ALICE - ONE YEAR LATER
LES - Silicon Valley Chapter July 22, 2015
Panelists: Michael Zachary Matt Wade John Cabeca Sandy Godsey Ivan Chaperot
1
ALICE - ONE YEAR LATER LES - Silicon Valley Chapter July 22, 2015 - - PowerPoint PPT Presentation
ALICE - ONE YEAR LATER LES - Silicon Valley Chapter July 22, 2015 Panelists: Michael Zachary Matt Wade John Cabeca Sandy Godsey Ivan Chaperot 1 398 DSAWD 2 Introduction CLS Bank v. Alice (U.S. Supreme Court 2014) Two Step Test:
LES - Silicon Valley Chapter July 22, 2015
Panelists: Michael Zachary Matt Wade John Cabeca Sandy Godsey Ivan Chaperot
1
2
abstract idea
individually and as an ordered combination— transform the nature of the claim into a patent- eligible application of the abstract idea
sufficient to ensure that the claim amounts to “significantly more” than the abstract idea itself
3
4
5
6
7
8
9
758 F.3d 1344 (Fed. Cir. 2014) (Invalid)
2014) (Invalid)
(Invalid)
(Invalid)
2014) (Valid)
NA, 776 F.3d 1343 (Fed. Cir. 2014) (Invalid)
2015 WL 3622181 (Fed. Cir. June 11, 2015) (Invalid)
2015 WL 3852975 (Fed. Cir. June 23, 2015) (Invalid)
10
DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245 (Fed. Cir. 2014)
transmit to the web browser a second web page that displays: (A) information associated with the commerce object associated with the link that has been activated, and (B) the plurality of visually perceptible elements visually corresponding to the source page.”
11
formula, or a long-standing commercial practice.
“abstract idea”
12
in order to overcome a problem specifically arising in the realm of computer networks”.
retaining website visitors that, if adhering to the routine, conventional functioning of Internet hyperlink protocol, would be instantly transported away from a host’s website after “clicking” on an advertisement and activating a hyperlink.
manipulated to yield a desired result – a result that overrides the routine and conventional sequence of events ordinarily triggered by the click of a hyperlink.
13
14
1) S 1) Subject-M bject-Matter tter Eligibility ligibility Statutory categories of invention from 35 U.S.C. § 101 (process, machine, manufacture, or composition of matter). 2) J 2) Judicial E dicial Exceptions ceptions A) Laws of nature, natural phenomena, and abstract ideas. B) Amount to significantly more than the judicial exception? 1) T 1) Technical chnical Character Character The term “invention” in Art. 52(1) EPC interpreted as implying a requirement of technical character. “Technical solution to a technical problem”. 2) E 2) Excluded cluded Subject bject Matters tters
theories […] presentations of information.
requires:
claims, not just claiming use of the internet or computer or computer network in a generic way
in the functioning of the computer or some technological area, or must override the routine, conventional sequence
15
16
because it usually means that there is nothing inventive about the claims.
CV–655, 2014 WL 4364848 (E.D. Tex. Sept. 3, 2014)
where any inventive concepts will be found in the abstract idea context) will almost always result in invalidation.
generic hardware as these often times may only serve to underscore the generic nature of the hardware and the function it performs.
17
the purpose of the claims.
abstract ideas merely by comparing them to the claims at issue in Alice and Bilski.
art and evaluate the remaining elements for abstractness.
18
transformation test
1703-LPS, 2015 WL 1927696 (D. Del. Apr. 28, 2015)
an invention may “preempt” the field of the abstract idea, since such an inquiry is inherent in the second step of the Alice test
19
“rooted in computer technology” rationale of DDR
itself or effect an improvement in any other technology or technical field” or
events in order to cause some deviation from a computer or network operating in its normal, expected manner.”
20
2014)
in accordance with IRA codes as patent eligible subject matter.
standing steps in the process of error correction”.
method of error correction, step one looks only to the general purpose of the claims.
21
Cla Claim A method comprising: A method comprising: receiving receiving a collection a collection of message
bits ha having ving a first a first sequence in sequence in a source data a source data strea stream; generating generating a sequence a sequence of parity
bits, wherein each wherein each parity bit parity bit “x “xj” in ” in the the sequence is sequence is in in accordance accordance with with the formula the formula xj=xj-1+∑i=1 xj=xj-1+∑i=1λ v(j-1) v(j-1) λ+i, +i, where where “x “xj−1
j−1”
” is is the the value of value of a parity a parity bit “j−1,” bit “j−1,” and and `` `` ∑i=1a ∑i=1a v(j-1) v(j-1) a+1” a+1” is is the the value value of a
m of “a”
randomly chos chosen irre irregular gular re repe peats ats of the
message ge bits; and bits; and making the sequence making the sequence of parity
bits avai availa lable f ble for r tra transmi smissi ssion
a tra transmi smissi ssion
data stream. data stream. Court’s Analysis Court’s Analysis The claims The claims recited the formula recited the formula of
generating a parity a parity bit by bit by accumulating accumulating two values: the value two values: the value of
the previous previous parity parity bit and bit and the sum the sum
a number of number of randomly chosen irre randomly chosen irregular repeats of gular repeats of message message bits. (Pg.
994) 994) This formula This formula was the was the determin determinative ative fe feature ature, as , as the the othe
r limitations limitations in the claim in the claim we were consi re considered ered generi generic. c. The court The court held held that the that the form formula ula constituted an inventive constituted an inventive concept that concept that sufficiently sufficiently limited limited the claim’s the claim’s preemptive preemptive effect. The
irregular repetit irregular repetition
message bits and ssage bits and the use the use of
a prior prior parity parity bit for bit for calculating a subsequent parity calculating a subsequent parity bit bit we were re inventive inventive concepts that yielded concepts that yielded significant benefits, significant benefits, namely, namely, balancing balancing the goals of the goals of efficiency efficiency and and accuracy accuracy in error correction. in error correction. (Pg. 996) (Pg. 996) Although the Although the determinative determinative limita limitations were tions were mathematical, mathematical, they they were narrowly def were narrowly defined ned and and ti tied ed to to a a sp specific ecific error correction process. error correction process. The The limitations limitations were were also not necessary also not necessary or obvious
tools for achieving for achieving error error correction, correction, and and greatly limited the sc greatly limited the scope of
the claims, leaving leaving untouched untouched many many other types
(Pg. 996) 996)
22
7012391 (C.D. Cal. Nov. 12, 2014)
game.
23
“transmitting the total elapsed time to a compensation system” and “calculating an amount of compensation for the particular player based on the total elapsed time and storing the calculated compensation in at least one
to say that claim 1 is directed to “the abstract concept
computer automation of a player rewards system within a poker room” when it includes key steps that are not related to the compensation system recited in the claim
24
Claim Claim 1.
ethod for
monitoring a physical hysical casino asino poker
game comprising: comprising: a.
receivin iving a po poker ker player check ck-in input ut con contai aining ning player player identifi identification cation info information rmation and nd player player poker poker game ame type ype preference; reference; b.
identifying a particular particular player player in in a playe layer database atabase from rom the he player player check-in check-in input; input; c.
determining the he seating seating av availa ailability lity fo for said aid particular articular player’s layer’s poker
me type pe preference preference from from a table able availability availability database database including including game ame types ypes in in real real time; time; d.
dding said said particular rticular player player to a waitlist aitlist for
said poker poker game type ype pre refe ference rence if no matc matching hing table table for
said game game type type is is currently rrently available; available; e.
displaying ind indicia cia identify dentifying ng said id partic particular ular pla player on
ublic waitlist aitlist display, isplay, said aid public public display display including ncluding the the display isplay of
information ation comprising
east two two diffe ifferent rent poker poker ga game me types types and nd waiting waiting players layers for for each ach game type and nd where wherein said aid public ublic display isplay is is suitable suitable for for view iewing ng by by a multiplicity tiplicity of players layers or
prospect
ive pla laye yers rs thr throughout ughout the the poker poker room;
f.
selecting a table able fo for said aid particular articular waiting aiting player ayer matching matching said said wai waiting ing player’s layer’s selected selected game game type type when when it it is is available available and nd then then assigning assigning said aid player layer to that hat available vailable table; table; g. g. rece receiving iving check-out heck-out input regarding egarding said said particular particular player player containi containing ng player identification identification information; information; h.
identifying the he particul particular ar pl player ayer from from the the player yer check- heck-out ut input input inform nformation; tion; i.
removing the the player layer from rom the he game game and and from rom the he table; table; j.
updatin ting the the table le av avail ailability bility to to reflec reflect that hat a seat seat for
the partic articular lar poker
me type type at said table i e is c s currently available;
ascertaining the the total
elapsed sed time time between between rece receiving ing the he che check-in k-in inp input and nd the the check- heck-
nput of
the player; yer; l.
transmitting the the total
elapsed time time to to a compensation
ystem; and and m.
lculati ulating an amo mount of compensa
ion for the particular articular player layer based ased on
the total al elapsed elapsed ti time me and storing toring the the calcu alculated lated compe
nsation ation in at least east one
system databas tabase or
the the player layer database. atabase.
Court’s Analysis Court’s Analysis Defendants Defendants assert that assert that the steps that coul the steps that could d be omitted be omitted while while leaving leaving intact a player intact a player rewa reward system i rd system include clude at lea least steps c, t steps c, d, d, e, and and f, which cove f, which cover d r dete termining s rmining seating ating availability, adding availability, adding players players to to waitlists, waitlists, putting player identifying putting player identifying information information on
a public waitlist public waitlist displa display, y, and and as assigning gning a playe a player r to to a table a table. (Pg. 6) (Pg. 6) And And even a even assumi ssuming tha ng that those elements those elements should should be be ignored ignored in the in the first step, as first step, as to to the the second second Ali Alice/Ma e/Mayo step, yo step, a aski king ng whether there whether there is “ “signi nifica cantly ntly more” more” in the the cla claims, ms, Defendants have Defendants have not shown not shown wh why y these other these other elements elements are i e insuf suffici cient.
Put differently, rently,
implement many different many different player player re reward ward systems that do systems that do not not infringe infringe the the
6) The q The questi estion
the abstra stract ct idea ea context context is whether there a whether there are other wa e other ways ys to to use use the the abstract abstract idea in idea in the the same field,” which ca same field,” which can n show that show that the preemption the preemption concern concern is not is not
Defendants have ndants have not shown how not shown how thes these claims e claims implicate implicate “the basic “the basic underlying concern underlying concern that these patents tie that these patents tie up up too much too much future use” future use” of
the abstract idea
player reward system. reward system. (Pg. (Pg. 6) 6) De Defe fendants ndants argue argue that ce that certain rtain prior prior art art show
s that the abstract the abstract concept of “a concept of “a customer customer loyalty loyalty program d program dire recte cted to pok to poker playe r players rs ... ... was was practice practiced prior prior to to the the d date te of
the inve invention.... ntion....” ” De Defe fend ndants ants re rely ly on multiple
combinations of re
fere rence nces to to mak make that that argume argument, nt, and and as as couche couched d by De by Defe fendants ndants, , those those combinations combinations seem more like an seem more like an
argument under 35 U.S.C. § 35 U.S.C. § 103 th 103 than an a a patent eligibility patent eligibility analysis under analysis under 35 U.S.C. § 35 U.S.C. § 101 101
25
KNM, 2015 WL 661174 (E.D. Tex. Feb. 13, 2015)
paying for and downloading digital content.
conditioning and controlling access to data based on payment, which is a fundamental building block of the economy, especially in the digital age.
