009 until they were all closed in
`
`2020. During that time period, Microsoft had physical stores that sold Microsoft’s products at
`
`least at the following addresses: (a) 3309 Esperanza Crossing, Austin, TX 78758 and (b) 15900
`
`La Cantera Parkway The Shops at La Cantera San Antonio, TX 78256.
`
`
`3 See https://news.microsoft.com/2000/01/05/microsoft-opens-austin-texas-facility/ (last accessed
`April 28, 2023).
`
`
`
`4
`
`

`

`15.
`
`Proxense’s causes of action arise directly from Microsoft’s business contacts and
`
`other activities in the State of Texas and this District.
`
`16. Microsoft has derived substantial revenues from its infringing acts within the State
`
`of Texas and this District.
`
`17.
`
`In other recent actions, Microsoft has either admitted or not contested that this
`
`federal judicial district is a proper venue for patent infringement actions against it. See, e.g.,
`
`Thompson v. Microsoft Corp., No. 1:19-cv-00680-RP, Dkt. No. 6; Panther Innovations v.
`
`Microsoft Corp., No. 6-20-cv-01071, Dkt. No. 14; Exafer Ltd. v. Microsoft Corp., No 1-20-cv-
`
`00131, Dkt. No. 15; WSOU Investments, LLC v. Microsoft Corp., No. 20-cv-00464, Dkt. No. 20;
`
`Zeroclick, LLC v. Microsoft Corp., No. 20-cv-00272, Dkt. No. 14; and California Institute of
`
`Technology v. Microsoft Corp., No. 21-cv-00276, Dkt. No. 22.
`
`18.
`
`Venue is proper in the Western District of Texas pursuant to 28 U.S.C. §§ 1391
`
`and 1400(b) because Microsoft maintains regular and established places of business in this
`
`district and has committed acts of infringement within this district giving rise to this action.
`
`19. Microsoft has committed acts of infringement in this District and does business in
`
`this District, including making sales and/or providing service and support for customers and/or
`
`end-users in this District. Microsoft purposefully and voluntarily sold one or more infringing
`
`products with the expectation they would be purchased in this District. These infringing products
`
`have been and continue to be purchased in this District. Thus, Microsoft has committed acts of
`
`infringement within the United States, the State of Texas, and this District.
`
`20.
`
`Furthermore, Microsoft maintains corporate sales offices in this district, which, on
`
`information and belief, provide sales and support for the infringing products.
`
`
`
`5
`
`

`

`PATENTS-IN-SUIT
`
`21.
`
`On January 8, 2013, the United States Patent and Trademark Office duly and legally
`
`issued U.S. Patent No. 8,352,730 (the “730 Patent”) entitled “Biometric Personal Data Key (PDK)
`
`Authentication.” A true and correct copy of the 730 Patent is attached hereto as Exhibit 1.
`
`22.
`
`On November 11, 2014, the United States Patent and Trademark Office duly and
`
`legally issued U.S. Patent No. 8,886,954 (the “954 Patent”) entitled “Biometric Personal Data Key
`
`(PDK) Authentication.” A true and correct copy of the 954 Patent is attached hereto as Exhibit 2.
`
`23.
`
`On March 26, 2016, the United States Patent and Trademark Office duly and legally
`
`issued U.S. Patent No. 9,298,905 (the “905 Patent”) entitled “Biometric Personal Data Key (PDK)
`
`Authentication.” A true and correct copy of the 905 Patent is attached hereto as Exhibit 3.
`
`24.
`
`On February 4, 2014, the United States Patent and Trademark Office duly and
`
`legally issued U.S. Patent No. 8,646,042 (the “042 Patent”) entitled “Hybrid Device Having a
`
`Personal Digital Key and Receiver-Decoder Circuit and Methods of Use.” A true and correct copy
`
`of the 042 Patent is attached hereto as Exhibit 4.
`
`25.
`
`On June 13, 2017, the United States Patent and Trademark Office duly and legally
`
`issued U.S. Patent No. 9,679,289 (the “289 Patent”) entitled “Hybrid Device Having a Personal
`
`Digital Key and Receiver-Decoder Circuit and Methods of Use.” A true and correct copy of the
`
`289 Patent is attached hereto as Exhibit 5.
`
`26.
`
`On September 11, 2018, the United States Patent and Trademark Office duly and
`
`legally issued U.S. Patent No. 10,073,960 (the “960 Patent”) entitled “Hybrid Device Having a
`
`Personal Digital Key and Receiver-Decoder Circuit and Methods of Use.” A true and correct copy
`
`of the 960 Patent is attached hereto as Exhibit 6.
`
`6
`
`

