`In re Covered Business Method Review
`of:
`
`U.S. Class: 707/607
`
`Group Art Unit: 2156
`
`Confirmation No. 8474
`
`Petition filed: February 20, 2015
`
`FILED ELECTRONICALLY
`PER 37 C.F.R. § 42.6(b)(1)
`
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`)
`
`U.S. Patent No. 8,473,452
`
`Issued: June 25, 2013
`
`Inventor: N. Stephen OBER et al.
`
`Application No. 09/665,752
`
`Filed: September 20, 2000
`
`For: SYSTEM AND METHOD FOR
`ANALYZING DE-IDENTIFIED
`HEALTH CARE DATA
`
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S.P.T.O.
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`
`
`
`
`PETITION FOR POST-GRANT BUSINESS METHOD PATENT REVIEW
`UNDER 35 U.S.C. § 321 AND § 18 OF THE LEAHY-SMITH AMERICA
`INVENTS ACT FOR U.S. PATENT NO. 8,473,452
`
`
`143763.00604/22369707v.1
`
`
`
`
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`INTRODUCTION ........................................................................................ 1
`
`II. MANDATORY NOTICES .......................................................................... 1
`
`III. OVERVIEW OF THE ’452 PATENT ........................................................ 2
`
`IV. GROUNDS FOR STANDING ..................................................................... 7
`
`A. At Least One Challenged Claim is Unpatentable ................................ 7
`
`B.
`
`C.
`
`D.
`
`The ’452 Patent is Directed to a Covered Business Method................ 7
`
`The Challenged Claims Are Not Directed to a “Technological
`Invention.” .......................................................................................... 14
`
`Petitioner Has Been Sued for Infringement of the ’452 Patent
`and is Not Estopped. ........................................................................... 17
`
`V.
`
`STATEMENT OF THE PRECISE RELIEF REQUESTED FOR
`EACH CLAIM CHALLENGED .............................................................. 18
`
`VI. CLAIM CONSTRUCTION ....................................................................... 18
`
`A.
`
`B.
`
`C.
`
`Person of Ordinary Skill in the Art of the ’452 Patent ....................... 18
`
`Broadest Reasonable Interpretation ................................................... 19
`
`Support for Petitioner’s Broadest Reasonable Interpretations ........... 19
`
`VII. CLAIMS 1, 2, 4, 7-9, 11, 12 and 15 OF THE ’452 PATENT ARE
`UNPATENTABLE ..................................................................................... 21
`
`A.
`
`[Ground 1] Claims 1, 2, 4, 7-9, 11, 12 and 15 are Invalid Under
`35 U.S.C. § 101 as Being Directed to a Patent-Ineligible
`Abstract Idea. ...................................................................................... 21
`
`i.
`
`ii.
`
`The’452 Patent Claims are Directed to an Abstract Idea ........ 22
`
`The Claims of the ’452 Patent Add No Meaningful
`Limitations to the Abstract Idea Claimed ................................ 23
`
`
`143763.00604/22369707v.1
`
`i
`
`
`
`Petition for Post Grant Review
`of U.S. Patent No. 8,473,452
`The ’452 Patent Claims Fail to Pass the Machine or
`Transformation Test of Patent Eligibility ................................ 25
`
`iii.
`
`B.
`
`C.
