throbber
Page 1
`
` 170BXVII(K)2 Standard of Review
` 170Bk3576 Procedural Matters
` 170Bk3604 Judgment
` 170Bk3604(4) k. Summary
`judgment. Most Cited Cases
` (Formerly 170Bk776)
`
`
`324.5
`
`Court of Appeals reviews grants of summary
`judgment de novo. Fed.Rules Civ.Proc.Rule 56, 28
`U.S.C.A.
`
`[2] Patents 291
`
`291 Patents
` 291XII Infringement
` 291XII(B) Actions
` 291k324 Appeal
` 291k324.5 k. Scope and extent of review
`in general. Most Cited Cases
`
`
`7.14
`
`Issues of patent-eligible subject matter are ques-
`tions of law and are reviewed without deference by
`Court of Appeals. 35 U.S.C.A. § 101.
`
`[3] Patents 291
`
`291 Patents
` 291I Subjects of Patents
` 291k4 Arts
` 291k7.14 k. Particular processes or methods
`as constituting invention. Most Cited Cases
`
`
`Method claim for verifying the validity of a credit
`card transaction over the Internet was drawn to un-
`patentable mental processes and was therefore invalid;
`all of claim's method steps could be performed in the
`human mind, or by a human using a pen and paper,
`claim's scope was not limited to any particular fraud
`detection algorithm, and no algorithms were disclosed
`
`
`
`West Headnotes
`
`3604(4)
`
`
`[1] Federal Courts 170B
`
`170B Federal Courts
` 170BXVII Courts of Appeals
` 170BXVII(K) Scope and Extent of Review
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`
`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`
`
`
`United States Court of Appeals,
`Federal Circuit.
`CYBERSOURCE CORPORATION, Plain-
`tiff–Appellant,
`v.
`RETAIL DECISIONS, INC., Defendant–Appellee.
`
`No. 2009–1358.
`Aug. 16, 2011.
`
`
`Background: Assignee of patent for method and
`system for detecting fraud in credit card transaction
`between consumer and merchant over Internet brought
`infringement action against competitor. Competitor
`moved for summary judgment of invalidity. The
`United States District Court for the Northern District
`of California, Marilyn H. Patel, J., 620 F.Supp.2d
`1068, granted motion. Assignee appealed.
`
`Holdings: The Court of Appeals, Dyk, Circuit Judge,
`held that:
`(1) claimed method for verifying the validity of credit
`card transaction over the Internet was drawn to un-
`patentable mental process, and
`(2) claim reciting computer readable medium con-
`taining program instructions for executing verification
`method was drawn to unpatentable mental process.
`
`
`Affirmed.
`
`
`
`
`
`
`
`1
`
`SAMSUNG-1031
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`in patent's specification, rather, the broad scope of
`claim extended to essentially any method of detecting
`credit card fraud based on information relating past
`transactions to a particular Internet address. 35
`U.S.C.A. § 101.
`
`[4] Patents 291
`
`291 Patents
` 291I Subjects of Patents
` 291k4 Arts
` 291k7 k. Process or methods in general.
`Most Cited Cases
`
`
`7
`
`7
`
`A method that can be performed by human
`thought alone is merely an abstract idea and is not
`patent-eligible. 35 U.S.C.A. § 101.
`
`[5] Patents 291
`
`291 Patents
` 291I Subjects of Patents
` 291k4 Arts
` 291k7 k. Process or methods in general.
`Most Cited Cases
`
`
`Methods which can be performed entirely in the
`human mind are unpatentable not because there is
`anything wrong with claiming mental method steps as
`part of a process containing non-mental steps, but
`rather because computational methods that can be
`performed entirely in the human mind are the types of
`methods that embody the basic tools of scientific and
`technological work that are free to all men and re-
`served exclusively to none. 35 U.S.C.A. § 101.
`
`[6] Patents 291
`
`291 Patents
` 291IV Applications and Proceedings Thereon
` 291k101 Claims
`
`101(11)
`
`Page 2
`
` 291k101(11) k. Process or method claims.
