EXPERT WITNESS

Apportioning Value of Patented Cryptographic Key Management in a Cloud Security Platform

Cloud Security & Encryption Patent Litigation | Technical Apportionment Analysis

Key Facts

Matter Type:
Patent Infringement — International Trade Commission (ITC) Proceeding
Technology Domain:
Cloud-Based Encryption & Cryptographic Key Management
Role:
Neutral Technical Expert — Court-Appointed Analysis
Scope of Work:
Technical Apportionment, Claim Mapping, Non-Infringing Alternative Valuation
Outcome:
Technical findings adopted in full by the Administrative Law Judge

Background & Challenge

In a high-profile International Trade Commission proceeding involving competing cloud security platforms, the asserted patents covered a specific method of hierarchical cryptographic key derivation that enabled efficient per-tenant encryption in multi-tenant cloud environments. The accused product — an enterprise cloud access security broker (CASB) — implemented a functionally similar key management architecture embedded within a broader platform offering data loss prevention (DLP), threat protection, application visibility, and compliance reporting capabilities.

The ITC administrative law judge requested court-appointed technical expert analysis to evaluate: (1) the precise technical boundaries of the accused key management module; (2) the degree to which the patented method drove customer adoption of the accused platform versus the non-accused features; and (3) the availability of non-infringing technical alternatives and their relative cost. Secure Anchor was selected for this assignment based on our demonstrated expertise in cryptographic systems and our track record of producing court-ready technical analyses.

Methodology

Given the court-appointed nature of this engagement, Secure Anchor applied an especially rigorous, transparent methodology designed to be fully reproducible and independently verifiable:

•     Conducted independent reverse-engineering of the accused CASB platform's key management subsystem using network traffic analysis, API behavioral testing, and review of submitted source code under protective order

•     Performed detailed claim mapping — comparing each asserted patent claim element against the accused implementation to delineate infringing versus non-infringing code paths with precision

•     Applied a functional decomposition framework to the full platform, producing a weighted feature hierarchy based on technical capability, integration dependencies, and feature interdependencies

•     Evaluated four proposed non-infringing alternative architectures submitted by the accused party's engineers, assessing technical feasibility, performance impact, implementation cost, and time-to-deploy for each alternative

•     Reviewed over 800 pages of customer-facing technical documentation, product roadmaps, sales engineering materials, and customer RFP responses to identify the features most prominently marketed and purchased by enterprise customers

•     Benchmarked the accused key derivation architecture against six competitive implementations and three published academic standards, establishing objective technical differentiation metrics

Our role as court-appointed expert demands absolute methodological transparency. Every apportionment figure we present must be traceable to objective technical evidence — not inference, not assumption, but documented, reproducible analysis.

Findings & Results

Secure Anchor's analysis concluded that the accused hierarchical key derivation methodology accounted for approximately 22% of the technical value of the platform's encryption and data protection module. The encryption module itself was determined to represent 44%of customer-driven platform value, based on feature weighting analysis and documented customer purchase factors.

With respect to non-infringing alternatives, Secure Anchor found that only one of the four proposed alternatives was technically viable without material performance degradation —and estimated the cost of design-around implementation at approximately 18 months of engineering effort, a finding that materially impacted the royalty rate analysis. The Administrative Law Judge adopted Secure Anchor's technical apportionment findings in full, citing the thoroughness of the methodology and the independence of the analysis.

22%
Technical Apportionment
Value attributed to accused key derivation method
44%
Module Value
Encryption module contribution to overall platform
100%
Module Value
Technical findings adopted in full by the judge

Key Takeaways

Secure Anchor's analysis concluded that the accused hierarchical key derivation methodology accounted for approximately 22% of the technical value of the platform's encryption and data protection module. The encryption module itself was determined to represent 44%of customer-driven platform value, based on feature weighting analysis and documented customer purchase factors.

With respect to non-infringing alternatives, Secure Anchor found that only one of the four proposed alternatives was technically viable without material performance degradation —and estimated the cost of design-around implementation at approximately 18 months of engineering effort, a finding that materially impacted the royalty rate analysis. The Administrative Law Judge adopted Secure Anchor's technical apportionment findings in full, citing the thoroughness of the methodology and the independence of the analysis.

Want to work with Secure Anchor?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.