`
`[Ground 2] Claims 1, 2, 4, 7-9, 11, 12 and 15 are Obvious
`Under 35 U.S.C. § 103 Over Pommerening in View of
`Denning82. ......................................................................................... 27
`
`[Ground 3] Claims 1, 2, 4, 7-9, 11, 12, and 15 are Obvious
`Under 35 U.S.C. § 103 Over Johansson in View of Denning82. ...... 45
`
`VIII. CONCLUSION ........................................................................................... 61
`
`
`
`
`143763.00604/22369707v.1
`
`ii
`
`
`
`
`
`
`
`Table of Authorities
`
`Page(s)
`
`CASES
`Accenture Global Svcs. GmbH v. Guidewire Software, Inc.,
`No. 2011-1486, slip op. (Fed. Cir. Sep. 5, 2013) ......................................... 22, 23
`
`Alice Corp. Pty. Ltd. v. CLS Bank Int’l,
`573 U.S. __, 134 S.Ct. 2347 (June 19, 2014) ................................................. 6, 15
`
`Apple Inc. v. Sightsound Techs., LLC,
`CBM2013-00019, slip op. (PTAB Oct. 8, 2013) .................................................. 8
`
`Bancorp Servs. L.L.C. v. Sun Life Assurance Co. of Canada,
`687 F.3d 1266 (Fed. Cir. 2012) .............................................................. 21, 22, 25
`
`Bilski v. Kappos,
`130 S.Ct. 3218 (2010) ................................................................................... 21, 25
`
`Buysafe, Inc. v. Google Inc.,
`1:11-cv-01282-LPS, Memorandum Opinion at 4 (D.Del. July 29, 2013) .......... 25
`
`CLS Bank Int’l v. Alice Corp. Pty,
`717 F.3d 1269 (Fed. Cir. May 10, 2013) .......................................... 21, 22, 23, 24
`
`CyberSource Corp. v. Retail Decisions, Inc.,
`654 F.3d 1366 (Fed. Cir. 2011) .................................................................... 25, 26
`
`Dealertrack v. Huber,
`674 F.3d 1315 (Fed. Cir. 2012) .......................................................................... 15
`
`Diamond v. Diehr,
`450 U.S. 175 (1981) ............................................................................................ 23
`
`IMS Health Inc. v. Symphony Health Solutions Corp. et al.,
`C.A. No. 13-2071-GMS (D. Del. Dec. 23, 2013) ........................................... 1, 17
`
`Int’l Sec. Exch., LLC v. Chicago Bd. Options Exch.,
`Case CBM2013-00050, slip op. 9 (PTAB Mar. 4, 2014) ..................................... 8
`
`
`143763.00604/22369707v.1
`
`iii
`
`
`
`Petition for Post Grant Review
`of U.S. Patent No. 8,473,452
`
`Mayo v. Prometheus,
`132 S.Ct. 1289 (2012) ......................................................................................... 21
`
`Par Pharmaceutical, Inc., Roxane Laboratories, Inc. and Amneal
`Pharmaceuticals, LLC v. Jazz Pharmaceuticals, Inc.,
`Case No. CBM2014-00149, slip op. at *11 (PTAB Jan. 13, 2015) ................... 12
`
`Salesforce.com, Inc. v. Virtualagility, Inc.,
`CBM2013-00024, slip op. (PTAB November 19, 2013) ..................................... 8
`
`SAP Am., Inc. v. Versata Dev. Grp., Inc.,
`No. CBM2012-00001, slip op. (P.T.A.B. Jan. 9, 2013) ........................... 7, 15, 22
`
`SiRF Tech., Inc. v. ITC,
`601 F.3d 1319 (Fed. Cir. 2010) .......................................................................... 25
`
`STATUTES
`
`35 U.S.C. § 101 .................................................................................................passim
`
`35 U.S.C. § 103 .................................................................................................passim
`
`35 U.S.C. § 321 .................................................................................................... 1, 18
`
`35 U.S.C. § 324(a) ..................................................................................................... 7
`
`OTHER AUTHORITIES
`
`37 C.F.R. § 42.300 ............................................................................................... 1, 19
`
`37 C.F.R. § 42.300(b) .............................................................................................. 19
`
`37 C.F.R. § 42.301 ............................................................................................... 7, 13
`
`37 C.F.R. § 42.302 ................................................................................................... 17
`
`77 Fed. Reg. 157 ............................................................................................ 7, 14, 15
`
`U.S. Patent No. 8,473,452 .................................................................................passim
`
`143763.00604/22369707v.1
`
`iv
`
`
`
`
`
`Petition Exhibit 1001:
`
`U.S. Patent No. 8,473,452 (“the ’452 Patent”)
`
`LIST OF EXHIBITS
`
`
`
`Petition Exhibit 1002:
`
`Declaration of Paul Clark
`
`
`
`Petition Exhibit 1003:
`
`Cryptography and Data Security by Dorothy
`
`Elizabeth Robling Denning, Addison-Wesley
`
`Publishing Company, Inc. (1982) (“Denning82”)
`
`
`
`Petition Exhibit 1004:
`
`“Pseudonyms for Cancer Registries” by
`
`K. Pommerening, M. Miller, I. Schmidtmann, and J.
`
`Michaelis, Pseudonyms for Cancer Registries,
`
`Methods of Information in Medicine (1996)
`
`(“Pommerening”)
`
`
`
`Petition Exhibit 1005:
`
`Jan Johansson, U.S. Patent No. 5,606,610 (February
`
`25, 1997) (“Johansson”)
`
`
`
`Petition Exhibit 1006:
`
`Claim Construction Order
`
`
`143763.00604/22369707v.1
`
`v
`
`
`
`
`
`I.
`
`INTRODUCTION
`
`Pursuant to 35 U.S.C. § 321, Section 18 of the Leahy-Smith America
`
`Invents Act (“AIA)” and 37 C.F.R. § 42.300 et seq., the undersigned Petitioner
`
`respectfully requests a covered business method review of claims 1-2, 4, 7-9, 11,
`
`12 and 15 (“Challenged Claims”) of U.S. Patent No. 8,473,452 (“the ’452 patent,”
`
`Ex. 1001), which issued on June 25, 2013 to N. Stephen Ober et al. and is currently
`
`assigned to IMS Health Incorporated (“IMS” or “Patent Owner”). Petitioner
`
`demonstrates through this Petition that the Challenged Claims are patent ineligible
`
`under 35 U.S.C. § 101 and are unpatentable as obvious under 35 U.S.C. § 103.
`
`II. MANDATORY NOTICES
`Real Party-in-Interest: Symphony Health Solutions Corporation
`
`Related Matters: IMS Health Incorporated v. Symphony Health Solutions
`
`Corp. et al, Civil Action No. 13:2071-GMS (D. Del.). Petitioner has also filed a
`
`CBM petition for the other patents asserted in the underlying litigation. See U.S.
`
`Patent Nos. 6,397,224 (Case No. CBM2015-00070) and 7,577,578 (Case No.
`
`CBM2014-00188).
`
`
`143763.00604/22369707v.1
`
`
`
`
`
`
`
`
`
`Lead and Back-Up Counsel and Service Information:
`
`Lead Counsel
`
`Bruce D. George
`USPTO Reg. No. 43,631
`Blank Rome LLP
`One Logan Square
`130 North 18th Street
`Philadelphia, PA 19103-6998
`Telephone: 215-569-5500
`Fax: 215-569-5555
`George@blankrome.com
`
`
`
`Back-up Counsel
`
`Steven M. Johnston
`USPTO Reg. No. 61, 268
`Blank Rome LLP
`One Logan Square
`130 North 18th Street
`Philadelphia, PA 19103-6998
`Telephone: 215-569-5500
`Fax: 215-569-5555
`sjohnston@blankrome.com
`
`Peter K. Zacharias
`USPTO Reg. No. 62,204
`Blank Rome LLP
`One Logan Square
`130 North 18th Street
`Philadelphia, PA 19103-6998
`Telephone: 215-569-5500
`Fax: 215-569-5555
`Zacharias@blankrome.com
`
`
`III. OVERVIEW OF THE ’452 PATENT
`The ’452 patent issued from U.S. Patent Application No. 09/665,752, which
`
`was filed on September 20, 2000. The provisional application that eventually
`
`matured into the ’452 patent was filed on September 20, 1999, and the patent
`
`issued on June 25, 2013. As used herein, the priority date of the ’452 Patent
`
`(“Priority Date”) is September 20, 1999. The ’452 patent is entitled “System and
`
`Method for Analyzing De-Identified Health Care Data,” and is directed to de-
`
`
`143763.00604/22369707v.1
`
`2
`
`
`
`
`
`identifying health care records in order to comply with privacy laws that prohibit
`
`transmission of personal information contained within health care claims data.
`
`Generally speaking, the ’452 patent claims a system and method of de-
`
`identifying patient records in a database before transmitting them for external
`
`analysis. The claimed system and method includes the steps of extracting
`
`personally identifying information from a subset of data fields in the database and
`
`encrypting the extracted information to generate a single encrypted patient
`
`identifier that uniquely and anonymously identifies a particular patient. The
`
`encrypted unique patent identifier (“EUPI”) replaces all of the identifying
`
`information in the record for that particular patient, and is used to anonymously
`
`identify that patient so that future transactions for that patient can be linked
`
`together and/or identified as an individual patient, albeit one whose actual identity
`
`is unknown.
`
`The patent describes a simultaneous need to comply with regulations
`
`requiring security measures for health information, while also being able to
`
`associate multiple records related to a single individual “to generate valuable
`
`research and market data based upon the unique attributes for specific individuals,
`
`such as age, gender, and geographic distribution.” ’452 Patent (Ex. 1001) at 1:53-
`
`55. The patent goes on to describe the need for a system having the ability “to
`
`
`143763.00604/22369707v.1
`
`3
`
`
`
`
`
`efficiently gather information from the claims databases to allow research and
`
`analysis of the attributes that affect the pharmaceutical industry.” Id. at 1:56-59.
`
`The patent purports to address these requirements through an allegedly novel
`
`system and method for creating a unique alias associated with an individual
`
`identified in a health care database, which allows for the aggregation of segregated
`
`data for marketing research. Id. at 1:66-2:2. The patent claims a health care
`
`database in which at least one patient record having a plurality of identification
`
`fields is stored, wherein at least one subset of the identification fields uniquely
`
`identifies the patient. Id. at 13:10-18. As claimed, the health care database is in
`
`communication with one or more processors which are themselves in
`
`communication with a second database, wherein the processors execute
`
`instructions to: (i) select a patient record from the health care database; (ii) extract
`
`alphanumeric information that uniquely identifies the patient from a subset of the
`
`identification fields contained in the database; (iii) generate an encrypted unique
`
`patient identifier (EUPI) by encrypting the extracted alphanumeric information;
`
`and (iv) generate a de-identified patient record containing at least one health care
`
`field from the patient record and the encrypted unique patient identifier. Id. at
`
`13:19-37. Once the de-identified patient record has been generated, it is then
`
`transmitted to a second database. Id. at 13:38-39.
`
`
`143763.00604/22369707v.1
`
`4
`
`
`
`
`
`The ’452 patent explains that pharmaceutical claims are processed on large
`
`computer systems which receive claims data for patients who have been prescribed
`
`one or more medications and have filed claims with insurance companies (or
`
`government entities) in order to have the claim paid by the company or entity. Id.
`
`at 22-27. Multiple dependent claims are directed to a system in which the health
`
`care field contained in the de-identified patient record comprises pharmaceutical
`
`claims data, medical claims data, or hospital claims data (i.e., claims for receiving
`
`payment or reimbursement). Additional dependent claims are directed to
`
`generating a report based on the data included in the identified records (i.e., claims
`
`data). According to the specification, the report displayed by the system may
`
`contain several attributes, and can “therefore be used in a number of ways to help
`
`make business decisions, such as monitoring new drug launches and marketing
`
`campaigns, enhanced sales force targeting, and micro-marketing in select
`
`geographic areas or to select customers. Furthermore, the system can be used for
`
`forecasting and development of pharmaceutical marketing strategy including
`
`indication-specific product positioning, early warning market share shifts, clinical
`
`trial site selection, investigator recruiting, and accurate intelligence on market size
`
`and demand.” Id. at 3:25-45.
`
`Throughout, the claims use broad computer-based terminology to recite
`
`various elements such as “a health care database,” “processors in communication
`
`
`143763.00604/22369707v.1
`
`5
`
`
`
`
`
`with the at least one health care database and a second database,” “extracting
`
`alphanumeric information from a plurality of the identification fields in the patient
`
`record,” and “encrypting the extracted alphanumeric information uniquely
`
`identifying the patient.” As set forth herein, however, the ‘452 Patent fails to claim
`
`anything but conventional, well-known computer elements, and otherwise fails to
`
`limit the ‘452 Patent claims beyond the abstract notion of encrypting patient
`
`information contained in a database and transmitting the de-identified patient
`
`record to a second database. Additionally, several of the claims are directed to “a
`
`non-transitory computer-readable medium encoded with instructions that, when
`
`executed by one or more processors, cause the one or more processors to perform
`
`operations comprising….” Claims of this type, so-called Beauregard claims1
`
`, have
`
`come under increased scrutiny of late, and as recently explained by the Supreme
`
`Court, computer system and/or computer-readable medium claims that “add
`
`nothing of substance to the underlying abstract idea … are patent ineligible under §
`
`101” and therefore rise or fall with the underlying system and method claims.
`
`Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 573 U.S. __, 134 S.Ct. 2347, 2360 (June
`
`19, 2014). Even if the claims of the ’452 Patent were directed to patentable subject
`
`matter, which they are not, under their broadest reasonable construction
`
`
`1 See In re Beauregard, 53 F.3d 1583, 35 U.S.P.Q.2d (BNA) 1383 (Fed. Cir. 1995).
`
`
`143763.00604/22369707v.1
`
`6
`
`
`
`
`
`appropriate here, the claims read upon any method of encrypting patient
`
`information to generate a unique patient alias, generating a de-identified patient
`
`record which contains the unique alias and at least one health care field associated
`
`with the unique alias, and transmitting that de-identified patient record to a second
`
`database.
`
`IV. GROUNDS FOR STANDING
`A. At Least One Challenged Claim is Unpatentable
`As further detailed below, claims 1, 2, 4, 7-9, 11, 12, and 15 of the ’452
`
`patent (“the Challenged Claims”) are invalid under 35 U.S.C. §§ 101 and 103.
`
`Thus, for the reasons set forth below, it is “more likely than not that at least one of
`
`the claims of the ’452 patent is unpatentable.” 35 U.S.C. § 324(a).
`
`The ’452 Patent is Directed to a Covered Business Method.
`
`B.
`The ’452 Patent is a “covered business method patent” as defined under § 18
`
`of the AIA and 37 C.F.R. § 42.301. Section 18(d)(1) of the AIA identifies a
`
`covered business method patent as “a patent that claims a method or corresponding
`
`apparatus for performing data processing or other operations used in the practice,
`
`administration, or management of a financial product or service.” See also 37
`
`C.F.R. § 42.301(a) (reciting similar language). The USPTO has indicated that it
`
`broadly defines the term “covered business method patent” to encompass patents
`
`claiming activities that are outside the financial services industry, but still
`
`fundamentally financial in nature. See 77 Fed. Reg. 157 at 48734-35; see also SAP
`7
`
`
`143763.00604/22369707v.1
`
`
`
`
`
`Am., Inc. v. Versata Dev. Grp., Inc., No. CBM2012-00001, slip op. at *23 (Paper
`
`No. 36) (P.T.A.B. Jan. 9, 2013). The legislative history supports this view that
`
`“financial product or service” is not limited to the financial services industry.
`
`77 Fed. Reg. 157 at 48,735 (Response to Comment 1: “[T]he legislative history
`
`explains that the definition of covered business method patent was drafted to
`
`encompass patents ‘claiming activities that are financial in nature, incidental to a
`
`financial activity or complementary to a financial activity.’”) (internal citations
`
`omitted).
`
`The focus of the financial product or service inquiry is on the claims. See
`
`Int’l Sec. Exch., LLC v. Chicago Bd. Options Exch., Case CBM2013-00050, slip
`
`op. 9 (PTAB Mar. 4, 2014) (Paper 16)) (“For purposes of determining whether a
`
`patent is eligible for a covered business method patent review, the focus is on the
`
`claims.”). However, a patent needs only one claim directed to a covered business
`
`method in order to be eligible for CBM review. Id. As the Board has observed,
`
`“an agreement between two parties stipulating movements of money or other
`
`consideration now or in the future” represents the “type of activities that are
`
`‘complementary to a financial’ and ‘relate to monetary matters.’” Apple Inc. v.
`
`Sightsound Techs., LLC, CBM2013-00019, slip op. at *12 (PTAB Oct. 8, 2013)
`
`(Paper 17); see also Salesforce.com, Inc. v. Virtualagility, Inc., CBM2013-00024,
`
`slip op. at *6-15 (PTAB November 19, 2013) (Paper 16) (holding that “applying
`
`
`143763.00604/22369707v.1
`
`8
`
`
`
`
`
`the invention as a financial product or service for use by an organization to
`
`improve the financial health of the organization” constitutes a financial product or
`
`service under the AIA, particularly as it relates to: (i) the cost of or investment in a
`
`particular financial goal or initiative, (ii) the economic return anticipated for
`
`achievement of the particular goal or initiative, (iii) the ratio of return on
`
`investment, or (iv) the potential profit or loss of a scalable process.).
`
`The ‘452 Patent claims are directed to systems and methods for de-
`
`identifying health care data records in a database and transmitting the de-identified
`
`patient record to a second database. See Ex. 1001 at 13:10-39.
`
`Claim 1 is representative:
`
`1. A system for de-identifying health care data comprising:
`
`at least one health care database, the at least one health care database
`including at least one patient record, each patient record including a
`plurality of identification fields associated with a patient and at least
`one health care field, wherein at least one subset of the identification
`fields associated with a patient uniquely identifies the patient; and
`
`one or more processors in communication with the at least one health
`care database and a second database, wherein the one or more
`processors execute instructions that cause the one or more processors
`to:
`
`select a patient record from the at least one health care database,
`
`extract alphanumeric information from a plurality of the identification
`fields included in the patient record, the extracted alphanumeric
`information uniquely identifying the patient;
`
`generate an encrypted unique patient identifier by encrypting the
`extracted alphanumeric information,
`
`
`143763.00604/22369707v.1
`
`9
`
`
`
`
`
`generate a de-identified patient record, wherein the de-identified
`patient record includes the at least one health care field that is
`included in the selected patient record and the encrypted unique
`patient identifier, and wherein the de-identified patient record does not
`include any information that identifies the patient other than the
`encrypted unique patient identifier, and
`
`transmit the de-identified patient record to the second database.
`
`All of the claims recite the limitation of “generating an encrypted unique
`
`patient identifier” (or a similar variation thereof) by encrypting alphanumeric
`
`information extracted from fields uniquely identifying a patient record. Once the
`
`encrypted unique patient identifier (“EUPI”) has been generated, a de-identified
`
`patient record containing the EUPI and at least one health care field associated
`
`with that EUPI is generated and transmitted to a second database. The
`
`specification also makes clear that the unique alias (i.e., the claimed EUPI)
`
`associated with an individual identified in a health care database “allows for the
`
`aggregation of segregated data for marketing research.” The de-identified patient
`
`record is rooted in that patient’s financial history, and it is precisely this history
`
`that renders the de-identified records (alone or in the aggregate) so valuable.2
`
`
`
`
`2 According to one estimate, the health care analytics industry is expected to
`
`become a $20B industry by 2020. See
`
`http://www.healthdatamanagement.com/news/Healthcare-Analytics-Market-to-
`
`
`143763.00604/22369707v.1
`
`10
`
`
`
`
`
`Two of the Challenged Claims recite that the at least one health care field
`
`included in the de-identified health care data record “comprises pharmaceutical
`
`claims data, medical claims data, or hospital claims data,” all of which are clearly
`
`financial in nature in that they reflect a financial transaction wherein payment is
`
`exchanged for a medical service, hospital stay, or prescription medication.
`
`Moreover, claim 9 of the ‘452 Patent claims an additional method step of
`
`“identifying one or more records stored in the second database that include the
`
`unique patient identifier; and generating a report based on data included in the
`
`identified records.” In other words, the ’452 Patent claims a method of preparing a
`
`detailed financial history of an anonymized patient that reflects, for example, how
`
`much an anonymized patient spent on a particular medical treatment or
`
`prescription medication, where and when that patient’s money was spent, and how
`
`frequently the patient returned for follow-up treatment and/or to refill a
`
`prescription. This report claimed in the ’452 Patent is fundamentally financial in
`
`nature, and is a quintessential application of the claimed invention “to improve the
`
`financial health of an organization.”
`
`
`Reach-More-Than-20-Billion-Dollars-by-2020-48850-1.html (last accessed
`
`February 20, 2015).
`
`
`143763.00604/22369707v.1
`
`11
`
`
`
`
`
`As the specification makes clear, the underlying financial nature of the
`
`claimed report is used “make business decisions, such as monitoring new drug
`
`launches and marketing campaigns, enhanced sales force targeting, and micro-
`
`marketing in select geographic areas or to select customers. Furthermore, the
`
`system can be used for forecasting and development of pharmaceutical marketing
`
`strategy including indication-specific product positioning, early warning market
`
`share shifts, clinical trial site selection, investigator recruiting, and accurate
`
`intelligence on market size and demand.” ’452 Patent (Ex. 1001) at 3:25-45.
`
`The PTAB’s analysis of what constitutes a covered business method in Par
`
`Pharmaceutical, Inc., Roxane Laboratories, Inc. and Amneal Pharmaceuticals,
`
`LLC v. Jazz Pharmaceuticals, Inc. is instructive in this regard. In Par
`
`Pharmaceutical, the Board analyzed whether a claim directed to a method for
`
`controlling access to a prescription drug to guard against potential abuse and
`
`unauthorized diversion was eligible for CBM review. See Case No. CBM2014-
`
`00149, slip op. at *11 (PTAB Jan. 13, 2015) (Paper 12). In deciding that the claim
`
`was not eligible for review, the Board explained that the claims did “not recite or
`
`require an activity involving the movement of money or extension of credit in
`
`connection with the sale of a prescription drug.” In this case, multiple dependent
`
`claims require that one of the health care fields be “pharmaceutical claims data,
`
`medical claims data, or hospital claims data,” the precise sort of financial
`
`
`143763.00604/22369707v.1
`
`12
`
`
`
`
`
`transaction the Board found lacking in Par Pharmaceutical. Moreover, the
`
`aggregated, anonymized patient data described in the ’452 Patent is a “product or
`
`service particular to or characteristic of financial institutions such as banks,
`
`insurance companies, and investment houses.” Id. at 12-13 (identifying exemplary
`
`CBM claim language as requiring or reciting: (i) sale of a prescription drug; (ii)
`
`processing of payments, benefits, or insurance claims related to the sale of a
`
`prescription drug; (iii) a method of insuring a patient or determining the cost of
`
`insurance; (iv) a method of determining the cost of prescription benefits; (v) a
`
`method of facilitating payment of health care benefits; or (vi) the extension of
`
`credit for the purchase of a prescription drug.).
`
`Several of the Challenged Claims contemplate the exact financial activities
`
`described in Par Pharmaceutical. At least one claim is directed to a financial
`
`report that is, fundamentally, a financial product. Furthermore, the analytics (i.e.,
`
`identifying multiple health care records associated with a unique patient identifier
`
`and aggregating claims data) used to generate that report are services being
`
`performed to extract highly valuable financial information from the anonymized
`
`records. By any measure, the claims are directed to a financial product and/or
`
`service that derives its value from the financial histories of individual, anonymized
`
`patients on which it is based. See also Ex. 1002, Clark Decl. ¶¶ 19-25.
`
`
`143763.00604/22369707v.1
`
`13
`
`
`
`
`
`C. The Challenged Claims Are Not Directed to a “Technological
`Invention.”
`
`A “covered business method patent” under AIA § 18 does not include
`
`patents for “technological inventions.” AIA § 18(d)(1). A patent claims a
`
`“technological invention” if, and only if, “the claimed subject matter as a whole
`
`recites a technological feature that is novel and unobvious over the prior art; and
`
`solves a technical problem using a technical solution.” AIA § 18(d)(2); 37 C.F.R.
`
`§ 42.301(b). The following claim drafting techniques typically do not render a
`
`patent a “technological invention”:
`
`(a) Mere recitation of known technologies, such as computer
`hardware, communication on computer networks, software, memory,
`computer readable storage medium, scanners, display devices or
`databases, or specialized machines, such as an ATM or point of sale
`device.
`(b) Reciting the use of known prior art technology to
`accomplish a process or method, even if that process or method is
`novel and non-obvious.
`(c) Combining prior art structures to achieve the normal,
`expected, or predictable result of that combination.
`
`Office Patent Trial Practice Guide, 77 Fed. Reg. 157 at 48756, 48763-48764 (Aug.
`
`14, 2012).
`
`Here, the Challenged Claims recite no new technological features, nor do
`
`they solve a technical problem with a technical solution. Claim 1 recites a “health
`
`
`143763.00604/22369707v.1
`
`14
`
`
`
`
`
`care database” in communication with a second database wherein identifying
`
`elements from data records in the database are de-identified prior to transmission
`
`to the second database. Ex. 1001 at claim 1; id. at 1:65 – 2:2 (“The present
`
`invention is directed to a system and method for creating a unique alias associated
`
`with an individual identified in a health care database, that allows the aggregation
`
`of segregated data for marketing research.”). Even if the specific method claimed
`
`were novel and nonobvious (it is not), such generic “computer-implement[ation]”
`
`of that method is not “technological” for purposes of CBM review because general
`
`purpose computers, databases, database records management, and cryptographic
`
`mechanisms for encrypting data fields within a database (claim 1) were well-
`
`known many years before the ’452 patent’s priority date of September 20, 1999.
`
`See 77 Fed. Reg. 157 at 48756, 48763-48764 (Aug. 14, 2012); see also Alice v.
`
`CLS Bank, 134 S.Ct. at 2357-59; Ex. 1002, Clark Decl. ¶¶ 19-25.
`
`The claimed “encryption” technique is also not a technological invention.
`
`The Challenged Claims do not limit the type of “encryption,” and the specification
`
`makes clear that the encryption takes place on a general-purpose computer. Id. at
`
`¶¶ 26-31. Furthermore, the term encrypted/encrypting recited in each Challenged
`
`Claim is not defined or described in any meaningful detail in the specification, and
`
`several commercial databases with facilities for implementing the claimed de-
`
`
`143763.00604/22369707v.1
`
`15
`
`
`
`
`
`identification features were widely known and available long before September
`
`1999. Id. at ¶¶ 30-31.
`
`Thus, whether taken alone or in combination, the features of the ’452 patent
`
`claims recite only generic, conventional technologies for linking data records. See
`
`SAP, CBM2012-00001, slip op. at *28 (no technological invention where “no
`
`specific, unconventional software, computer equipment, tools or processing
`
`capabilities are required.”) (citing Dealertrack v. Huber, 674 F.3d 1315, 1333
`
`(Fed. Cir. 2012)). The claims’ lack of novelty and non-obviousness are confirmed
`
`in view of the prior art identified below.
`
`The ’452 patent claims also do not solve any technical problems using a
`
`technical solution. The ’452 patent identifies its problem to be solved as
`
`compliance with regulations governing the transmission of personal health
`
`information while still efficiently gathering information from various health care
`
`databases to facilitate research and analysis of the attributes of health care records
`
`that affect the pharmaceutical industry. See Ex. 1001 at 1:44-60. However, this
`
`increased focus on maintaining the privacy of personal health information is not a
`
`technological problem capable of being solved, for example, with improved
`
`c