`Most Cited Cases
`
`
`A “Beauregard claim” is a claim to a computer
`readable medium, such as a disk, hard drive, or other
`data storage device, containing program instructions
`for a computer to perform a particular process. 35
`U.S.C.A. § 101.
`
`[7] Patents 291
`
`291 Patents
` 291I Subjects of Patents
` 291k4 Arts
` 291k7.14 k. Particular processes or methods
`as constituting invention. Most Cited Cases
`
`
`7.14
`
`Claim reciting computer readable medium con-
`taining program instructions for executing method for
`verifying the validity of a credit card transaction over
`the Internet was drawn to unpatentable mental process
`and was therefore invalid; verification method was
`itself an unpatentable abstract idea, and merely re-
`quiring a computer to perform the method did not
`change method's basic character. 35 U.S.C.A. § 101.
`
`Patents 291
`
`291 Patents
` 291XIII Decisions on the Validity, Construction,
`and Infringement of Particular Patents
` 291k328 Patents Enumerated
` 291k328(2) k. Original utility. Most Cited
`Cases
`
`
`328(2)
`
`6,029,154. Invalid.
`
`
`*1367 J. Michael Jakes, Finnegan, Henderson,
`Farabow, Garrett & Dunner, LLP, of Washington, DC,
`argued for plaintiff-appellant. With him on the brief
`were Erika H. Arner and Justin R. Lowery. Of counsel
`on the brief was Marc J. Pernick, Morrison & Forester,
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`2
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`LLP, of Palo Alto, CA.
`
`Scott J. Bornstein, Greenberg Traurig, LLP, of New
`York, NY argued for defendant-appellee. With him on
`the brief was Allan A. Kassenoff. Of counsel was
`James W. Soong, of E. Palo Alto, CA.
`
`Before BRYSON, DYK, and PROST, Circuit Judges.
`
`DYK, Circuit Judge.
`Plaintiff-appellant CyberSource Corporation
`(“CyberSource”) appeals from a decision of the
`United States District Court for the Northern District
`of California. The district court granted summary
`judgment of invalidity of claims 2 and 3 of U.S. Patent
`No. 6,029,154 (“'154 patent”) under 35 U.S.C. § 101
`for failure to recite patent-eligible subject matter. See
`CyberSource Corp. v. Retail Decisions, Inc., 620
`F.Supp.2d 1068 (N.D.Cal.2009). We affirm.
`
`
`BACKGROUND
`CyberSource is the owner by assignment of the
`'154 patent, which recites a “method and system for
`detecting fraud in a credit card transaction between [a]
`consumer and a merchant over the Internet.” '154
`patent, at [57]. The ' 154 patent's specification ex-
`plains that prior art credit card fraud detection sys-
`tems—which generally rely on billing addresses and
`personal identification information—work well for
`“face-to-face” transactions and transactions where
`“the merchant is actually shipping a package ... to the
`address of a customer.” Id. col.1 ll.21–24. But for
`online sales where the product purchased is down-
`loadable content, the patent explains, “address and
`identity information are not enough to adequately
`verify that the customer who is purchasing the goods
`is actually the owner of the credit card.” Id. col.1
`ll.28–30.
`
`
`The '154 patent purports to solve this problem by
`using “Internet address” information (IP addresses,
`MAC addresses, e-mail addresses, etc.) to determine
`
`Page 3
`
`whether an Internet address relating to a particular
`transaction “is consistent with other Internet addresses
`[that have been] used in *1368 transactions utilizing
`[the same] credit card.” Id. col.3 ll.15–16. As we
`discuss in detail below, the claims of the '154 patent
`are broad and essentially purport to encompass any
`method or system for detecting credit card fraud which
`utilizes information relating credit card transactions to
`particular “Internet address [es].” FN1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`FN1. Claim 3, as amended during reexami-
`nation, reads:
`
`3. A method for verifying the validity of a
`credit card transaction over the Internet
`comprising the steps of:
`
`information about other
`a) obtaining
`transactions that have utilized an Internet
`address that is identified with the [ ] credit
`card transaction;
`
`b) constructing a map of credit card num-
`bers based upon the other transactions and;
`
`c) utilizing the map of credit card numbers
`to determine if the credit card transaction is
`valid.
