throbber
Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 1 of 47 PageID #: 1
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF DELAWARE
`
`C.A. No. _______________
`
`JURY TRIAL DEMANDED
`
`))))))))))))
`
`INTERNATIONAL BUSINESS MACHINES
`CORPORATION,
`
`Plaintiff,
`
`v.
`
`RAKUTEN, INC., RAKUTEN USA, INC.,
`RAKUTEN COMMERCE, LLC, and
`EBATES INC. DBA RAKUTEN,
`
`Defendants.
`
`COMPLAINT FOR PATENT INFRINGEMENT
`
`Plaintiff International Business Machines Corporation (“IBM”), for its Complaint for
`
`Patent Infringement against Rakuten, Inc., Rakuten USA, Inc., Rakuten Commerce, LLC, and
`
`Ebates Inc. dba Rakuten (collectively, “Rakuten”), demands a trial by jury on all issues so triable
`
`and alleges as follows:
`
`INTRODUCTION
`
`1.
`
`IBM is in the innovation business. Every year, IBM spends billions of dollars on
`
`research and development to invent, market, and sell new technology. For example, through its
`
`investments and innovations in the new frontier of quantum information science, IBM is the leader
`
`in commercializing quantum computing, once thought to be a purely academic exercise. IBM’s Q
`
`Network service—a community of Fortune 500 companies, academic institutions, research
`
`organizations, and startups working with IBM to advance quantum computing—now has over 100
`
`members.
`
`2.
`
`IBM obtains patents on the technology its inventors develop. IBM’s commitment
`
`to research and innovation has resulted in numerous inventions that have led to the thousands of
`
`patents awarded to IBM by the United States Patent Office each year. In fact, for each of the last
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 2 of 47 PageID #: 2
`
`28 years, IBM scientists and researchers have been awarded more U.S. patents than those of any
`
`other company. Those patents are critical to IBM’s business and its licensing philosophy.
`
`3.
`
`For example, for over twenty years, IBM has been a strong proponent of open
`
`source technologies. IBM was a founding member of Open Invention Network, the largest patent
`
`non-aggression community in history, which supports freedom of action in Linux, a key element
`
`of open source software. IBM was able to leverage its patent portfolio to enable the broad industry
`
`adoption of open source
`
`technologies by pledging
`
`to provide open access
`
`to key
`
`innovations covered by hundreds of IBM software patents for those working on open source
`
`software. And early in 2020, IBM joined the License on Transfer Network (“LOT Network”), a
`
`non-profit community of companies that supports open innovation and responsible stewardship of
`
`technology. LOT Network affirms the traditional use of patents—safeguarding the innovations of
`
`companies who research, develop, and sell new technologies—while protecting its members
`
`against patent assertion entities who purchase or acquire patents from others.
`
`4.
`
`As another example, IBM has pledged to let anyone working on solutions to the
`
`coronavirus pandemic use its patents for free. IBM’s vast patent portfolio can now support
`
`researchers everywhere who are developing technologies to help prevent, diagnose, treat or contain
`
`COVID-19. The collection includes thousands of IBM artificial intelligence patents, some related
`
`to Watson technology, as well as dozens, if not hundreds, related to biological viruses.
`
`5.
`
`IBM also believes in the protection of its proprietary technologies, which result
`
`from IBM’s extensive investments in research and development and the hard work of IBM’s
`
`employees. IBM believes that companies who use IBM’s patented technology should agree to a
`
`license and pay a fair royalty. When a company is using IBM’s patents without authorization,
`
`IBM first seeks to negotiate an agreement whereby IBM and the other company each receive a
`
`2
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 3 of 47 PageID #: 3
`
`license to the other’s patent portfolio. That way, each company can avoid litigation, be fairly
`
`compensated for the use of all of their patents, and maintain freedom to operate in their respective
`
`markets.
`
`6.
`
`IBM’s research and development is currently focused on technology that includes
`
`quantum computing, big data analytics, artificial intelligence, and natural language processing.
`
`But IBM also has a long history of innovating and licensing its technology in the field of internet
`
`commerce. In fact, long before Rakuten existed, IBM partnered with other companies to launch
`
`Prodigy, one of the very first e-commerce services. Rakuten, which was founded in 1997, after e-
`
`commerce was already established, took those prior innovations made by IBM and others to create
`
`and run its new business. As its business has developed, Rakuten has incorporated additional
`
`innovations pioneered by IBM.