26
Claim Claim A A method method of contr
lling acces access to content to content data data on a
data car carrier er, the data , the data car carrier er compr comprising ng non-volatile data non-volatile data memory memory storing
content memo memory and ry and non-vol non-volatile paramet parameter r memory memory st storing
use st use stat atus dat us data an and d use rul use rules, s, the e met method
comprising: : receiving a receiving a data data access request access request fr from a
user er for at for at leas least t one content
item of the content data data stor
ed in the non-volatile non-volatile data data memor memory; y; reading the u ading the use e statu atus data data and and use e rules les fr from the
parameter meter memor memory that that per pertain to u ain to use e of the
at leas at least one t one reques requested ted content content item; item; evalu evaluating ting the u the use e statu atus data data using ing the the use e rules les to deter to determine whether ine whether acces access to the at to the at leas least t one
reques requested ted content item content item stored in
the content memory content memory is is permitted; permitted; and and dis displaying to the u laying to the user er whether whether acces access is is per permitte itted d for each for each of the at
least t one reques
ted content content item s item stored in the
non-volatile data data memory. memory. Court’s Analysis Court’s Analysis In Ultr Ultramer amercial cial II, the the cou court char t character acterized d the the li limitations mitations as as merely merely dis distri ribu buting media ting media over
the Internet ternet with with the condition the condition of viewing
an advert advertis isement and ement and recording events recording events in in an an activity log. activity log. In Content Extr Content Extraction, the claims action, the claims simply r mply recited cited the l e long-pract ng-practiced abst iced abstra ract ct idea of collecting idea of collecting data, recognizing data, recognizing certain certain data data, , and s and storing
that data data with already with already well-kn well-known
methods. . The The assert sserted cl ed claims aims here here recit recite specific specific ways of ways of us using ing distinct distinct memories memories, data , data types types, and us and use e rules les that that amou amount nt to s to signif gnificantly mor icantly more than than th the underl e underlying ying abst abstract ract id
in some me claims claims the language is the language is functional functional and s and somew mewhat hat generic, generic, the claims contain signific the claims contain significant ant limitations limitations on the
inventions. . (Pg. 8) (Pg. 8) As As in in DDR DDR Holdings Holdings, , the patents the patents her here do not s do not simply apply mply apply a a known
busines ness pr practice actice fr from the
pre pre-In Intern rnet worl rld to co comput uters s or the In Intern rnet. . “The he cl claimed so solution is is nece cessa ssaril rily ro rooted in in computer computer technology technology in in order to overcome
a problem specific problem specifically ally arising arising in in the the realm of realm of computer networks.” computer networks.” (Pg. (Pg. 8) 8) Digital Rights Digital Rights Management is Management is a a technology technology that that was was developed developed after wides after widespread us read use e of the
Inter ternet.
Digital content content became eas became easy to to repr produ
e for for anyone anyone with acces with access to to a compu a computer er. . Piracy cy
became wides widespread thr ad through means h means u unknown to the
pre-I e-Inter ternet et wor world.
The pa patents s cl claim methods a s and syst systems s design signed to pre prevent such such easy a sy and un unauthorize ized reproduction and reproduction and acces access while while allo allowing wing the acces the access to to be near be nearly ly ins instantaneou antaneous and the and the stor
age to to be permanent. (Pg. be permanent. (Pg. 9) 9) The patents The patents als also addr addres ess the the uniq ique pr problem
controlling a u lling a user er's 's acces access to to data data that the u that the user er already already pos possesses by tracking us es by tracking use e data data and and res restrict ricting ing acces access according according to to us use rul rules.
is so sort rt of acce ccess ss co contro rol was a s also so un unkn known in in the pre pre-In Intern rnet era, even though D gh Defe fendants' ' expe pert rt
the patents can be can be lik likened ned to or to order dering ng a DVD a DVD over
the telephone.
(Pg.
9) Further, the claims Further, the claims do not ris do not risk preempting all preempting all future future inventions inventions related to related to exchanging exchanging acces access to to data data for for payment payment on the
ternet.
ead, when when tak taken n as as or
dered combinations d combinations, the , the claims claims recite specific recite specific ways ways of
combining system compon system components ents and and method method steps eps beyond the r beyond the routine ine use e
ternet.
(Pg.
9)
27
CV 14-732-RGA, 2015 WL 1744343 (D. Del. Apr. 15, 2015)
wireless device and an internet server.
do so.
different languages to communicate with each other.