`
`J.A. 32 ('154 Patent Reexamination Cer-
`tificate), col.2 ll.38–47.
`
`Claim 2, as amended during reexamina-
`tion, reads:
`
`2. A computer readable medium contain-
`ing program instructions for detecting
`fraud in a credit card transaction between a
`consumer and a merchant over the Internet,
`wherein execution of the program instruc-
`tions by one or more processors of a
`computer system causes the one or more
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`3
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`processors to carry out the steps of:
`
`
`
`a) obtaining credit card information relat-
`ing to the transactions from the consumer;
`and
`
`b) verifying the credit card information
`based upon values of plurality of parame-
`ters, in combination with information that
`identifies the consumer, and that may
`provide an indication whether the credit
`card transaction is fraudulent,
`
`wherein each value among the plurality of
`parameters is weighted in the verifying
`step according to an importance, as de-
`termined by the merchant, of that value to
`the credit card transaction, so as to provide
`the merchant with a quantifiable indication
`of whether the credit card transaction is
`fraudulent,
`
`wherein execution of the program instruc-
`tions by one or more processors of a
`computer system causes that one or more
`processors to carry out the further steps of;
`
`[a] obtaining information about other
`transactions that have utilized an Internet
`address that is identified with the credit
`card transaction;
`
`[b] constructing a map of credit card
`numbers based upon the other transactions;
`and
`
`[c] utilizing the map of credit card numbers
`to determine if the credit card transaction is
`valid.
`
`Id. col.2 ll.9–37.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4
`
`
`
`CyberSource brought suit against Retail Deci-
`sions, Inc. (“Retail Decisions”) on August 11, 2004,
`alleging infringement of the '154 patent. Retail Deci-
`sions thereafter initiated an ex parte reexamination of
`the '154 patent, and the district court stayed its pro-
`ceedings while the U.S. Patent and Trademark Office
`(“PTO”) conducted the examination. The district court
`resumed proceedings after the PTO reissued the '154
`patent with amended claims on August 5, 2008. On
`October 30, 2008, this court decided In re Bilski, 545
`F.3d 943 (Fed.Cir.2008) (en banc). Retail Decisions
`thereafter moved for summary judgment of invalidity
`under 35 U.S.C. § 101. After briefing and a hearing,
`the district court found that claim 3 recited “an un-
`patentable mental process for collecting data and
`weighing values,” which did “not become patentable
`by tossing in references to [I]nternet commerce.”
`CyberSource, 620 F.Supp.2d at 1077. The court fur-
`ther found with respect to claim 2 that “simply ap-
`pending ‘A computer readable media including pro-
`gram instructions ...’ to an otherwise non-statutory
`process claim is insufficient to make it statutory.” Id.
`at 1080. The district court thus granted summary
`judgment of invalidity. Id. at 1078.
`
`
`CyberSource appealed to this court in April 2009.
`After
`the Supreme Court granted certiorari
`in
`*1369Bilski v. Doll, 556 U.S. 1268, 129 S.Ct. 2735,
`174 L.Ed.2d 246 (2009), we granted CyberSource's
`motion to stay the proceedings. Briefing was resumed
`on October 28, 2010, following the Supreme Court's
`decision. See Bilski v. Kappos, ––– U.S. ––––, 130
`S.Ct. 3218, 177 L.Ed.2d 792 (2010). We have juris-
`diction pursuant to 28 U.S.C. § 1295(a)(1).
`
`
`DISCUSSION
`[1][2] We review grants of summary judgment de
`novo. Tokai Corp. v. Easton Enters., Inc., 632 F.3d
`1358, 1366 (Fed.Cir.2011). Issues of patent-eligible
`subject matter are questions of law and are reviewed
`without deference. Research Corp. Techs., Inc. v.
`Microsoft Corp., 627 F.3d 859, 867 (Fed.Cir.2010).
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`4
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`
`
`I
`Two claims of the '154 patent are at issue in this
`case. Claim 3 recites a process for verifying the va-
`lidity of credit card transactions over the Internet. See
`J.A. 32 ('154 Patent Reexamination Certificate), col.2
`ll.38–47. Claim 2 recites a computer readable medium
`containing program instructions for executing the
`same process. See id. col.2 ll.9–37.
`
`
`The categories of patent-eligible subject matter
`are set forth in § 101, which provides:
`
`
`Whoever invents or discovers any new and useful
`process, machine, manufacture, or composition of
`matter, or any new and useful improvement thereof,
`may obtain a patent therefor, subject to the condi-
`tions and requirements of this title.
`
`
`
`35 U.S.C. § 101. Section 100(b) of the Patent Act
`defines the “process” category tautologically, stating
`that:
`The term “process” means process, art or method,
`and includes a new use of a known process, ma-
`chine, manufacture, composition of matter, or ma-
`terial.
`
`
`
`35 U.S.C. § 100(b). “In choosing such expansive
`terms ... modified by the comprehensive ‘any,’ Con-
`gress plainly contemplated that the patent laws would
`be given wide scope.” Bilski, 130 S.Ct. at 3225
`(quoting Diamond v. Chakrabarty, 447 U.S. 303, 308,
`100 S.Ct. 2204, 65 L.Ed.2d 144 (1980)).
`
`
`In interpreting § 101, this court concluded in
`Bilski that the “machine-or-transformation” test was
`the appropriate test for the patentability of process
`claims. 545 F.3d at 943. Thus, we held that a claimed
`process would only be “patent-eligible under § 101 if:
`(1) it is tied to a particular machine or apparatus; or (2)
`it transforms a particular article into a different state or
`thing.” Id. at 954. We further held that, to satisfy the
`
`Page 5
`
`machine prong of the test, the use of a machine “must
`impose meaningful limits on the claim's scope.” Id. at
`961. Applying this test, we found that Bilski's claimed
`“method of hedging risk in the field of commodities
`trading” was unpatentable under § 101. Id. at 949,
`963–66. The Supreme Court affirmed our Bilski deci-
`sion, but in doing so it rejected use of the ma-
`chine-or-transformation test as the exclusive test for
`the patentability of a claimed process. See Bilski, 130
`S.Ct. at 3226. While the “machine-or-transformation
`test is a useful and important clue,” the Court stated, it
`“is not the sole test for deciding whether an invention
`is a patent-eligible ‘process.’ ” Id. at 3227. The Court
`declined to “define further what constitutes a patent-
`able ‘process,’ beyond pointing to the definition of
`that term provided in § 100(b) and looking to the
`guideposts in [the Court's precedents].” Id. at 3232.
`“The Court's precedents provide three specific excep-
`tions to § 101's broad patent-eligibility principles:
`‘laws of nature, physical phenomena, and abstract
`ideas.’ ” Id. at 3225 (quoting Diamond, 447 U.S. at
`309, 100 S.Ct. 2204). The Court noted that these ju-
`dicially created*1370 exceptions “have defined the
`reach of the statute as a matter of statutory stare de-
`cisis going back 150 years,” and are “ ‘part of the
`storehouse of knowledge of all men ... free to all men
`and reserved exclusively to none.’ ” Id. (quoting Funk
`Bros. Seed Co. v. Kalo Inoculant Co., 333 U.S. 127,
`130, 68 S.Ct. 440, 92 L.Ed. 588 (1948)). In holding
`that the machine-or-transformation test is not the ex-
`clusive test for a process's patent-eligibility, the Su-
`preme Court expressly left open the door for “the
`Federal Circuit's development of other limiting criteria
`that further the purposes of the Patent Act and are not
`inconsistent with its text.” Id. at 3231.