`
`7.
`
`For almost six years, IBM has tried to negotiate with Rakuten about Rakuten’s
`
`unlicensed use of IBM’s patents. Dozens of similar companies, including Amazon, Apple,
`
`Google, and Facebook, have agreed to cross licenses with IBM. Unfortunately, Rakuten is not
`
`among them. Instead, to this day, Rakuten has chosen to willfully infringe IBM’s patents and even
`
`expand its infringing activity.
`
`8.
`
`Rather than negotiate with IBM, Rakuten has used a series of delay tactics. In July
`
`2015, when IBM first informed Rakuten that its subsidiaries were infringing IBM’s patents,
`
`Rakuten refused to take responsibility for the companies it controlled and told IBM to contact each
`
`of them individually. Then, Rakuten refused to meet with IBM by ignoring IBM’s messages,
`
`claiming vague scheduling conflicts, or deflecting responsibility from one Rakuten representative
`
`to the next.
`
`3
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 4 of 47 PageID #: 4
`
`9.
`
`Two years later, in 2017, IBM finally had the opportunity to present detailed
`
`evidence of Rakuten’s infringement. In response, Rakuten refused to explain why it continued to
`
`infringe IBM’s patents. When that approach was no longer tenable, Rakuten raised objectively
`
`unreasonable excuses for why it refused to negotiate. When IBM pointed out that Rakuten’s
`
`excuses were flawed and included arguments that had been rejected in court, Rakuten reverted to
`
`delay tactics. In one instance in 2018, Rakuten finally agreed to meet with IBM after months of
`
`haggling over the attendees and the topics to be discussed, only to cancel at the last minute.
`
`10.
`
`Rather than address its infringement of IBM’s intellectual property, Rakuten
`
`attempted to strong-arm IBM by threatening existing relationships between the companies.
`
`Rakuten said it would blacklist IBM from future business opportunities if IBM did not drop the
`
`issue. Through this tactic too, Rakuten attempted to deflect responsibility from its own wrongful
`
`conduct.
`
`11.
`
`Over the years, IBM has discovered that Rakuten infringes additional IBM patents.
`
`IBM has informed Rakuten of its expanding liability for willful patent infringement across its
`
`subsidiaries but has been continually met with delay and excuses. This conduct clearly
`
`demonstrates Rakuten has never taken the issue seriously.
`
`12.
`
`After years of delay and excuses, Rakuten changed tactics. Rakuten told IBM that
`
`it had hired outside legal counsel and would no longer talk to IBM directly. In effect, Rakuten
`
`told IBM: “we will not deal with this issue; talk to our lawyers.” That decision made it nearly
`
`impossible to resolve this matter through business negotiations. IBM has urged Rakuten to
`
`reconsider many times, yet Rakuten refused IBM’s invitations to explain Rakuten’s infringement
`
`and to discuss an amicable business resolution.
`
`4
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 5 of 47 PageID #: 5
`
`13.
`
`After almost six years without meaningful progress toward a resolution, IBM has
`
`brought this lawsuit to finally end Rakuten’s unauthorized use of IBM’s patented technology.
`
`NATURE OF THE CASE
`
`14.
`
`This action arises under 35 U.S.C. § 271 for Defendant’s infringement of IBM’s
`
`United States Patent Nos. 7,072,849 (the “’849 patent”), 7,631,346 (the “’346 patent”), 6,785,676
`
`(the “’676 patent”), and 7,543,234 (the “’234 patent”) (collectively the “Patents-In-Suit”).
`
`THE PARTIES
`
`15.
`
`Plaintiff IBM is a New York corporation, with its principal place of business at 1
`
`New Orchard Road, Armonk, New York 10504.
`
`16.
`
`Defendant Rakuten, Inc. is a Japanese corporation, with its principal place of
`
`business in Setagaya, Tokyo, Japan. Rakuten is the ultimate parent company to Rakuten USA,
`
`Inc., Rakuten Commerce, LLC, and Ebates Inc. dba Rakuten.
`
`17.
`
`Defendant Rakuten USA, Inc. is a Delaware corporation with its principal place of
`
`business at Rakuten Crimson House West 800 Concar Drive., San Mateo, California, 94402.
`
`18.
`
`Defendant Rakuten Commerce, LLC is a Delaware corporation with its principal
`
`place of business in San Mateo, California.