`

`27.
`
`Proxense is the sole and exclusive owner of all right, title and interest to and in, or
`
`is the exclusive licensee with the right to sue for, the 730, 954, 905, 042, 289, and 960 Patents
`
`(together, the “Patents-in-Suit”), and holds the exclusive right to take all actions necessary to
`
`enforce its rights to the Patents-in-Suit, including the filing of this patent infringement lawsuit.
`
`Proxense also has the right to recover all damages for past, present, and future infringement of the
`
`Patents-in-Suit and to seek injunctive relief as appropriate under the law.
`
`28.
`
`The technologies of the Patents-in-Suit were invented by John Giobbi and, for some
`
`of the patents, David Brown. The 730, 954, 905, and 989 Patents generally cover systems, devices,
`
`and methods for an integrated device that persistently stores biometric data for a user in a tamper-
`
`resistant format. Subsequently, scan data collected from a user (e.g., a fingerprint) can be
`
`compared against the stored biometric data. Once the user has been biometrically verified by the
`
`integrated device, a code can be wirelessly transmitted for authentication. The 042, 289, and 960
`
`Patents generally cover systems, devices, and methods of utilizing personal digital keys for
`
`verifying a user in order to enable applications, functions, or services.
`
`FACTUAL ALLEGATIONS
`
`I.
`
`TECHNOLOGY BACKGROUND
`
`29.
`
`Authentication is the process by which the identity of a user is confirmed on a
`
`device, including computers, tablets, and phones. When a person is authenticated, the goal is to
`
`verify that the credentials presented are authentic. For years, users were authenticated with
`
`usernames and passwords. However, with the amount of sensitive personal and financial
`
`information currently stored on personal devices and the growing number of devices and services
`
`that people use on a regular basis and that require regular authentication, and the rise of
`
`biometric readers and high-speed networks, there was a need to implement improved
`
`7
`
`

`

`authentication architectures. The Username and password method is not an ideal authentication
`
`mechanisms because people tend to pick low security passwords that are easy to remember, they
`
`tend to reuse the same password across multiple devices and services, they tend not the change
`
`the password, and they sometimes write the password down on paper or type out the password in
`
`public where their device screen can be seen by those around them. This method is also time
`
`consuming and inconvenient from a user experience perspective, especially when a user needs to
`
`try several passwords or needs to type out a high security (long and complex) password on the
`
`small keyboard of a portable device. For all of these reasons and many more, a better architecture
`
`is one that relies less on the users’ memory.
`
`30.
`
`One such architecture is “federated authentication” (also known as “federated
`
`identity”), which relies on an external trusted system to authenticate users. In a federated
`
`authentication solution, the system being accessed must request authentication of the user from
`
`the external system that is used to authenticate users. The external system authenticating the user
`
`will then communicate successful authentication back to the system being accessed. Successful
`
`authentication is communicated between the two systems with the issuance security tokens
`
`containing claims about user authentication. Upon successful authentication of a user, the
`
`external system issues a security token which can be exchanged for access to the other system.
`
`One such federated architecture is OpenID Connect. This method relies less on user memory
`
`because they need to use their username and password significantly less often.
`
`31. While OpenID connect limited the use of passwords, it did not eliminate them.
`
`Authentication protocols geared towards eliminating passwords include WebAuthn and its
`
`derivative, FIDO2, an open authentication standard developed by the FIDO alliance. WebAuthn,
`
`and the derivative protocol FIDO2, utilize an asymmetric key pair to authenticate a device.
`
`8
`
`