`
`
`II
`[3] We first address claim 3 of the '154 patent,
`which recites a method for verifying the validity of a
`credit card transaction over the Internet. Claim 3, as
`amended during reexamination, reads in its entirety:
`
`
`3. A method for verifying the validity of a credit
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`5
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`card transaction over the Internet comprising the
`steps of:
`
`
`
`a) obtaining information about other transactions
`that have utilized an Internet address that is iden-
`tified with the [ ] credit card transaction;
`
`b) constructing a map of credit card numbers
`based upon the other transactions and;
`
`c) utilizing the map of credit card numbers to
`determine if the credit card transaction is valid.
`
`
`
`
`
`
`
`J.A. 32 ('154 Patent Reexamination Certificate),
`col.2 ll.38–47. CyberSource acknowledges that the
`“Internet address” recited in step (a) of claim 3 “may
`be, for example, an Internet protocol (IP) address or an
`e-mail address for the particular credit card transac-
`tion.” Appellant's Br. 7. CyberSource further concedes
`that the “map of credit card numbers” recited in step
`(b) can be as simple as a list of credit card transactions
`relating to a particular IP address. See Appellant's Br.
`9. Finally, step (c) does not limit claim 3 to any spe-
`cific fraud detection formula or mathematical algo-
`rithm, but rather broadly purports to encompass any
`means of “utilizing the map of credit card numbers to
`determine if the credit card transaction is valid.” J.A.
`32, col.2 ll.46–47.
`
`
`The district court found that claim 3 fails to meet
`either prong of the machine-or-transformation test.
`CyberSource, 620 F.Supp.2d at 1078. We agree. As
`the district court correctly held, the method of claim 3
`simply requires one to “obtain and compare intangible
`data pertinent to business risks.” Id. at 1073. The mere
`collection and organization of data regarding credit
`card numbers and Internet addresses is insufficient to
`meet the transformation prong of the test, and the plain
`language of claim 3 does not require the method to be
`performed by a particular machine, or even a machine
`at all.
`
`
`Page 6
`
`We are not persuaded by the appellant's argument
`that the claimed method is tied to a particular machine
`because it “would not be necessary or possible without
`the Internet.” Appellant's Br. 42. Regardless of
`whether “the Internet” can be viewed as a machine, it
`is clear that the Internet cannot perform the fraud
`detection steps of the claimed method. Moreover,
`while claim 3 describes a method of analyzing data
`regarding Internet credit card transactions, nothing in
`claim 3 requires an infringer to use the Internet to
`obtain that data (as opposed to obtaining the data from
`a pre-compiled database). The Internet is merely de-
`scribed as the source of the data. We have held that
`mere “[data-gathering] step[s] cannot make an oth-
`erwise nonstatutory claim statutory.” In re Grams, 888
`F.2d 835, 840 (Fed.Cir.1989) (quoting In re Meyer,
`688 F.2d 789, 794 (CCPA 1982)).
`
`
`*1371 Thus, the district court did not err in
`holding
`that claim 3 fails
`to meet
`the ma-
`chine-or-transformation test. However, our analysis
`does not end
`there. In holding
`that
`the ma-
`chine-or-transformation test “is not the sole test for
`deciding whether an invention is a patent-eligible
`process,” Bilski, 130 S.Ct. at 3227, the Supreme Court
`has made clear that a patent claim's failure to satisfy
`the machine-or-transformation test is not dispositive
`of the § 101 inquiry. Nonetheless, we find that claim 3
`of the '154 patent fails to recite patent-eligible subject
`matter because it is drawn to an unpatentable mental
`process—a subcategory of unpatentable abstract ide-
`as.
`
`
`The Supreme Court has stated that “[p]henomena
`of nature, though just discovered, mental processes,
`and abstract intellectual concepts are not patentable, as
`they are the basic tools of scientific and technological
`work.” Gottschalk v. Benson, 409 U.S. 63, 67, 93 S.Ct.
