Mantissa Coporation v. Ondot Systems, Inc. et al

Filing 119

ORDER granting in part and denying in part 80 Motion for Judgment; denying 107 Motion to Strike. The converted motion for summary judgment is granted in favor of defendants. The renewed motion for judicial notice is denied as moot. (Signed by Magistrate Judge Dena Hanovice Palermo) Parties notified.(cfelchak, 4)

Download PDF
United States District Court Southern District of Texas ENTERED UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION MANTISSA CORPORATION, Plaintiff, v. ONDOT SYSTEMS, INC.; LONE STAR NATIONAL BANK; and LONE STAR NATIONAL BANCSHARES-TEXAS, INC., Defendants. § § § § § § § § § § § § August 10, 2017 David J. Bradley, Clerk CASE NO. 4:15-CV-1133 MEMORANDUM OPINION Plaintiff Mantissa Corporation (“Mantissa”) brings this suit for patent infringement under 35 U.S.C. § 271 against Defendants Ondot Systems, Inc., Lone Star National Bank, and Lone Star National Bancshares-Texas, Inc. (collectively, “Defendants”). Now pending before the Court are Defendants’ “Motion for Judgment on the Pleadings and Renewed Motion for Judicial Notice,” ECF No. 80, and Defendants’ “Motion to Strike Plaintiff’s Unauthorized Reply and Declaration,” ECF No. 107. I. BACKGROUND A. The Patents-in-Suit This case concerns U.S. Patent Nos. 7,779,456 (“the ’456 Patent”) and 8,353,027 (“the ’027 Patent”). The ’456 Patent was filed on April 27, 2005 and issued on August 17, 2010. The application for the ’027 Patent was a continuation of the patent application that issued as the ’456 Patent. The ’027 Patent was filed on July 26, 2010 and issued on January 8, 2013. Both of the patents-in-suit are titled “System and Method for Enhanced Protection and Control Over the Use of Identity” and relate to a “method of protecting use of an entity’s 1 identity.” In particular, the patents purport to “provide[] protection of the identity of an entity by placing limitations or conditions on its use, and whereby the entity’s use-enabling identification information is not fully needed to authorize a transaction.” ECF No. 38-1 at 1:9–14. B. The Asserted Claims Mantissa alleges that Defendants “have committed, and continue to commit, direct acts of infringement of the ’456 Patent and the ’027 Patent by making, using, offering to sell and selling products, systems and services embodying the patented invention.” ECF No. 38 ¶ 15. Mantissa asserts infringement of fifty-two total claims: claims 1–7 and 11–29 of the ’456 Patent and claims 1–3 and 7–29 of the ’027 Patent (the “asserted claims”). ECF No. 38 at ¶¶ 21, 29. Of the fifty-two asserted claims, nine are independent claims: claims 1, 2, 4, 5, 11, and 15 of the ’456 Patent, and claims 1, 7, and 11 of the ’027 Patent. The remaining forty-three asserted claims are dependent claims. The text of claims 1, 5, 11, and 15 of the ’456 Patent is as follows: 1. A method of protecting use of an entity’s identity, the method being executed on electronic computer hardware in combination with software, the method comprising: setting a status of the identity to a first state, the first state defining a scope of permitted use of the identity; changing, in advance of an intended use of the identity, the status to a second state defining a scope of permitted use of the identity that is different from the first state; requesting use of the identity after said changing; and returning, after said requesting, the state back to the first state; wherein the first state is a default state, and said returning occurs in response to completion of a use of the identity; wherein said requesting comprises transmitting, from a user of said identity to a service provider which maintains the state, a request for authorization to use the identity, where information in the request is insufficient to authorize the use of the identity; wherein said setting, changing, requesting and returning are executed on electronic computer hardware in combination with software. ECF No. 38-1 at 15:8–28. 2 5. A method of protecting use of an entity’s identity, the method being executed on electronic computer hardware in combination with software, the method comprising: attempting to use an identity at a source; forwarding first information relating to said use to a user affiliated with the source location; forwarding second information from the user to a service provider, the second information being different from the first information; determining, by the service provider, whether said use of the identity is consistent with at least one pre-registered condition; and sending, from the service provider to the user, a decision based on the determining; wherein the second information is insufficient in and of itself to authorize any related use of the identity; wherein the at least one pre-registered condition defines at least one circumstance under which the identity can be used. ECF No. 38-1 at 16:4–22. 11. A method of protecting use of an entity’s identity, the method being executed on electronic computer hardware in combination with software, the method comprising: establishing, by the user, a set of desired identification information parameters; sending, from the user to a service provider, the set; obtaining, by the service provider from the entity, information from the entity consistent with the set, the information including at least one predetermined condition; storing the information provided by said obtaining; and using, by the service provider, at least some of the at least one pre-determined condition and at least some of the information provided in said obtaining to respond to a request by the user to authorize a use of the identity of the entity; wherein the user does not have direct access to the information provided by the entity and subject to said storing; wherein the at least one pre-registered condition defines at least one circumstance under which the identity can be used. ECF No. 38-1 at 16:42–61. 15. A method of protecting use of an entity’s identity, the method being executed on electronic computer hardware in combination with software, the method comprising: 3 storing, at a service provider, data representing first identification information of an entity, and at least one criteria capable of limiting the use of the identity; receiving, at a service provider, a request to determine whether the use of an entity’s identity by a party is authorized for a requested application, the request including second identification information; comparing at least some of the first identification information with at least some of the second identification information; first determining whether the request is consistent with at least one predetermined condition; second determining, based at least partially on a result of said comparing and said first determining, whether the use of the identity by the identity-usesource is authorized for a particular application; and responding from the service provider to the identity-use source consistent with the result of said determining; wherein the at least one pre-registered condition defines at least one circumstance under which the identity can be used. ECF No. 38-1 at 17:4–28. The text of claims 1, 7, and 11 of the ’027 Patent is as follows: 1. A method of protecting use of an entity’s identity when the entity attempts to use the identity, the method being executed on electronic computer hardware in combination with software, the method comprising: receiving, at a service provider, information regarding the attempted use of the entity’s identity, the information being insufficient in and of itself to execute the attempted use of the identity; determining, at the service provider, whether the attempted use of the entity’s identity is consistent with at least one pre-registered condition; sending, from the service provider, a decision based on the determining; wherein the at least one pre-registered condition defines at least one circumstance under which the identity can be used; and wherein the service provider lacks sufficient data to execute the attempted use of the identity. ECF No. 38-2 at 15:18–35. 7. A method of protecting use of an entity’s identity, the method being executed on electronic computer hardware in combination with software, the method comprising: receiving, at a service provider, a set of desired identification information parameters from a user; obtaining, at the service provider, information from the entity consistent with the set, the information including at least one pre-determined condition defined by the entity; 4 storing, at the service provider, the information provided by the obtaining; receiving, at the service provider, a request to authorize use of the entity’s identity; using, at the service provider, at least some of the at least one predetermined condition and at least some of the information provided in the obtaining to respond to the request to authorize a use of the identity of the entity; wherein third parties other than the service provider, the entity and authorized agents do not have direct access to the information from the entity from the obtaining and subject to the storing; wherein the at least one pre-registered condition defines at least one circumstance under which the identity can be used. ECF No. 38-2 at 15:53–16:9. 11. A method of protecting use of an entity’s identity, the method being executed on electronic computer hardware in combination with software, the method comprising: storing, at a service provider, data representing first identification information of an entity, and at least one entity defined criteria capable of limiting the use of the identity; receiving, at a service provider, a request to determine whether the use of an entity’s identity by a party is authorized for a requested application, the request including second identification information; comparing at least some of the first identification information with at least some of the second identification information; first determining whether the request is consistent with at least one predetermined condition; second determining, based at least partially on a result of the comparing and the first determining, whether received request represents an authorized use of the entity’s identity for a particular application; and transmitting information consistent with the result of the determining; wherein the at least one pre-registered condition defines at least one circumstance under which the identity can be used; and wherein the service provider lacks sufficient information to execute the attempted use of the identity. ECF No. 38-2 at 16:20–46. The Court has construed the following claim terms: ▪ “identity” means “identification information.” ▪ “entity” means “the owner of the identity.” ▪ “user” means “requester of use of entity’s identity.” 5 ▪ “source” means “a person or thing from which the inquiry comes into being or is derived or obtained.” ▪ “identity-use-source” means “a party/point at which use of the entity’s identity is attempted.” ▪ “service provider” means “that which addresses requests for identity use.” ▪ the phrases “information . . . is insufficient to authorize the use of the identity”/ “the second information is insufficient in and of itself to authorize any related use of the identity”/”the information being insufficient in and of itself to execute the attempted use of the identity” mean “the information is sufficient for the service provider to determine whether the intended use of the identity is proper, but not enough to authorize/execute the use/related use/attempted use of the identity.” ▪ “the service provider lacks sufficient data/information to execute the attempted use of the identity” means “the service provider has enough information to determine whether the attempted use of the identity is proper, but not enough to execute the attempted use of the identity.” ▪ “scope of permitted use” means “set of conditions under which the identity may or may not be used.” Mantissa Corp. v. Ondot Sys., Inc., No. 4:15-CV-1133, 2017 WL 1373771, at *3–12 (S.D. Tex. Jan. 13, 2017), adopted, No. 4:15-CV-01133, 2017 WL 1383884 (S.D. Tex. Apr. 13, 2017) (Ellison, J.). C. Procedural History Mantissa filed its original complaint in this case on April 29, 2015. Defendants subsequently filed a Rule 12(b)(6) motion to dismiss. ECF No. 20. On April 14, 2016, United States District Judge Keith P. Ellison granted that motion on grounds that “the patents are invalid because they are drawn to an abstract idea.” ECF No. 35 at 36. On May 3, 2016, Mantissa filed its first amended complaint, which remains the live pleading. ECF No. 38. Defendants subsequently moved to dismiss the amended complaint under Rule 12(b)(6), again on grounds that the patents-in-suit are directed to a patent-ineligible abstract idea. ECF No. 45. Defendants also filed a motion requesting the court to take judicial notice of a 1995 American Bar Association Guide to Wills & Estates, subtitled “Everything You Need to 6 Know About Wills, Trusts, Estates, and Taxes.” ECF No. 46. On August 11, 2016, Judge Ellison denied the motion to dismiss, concluding that the issue of patent eligibility should not be decided until claim construction had occurred. ECF No. 58. Judge Ellison also denied the motion for judicial notice as moot. Id. Judge Ellison then referred the case to this Court to conduct a claim construction hearing in accordance with Markman v. Westview Instruments, Inc., 517 U.S. 370 (1996). ECF No. 68. The Court held the Markman hearing and issued a report and recommendation, which Judge Ellison adopted on April 13, 2017. ECF Nos. 76, 94. While objections to the report and recommendation were pending before Judge Ellison, Defendants filed a combined motion for judgment on the pleadings and renewed motion for judicial notice—one of the motions now before the Court. ECF No. 80. On May 12, 2017, Judge Ellison transferred the case to this Court to conduct all further proceedings in accordance with 28 U.S.C. § 636(c). ECF No. 99. After reviewing the then-pending motions, the Court convened a telephone status conference on May 24, 2017. ECF No. 100. The Court informed the parties of its decision to convert the Rule 12(c) motion for judgment on the pleadings into a Rule 56 motion for summary judgment and set deadlines for the parties to file additional briefing. The Court held a hearing on Defendants’ converted summary judgment motion on August 7, 2017. II. LEGAL STANDARD AND APPLICABLE SUBSTANTIVE LAW A. Summary Judgment Standard Summary judgment is appropriate when “there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.” FED. R. CIV. P. 56(a). An issue of fact is “material” if its resolution in favor of one party might affect the outcome of the lawsuit under governing law. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248 (1986); Sossamon v. 7 Lone Star State of Tex., 560 F.3d 316, 326 (5th Cir. 2009) (internal quotation marks and citation omitted). A dispute about a material fact is “genuine” when “the evidence is such that a reasonable jury could return a verdict for the nonmoving party.” Anderson, 477 U.S. at 248; Quality InfusionCare, Inc. v. Health Care Serv. Corp., 628 F.3d 725, 728 (5th Cir. 2010) (internal quotation marks and citation omitted). The party moving for summary judgment bears the initial burden of “identifying those portions of the record it believes demonstrate the absence of a genuine issue of material fact.” Triple Tee Golf, Inc. v. Nike, Inc., 485 F.3d 253, 261 (5th Cir. 2007) (citing Celotex Corp. v. Catrett, 477 U.S. 317, 322–25 (1986)). If the movant meets its initial burden, the nonmoving party must then identify specific evidence in the record demonstrating that there is a material fact issue and articulate how that evidence supports its case. Baranowski v. Hart, 486 F.3d 112, 119 (5th Cir. 2007). “This burden will not be satisfied by ‘some metaphysical doubt as to the material facts, by conclusory allegations, by unsubstantiated assertions, or by only a scintilla of evidence.’” Boudreaux v. Swift Transp. Co., 402 F.3d 536, 540 (5th Cir. 2005) (quoting Little v. Liquid Air Corp., 37 F.3d 1069, 1075 (5th Cir. 1994) (en banc)). On a motion for summary judgment, a court must view the evidence and draw all reasonable inferences in the light most favorable to the nonmoving party. Connors v. Graves, 538 F.3d 373, 376 (5th Cir. 2008); Reaves Brokerage Co. v. Sunbelt Fruit & Vegetable Co., 336 F.3d 410, 412 (5th Cir. 2003). A court may consider any evidence in “the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any.” Kee v. City of Rowlett, 247 F.3d 206, 210 (5th Cir. 2001) (internal quotation marks omitted) (quoting Celotex Corp., 477 U.S. at 322). However, “[w]hen evidence exists in the summary judgment record but the nonmovant fails even to refer to it in the response to the motion for summary 8 judgment, that evidence is not properly before the district court.” Malacara v. Garber, 353 F.3d 393, 405 (5th Cir. 2003). “Rule 56 does not impose upon the district court a duty to sift through the record in search of evidence to support a party’s opposition to summary judgment.” Id. (internal quotation marks and citations omitted). A court may also consider any materials properly subject to judicial notice. MacMillan Bloedel Ltd. v. Flintkote Co., 760 F.2d 580, 587 (5th Cir. 1985); see also FED. R. EVID. 201. B. Patent Subject-Matter Eligibility Defendants in this case move for summary judgment on grounds that the asserted claims of the patents-in-suit are directed to an “abstract idea” and are therefore ineligible for protection under the Patent Act. Section 101 of the Patent Act provides that “[w]hoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.” 35 U.S.C. § 101. 1 The Supreme Court has long held that § 101 “‘contains an important implicit exception: Laws of nature, natural phenomena, and abstract ideas are not patentable.’” Alice Corp. Pty. v. CLS Bank Int’l, 134 S. Ct. 2347, 2354 (2014) (quoting Ass’n for Molecular Pathology v. Myriad Genetics, Inc., 133 S. Ct. 2107, 2116 (2013)); accord Diamond v. Diehr, 450 U.S. 175, 185 (1981) (collecting cases). At the same time, the Supreme Court has cautioned that courts must “tread carefully in construing this exclusionary principle lest it swallow all of patent law.” Alice, 134 S. Ct. at 2354. “At some level, ‘all inventions . . . embody, use, reflect, rest upon, or apply laws of nature, natural phenomena, or abstract ideas.’” Id. (quoting Mayo, 1 A “process” is statutorily defined as a “process, art or method, and includes a new use of a known process, machine manufacture, composition of matter, or material.” 35 U.S.C. § 100(b). The parties do not dispute that the methods described in the asserted claims otherwise qualify as a “process” under § 101. 9 566 U.S. at 71). “Thus, an invention is not rendered ineligible for patent simply because it involves an abstract concept.” Id. Rather, so long as an invention applies an abstract concept “to a new and useful end,” it remains patent-eligible under § 101. Id. (internal quotation marks omitted) (quoting Gottschalk v. Benson, 409 U.S. 63, 67 (1972)). Whether a patent’s subject matter is eligible for protection under § 101 is a question of law. CyberSource Corp. v. Retail Decisions, Inc., 654 F.3d 1366, 1369 (Fed. Cir. 2011). “The § 101 inquiry ‘may contain underlying factual issues.’” Mortg. Grader, Inc. v. First Choice Loan Servs. Inc., 811 F.3d 1314, 1325 (Fed. Cir. 2016) (quoting Accenture Glob. Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 1336, 1341 (Fed. Cir. 2013)) (emphasis added in Mortg. Grader). “But it is also possible, as numerous cases have recognized, that a § 101 analysis may sometimes be undertaken without resolving fact issues. In such circumstances, the § 101 inquiry may appropriately be resolved on a motion for summary judgment.” Id. (internal citation omitted). “There is no clear mandate from the Supreme Court or the Federal Circuit” regarding “what burden of proof is applicable to a § 101 challenge.” Network Apparel Grp., LP v. Airwave Networks Inc., 154 F. Supp. 3d 467, 474 (W.D. Tex. 2015), adopted, No. 6:15-CV-00134, 2016 WL 4718428 (W.D. Tex. Mar. 30, 2016), aff’d, No. 2016-1943, 2017 WL 957238 (Fed. Cir. Mar. 13, 2017). Lower courts are divided on that question, with some requiring that a party asserting a § 101 challenge prove ineligibility by “clear and convincing evidence” and others applying a less demanding “preponderance of the evidence” standard. See Network Apparel Grp., 154 F. Supp. 3d at 475 & n.2 (collecting cases). The Court need not resolve this issue in the present case. Even if “clear and convincing evidence” is the proper standard, it applies only “to questions of fact and not to questions of law.” See Microsoft Corp. v. i4i Ltd. P’ship, 564 10 U.S. 91, 114 (2011) (Breyer, J., concurring). As explained below, there are no material fact issues in this case, and Defendants are entitled to summary judgment as a matter of law. III. DISCUSSION The Supreme Court has set forth a two-step analysis, now widely referred to as the Alice framework, for “distinguishing patents that claim laws of nature, natural phenomena, and abstract ideas from those that claim patent-eligible applications of those concepts.” Alice, 134 S. Ct. at 2355. The Court’s task in this case is to determine whether Defendants are entitled to summary judgment by applying Alice to the asserted claims of the patents-in-suit. A. Alice Step One: The Asserted Claims Are Directed to an Abstract Idea At Step One of Alice, the Court must determine whether the asserted claims are “directed to” a patent-ineligible abstract idea. See Alice, 134 S. Ct. at 2355. More specifically, the Court must consider the asserted claims “in their entirety” and “in light of the specification[s]” in order to ascertain whether their “character as a whole” is “directed to excluded subject matter.” Enfish, LLC v. Microsoft Corp., 822 F.3d 1327, 1335 (Fed. Cir. 2016); Internet Patents Corp. v. Active Network, Inc., 790 F.3d 1343, 1346 (Fed. Cir. 2015). 1. The “Character as a Whole” of the Asserted Claims Determining the asserted claims’ “character as a whole” entails “identify[ing] and defin[ing] whatever fundamental concept appears wrapped up in the claim[s].” Accenture Glob. Servs., GmbH v. Guidewire Software, Inc., 728 F.3d 1336, 1341 (Fed. Cir. 2013) (internal quotation marks omitted). Other cases have described the claims’ “character as a whole” as their “focus” or “basic thrust.” Elec. Power Grp., LLC v. Alstom S.A., 830 F.3d 1350, 1353 (Fed. Cir. 2016); Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1348 (Fed. Cir. 2016). The Court must be “careful not to express the claim’s fundamental concept at an unduly 11 ‘high level of abstraction . . . untethered from the language of the claims,’ but rather at a level consonant with the level of generality or abstraction expressed in the claims themselves.” X One, Inc. v. Uber Techs., Inc., No. 16-CV-06050-LHK, 2017 WL 878381, at *8 (N.D. Cal. Mar. 6, 2017) (quoting Enfish, 822 F.3d at 1336). a. The Independent Claims The Court looks first to the nine asserted independent claims, beginning with claim 1 of the ’456 Patent. As its opening words state, claim 1 is aimed at “protecting use of an entity’s identity.” ECF No. 38-1 at 15:1. Reading claim 1 in its entirety reveals that the key role in accomplishing that end falls to the “service provider,” which must determine whether a given use of the identity is permitted. See Mantissa Corp., 2017 WL 1373771, at *3–5 (adopting Mantissa’s proposed construction of the term “service provider” as meaning “that which addresses requests for identity use”). Claim 1 further specifies that the service provider makes its determination based on two inputs: (i) the “scope of permitted use,” and (ii) “information in the request [for authorization, which] is insufficient to authorize the use of the identity.” The Court construed “scope of permitted use” to mean “set of conditions under which the identity may or may not be used.” Mantissa Corp., 2017 WL 1373771, at *10–12 (adopting Mantissa’s proposed construction). It also construed the phrase “information . . . is insufficient to authorize the use of the identity” as “the information is sufficient for the service provider to determine whether the intended use of the identity is proper, but not enough to authorize the use of the identity.” Id. at *6–9 (adopting Mantissa’s proposed construction). Thus, the service provider makes its determination based on: (i) a set of conditions defining when the identity may or may not be used; and (ii) information that is, in itself, insufficient to permit use of the identity. The specification confirms that the service provider, and, more specifically, the information on which 12 the service provider bases its determination with respect to a given use of an identity, forms the “focus” or “basic thrust” of the claim. Claims 2 and 4 of the ’456 Patent are identical to claim 1 with respect to the central role of the service provider. Reading the other six independent claims in their entirety reveals that they share the same “fundamental concept” as claim 1 of the ’456 Patent. In all of these claims, the service provider performs the crucial role of deciding whether a particular use of an identity is permitted based on essentially the same two inputs used in claim 1 of the ’456 Patent. To be sure, there are differences in terminology, but those distinctions do not change the focus of those claims. Claims 1, 2, and 4 of the ’456 Patent refer to the set of conditions governing use of the identity as the “scope of permissible use,” whereas the other independent claims use the term “pre-registered condition.” The latter claims, however, specify that the pre-registered condition “defines at least one circumstance under which the identity can be used,” which corresponds to the construed meaning of “scope of permissible use.” Claims 1, 2, and 4 of the ’456 Patent refer to “information in the request,” which “is insufficient to authorize the use of the identity.” Similarly, claim 5 of the ’456 Patent refers to “second information [that is] insufficient in and of itself to authorize any related use of the identity”; claim 1 of the ’027 Patent refers to “information [that is] insufficient in and of itself to execute the attempted use of the identity”; and claim 11 of the ’027 Patent requires that “the service provider lacks sufficient information to execute the attempted use of the identity.” The other asserted independent claims do not expressly impose a similar limitation, but, for present purposes, the Court will assume that this aspect is part of the “fundamental concept” implicitly embraced by them as well. 2 2 Including this limitation in all of the asserted independent claims results in an articulation more favorable to Mantissa. The more that specific features are included in the description of a claim’s 13 There is one notable difference between claims 1, 2, and 4 of the ’456 Patent and the other asserted independent claims. The “setting,” “changing,” and “returning” steps, along with the first “wherein” clause, suggest that an important feature of the former claims is the changeable nature of the set of conditions defining the scope of permissible use. The other independent claims, by contrast, do not contain similar steps. The Court concludes that the changeability of the scope of permitted use forms part of the “basic thrust” of claims 1, 2, and 4. To sum up, the Court, having distilled the fundamental concept embodied in the asserted independent claims, finds that their “character as a whole” can best be articulated as: determining whether a given use of an identity is permitted based on: (i) information that is, in itself, insufficient to permit use of the identity; and (ii) a (changeable [in the case of claims 1, 2, and 4 of the ‘456 Patent]) set of conditions that define when the identity may or may not be used. b. The Dependent Claims The Court has read the forty-three asserted dependent claims in their entirety and in light of their respective specifications and concludes that they have the same “character as a whole” as the asserted independent claims upon which they depend. While the dependent claims contain additional limitations, those features are at most ancillary and do not alter the claims’ “focus” or “basic thrust” for § 101 purposes. Extended discussion of those claims is therefore unnecessary. See Twilio, Inc. v. Telesign Corp., No. 16-CV-06925-LHK, 2017 WL 1374759, at *12 & n.2 (N.D. Cal. Apr. 17, 2017) (“[T]he Court need not individually analyze every claim, if certain claims are representative.”). 2. The Asserted Claims’ “Character as a Whole” Is “Directed To” an “Abstract Idea” The Supreme Court has recognized the “longstanding rule that ‘[a]n idea of itself is not patentable.’” Benson, 409 U.S. at 67 (quoting Rubber-Tip Pencil Co. v. Howard, 87 U.S. 498, “character as a whole,” the less likely it is that the claim will be deemed to be directed to an “abstract idea” at Step One. 14 507 (1874)); see also Le Roy v. Tatham, 55 U.S. 156, 175 (1852) (“A principle, in the abstract, is a fundamental truth; an original cause; a motive; these cannot be patented, as no one can claim in either of them an exclusive right.”). However, neither the Supreme Court nor the Federal Circuit has prescribed a “single, succinct, usable definition or test” for discerning a patent-ineligible “abstract idea.” Amdocs (Israel) Ltd. v. Openet Telecom, Inc., 841 F.3d 1288, 1294 (Fed. Cir. 2016); see Alice, 134 S. Ct. at 2357 (declining to “delimit the precise contours of the ‘abstract ideas’ category in this case”); X One, Inc. v. Uber Techs., Inc., No. 16-CV-06050-LHK, 2017 WL 878381, at *6 (N.D. Cal. Mar. 6, 2017) (“Neither the United States Supreme Court nor the Federal Circuit has set forth a bright line test separating abstract ideas from concepts that are sufficiently concrete so as to require no further inquiry under the first step of the Alice framework.”). As a result, courts conduct the “abstract idea” analysis under Step One by “compar[ing] [the] claims at issue to those claims already found to be directed to an abstract idea in previous cases.” Enfish, 822 F.3d at 1334; accord Amdocs, 841 F.3d at 1294 (“[T]he decisional mechanism courts now apply is to examine earlier cases in which a similar or parallel descriptive nature can be seen—what prior cases were about, and which way they were decided.”); see also Alice, 134 S. Ct. at 2357. a. Relevant Caselaw In Bilski v. Kappos, 561 U.S. 593 (2010), the Supreme Court considered the subjectmatter eligibility of patent claims that described a method for hedging against the financial risk of price fluctuations. Specifically: Claim 1 recited a series of steps for hedging risk, including: (1) initiating a series of financial transactions between providers and consumers of a commodity; (2) identifying market participants that have a counterrisk for the same commodity; and (3) initiating a series of transactions between those market participants and the commodity provider to balance the risk position of the first series of consumer transactions. Claim 4 “pu[t] the concept articulated in claim 1 into a simple 15 mathematical formula.” The remaining claims were drawn to examples of hedging in commodities and energy markets. Alice, 134 S. Ct. at 2355–56 (internal citations omitted) (citing Bilski, 561 U.S. at 599). The Supreme Court held that the patent at issue in Bilski claimed “the basic concept of hedging, or protecting against risk.” 561 U.S. at 611. Finding that “[h]edging is a fundamental economic practice long prevalent in our system of commerce and taught in any introductory finance class,” the Supreme Court concluded that the claims were directed to an “abstract idea” and thus ineligible under § 101. Id. at 611–12 (internal quotation marks and citation omitted). The Supreme Court next considered the “abstract idea” exception to § 101 in Alice. The Court described the claims at issue in Alice as: relat[ing] to a computerized scheme for mitigating “settlement risk”—i.e., the risk that only one party to an agreed-upon financial exchange will satisfy its obligation. In particular, the claims are designed to facilitate the exchange of financial obligations between two parties by using a computer system as a thirdparty intermediary. The intermediary creates “shadow” credit and debit records (i.e., account ledgers) that mirror the balances in the parties' real-world accounts at “exchange institutions” (e.g., banks). The intermediary updates the shadow records in real time as transactions are entered, allowing “only those transactions for which the parties' updated shadow records indicate sufficient resources to satisfy their mutual obligations.” At the end of the day, the intermediary instructs the relevant financial institutions to carry out the “permitted” transactions in accordance with the updated shadow records, thus mitigating the risk that only one party will perform the agreed-upon exchange. In sum, the patents in suit claim (1) the foregoing method for exchanging obligations (the method claims), (2) a computer system configured to carry out the method for exchanging obligations (the system claims), and (3) a computerreadable medium containing program code for performing the method of exchanging obligations (the media claims). All of the claims are implemented using a computer; the system and media claims expressly recite a computer, and the parties have stipulated that the method claims require a computer as well. Alice, 134 S. Ct. at 2352–53 (citations and footnote omitted). The Supreme Court held that the claims were patent-ineligible because they were “drawn to the concept of intermediated 16 settlement, i.e., the use of a third party to mitigate settlement risk.” Id. at 2356. In so concluding, the Court relied heavily on Bilski, explaining: Like the risk hedging in Bilski, the concept of intermediated settlement is “‘a fundamental economic practice long prevalent in our system of commerce.’” [Bilski, 561 U.S. at 611]; see, e.g., Emery, Speculation on the Stock and Produce Exchanges of the United States, in 7 Studies in History, Economics and Public Law 283, 346–356 (1896) (discussing the use of a “clearing-house” as an intermediary to reduce settlement risk). The use of a third-party intermediary (or “clearing house”) is also a building block of the modern economy. See, e.g., Yadav, The Problematic Case of Clearinghouses in Complex Markets, 101 Geo. L.J. 387, 406–412 (2013); J. Hull, Risk Management and Financial Institutions 103–104 (3d ed. 2012). Thus, intermediated settlement, like hedging, is an “abstract idea” beyond the scope of § 101. Alice, 134 S. Ct. at 2356. The Court continued: The concept of risk hedging we identified as an abstract idea in [Bilski] cannot be described as a “preexisting, fundamental truth.” The patent in Bilski simply involved a “series of steps instructing how to hedge risk.” Although hedging is a longstanding commercial practice, it is a method of organizing human activity, not a “truth” about the natural world “‘that has always existed[.]’” One of the claims in Bilski reduced hedging to a mathematical formula, but the Court did not assign any special significance to that fact, much less the sort of talismanic significance petitioner claims. Instead, the Court grounded its conclusion that all of the claims at issue were abstract ideas in the understanding that risk hedging was a “‘fundamental economic practice.’” In any event, we need not labor to delimit the precise contours of the “abstract ideas” category in this case. It is enough to recognize that there is no meaningful distinction between the concept of risk hedging in Bilski and the concept of intermediated settlement at issue here. Both are squarely within the realm of “abstract ideas” as we have used that term. Alice, 134 S. Ct. at 2356–57 (citations omitted). Since Bilski and Alice were decided, the Federal Circuit has “held that a wide variety of well-known and other activities constitute abstract ideas.” Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307, 1314 & n.5 (Fed. Cir. 2016) (hereinafter, “Symantec”) (collecting cases). For example, it has held that patent claims “utiliz[ing] user-selected pre-set limits on spending that are stored in a database that, when reached, communicates a notification 17 to the user via a device” were directed to the abstract idea of “tracking financial transactions to determine whether they exceed a pre-set spending limit (i.e., budgeting).” Intellectual Ventures I LLC v. Capital One Bank (USA), 792 F.3d 1363, 1367 (Fed. Cir. 2015) (hereinafter “Capital One”) (internal quotation marks and citation omitted). In another case, the Federal Circuit found ineligible claims that it described as collect[ing] information regarding accesses of a patient’s personal health information, analyz[ing] the information according to one of several rules (i.e., related to accesses in excess of a specific volume, accesses during a predetermined time interval, or accesses by a specific user) to determine if the activity indicates improper access, and provid[ing] notification if it determines that improper access has occurred. FairWarning IP, LLC v. Iatric Sys., Inc., 839 F.3d 1089, 1093 (Fed. Cir. 2016). In finding the claims directed to an abstract idea, the court reasoned: We have explained that the “realm of abstract ideas” includes “collecting information, including when limited to particular content.” We have also “treated analyzing information by steps people go through in their minds, or by mathematical algorithms, without more, as essentially mental processes within the abstract-idea category.” And we have found that “merely presenting the results of abstract processes of collecting and analyzing information, without more (such as identifying a particular tool for presentation), is abstract as an ancillary part of such collection and analysis.” Here, the claims are directed to a combination of these abstract-idea categories. Specifically, the claims here are directed to collecting and analyzing information to detect misuse and notifying a user when misuse is detected. Id. at 1093–94 (Fed. Cir. 2016) (citations omitted). b. Application to the Asserted Claims Defendants contend that the asserted claims “amount to no more than high-level business methods” and are “so broad” that they “cover[] routine and long-standing banking practices.” ECF No. 103 at 5–6. Mantissa maintains that the asserted claims do not encompass any “longstanding” or “fundamental” business practices and, moreover, “provide an improvement in computer network transaction processing.” ECF No. 87 at 8–9. 18 Identity theft and methods of preventing identity theft have existed since the dawn of civilization. See SANDRA K. HOFFMAN & TRACY G. MCGINLEY, IDENTITY THEFT: A REFERENCE HANDBOOK 1–16 (2010) (observing that “[i]dentity theft is a modern name for an ancient crime” and reviewing prominent examples of identity theft from the Book of Genesis to present times). In ancient times, identity theft generally involved “a simple form of impersonation.” Id. at 5. Early methods of detecting imposters and preventing such impersonation relied on correspondingly simple methods. As technology advanced and new forms of personal identification information arose, identity theft, and methods of preventing it, evolved as well. Id. at 6. Two examples of longstanding practices designed to protect identity information are particularly relevant to this case. The first is found in traditional banking practices. More than a century ago, one of the key inquiries a teller at a bank was required to make before paying on a check was whether the drawer’s signature was genuine. ALBERT S. BOLLES, PRACTICAL BANKING 83 (8th ed. 1892). “One of the universal precautions observed by banks to prevent forgeries” was to “require every depositor to write his name in a signature book” so that the teller could compare a “doubtful” signature on a check to the appropriate signature in the book. Id.; see also Bradford Trust Co. of Boston v. Texas Am. Bank-Houston, 790 F.2d 407, 410–11 (5th Cir. 1986) (noting that the traditional justification for the rule that “a drawee who accepts or pays an instrument on the forged signature of the drawer is bound on his acceptance and cannot recover back his payment” is that “the drawee is in a superior position to detect a forgery because he has the maker’s signature and is expected to know and compare it”). It was recommended that “[e]very drawer should always sign his name in the same manner, or, if varying it, should acquaint the paying teller with the variation.” PRACTICAL BANKING 83. Similarly, when a 19 depositor sought to withdraw a sum of money from his account, the following process was used to determine whether the signature on the withdrawal draft was genuine: [The paying teller] turns to the signature book (the entire series being near him), and, finding the number of the account, compares the signature of the draft held in his hand with that originally written in the book. . . . Any substantial variation, such as writing initials instead of full names, or abbreviations instead of initials, he causes to be corrected by a re-writing of the name on the back, if the depositor is present in person. . . . [The teller] must, using the best of his judgment and discretion, form his opinion as to whether the signature is genuine. . . . In the case of persons who did not write, but made a mark on the opening of their account, the mark is now made in the presence of the teller, and the person is asked the various test questions which were asked at that time. If answered correctly, and the appearance of the person sufficiently answers the description, this, with the presentation of the pass book, is considered sufficient evidence to pay on. Id. 170–71. The second example pertains to practices involving credit card transactions. “Although merchant credit may be as old as civilization, the present-day credit card industry in the United States originated in the nineteenth century.” Douglas Akers et al., Overview of Recent Developments in the Credit Card Industry, 17 FDIC BANKING REVIEW No. 3 (2005). “[B]y the early 1900s, major U.S. hotels and department stores issued paper identification cards to their most valued customers. When a customer presented such a card to a clerk at the issuing establishment, the customer’s creditworthiness and status were instantly established.” Id. Generally, however, these cards “were useful only at one location or within a limited geographic area—an area where local merchants accepted competitors’ cards as proof of a customer’s creditworthiness.” Id. By the mid-1900s, more expansive credit networks began to develop, such that by 2005, the year the ’456 Patent was filed, one commonly-used framework for credit card networks, known as the “multiple card issuer model,” involved “one card association, many cardholders, many merchants, and multiple banks.” Id. 20 In this model, the card association (or network) plays an important role by imposing rules for issuing cards, clearing and settling transactions, advertising and promoting the brand, authorizing transactions, assessing fees, and allocating revenues among transaction participants. . . . The process begins when the cardholder presents the credit card to the merchant to purchase a good or service. The merchant transmits to the acquiring bank the cardholder’s account number and the amount of the transaction. The acquiring bank forwards this information to the card association network requesting authorization for the transaction. The card association forwards the authorization request to the issuing bank. The issuing bank responds with its authorization or denial through the network to the acquiring bank and then to the merchant. Id. As credit networks expanded in scope, methods of preventing the unauthorized use of credit cards became increasingly important and widespread. Where in-person credit card transactions are concerned, merchants have long requested additional information beyond the card itself—information like a driver’s license or signature—as a means of verifying the identity of the individual attempting to use the credit card. See Authentication in an Electronic Banking Environment, OCC Advisory Letter, 2001 WL 897188, at *4 (July 30, 2001) (“One of the most reliable methods to verify a customer’s identity is a face-to-face presentation of tangible proof of identity (e.g., driver’s license).”); Ambers v. Buy.com, Inc., No. 13-0196 AG JPRX, 2013 WL 1944430, at *4 (C.D. Cal. Apr. 30, 2013) (noting that, in 1991, “standard retail verification procedures” included “comparing the customer’s signature to the signature on the credit card”), aff’d, 617 F. App’x 728 (9th Cir. 2015). As these examples show, 3 it is a longstanding, fundamental economic practice to determine whether a given use of an identity is permitted based on (i) information that is, in 3 “[I]t is well within the [c]ourt’s province to make concomitant factual findings and general historical observations when making a § 101 determination.” Network Apparel Grp., 154 F. Supp. 3d at 476; accord Cal. Inst. of Tech. v. Hughes Commc’ns Inc., 59 F. Supp. 3d 974, 978 n.6 (C.D. Cal. 2014) (“Courts frequently make findings when deciding purely legal questions. Eligibility questions mostly involve general historical observations, the sort of findings routinely made by courts deciding legal questions.” (citations omitted)). The Supreme Court did so in Bilski and Alice, for example. See Bilski, 561 U.S. at 21 itself, insufficient to enable use of the identity, and (ii) (changeable) conditions defining when the identity may be used. In the banking example referenced above, the teller determined whether the requested transactions were permitted by comparing the signature before him (either on the check or the withdrawal draft) to the account holder’s signature in the signature book. The signature in itself was insufficient to authorize the transaction. The condition defining whether the transaction was authorized was the existence of a sufficient match between the signature presented and the signature in the signature book. That condition, moreover, was changeable: the account holder could “vary” his signature (though, as the source cited above states, he would have been well-advised to inform the bank of such a change). In the credit card example, neither a driver’s license nor a signature is, in itself, sufficient to make a charge to a given credit card account. However, the merchant utilizes that “insufficient information” to determine whether use of the card is authorized by comparing it to information on the credit card itself, such as the cardholder’s name and the signature on the reverse of the credit card. The condition defining the permissible use of the card is met when there is a match between the additional information (the information on the driver’s license and/or the signature provided by the individual attempting to use the card) and the information on the card itself (e.g., the name on the front of the card and the signature on the reverse side). That condition, moreover, is changeable: credit card holders have long been able to add or remove other 611 (relying on general observations and financial treatises); Alice, 134 S. Ct. at 2356 (relying on law review articles and treatises). In other cases, the Federal Circuit has looked to whether the process at issue has an analogue in the “brick-and-mortar” context. See Symantec, 838 F.3d at 1317 (finding an email processing software program to be abstract through comparison to a “brick-and-mortar” post office). The Court is unaware of any authority that prevents consideration of longstanding practices, such as the banking and credit card practices noted above, in a § 101 inquiry such as this. See Content Extraction & Transmission LLC v. Wells Fargo Bank, 776 F.3d 1343, 1347 (Fed. Cir. 2014) (observing that “banks have, for some time, reviewed checks, recognized relevant data such as the amount, account number, and identity of account holder, and stored that information in their records”). 22 individuals from a given account; they can also request a new card if they wish to change the appearance of their signature. As Bilski and Alice hold, a longstanding, fundamental economic practice of this sort constitutes a patent-ineligible abstract idea. The asserted claims are also similar to the claims deemed ineligible in FairWarning. At their core, the asserted claims require the service provider to collect information, analyze that information in conjunction with certain conditions, make a determination based on that analysis, and notify the user of the determination. That is precisely what the claims in FairWarning involved. See Fairwarning, 839 F.3d at 1093. Indeed, the service provider is essentially a third-party intermediary, which Alice recognized as “a building block of the modern economy.” Alice, 134 S. Ct. at 2356. The Court therefore concludes that the asserted claims are analogous to “claims already found to be directed to an abstract idea in previous cases.” Enfish, 822 F.3d at 1334. Mantissa contends that the asserted claims are directed to an “improvement in computer network transaction processing.” ECF No. 87 at 9. The Court finds that argument unpersuasive. “[F]undamental economic and conventional business practices are often found to be abstract ideas, even if performed on a computer.” Enfish, 822 F.3d at 1335. The crucial question is “whether the focus of the claims is on the specific asserted improvement in computer capabilities . . . or, instead, on a process that qualifies as an ‘abstract idea’ for which computers are invoked merely as a tool.” Id. at 1335–36; see also McRO v. Bandai Namco Games Am. Inc., 837 F.3d 1299, 1314 (Fed. Cir. 2016) (claims “focused on a specific asserted improvement in computer animation” were non-abstract). Here, the claims simply recite, in broad, generic fashion, that the methods they describe “be[] executed on electronic computer hardware in combination with software.” Nothing in the asserted claims suggests that they are directed to improving the 23 functioning of computers or computer networks in and of themselves. Rather, the claims contemplate using computer networks as a tool for implementing the abstract idea identified above; any improvement to computer technology is at most incidental. See Affinity Labs of Texas, LLC v. DIRECTV, LLC, 838 F.3d 1253, 1262 (Fed. Cir. 2016) (claims for “providing outof-region access to regional broadcast content” were “directed not to an improvement in cellular telephones but simply to the use of cellular telephones as tools in the aid of a process focused on an abstract idea”); Twilio, 2017 WL 1374759, at *16 (finding that a claim did “not improve message routing technology itself” and therefore was “not directed to an ‘improvement in computer functionality’”). Mantissa points to what it describes as “specific limitations” in the asserted claims not comprehended by the “abstract idea” category. ECF No. 87 at 11–17. The Court finds those limitations better suited to consideration at Step Two. Although Steps One and Two of Alice are related and involve some overlap, see Elec. Power Grp., 830 F.3d at 1353, the Supreme Court made clear in Alice that the two steps are distinct. At Step One, the Court must conduct “a distinct and separate inquiry . . . [by] examin[ing] the basic character of the claims as a whole in order to determine whether they are directed to an abstract idea.” Tele-Publ'g, Inc. v. Facebook, Inc., No. CV 09-11686-DPW, 2017 WL 1959218, at *4 (D. Mass. May 11, 2017); see also Tech Pharmacy Servs., LLC v. Alixa Rx LLC, No. 4:15-CV-00766, 2017 WL 3129905, at *4 (E.D. Tex. July 24, 2017). By articulating the asserted claims’ “character as a whole” in a manner reflecting the specificity present in the claims themselves, the Court has already ensured that the Step One inquiry in this case is “meaningful.” See Thales Visionix Inc. v. United States, 850 F.3d 1343, 1347 (Fed. Cir. 2017). 24 Accordingly, the Court finds that the asserted claims are directed to an unpatentable abstract idea at Step One of Alice. B. Alice Step Two: The Asserted Claims Do Not Contain an “Inventive Concept” At Step Two, the Court considers “the elements of each claim both individually and ‘as an ordered combination’ to determine whether the additional elements ‘transform the nature of the claim’ into a patent-eligible application.” Alice, 134 S. Ct. at 2355 (quoting Mayo, 566 U.S. at 78–79). The Supreme Court has described Step Two as “a search for an inventive concept”— an “inventive concept” being “an element or combination of elements that is sufficient to ensure that the patent in practice amounts to significantly more than a patent upon the ineligible concept itself.” Id. (internal quotation marks and brackets omitted) (quoting Mayo, 566 U.S. at 72–73); accord RecogniCorp, LLC v. Nintendo Co., 855 F.3d 1322, 1327 (Fed. Cir. 2017). 1. Caselaw Regarding “Inventive Concept” Like the “abstract idea” category itself, “the contours of what constitutes an inventive concept are far from precise.” Synopsys, Inc. v. Mentor Graphics Corp., 839 F.3d 1138, 1151 (Fed. Cir. 2016). The Court is not without some guidance, however. It is well-established that “an inventive concept must be evident in the claims.” RecogniCorp, 855 F.3d at 1327; see also Alice, 134 S. Ct. at 2357 (“[W]e must examine the elements of the claim to determine whether it contains an ‘inventive concept.’”(emphasis added)); Synopsys, 839 F.3d at 1149 (“The § 101 inquiry must focus on the language of the [a]sserted [c]laims themselves.”). Moreover, the inventive concept “must be significantly more than the abstract idea itself.” Bascom Glob. Internet Servs., Inc. v. AT&T Mobility LLC, 827 F.3d 1341, 1349 (Fed. Cir. 2016) (emphasis added). “[A] transformation of an abstract idea to a patent-eligible application of the idea requires more than simply reciting the idea followed by ‘apply it.’” Twilio, 2017 WL 1374759, at 25 *10 (quoting Alice, 134 S. Ct. at 2357). The “mere recitation of concrete, tangible components is insufficient to confer patent eligibility to an otherwise abstract idea. Rather, the components must involve more than performance of ‘well-understood, routine, conventional activit[ies]’ previously known to the industry.” In re TLI Commc’ns LLC Patent Litig., 823 F.3d 607, 613 (Fed. Cir. 2016) (quoting Alice, 134 S. Ct. at 2359). Furthermore, “limiting an abstract idea to one field of use or adding token postsolution components [does] not make the concept patentable.” Bilski, 561 U.S. at 612; accord Ultramercial, Inc. v. Hulu, LLC, 772 F.3d 709, 716 (Fed. Cir. 2014) (“Narrowing the abstract idea of using advertising as a currency to the Internet is an ‘attempt[ ] to limit the use’ of the abstract idea ‘to a particular technological environment,’ which is insufficient to save a claim.”); Capital One, 792 F.3d at 1366 (“An abstract idea does not become nonabstract by limiting the invention to a particular field of use or technological environment, such as the Internet.”). The Federal Circuit has held that an inventive concept may be present in claims “necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks.” DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245, 1257 (Fed. Cir. 2014). In DDR, the court found that claims addressed to the “Internet-centric problem” of third-party merchant advertisements “lur[ing] the [host website’s] visitor traffic away” from a host website contained an inventive concept. Id. at 1248, 1259. The court emphasized, however that the claims at issue did not “recite a commonplace business method aimed at processing business information, applying a known business process to the particular technological environment of the Internet, or creating or altering contractual relations using generic computer functions and conventional network operations.” Id. at 1259. 26 The Federal Circuit has also held that a “non-conventional and non-generic arrangement of known, conventional pieces” can provide an inventive concept. Bascom, 827 F.3d at 1350. In Bascom, the court concluded that a claim involving “the installation of a filtering tool at a specific location, remote from the end-users, with customizable filtering features specific to each end user” contained an inventive concept. Id.; see also Amdocs, 841 F.3d at 1301 (holding that claims “designed to solve an accounting and billing problem faced by network service providers” had an inventive concept because they contained a “specific enhancing limitation that necessarily incorporate[d] the invention’s distributed architecture”). 2. Application to the Asserted Claims Mantissa argues that the asserted claims contain the following inventive concept: The inventive concept in the [a]sserted [c]laims is a method with a system to effect real-time control of personal (identity) assets through use of an internet/network accessible, owner-controlled, asset state that effectively give the owner a “leash” on the asset while using “second information” or “insufficient information” similar to tokenization such that the information later cannot be used for fraudulent activity just as one would not steal a car that does not run. This is an improvement over “conventional industry practice” of using a computer network to execute financial transactions related to credit or debit cards and the remedial use of identity monitoring systems. ECF No. 87 at 18. The Court begins by looking at the claim limitations Mantissa identifies individually and then examines those limitations as an ordered combination. See Bascom, 827 F.3d at 1349 (“The ‘inventive concept’ may arise in one or more of the individual claim limitations or in the ordered combination of the limitations.” (emphasis added)). a. The Individual Claim Limitations Considered individually, none of the claim limitations provides an “inventive concept.” 27 i. “Real-time” Control In their discussion of the exemplary embodiment, the specifications state that it is “helpful” for an identity owner to “be capable of modifying identification information on a whim, creating a real-time, or near real-time system that is fluid and constantly capable of meeting the needs of [the identity owner] while securing the identification information.” ECF No. 38-1 at 5:53–58. However, the asserted claims themselves do not refer to “real-time” control. Furthermore, the asserted claims do not “include any requirement for performing the claimed functions . . . in real time by use of anything but entirely conventional, generic technology.” Elec. Power Grp., 830 F.3d at 1356. Instead, the asserted claims contemplate “real-time” control solely as the result of the ordinary functioning of computer networks, which is insufficient to supply an inventive concept. See Capital One, 792 F.3d at 1370 (“[O]ur precedent is clear that merely adding computer functionality to increase the speed or efficiency of the process does not confer patent eligibility on an otherwise abstract idea. . . . [T]he fact that the web site returns the pre-designed ad more quickly than a newspaper could send the user a location-specific advertisement insert does not confer patent eligibility.”). ii. Internet/Network Accessibility The mere fact that the identity asset state is accessible via internet or computer network is plainly insufficient to establish an inventive concept. See Mortg. Grader, Inc. v. First Choice Loan Servs. Inc., 811 F.3d 1314, 1324–25 (Fed. Cir. 2016) (holding that “generic computer components such as an ‘interface,’ ‘network,’ and ‘database’ . . . do not satisfy the inventive concept requirement.”); Bancorp Servs., L.L.C. v. Sun Life Assur. Co. of Canada (U.S.), 687 F.3d 1266, 1278 (Fed. Cir. 2012) (“To salvage an otherwise patent-ineligible process, a computer 28 must be integral to the claimed invention, facilitating the process in a way that a person making calculations or computations could not.”). iii. Owner Control None of the asserted claims states that the identity owner has untrammeled control over the identity asset state. In fact, some asserted claims, such as claim 11 of the ’456 Patent, specify that the user, not the identity owner, establishes the “set of desired identification information parameters.” While the identity owner can then supply information consistent with those parameters, the fact that the user exercises significant control over the asset state undercuts any notion that the asserted claims contain an “inventive concept” founded on “owner control.” Indeed, the control reserved to a user under those claims is not unlike the control credit card companies have long exercised over cardholders’ ability to craft conditions governing use of their accounts. In any event, the mere idea of permitting an identity owner (rather than the user) to set the conditions under which his or her own identity can be used is not, without more, an inventive concept. iv. The Proactive “Leash” Mantissa distinguishes the purportedly “proactive” or “leash”-like nature of the asserted claims from the “remedial” orientation of “conventional industry practice.” The declaration of Gary M. Dennis, one of the co-inventors of the patents-in-suit, provides further explanation: The conventional focus was on the credit card company’s ability to control the identity information, not the unconventional and novel approach where an owner of the identity applies a “leash” to the use of his or her own identity assets. For example, in [c]laim 1 [of the ’456 Patent] the “leash” is applied by “defining a scope of permitted use of the identity; changing . . . status to a second state defining a scope of permitted use of the identity that is different from the first state” where the “information in the request is insufficient to authorize.” Other claims express the “leash” in terms of “pre-registered conditions” set by the identity owner. See e.g. ’456 Patent, Claim 11, 14, 15. This focus is even a departure today from the identity protection services such as Life Lock® or Free 29 Credit Report.com® that reactively notify if identity information (sufficient to authorize a transaction) is used. Remediation in all cases is more problematic and costly than prevention. ECF No. 102-1 at ¶ 30. With the exception of claim 14 of the ’456 Patent and claim 10 of the ’027 Patent, none of the asserted claims prevents both (i) the user from authorizing a use of the entity’s identity absent permission from the service provider and (ii) the service provider from providing permission unless consistent with “the intent of the entity.” Without those limitations, the user could authorize a use of the identity that the service provider did not determine was permitted, or the service provider could provide permission even if doing so was not consistent with the information and conditions before it. In either case, the “scope of permitted use” or “preregistered conditions” would not be acting as a proactive leash over use of the identity. As noted above, an “inventive concept” must appear in the claims themselves. Thus, with two exceptions, none of the asserted claims even arguably has the inventive proactive nature Mantissa ascribes to them. Looking to claim 14 of the ’456 Patent and claim 10 of the ’027 Patent, the Court finds that a proactive leash is not an inventive concept with respect to either claim. Mr. Dennis maintains that it “was a new technology in 2005 for an identity owner in a computer or communication network to proactively control use of identity and identification information by applying a ‘leash’ to his or her information where the information can be used but is without value to an outside intruder.” ECF No. 102-1 at ¶ 32. Taking that assertion as true for present purposes, it nonetheless remains the case that requiring a given use of an identity to be consistent with certain conditions set down in advance is an abstract idea. Applying that idea to computer networks may have been new in 2005, but “[a]n abstract idea does not become nonabstract by 30 limiting the invention to a particular field of use or technological environment.” Capital One, 792 F.3d at 1366. v. Use of “Second Information”/“Insufficient Information” This limitation was included as part of the Court’s articulation of the asserted claims’ “character as a whole.” Insofar as Mantissa repeats the arguments already considered at Step One, the Court rejects those arguments for the same reasons given before. Mantissa suggests that the use of second/insufficient information exemplifies the asserted claims’ inventive “layered” structure, which it describes as limiting the exposure of the identity assets by consummating a transaction with a layered approach using only insufficient identity information known to only limited and specified participants in the transaction, . . . preventing hacking at the participant respective sites because, by analogy, a thief won’t steal a car that doesn’t run, and . . . significantly reducing the computing, data storage, necessary bandwidth, and archival requirements with the [a]sserted [c]laims’ “layered” approach to prevent transaction fraud. ECF No. 87 at 11. None of the asserted claims recite a layered structure that precludes both the user and the service provider from having all the information necessary to authorize a use of the identity. For example, in claim 5 of the ’456 Patent, “first information” is forwarded to the user, and the user forwards “second information” to the service provider. The user therefore has access to both the first and second information. Nor is there any limitation stating that the user does not have access to the “pre-registered condition(s).” If the user is hacked, all of this information is presumably vulnerable. In claim 11 of the ’456 Patent, the entity provides certain information directly to the service provider, and the service provider also responds to a request by the user to authorize the transaction. The user “does not have direct access to the information provided by the entity” to the service provider. ECF No. 38-1 at 16:57–58. But unlike other claims in the ’456 Patent, claim 31 11 does not impose any limitations on the information in the request to the service provider. Thus, under claim 11, the service provider may well have access to information sufficient to authorize a use of the identity, thus exposing such information to hacking at a single site. The specification confirms this. The discussion of the exemplary embodiment states that the information in the request from the user to the service provider “is preferably in and of itself insufficient to enable the use of the identity for its intended use, such that its capture or loss would not expose vital information.” ECF No. 38-1 at 4:58–61 (emphasis added). It also states that it is preferable that the service provider “authorizes or denies requests without having access to sensitive identification information, . . . [and] does not have enough information to take any action on its own.” ECF No. 38-1 at 6:54–59. But the specification expressly acknowledges that “[i]n theory,” the service provider “may nonetheless have access to some of this information, although such information can be protected using passwords, encryption, or other known techniques.” ECF No. 38-1 at 6:64–67. The claims themselves, however, do not recite any such protective technique. To the extent that either the user or the service provider does not have access to information sufficient to authorize use of the identity, the “layered” structure arguably provides some benefit in terms of identity protection. But the Court is not persuaded that this supplies “significantly more” to the underlying abstract idea. This feature is more akin to claim limitations that merely involve “manipulating, reorganizing, or collecting data” as opposed to “fundamentally altering the original confidential information.” Card Verification Sols., LLC v. Citigroup Inc., No. 13 C 6339, 2014 WL 4922524, at *5 (N.D. Ill. Sept. 29, 2014). Finally, any “inventive concept” relating to the “layered” approach in terms of data storage, bandwidth, and archival requirements is not evident in the claims themselves. Limiting 32 the information provided to transaction participants may well result in the benefits Mantissa references, but without more, it does not add anything significant to the abstract idea. b. The Limitations Considered as an Ordered Combination Considering them as an ordered combination, the Court concludes that the purported claim limitations identified above do not add an inventive concept sufficient to render the asserted claims patent-eligible. The asserted claims are not “necessarily rooted” in computer technology in order to overcome a problem specifically arising in the realm of computer networks. See DDR, 773 F.3d at 1257. Hacking identification information may be a problem limited to computer networks, but identity theft is not. It is the latter problem that the claims address, and the solution they provide is decidedly technology-independent. The asserted claims do not require doing something to computer networks, they require doing something with computer networks. See DIRECTV, 838 F.3d at 1262 (explaining that DDR “dealt with a patent that required doing something to a web page, not simply doing something on a web page, a difference that the court regarded as important to the issue of patent eligibility”). Nor does the ordered combination of elements in the asserted claims recite a “nonconventional and non-generic arrangement of known, conventional pieces.” See Bascom, 827 F.3d at 1350. As explained above, none of the individual limitations is unconventional, and the Court finds nothing in the combination of those elements that is, either. Based on the foregoing, the Court concludes that the asserted claims fail to recite an inventive concept under Step Two. 33 C. There Are No Genuine Issues of Material Fact Mantissa cites evidence from various sources to support its assertion that triable issues of fact exist at Step One and/or Step Two of Alice. None of that evidence is availing. Mantissa relies heavily on Gary Dennis’ declaration. See ECF No. 102 at 5–8. The Court has already considered, and rejected, some of the assertions Mr. Dennis makes concerning the asserted claims’ purported inventiveness. Beyond that, it bears mentioning that “[t]he ‘novelty’ of any element or steps in a process, or even of the process itself, is of no relevance in determining whether the subject matter of a claim falls within the § 101 categories of possibly patentable subject matter.” Diamond v. Diehr, 450 U.S. 175, 189 (1981). More generally, the fact that Mr. Dennis’ testimony reaches legal conclusions contrary to the Court’s is irrelevant for summary judgment purposes; legal conclusions are the sole province of the Court. See Mortg. Grader, 811 F.3d at 1325–26 (finding that expert’s declaration did not preclude summary judgment under § 101); ICON Health & Fitness, Inc. v. Polar Electro Oy, No. 1:11-CV-00167BSJ, 2017 WL 978993, at *10 (D. Utah Mar. 10, 2017). Mantissa also cites a 2016 press release from Ondot and articles published between 2014 and 2015 in three periodicals—Network World, BanklessTimes, and TechCrunch—describing Ondot’s allegedly infringing product and characterizing it as an improvement over existing technology. ECF No. 102 at 13–15. Given the timing of these publications (nine years or more after the ’456 Patent was filed) and the fact that they deal with Ondot’s product, rather than Mantissa’s, the Court finds that they do not create a genuine issue of material fact. D. Preemption The underlying concern that drives the implied exclusions to subject-matter eligibility under § 101 is “one of pre-emption.” Alice, 134 S. Ct. at 2354. Laws of nature, natural 34 phenomena, and abstract ideas constitute “‘the basic tools of scientific and technological work.’” Id. (quoting Myriad Genetics, 133 S. Ct. at 2116). Allowing such “building blocks of human ingenuity” to be monopolized “‘through the grant of a patent might tend to impede [i.e., preempt] innovation more than it would tend to promote it,’ thereby thwarting the primary object of the patent laws.” Alice, 134 S. Ct. at 2354 (quoting Mayo Collaborative Servs. v. Prometheus Labs., Inc., 566 U.S. 66, 71 (2012)). Mantissa argues that the asserted claims “do not risk preempting all future inventions for these types of computer network transactions.” ECF No. 85 at 24. At the very least, Mantissa contends, there is a material fact issue as to whether the asserted claims would preempt innovation. These arguments are unavailing. “While preemption may signal patent ineligible subject matter, the absence of complete preemption does not demonstrate patent eligibility.” Synopsys, Inc. v. Mentor Graphics Corp., 839 F.3d 1138, 1150 (Fed. Cir. 2016) (internal quotation marks omitted) (quoting Ariosa Diagnostics, Inc. v. Sequenom, Inc., 788 F.3d 1371, 1379 (Fed. Cir. 2015)); accord Cleveland Clinic Found. v. True Health Diagnostics LLC, 859 F.3d 1352, 1363 (Fed. Cir. 2017); FairWarning, 839 F.3d at 1098. “Where a patent’s claims are deemed only to disclose patent ineligible subject matter under the [Alice] framework”—as the Court deems the asserted claims in this case—“preemption concerns are fully addressed and made moot.” Id. Accordingly, any factual issue regarding the preemptive impact of the patentsin-suit is immaterial and does not preclude summary judgment in Defendants’ favor. E. Defendants’ Motion for Judicial Notice As noted above, Defendants request that the Court take judicial notice of a 1995 American Bar Association article concerning livings trusts. They maintain that the article shows 35 that living trusts are a “well-known business method” and therefore supports finding that the asserted claims do not contain an “inventive concept.” ECF No. 80 at 8. The Court concludes that the subject matter of the article is not reasonably analogous to the patents-in-suit and would not be probative with respect to patent eligibility under § 101. See Dawes v. Imperial Sugar Co., No. 4:11-cv-3250, 2013 WL 1345635, at *2 (S.D. Tex. Mar. 30, 2013) (Rosenthal, J.); U.S. ex rel. Modglin v. DJO Glob. Inc., 48 F. Supp. 3d 1362, 1383 (C.D. Cal. 2014) (declining to take judicial notice of documents that were “not probative”), aff’d, 678 F. App’x 594 (9th Cir. 2017). In any event, the Court has already determined that Defendants are entitled to summary judgment, and considering the article will not alter that conclusion. The renewed motion for judicial notice is therefore denied as moot. F. Defendants’ Motion to Strike When the Court notified the parties of its decision to convert Defendants’ motion for judgment on the pleadings into a motion for summary judgment, it set two deadlines: a June 9, 2017 deadline for the parties to file “any additional briefing,” and a June 16, 2017 deadline for any party to file “a response” to an opposing party’s “additional briefing.” Mantissa filed additional briefing in accordance with the June 9 deadline, but Defendants did not. However, Defendants filed a response to Mantissa’s additional briefing on June 16. On June 23, Mantissa filed a reply to Defendants’ response, as well as a declaration of Sandeep Chatterjee, Ph.D., a technical expert whom Mantissa has retained. ECF Nos. 105, 106. Defendants move to strike the reply and declaration as unauthorized by the Court’s briefing order. ECF No. 107. Rule 12(d) requires that, following conversion, “[a]ll parties must be given a reasonable opportunity to present all the material that is pertinent to the motion.” FED. R. CIV. P. 12(d). Mantissa’s only opportunity to respond to arguments made by Defendants after 36 conversion to summary judgment was by filing the instant reply and declaration. Given that, and because Mantissa is the non-moving party, the Court denies the motion to strike. Defendants’ request that they be permitted to file a sur-reply is denied. Having considered the additional arguments in Mantissa’s reply, the Court remains of the opinion that Defendants are entitled to summary judgment. Many of his statements, especially those concerning industry practices, are highly equivocal. See, e.g., ECF No. 106 ¶ 40 (“I do not believe this was conventional in 2005.”). Moreover, his statements are directed toward legal conclusions rather than material fact issues. The Court therefore finds that Dr. Chatterjee’s declaration fails to create a genuine issue of material fact. IV. CONCLUSION For the reasons given above, the Court concludes that the asserted claims of the patentsin-suit are not eligible for patent protection under § 101. This does not mean that the methods described in the patents have not advanced identity protection. Under current law, however, “[g]roundbreaking, innovative, or even brilliant discovery does not by itself satisfy the § 101 inquiry.” Ass’n for Molecular Pathology v. Myriad Genetics, Inc., 133 S. Ct. 2107, 2110 (2013). The Court therefore GRANTS summary judgment in favor of Defendants. In addition, the Court DENIES as moot Defendants’ renewed motion for judicial notice and DENIES Defendants’ motion to strike. A separate order of dismissal will follow. Signed on August 10, 2017, at Houston, Texas. ______________________________ DENA HANOVICE PALERMO UNITED STATES MAGISTRATE JUDGE 37

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?