`

`Possession and control of the device verifies the identity of the user. The device, referred to as
`
`an authenticator, generates a private/public key pair and a credential ID uniquely identifying the
`
`key pair. The public key and credential ID are sent to the authentication server – called in the
`
`protocol the “relying party”. The private key is held by the authenticator. During authentication,
`
`the authenticator sends a signature generated with its private key and the credential ID
`
`identifying the private key used to generate the signature. The relying party (i.e., authentication
`
`server) uses the credential ID to retrieve the matching public key. The signature is then verified
`
`with the public key. Upon successful verification of the signature, the relying party issues an
`
`authentication response.
`
`32. WebAuthn and federated protocols can be combined. When combined, the
`
`system to be accessed by the user requests authentication by a WebAuthn / FIDO 2 server. The
`
`server issues an authentication request to the user’s authenticator. The authenticator responds by
`
`providing a signature and credential ID to the WebAuthn/FIDO2 server. If the signature is
`
`verified, the WebAuthn/FIDO2 server informs the OpenID connect of successful authentication.
`
`The OpenID connect server then sends a security token to be used to access the system
`
`requesting authentication.
`
`33.
`
`Attempting to eliminate the use of passwords, Microsoft has developed a
`
`universal platform “password-less” architecture. The architecture is universal in that it works
`
`across platforms, such as iOS, Android, Windows, and Xbox. It is password-less in that
`
`passwords have been replaced with the use of authenticators approved or provided by Microsoft.
`
`Incorporating OpenID Connect, Microsoft’s architecture relies on the issuance of security
`
`tokens. The hub of Microsoft’s universal platform password-less architecture is Microsoft
`
`Identity Platform, which is the evolution of Azure Active Directory. The Microsoft Identity
`
`9
`
`

`

`Platform receives authentication requests from external systems, coordinates the action of
`
`authenticators, and issues security tokens.
`
`II.
`
`PROXENSE AND ITS INNOVATIVE TECHNOLOGIES
`
`34.
`
`Proxense was founded in 2001.4 From approximately 2004-2012, Proxense
`
`developed, inter alia, mobile payment technologies and commercial products, employing over
`
`thirty engineers, and investing many millions of dollars in product development and other research
`
`and development efforts. Foundational capabilities of Proxense’s technologies included a secure
`
`element, biometrics captured and stored thereon, retrieval of biometrics and token passing to a
`
`trusted third party, and completion of a mobile payment transaction.
`
`35.
`
`Proxense also developed sophisticated, proprietary, proximity-based detection,
`
`authentication, and automation technology, built on the concept of wirelessly detecting,
`
`authenticating, and communicating with personal digital keys (“PDKs”). Proxense’s technology
`
`enabled PDKs to run for as long as two years on tiny batteries. “ProxPay” technology also included
`
`biometrically-based user and device authentication options, the ability to conduct biometric-
`
`verified transactions without sending or exposing the underlying biometric data or storing it
`
`anywhere except the PDK, and the incorporation of a registration for maintaining or verifying the
`
`PDK. Significant financial and engineering resources were deployed to make this possible. The
`
`resulting developments became primary differentiators of Proxense’s product line, and significant
`
`elements on which its business was built.
`
`36.
`
`John Giobbi is the founder and CEO of Proxense. He is an experienced product
`
`designer and prolific inventor (a named inventor on approximately 200 patents, including the
`
`4 The company was formally incorporated as an LLC in 2001 under the name Margent
`Development LLC; in 2005, the business was renamed to Proxense LLC.
`10
`
`

`

`asserted patents), with over 35 years of experience as an entrepreneur and product development
`
`executive. For example, Mr. Giobbi was a Senior Vice President at WMS Gaming, and managed
`
`over 200 staff; in his six-year tenure at that company, its market capitalization soared from
`
`approximately $80 million to about $1 billion. Mr. Giobbi was also the founder and President of
`
`Prelude Technology Corp. and InPen.
`
`37.
`
`The innovative, visionary nature of Proxense’s technology was recognized in the
`
`media, beginning in mid-2008, when, The Bulletin featured a story on Proxense’s mobile payment
`
`technology, titled “A pint-sized virtual wallet.” Andrew Moore, The Bulletin (May 7, 2008),
`
`Exhibit 7. The story describes a future that greatly resembles the present-day, including a
`
`“wireless wallet” and “fingerprint” verification, including the use of such technology to pay for
`
`goods using such wireless methods protected by biometric measures like a fingerprint. In 2009,
`
`Trend Hunter ran a similar story titled “Virtual Biometric Wallets,” featuring Proxense and Mr.
`
`Giobbi. Michael Plishka, Trend Hunter (January 4, 2009), Exhibit 8.
`
`38.
`
`Another 2009 article, ran in DARKReading, a publication in InformationWeek’s
`
`IT Network, also featured the company and Mr. Giobbi in an article titled “Startup May Just
`
`Digitize Your Wallet.” George V. Hulme, DARKReading (February 8, 2009), Exhibit 9. The
`
`DARKReading article described that Proxense was “in the process of bringing to market a
`
`proximity-based communications device that aims to provide a way to securely share information
`
`and conduct payments.” Proxense’s Personal Digital Keys (PDKs) were described as “carried by
`
`users, perhaps even within a cell phone, and can security hold data and manage authentication.”
`
`Mr. Giobbi explained that “the data within the PDK also can be protected by additional layers of
`
`authentication, such as biometric…”
`
`11
`
`

`

`39.
`
`It would be years until products like Azure Active Directory and Microsoft Identity
`
`launched, and accordingly Proxense’s technology was years ahead of the industry.
`
`40.
`
`Today, Proxense holds at least 80 patents on related technology, including digital
`
`content distribution, digital rights management, personal authentication, biometric data
`
`management and mobile payments. Proxense continues to prosecute new patents on its proprietary
`
`technology.
`
`III.
`
`INFRINGEMENT ALLEGATIONS
`
`1.
`
`41.
`
`Proxense’s Interactions with Microsoft
`
`In 2010, Proxense engaged in discussions with Microsoft for the purpose of
`
`potentially integrating Proxense’s proprietary secure authentication technology utilizing biometric
`
`authentication into Microsoft products.
`
`42.
`
`On July 29, 2016, counsel for Proxense sent a letter to Microsoft, advising it as to
`
`Proxense’s “over 30 patents” included as an attachment, including the Patents-in-Suit, and further
`
`advising of “another 20+ US patent applications pending.” A copy of the letter and list of patents
`
`attached thereto is attached as Exhibit 10.
`
`43.
`
`Since at least that time, i.e. on or about July 29, 2016, Microsoft has had actual
`
`notice of the Patents-in-Suit and the scope of their claims as of at least their dates of issue.
`
`44. Microsoft has also had knowledge of the infringing nature of its activities, or at
`
`least a willful blindness regarding the infringing nature of its activities, since at least Proxense’s
`
`making Microsoft aware of the Patents-in-Suit as early as 2016, but at least as of the public filing
`
`of this Complaint. This follows where Proxense included with its July 29, 2016 correspondence a
`
`written comparison between Proxense’s claimed inventions and Microsoft’s products, including
`
`details of Microsoft’s infringing activity. Microsoft was also aware of Proxense’s proprietary
`
`12
`
`