`253, 34 L.Ed.2d 273 (1972) (emphasis added). In
`Benson, the patent at issue claimed a method of pro-
`gramming a general-purpose computer to convert
`binary-coded decimal (“BCD”) numbers into pure
`binary through the use of a mathematical algorithm.
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`6
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`Id. at 65, 93 S.Ct. 253. The Court focused in part on
`the mental character of the claimed process, stating:
`
`
`The conversion of BCD numerals to pure binary
`numerals can be done mentally.... The method
`sought to be patented varies the ordinary arithmetic
`steps a human would use by changing the order of
`the steps, changing the symbolism for writing the
`multiplier used in some steps, and by taking subto-
`tals after each successive operation. The mathe-
`matical procedures can be carried out in existing
`computers long in use, no new machinery being
`necessary. And, as noted, they can also be per-
`formed without a computer.
`
`
`
` Id. at 67, 93 S.Ct. 253. Thus, in finding that the
`process in Benson was not patent-eligible, the Su-
`preme Court appeared to endorse the view that
`methods which can be performed mentally, or which
`are the equivalent of human mental work, are un-
`patentable abstract ideas—the “basic tools of scien-
`tific and technological work” that are open to all. Id.
`
`
`The Supreme Court reaffirmed and extended its
`Benson holding in the case of Parker v. Flook, 437
`U.S. 584, 98 S.Ct. 2522, 57 L.Ed.2d 451 (1978). The
`patent in Flook claimed a method for calculating and
`updating the values of “alarm limits” for alarms that
`monitor process variables (such as temperature) dur-
`ing
`the catalytic chemical conversion of hy-
`dro-carbons. Id. at 585–86, 98 S.Ct. 2522. The “alarm
`limits” were threshold values which, if exceeded,
`would trigger a warning alarm to sound. The Court
`characterized the invention as “simply provid[ing] a
`new and presumably better method for calculating
`alarm limit values.” Id. at 594–95, 98 S.Ct. 2522. The
`Court noted that the calculations, while “primarily
`useful for computerized [applications],” could still “be
`made [using a] pencil and paper.” Id. at 586, 98 S.Ct.
`2522. The Court rejected the notion that the recitation
`of a practical application for the calculation could
`alone make the invention patentable, stating that any
`“competent draftsman could attach some form of
`
`Page 7
`
`post-solution activity to almost any mathematical
`formula.” Id. at 590, 98 S.Ct. 2522. The Court thus
`found the claimed invention unpatentable.
`
`
`Following the Supreme Court, we have similarly
`held that mental processes are not patent-eligible
`subject matter because the “application of [only] hu-
`man intelligence to the solution of practical problems
`is no more than a claim to a fundamental principle.”
`Bilski, 545 F.3d at 965 (quotation marks omitted); see
`also *1372id. at 952, 960–61. After our en banc deci-
`sion in Bilski, this court—relying on Benson, Flook,
`and our prior decisions—noted that we have consist-
`ently “refused to find processes patentable when they
`merely claimed a mental process standing alone and
`untied to another category of statutory subject mat-
`ter[,] even when a practical application was claimed.”
`In re Comiskey, 554 F.3d 967, 980 (Fed.Cir.2009). FN2
`We concluded:
`
`
`FN2. See also In re Schrader, 22 F.3d 290,
`291 (Fed.Cir.1994) (holding unpatentable a
`“method constitut[ing] a novel way of con-
`ducting auctions” to maximize total sales
`revenue); In re Warmerdam, 33 F.3d 1354,
`1355, 1360 (Fed.Cir.1994) (holding un-
`patentable a process for controlling objects to
`avoid collisions which described “nothing
`more than the manipulation of basic mathe-
`matical constructs, the paradigmatic ‘abstract
`idea’ ”); Grams, 888 F.2d at 836, 840–41
`(holding unpatentable “a method of diag-
`nosing an abnormal condition in an individ-
`ual” that comprised performing clinical tests
`and thinking about the results); Meyer, 688
`F.2d at 795–96 (holding unpatentable “a
`mental process that a neurologist should
`follow”); In re Maucorps, 609 F.2d 481, 482,
`486 (CCPA 1979) (holding unpatentable a
`method of “optimizing the organization of
`sales representatives in a business”).