`
`19.
`
`Defendant Ebates Inc. dba Rakuten is a Delaware corporation with its principal
`
`place of business at 160 Spear Street, Suite 1900, San Francisco, CA 94105.
`
`JURISDICTION AND VENUE
`
`IBM incorporates by reference paragraphs 1-19.
`
`This action arises under the patent laws of the United States, including 35 U.S.C.
`
`20.
`
`21.
`
`§ 271 et seq. The jurisdiction of this Court over the subject matter of this action is proper under
`
`28 U.S.C. §§ 1331 and 1338(a).
`
`5
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 6 of 47 PageID #: 6
`
`22.
`
`Venue is proper in this Court pursuant to 28 U.S.C. §§ 1391(b) and (c) and 1400(b).
`
`Rakuten, USA, Inc., Rakuten Commerce, LLC, and Ebates Inc. dba Rakuten are entities organized
`
`under the laws of Delaware and resides in Delaware for purposes of venue under 28 U.S.C. §
`
`1400(b). Additionally, Rakuten, Inc., Rakuten USA, Inc., Rakuten Commerce, LLC, and Ebates
`
`Inc. dba Rakuten conduct business in Delaware, at least by offering for sale and selling products
`
`and services through its websites and mobile applications, which are accessible in Delaware.
`
`Infringement by Rakuten, Inc., Rakuten USA, Inc., Rakuten Commerce, LLC, and Ebates Inc. dba
`
`Rakuten has occurred and continues to occur in Delaware.
`
`23.
`
`Personal jurisdiction exists over Rakuten, Inc., Rakuten USA, Inc., Rakuten
`
`Commerce, LLC, and Ebates Inc. dba Rakuten because those entities conduct business in
`
`Delaware, at least by offering for sale and selling products and services through its websites and
`
`mobile applications, which are accessible in Delaware, and because infringement has occurred and
`
`continues to occur in Delaware. Personal jurisdiction also exists over Rakuten USA, Inc. Rakuten
`
`Commerce, LLC, and Ebates Inc. dba Rakuten because those entities are organized under the laws
`
`of Delaware.
`
`A.
`
`IBM Is A Recognized Innovator.
`
`FACTUAL BACKGROUND
`
`24.
`
`IBM is a worldwide pioneer in various sectors of science and technology. During
`
`IBM’s over 100-year history, IBM’s employees have included six Nobel laureates, six Turing
`
`Awards laureates, five National Medal of Science recipients, and fifteen inventors in the National
`
`Inventors Hall of Fame. IBM has been awarded the U.S. National Medal of Technology more
`
`times than any other company or organization—the U.S. National Medal of Technology is the
`
`nation’s highest award for technological innovation.
`
`6
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 7 of 47 PageID #: 7
`
`25.
`
`IBM employees are responsible for technological advances that have become
`
`foundational technology that is widely incorporated into use by the global community today,
`
`including the dynamic random access memory (DRAMs) found in nearly all modern computers;
`
`magnetic disk storage (hard disk drives) found in computers and portable music players; and some
`
`of the world’s most powerful supercomputers, including Deep Blue (the first computer to beat a
`
`reigning chess champion, Garry Kasparov), Watson (the system that combined content analysis,
`
`natural language processing, information retrieval, and machine learning to beat two of
`
`Jeopardy!’s greatest human champions), and Summit (the world’s fastest supercomputer when
`
`delivered to Oak Ridge National Laboratory in 2018 that has been employed to tackle society’s
`
`largest problems from the opioid crisis to COVID-19). Technology evolves quickly and the nature
`
`of research and development ambitiously seeks out new discoveries. The inventions that IBM
`
`unearths today lays the groundwork for tomorrow’s technology.
`
`B.
`
`IBM Is Committed To Protecting Its Innovations Through The Patent System.
`
`26.
`
`IBM’s research and development operations differentiate IBM from many other
`
`companies. IBM annually spends billions of dollars for research and development. In addition to
`
`yielding inventions that have literally changed the way in which the world works, IBM’s research
`
`and development efforts have resulted in more than 80,000 patents worldwide.
`
`27.
