SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
CyberSource Corp. v.
Retail Decisions, Inc.


Alex Chartove
September 2011



                 © 2011 Morrison & Foerster LLP All Rights Reserved | www.mofo.com
WHO SHOULD READ THIS CASE?

You should read this case if you face issues
concerning:
 Patented methods that are implemented
  via the Internet.
 Patented methods that are implemented
  using a computer.



                                      This is MoFo 2
CLAIM 3
A method for verifying the validity of a credit card
 transaction over the Internet comprising the steps of:
a) obtaining information about other transactions that have
 utilized an Internet address that is identified with the credit
 card transaction;
b) constructing a map of credit card numbers based upon
 the other transactions and;
c) utilizing the map of credit card numbers to determine if
 the credit card transaction is valid.



                                                       This is MoFo 3
CLAIM 2
2. A computer readable medium containing program instructions for detecting fraud in
  a credit card transaction between a consumer and a merchant over the Internet,
  wherein execution of the program instructions by one or more processors of a
  computer system causes the one or more processors to carry out the steps of:
a) obtaining credit card information relating to the transactions from the consumer; and
b) verifying the credit card information based upon values of plurality of parameters, in
  combination with information that identifies the consumer, and that may provide an
  indication whether the credit card transaction is fraudulent,
wherein each value among the plurality of parameters is weighted in the verifying step
  according to an importance, as determined by the merchant, of that value to the credit
  card transaction, so as to provide the merchant with a quantifiable indication of
  whether the credit card transaction is fraudulent,
wherein execution of the program instructions by one or more processors of a
  computer system causes that one or more processors to carry out the further steps
  of;
[a] obtaining information about other transactions that have utilized an Internet address
  that is identified with the credit card transaction;
[b] constructing a map of credit card numbers based upon the other transactions; and
[c] utilizing the map of credit card numbers to determine if the credit card transaction is
  valid.

                                                                                This is MoFo 4
LITIGATION
•patentee sues alleged infringer
•alleged infringer moves for SJ of invalidity under 35 USC
 §101:
   “Whoever invents or discovers any new and useful
    process, machine, manufacture, or composition of
    matter, or any new and useful improvement thereof,
    may obtain a patent therefor, subject to the conditions
    and requirements of this title.”
•district court grants SJ of invalidity
•patentee appeals to CAFC

                                                    This is MoFo 5
§101 VALIDITY TESTS
•a process is patent-eligible under §101 if:
   •(1) it is tied to a particular machine or apparatus, or
   •(2) it transforms a particular article into a different
    state or thing
•to satisfy machine prong, machine must impose
 meaningful limits on claim scope
•M-or-T test is not exclusive test for patentability of a
 process
•laws of nature, physical phenomena and abstract ideas
 are not patentable

                                                      This is MoFo 6
CLAIM 3
A method for verifying the validity of a credit card transaction over the
 Internet comprising the steps of:
a) obtaining information about other transactions that have utilized an
 Internet address that is identified with the credit card transaction;
    [“Internet address” may include IP address or e-mail address]
b) constructing a map of credit card numbers based upon the other
 transactions and;
    [“map” may include list of credit card numbers]
c) utilizing the map of credit card numbers to determine if the credit
 card transaction is valid.
    [“utilizing” may include any fraud detection formula or mathematical
      algorithm]


                                                                This is MoFo 7
CLAIM 3 FAILS M-or-T TEST
•transformation prong
   •mere collection and organization of data regarding
    credit card numbers and Internet addresses is
    insufficient
•machine prong
   •no machine is defined or required for performing
    method
   •Internet does not perform steps of claimed method
   •Internet is merely a data source

                                               This is MoFo 8
CLAIM 3 RECITES ABSTRACT IDEA

•failure to satisfy M-or-T test is not dispositive of
 §101 inquiry
•claim 3 scope is not limited to a particular algorithm
•each step can be performed in human mind alone, or
 by human using pen and paper
•method which can be performed mentally, or by pen
 and paper, is a mental process - a subcategory of
 unpatentable abstract idea
•even if mental process has a practical application

                                                This is MoFo 9
“BEAUREGARD” CLAIM 2
•a computer readable medium (e.g., disk, hard drive, data storage,
 etc.) containing program instructions for a computer to perform a
 particular process
•regardless of statutory category recited in claim (process, machine,
 manufacture, composition of matter), look to “underlying” invention to
 determine §101 patent-eligibility
•invention “underlying” both claims 2 and 3 is a method for detecting
 credit card fraud, not a medium for storing computer-readable
 information
•claim 2 recites nothing more than a medium containing program
 instructions for executing method of claim 3
•despite Beauregard format, claim 2 is treated as a process claim for
 patent-eligibility purposes

                                                              This is MoFo 10
CLAIM 2 FAILS
TRANSFORMATION PRONG

•claimed process manipulates data to
 organize it in a logical way such that
 additional fraud tests may be performed
•mere manipulation or reorganization of
 data does not satisfy transformation prong




                                      This is MoFo 11
CLAIM 2 FAILS MACHINE PRONG
•claim 2 recites “computer readable medium” containing
 software instructions requiring execution by “processors
 of a computer system”
•to pass machine prong, use of machine must impose
 meaningful limits on claim scope
•use of computer to perform mental process of claim 3
 does not impose sufficiently meaningful limit on claim
 scope
•merely claiming software implementation of a purely
 mental process that could be performed without a
 computer does not satisfy machine prong
•claim 2 limitations do not make unpatentable method
 patent-eligible under §101

                                                   This is MoFo 12
CLAIM 2 RECITES ABSTRACT IDEA
•method can be performed entirely in human mind, without a machine
•merely coupling unpatentable mental process with a manufacture or
 machine does not render mental process patent-eligible
•method claims invalid under §101 for being drawn to abstract ideas
 cannot avoid invalidity under §101 by
   •merely requiring a computer to perform the method, or
   •merely reciting a computer readable medium containing program
    instructions for performing the method
•result may be different where, as a practical matter, a computer is
 required to perform the claimed method
•claims 2 and 3 are invalid under §101 as a matter of law



                                                            This is MoFo 13
PRACTICAL OBSERVATIONS
•merely converting a non-patent eligible method
 claim to Beauregard format will not be sufficient
 to
   •avoid M-or-T test, or
   •pass M-or-T test
•risk of §101 invalidity can be reduced by
   •reciting a specific algorithm
   •recite steps that cannot be performed mentally
    or by pen and paper
                                            This is MoFo 14

Weitere ähnliche Inhalte

Ähnlich wie CyberSource v. Retail Decisions: Software Methods for Credit Card Fraud Detection Invalid Under §101

IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET Journal
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ... Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...Knobbe Martens - Intellectual Property Law
 
Patent eligibility 101 tim hadlock
Patent eligibility 101   tim hadlockPatent eligibility 101   tim hadlock
Patent eligibility 101 tim hadlockTimothy Hadlock
 
SRS for banking system requirement s.ppt
SRS for banking system requirement s.pptSRS for banking system requirement s.ppt
SRS for banking system requirement s.pptubaidullah75790
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertbsookman
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxDivyaHinduja2
 
Securing e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemSecuring e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemHamdi Jaber
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptxsambaba17
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumnurhaniffah1
 

Ähnlich wie CyberSource v. Retail Decisions: Software Methods for Credit Card Fraud Detection Invalid Under §101 (20)

IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ... Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 
Patent eligibility 101 tim hadlock
Patent eligibility 101   tim hadlockPatent eligibility 101   tim hadlock
Patent eligibility 101 tim hadlock
 
SRS for banking system requirement s.ppt
SRS for banking system requirement s.pptSRS for banking system requirement s.ppt
SRS for banking system requirement s.ppt
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpert
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptx
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 
Securing e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemSecuring e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication System
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Investigative powers in practice – SOUTH AFRICA – November 2018 OECD GFC
Investigative powers in practice – SOUTH AFRICA – November 2018 OECD GFCInvestigative powers in practice – SOUTH AFRICA – November 2018 OECD GFC
Investigative powers in practice – SOUTH AFRICA – November 2018 OECD GFC
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereum
 

Kürzlich hochgeladen

Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdfmar yame
 
Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024Champak Jhagmag
 
NCDC and NAFED presentation by Paras .pptx
NCDC and NAFED presentation by Paras .pptxNCDC and NAFED presentation by Paras .pptx
NCDC and NAFED presentation by Paras .pptxnaikparas90
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...
Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...
Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...Amil baba
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...Amil baba
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Precize Formely Leadoff
 
Financial Preparation for Millennia.pptx
Financial Preparation for Millennia.pptxFinancial Preparation for Millennia.pptx
Financial Preparation for Millennia.pptxsimon978302
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
Financial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.pptFinancial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.ppttadegebreyesus
 
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfKempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfHenry Tapper
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 

Kürzlich hochgeladen (20)

Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdf
 
Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024Unveiling Business Expansion Trends in 2024
Unveiling Business Expansion Trends in 2024
 
NCDC and NAFED presentation by Paras .pptx
NCDC and NAFED presentation by Paras .pptxNCDC and NAFED presentation by Paras .pptx
NCDC and NAFED presentation by Paras .pptx
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...
Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...
Uae-NO1 Kala Jadu specialist Expert in Pakistan kala ilam specialist Expert i...
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
Uae-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.
 
Financial Preparation for Millennia.pptx
Financial Preparation for Millennia.pptxFinancial Preparation for Millennia.pptx
Financial Preparation for Millennia.pptx
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
Financial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.pptFinancial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.ppt
 
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdfKempen ' UK DB Endgame Paper Apr 24 final3.pdf
Kempen ' UK DB Endgame Paper Apr 24 final3.pdf
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 

CyberSource v. Retail Decisions: Software Methods for Credit Card Fraud Detection Invalid Under §101

  • 1. CyberSource Corp. v. Retail Decisions, Inc. Alex Chartove September 2011 © 2011 Morrison & Foerster LLP All Rights Reserved | www.mofo.com
  • 2. WHO SHOULD READ THIS CASE? You should read this case if you face issues concerning: Patented methods that are implemented via the Internet. Patented methods that are implemented using a computer. This is MoFo 2
  • 3. CLAIM 3 A method for verifying the validity of a credit card transaction over the Internet comprising the steps of: a) obtaining information about other transactions that have utilized an Internet address that is identified with the credit card transaction; b) constructing a map of credit card numbers based upon the other transactions and; c) utilizing the map of credit card numbers to determine if the credit card transaction is valid. This is MoFo 3
  • 4. CLAIM 2 2. A computer readable medium containing program instructions for detecting fraud in a credit card transaction between a consumer and a merchant over the Internet, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to carry out the steps of: a) obtaining credit card information relating to the transactions from the consumer; and b) verifying the credit card information based upon values of plurality of parameters, in combination with information that identifies the consumer, and that may provide an indication whether the credit card transaction is fraudulent, wherein each value among the plurality of parameters is weighted in the verifying step according to an importance, as determined by the merchant, of that value to the credit card transaction, so as to provide the merchant with a quantifiable indication of whether the credit card transaction is fraudulent, wherein execution of the program instructions by one or more processors of a computer system causes that one or more processors to carry out the further steps of; [a] obtaining information about other transactions that have utilized an Internet address that is identified with the credit card transaction; [b] constructing a map of credit card numbers based upon the other transactions; and [c] utilizing the map of credit card numbers to determine if the credit card transaction is valid. This is MoFo 4
  • 5. LITIGATION •patentee sues alleged infringer •alleged infringer moves for SJ of invalidity under 35 USC §101: “Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this title.” •district court grants SJ of invalidity •patentee appeals to CAFC This is MoFo 5
  • 6. §101 VALIDITY TESTS •a process is patent-eligible under §101 if: •(1) it is tied to a particular machine or apparatus, or •(2) it transforms a particular article into a different state or thing •to satisfy machine prong, machine must impose meaningful limits on claim scope •M-or-T test is not exclusive test for patentability of a process •laws of nature, physical phenomena and abstract ideas are not patentable This is MoFo 6
  • 7. CLAIM 3 A method for verifying the validity of a credit card transaction over the Internet comprising the steps of: a) obtaining information about other transactions that have utilized an Internet address that is identified with the credit card transaction; [“Internet address” may include IP address or e-mail address] b) constructing a map of credit card numbers based upon the other transactions and; [“map” may include list of credit card numbers] c) utilizing the map of credit card numbers to determine if the credit card transaction is valid. [“utilizing” may include any fraud detection formula or mathematical algorithm] This is MoFo 7
  • 8. CLAIM 3 FAILS M-or-T TEST •transformation prong •mere collection and organization of data regarding credit card numbers and Internet addresses is insufficient •machine prong •no machine is defined or required for performing method •Internet does not perform steps of claimed method •Internet is merely a data source This is MoFo 8
  • 9. CLAIM 3 RECITES ABSTRACT IDEA •failure to satisfy M-or-T test is not dispositive of §101 inquiry •claim 3 scope is not limited to a particular algorithm •each step can be performed in human mind alone, or by human using pen and paper •method which can be performed mentally, or by pen and paper, is a mental process - a subcategory of unpatentable abstract idea •even if mental process has a practical application This is MoFo 9
  • 10. “BEAUREGARD” CLAIM 2 •a computer readable medium (e.g., disk, hard drive, data storage, etc.) containing program instructions for a computer to perform a particular process •regardless of statutory category recited in claim (process, machine, manufacture, composition of matter), look to “underlying” invention to determine §101 patent-eligibility •invention “underlying” both claims 2 and 3 is a method for detecting credit card fraud, not a medium for storing computer-readable information •claim 2 recites nothing more than a medium containing program instructions for executing method of claim 3 •despite Beauregard format, claim 2 is treated as a process claim for patent-eligibility purposes This is MoFo 10
  • 11. CLAIM 2 FAILS TRANSFORMATION PRONG •claimed process manipulates data to organize it in a logical way such that additional fraud tests may be performed •mere manipulation or reorganization of data does not satisfy transformation prong This is MoFo 11
  • 12. CLAIM 2 FAILS MACHINE PRONG •claim 2 recites “computer readable medium” containing software instructions requiring execution by “processors of a computer system” •to pass machine prong, use of machine must impose meaningful limits on claim scope •use of computer to perform mental process of claim 3 does not impose sufficiently meaningful limit on claim scope •merely claiming software implementation of a purely mental process that could be performed without a computer does not satisfy machine prong •claim 2 limitations do not make unpatentable method patent-eligible under §101 This is MoFo 12
  • 13. CLAIM 2 RECITES ABSTRACT IDEA •method can be performed entirely in human mind, without a machine •merely coupling unpatentable mental process with a manufacture or machine does not render mental process patent-eligible •method claims invalid under §101 for being drawn to abstract ideas cannot avoid invalidity under §101 by •merely requiring a computer to perform the method, or •merely reciting a computer readable medium containing program instructions for performing the method •result may be different where, as a practical matter, a computer is required to perform the claimed method •claims 2 and 3 are invalid under §101 as a matter of law This is MoFo 13
  • 14. PRACTICAL OBSERVATIONS •merely converting a non-patent eligible method claim to Beauregard format will not be sufficient to •avoid M-or-T test, or •pass M-or-T test •risk of §101 invalidity can be reduced by •reciting a specific algorithm •recite steps that cannot be performed mentally or by pen and paper This is MoFo 14