`
`[T]he patent statute does not allow patents on par-
`
`
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`7
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`ticular systems that depend for their operation on
`human intelligence alone, a field of endeavor that
`both the framers and Congress intended to be be-
`yond the reach of patentable subject matter.... [I]t is
`established that the application of human intelli-
`gence to the solution of practical problems is not in
`and of itself patentable.
` Id. Thus, because the method of arbitration claims
`in Comiskey essentially sought “to patent the use of
`human intelligence in and of itself,” the claims were
`drawn to abstract ideas and were invalid under §
`101. Id. at 981.
`
`
`
`It is clear that unpatentable mental processes are
`the subject matter of claim 3. All of claim 3's method
`steps can be performed in the human mind, or by a
`human using a pen and paper. Claim 3 does not limit
`its scope to any particular fraud detection algorithm,
`and no algorithms are disclosed in the ' 154 patent's
`specification. Rather, the broad scope of claim 3 ex-
`tends to essentially any method of detecting credit
`card fraud based on information relating past transac-
`tions to a particular “Internet address,” even methods
`that can be performed in the human mind.
`
`
`First, step (a)—which requires “obtaining infor-
`mation about other transactions that have utilized an
`Internet address that is identified with the [ ] credit
`card transaction”—can be performed by a human who
`simply reads records of Internet credit card transac-
`tions from a preexisting database. J.A. 32, col.2
`ll.40–42. While the '154 patent's specification dis-
`cusses referencing “a database of Internet addresses,”
`'154 patent, col.3 ll.13–14, CyberSource concedes that
`claim 3 does not cover the initial creation of the da-
`tabase. Oral Arg. at 1:15–1:30, available at http://
`www. cafc. uscourts. gov/ oral- argument- recordings/
`all/ cybersource. html. Moreover, as discussed above,
`even if some physical steps are required to obtain
`information from the database (e.g., entering a query
`via a keyboard, clicking a mouse), such data-gathering
`steps cannot alone confer patentability. Grams, 888
`F.2d at 839–40.
`
`Page 8
`
`
`
`Second, a person may “construct[ ] a map of
`credit card numbers” as required by step (b) by writing
`down a list of credit card transactions made from a
`particular IP address. J.A. 32, col.2 ll.43–44. There is
`no language in claim 3 or in the '154 patent's specifi-
`cation that requires the constructed “map” to consist of
`anything more than a list of a few credit card transac-
`tions. This is readily apparent from the appellant's
`brief, in which CyberSource *1373 provides a sample
`“map” that merely consists of four listed credit card
`transactions denoted by their dates, times, cardholder
`names, card numbers, IP addresses, transaction
`amounts, and shipping addresses. See Appellant's Br.
`9.
`
`
`Finally, step (c)—which requires “utilizing the
`map of credit card numbers to determine if the credit
`card transaction is valid”—is so broadly worded that it
`encompasses literally any method for detecting fraud
`based on the gathered transaction and Internet address
`data. J.A. 32, col.2 ll.45–46. This necessarily includes
`even logical reasoning that can be performed entirely
`in the human mind. For example, a person could lit-
`erally infringe step (c) by identifying a likely instance
`of fraud based on the simple observation that numer-
`ous transactions using different credit cards, having
`different user names and billing addresses, all origi-
`nated from the same IP address. Indeed, Cyber-
`Source's CEO admitted that, before CyberSource
`created a computer implemented fraud detection sys-
`tem, “[w]e could see just by looking that more than
`half of our orders were fraudulent.” J.A. 375.
`
`
`[4][5] Thus, claim 3's steps can all be performed
`in the human mind. Such a method that can be per-
`formed by human thought alone is merely an abstract
`idea and is not patent-eligible under § 101. Methods
`which can be performed entirely in the human mind
`are unpatentable not because there is anything wrong
`with claiming mental method steps as part of a process
`containing non-mental steps,FN3 but rather because
`computational methods which can be performed en-
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`8
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`tirely in the human mind are the types of methods that
`embody the “basic tools of scientific and technologi-
`cal work” that are free to all men and reserved exclu-
`sively to none. Benson, 409 U.S. at 67, 93 S.Ct. 253.
`
`
`FN3. See In re Abele, 684 F.2d 902, 908
`(CCPA 1982) (finding a claim patentable that
`included both mental steps and physical
`steps).
`
`
`
`III
`[6][7] We turn next to claim 2 of the '154 patent,
`which recites a so-called “Beauregard claim.” A
`Beauregard claim—named after In re Beauregard, 53
`F.3d 1583 (Fed.Cir.1995)—is a claim to a computer
`readable medium (e.g., a disk, hard drive, or other data
`storage device) containing program instructions for a
`computer to perform a particular process. Claim 2, as
`amended during reexamination, reads in its entirety:
`
`
`2. A computer readable medium containing pro-
`gram instructions for detecting fraud in a credit card
`transaction between a consumer and a merchant
`over the Internet, wherein execution of the program
`instructions by one or more processors of a com-
`puter system causes the one or more processors to
`carry out the steps of:
`
`a) obtaining credit card information relating to the
`transactions from the consumer; and
`
`b) verifying the credit card information based
`upon values of plurality of parameters, in com-
`bination with information that identifies the
`consumer, and that may provide an indication
`whether the credit card transaction is fraudulent,
`
`wherein each value among the plurality of pa-
`rameters is weighted in the verifying step ac-
`cording to an importance, as determined by the
`merchant, of that value to the credit card transac-
`tion, so as to provide the merchant with a quanti-
`
`
`
`
`
`
`
`Page 9
`
`fiable indication*1374 of whether the credit card
`transaction is fraudulent,
`
`wherein execution of the program instructions by
`one or more processors of a computer system
`causes that one or more processors to carry out the
`further steps of;
`
`[a] obtaining information about other transac-
`tions that have utilized an Internet address that
`is identified with the credit card transaction;
`
`[b] constructing a map of credit card numbers
`based upon the other transactions; and
`
`[c] utilizing the map of credit card numbers to
`determine if the credit card transaction is valid.
`
`
`
`
`
`
`
`
`
`
`
`J.A. 32 ('154 Patent Reexamination Certificate),
`col.2 ll.9–37 (emphases added). While claim 2 con-
`tains somewhat redundant language, it is clear from
`the emphasized text that claim 2 recites nothing more
`than a computer readable medium containing program
`instructions for executing the method of claim 3.
`
`
`As discussed above, we found claim 3 to be un-
`patentable because it is drawn to a mental pro-
`cess—i.e., an abstract idea. The method underlying
`claim 2 is clearly the same method of fraud detection
`recited in claim 3. Nonetheless, CyberSource contends
`that claim 2 should be patentable. CyberSource's main
`argument is that coupling the unpatentable mental
`process recited in claim 3 with a manufacture or ma-
`chine renders it patent-eligible.
`
`
`CyberSource argues that claim 2 is patent-eligible
`per se because it recites a “manufacture,” rather than a
`“process,” under the statutory language of § 101.
`CyberSource contends that, by definition, a tangible,
`man-made article of manufacture such as a “computer
`readable medium containing program instructions”
`cannot possibly fall within any of the three pa-
`
`© 2014 Thomson Reuters. No Claim to Orig. US Gov. Works.
`
`9
`
`

`
`
`
`654 F.3d 1366, 99 U.S.P.Q.2d 1690
`(Cite as: 654 F.3d 1366)
`tent-eligibility exceptions the Supreme Court has
`recognized for “laws of nature, physical phenomena,
`[or] abstract ideas.” Appellant's Br. 47–48 (quoting
`Bilski, 130 S.Ct. at 3225). We disagree.
`
`
`Regardless of what statutory cate

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket