Torus Ventures vs. Invited Foundation: Digital Copyright Patent Case Dismissed After 260 Days
What would you like to do next?
Choose your path based on your current needs:
📋 Case Summary
| Case Name | Torus Ventures LLC v. Invited Foundation |
| Case Number | 2:24-cv-01037 (Lead: 2:25-cv-473-JRG) |
| Court | U.S. District Court for the Eastern District of Texas |
| Duration | Dec 2024 – Aug 2025 ~260 days |
| Outcome | Defendant Win – Dismissed by Stipulation |
| Patents at Issue | |
| Accused Products | Method and system for a recursive security protocol for digital copyright control |
Case Overview
The Parties
⚖️ Plaintiff
A patent assertion entity (PAE) focused on licensing and enforcing intellectual property rights in digital rights management and content security.
🛡️ Defendant
The named defendant, a commercial entity deploying digital copyright control technology.
The Patent at Issue
U.S. Patent No. 7,203,844 B1 (Application No. US 10/465,274) covers a method and system for a recursive security protocol for digital copyright control. In plain terms, the patent addresses layered or nested security mechanisms designed to protect digital content from unauthorized copying, distribution, or access — technology foundational to DRM systems, digital licensing platforms, and content authentication frameworks.
- • US 7,203,844 B1 — Method and system for a recursive security protocol for digital copyright control
Developing Digital Copyright Control?
Check if your content security protocols might infringe this or related patents.
Litigation Timeline & Procedural History
The case was filed in the U.S. District Court for the Eastern District of Texas — a venue historically favorable to patent plaintiffs due to its experienced patent bench, efficient case management, and plaintiff-friendly local rules. Chief Judge Rodney Gilstrap presided over the matter, known for his extensive experience in patent litigation.
| Complaint Filed | December 12, 2024 |
| Case Closed | August 29, 2025 |
| Total Duration | ~260 days |
The Verdict & Legal Analysis
Outcome
The case was dismissed by stipulation on August 29, 2025. This voluntary, agreed dismissal by both parties meant no damages were awarded, no injunctive relief was granted, and no formal infringement or validity finding was issued by the court. The specific terms of any underlying settlement were not publicly disclosed.
Verdict Cause Analysis
For the Plaintiff (Torus Ventures), a stipulated dismissal before claim construction could indicate a negotiated license was achieved — the primary commercial objective of many NPE assertion campaigns. Alternatively, it may reflect a strategic retreat in response to anticipated invalidity challenges, particularly given Fish & Richardson’s well-known capability in inter partes review (IPR) filings at the USPTO.
For the Defendant (Invited Foundation), retaining Fish & Richardson signaled an intent to mount a vigorous defense. The firm’s track record in invalidating asserted patents through IPR petitions — combined with the potential for 35 U.S.C. § 101 subject matter eligibility challenges against software and method patents — likely created substantial settlement leverage.
Patent Risk Factor: U.S. Patent No. 7,203,844 B1, as a software-implemented method patent covering recursive security protocols, would face meaningful *Alice/Mayo* eligibility scrutiny under § 101. This vulnerability could have materially influenced Torus Ventures’ calculus in agreeing to dismissal.
Legal Significance
While the stipulated dismissal produces no binding precedent, the case contributes to observable trends in digital copyright patent infringement litigation:
- NPE Assertion in DRM Technology: Patent assertion entities continue targeting digital rights management and content security technology.
- Pre-Trial Resolution Patterns: The majority of NPE cases in the Eastern District of Texas resolve before trial, often within 12–18 months of filing.
- Alice Vulnerability in Software Patents: Method and system patents covering software-implemented security protocols remain susceptible to § 101 challenges.
Strategic Takeaways
For Patent Holders:
- Recursive and layered protocol patents require robust specification support to survive *Alice* challenges; prosecution strategy should emphasize concrete technical implementation.
- Parallel consolidated filings can increase settlement pressure across multiple defendants.
For Accused Infringers:
- Early IPR petitions and § 101 motions remain powerful tools against software method patents asserted by NPEs.
- Engaging elite IP defense counsel immediately upon service establishes credible defense posture.
For R&D Teams:
- Freedom-to-operate (FTO) analyses for DRM, content security, and recursive authentication systems should account for broad method claim language that may read on standard protocol implementations.
Drafting a patent for digital security?
Learn from this case. Use AI to draft stronger claims for software-implemented protocols.
Power Your Patent Strategy with Eureka IP
From novelty searches to patent drafting, Eureka’s AI-powered tools help you navigate the patent landscape with confidence.
⚠️ Freedom to Operate (FTO) Analysis
This case highlights critical IP risks in digital copyright control. Choose your next step:
📋 Understand This Case’s Impact
Learn about the specific risks and implications from this litigation.
- View related patent families in digital rights management
- Analyze assertion patterns of NPEs in content security
- Understand legal arguments for § 101 challenges
🔍 Check My Product’s Risk
Run a comprehensive FTO analysis for your own technology or product.
- Input your product description or technical features
- AI identifies potentially blocking patents
- Get actionable risk assessment report
High Risk Area
Software-implemented security protocols
US 7,203,844 B1
Recursive security protocol for digital copyright control
§ 101 Challenge
Key defense lever for software patents
✅ Key Takeaways
For Patent Attorneys & Litigators
Stipulated dismissals in NPE cases frequently mask negotiated licenses — analyze consolidated case references for broader assertion campaign context.
Search related case law →U.S. Patent No. 7,203,844 B1 remains a live asset; monitor future assertion activity.
Explore precedents →Eastern District of Texas with Judge Gilstrap remains a premier patent litigation venue; early case management strategy is critical.
Understand venue strategy →§ 101 Alice challenges are a primary defense lever for software method patents covering security protocols.
Learn more about §101 →For IP Professionals & R&D Leaders
Track recursive security protocol patent families for FTO exposure across DRM and content security product lines.
Start FTO analysis for my product →Conduct FTO analysis before deploying recursive digital copyright security architectures; broad method claims can implicate standard implementations.
Try AI patent drafting →Document design-around decisions contemporaneously to support future non-infringement positions.
Get expert guidance →Ready to Strengthen Your Patent Strategy?
Join thousands of IP professionals using Eureka to conduct prior art searches, draft patents, and analyze competitive landscapes.
📑 Table of Contents
🚀 Eureka IP Tools
🔍Novelty Search
Find prior art instantly
Patent Drafting
AI-assisted claim writing
FTO Analysis
Assess infringement risk
Concerned About Your Product?
Don’t wait for litigation. Check your product’s freedom to operate now.
Run FTO for My Product⚡ Accelerate Your IP Strategy
Join 15,000+ IP professionals using Eureka for patent research and analysis.