Apportioning Value of Patented Cryptographic Key Management in a Cloud Security Platform
Cloud Security & Encryption Patent Litigation | Technical Apportionment Analysis
.png)
Key Facts
Background & Challenge
In a high-profile International Trade Commission proceeding involving competing cloud security platforms, the asserted patents covered a specific method of hierarchical cryptographic key derivation that enabled efficient per-tenant encryption in multi-tenant cloud environments. The accused product — an enterprise cloud access security broker (CASB) — implemented a functionally similar key management architecture embedded within a broader platform offering data loss prevention (DLP), threat protection, application visibility, and compliance reporting capabilities.
The ITC administrative law judge requested court-appointed technical expert analysis to evaluate: (1) the precise technical boundaries of the accused key management module; (2) the degree to which the patented method drove customer adoption of the accused platform versus the non-accused features; and (3) the availability of non-infringing technical alternatives and their relative cost. Secure Anchor was selected for this assignment based on our demonstrated expertise in cryptographic systems and our track record of producing court-ready technical analyses.
Methodology
Given the court-appointed nature of this engagement, Secure Anchor applied an especially rigorous, transparent methodology designed to be fully reproducible and independently verifiable:
• Conducted independent reverse-engineering of the accused CASB platform's key management subsystem using network traffic analysis, API behavioral testing, and review of submitted source code under protective order
• Performed detailed claim mapping — comparing each asserted patent claim element against the accused implementation to delineate infringing versus non-infringing code paths with precision
• Applied a functional decomposition framework to the full platform, producing a weighted feature hierarchy based on technical capability, integration dependencies, and feature interdependencies
• Evaluated four proposed non-infringing alternative architectures submitted by the accused party's engineers, assessing technical feasibility, performance impact, implementation cost, and time-to-deploy for each alternative
• Reviewed over 800 pages of customer-facing technical documentation, product roadmaps, sales engineering materials, and customer RFP responses to identify the features most prominently marketed and purchased by enterprise customers
• Benchmarked the accused key derivation architecture against six competitive implementations and three published academic standards, establishing objective technical differentiation metrics
Our role as court-appointed expert demands absolute methodological transparency. Every apportionment figure we present must be traceable to objective technical evidence — not inference, not assumption, but documented, reproducible analysis.
Findings & Results
Secure Anchor's analysis concluded that the accused hierarchical key derivation methodology accounted for approximately 22% of the technical value of the platform's encryption and data protection module. The encryption module itself was determined to represent 44%of customer-driven platform value, based on feature weighting analysis and documented customer purchase factors.
With respect to non-infringing alternatives, Secure Anchor found that only one of the four proposed alternatives was technically viable without material performance degradation —and estimated the cost of design-around implementation at approximately 18 months of engineering effort, a finding that materially impacted the royalty rate analysis. The Administrative Law Judge adopted Secure Anchor's technical apportionment findings in full, citing the thoroughness of the methodology and the independence of the analysis.
Key Takeaways
Secure Anchor's analysis concluded that the accused hierarchical key derivation methodology accounted for approximately 22% of the technical value of the platform's encryption and data protection module. The encryption module itself was determined to represent 44%of customer-driven platform value, based on feature weighting analysis and documented customer purchase factors.
With respect to non-infringing alternatives, Secure Anchor found that only one of the four proposed alternatives was technically viable without material performance degradation —and estimated the cost of design-around implementation at approximately 18 months of engineering effort, a finding that materially impacted the royalty rate analysis. The Administrative Law Judge adopted Secure Anchor's technical apportionment findings in full, citing the thoroughness of the methodology and the independence of the analysis.