28
Claims Claims A method ethod
using sing a computer
system ystem to facilit acilitate ate two-way wo-way com communication ication betwee etween a mobile ile device evice and an Internet nternet server, erver, comprising: comprising: the the computer puter system ystem receiv eceiving ng a text message essage via via a first first communication communication path; path; the the computer
ystem insert nserting ng at at least least a mess message age body body of
the text ext message message into into an an Internet Internet Protocol Protocol (IP) (IP) message; essage; and nd the the computer puter system ystem trans ransmitt mitting ing the he IP mess message age to the Internet nternet server, server, via ia a second econd communication
path, wh wherein erein the text text message message originates
from the the mobile
evice as a short
message message service service (SMS) SMS) text text mess message, age, and nd wherein erein the SMS text ext message message cont ntains ns a multidigit ultidigit addr ddress ess that is fewer ewer th than an seven seven digits digits and and that hat is associated ssociated with with a URL RL of
the internet nternet server. erver. Court’s Analysis Court’s Analysis The The Court finds Court finds that that Claim 20 contains an Claim 20 contains an inventive inventive concept concept sufficient to sufficient to render it render it patent patent el eligible.
Like th the claims in e claims in DDR DDR Holdings, Holdings, Claim 20 “is Claim 20 “is necessarily necessarily rooted in
computer technology in in
r to overcome to overcome a problem specifically a problem specifically arising arising in in th the e realm of realm of computer networks.” computer networks.” Claim 20 is Claim 20 is directed directed to a problem unique to text-message to a problem unique to text-message telecommunication between telecommunication between a a mobi mobile device and le device and a computer. The a computer. The solution solution it provid it provides is teth es is tethered ered to the technology to the technology that that created the created the
5) Wh While ile it is true it is true th that at not not all all claims claims directed directed at addressing Internet at addressing Internet issues issues are patent eligible, are patent eligible, th this is cl claim is aim is analogou analogous s to to those in those in DDR DDR Hold Holdings.
It specifies specifies how an inte w an interaction raction between between a mobile phone a mobile phone and and a computer i a computer is mani manipulated pulated in order to
achieve eve a des a desired red res result lt whi which h
Conventionally, phones could not phones could not send send SMS SMS text text messages to messages to co computers.
The claimed method manipulates that interaction manipulates that interaction by tran by translating the slating the message in message in a way a way that that allows the computer allows the computer to to receive receive an and understand the message. d understand the message. (Pg. (Pg. 5) 5) Unlike the Unlike the claims claims identified by identified by Defendants, Defendants, Claim 20 contains Claim 20 contains a a sufficient inventive sufficient inventive concept concept to render to render it it patent-eligible. It is patent-eligible. It is firmly firmly rooted in rooted in technology technology and and is is addresse addressed to to a specific a specific problem arising problem arising in in the the realm of mobile realm of mobile device-to-Inte device-to-Internet communication. rnet communication. Furthermore, Furthermore, it it contains sufficient limitations contains sufficient limitations to to prevent it from prevent it from preempting an preempting an abstract idea. abstract idea. (Pg. (Pg. 5) 5) 29
2015 WL 1927696 (D. Del. Apr. 28, 2015) (Patent invalidated)
certain criteria relating to communication or display capabilities of the originating or destination devices or
30
fundamental truth about the natural world that has always existed”, or a “method of organizing human activity (such as a longstanding commercial practice”).
forwarding messages.
the originating and destination communication devices, and the “messaging system” that acts as an intermediary and converts the messages.
argued to possess a particularized form, depending on their construction.
associated with computer- or Internet-based technology—is insufficient to indicate that the claims as a whole are not directed to an abstract idea, if those elements are well overtaken in the claim by the articulation of the abstract idea itself.
31
Cla Claims ms A metho ethod of messa essage ge commu communi nica cati tion
via a messa messagi ging ng system stem betwe between one ne
more orig
inating ing commu
nication tion dev devices ces ass ssigned ned to a sender sender and and one ne
more destin inat ation ion communication
ces assigne igned to a rece ceive iver, the method method comprising: comprising: a) a) before before delive delivery ry to to the the rece eceiver, ver, obtaining
messaging ng syst system em a me message ge hav having ng in init itial characte haracteris istics cs compris comprising, ing, at at le leas ast, a message ge format format and and an initi nitial al me message ge layout; layout; b) b) selecting selecting a message message layout layout and and converting converting at at le leas ast said initial al me message ge layout layout to to said said se selected lected message message layo yout ut to to form form an an adapted adapted message essage layout layout in in accor accordance ance with th at at le leas ast
ne cr crite iterion ion selecte ted from rom a group group compris comprising: ing: i) i) crit criterion ion relate ated to to me message communicat communication capab apabil ilit ities of the destinat destination ion com
municat nication
device with th re regard gard to to message message commu communicat nication
capabilitie capabilities of
the origina riginating ting communication communication device; device; ii) ii) crit criterion erion related elated to to message message displa displaying ying capabil capabilities es of
the destinat estination
communication communication device ice with ith regard to message ge communicat communication ion cap apab abilit ilities
the originating riginating communication communication device; device; and nd iii) iii) cri criteri erion rela elated ed to to comm communication media edia between between ori
ating and destination ination device ice; and and c) c) facilitating facilitating delivery delivery of
the adapted dapted message essage to to the the receiver. eceiver. Court’s Analysis Court’s Analysis The plaintiff The plaintiff argues that argues that the ‘messages' the ‘messages' must be electronic messages must be electronic messages that that are are sent sent and d recei received by electroni ed by electronic commu communication nication devices' devices' which prevents the which prevents the claims from claims from preempting preempting all forms all forms of
converting and forwarding forwarding messages messages that that humans have humans have done on done on paper paper fo for centuries. The r centuries. The prohibiti prohibition n against against patenting patenting abstract ideas abstract ideas cannot be circ cannot be circumvented umvented by “attempting to by “attempting to limit limit the the use of use of the i the idea ea to a to a pa parti rticula ular technological technological environment. (Pg. 13)
Second, Second, Plaintiffs Plaintiffs assert that assert that the messa the message conversion ge conversion at i at issue is accomplished ssue is accomplished by an “inte by an “interme mediary” diary” compute computer r (the (the “me “messaging ging system” re ” refe fere rence nced in the in the claim). Yet claim). Yet this this intermediary intermediary compute computer r can can simply simply be a generic computer, be a generic computer, which which is not is not sufficient to sufficient to render render th the claim e claim patent eligible. patent eligible. The The mere mere recitation of recitation of a a generic generic computer computer ca cannot transform nnot transform a patent-ineligible a patent-ineligible abstract idea abstract idea into into a patent a patent-eligible invention.” (Pg.
15) In DDR Holdings, In DDR Holdings, for for example, example, the claims the claims were were held to held to be be patent patent eligible eligible under under the the second second step of step of the the Ali Alice e test beca test because they use they involved volved a “ “soluti
n” to to a problem, a problem, and and which described which described “how “how interactions with interactions with the the Internet Internet are are manipulated manipulated to yield a de to yield a desired result” and sired result” and avoided avoided pre-emption by pre-emption by claiming claiming
a “specific way” of “specific way” of performing performing the the tas task, s , such ch that “the that “the claims claims at at is issue did did not attempt not attempt to preempt to preempt every every application pplication of
the idea. (Pg. 15) 15) Plaintiffs Plaintiffs do do not not ide identify any tify any such ch “s “spe pecifi cific” functionality he c” functionality here re, , and and an an examination examination of claim 12 reveals
Claim 12 does not purport not purport to to limit limit itself to a itself to a specific specific way way of
converting a message from a message from one
layout to another— another— it it simply simply covers the act covers the act of “converting”
messages, based on certain based on certain criteria criteria relating relating to communication to communication or display
capabilities of es of the the originating or
destination ination device vices or on the
rele levant vant communication media. (Pg. communication media. (Pg. 15) 15)
32