Torus Ventures vs. Invited Foundation: Digital Copyright Patent Case Dismissed After 260 Days

📄 View Full Report 📥 Export PDF 🔗 Share ⭐ Save

📋 Case Summary

Case Name Torus Ventures LLC v. Invited Foundation
Case Number 2:24-cv-01037 (Lead: 2:25-cv-473-JRG)
Court U.S. District Court for the Eastern District of Texas
Duration Dec 2024 – Aug 2025 ~260 days
Outcome Defendant Win – Dismissed by Stipulation
Patents at Issue
Accused Products Method and system for a recursive security protocol for digital copyright control

Case Overview

The Parties

⚖️ Plaintiff

A patent assertion entity (PAE) focused on licensing and enforcing intellectual property rights in digital rights management and content security.

🛡️ Defendant

The named defendant, a commercial entity deploying digital copyright control technology.

The Patent at Issue

U.S. Patent No. 7,203,844 B1 (Application No. US 10/465,274) covers a method and system for a recursive security protocol for digital copyright control. In plain terms, the patent addresses layered or nested security mechanisms designed to protect digital content from unauthorized copying, distribution, or access — technology foundational to DRM systems, digital licensing platforms, and content authentication frameworks.

  • US 7,203,844 B1 — Method and system for a recursive security protocol for digital copyright control
🔐

Developing Digital Copyright Control?

Check if your content security protocols might infringe this or related patents.

Run FTO Check →

Litigation Timeline & Procedural History

The case was filed in the U.S. District Court for the Eastern District of Texas — a venue historically favorable to patent plaintiffs due to its experienced patent bench, efficient case management, and plaintiff-friendly local rules. Chief Judge Rodney Gilstrap presided over the matter, known for his extensive experience in patent litigation.

Complaint Filed December 12, 2024
Case Closed August 29, 2025
Total Duration ~260 days

The Verdict & Legal Analysis

Outcome

The case was dismissed by stipulation on August 29, 2025. This voluntary, agreed dismissal by both parties meant no damages were awarded, no injunctive relief was granted, and no formal infringement or validity finding was issued by the court. The specific terms of any underlying settlement were not publicly disclosed.

Verdict Cause Analysis

For the Plaintiff (Torus Ventures), a stipulated dismissal before claim construction could indicate a negotiated license was achieved — the primary commercial objective of many NPE assertion campaigns. Alternatively, it may reflect a strategic retreat in response to anticipated invalidity challenges, particularly given Fish & Richardson’s well-known capability in inter partes review (IPR) filings at the USPTO.

For the Defendant (Invited Foundation), retaining Fish & Richardson signaled an intent to mount a vigorous defense. The firm’s track record in invalidating asserted patents through IPR petitions — combined with the potential for 35 U.S.C. § 101 subject matter eligibility challenges against software and method patents — likely created substantial settlement leverage.

Patent Risk Factor: U.S. Patent No. 7,203,844 B1, as a software-implemented method patent covering recursive security protocols, would face meaningful *Alice/Mayo* eligibility scrutiny under § 101. This vulnerability could have materially influenced Torus Ventures’ calculus in agreeing to dismissal.

Legal Significance

While the stipulated dismissal produces no binding precedent, the case contributes to observable trends in digital copyright patent infringement litigation:

  • NPE Assertion in DRM Technology: Patent assertion entities continue targeting digital rights management and content security technology.
  • Pre-Trial Resolution Patterns: The majority of NPE cases in the Eastern District of Texas resolve before trial, often within 12–18 months of filing.
  • Alice Vulnerability in Software Patents: Method and system patents covering software-implemented security protocols remain susceptible to § 101 challenges.

Strategic Takeaways

For Patent Holders:

  • Recursive and layered protocol patents require robust specification support to survive *Alice* challenges; prosecution strategy should emphasize concrete technical implementation.
  • Parallel consolidated filings can increase settlement pressure across multiple defendants.

For Accused Infringers:

  • Early IPR petitions and § 101 motions remain powerful tools against software method patents asserted by NPEs.
  • Engaging elite IP defense counsel immediately upon service establishes credible defense posture.

For R&D Teams:

  • Freedom-to-operate (FTO) analyses for DRM, content security, and recursive authentication systems should account for broad method claim language that may read on standard protocol implementations.
✍️

Drafting a patent for digital security?

Learn from this case. Use AI to draft stronger claims for software-implemented protocols.

Try Patent Drafting →

Power Your Patent Strategy with Eureka IP

From novelty searches to patent drafting, Eureka’s AI-powered tools help you navigate the patent landscape with confidence.

⚠️ Freedom to Operate (FTO) Analysis

This case highlights critical IP risks in digital copyright control. Choose your next step:

📋 Understand This Case’s Impact

Learn about the specific risks and implications from this litigation.

  • View related patent families in digital rights management
  • Analyze assertion patterns of NPEs in content security
  • Understand legal arguments for § 101 challenges
📊 View Patent Landscape
⚠️
High Risk Area

Software-implemented security protocols

📋
US 7,203,844 B1

Recursive security protocol for digital copyright control

§ 101 Challenge

Key defense lever for software patents

✅ Key Takeaways

For Patent Attorneys & Litigators

Stipulated dismissals in NPE cases frequently mask negotiated licenses — analyze consolidated case references for broader assertion campaign context.

Search related case law →

U.S. Patent No. 7,203,844 B1 remains a live asset; monitor future assertion activity.

Explore precedents →

Eastern District of Texas with Judge Gilstrap remains a premier patent litigation venue; early case management strategy is critical.

Understand venue strategy →

§ 101 Alice challenges are a primary defense lever for software method patents covering security protocols.

Learn more about §101 →

For IP Professionals & R&D Leaders

Track recursive security protocol patent families for FTO exposure across DRM and content security product lines.

Start FTO analysis for my product →

Conduct FTO analysis before deploying recursive digital copyright security architectures; broad method claims can implicate standard implementations.

Try AI patent drafting →

Document design-around decisions contemporaneously to support future non-infringement positions.

Get expert guidance →

Ready to Strengthen Your Patent Strategy?

Join thousands of IP professionals using Eureka to conduct prior art searches, draft patents, and analyze competitive landscapes.

⚖️ Disclaimer: This article is for informational purposes only and does not constitute legal advice. The analysis presented reflects publicly available case information on Torus Ventures LLC v. Invited Foundation and general legal principles. For specific advice regarding patent litigation, FTO analysis, or IP strategy, please consult a qualified patent attorney.