`

`technology at least as early as 2010, when Proxense disclosed details of these technologies during
`
`discussions with Microsoft at that time.
`
`45.
`
`Despite Microsoft’s knowledge of the Patents-in-Suit, detailed knowledge of
`
`Proxense’s proprietary technology, and Microsoft’s knowledge that it infringed the Patents-in-
`
`Suit, or, at the very least a willful blindness to the fact that Microsoft infringes Proxense’s patents,
`
`Microsoft continued to infringe the claims of the Patents-in-Suit. Microsoft’s infringement has
`
`been and continues to be willful since at least 2016. Microsoft released the Azure Active Directory
`
`platform and its evolution into the Microsoft Identity platform with the intent they would be used
`
`to infringe the Patents-in-Suit.
`
`2.
`
`46.
`
`The Accused Products
`
`Through its own actions, and the actions of its customers and user, which Microsoft
`
`directs and controls, Microsoft has manufactured, used, marketed, sold, offered for sale, and
`
`exported from and imported into the United States a universal platform password-less architecture
`
`that directly and/or indirectly infringes (literally or via the doctrine of equivalents) the Patents-in-
`
`Suit.
`
`47.
`
`Three primary components make up the infringing architecture. The first is the
`
`Microsoft Identity Platform (also known as Azure Active Directory), which coordinates the actions
`
`of the other components by authenticating users and issuing various bearer tokens. The second is
`
`an authenticator permitting user verification by Microsoft Identity Platform. During verification,
`
`Microsoft Identity Platform issues commands to the authenticator (called “requests”). Operation
`
`of the authenticator, accordingly, is controlled by Microsoft Identity Platform. The third
`
`component of the system is a resource, such as an application, website, or subscription, requesting
`
`authentication of the user. During user login, the resource sends requests to a URL provided by
`
`13
`
`

`

`Microsoft and in a form dictated by Microsoft. The resource then listens for a reply at a callback
`
`URL the resource registered with Microsoft. As with the requests, the callbacks are in the form
`
`dictated by Microsoft. The resources are hosted by devices and/or servers separate from Microsoft
`
`Identity Platform. Accordingly, the resource and Microsoft Identity Platform are separate and
`
`distinct entities and the resource, which is not Microsoft Identity Platform, is the system being
`
`accessed.
`
`48. Microsoft utilizes the Microsoft Identity Platform to sign users into Windows
`
`10/11, Xbox consoles, Xbox Game Pass, Office 365, Microsoft Family, and other services and
`
`products offered by Microsoft. Microsoft sells access to Microsoft Identity Platform to developers,
`
`websites, and corporate clients through various subscriptions. Thus, for a fee, Microsoft Identity
`
`Platform becomes an identity provider for applications, businesses, and websites. Selling such
`
`identity and access management (IAM) services and controlling the actions of subscribers and
`
`users, Microsoft directly and/or indirectly infringes (and literally or under the doctrine of
`
`equivalents) the Patents-in-Suit. Furthermore, by utilizing Microsoft Identity Platform for its own
`
`product and services, Microsoft directly and/or indirectly infringes (and literally or via the doctrine
`
`of equivalents) the Patents-in-Suit.
`
`49.
`
`As noted above, Microsoft’s
`
`infringing universal platform password-less
`
`architecture includes an authenticator. One authenticator distributed by Microsoft is Windows
`
`Hello, a native component of Windows 10 and 11. Microsoft has distributed variants of Windows
`
`Hello that have included functionality to verify a user during authentication of a Windows-
`
`compatible device. Since at least November 20, 2018, if not earlier, Windows Hello has enabled
`
`password-less sign-in to services and subscriptions offered by Microsoft. See Exhibit 11. Another
`
`authenticator distributed by Microsoft is the Microsoft Authenticator App. Microsoft has
`
`
`
`14
`
`

`

`distributed variants of the Microsoft Authenticator App that have included functionality to verify
`
`a user during authentication of an Android or iOS compatible mobile device. The current and
`
`previous versions of Windows Hello and Microsoft Authenticator, along with devices with them,
`
`alone and together, are non-limiting instances of authenticators integrated into the Accused
`
`Products.
`
`50.
`
`In addition to authenticators developed by Microsoft, authenticators developed by
`
`Microsoft’s partners may also be incorporated into the Accused Products. To receive the benefit
`
`of having their authenticator work on Windows, Microsoft Edge browser, and online Microsoft
`
`Accounts, the authenticator must meet the requirements set by Microsoft, including review by
`
`Microsoft’s engineering team. See Exhibit 12. By submitting the request for approval, an
`
`authenticator developer also enters into a contract with Microsoft in the form of its “Terms of
`
`Use,” which give Microsoft control over both the terms (which can be changed by Microsoft at
`
`any time with no prior notice) and gives Microsoft control over the means by which any such
`
`authenticator operates. By setting such requirements, Microsoft directs and controls the actions of
`
`its partners.
`
`51.
`
`The Microsoft Identity Platform, which directs and controls the actions of the
`
`authenticator, is also an element of Accused Product. Microsoft operates and maintains the
`
`Microsoft Identity platform, an evolution of the Azure Active Directory platform. When combined
`
`with authenticators, such as Windows Hello, Microsoft Authenticator App, and others developed
`
`and sold by Microsoft’s partners, consumers of Microsoft’s products and services receive the
`
`benefit of password-less biometric authentication across platforms. For instance, a user may log
`
`into and utilize Microsoft Office or their Xbox subscription on their Android phone. Third party
`
`developers can purchase identity and access management services from Microsoft to integrate their
`
`
`
`15
`
`

`

`applications with Microsoft Identity in order to offer cross platform password-less authentication
`
`via biometrics and the use of ID and access tokens to their customers and subscribers. Developers
`
`subscribing to Microsoft Identity Platform must register their application or website with
`
`Microsoft, request authentication by sending a request to a URL provided by Microsoft and in a
`
`format dictated by Microsoft, and listen for a callback provided by Microsoft that contains a
`
`message generated by Microsoft in a format controlled by Microsoft. To facilitate such controlled
`
`interactions across platforms, Microsoft has developed Microsoft Authentication Library (MSAL).
`
`See Exhibit 13.
`
`52.
`
`The Accused Products also include a resource accessed following successful
`
`authentication of the authenticator by Microsoft Identity Platform. As noted above, the resource
`
`may be an application, website, and/or a subscription offered by Microsoft, a subscribing business,
`
`or a subscribing developer. When a user has been authenticated via an authenticator offered by
`
`Microsoft or one of its partners, various bearer tokens are returned by Microsoft Identity Platform
`
`to the callback URL registered with Microsoft Identity Platform. The bearer token allows access
`
`to the application, and as such is an access message. Regardless of whether the resource is an
`
`application, a subscription, or a service offered by Microsoft or a subscribing developer or
`
`business, the resource is on a system separate and distinct from Microsoft Identity Platform.
`
`Distribution of bearer tokens and other such access messages by Microsoft Identity Platform is
`
`thus necessary for Microsoft Identity Platform to inform the resource that the user has been
`
`successfully authenticated via an authenticator distributed by Microsoft or one of its partners. As
`
`the bearer tokens are generated and distributed by Microsoft Identity Platform, Microsoft controls
`
`their form and how they are distributed.
`
`
`
`16
`
`

`

`53.
`
`Through the operation of the foregoing as directed and controlled by Microsoft, the
`
`Accused Products practice the claims of the Patents-in-Suit to improve the user experience of
`
`Microsoft’s customers and those of subscribing developers, and to improve Microsoft’s position
`
`in the market with respect to Identity and Access Management, operating as an identity provider,
`
`along with providing access to other products, services, and subscriptions.
`
`3.
`
`Microsoft’s Direct Infringement of the Patents-in-Suit
`
`54. Microsoft directly infringes the Patents-in-Suit by creating and utilizing a universal
`
`platform password-less architecture incorporating authenticators, including Windows Hello on
`
`Windows 10 and 11, Microsoft Authenticator App on Android and iOS devices, and controlling
`
`the action of its partners to create authenticators that work on Windows, the Microsoft Edge
`
`browser, and online Microsoft accounts, incorporating the Microsoft Identity platform which
`
`controls the actions of authenticators and the dissemination of bear tokens and other such access
`
`messages, offering services, applications subscriptions and other such resources hosted by separate
`
`systems which are accessed via tokens provided by Microsoft Identity Platform, and offering
`
`businesses and developers identity and access management services which entail requesting user
`
`authentication and receiving tokens in a manner directed and controlled by Microsoft, including
`
`the use of Microsoft Authentication Library.
`
`55. Microsoft’s password-less architecture verifies a us

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket