AuthPoint LLC v. Ping Identity: Network Access Control Patent Case Dismissed With Prejudice
What would you like to do next?
Choose your path based on your current needs:
In a case that concluded as swiftly as it began, AuthPoint LLC v. Ping Identity, Corp. (Case No. 1:24-cv-02152) ended in a stipulated dismissal with prejudice after just 158 days of litigation in the U.S. District Court for the District of Colorado. Filed on August 4, 2024, and closed on January 9, 2025, the case centered on U.S. Patent No. 8,533,798 B2 — a patent covering methods and systems for controlling access to networks — asserted against Ping Identity, a prominent player in the identity and access management (IAM) sector.
The rapid resolution through mutual agreement under Federal Rule of Civil Procedure 41(a)(1)(A)(ii) signals a strategic recalibration by both parties. For patent litigators, IP professionals, and R&D teams navigating the increasingly contested landscape of network access control patent litigation, this case offers instructive lessons on assertion strategy, early resolution dynamics, and freedom-to-operate risk in the IAM technology space.
📋 Case Summary
| Case Name | AuthPoint LLC v. Ping Identity, Corp. |
| Case Number | 1:24-cv-02152 (D. Colo.) |
| Court | U.S. District Court for the District of Colorado |
| Duration | Aug 2024 – Jan 2025 158 days |
| Outcome | Dismissed with Prejudice |
| Patents at Issue | |
| Accused Products | Ping Identity’s core IAM offerings, including authentication and access management platforms |
Case Overview
The Parties
⚖️ Plaintiff
Patent assertion entity (PAE) focused on monetizing IP in the network security and access control domain.
🛡️ Defendant
Well-established identity security company providing enterprise-grade identity verification, SSO, and MFA solutions.
The Patent at Issue
This case involved U.S. Patent No. 8,533,798 B2, which addresses foundational mechanisms in identity and access management, a technology category experiencing significant commercial expansion and, correspondingly, elevated patent assertion activity.
- • U.S. 8,533,798 B2 (Application No. US12/305568) — Methods and systems for controlling access to networks
The Accused Product
The accused product category — “Method and system for controlling access to networks” — directly implicates Ping Identity’s core IAM offerings, including its authentication and access management platforms.
Legal Representation
Plaintiff’s Counsel: Erik Nelson Lund, Isaac Philip Rabicoff, and Joseph Jude Zito of DNL Zito Castellano and Rabicoff Law LLC — firms with established patent assertion and litigation practices.
Defendant’s Counsel: Orion Armon of Cooley LLP — a premier IP litigation firm with deep experience defending technology companies against patent infringement claims.
Developing network access control solutions?
Check if your IAM product might infringe this or related patents.
Litigation Timeline & Procedural History
| Milestone | Date |
| Complaint Filed | August 4, 2024 |
| Case Closed | January 9, 2025 |
| Total Duration | 158 days |
The case was filed in the District of Colorado — a logical venue given Ping Identity’s Denver headquarters, minimizing any forum-shopping inference and establishing personal jurisdiction efficiently. The matter was handled at the first-instance (district court) trial level.
The 158-day litigation window is notably compressed. In standard patent infringement cases, the period from filing to resolution typically spans 18 to 36 months, particularly when claim construction proceedings (Markman hearings) and expert discovery are involved. The sub-six-month resolution here strongly suggests the parties reached a negotiated resolution — whether through licensing, settlement, or a strategic decision to withdraw — well before substantive motion practice or claim construction proceedings advanced.
No chief judge assignment data was disclosed in the record for this matter. The specific damages figures and settlement terms, if any, were not publicly disclosed.
The Verdict & Legal Analysis
Outcome
The case was dismissed with prejudice pursuant to a joint stipulation filed by both parties under Federal Rule of Civil Procedure 41(a)(1)(A)(ii). A dismissal with prejudice is a final adjudication on the merits — AuthPoint LLC cannot re-file the same infringement claims against Ping Identity based on the same patent and accused products. No court-issued verdict, damages award, or injunctive relief was entered; the parties resolved the matter on their own terms.
Verdict Cause Analysis
The operative procedural mechanism — a Rule 41(a)(1)(A)(ii) stipulated dismissal — requires agreement from all parties, distinguishing it from a unilateral voluntary dismissal. This procedural choice carries meaningful strategic implications:
Possible Scenarios:
1. Confidential Settlement/License: The most commercially common resolution. AuthPoint may have secured a licensing agreement or lump-sum payment, with dismissal serving as the closing instrument. Ping Identity’s scale and commercial footprint would make even a modest license economically rational to avoid prolonged litigation costs.
2. Defendant’s Strength in Early Defense: Cooley LLP’s early case assessment may have identified significant validity vulnerabilities in U.S. 8,533,798 B2 or non-infringement positions strong enough to prompt AuthPoint to reconsider the economics of continued litigation.
3. Claim Construction Risk: Patents covering broad network access control methods face heightened scrutiny under Alice Corp. v. CLS Bank International (2014) regarding patent eligibility under 35 U.S.C. § 101. Early analysis of § 101 exposure may have influenced the plaintiff’s calculus.
It is important to note that because no court-issued claim construction order, summary judgment ruling, or trial record was generated, there is no judicial analysis of the patent’s validity, scope, or infringement to cite. The legal merits remain unresolved on the public record.
Legal Significance
The absence of a merits ruling limits direct precedential value. However, the case contributes to the observable pattern of early-stage resolution in PAE-initiated network access control litigation, particularly where:
- • Defendants retain sophisticated IP litigation counsel immediately upon service
- • The asserted patent involves method claims susceptible to § 101 challenges
- • Commercial settlement economics favor quiet resolution over extended litigation costs
Strategic Takeaways
For Patent Holders:
Asserting method patents in network security requires rigorous pre-suit claim mapping to withstand early § 101 and § 102/103 challenges. A well-documented infringement read — supported by product analysis — strengthens leverage in early settlement negotiations.
For Accused Infringers:
Engaging experienced patent litigation counsel at the earliest stage (as Ping Identity did with Cooley LLP) enables rapid assessment of invalidity, non-infringement, and eligibility defenses that can shift negotiating leverage decisively before costly discovery commences.
For R&D Teams:
Network access control and IAM technology developers should conduct regular freedom-to-operate (FTO) analyses covering method claims in authentication and access management patent families. U.S. 8,533,798 B2 (Application No. US12/305568) should be included in any FTO landscape review for companies developing SSO, MFA, or network access control products.
Drafting a patent in network access control?
Learn from this case. Use AI to draft stronger claims for IAM innovations.
Industry & Competitive Implications
The IAM sector has become a high-value target for patent assertion activity. As enterprises accelerate adoption of zero-trust architectures, multi-factor authentication, and cloud-based identity platforms, the underlying patent landscape has grown correspondingly contested. AuthPoint LLC’s assertion against Ping Identity reflects a broader trend of PAEs targeting established IAM vendors whose commercial success provides both visibility and settlement capacity.
For Ping Identity — now operating under Thales Group following acquisition — the swift resolution preserves management focus and avoids the reputational friction that protracted patent disputes can introduce in enterprise sales cycles where procurement teams scrutinize IP litigation exposure.
From a market intelligence perspective, the case signals that method patents covering network access control fundamentals remain active assertion tools. Companies in adjacent spaces — including MFA providers, zero-trust vendors, and cloud identity platforms — should monitor continuation applications and related patents within the US12/305568 family for potential assertion risk.
The involvement of Rabicoff Law LLC and DNL Zito Castellano — firms with active patent assertion practices — suggests this case may be part of a broader licensing campaign targeting the IAM sector.
Power Your Patent Strategy with Eureka IP
From novelty searches to patent drafting, Eureka’s AI-powered tools help you navigate the patent landscape with confidence.
⚠️ Freedom to Operate (FTO) Analysis
This case highlights critical IP risks in network access control. Choose your next step:
📋 Understand This Case’s Impact
Learn about the specific risks and implications from this litigation.
- View related patents in the network access control space
- See which companies are most active in IAM patents
- Understand claim interpretation risks for method patents
🔍 Check My Product’s Risk
Run a comprehensive FTO analysis for your own technology or product.
- Input your product description or technical features
- AI identifies potentially blocking IAM patents
- Get actionable risk assessment report
High Risk Area
Network access control method claims
US 8,533,798 B2
And related patent family members
Design-Around Options
Available for IAM architectures
✅ Key Takeaways
For Patent Attorneys & Litigators
Stipulated dismissals with prejudice under Rule 41(a)(1)(A)(ii) indicate bilateral resolution — monitor for confidential licensing terms in subsequent public filings.
Search related case law →Method claims in network access control remain viable assertion tools but face § 101 eligibility headwinds post-Alice.
Explore precedents →Early retention of sophisticated patent defense counsel materially influences litigation trajectory and settlement economics.
Find IP litigation experts →The 158-day duration is a benchmark for early-resolution PAE cases in the IAM sector.
Analyze litigation trends →For IP Professionals
Track U.S. Patent No. 8,533,798 B2 and related family members (Application No. US12/305568) for continuation or divisional assertion risk.
Monitor patent families →IAM companies should maintain current FTO analyses covering network access control method claims.
Start FTO analysis for my product →Monitor AuthPoint LLC for additional assertion activity against IAM sector targets.
Track PAE activity →For R&D Leaders
Design-around analysis for network access control features should account for method claims, not only apparatus claims.
Explore design-around strategies →Document design choices and development chronology to support potential prior user rights defenses.
Learn about defensive patenting →❓ FAQ
What patent was asserted in AuthPoint LLC v. Ping Identity?
U.S. Patent No. 8,533,798 B2 (Application No. US12/305568), covering methods and systems for controlling access to networks.
Why was the case dismissed with prejudice?
The parties filed a joint stipulation under Federal Rule of Civil Procedure 41(a)(1)(A)(ii). The specific terms — whether settlement, license, or withdrawal — were not publicly disclosed.
How does this case affect network access control patent litigation?
It reinforces the pattern of early resolution in PAE-initiated IAM sector cases, particularly when defendants engage experienced IP litigation counsel promptly. It also highlights continued assertion activity around foundational network access control method patents.
🔗 Resources
Ready to Strengthen Your Patent Strategy?
Join thousands of IP professionals using Eureka to conduct prior art searches, draft patents, and analyze competitive landscapes.
📑 Table of Contents
🚀 Eureka IP Tools
🔍Novelty Search
Find prior art instantly
Patent Drafting
AI-assisted claim writing
FTO Analysis
Assess infringement risk
Concerned About Your Product?
Don’t wait for litigation. Check your product’s freedom to operate now.
Run FTO for My Product⚡ Accelerate Your IP Strategy
Join 15,000+ IP professionals using Eureka for patent research and analysis.