`
`Like the research upon which the patents are based, IBM’s patents also benefit
`
`society. Indeed, the Supreme Court has recognized that the patent system encourages both the
`
`creation and the disclosure of new and useful advances in technology. Such disclosure, in turn,
`
`permits society to innovate further. And, as the Court has further recognized, as a reward for
`
`committing resources to innovation and for disclosing that innovation, the patent system provides
`
`patent owners with the exclusive right to prevent others from practicing the claimed invention for
`
`a limited period of time.
`
`7
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 8 of 47 PageID #: 8
`
`C.
`
`IBM Routinely Licenses Its Patents In Many Fields But Will Enforce Its Rights
`Against Those Who Use Its Intellectual Property Unlawfully.
`
`28.
`
`IBM’s commitment to creating a large patent portfolio underscores the value that
`
`IBM places in the exchange of innovation, and disclosure of that innovation, in return for limited
`
`exclusivity. Indeed, IBM has used its patent portfolio to generate revenue and other significant
`
`value for the company by executing patent cross-license agreements. The revenue generated
`
`through patent licensing enables IBM to continue to commit resources to innovation. Cross
`
`licensing, in turn, provides IBM with the freedom to innovate and operate in a manner that respects
`
`the technology of others.
`
`29.
`
`Given the investment IBM makes in the development of new technologies and the
`
`management of its patent portfolio, IBM and its shareholders expect companies to act responsibly
`
`with respect to IBM’s patents. IBM facilitates this by routinely licensing its patents in many fields
`
`and by working with companies that wish to use IBM’s technology in those fields in which IBM
`
`grants licenses. When a company appropriates IBM’s intellectual property but refuses to negotiate
`
`a license, IBM has no choice but to seek judicial assistance.
`
`D.
`
`IBM Invented Methods For Presenting Applications And Advertisements In An
`Interactive Service While Developing The PRODIGY Online Service.
`
`30.
`
`The inventors of the ’849 patent developed the patented technologies as part of
`
`IBM’s efforts to launch the PRODIGY online service (“Prodigy”), a forerunner to today’s Internet,
`
`in the late 1980s. The inventors believed that to be commercially viable, Prodigy would have to
`
`provide interactive applications to millions of users with minimal response times. The inventors
`
`believed that the “dumb” terminal approach that had been commonly used in conventional
`
`systems, which heavily relied on host servers’ processing and storage resources for performance,
`
`would not be suitable. As a result, the inventors sought to develop more efficient methods of
`
`8
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 9 of 47 PageID #: 9
`
`communication that would improve the speed and functionality of interactive applications and
`
`reduce equipment capital and operating costs.
`
`31.
`
`In light of the above considerations, the inventors developed novel methods for
`
`presenting applications and advertisements in an interactive service that would take advantage of
`
`the computing power of each user’s PC and thereby reduce demand on host servers, such as those
`
`used by Prodigy. The inventors recognized that if applications were structured to be comprised of
`
`“objects” of data and program code capable of being processed by a user’s PC, the Prodigy system
`
`would be more efficient than conventional systems. By harnessing the processing and storage
`
`capabilities of the user’s PC, applications could then be composed on the fly from objects stored
`
`locally on the PC, reducing reliance on Prodigy’s server and network resources.
`
`32.
`
`The service that would eventually be called Prodigy embodied inventions from the
`
`’849 patent when it launched in late 1988, before the existence of the World Wide Web. The
`
`efficiencies derived from the use of the patented technology permitted the implementation of one
`
`of the first graphical user interfaces for online services. The efficiencies also allowed Prodigy to
`
`quickly grow its user base. By 1990, Prodigy had become one of the largest online service
`
`providers with hundreds of thousands of users. Prodigy was widely praised in the industry and is
`
`still held up as an example of innovation in computer networks that predated even the advent of
`
`the World Wide Web. The technological innovations embodied in this patent persist to this day
`
`and are fundamental to the efficient communication of Internet content.
`
`33.
`
`Today, it is easy to take the World Wide Web, powerful computers, and high-speed
`
`network connectivity for granted. Not so in 1988, when the first application in the ’849 patent’s
`
`priority chain was filed. The World Wide Web had not even been conceived yet. Typical personal
`
`computers at the time had “512K RAM”—not 512 megabytes or gigabytes of RAM, but 512
`
`9
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 10 of 47 PageID #: 10
`
`kilobytes. ’849 patent at 9:16-18. The ’849 patent also describes the use of 1,200 to 2,400 bps
`
`(bits per second) modems to access a network—a far cry from today’s high-speed internet. Id. at
`
`9:18-20.
`
`34.
`
`The limited processing power and network bandwidth available in 1988 posed
`
`significant technical obstacles to the development and adoption of network-based interactive
`
`services, in which many users may access interactive services provided by a host. Id. at 1:34-58.
`
`Accordingly, the ’849 patent specifically identifies slowdowns in network response time caused
`
`by processing bottlenecks at the host as a problem to be solved:
`
`[I]n conventional time-sharing computer networks, the data and program
`instructions necessary to support user sessions are maintained at a central host
`computer. However, that approach has been found to create processing
`bottlenecks as greater numbers of users are connected to the network; bottlenecks
`which require increases in processing power and complexity; e.g., multiple hosts
`of greater computing capability, if the network is to meet demand. Further, such
`bottlenecks have been found to also slow response time as more users are
`connected to the network and seek to have their requests for data processing
`answered. Id. at 10:42-53; see also id. at 1:43-52, 10:54-57.
`
`35.
`
`As the ’849 patent also explains, simply adding additional computing capacity to
`
`the hosts is not enough to fix the bottleneck problem. “[E]ven in the case where additional
`
`computing power is added, and where response time is allowed to increase, eventually the host
`
`becomes user saturated as more and more users are sought to be served by the network.” Id. at
`
`10:58-61. In other words, even a host with additional computing capacity would still have limits
`
`on how many users it could support in conventional approaches.
`
`36.
`
`Conventional approaches
`
`to providing advertising
`
`in
`
`interactive services
`
`exacerbated the bottleneck problem by clogging limited network bandwidth. In conventional
`
`approaches to advertising in interactive services, advertising had to compete with service
`
`application data for limited network bandwidth. Id. at 2:20-30. That competition between
`
`10
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 11 of 47 PageID #: 11
`
`advertising and service application data had “the undesirable effect of diminishing service
`
`response time.” Id. at 2:25-26.
`
`37.
`
`The bottleneck problem arises from the limitations of networks that rely exclusively
`
`on central hosts to satisfy users’ data processing requests and the limited network bandwidth
`
`available at the time of the invention. Accordingly, the bottleneck problem addressed by the ’849
`
`patent is a “technical problem.”
`
`38.
`
`Before this suit, the ’849 patent had been challenged three times on grounds of
`
`alleged patent ineligibility. Those challenges were all unsuccessful. In the matter of IBM v. The
`
`Priceline Grp., Inc., C.A. No. 1:15-cv-00137 (D. Del.), the defendants (collectively “Priceline”)
`
`filed a motion to dismiss, alleging that the ’849 patent was directed to unpatentable subject matter.
`
`The Delaware court denied Priceline’s motion, finding that “Defendants have failed to meet their
`
`burden of demonstrating that . . . claim 1 of the ’849 patent [is] devoid of inventive concepts.”
`
`IBM v. The Priceline Grp., Inc., 2016 WL 626495, at *24 (D. Del. Feb. 16, 2016).
`
`39.
`
`In the matter of Kayak Software Corp. v. IBM., CBM2016-00075, Priceline again
`
`challenged the ’849 patent on alleged patent eligibility grounds, this time before the Patent Trial
`
`and Appeal Board (“PTAB”). Just like in the district court, the PTAB rejected Priceline’s
`
`challenge. The PTAB “agree[d] with Patent Owner the disclosure of the ’849 patent itself is almost
`
`exclusively directed to solving a problem arising in computer technology (i.e., bandwidth) with a
`
`computerized solution (i.e., local storage).” Kayak Software Corp. v. IBM., CBM2016-00075,
`
`Paper 16 (PTAB Dec. 15, 2016)) at 19. The PTAB thus concluded, “Petitioner has not shown
`
`sufficiently that independent claims 1 and 21 are directed to an unpatentable ‘abstract idea’ . . . .”
`
`Id. at 20.
`
`11
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 12 of 47 PageID #: 12
`
`40.
`
`Although the parties filed other summary judgment motions in the Priceline case,
`
`Priceline chose not to file a summary judgment motion to challenge the patent eligibility of the
`
`’849 patent.
`
`41.
`
`In the matter of IBM v. Groupon, Inc., C.A. No. 1:16-cv-00122 (D. Del.), Groupon,
`
`Inc. (“Groupon”) moved for judgment on the pleadings that the ’849 patent was directed to
`
`ineligible subject matter. The court denied Groupon’s motion, finding that “the asserted claims
`
`for the Filepp patents are not directed to an abstract idea and are directed to patent-eligible subject
`
`matter.” IBM v. Groupon, Inc., 289 F. Supp. 3d 596, 607 (D. Del. 2017).
`
`E.
`
`IBM Invented Methods For A Runtime User Account Creation Operation Using A
`Single-Sign-On (SSO) Process In A Federated Computer Environment.
`
`42.
`
`The inventors of the ’346 patent developed the patented technology as part of
`
`IBM’s efforts to improve single-sign-on technology. Online service providers, like website
`
`operators, typically use “sign-on” operations to manage access to protected resources, like
`
`confidential webpages. ’346 patent at 6:26-30. A user signs-on by providing authentication
`
`credentials, such as a username and password, which the service provider verifies to authenticate
`
`the user’s identity. Id. at 6:31-36. Then, the service provider can determine whether the identified
`
`user has authorization to access the protected resource and, if so, grants access. Id. at 6:37-43, Fig.
`
`1C. Although that process has become commonplace, it is time consuming for users to sign-on
`
`every time they wish to access a protected resource. Id. at 1:25-33.
`
`43.
`
`One way to address the shortcomings of repetitive sign-on operations is to
`
`authenticate users for an entire “session,” i.e., a series of multiple transfers of information between
`
`the server and the client. Id. at 1:53-61, 6:17-22. That technology is called single-sign-on because
`
`users are only required to sign-on once per session. Id. at 1:53-61. For example, users could enter
`
`a user name and password on the homepage of a service provider and request multiple protected
`
`12
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 13 of 47 PageID #: 13
`
`webpages without reentering their credentials. But prior art single-sign-on methods were
`
`problematic because they required users to have preexisting user accounts at the service provider.
`
`Id. at 2:19-42.
`
`44.
`
`As Dr. Heather Hinton, first named inventor of the ’346 patent, testified in prior
`
`proceedings, prior art systems could not take advantage of the full benefits of single-sign-on
`
`because of this fundamental problem.
`
`45.
`
`The inventors of the ’346 patent sought to develop single-sign-on technology that
`
`would permit a new user of a service provider to access protected resources. They developed novel
`
`methods for systems interacting within a “federated computing environment” to trigger a single-
`
`sign-on operation on behalf of a user that would obtain access to a “protected resource” and create
`
`an account for the user. The specification discloses how to structure a “federated computing
`
`environment” using a nonconventional arrangement of computer components. Id. at 10:62-11:7,
`
`11:28-35. The specification describes a “protective resource” using precise technical terms that
`
`demonstrate “how” to solve the limitations of prior art single-sign-on operations. Id. at 5:60-67,
`
`6:26-30, 8:45-48, 11:28-35. And it specifies the “ordered combination” of technical steps
`
`necessary to implement the claimed embodiments. See, e.g., id. at Figs. 9, 11.
`
`46.
`
`One implementation of the ’346 patent involves using “tokens” to facilitate such
`
`interactions. “A token provides direct evidence of a successful operation and is produced by the
`
`entity that performs the operation, e.g., an authentication token that is generated after a successful
`
`authentication operation. A Kerberos token is one example of an authentication token that may be
`
`used with the present invention.” Id. at 8:49-54. Such binary security tokens can implement web
`
`services message-level security. When a user accesses a service provider and signs into the identity
`
`provider via single-sign-on operations, the identity provider authenticates the user. The identity
`
`13
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 14 of 47 PageID #: 14
`
`provider provides a token to the service provider “to provide proof of authentication of a user.”
`
`Id. at 22:15-19. The service provider would in turn, “translate” the identity provider’s token into
`
`a “locally valid user identifier . . .based on information contained in the [] token” in order to “build
`
`a local session for the user.” Id. at 24:16-25:3. After the user has been found to be authenticated
`
`by the identity provider, the system provider can then create an account for the user at the service
`
`provider, thus bypassing any requirement for the user to directly create an account at the service
`
`provider. The ’346 patent thus extends the benefits of single-sign-on technology to allow the user
`
`to access protected resources at any number of service providers without having to first set up a
`
`user account.
`
`47.
`
`To date, the ’346 patent had been unsuccessfully challenged on grounds of alleged
`
`patent ineligibility. In the matter of IBM v. The Priceline Grp., Inc., C.A. No. 1:15-cv-00137 (D.
`
`Del.), Priceline filed a motion to dismiss, alleging that the ’346 patent was directed to unpatentable
`
`subject matter. The Delaware court denied the motion, finding the patent was not directed to an
`
`abstract idea; “the true heart of the invention is the utilization of SSO technology to automatically
`
`create an account at the service provider level on behalf of users who did not previously have such
`
`accounts, all in order to allow the user to access protected resources at the service provider.” IBM
`
`v. The Priceline Grp., Inc., 2016 WL 626495, at *16 (D. Del. Feb. 16, 2016). The Court also
`
`rejected the argument that the claim did not contain inventive aspects: “The specification describes
`
`the improvement over the prior art encompassed by the invention as the ‘eliminat[ion] [of] these
`
`prerequisites’ because while ‘[i]n the prior art, the service provider cannot automatically create an
`
`active session for the user and allow access to protected resources; with the present invention, the
`
`service provider dynamically performs a runtime linked-user-account creation operation at the
`
`14
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 15 of 47 PageID #: 15
`
`service provider by creating a linked user account based on the user identity . . . that has been
`
`provided by the identity provider to the service provider[.]’” Id. at *19.
`
`48.
`
`Although the parties filed summary judgment motions in the Priceline case,
`
`Priceline chose not to file a motion to challenge the patent eligibility of the ’346 patent.
`
`49.
`
`In the IBM v. Groupon case, Groupon chose not to file any motions challenging the
`
`patent eligibility of the ’346 patent at the pleading stage or at the summary judgement stage. The
`
`case proceeded to trial. The jury rendered a verdict of willful infringement and no invalidity on
`
`all four of the patents-in-suit, including the ’346 patent, thus further showing the continued
`
`importance and relevance of the invention of the ’346 patent to modern network technology.
`
`50.
`
`The matters of IBM v. Expedia and IBM v. Airbnb also involved the ’346 patent.
`
`None of the defendants in those litigations filed motions that challenged the patent eligibility of
`
`the ’346 patent.
`
`51.
`
`The Federal Circuit has interpreted the claims of the ’346 patent in an appeal
`
`concerning two final written decisions issued by the PTAB. In reversing the PTAB’s finding that
`
`a subset of claims of the ’346 patent were anticipated by prior art, the Federal Circuit explained
`
`that the ’346 patent solves “the special challenges of providing single-sign-on capabilities in a
`
`‘federated’ environment,’” which the court understood as an environment containing different
`
`enterprises that “adhere to certain standards of interoperability.” IBM v. Iancu, 759 F. App’x 1002,
`
`1004-1005 (Fed. Cir. 2019). The Federal Circuit distinguished how the prior art approached
`
`authentication from how the ’346 patent solved the problem by looking at how the claimed
`
`“federated computing environment” and “single-sign-on” operated in the context of the invention.
`
`Id. at 1007-1009. The Federal Circuit’s opinion confirms that the ’346 patent is directed to a non-
`
`15
`
`

`

`Case 1:21-cv-00461-UNA Document 1 Filed 03/29/21 Page 16 of 47 PageID #: 16
`
`abstract computer-specific problem and involves innovation in “how” to solve the limitations of
`
`prior art single-sign-on techniques.
`
`F.
`
`IBM Invented Methods For Improving Searching Using Real-Time Incorporation
`Of Contextual Information.
`
`52.
`
`The inventor of the ’676 patent developed the patented technology as part of IBM’s
`
`efforts to improve search mechanisms for customer self-service search and retrieval systems.
`
`Customer self-service search and retrieval systems may include knowledge management systems,
`
`information portals, search engines, and data miners. Providing efficient and satisfactory search
`
`results using such systems could be improved by incorporating relevant contextual information
`
`about the user. At the time of the invention, conventional customer self-service search and
`
`retrieval systems required users to input their contextual information when conducting each search
`
`query. However, these prior art search mechanisms failed to utilize the contextual information to
`
`rank search results and did not change these rankings over time, even as the user’s contextual
`
`information changed. The prior art search mechanisms ranked search results without adapting to
`
`the current state of the user’s interactions with the system and, therefore, failed to prioritize the
`
`search results most relevant to the user.
`
`53.
`
`The inventor of the ’676 patent recognized a need for an improv

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket