throbber

`
`IN THE UNITED ST
`ATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`AUSTIN DIVISION
`CARBYNE BIOMETRICS, LLC,
`Plaintiff,
`vs.
`APPLE INC.,
`Defendant.
`Civil Action No. 1:23-cv-00324
`JURY TRIAL
`
`
`
`DEFENDANT’S MOTION FOR SUMMARY JUDGMENT OF INVALIDITY FOR
`LACK OF SUBJECT MATTER ELIGIBILITY UNDER 35 U.S.C. § 101
`
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 1 of 25
`
`
`
`
`
`
`
`
`i
`
`TABLE OF
` CONTENTS
`I. LEGAL STANDARD ......................................................................................................... 1
`II. THE FRAUD PATENTS CLAIM INELIGIBLE SUBJECT MATTER ........................... 2
`A. Background of the Fraud Patents and Their Exemplary Claims ............................. 2
`B. Step One: The Fraud Patents are Directed to an Abstract Idea ............................... 3
`C. Step Two: The Fraud Patents Lack Any Inventive Concept ................................... 7
`III. THE AUTHENTICATION PATENTS CLAIM INELIGIBLE SUBJECT
`MATTER ............................................................................................................................ 9
`A. Background of the Authentication Pate nts and Their Exemplary Claims .............. 9
`B. Step One: The Authentication Patents are Directed to an Abstract Idea .............. 10
`C. Step Two: The Authentication Patents Lack Any Inventive Concept .................. 13
`IV. CONCLUSION ................................................................................................................ . 15
`
`
`
`
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 2 of 25
`
`
`
`
`
`
`
`
`ii
`
`TABLE OF
` AUTHORITIES
`Page(s)
`Cases
`Affinity Labs v. Amazon.com Inc.,
`838 F.3d 1266 (Fed. Cir. 2016)..................................................................................................9
`Alice Corp. Pty. v. CLS Bank Int’l,
`573 U.S. 208 (2014) ......................................................................................................... passim
`Apple Inc. v. Ameranth, Inc.,
`842 F.3d 1229 (Fed. Cir. 2016)..................................................................................................2
`Berkheimer v. HP Inc.,
`881 F.3d 1360 (Fed. Cir. 2018)..................................................................................................7
`Bilski v. Kappos,
`561 U.S. 593 (2010) ...................................................................................................................2
`Blue Spike, LLC v. Google Inc.,
`No. 14-cv-01650, 2015 WL 5260506 (N.D. Cal. Sept. 8, 2015),
`aff’d, 669 F. App’x 575 (Fed. Cir. 2016) ...................................................................5, 6, 12, 13
`Broadband iTV, Inc. v. Amazon.com, Inc.,
`113 F.4th 1359 (Fed. Cir. 2024) ..............................................................................................14
`BSG Tech LLC v. Buyseasons, Inc.,
`899 F.3d 1281 (Fed. Cir. 2018)............................................................................................7, 13
`CyberSource Corp. v. Retail Decisions, Inc.,
`654 F.3d 1366 (Fed. Cir. 2011)....................................................................................1, 6, 7, 12
`DDR Holdings, LLC v. Hotels.com, L.P.,
`773 F.3d 1245 (Fed. Cir. 2014)..........................................................................................12, 15
`Dropbox, Inc. v. Synchronoss Technologies, Inc.
`815 F. App’x 529, 533 (Fed Cir. 2020) .....................................................................................6
`Elec. Commc’n Techs., LLC v. ShoppersChoice.com, LLC,
`958 F.3d 1178 (Fed. Cir. 2020)................................................................................................13
`Elec. Power Grp., LLC v. Alstom S.A.,
`830 F.3d 1350 (Fed. Cir. 2016)............................................................................................4, 11
`FairWarning IP, LLC v. Iatric Sys., Inc.,
`839 F.3d 1089 (Fed. Cir. 2016)........................................................................................ passim
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 3 of 25
`
`
`
`
`
`
`
`
`iii
`
`Front Row Techs., LLC v. NBA Media Ventures, LLC,
`204 F. Supp. 3d 1190 (D.N.M. 2016), aff’d sub nom. Front Row Techs., LLC
`v. MLB Adv’d Media, L.P., 697 F. App’x 701 (F
`ed. Cir. 2017) ................................................5
`GeoComply Sols. Inc. v. Xpoint Servs. LLC,
`No. 22-1273, 2023 WL 1927393 (D. Del. Feb. 10, 2023) .........................................................5
`Intell. Ventures I LLC v. Cap. One Bank (USA),
`792 F.3d 1363 (Fed. Cir. 2015)................................................................................................15
`Intell. Ventures I LLC v. Erie Indem. Co.,
`850 F.3d 1315 (Fed. Cir. 2017)........................................................................................5, 9, 15
`Mobile Acuity Ltd. v. Blippar Ltd.,
`110 F.4th 1280 (Fed. Cir. 2024) ..............................................................................................11
`Mortg. Grader, Inc. v. First Choice Loan Servs. Inc.,
`811 F.3d 1314 (Fed. Cir. 2016)......................................................................................4, 12, 14
`NEXRF Corp. v. Playtika Ltd.,
`547 F. Supp. 3d 977 (D. Nev. 2021),
`aff’d, 2022 WL 1513310 (Fed. Cir. May 13, 2022) ...................................................................5
`Prism Techs. LLC v. T-Mobile USA, Inc.,
`696 F. App’x 1014 (Fed. Cir. 2017) ............................................................................10, 11, 12
`Q Techs., Inc. v. Walmart, Inc.,
`21-CV-00779, 2024 WL 1146150 (W.D. Tex. Mar. 6, 2024) ...................................................2
`RecogniCorp, LLC v. Nintendo Co.,
`855 F.3d 1322 (Fed. Cir. 2017)......................................................................................1, 12, 13
`Sensormatic Elecs., LLC v. Wyze Labs, Inc.,
`484 F. Supp. 3d 161 (D. Del. 2020),
`aff’d, 2021 WL 2944838 (Fed. Cir. July 14, 2021) .................................................................15
`Solutran, Inc. v. Elavon, Inc.,
`931 F.3d 1161 (Fed. Cir. 2019)................................................................................................11
`Universal Secure Registry LLC v. Apple Inc.,
`10 F.4th 1342 (Fed. Cir. 2021) ........................................................................................ passim
`WhitServe LLC v. Dropbox, Inc.,
`854 F. App’x 367 (Fed. Cir. 2021) ..............................................................................12, 14, 15
`Yu v. Apple Inc.,
`1 F.4th 1040 (Fed. Cir. 2021) ..............................................................................................4, 11
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 4 of 25
`
`
`
`
`
`
`
`
`iv
`
`Statutes
`35 U.S.C. § 101
`...................................................................................................................... passim
`
`
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 5 of 25
`
`
`
`
`
`
`
`
`v
`
`TABLE OF
` ABBREVIATIONS
`Term Definition
`Apple Defendant Apple Inc.
`Carbyne Plaintiff Carbyne Biometrics, LLC
`’105 U.S. Patent No. 11,475,105
`’138 U.S. Patent No. 11,514,138
`’010 U.S. Patent No. 9,972,010
`’656 U.S. Patent No. 10,713,656
`’886 U.S. Patent No. 11,526,886
`Fraud Patents The ’010, ’656, and ’886 patents
`Fraud Claims Claims 1, 6, and 9 of the ’010 Patent;
`claims 1 and 8 of the ’656 Patent, and
`claims 1, 12 and 14 of the ’886 Patent
`Authentication Patents The ’105 and ’138 patents
`Authentication Claims Claims 1, 7-8 and 25 of the ’138 Patent
`and claims 1, 9, 14 and 35 of the ’105
`Patent
`Asserted Patents The ’105, ’138, ’010, ’656, and ’886
`patents
`Asserted Claims The Fraud Claims and Authentication
`Claims
`’010 FH Excerpt from the File History to U.S.
`Patent No. 9,972,010
`’886 FH Excerpt from the File History to U.S.
`Patent No. 11,526,886
`Brief Corrected Principal And Response Brief
`For Defendant/Cross-Appellant T-Mobile
`USA, Inc. at 58-59, Prism Technologies
`LLC v. T-Mobile USA, Inc., Nos. 16-2031,
`16-2049 (Fed. Cir.) (filed Sept. 22, 2016)
`
`
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 6 of 25
`
`
`
`
`
`
`
`
`vi
`
`TABLE OF
` EXHIBITS
`Exhibit Document
`Ex. A Deposition Transcript of Markus Jakobsson, Volume 1 (July 9, 2024)
`Ex. B U.S. Patent No. 11,475,105 (attached as Exhibit B to the Complaint)
`Ex. C U.S. Patent No. 11,514,138 (attached as Exhibit C to the Complaint)
`Ex. D U.S. Patent No. 9,972,010 (attached as Exhibit D to the Complaint)
`Ex. E U.S. Patent No. 10,713,656 (attached as Exhibit E to the Complaint)
`Ex. F U.S. Patent No. 11,526,886 (attached as Exhibit F to the Complaint)
`Ex. G Excerpt from the File History of U.S. Patent No. 9,972,010, retrieved
`from the website of the U.S. Patent and Trademark Office
`Ex. H Excerpt from the File History of U.S. Patent No. 11,526,886, retrieved
`from the website of the U.S. Patent and Trademark Office
`Ex. I Corrected Principal And Respons e Brief For Defendant/Cross-Appellant
`T-Mobile USA, Inc. at 58-59, Prism Technologies LLC v. T-Mobile USA,
`Inc., Nos. 16-2031, 16-2049 (Fed. Cir.) (filed Sept. 22, 2016)
`Ex. J Openin g Expert Report of Dr. Edward Dunstone on Invalidity
`Ex. K Rebuttal Expert Report of Dr. Eric Cole on Validity
`Ex. L Exhibit G to Carb yne’s Final Infringement Contentions
`Ex. M Deposition Transcript of Dr. Mark Jones, Volume 1 (Oct. 1, 2024)
`Ex. N Appendix A to Rebuttal Expert Report of Dr. Mark Jones on Validity
`Ex. O Openin g Expert Report of Dr. Seth Nielson on Invalidity
`Ex. P Appendix H to Openin g Expert Report of Dr. Mark Jones on Infringement
`Ex. Q Openin g Expert Report of Dr. Mark Jones on Infringement
`
`
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 7 of 25
`
`
`
`
`
`
`
`
`1
`
`The Asserted Claims are directed to ineligible subject matter under 35 U.S.C. § 101. Three
`patents are directed to detecting fraud in electronic transactions through the use of collected data
`(biometrics and/or location). The Federal Circuit found analogous claims “collect[ing] and
`examin[ing] data to authenticate the user[]” in transactions directed to abstract ideas. See Universal
`Secure Registry LLC v. Apple Inc., 10 F.4th 1342, 1351-52 (Fed. Cir. 2021) (“USR”). Two patents
`are directed to limiting access to data to authorized users, again using biometric data. The Federal
`Circuit again found analogous claims “directed to the abstract idea of co llecting and examining
`data to enable authentication” to be patent ineligible. Id. at 1352. No Asserted Claim recites an
`inventive concept. They use conventional computer component s for conventional functions.
`Accordingly, Apple respectfully requests summary judgment of invalidity under § 101.
`I. LEGAL STANDARD
`Abstract ideas are not patentable. Alice Corp. Pty. v. CLS Bank Int’l , 573 U.S. 208, 217
`(2014). Courts apply a two-step fra mework to “distinguish[] patents that claim . . . abstract ideas
`from those that claim patent-eligible application of those concepts.” Id. at 217. At step one, courts
`determine whether the claims “are directed to a patent-ineligible concept.” Id. at 218. “The inquiry
`often is whether the claims are directed to ‘a specific means or method’ for improving technology
`or whether they are simply directed to an abstract end-result.” RecogniCorp, LLC v. Nintendo Co.,
`855 F.3d 1322, 1326 (Fed. Cir. 2017) (c itation omitted). A claim that can be performed mentally
`or analogized to brick-and-mortar concepts likely is abstract idea. CyberSource Corp. v. Retail
`Decisions, Inc., 654 F.3d 1366, 1372 (Fed. Cir. 2011) (findi ng claim directed to fraud detection
`for electronic interactions an “unpatentable mental process”); FairWarning IP, LLC v. Iatric Sys.,
`Inc., 839 F.3d 1089, 1094 (Fed. Cir. 2016) (finding fraud detection cl aims “merely implement an
`old practice in a new environment”). Software claims may be abstract if “[t]hey do not claim a
`particular way of programming [to accomplish the claimed functionality], but instead merely claim
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 8 of 25
`
`
`
`
`
`
`
`
`2
`
`the resulting systems” or if they “are not directed to a specific improvement in the way computers
`operate.” Apple Inc. v. Ameranth, Inc., 842 F.3d 1229, 1241 (Fed. Cir. 2016).
`At step two, courts remove the abstract idea from the claim and search the remainder for
`an “inventive concept sufficient to transform” the abstract idea into a patent-eligible application.
`Alice, 573 U.S. at 221 (citation omit ted). There is nothing inve ntive about imp lementing an
`abstract idea using “‘well-understood, routine, conventional activit[ies]’ previously known to the
`industry,” id. at 225 (alteration in original) or lim iting the abstract id ea to a “particular
`technological environment,” Bilski v. Kappos, 561 U.S. 593, 610-11 (2010) (citation omitted).
`Although the question of whether an element or combination of elements is “well-understood,
`routine and conventional” is a question of fact that must be shown by clear and convincing
`evidence, “[s]ummary judgment must be granted when, drawing all reasonable inferences in favor
`of the non-movant, there is no genuine issue as to any material fact.” Q Techs., Inc. v. Walmart,
`Inc., 21-CV-00779, 2024 WL 1146150, at *2 (W.D. Tex. Mar. 6, 2024) (citation omitted).
`II. THE FRAUD PATENTS CLAIM INELIGIBLE SUBJECT MATTER
`A. Background of the Fraud Patent Claims
`The Fraud Patents describe “[t]echniques for reducing fraud.”1 ’010 at Abstract; Ex. A at
`155:3-156:12. To address the non-technological problem of fraudulent transactions, these patents
`propose non-technological solutions to increase the real or perceived likelihood that the fraudulent
`act will be detected. ’010 at 4:45-48. The patents describe captur ing and analyzing biometrics or
`location to ensure the user may authorize a transaction. Id. at 6:39-45; 8:55-63; 10:10-12.
`’010 claim 9 (see Appx 1 for complete claim language) recites receiving and storing
`information (a virtual likeness, an indication of an action, biom etric information); displaying
`
`1 The Fraud Patents’ specifications are identical other than cross-references to each other. All
`citations in this section are to the ’010 specification. All emphasis added unless otherwise noted.
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 9 of 25
`
`
`
`
`
`
`
`
`3
`
`information (virtual likeness and icon); analyzin g information (a fraud detection analysis); and a
`result (completing a transaction). See also ’010 cl. 1 (same). The ’656 and ’886 independent claims
`are similar, except they also r ecite capturing location informa tion, and the ’656 recites storing
`biometric information instead of a virtual likeness. E.g., ’656, cl. 1; ’886, cl. 1. The Fraud Claims
`use only functional language direct ed to the abstract idea of receiving/storing, displaying, and
`analyzing information, and nothing in this ordered combination adds an inventive concept.
`The Fraud Claims do not recite how to perform the purportedly inventive fraud detection
`analysis. Rather, the claims recite merely an input to that analysis— i.e., biometric (and, for the
`’656 and ’886, location) information—and the output of that analysis— i.e., a determination that a
`user is alive. But the claims are silent on how to conduct that analysis and do not tether it in any
`meaningful way to the recited components. The sp ecification is equally silent. And the asserted
`dependent claims add only minor features that do not change the character of the independent
`claims. These dependent claims recite display of additional information (’010 cl. 6; ’656 c. 8);
`collection of additional information ( e.g., photographs) (’886 c. 14); and determining whether a
`face is detected in captured images—without any r ecitation of how to perform them (’886 cl. 12).
` During prosecution of the ’010, the examiner re jected the pending claims six times under
`§ 101, and applicant overcame these rejections only by adding the step of determining whether a
`user is “alive.” Ex. G at 8. Later, during prosecu tion of the ’886, the same examiner rejected the
`pending claims under § 101 even though they recited the “alive” determinati on, allowing the
`claims only once th e limitation of capturing lo cation data was added. Ex. H at 15-16, 21-23. As
`discussed below, neither feature saves the claims from ineligibility.
`B. Step One: The Fraud Patents are Directed to the Abstract Idea of Collecting,
`Receiving, and Analyzing Data before Authorizing a Transaction
`The Fraud Claims are directed to the abstra ct idea of collecting, receiving, and analyzing
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 10 of 25
`
`
`
`
`
`
`
`
`4
`
`information about a user—namely, biometric (and, for the ’656 and ’886, location) information—
`to enable a transaction, in other words, “collect[ing] and examin[ing] data to authenticate the user’s
`identity.” USR, 10 F.4th at 1352. The claims here are even more abstract than those in USR, which
`recited a “device that includes a biometric sens or, user interface, communication interface, and
`processor” to “(1) authenticate the user based on two factors—biometric information and secret
`information”—and “(2) generate encrypted auth entication information to send to the secure
`registry through a point-of-sale device.” Id. Here, as in USR, the claims are abstract because they
`“recite ‘conventional actions in a generic way’” such as “authenticating a user using conventional
`tools” ( e.g., displaying information, receiving a transaction re quest, capturing biometric
`information) and permitting a transaction to proceed “without ‘improv[ing] any underlying
`technology.’” Id. The Federal Circuit also held similar claims abstract in FairWarning. E.g., 839
`F.3d at 1093 (“detecting fraud” by “analyzing data” such as user identifier data).
`The results-oriented nature of the claims highlights their abstractness. The central—and
`supposedly inventive—limitation concerning the fraud detection analys is (“alive”) recites only the
`inputs to and outputs from a black box, without discussing how to conduct the analysis or how the
`recited components participate. That “essentially result-focused, functional character” confirms
`that the claims are “ineligible under § 101.” Elec. Power Grp., LLC v. Alstom S.A., 830 F.3d 1350,
`1356 (Fed. Cir. 2016). Adding rote recitations of conventi onal physical components ( e.g., a
`processor, memory, came ra) performing thei r conventional functions do es nothing to render the
`claims nonabstract. Yu v. Apple Inc., 1 F.4th 1040, 1043 (Fed. Cir. 2021).
`While the Fraud Claims require that certai n information be “captur[ed]” (biometrics,
`location) and a certain determination made (whether a user is “alive”), those features do not save
`the claims from being abstract. First, collecting and analyzing information is an ineligible abstract
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 11 of 25
`
`
`
`
`
`
`
`
`5
`
`idea, and limiting that process to either specific informa tion or a specific technological
`environment (an electronic transaction) does not render the claims nonabstract. FairWarning, 839
`F.3d at 1094-95; Intell. Ventures I LLC v. Erie Indem. Co., 850 F.3d 1315, 1330 (Fed. Cir. 2017).
`Second, use of biometric data does not render a claim nonabstract. USR, 10 F.4th at 1353.
`The claims do not purport to improve on the use or capture of biometrics; as in USR, there “is no
`description in the patent[s] of a specific technical solution by which the biometric information . . .
`is generated.” Id. at 1352. The claims merely recite using biometric information to make a
`determination—something humans have done for eons. See, e.g., Blue Spike, LLC v. Google Inc.,
`No. 14-cv-01650, 2015 WL 5260506, at *1, *5-6 (N.D. Cal. Sept. 8, 2015) (steps comparing
`“signals,” including biometrics like iris scans, “ mirror[]” the human mind), aff’d, 669 F. App’x
`575 (Fed. Cir. 2016) (non-precedentia l). The inventor admitted that the patents disclose no new
`algorithms for using or implementing biometrics. Ex. A at 244:17-21; 246:16-24; 250:17-251:10.
`Third, use of location information in the ’656 and ’886 claims doe s not render them
`nonabstract. Using location information in connection with a tran saction is an abstract idea. See,
`e.g., NEXRF Corp. v. Playtika Ltd. , 547 F. Supp. 3d 977, 991 (D. Nev. 2021) (“incentivizing
`gambling tailored to a user’s location” is abstract), aff’d, 2022 WL 1513310 (Fed. Cir. May 13,
`2022); Front Row Techs., LLC v. NBA Media Ventures, LLC , 204 F. Supp. 3d 1190, 1268, 1273-
`74 (D.N.M. 2016) (authorizing “video based on a user’s location” abstract), aff’d sub nom. Front
`Row Techs., LLC v. MLB Adv’d Media, L.P., 697 F. App’x 701 (Fed. Cir. 2017) (non-precedential).
`Verifying location is a longstanding commercia l practice and method of organizing human
`activity. Nevada casinos adopted this practice when they “took steps to ensure that persons seeking
`to place wagers were” in Nevada. GeoComply Sols. Inc. v. Xpoint Servs. LLC, No. 22-1273, 2023
`WL 1927393, at *6 (D. Del. Feb. 10, 2023) (holding claims abstract). The claims provide no new
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 12 of 25
`
`
`
`
`
`
`
`
`6
`
`technical solution for capturing or analyzing location information.
`Fourth, the black-box step of determining whether a user is “alive” does nothing to render
`the claims nonabstract. In Dropbox, Inc. v. Synchronoss Technologies, Inc. , the Federal Circuit
`addressed claims directed to authentication and data security, where the claimed advance was a
`recited “access checker” that pe rmitted access to a resource only if certain specified conditions
`were met. 815 F. App’x 529, 533 (Fed Cir. 2020) (affirming dismissal un der § 101). The Court
`deemed that feature a “functional abstractio n;” the specification offered no “technological
`solution” for implementation, instead treating the feature “as a black box.” The same is true here.
`The claims recite nothing more th an the result of determining th at the user is alive, without
`specifying how that is done. The specification also contains no detail: “Techniques for confirming
`that the object being photographed is alive (e.g., by taking multiple photographs in rapid
`succession) …” ’010, 8:55-60. At best, this lone sentence describes an input to an undisclosed
`function. Dr. Jakobsson admitted that the patents disclose no algorithm but merely provide a
`“simple description of what the goal is.” Ex. A at 244:17-21; 246:16-24.2
`The claims are also abstract because they can largely be pe rformed via mental processes.
`Blue Spike, 2015 WL 5260506, at *5. Determining that a person is alive or dead, or present rather
`than absent, is analogous to longstanding commercial practices mentally performed by, e.g., bank
`tellers and notaries. See Cybersource, 654 F.3d at 1373 (identifying fraud based on contextual
`information “can be performed . . . in the human mind”). Dr. Jakobsson effectively admitted that
`these steps can be performed mentally, test ifying that the patents reduce fraud through “a
`
`2 While the ’010 and ’656 claims recite an “alive” determinati on based “at least in part” on
`biometric information, they do not specify the type of information, how it is used, or how the
`determination is made. As the ’886 examiner f ound, the specification’s disclosure is limited to
`taking multiple photographs in succession. E.g., H at 5-6. While the ’886 adds that “alive” is
`determined by analyzing “the set of images,” this too is an unexplained black-box determination.
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 13 of 25
`
`
`
`
`
`
`
`
`7
`
`psychological observation that is being taken advantage of in a technological sense.” Ex. A, 159:2-
`10. Implementing that “psycholog ical observation” with conven tional technology rather than a
`human brain does not make them less abstract. Id.; see Berkheimer v. HP Inc. , 881 F.3d 1360,
`1367 (Fed. Cir. 2018) (abstract idea limited to a technological environment still abstract).
`C. Step Two: The Fraud Patents Lack Any Inventive Concept
`Once the abstract ideas of analyzing biomet rics and location are stripped from the Fraud
`Claims, what remains adds nothing “sufficient to ‘transform’ th e claimed abstract idea into a
`patent-eligible application.” Alice, 573 U.S. at 217-18, 221 (citation omitted). The undisputed facts
`show the Fraud Patents lack any inventive concep t. Apple’s expert opined that no claim element
`was inventive, Ex. J ¶¶ 950-964, which Carbyne’s expert did not rebut. Ex. K ¶¶ 692-699; see Ex.
`A at 218:23-24 (inventor testifying that “each limitation” “by itself is not necessarily novel”).
`Once the abstract idea is removed, all that remains are undisputedly conventional computer
`components used in a conventional manner, Ex. J ¶¶ 950-951; Ex. K ¶¶ 692-699 (not disputing
`Apple’s Expert’s opinion on this). Named inventor Dr. Jakobsson testified that the claimed
`computer components were know n. Ex. A at 213:17-2 (processor); 254:20 (“I did not invent
`memory”); 254:22- 255:6; see also ’010 at 2:6-10 (“[A] component . . . may be implemented as a
`general component that is tem porarily configured to perform the task”); 3:54-55 (“device 110
`includes typical components such as a CPU, RAM . . . .”). Such conventional components, even
`combined, are not sufficient to transform an abstract idea into a pa tent-eligible claim. BSG Tech
`LLC v. Buyseasons, Inc., 899 F.3d 1281, 1290-91 (Fed. Cir. 2018) (application of an abstract idea
`using conventional techniques not sufficient to transform claim); FairWarning, 839 F.3d at 1096.
`Even the combination of elem ents, on the undisputed facts, is not inventive. Ex. J ¶ 962.
`Carbyne’s expert, Dr. Cole, opines that the “Asserted Claims pr ovide for an improved graphical
`user interface coupled with fraud detection analysis that did not exist in the prior art.” Ex. K ¶ 699.
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 14 of 25
`
`
`
`
`
`
`
`
`8
`
`But Dr. Cole improperly includes elements of the abstract idea in the purported concept, e.g., Ex.
`J ¶ 953 (“limitations [such as the fraud detection analysis] are recited with generality and are also
`part of the abstract idea itself”), and so Dr. Cole’s proffered inventive concept is irrelevant to the
`analysis required by Alice , 573 U.S. at 218 (inventive concept must add “significantly more”).
`Regardless, Dr. Cole’s testimony confirms that each aspect of his purported abstract concept was
`well-known, routine, and conventional. By “improved graphical user interface,” Dr. Cole means
`one that “includes a virtual likeness of the fa ce of the account holder within the transaction
`interface,” Ex. K ¶ 697, but Dr. Cole does not dispute that “it was conventional to have processor(s)
`configured to render images in on e or more interfaces, such as re ndering a virtual likeness of an
`account holder or transaction recipient.” 3 Ex. J ¶ 955. By “fraud detection analysis,” Dr. Cole
`means capturing information “that determines at leas t in part that the user is alive,” but he later
`opines that techniques “to exactly determine a user is alive . . . were known to those in the relevant
`field at the time of the invention.” Ex. K ¶ 677.
`Nor do the claims provide a technological so lution rooted in computer technology to
`address a problem specifically arising in the realm of computers. Ex. J ¶ 946. Dr. Cole opines that
`each aspect of his purported inventive concept provides a separate purported benefit, but each
`benefit identified by Dr. Cole a ddresses a problem that predates computers and e-commerce. Ex.
`K ¶ 699 (“increase feelings of guilt” and “increased likelihood…that a fraudster will be caught”).
`The specification implies the Fraud Patents provide a solution applicable to physical and electronic
`transactions. Ex. D at 1:19-29 (“Fraudulent transactions are an ongoing problem….at physical
`locations….[and] in the context of electronic transactions. Impr oved techniques to prevent fraud
`
`3 Dr. Cole’s opinion that the “graphic user interface” “would increase feelings of guilt in a would-
`be fraudster” (Ex. K ¶ 699) is belied by the claims, which do not require the displayed likeness be
`that of the sender—indeed, Carbyne accuses a likeness of a recipient. E.g., Ex. L at 5.
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 15 of 25
`
`
`
`
`
`
`
`
`9
`
`would be useful.”). Consistent with the specification, Dr. Jakob sson testified that fraud may be
`committed by an individual “using [a] stolen card to perform transactions at physical locations,”
`Ex. A at 155:7-18, which is a problem arising long before e-commerce. Applying the generic
`solution to electronic transactions does not create an inventive concept. See Intell. Ventures I, 850
`F.3d at 1327 (concluding claimed activity was abstract as it was “longstanding conduct that existed
`well before the advent of computers and the Internet”). In short, the claimed features “are described
`and claimed generically rather than with the specificity necessary to show how those components
`provide a concrete solution to the problem addressed by the patent.” Affinity Labs v. Amazon.com
`Inc., 838 F.3d 1266, 1271 (Fed. Cir. 2016). Some claims recite no components at all. ’010 cl. 9.
`III. THE AUTHENTICATION PATENTS CLAIM INELIGIBLE SUBJECT MATTER
`A. Background of the Authentication Patents Claims
`The Authentication Patents purport to improve existing “authentication techniques” by
`making accessing resources less “tedious.” ’138, 3:1-43, 3:61-64. The patents have the same title,
`inventor, and assignee, and share similar specifications. 4 Their purported solution is to verify the
`user’s identity by matching biometric information (e.g., fingerprint) to a template (e.g., fingerprint
`patterns) before sending the user’s credentials (e.g., cryptographic keys) to a requested resource
`on the user’s behalf, ’138, 3:1-4, avoiding the need for user-entered credentials, ’138, 2:65-3:1.
`’138 claim 1 (see Appx 2) recites storing informati on (a record comprising a biometric
`template and cryptographic key); displaying info rmation (a prompt); receiving information (a
`biometric input); analyzing in formation (determining a match between received and stored
`information); accessing information (accessi ng a credential); transmitting information
`(transmitting the credentials); and rem oving information (facilitating wiping of
`
`4 The ’105 specification adds Figs. 9-15 and an “ADDITIONAL EMBODIMENTS” section to the
`’138 specification. Unless stated otherwise, all citations are to the ’138.
`Case 1:23-cv-00324-ADA Document 230 Filed 11/06/24 Page 16 of 25
`
`
`
`
`
`
`
`
`10
`
`information).5 ’138, 3:21-55, 4:44-46, 6:29-7:23, Fig. 5. The ’105 independent claims are similar,
`except they do not recite a visual prompt or wi ping. The ’105 recites “initiating a backup” to a
`device (without reciting how) and receiving and matching “authentication information,” again
`without specifying how, ’105, cl. 1. The claims do not recite any new “authentication technique”
`or any new technology for performing the recited functions.
`Instead, the patents emphasize that their authentication techniques are “widely deployable”
`by using “general component[s]” and can be implemented “in numerous ways,” in a “variety . . .
`of devices” ( e.g., “gaming systems,” “mice,” and “doo r locks”) to conduct “a variety” of
`transactions with a “variety of services.” ’138, 1:44-46, 2:6-23, 2:36-3:16, 4:35-37. The “general
`component[s]” used to perform the techniques—ge neric processors, memory, storage—are recited
`performing their conventional functions, such as receiving, analyzing, and transmitting data. ’138,
`2:16-23, 3:60-4:3, 4:13-4:31, 5:10-45, 6:50-57, 7:48-8:2, Fig. 5. The dependent claims add only
`minor features that do not change the character of the independent claims. They recite merely
`storing information (’105 cl. 9); wiping information (’138 cls. 7-8); and otherwise generic
`components, ’105, cl. 14 (“biometric user input element,” e.g., a sensor (22:9-14)).
`B. Step One: The Authentication Patents are Directed to the Abstract Idea of
`Authenticating User Identity Before Granting Access To Data
`The Authentication Claims are directed to the idea of facilitating access to resources based
`on authenticating a user’s identity, or in oth

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket